Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Dirty Copy on Write also known as Dirty COW is a Linux based server vulnerability. This vulnerability allows attackers to escalate the file system protection of Linux Kernel, get root privilege and thus compromise the whole system. Linux kernel version 2.6.22 and above are affected by this vulnerability. The patch for this vulnerability has been released very recently. Thus most of the Linux servers...
In a sophisticated and coordinated cyber-attack $100 million has been stolen from Bangladesh's account. Attackers introduced malicious code remotely into the Bangladesh Bank's server, which allowed them to process and authorize the transactions. Advanced attack techniques poses threats to all web application systems. Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF) are two vulnerabilities...
Background In this article, a hybrid photonic crystal fiber has been proposed for chemical sensing. A FEM has been applied for numerical investigation of some propagation characteristics of the PCF at a wider wavelength from 0.7 to 1.7 µm. The geometrical parameters altered to determine the optimized values. The proposed PCF contains three rings of circular holes in the cladding where the core is...
Government and private organizations of Bangladesh have started getting adopted to various web applications due to the easy accessibility. Services provided by web applications include online education, banking, reservation, shopping, resources, and information sharing. However the awareness of web application security has not been developed yet. No through study has been done on the existing vulnerabilities...
Bangladesh has announced every Government & Non -Government school and colleges must website. The websites have to include all data and information every school and colleges. The goal of this initiative is to ensure equal quality of education and to provide education to the remote areas of the country. Though is a very new concept yet an appreciable number of institutes have already started shifting...
Business critical web applications are the most popular services provided to the client by the financial sector. These applications are bringing handsome revenue for the financial industry every year. These services are also a frequent target of attackers. Poor coding practice leads applications to vulnerability that are exploited by attackers. Information and privileges such as access to databases,...
Web applications or services play an important rolein present day to day life. They have impact on the developmentof both individual and a country. Easy access to services suchas online education, banking, reservation, shopping, resources, and information sharing have been proven most efficient forevery day life. Various government and private organizations ofBangladesh have started to use web services...
Collecting network traffic traces from deployed networks is one of the basic steps in understanding communication networks. Traffic traces are used for network management, traffic engineering, packet classification, and analyzing user behavior to ensure adequate quality of service. Monitored traffic traces should be anonymized for privacy and security reasons. The goal of anonymization is to preserve...
Border Gateway Protocol (BGP) is an Inter-Autonomous System routing protocol that operates over the reliable Transmission Control Protocol (TCP). The most important function of a BGP speaker is to exchange network reachability information with other speakers. In this paper, we describe collection and preliminary analysis of BCNET traffic. The traffic was collected using special purpose hardware: the...
This poster paper describes testbed for collection of BCNET Border Gateway Protocol (BGP) traffic. The BGP traffic was collected using special purpose hardware and software. Preliminary data collection was illustrated using the Wireshark and Walrus graph visualization tools.
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.