Upload
hari-shanmughan
View
220
Download
0
Embed Size (px)
Citation preview
8/8/2019 Semi Topics
http://slidepdf.com/reader/full/semi-topics 1/8
HONEYPOTS
The Internet is growing fast and doubling its number of websites every 53 days and the numberof people using the internet is also growing. Hence, global communication is getting moreimportant every day. At the same time, computer crimes are also increasing. Countermeasures
are developed to detect or prevent attacks - most of these measures are based on known facts,known attack patterns. Countermeasures such as firewalls and network intrusion detectionsystems are based on prevention, detection and reaction mechanism; but is there enoughinformation about the enemy?
As in the military, it is important to know, who the enemy is, what kind of strategy he uses,what tools he utilizes and what he is aiming for. Gathering this kind of information is not easybut important. By knowing attack strategies, countermeasure scan be improved andvulnerabilities can be fixed. To gather as much information as possible is one main goal of ahoneypot. Generally, such information gathering should be done silently, without alarming anattacker. All the gathered information leads to an advantage on the defending side and cantherefore be used on productive systems to prevent attacks.
A honeypot is primarily an instrument for information gathering and learning. Its primarypurpose is not to be an ambush for the blackhat community to catch them in action and topress charges against them. The focus lies on a silent collection of as much information aspossible about their attack patterns, used programs, purpose of attack and the blackhatcommunity itself. All this information is used to learn more about the blackhat proceedings andmotives, as well as their technical knowledge and abilities. This is just a primary purpose of ahoneypot. There are a lot of other possibilities for a honeypot - divert hackers from productivesystems or catch a hacker while conducting an attack are just two possible examples. They arenot the perfect solution for solving or preventing computer crimes.
Honeypots are hard to maintain and they need operators with good knowledge about operatingsystems and network security. In the right hands, a honeypot can be an effective tool forinformation gathering. In the wrong, unexperienced hands, a honeypot can become another
infiltrated machine and an instrument for the blackhat community.
This paper will present the basic concepts behind honeypots and also the legal aspects of honeypots.
HONEYPOT BASICS
Honeypots are an exciting new technology with enormous potential for the security community.The concepts were first introduced by several icons in computer security, specifically Cliff Stollin the book "The Cuckoo's Egg" , and Bill Cheswick's paper "An Evening with Berferd". Sincethen, honeypots have continued to evolve, developing into the powerful security tools they aretoday.
Honeypots are neither like Firewalls that are used to limit or control the traffic coming into thenetwork and to deter attacks neither is it like IDS (Intrusion Detection Systems) which is usedto detect attacks. However it can be used along with these. Honeypots does not solve aspecific problem as such, it can be used to deter attacks, to detect attacks, to gatherinformation, to act as an early warning or indication systems etc. They can do everything fromdetecting encrypted attacks in IPv6 networks to capturing the latest in on-line credit cardfraud. It is this flexibility that gives honeypots their true power. It is also this flexibility thatcan make them challenging to define and understand. The basic definition of honeypots is
8/8/2019 Semi Topics
http://slidepdf.com/reader/full/semi-topics 2/8
TOUCHSCREENSduction
A type of display screen that has a touch-sensitive transparent panel covering the screen.
Instead of using a pointing device such as a mouse or light pen, you can use your finger to point directly to objects on the screen.
Although touch screens provide a natural interface for computer novices, they areunsatisfactory for most applications because the finger is such a relatively large object. Itis impossible to point accurately to small areas of the screen. In addition, most users find
touch screens tiring to the arms after long use.
Touch-screens are typically found on larger displays, in phones with integrated PDA
features. Most are designed to work with either your finger or a special stylus. Tapping aspecific point on the display will activate the virtual button or feature displayed at that
location on the display.Some phones with this feature can also recognize handwriting
written on the screen using a stylus, as a way to quickly input lengthy or complexinformation
A touchscreen is an input device that allows users to operate a PC by simply touching the
display screen. Touch input is suitable for a wide variety of computing applications. A
touchscreen can be used with most PC systems as easily as other input devices such astrack balls or touch pads. Browse the links below to learn more about touch input
technology and how it can work for you.
History Of Touch Screen Technology
A touch screen is a special type of visual display unit with a screen which is sensitive to pressure or touching. The screen can detect the position of the point of touch. The design
of touch screens is best for inputting simple choices and the choices are programmable.
