Project Arachnid
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Anonsocialmix: Anonymous P2P File Sharing Over Social Networks
AnonSocialMix: Anonymous P2P File Sharing Over Social Networks Student Name: Rajdeep Mukherjee IIIT-D-MTech-CS-GEN-MT15051 July, 2017 Indraprastha Institute of Information Technology New Delhi Thesis Committee Dr. Sambuddho Chakravarty, IIIT Delhi (Advisor) Dr. Tanmoy Chakraborty, IIIT Delhi (Internal Examiner) Dr. Vinay Joseph Ribeiro, IIT Delhi (External Examiner) Submitted in partial fulfillment of the requirements for the Degree of M.Tech. in Computer Science, in Information Security Category ©2017 IIIT-D MTech-CS-GEN-17-MT15051 All rights reserved Certificate This is to certify that the thesis titled “AnonSocialMix: Anonymous P2P File Sharing Over Social Networks" submitted by Rajdeep Mukherjee for the partial fulfillment of the requirements for the degree of Master of Technology in Computer Science & Engineering is a record of the bonafide work carried out by him under my guidance and supervision in the Security and Privacy group at Indraprastha Institute of Information Technology, Delhi. This work has not been submitted anywhere else for the reward of any other degree. Dr.Sambuddho Chakravarty Indraprastha Institute of Information Technology, New Delhi 2 Abstract Peer-to-peer (P2P) file sharing accounts for one of the major sources of the Internet traffic. As privacy and anonymity issues continue to grow due to constant censorship and network surveil- lance, more and more Internet users are getting attracted towards the facilities for anonymous communication. Extensive research has been conducted over the years towards the design and development of several anonymous P2P file sharing protocols and systems. Size of the Anonymity Set plays a crucial role in determining the degree of anonymity being provided by such networks. -
Uila Supported Apps
Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage. -
Download Report
cover_final_02:Layout 1 20/3/14 13:26 Page 1 Internet Watch Foundation Suite 7310 First Floor Building 7300 INTERNET Cambridge Research Park Waterbeach Cambridge WATCH CB25 9TN United Kingdom FOUNDATION E: [email protected] T: +44 (0) 1223 20 30 30 ANNUAL F: +44 (0) 1223 86 12 15 & CHARITY iwf.org.uk Facebook: Internet Watch Foundation REPORT Twitter: @IWFhotline. 2013 Internet Watch Foundation Charity number: 1112 398 Company number: 3426 366 Internet Watch Limited Company number: 3257 438 Design and print sponsored by cover_final_02:Layout 1 20/3/14 13:26 Page 2 OUR VISION: TO ELIMINATE ONLINE CHILD SEXUAL ABUSE IMAGES AND VIDEOS To help us achieve this goal we work with the following operational partners: OUR MEMBERS: Our Members help us remove and disrupt the distribution of online images and videos of child sexual abuse. It is with thanks to our Members for their support that we are able to do this work. As at December 2013 we had 110 Members, largely from the online industry. These include ISPs, mobile network operators, filtering providers, search providers, content providers, and the financial sector. POLICE: In the UK we work closely with the “This has been a hugely important year for National Crime Agency CEOP child safety online and the IWF have played a Command. This partnership allows us vital role in progress made. to take action quickly against UK-hosted criminal content. We also Thanks to the efforts of the IWF and their close work with international law working with industry and the NCA, enforcement agencies to take action against child sexual abuse content hosted anywhere in the world. -
Rapport D'information Sur Les Géants Du Numérique
N° 4213 ______ ASSEMBLÉE NATIONALE CONSTITUTION DU 4 OCTOBRE 1958 QUINZIÈME LÉGISLATURE Enregistré à la Présidence de l’Assemblée nationale le 2 juin 2021. RAPPORT D’INFORMATION DÉPOSÉ en application de l’article 145 du Règlement PAR LA COMMISSION DES AFFAIRES ÉTRANGÈRES en conclusion des travaux d’une mission d’information constituée le 20 novembre 2019 sur les géants du numérique ET PRÉSENTÉ PAR M. ALAIN DAVID ET MME MARION LENNE, Députés —— — 3 — SOMMAIRE ___ Pages INTRODUCTION ........................................................................................................... 7 SYNTHÈSE DES RECOMMANDATIONS DES RAPPORTEURS ............ 10 PREMIÈRE PARTIE : LE NUMÉRIQUE, OBJET ET TERRAIN GÉOPOLITIQUE DU XXI ÈME SIÈCLE ................................................................... 13 I. LES GÉANTS AMÉRICAINS DU NUMÉRIQUE, NOUVEAUX CONCURRENTS DES ÉTATS ? ............................................................................... 13 A. LA GENÈSE DES GAFAM : UNE HISTOIRE AMÉRICAINE .......................... 13 B. LES CARACTÉRISTIQUES DES GÉANTS AMÉRICAINS DU NUMÉRIQUE : DES ENTREPRISES HORS NORMES ................................... 17 1. Les cinq « GAFAM » présentent plusieurs caractéristiques communes mais aussi d’importantes spécificités ............................................................................. 17 2. Du numérique aux géants : le développement d’entreprises devenues systémiques, dont les activités se sont largement diversifiées ............................... 18 a. La théorie économique permet d’éclairer -
