City Research Online

Total Page:16

File Type:pdf, Size:1020Kb

City Research Online City Research Online City, University of London Institutional Repository Citation: Al-Malki, Dana Mohammed (2006). Development of virtual network computing (VNC) environment for networking and enhancing user experience. (Unpublished Doctoral thesis, City University London) This is the draft version of the paper. This version of the publication may differ from the final published version. Permanent repository link: http://openaccess.city.ac.uk/18319/ Link to published version: Copyright and reuse: City Research Online aims to make research outputs of City, University of London available to a wider audience. Copyright and Moral Rights remain with the author(s) and/or copyright holders. URLs from City Research Online may be freely distributed and linked to. City Research Online: http://openaccess.city.ac.uk/ [email protected] School of Engineering and Mathematical Sciences Development of Virtual Network Computing (VNC) Environment for Networking and Enhancing User Experience Dana Mohammed Al‐Malki Supervisor: Dr S.H.Khan A thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Information Engineering August 2006 i Abstract Abstract Virtual Network Computing (VNC) is a thin client developed by Real VNC Ltd, Formerly of Olivetti Research Ltd/AT&T labs Cambridge and can be used as a collaborative environment, therefore it has been chosen as the basis of this research study. The purpose of this thesis is to investigate and develop a VNC based environment over the network and to improve the users’ Quality of Experience (QoE) of using VNC between networked groups by the incorporation of videoconferencing with VNC and enhancing QoE in Mobile environments where the network status is far from ideal and is prone to disconnection. This thesis investigates the operation of VNC in different environments and scenarios such as wireless environments by investigating user and device mobility and ways to sustain their seamless connection when in motion. As part of the study I also researched all groups that implement VNC like universities, research groups and laboratories and virtual laboratories. In addition to that I identified the successful features and security measures in VNC in order to create a secure environment. This was achieved by pinpointing the points of strength and weakness in VNC as opposed to popular thin clients and remote control applications and analysing VNC according to conforming to several security measures. Furthermore, it is reasonable to say that the success of any scheme that attempts to deliver desirable levels of Quality of Service (QoS) of an effective application for the future Internet must be based, not only on the progress of technology, but on usersʹ requirements. For instance, a collaborative environment has not yet reached the desired expectation of its users since it is not capable of handling any unexpected events which can result from a sudden disconnection of a nomadic user engaged in an ongoing collaborative session; this is consequently associated with breaking the social dynamics of the group collaborating in the session. Therefore, I have concluded that knowing the social dynamics of application’s users as a group and their requirements and expectations of a successful experience can lead an application designer to exploit technology to autonomously support the initiating and maintaining of social interaction. Moreover, I was able to successfully develop a VNC based environment for networked groups that facilitates the administration of different remote VNC sessions. In addition to a prototype that uses videoconferencing in parallel to VNC to provide a better user’s QoE of VNC. The last part of the thesis was concerned with designing a framework to improve and assess QoE of all users in a collaborative environment where it can be especially applied in the presence of nomadic clients with their much frequent disconnections. I have designed a conceptual algorithm called Improved Collaborative Quality of Experience (IC‐QoE), an algorithm that aims to eliminate frustration and improve QoE of users in a collaborative session in the case of disconnections and examined its use and benefits in real world scenarios such as research teams and implemented a prototype to present the concepts of this algorithm. Finally, I have designed a framework to suggest ways to evaluate this algorithm. ii Acknowledgment Acknowledgement To begin with, I would like to offer my thanks and gratitude to Dr S H Khan, who has supervised, guided, advised and had faith in me and who has been a good mentor, counsellor and friend throughout the past years. I would also like to thank my parents and siblings who encouraged, motivated and had faith in me, my mother for offering me encouragement