The device is very user-friendly since it 'talks' with the user when the user is picking upchoices on the screen.
Touch technology turns a CRT, flat panel display or flat surface into a dynamic data entry
device that replaces both the keyboard and mouse. In addition to eliminating these
separate data entry devices, touch offers an "intuitive" interface. In public kiosks, for example, users receive no more instruction than 'touch your selection.
Specific areas of the screen are defined as "buttons" that the operator selects simply by
touching them. One significant advantage to touch screen applications is that each screencan be customized to reflect only the valid options for each phase of an operation, greatly
reducing the frustration of hunting for the right key or function.
Pen-based systems, such as the Palm Pilot® and signature capture systems, also use touch
technology but are not included in this article. The essential difference is that the pressurelevels are set higher for pen-based systems than for touch.Touch screens come in a wide
range of options, from full color VGA and SVGA monitors designed for highly graphic
Windows® or Macintosh® applications to small monochrome displays designed for
keypad replacement and enhancement.
8/8/2019 Semi Topics
http://slidepdf.com/reader/full/semi-topics 3/8
Specific figures on the growth of touch screen technology are hard to come by, but a
1995 study last year by Venture Development Corporation predicted overall growth of
17%, with at least 10% in the industrial sector.Other vendors agree that touch screentechnology is becoming more popular because of its ease-of-use, proven reliability,
expanded functionality, and decreasing cost.
A touch screen sensor is a clear glass panel with a touch responsive surface. The touch
sensor/panel is placed over a display screen so that the responsive area of the panelcovers the viewable area of the video screen. There are several different touch sensor
technologies on the market today, each using a different method to detect touch input.
The sensor generally has an electrical current or signal going through it and touching thescreen causes a voltage or signal change. This voltage change is used to determine the
location of the touch to the screen.
PSYCHOACOUSTICS
Introduction
Basics of Audio Compression
Advances in digital audio technology are fueled by two sources: hardware developments
and new signal processing techniques. When processors dissipated tens of watts of power and memory densities were on the order of kilobits per square inch, portable playback
devices like an MP3 player were not possible. Now, however, power dissipation, memory
densities, and processor speeds have improved by several orders of magnitude.Advancements in signal processing are exemplified by Internet broadcast applications: if
the desired sound quality for an internet broadcast used 16-bit PCM encoding at 44.1
KHz, such an application would require a 1.4 Mbps (2 x 16 x 44k) channel for a stereosignal! Fortunately new bit rate reduction techniques in signal processing for audio of thisquality are constantly being released.
Increasing hardware efficiency and an expanding array of digital audio representation
formats are giving rise to a wide variety of new digital audio applications. These
applications include portable music playback devices, digital surround sound for cinema,high-quality digital radio and television broadcast, Digital Versatile Disc (DVD), and
many others. This paper introduces digital audio signal compression, a technique
essential to the implementation of many digital audio applications. Digital audio signalcompression is the removal of redundant or otherwise irrelevant information from a
digital audio signal, a process that is useful for conserving both transmission bandwidthand storage space. We begin by defining some useful terminology. We then present atypical "encoder" (as compression algorithms are often called) and explain how it
functions. Finally consider some standards that employ digital audio signal compression,
and discuss the future of the field.
Psychoacoustics is the study of subjective human perception of sounds. Effectively, it isthe study of acoustical perception. Psychoacoustic modeling has long-since been an
8/8/2019 Semi Topics
http://slidepdf.com/reader/full/semi-topics 4/8
integral part of audio compression. It exploits properties of the human auditory system to
remove the redundancies inherent in audio signals that the human ear cannot perceive.
More powerful signals at certain frequencies 'mask' less powerful signals at nearbyfrequencies by de-sensitizing the human ear's basilar membrane (which is responsible for
resolving the frequency components of a signal). The entire MP3 phenomenon is made
possible by the confluence of several distinct but interrelated elements: a few simpleinsights into the nature of human psychoacoustics, a whole lot of number crunching, and
conformance to a tightly specified format for encoding and decoding audio into compact
bitstreams.
