Analyses of Malware Files

PURPOSE

The main goal of laboratory report is to identify three analyses of malware files from the archive file send by the lecture. The archive contains 89 malware files. The way how we choice 3 files is by following algorithm:

  1. Soft them by name
  2. First use last number of your …
more ...

Company Brochure and Founder Notes, Cybersecurity.mk

COMPANY BROCHURE: Cybersecurity.mk

Your IT infrastructure could be taken under the shoulder of professionals

September 2012

Founder Notes:

Recently, Macedonian government has announced to open a CERT agency. This news was not only shock to us, but to everyone else, indeed. However, we are supporting this initiative and hope …

more ...

Identify Possible Infection of Malware Into the Wireshark Capture File

INTRODUCTION

The main goal of laboratory report is to identify possible infection of malware into the wireshark capture file. The report should highlight the following aspects:

  • Download [not avaibale anymore]

  • Find malware download in this pcap and extract malware or malwares find out where malware was downloaded from.

  • What malware …

more ...


Testing SNORT – IDS rulesets

SCENARIO

The objective of this laboratory test, scenario is to create a solution and instructions for testing an IDS^1^ systems usefulness for detecting attacks against a wordpress site. In addition, we have to develop/download/find/whatever a SNORT configuration (rulesets, preprocessors, whatever) that performs better than the default …

more ...

Testing IDS

SCENARIO

The objective of this laboratory test, scenario is to create a solution and instructions for testing an IDS\^1 systems usefulness for detecting attacks against a wordpress site. In addition, a repeatable process to evaluate vendor claims. Whatever passive IDS system sample delivered as a VM or a dedicated …

more ...


Influence of Virtual life

Authors: Predrag Tasevski, Marco Gavazzi and Lasse Hyyrynen

Introduction

Any computer user who is engaged in a virtual world has a virtual life. Virtual life is a catchall term used to describe the involvement and presence of an individual in any chosen virtual world or simulated digital environment. Virtual world …

more ...

Future of human communication

On the basis of how the communication possibilities have changed (for) most people during last decades, what’s my idea of the normal human interaction in 10..20…50 years?

To understand the present we must first understand the past. The Internet has revolutionized the computer and communications world like …

more ...

Digital divide or not?

Digital divide or not?

Is there a psychological “digital divide”? Are people who often use the Internet psychologically different from those who do not and in what ways?

The Internet is changing the average citizens as much as did other technologies, for instance: telephone, TV, computers, mobile phones etc. The …

more ...

Human Computer Interaction in 2020

In March 2007, Microsoft Research organised the “HCI 2020” meeting at the El Bulli Hacienda Hotel near Seville, Spain. The event’s title expressed its key question: what will Human-Computer Interaction (HCI) be like in the year 2020? (Harper, Tom, Yvonne, & Abigail, 2008, p. 8) The report that I have …

more ...

IP Responsibility and abuse reporting procedure

PURPOSE

The main goal of laboratory report is to identify the responsibilities for the IP addresses below and how we can make connection to them. IP addresses are randomly chosen by the lecture.

IP addresses:

​1. 69.163.171.238

​2. 31.44.184.101

​3. 188.72.228.69 …

more ...