and not giving up on me, my father for tolerating, with all the support he has, my long absence to pursuit my studies, my brother and sisters who were my solid rock. I would like to add special thanks to my sister Amal for always being there and for her continued patience and understanding through the years where with her support things got easier to handle. I also would like to mention Dr Veselin Rakocevic for his valuable guidance in the last year of the thesis and his helpful comments and suggestions. I would like to thank the cultural attaché of Qatar, and especially His highness Mr Nasser Al‐Khalifa, who was Qatar’s ambassador in London through most of the period of my studies and is currently Qatar’s ambassador in Washington, for believing in my capabilities and giving me the chance to prove them. Finally, I would like to thank the RealVNC mailing list for their help. iii Declaration Declaration I grant powers of discretion to the University Librarian to allow this thesis to be copied in whole or in part without further reference to the author. This permission covers only single copies made for study purposes, subject to normal conditions of acknowledgements iv Abbreviations Abbreviations 2G: Second Generation Wireless 3G: Third Generation Wireless AMPS: Advanced Mobile Phone System ASP: Application Service Provision ATM: Asynchronous Transfer Mode AWT: Java Abstract Windowing Toolkit BER: Bit Error Rate BS: Base Station CAD: Computer Aided Design CC: Cellular Communication CDMA: Code division multiple access CDPD: Cellular Digital Packet Data CE: Collaborative environment CN: Correspondent Node CoA: Care‐of‐Address CSCW: Computer Supported Cooperative Work DTP: Digital Publishing DUPACK: Duplicate Acknowledgments FA: Foreign Agent FEC: Forward Error Correction GNOME: GNU Object Model Environment GUI: Graphical User Interface GSM: Global System for Mobile Communications GPRS: General Packet Radio Service HA: Home Agent HCI: Human‐Computer Interaction v Abbreviations HTML: Hypertext Mark‐up Language HTTP: Hypertext Transfer Protocol IC‐QoE: Improved Collaborative Environment IP: Internet Protocol ISDN: Integrated Services Digital Network IWF: Interworking Function KDE: K Desktop Environment LCD: liquid crystal display LDAP: Lightweight Directory Access Protocol LLC: Logical Link Control MAC: Media Access Control MAHO: Mobile‐assisted Handover MDAC: Microsoft Data Access Components MN: Mobile Node MSC: Mobile Switching centre MTSO: Mobile Telephone Switching Office NACK: Negative Acknowledgment NCHO: Network‐controlled Handover NDS: Novell Directory Services PCS: Personal Communication Services PDA: Personal Digital Assistant PPP: Point‐to‐Point Protocol QoS: Quality of Service QoE: Quality of Experience QoT: Quality of Transmission RDP: Remote Desktop Protocol RFB: Remote Frame Buffer RLP: Radio Link Protocol RSSHT: Relative Signal Strength Hysteresis and Threshold vi Abbreviations RTO: Retransmission Timeout RTT: Round trip time SACK: Selective Acknowledgment SLIP: Serial Line Internet Protocol SNR: Signal‐to‐Noise Ratio TCO: Total Cost of Ownership TDMA: Time division multiple access TCP/IP: Transmission Control Protocol/Internet Protocol UMTS: Universal Mobile Telecommunications System VNC: Virtual Network Computing W‐LAN: Wireless Local Area Network W‐WAN: Wireless Wide Area Network WYSIWIS: What You See Is What I See ZWA: Zero Window Advertisement ZWP: Zero Window Probe vii List of Figures List of Figures Figure 2.1 TCP/IP Protocol Suite........................................................................................... 12 Figure 2.2 TCP Packet Header................................................................................................ 16 Figure 2.3 Client/server application process actions and TCP [3]..................................... 19 Figure 2.4 Client/server application, using connection‐oriented transport services [7] 20 Figure 2.5 Routing for mobile hosts ...................................................................................... 27 Figure 2.6 Decision points during layer 2 handoff process................................................ 32 Figure 2.7 Connectivity between CC systems and the Internet [30]................................. 39 Figure 2.8 TCP solutions for wireless networks [37]........................................................... 43 Figure 3.1 X window system block diagram [50] ............................................................... 52 Figure 3.2 The Teleporting system structure [9]................................................................. 55 Figure 3.3 The RFB protocol [54]............................................................................................ 58 Figure 3.4 Structure of VNC system [55] ............................................................................