Terminology
Audio Compression vs. Speech Compression
This paper focuses on audio compression techniques, which differ from those used in
speech compression. Speech compression uses a model of the human vocal tract to
express particular signal in a compressed format. This technique is not usually applied in
the field of audio compression due to the ast array of sounds that can be generated -models that represent audio generation would be too complex to implement. So instead of
modeling the source of sounds, modern audio compression models the receiver, i.e., the
human ear.
Lossless vs. Lossy
When we speak of compression, we must distinguish between two different types:
lossless, and lossy. Lossless compression retains all the information in a given signal, i.e.,
a decoder can, perfectly reconstruct a compressed signal. In contrast, lossy compressioneliminates information, from the original signal. As a result, a reconstructed signal may
differ from the original. With audio signals, the differences between the original and
reconstructed signals only matter if they are detectable by the human ear. As we willexplore shortly, audio compression employs both lossy and lossless techniques.
Basic Building Blocks
Figure 1 shows a generic encoder or "compressor that takes blocks of sampled audio
signal as its input. These blocks typically consist of between 500 and 1500 samples per channel, depending on the encoder specification. For example, the MPEG-1 layer III
(MP3) specification takes 576 samples per channel per input block. The output is a
compressed representation of the input block (a "frame") that can be transmitted or storedfor subsequent decoding.
8/8/2019 Semi Topics
http://slidepdf.com/reader/full/semi-topics 5/8
ANIMATRONICS
Introduction
The first use of Audio-Animatronics was for Walt Disney's Enchanted Tiki Room inDisneyland, which opened in June, 1963. The Tiki birds were operated using digital
controls; that is, something that is either on or off. Tones were recorded onto tape, which
on playback would cause a metal reed to vibrate. The vibrating reed would close a circuitand thus operate a relay. The relay sent a pulse of energy (electricity) to the figure's
mechanism which would cause a pneumatic valve to operate, which resulted in the
action, like the opening of a bird's beak. Each action (e.g., opening of the mouth) had aneutral position, otherwise known as the "natural resting position" (e.g., in the case of the
Tiki bird it would be for the mouth to be closed). When there was no pulse of energy
forthcoming, the action would be in, or return to, the natural resting position.
This digital/tone-reed system used pneumatic valves exclusively--that is, everything wasoperated by air pressure. Audio-Animatronics' movements that were operated with this
system had two limitations. First, the movement had to be simple--on or off. (e.g., The
open and shut beak of a Tiki bird or the blink of an eye, as compared to the manydifferent positions of raising and lowering an arm.) Second, the movements couldn't
require much force or power. (e.g., The energy needed to open a Tiki Bird's beak could
easily be obtained by using air pressure, but in the case of lifting an arm, the pneumatic
system didn't provide enough power to accomplish the lift.) Walt and WED knew thatthis this pneumatic system could not sufficiently handle the more complicated shows of
the World's Fair. A new system was devised.
In addition to the digital programming of the Tiki show, the Fair shows required analog programming. This new "analog system" involved the use of voltage regulation. The tonewould be on constantly throughout the show, and the voltage would be varied to create
the movement of the figure. This "varied voltage" signal was sent to what was referred to
as the "black box." The black boxes had the electronic equipment that would receive thesignal and then activate the pneumatic and hydraulic valves that moved the performing
figures. The use of hydraulics allowed for a substantial increase in power, which was
needed for the more unwieldy and demanding movements. (Hydraulics were usedexclusively with the analog system, and pneumatics were used only with the tone-
reed/digital system.)
There were two basic ways of programming a figure. The first used two differentmethods of controlling the voltage regulation. One was a joystick-like device called atransducer, and the other device was a potentiometer (an instrument for measuring an
unknown voltage or potential difference by comparison to a standard voltage--like the
volume control knob on a radio or television receiver). If this method was used, when afigure was ready to be programmed, each individual action--one at a time-- would be
refined, rehearsed, and then recorded. For instance, the programmer, through the use of
8/8/2019 Semi Topics
http://slidepdf.com/reader/full/semi-topics 6/8
the potentiometer or transducer, would repeatedly rehearse the gesture of lifting the arm,
until it was ready for a "take."