Technology, Media & Telecom
CLOUD MANAGED SERVICES AND HOSTING SECTOR REVIEW | Q1 2020 Technology, Media & Telecom Cloud Managed Services and Hosting| Q3 2020 TECHNOLOGY, MEDIA & TELECOM PAGE | 0 HW Cloud Managed Services and Hosting Solutions Introduction HARRIS WILLIAMS (“HW”) HW TECHNOLOGY, MEDIA & TELECOM (“TMT”) GROUP • 25+ years and more than 1,000 closed transactions • 35+ dedicated TMT professionals • 350+ professionals across eight office globally • TMT offices include Boston, San Francisco, and London • 170+ closed transactions in the last 24 months • 10 industry groups KEY TMT THEMES ✓SaaS / Cloud ✓Data & Analytics ✓Digital Transformation ✓A.I. / Machine Learning FOCUSED ADVISORY SERVICES HORIZONTAL FOCUS SECTORS VERTICAL FOCUS SECTORS • Mergers and acquisitions (M&A) • Application Software • Architecture, Engineering, and Construction Software • Capital raises • Cloud Managed Services and Hosting Solutions • Education Technology and Services • Corporate divestitures • Compliance Solutions • Energy Technology • CRM and Marketing Automation • Facilities and Real Estate Software • Human Capital Management • Financial Technology and Payments CONSISTENT RECOGNITION FOR QUALITY • Infrastructure and Security Software • Government Technology • IT and Tech-Enabled Services • Healthcare IT • Marketing, Research, and Insights Software • Industrial and Supply Chain Technology • Internet and eCommerce • Retail Technology HW CLOUD MANAGED SERVICES AND HOSTING SOLUTIONS TEAM OTHER TMT GROUP LEADERSHIP Thierry Monjauze Anthony Basmajian Priyanka Naithani Sylvain Noblet -
Experiences of Internet Traffic Monitoring with Tstat
1 Experiences of Internet Traffic Monitoring with Tstat A. Finamore M. Mellia M. Meo M. M. Munaf`o D. Rossi 1Politecnico di Torino 2TELECOM ParisTech email: {[email protected]} email: [email protected] Abstract—Since the early days of the Internet, network traffic Internet monitoring tools are based on active probing, ranging monitoring has always played a strategic role in understanding from simple operation management or network tomography and characterize users’ activities. In this paper, we present our via ping or traceroute, to more complex delay and capac- experience in engineering and deploying Tstat, an open source passive monitoring tool that has been developed in the past ten ity estimation via capprobe or pathchar. Finally, large and years. Started as a scalable tool to continuously monitor packets controlled testbeds can be easily setup using tools like netem that flow on a link, Tstat has evolved into a complex application or dummynet. For the passive approach pure observations are that gives to network researchers and operators the possibility to performed by means of dedicated tools, named sniffers by derive extended and complex measurements thanks to advanced the Internet metrology community, that simply observe and traffic classifiers. After discussing Tstat capabilities and internal design, we analyze the traffic that flows on links. Several passive mea- present some examples of measurements collected deploying surement tools are available. Some tools, such as tcpdump or Tstat at the edge of several ISP networks in the past years. Wireshark, are designed to let researchers interactively analyze While other works report a continuous decline of P2P traffic the captured packets. -
GAIA-X: Technical Architecture Release – June, 2020 Imprint
GAIA-X: Technical Architecture Release – June, 2020 Imprint Publisher Federal Ministry for Economic Affairs and Energy (BMWi) Public Relations Division 11019 Berlin www.bmwi.de Authors DE-CIX Management GmbH Günter Eggers (NTT Global Data Centers EMEA GmbH) Bernd Fondermann (German Edge Cloud GmbH & Co KG) Google Germany GmbH Berthold Maier (T-Systems International GmbH) Klaus Ottradovetz (Atos SE) Dr.-Ing. Julius Pfrommer (Fraunhofer IOSB) Dr. Ronny Reinhardt (Cloud&Heat Technologies GmbH) Hannes Rollin (T-Systems International GmbH) Arne Schmieg (German Edge Cloud GmbH & Co. KG) Sebastian Steinbuß (IDSA e. V.) Dr. Philipp Trinius (T-Systems International GmbH – Telekom Security) Andreas Weiss (EuroCloud Germany) Dr. Christian Weiss (Deutsche Telekom AG) Dr. Sabine Wilfling (Scheer GmbH) Current as at June 2020 Design and production PRpetuum GmbH, 80801 Munich You can obtain this and other brochures from: Federal Ministry for Economic Affairs and Energy, Public Relations Division Email: [email protected] www.bmwi.de Central ordering service: Tel.: +49 30 182 722 72 Fax: +49 30 181 027 227 21 This brochure is published as part of the public relations work of the Federal Ministry for Economic Affairs and Energy. It is distributed free of charge and is not intended for sale. The distribution of this brochure at campaign events or at information stands run by political parties is prohibited, and political party-related information or advertising shall not be inserted in, printed on, or affixed to this publication. Content 1 -