Recommended publications
  • VNC Connect Security Whitepaper
    VNC Connect security whitepaper VNC Connect security whitepaper Version 1.3 Contents Contents .................................................................................................................................................................... 2 Introduction ............................................................................................................................................................... 3 Security architecture ................................................................................................................................................. 4 Cloud infrastructure ................................................................................................................................................... 7 Client security ........................................................................................................................................................... 9 Development procedures ........................................................................................................................................ 12 Summary ................................................................................................................................................................. 13 VNC Connect security whitepaper Introduction Customer security is of paramount importance to RealVNC. As such, our security strategy is ingrained in all aspects of our VNC Connect software. We have invested extensively in our security, and take great pride in our successful
    [Show full text]
  • Institutionen För Datavetenskap Department of Computer and Information Science
    Institutionen för datavetenskap Department of Computer and Information Science Final thesis Implementing extended functionality for an HTML5 client for remote desktops by Samuel Mannehed LIU-IDA/LITH-EX-A—14/015--SE 6/28/14 Linköpings universitet Linköpings universitet SE-581 83 Linköping, Sweden 581 83 Linköping Final thesis Implementing extended functionality for an HTML5 client for remote desktops by Samuel Mannehed LIU-IDA/LITH-EX-A--14/015--SE June 28, 2014 Supervisors: Peter Åstrand (Cendio AB), Maria Vasilevskaya (IDA) Examiner: Prof. Simin Nadjm-Tehrani På svenska Detta dokument hålls tillgängligt på Internet – eller dess framtida ersättare – under en längre tid från publiceringsdatum under förutsättning att inga extra-ordinära omständigheter uppstår. Tillgång till dokumentet innebär tillstånd för var och en att läsa, ladda ner, skriva ut enstaka kopior för enskilt bruk och att använda det oförändrat för ickekommersiell forskning och för undervisning. Överföring av upphovsrätten vid en senare tidpunkt kan inte upphäva detta tillstånd. All annan användning av dokumentet kräver upphovsmannens medgivande. För att garantera äktheten, säkerheten och tillgängligheten finns det lösningar av teknisk och administrativ art. Upphovsmannens ideella rätt innefattar rätt att bli nämnd som upphovsman i den omfattning som god sed kräver vid användning av dokumentet på ovan beskrivna sätt samt skydd mot att dokumentet ändras eller presenteras i sådan form eller i sådant sammanhang som är kränkande för upphovsmannens litterära eller konstnärliga anseende eller egenart. För ytterligare information om Linköping University Electronic Press se förlagets hemsida http://www.ep.liu.se/ In English The publishers will keep this document online on the Internet - or its possible replacement - for a considerable time from the date of publication barring exceptional circumstances.
    [Show full text]
  • Superhero League of Hoboken
    Special "Orbs ft Stuff" lssuc Not sold in Hoboken Superhero League of Hoboken rom the incorrigibly twisted he plants to make the Jersey City what Meretzky will do with the idea. mind of madcap Steve Meretzky; Marketplace uninhabitable. A com­ Instead of facing Dragons and Super Hero League of Hoboken puter named Matilda lisFs several Wizards in combat, you'll fight F missions Albino marks his first foray into the realm of role-playing. This hybrid combines thatimust Winos, elements of the animated adventure be fulfilled Lawyers system used in such games as in various and Tricky Meretzky's Sorcerer's University with parts of Dick RPG-style combat sequences, which America's mutants. In also makes it a first for Legend north east­ one battle, Entertainment. ern sector. a lawyer Taking place 200 years in the After you issued an future, Hoboken is set in a world finish all injunction populated by mutants. Radiation, the level against toxic waste and a plethora of 0.]. one mis­ Tropical Simpson jokes have plunged the s10ns, a Oil Man­ world in a new Dark Age, and it's up new set of who retali­ to you to save America. As the harder ones miiiiliiltiil~;;;: ated by Crimson Tape, you lead the Hoboken are posted. 1ssumg a chapter of the Super Hero League - The slick "point and quest" inter­ stream of saliva at the lawyer. The and appropriately so, for your prima­ face of previous Legend games is even lawyer's dying words were: "I think ry superpower is the ability to Create slicker in this incarnation.
