Suggested Topics within your search.
Suggested Topics within your search.
- linux 1
-
1
-
2
Research on WiFi Penetration Testing with Kali Linux
Published 2021-01-01“…Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. …”
Get full text
Article -
3
Structural properties and static robustness of Linux software network
Published 2019-11-01“…The source code of the Linux software was analyzed,and the directed function call network model,the weak coupling network model of software system,the strong coupling network model and the strong connected subgraph model were built.The characteristics and static robustness of the four networks were studied.The results show that four networks all show ‘small-world’ property.The out-degree distribution of the six modules in the Linux network generally follows the exponential distribution,and the in-degree distribution of the six modules follows the power law.The best attacking strategy was distinct when different robustness evaluation indicator was adopted.For the weak connectivity indicator,high in-degree attacking strategy was of the greatest damage to the weakly coupled software network.…”
Get full text
Article -
4
Comparison of human computer interaction on Windows and Linux operations systems
Published 2019-01-01Subjects: Get full text
Article -
5
Technique of analyzing device drivers of embedded linux system using UML
Published 2012-11-01“…A method to model and analyze the device drivers in embedded Linux system using UML was proposed.By using UML modeling method,the dependencies among the device driver components and the focus of the device driver development are clarified.On this basis,the SDWiFi device driver model was studied,the SDIO communication interface between the host and Wi-Fi chips was designed and the SDWiFi device driver was transplanted.At last,the SDWiFi wireless LAN equipment was configured and tested using wireless tools.The test results show that the SDWiFi wireless LAN equipment works properly.The efficiency of the device driver development is improved by modeling and analyzing the device drivers using UML.…”
Get full text
Article -
6
Implementation Of The Use Of The C Programming Language in The Ubuntu Linux Operating System
Published 2024-06-01Subjects: Get full text
Article -
7
Research on Linux network packet buffer recycling toward multi-core processor
Published 2009-01-01“…A lock-free algorithm for Linux packet buffer recycling on multi-core processor was proposed.Through making a model of Linux network packet forwarding, the principle of Linux packet buffer recycling was analyzed, and the main reason that the mechanism wasn’t extensible on multi-core processor was pointed out .It was that mutual exclusion and cache coherence operations consumed too much CPU clock tick.A new buffer recycling algorithm named MSRQ was designed and implemented.With the new algorithm, the parallel operations on the recycling queue were permitted without mutual exclusion on multi-core processor.And the new algorithm had better cache behavior than original recy-cling algorithm.The experiment result shows that the performance of Linux network packet forwarding with the new algorithm can be improved more than 67%.…”
Get full text
Article -
8
-
9
RETRACTED: Designing a system call analyser for system calls used inside Linux containers
Published 2024-01-01Get full text
Article -
10
Energy optimization strategy on the IoT equipment based on the scheduler
Published 2019-03-01Subjects: Get full text
Article -
11
-
12
Optimization Algorithm for Selecting Compressible Data
Published 2019-05-01Subjects: Get full text
Article -
13
Leaking Network Devices with Rubber Ducky Attack
Published 2024-12-01Subjects: Get full text
Article -
14
Security architecture to support multiple security policies based on access control space
Published 2006-01-01Subjects: Get full text
Article -
15
Research on traffic identification and scheduling based on optical interconnection architecture in data center
Published 2018-09-01Subjects: Get full text
Article -
16
Study of wireless experiment platform in 60 GHz
Published 2016-03-01“…A scheme of 60 GHz wireless experimental platform was presented.The platform was made up of NI USRP(transceiver module),NetFPGA(data processing module)and PC(control module).NI USRP was connected with NetFPGA by Gigabit Nthernet interfaces,while NetFPGA was connected with PC by PCI-bus.This experiment platform works on Linux with the help of LabVIEW.The transceiver and data process module are reprogrammable.Many operations such as data stream capturing,classification and speed limit could be done with Linux and PCI.The platform has good performances in open-ended and expansibility.That would be convenient for farther research in channel modeling,timeslot allocation and multiple access algorithms.…”
Get full text
Article -
17
Research on system call forwarding mechanism of SGX-based LibOS
Published 2024-10-01“…This framework compared the execution of system calls within the LibOS to their execution on regular Linux hosts, analyzing the differences in call forwarding mechanisms, Linux feature replication, and runtime support for programming languages. …”
Get full text
Article -
18
TPCM-based trusted PXE boot method for servers
Published 2020-12-01“…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
Get full text
Article -
19
Comparative evaluation between Java application using JNI and native C/C++ application running on an Android platform.
Published 2025-01-01“… Android is a popular operating system based on the Linux kernel and has a Java-based framework. As it is built on Linux, it supports the development of applications written in C/C++, known as native applications. …”
Get full text
Article -
20
Portal authentication HTTP redirection using netfilter NFQUEUE
Published 2014-10-01“…When using portal for user authentication,unauthorized user's HTTP access should be redirected to portal login page to help user do authentication.Using netfilter NFQUEUE target send unauthorized user TCP port 80 packets to user-space program redir_http.Redir_http will send IP reply packets to user do HTTP redirection with the help of raw socket.Using NFQUEUE can ensures high performance redirection,avoid troublesome development in the Linux kernel,simplify application development and improve system stability.…”
Get full text
Article