Cookbook-En.Pdf
L'INFRASTRUCTURE # 1 CASE STUDIES BOOK DISCOVER ORIGINAL INFRASTRUCTURES DEPLOYED AT OVH.COM Online media, applications and business software, collaborative tools, smart music playlists at points of sale, total outsourcing of an urban community’s IT… OVH.com CASE STUDIES BOOK - EDITORIAL 3 “Each year, OVH is able to offer several hundred new services. After listening to you, we have come to realize that launching new services is not enough. We should also assist and guide you in the adoption of these innovations. Often you just need to see some practical use cases. That is the goal of the “Case Studies Book”, to provide you with such examples. And of course, if you need advice, our customer advocates and our Professional Services team are always available. Enjoy your reading!” Octave Klaba, Founder OVH CASE STUDIES BOOK CASE STUDIES BOOK This publication has been edited by the OVH Group, 2 rue Kellermann 59100 Roubaix (FRANCE) - RCS Lille Métropole 424 761 419 00045. Written by: Hugo Bonnaffé in collaboration with: Rémy Vandepoel, Vincent Cassé, Jean-Daniel Bonnetot, Félicien Lainé, Jonathan Guinez, Sylvain Wallez et Alexandre Morel. Translation: Michael Kapus Layout: Marie Delattre Graphic Design: Carl Lambert, Lucille Folens and Élodie Lenin Photographers: Élycia Husse, Frédéric Anne, Alban Gernigon, Stéphane Bureau du Colombier, iStockphoto Printer: Nord'imprim Special thanks is given to each customer that made this project possible by revealing the details of their infrastructures and their willingness to share their expertise with the OVH Community. Congratulations to everyone who took to the stage during the OVH World Tour to present their projects and explain their technical choices. -
Achieving Digital Sustainability
ACHIEVING DIGITAL SUSTAINABILITY RapportProgress report, d’étape, summary synthèseof collaboration of platformthe platform work and 11 Arcepde proposalstravail toand combine proposals increasing de use Arcepof digital technologypour andun reducing numerique its environmental soutenable. footprint — 15 December 2020 INTRODUCTION The impact that electronic communi- cations networks, devices, data centres and ICT use have on the environment is a source of growing concern, and one number of devices, etc.) is cause for con- which an increasing number of stake- cern. According to the Senate task force holders are gradually starting to address. on ICT’s environmental footprint6, digi- The Citizens’ Convention on Climate1 also tal technology’s GHG footprint could notes that while digital technology is a increase substantially if nothing is done crucial lever of the green transition, and to curtail it (+60% by 2040 or 6.7% of the battle against climate change, it must the national GHG footprint). If such an not itself be the source of increased emis- increase were to materialise, it would sions. be counter to the commitments made under the Paris Climate Agreement7 of According to various studies conducted 2015 which aims to contain the increase over the past two years2, digital tech- in global temperature to well below 2°C, nology currently represents 3% to 4% and requires swift and massive efforts from of global greenhouse gas3 4 (GHG) emis- every sector of the economy to reduce sions, and 2% of the carbon footprint in their own carbon footprint8. France5 (including the hardware pro- On top of which, there are other contrib- duction and usage stages). -
Seadrive Peter Haro1,2 and Otto Anshus2 1SINTEF ICT, Trondheim, Norway 2Department of Computer Science, University of Tromsø, Norway