    [Show full text]
  • Working from Home Efficiently, Ethically and Securely by Sharon D
    Working From Home Efficiently, Ethically and Securely by Sharon D. Nelson, Esq., John W. Simek and Michael C. Maschke © 2020 Sensei Enterprises, Inc. The world is trying to deal with the COVID-19 in a variety of ways. Controlling the spread of the deadly virus is at the top of the list. Travel is being restricted, and some countries have even closed their borders. The United States was slow to react, but eventually states imposed restrictions for business operations to reduce the coronavirus spread and then began re-opening in phases. Social distancing and maintaining clean hygiene practices are the normal mode of operation now. More and more businesses are allowing their employees to stay at home where possible. What does that mean for the practice of law? How will you meet with clients? Most firms have adopted a telework environment and allow their employees to work from home, even while some firms have begun re-opening. Working from home has different consequences depending on your current capabilities and whether a plan is already in place. While we can’t cover all the possibilities and capabilities of every law firm, we’ll attempt to attack some of the common considerations. Equipment Let’s start with a very basic item…the computer. Hopefully, everyone is already using a laptop as their main office machine. As expected, some popular models of laptops are still in short supply. Worst case, you may have to find a Best Buy, Target, Walmart, etc. and see if you can purchase a consumer-grade machine. If you planned properly, laptop users are already configured for remote access.
    [Show full text]
  • List of NMAP Scripts Use with the Nmap –Script Option
    List of NMAP Scripts Use with the nmap –script option Retrieves information from a listening acarsd daemon. Acarsd decodes ACARS (Aircraft Communication Addressing and Reporting System) data in real time. The information retrieved acarsd-info by this script includes the daemon version, API version, administrator e-mail address and listening frequency. Shows extra information about IPv6 addresses, such as address-info embedded MAC or IPv4 addresses when available. Performs password guessing against Apple Filing Protocol afp-brute (AFP). Attempts to get useful information about files from AFP afp-ls volumes. The output is intended to resemble the output of ls. Detects the Mac OS X AFP directory traversal vulnerability, afp-path-vuln CVE-2010-0533. Shows AFP server information. This information includes the server's hostname, IPv4 and IPv6 addresses, and hardware type afp-serverinfo (for example Macmini or MacBookPro). Shows AFP shares and ACLs. afp-showmount Retrieves the authentication scheme and realm of an AJP service ajp-auth (Apache JServ Protocol) that requires authentication. Performs brute force passwords auditing against the Apache JServ protocol. The Apache JServ Protocol is commonly used by ajp-brute web servers to communicate with back-end Java application server containers. Performs a HEAD or GET request against either the root directory or any optional directory of an Apache JServ Protocol ajp-headers server and returns the server response headers. Discovers which options are supported by the AJP (Apache JServ Protocol) server by sending an OPTIONS request and lists ajp-methods potentially risky methods. ajp-request Requests a URI over the Apache JServ Protocol and displays the result (or stores it in a file).