IONTOPHORESIS
Iontophoresis is an effective and painless method of delivering medication to a localized
tissue area by applying electrical current to a solution of the medication. The delivered
dose depends on the current flowing and its duration.Iontophoresis is a recognized therapeutic method for delivering ionic compounds, i.e.
drugs, into and through the skin by applying electrical current. It has proven to be a
beneficial treatment for many localized skin disorders such as; nail diseases, Herpies
lesions, psoriasis, eczematous, and cutaneous T-cell lymphoma. The method has also been reported useful for topical anesthesia to the skin prior to cut-down for artificial
kidney dialysis, insertion of tracheotomy tubes and infiltration of lidocaine into the skin
prior to venipuncture.
Treatment of various musculoskeletal disorders with anti-inflammatory agents has beenreported in the literature. Iontophoresis enhances the transdermal delivery of ionized
drugs through the skin's outermost layer (stratum corneum) which is the main barrier to
drug transport. The absorption rate of the drug is increased, however, once the drug passes through the skin barrier natural diffusion and circulation are required to shuttle the
drug to its proper location. The mechanism by which iontophoresis works is based upon
the knowledge that like electrical charges repel. Application of a positive current from anelectrode to a solution applied to a skin surface will drive the positively charged drug
ions away from the electrode and into the skin. Obviously, negatively charged ions will
behave in the same manner.
8/8/2019 Semi Topics
http://slidepdf.com/reader/full/semi-topics 7/8
ABSTRACT
"Money in the 21st century will surely prove to be as different from the money of thecurrent century as our money is from that of the previous century. Just as fiat money
replaced specie-backed paper currencies, electronically initiated debits and credits will
become the dominant payment modes, creating the potential for private money tocompete
with government-issued currencies." Just as every thing is getting under the shadow of
"e" today we have paper currency being replaced by electronic money or e-cash.
Hardly a day goes by without some mention in the financial press of new developmentsin "electronic money". In the emerging field of electronic commerce, novel buzzwords
like smartcards, online banking, digital cash, and electronic checks are being used todiscuss money. But how are these brand-new forms of payment secure? And mostimportantly, which of these emerging secure electronic money technologies will survive
into the next century?
These are some of the tough questions to answer but here's a solution, which provides a
form of security to these modes of currency exchange using the "BiometricsTechnology". The Money Pad introduced here uses the biometrics technology for Finger
Print recognition. Money Pad is a form of credit card or smartcard, which we name so.
Every time the user wants to access the Money Pad he has to make an impression of his
fingers which will be scanned and matched with the one in the hard disk of data baseserver. If the finger print matches with the user's he will be allowed to access and use the
Pad other wise the Money Pad is not accessible. Thus providing a form of security to the
ever-lasting transaction currency of the future "e-cash".
Money Pad - A form of credit card or smart card similar to floppy disk, which isintroduced to provide, secure e-cash transactions.
8/8/2019 Semi Topics
http://slidepdf.com/reader/full/semi-topics 8/8
Speed detection of moving vehicles using speed
camera
Definition
Although there is good road safety performance the number of people killed and injured
on our roads remain unacceptably high. So the roads safety strategy was published or introduced to support the new casualty reduction targets. The road safety strategy
includes all forms of invention based on the engineering and education and enforcement
and recognizes that there are many different factors that lead to traffic collisions and
casualties. The main reason is speed of vehicle. We use traffic lights and other trafficmanager to reduce the speed. One among them is speed cameras.
Speed cameras on the side of urban and rural roads, usually placed to catch transgressors
of the stipulated speed limit for that road. The speed cameras, the solely to identify and
prosecute those drivers that pass by the them when exceed the stipulated speed limit.
At first glance this seemed to be reasonable that the road users do not exceed the speed
limit must be a good thing because it increases road safety, reduces accidents and protect
other road users and pedestrians.So speed limits are good idea. To enforce these speed limit; laws are passed making
speed an offence and signs are erected were of to indicate the maximum permissible
speeds. The police can't be every where to enforce the speed limit and so enforcement
cameras art director to do this work; on one who's got an ounce of Commons sense, thedeliberately drive through speed camera in order fined and penalized .
So nearly everyone slowdown for the speed Camera. We finally have a solution to the
speeding problem. Now if we are to assume that speed cameras are the only way to makedriver's slowdown, and they work efficiently, then we would expect there to be a great
number of these every were and that day would be highly visible and identifiable to make
a drivers slow down.