Seadrive Peter Haro1,2 and Otto Anshus2 1SINTEF ICT, Trondheim, Norway 2Department of Computer Science, University of Tromsø, Norway Abstract Seadrive is a novel file synchronizations framework and file hosting service for offshore naval fleets. Offshore vessels outside the range of cellular networks employ volatile satellite-based networks unsuited for file synchronization. Seadrive aspires to provide naval fleets with usable file hosting services over low bandwidth, high latency network links with high loss rate and large variability in the overall network stability. We provide the rationale for Seadrive; present the architecture, and design of the framework. We present an initial evaluation of the correctness and performance, preliminary results shows that Seadrive outperforms existing system in the test environment. Introduction Modern naval- and fishing fleets utilize a multitude of information systems from different sources when planning and executing offshore operations. These vessels are equipped with several sensors and instruments, which provide a constant stream of information regarding various on-board systems, of which some are readily available to the crew and actively employed during an operation. The governing bodies of large naval-, fishing-, and oil- fleets requires information to flow from their management system(s) to their fleet in a robust manner, likewise the fleets have information required by the governing entity. The information flow in today’s systems is primarily based on using e-mail. However, end-users report these systems as unsatisfactory for the following reasons. • Important information is lost in the copious amount of other e-mails • Documents arriving during shift A are often not read by shift B • The systems are slow • The files sent through these systems are constrained not only by file-type, but also their size When important information is lost, the results can vary from small trifles to disasters, such as overfishing, not following updated safety regulations or monetary losses. -
Joint Report on Publicly Available Hacking Tools (NCSC)
Page 2 Joint report on publicly available hacking tools Joint report on publicly available hacking tools Page 3 Contents Introduction .............................................................................................................................................. 4 Nature of the tools ............................................................................................................................................. 4 Report structure.................................................................................................................................................. 4 Remote access trojans: JBiFrost ........................................................................................................... 5 In use .................................................................................................................................................................... 5 Capabilities .......................................................................................................................................................... 5 Examples ............................................................................................................................................................. 5 Detection and protection .................................................................................................................................. 6 Web shells: China Chopper ................................................................................................................... -
Online File-Hosting Service
ISSN XXXX XXXX © 2017 IJESC Research Article Volume 7 Issue No.3 Online File-Hosting Service Khaja Viqar Uddin1, MD Daniyal Raza2, Faheem Uddin3, Abdul Rais4 B.Tech Students 1,2,3, Assistant Professor4 Department of Computer Science Engineering Lords Institute of Engineering and Technology,Hyderabad, India Abstract: It is a type of file hosting application. Which is used for storing multimedia files in a Database or a server which can be a ccessed from any remote location by the user if he or she has the hardware and software requirements. In this we are trying to improve or counter the drawbacks of the existing system and possibly add few new features.It creates a special folder on user’s device. The content of which are then synchronized to the application server and to other devices that has installed the application. This application uses a freemium business model, users are offered a free account with a set storage size. Keywords:Multimedia, Synchronized, Remote Location.Freemium Business Model. I.INTRODUCTION: II.EXPLANATION A file hosting service, cloud storage service, online file Personal file storage storage provider, or cyberlocker is an Internet hosting Personal file storage services are aimed at private individuals, service specifically designed to host user files. It allows users offering a sort of "network storage" for personal backup, file to upload files that could then be accessed over the internet access, or file distribution. Users can upload their files and from a different computer, tablet, s mart phone or other share them publicly or keep them password-protected. networked device, by the same user or possibly by other users, Document-sharing services allow users to share and after a password or other authentication is provided.