    [Show full text]
  • Distance Learningʼs Impact on Education IT
    Key Insights Distance Learningʼs Impact on Education IT The changes taking place in the education COVID-19 caused an acceleration of K-12 education’s technology landscape as a result of the digital roadmap in three key areas: coronavirus school closures are extensive — and many will be permanent or evolving. Closing the “homework gap” to enable digital However, the rapid speed of change is creating learning. Mobile hotspots are increasingly going home, with students, new challenges for IT teams. creating an "always-connected" online learning dynamic1 New research by Absolute examines the Enabling remote and hybrid learning models. effects of distance learning on endpoint 75% of schools intend to operate remote or hybrid models2 health, device usage, safety, and security as schools adapt to remote and hybrid learning Protecting students, staff, and schools from cyberattacks. 60% of all malware attacks (particularly ransomware) occur in models in the 2020/21 school year. education3 To better understand what is happening on the ground, Millions of Absolute- 10,000 Schools and 12 analyst reports and Absolute studied: enabled devices districts peer research This is what we discovered… Reliance on devices to drive IT teams are doing School devices are mainly learning outcomes has more with less. being used for learning. While federal stimulus packages may help increased. 40% in the short term, long-term budgets are 16% YouTube, Edgenuity®, uncertain: Google Docs™, and 5% Google Classrooms 61% 28% are where most 11% students are increase in
    [Show full text]
  • Copyrighted Material
    Index Numerics Address Resolution Protocol (ARP), 1052–1053 admin password, SOHO network, 16-bit Windows applications, 771–776, 985, 1011–1012 900, 902 Administrative Tools window, 1081–1083, 32-bit (x86) architecture, 124, 562, 769 1175–1176 64-bit (x64) architecture, 124, 562, 770–771 administrative tools, Windows, 610 administrator account, 1169–1170 A Administrators group, 1171 ADSL (Asynchronous Digital Subscriber Absolute Software LoJack feature, 206 Line), 1120 AC (alternating current), 40 Advanced Attributes window, NTFS AC adapters, 311–312, 461, 468–469 partitions, 692 Accelerated Graphics Port (AGP), 58 Advanced Computing Environment (ACE) accelerated video cards (graphics initiative, 724 accelerator cards), 388 Advanced Confi guration and Power access points, wireless, 996, 1121 Interface (ACPI) standard, 465 access time, hard drive, 226 Advanced Graphics Port (AGP) card, access tokens, 1146–1147 391–392 Account Operators group, 1172 Advanced Graphics Port (AGP) port, 105 ACE (Advanced Computing Environment) Advanced Host Controller Interface (AHCI), initiative, 724 212–213 ACPI (Advanced Confi guration and Power Advanced Micro Devices (AMD), 141–144 Interface) standard, 465 Advanced Packaging Tool (APT), 572 Action Center, 1191–1192 Advanced Power Management (APM) Active Directory Database, 1145–1146, 1183 standard, 465 active heat sink, 150 Advanced Programmable Interrupt active matrix display, LCD (thin-fi lm Controller (APIC), 374 transistor (TFT) display), 470 Advanced RISC Computing Specifi cation active partition, 267,
    [Show full text]
  • Chapter 3 Composite Default Screen Blind Folio 3:61
    Color profile: GenericORACLE CMYK printerTips & Techniques profile 8 / Oracle9i for Windows 2000 Tips & Techniques / Jesse, Sale, Hart / 9462-6 / Chapter 3 Composite Default screen Blind Folio 3:61 CHAPTER 3 Configuring Windows 2000 P:\010Comp\OracTip8\462-6\ch03.vp Wednesday, November 14, 2001 3:20:31 PM Color profile: GenericORACLE CMYK printerTips & Techniques profile 8 / Oracle9i for Windows 2000 Tips & Techniques / Jesse, Sale, Hart / 9462-6 / Chapter 3 Composite Default screen Blind Folio 3:62 62 Oracle9i for Windows 2000 Tips & Techniques here are three basic configurations of Oracle on Windows 2000: as T a management platform, as an Oracle client, and as a database server. The first configuration is the platform from which you will manage Oracle installations across various machines on various operating systems. Most system and database administrators are given a desktop PC to perform day-to-day tasks that are not DBA specific (such as reading e-mail). From this desktop, you can also manage Oracle components installed on other operating systems (for example, Solaris, Linux, and HP-UX). Even so, you will want to configure Windows 2000 to make your system and database administrative tasks quick and easy. The Oracle client software configuration is used in more configurations than you might first suspect: ■ Web applications that connect to an Oracle database: ■ IIS 5 ASPs that use ADO to connect to an Oracle database ■ Perl DBI application running on Apache that connects to an Oracle database ■ Any J2EE application server that uses the thick JDBC driver ■ Client/server applications: ■ Desktop Visual Basic application that uses OLEDB or ODBC to connect to an Oracle Database ■ Desktop Java application that uses the thick JDBC to connect to Oracle In any of these configurations, at least an Oracle client installation is required.
    [Show full text]
  • Use of Remote Desktop Protocol in Ddos Attacks
    Security Advisory 2021-005 Use of Remote Desktop Protocol in DDoS Attacks January 26, 2021 — v1.0 TLP:WHITE History: • 26/01/2021 — v1.0 – Initial publication Summary DDoS attacks were observed recently, where Microsoft Remote Desktop Protocol (RDP) was abused in order to reflect and amplify the amount of bandwidth involved. This is not a vulner- ability by itself, but an abuse of the RDP protocol design [1]. Attacks using this technique were observed with sizes range from 20-750 Gbps [2]. Technical Details The Remote Desktop Protocol (RDP) service is included in Microsoft Windows operating sys- tems. It provides authenticated remote access to Windows-based workstations and servers. RDP can be configured to run on TCP and/or UDP. By default both use port 3389. When enabled on UDP, the Microsoft Windows RDP service may be abused to launch UDP re- flection/amplification attacks with an amplification ratio of 85.9:1. The amplified attack traffic consists of non-fragmented UDP packets sourced from UDP/3389 and directed towards the destination IP address(es) and UDP port(s) of the attacker’s choice. The collateral impact of RDP reflection/amplification attacks affects also the organizations whose Windows RDP servers are abused as reflectors/amplifiers. This may include partial or full interruption of mission-critical remote-access services, as well as additional service disruption due to transit capacity consumption, state-table exhaustion of stateful firewalls, load balancers, etc. Filtering of all UDP/3389-sourced traffic by network operators may potentially block also legitimate traffic, including legitimate RDP remote session replies [2].
    [Show full text]
  • HTTP: IIS "Propfind" Rem HTTP:IIS:PROPFIND Minor Medium
    HTTP: IIS "propfind"HTTP:IIS:PROPFIND RemoteMinor DoS medium CVE-2003-0226 7735 HTTP: IkonboardHTTP:CGI:IKONBOARD-BADCOOKIE IllegalMinor Cookie Languagemedium 7361 HTTP: WindowsHTTP:IIS:NSIISLOG-OF Media CriticalServices NSIISlog.DLLcritical BufferCVE-2003-0349 Overflow 8035 MS-RPC: DCOMMS-RPC:DCOM:EXPLOIT ExploitCritical critical CVE-2003-0352 8205 HTTP: WinHelp32.exeHTTP:STC:WINHELP32-OF2 RemoteMinor Buffermedium Overrun CVE-2002-0823(2) 4857 TROJAN: BackTROJAN:BACKORIFICE:BO2K-CONNECT Orifice 2000Major Client Connectionhigh CVE-1999-0660 1648 HTTP: FrontpageHTTP:FRONTPAGE:FP30REG.DLL-OF fp30reg.dllCritical Overflowcritical CVE-2003-0822 9007 SCAN: IIS EnumerationSCAN:II:IIS-ISAPI-ENUMInfo info P2P: DC: DirectP2P:DC:HUB-LOGIN ConnectInfo Plus Plus Clientinfo Hub Login TROJAN: AOLTROJAN:MISC:AOLADMIN-SRV-RESP Admin ServerMajor Responsehigh CVE-1999-0660 TROJAN: DigitalTROJAN:MISC:ROOTBEER-CLIENT RootbeerMinor Client Connectmedium CVE-1999-0660 HTTP: OfficeHTTP:STC:DL:OFFICEART-PROP Art PropertyMajor Table Bufferhigh OverflowCVE-2009-2528 36650 HTTP: AXIS CommunicationsHTTP:STC:ACTIVEX:AXIS-CAMERAMajor Camerahigh Control (AxisCamControl.ocx)CVE-2008-5260 33408 Unsafe ActiveX Control LDAP: IpswitchLDAP:OVERFLOW:IMAIL-ASN1 IMail LDAPMajor Daemonhigh Remote BufferCVE-2004-0297 Overflow 9682 HTTP: AnyformHTTP:CGI:ANYFORM-SEMICOLON SemicolonMajor high CVE-1999-0066 719 HTTP: Mini HTTP:CGI:W3-MSQL-FILE-DISCLSRSQL w3-msqlMinor File View mediumDisclosure CVE-2000-0012 898 HTTP: IIS MFCHTTP:IIS:MFC-EXT-OF ISAPI FrameworkMajor Overflowhigh (via
    [Show full text]
  • Growth and Commoditization of Remote Access Trojans
    30 September - 2 October, 2020 / vblocalhost.com GROWTH AND COMMODITIZATION OF REMOTE ACCESS TROJANS Veronica Valeros & Sebastian García Czech Technical University in Prague, Czech Republic [email protected] [email protected] www.virusbulletin.com GROWTH AND COMMODITIZATION OF REMOTE ACCESS TROJANS VALEROS & GARCÍA ABSTRACT Remote access trojans (RATs) are an intrinsic part of traditional cybercriminal activities, and they have also become a standard tool in advanced espionage attacks and scams. There have been significant changes in the cybercrime world in terms of organization, attacks and tools in the last three decades, however, the overly specialized research on RATs has led to a seeming lack of understanding of how RATs in particular have evolved as a phenomenon. The lack of generalist research hinders the understanding and development of new techniques and methods to better detect them. This work presents the first results of a long-term research project looking at remote access trojans. Through an extensive methodological process of collection of families of RATs, we are able to present an analysis of the growth of RATs in the last 30 years. Through a closer analysis of 11 selected RATs, we discuss how they have become a commodity in the last decade. Finally, through the collected information we attempt to characterize RATs, their victims, attacks and operators. Preliminary results of our ongoing research have shown that the number of RATs has increased drastically in the past ten years and that nowadays RATs have become standardized commodity products that are not very different from each other. INTRODUCTION Remote access software is a type of computer program that allows an individual to have full remote control of the device on which the software is installed.
    [Show full text]
  • Realfilmaufnahmen in Computerspielen
    Realfilmaufnahmen in Computerspielen. Analyse von Live-Action Full Motion Video Spielen. Autor: Steffen Boos - im März 2012 eingereicht als Masterarbeit - HOCHSCHULE MITTWEIDA UNIVERSITY OF APPLIED SCIENCES (FH) Fachbereich Medien Studiengang Information and Communication Science Erstprüfer: Prof. Dr. Ludwig Hilmer Zweitprüfer: Prof. Dr.-Ing. Robert J. Wierzbicki Datum 11.08.2013 Ort: Hamburg Inhaltsverzeichnis iii Inhaltsverzeichnis Vorwort 5 Referat 6 1 Einleitung 7 1.1 Zielsetzung . 9 1.2 Vorgehensweise . 11 2 Wissenschaftliche Einordnung und Historie von Live-Action Full Motion Video Spielen 12 2.1 Definition des Begriffs Spiel ........................... 12 2.1.1 Definition nach SALEN/ZIMMERMAN . 13 2.1.2 Definition nach JUUL ........................... 14 2.1.3 Definition nach ADAMS/ROLLINGS ................... 17 2.1.4 Fazit Definition des Begriffs Spiel .................... 17 2.2 Definition des Begriffs Computerspiel ...................... 18 2.2.1 Fazit Definition des Begriffs Computerspiel . 19 2.3 Definition des Begriffs Live-Action Full Motion Video Spiel . 20 2.3.1 Produktionsarten von Full Motion Video Spielen . 20 2.4 Historische Entwicklung von Full Motion Video Spielen . 23 3 Analyse von Live-Action Full Motion Video Spielen 36 3.1 Narration in Live-Action Full Motion Video Spielen . 36 3.1.1 Linearität vs. Nichtlinearität . 38 3.1.2 Interactive Storytelling . 39 3.1.2.1 Verzweigte Narration . 40 3.1.2.2 String of Pearls (Perlenkettenmodell) . 43 3.1.2.3 Foldback Stories (zurückgefaltete Geschichten) . 45 3.1.2.4 Amusement Park Model (Vergnügungsparkmodell) . 45 3.1.2.5 Building Blocks Model (Baukastenmodell) . 46 3.1.2.6 Fazit Interactive Storytelling . 46 3.2 Interaktivität in Live-Action Full Motion Video Spielen .
    [Show full text]