• Title/Summary/Keyword: Ubuntu

Search Result 42, Processing Time 0.027 seconds

The Comparative Study on Performance Analysis of Windows 7 and Ubuntu Applying Open Source IDS/IPS Suricata (오픈소스 IDS/IPS Suricata를 적용한 Windows7과 Ubuntu 성능 비교 분석)

  • Seok, Jinug;Kim, Jimyung;Choi, Moonseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.141-151
    • /
    • 2017
  • Nowadays, It is undeniable that the threat of network security is growing as time flows due to worldwide development of wire/wireless, various Internet platform and sophisticated hacking techniques. The amount of traffics that Network security solution has to handle is increasing and recently many occurrence of explosive traffic attacks from PulseWave are being observed which has many similar characteristics to New DDos. Medium and small sized firms abroad have developed and distributed Snort and Suricata that are based on open-source Intrusion Detection System(IDS) / Intrusion Prevention System (IPS). The goal of this study is to compare between Windows7 by applying suicata 4.0.0 32bit version and Ubuntu 16.04.3 LTS by applying suicata 4.0.0 version which is an open source Intrusion Detection System / Intrusion Protection System that uses multi threads method. This experiment's environment was set as followed C1100 server model of Dell, Intel Xeon CPU L5520 2.27GHz*2 with 8 cores and 16 threads, 72GB of RAM, Samsung SSD 250GB*4 of HDD which was set on RAID0. According to the result, Suricata in Ubuntu is superior to Suricata in Windows7 in performance and this result indicates that Ubuntu's performance is far advanced than Windows7. This meaningful result is derived because Ubuntu that applied Suricata used multi core CPU and RAM more effectively.

Android mobile server using a file-sharing system between other models (안드로이드 모바일서버를 이용한 이 기종간 파일 공유시스템)

  • Huh, Tae-Sang;Park, Sung-Hyun;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1231-1236
    • /
    • 2014
  • Recently, diffusion and proliferation of mobile devices increases, per person n opens for the mobile device era. Mobile devices and OS types of continuously growing trend. More than 80% of market share with Google's Android and Apple's iOS as well as Samsung and Intel is developing TIZEN, Linux and Mobile was the UBUNTU which UBUNTU for Phone, UBUNTU touch, Mozilla 's Firefox OS, Microsoft 's windows mobile and many more OS are ahead of the launch. But different OS can share files between systems or technology is not. Bluetooth or WIFI Direct such technologies are present but can be transferred between compatible devices low, resulting in constraints file types also exist. In this paper, is equipped with a WiFi card in an environment where the Android mobile OS party this model and method for sharing files between different research and can share the file system based on research on.

Culture in language: comparing cultures through words in South Africa

  • Montevecchi, Michela
    • Cross-Cultural Studies
    • /
    • v.24
    • /
    • pp.120-131
    • /
    • 2011
  • South Africa is a multiracial country where different cultures and languages coexist. Culture can be conveyed through language. Language conditioning is also social conditioning, and through words we make sense of our own and others' experience. In this paper I investigate the meaning of two culturally significant words: (English) peace and (African) ubuntu. Data findings will show how L2 speakers of English, when asked to define peace, promptly operate a process of transfer of the meaning from their mother-tongue Xhosa equivalent - uxolo - to its English equivalent. Ubuntu, an African word which encompasses traditional African values, has no counterpart in English. I will also argue how, in the ongoing process of globalisation, English is playing a predominant role in promoting cultural homogenization.

Parallel Processing of k-Means Clustering Algorithm for Unsupervised Classification of Large Satellite Images: A Hybrid Method Using Multicores and a PC-Cluster (대용량 위성영상의 무감독 분류를 위한 k-Means Clustering 알고리즘의 병렬처리: 다중코어와 PC-Cluster를 이용한 Hybrid 방식)

  • Han, Soohee;Song, Jeong Heon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.37 no.6
    • /
    • pp.445-452
    • /
    • 2019
  • In this study, parallel processing codes of k-means clustering algorithm were developed and implemented in a PC-cluster for unsupervised classification of large satellite images. We implemented intra-node code using multicores of CPU (Central Processing Unit) based on OpenMP (Open Multi-Processing), inter-nodes code using a PC-cluster based on message passing interface, and hybrid code using both. The PC-cluster consists of one master node and eight slave nodes, and each node is equipped with eight multicores. Two operating systems, Microsoft Windows and Canonical Ubuntu, were installed in the PC-cluster in turn and tested to compare parallel processing performance. Two multispectral satellite images were tested, which are a medium-capacity LANDSAT 8 OLI (Operational Land Imager) image and a high-capacity Sentinel 2A image. To evaluate the performance of parallel processing, speedup and efficiency were measured. Overall, the speedup was over N / 2 and the efficiency was over 0.5. From the comparison of the two operating systems, the Ubuntu system showed two to three times faster performance. To confirm that the results of the sequential and parallel processing coincide with the other, the center value of each band and the number of classified pixels were compared, and result images were examined by pixel to pixel comparison. It was found that care should be taken to avoid false sharing of OpenMP in intra-node implementation. To process large satellite images in a PC-cluster, code and hardware should be designed to reduce performance degradation caused by file I / O. Also, it was found that performance can differ depending on the operating system installed in a PC-cluster.

A Study on Impersonation Attack of Linux Sudoers Through Shadow File Manipulation (Shadow 파일 조작을 통한 리눅스 Sudoer의 위장공격에 대한 연구)

  • Kim, Sanghun;Cho, Taenam
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.149-156
    • /
    • 2020
  • All operating systems have privileged administrator accounts for efficient management. Dangerous or sensitive tasks or resources should be banned from normal users and should only be accessible by administrators. One example of this privilege is to reset a user's password when the user loses his/her password. In this paper, the privileges of the sudoer group, the administrator group of Linux Ubuntu, and the management system of the sudoer group were analyzed. We show the danger that a sudoer can use the privilege to change the password of other users, including other sudoers, and modify the log, and suggest a countermeasure to prevent the manipulation of shadow files as a solution to this. In addition, the proposed method was implemented and the possibility of practical use was confirmed with excellent performance.

Ethics in the State-Owned Companies (SOC) in the public sector: A thin line between corporate governance and ethical leadership.

  • Nevondwe, Lufuno;Nembambula, Phophi;Mangammbi, Mafanywa Jeffrey
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.3 no.1
    • /
    • pp.1-7
    • /
    • 2015
  • Ethics suggest that all persons are by nature moral, as it would not be possible for humans to exist collectively or even individually without an innate ethical sense. In order for the public sector to thrive in business, the board of directors needs to be guided by ethics and take into account the abiding interests of humanity and public good. It is argued in this paper that the abuse of power in the public sector has often been associated with unethical leadership and conducts which undermines the ubuntu notion. The irregularities which often arise in the awarding of tenders in the state-owned companies are some of the challenges that are prone to the public sector. In order to address these challenges and promote a flourishing democracy it is argued that ethical leadership as envisaged in the King III Report needs to be adhered to by the boards of directors. This paper concludes that the direction and control of ethics in any organisation is vital especially where the line between corporate governance and ethical leadership has become blurred.

Ethics in the State-Owned Companies (SOC) in the public sector: A thin line between corporate governance and ethical leadership.

  • Nevondwe, Lufuno;Nembambula, Phophi;Mangammbi, Mafanywa Jeffrey
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.2 no.3
    • /
    • pp.18-22
    • /
    • 2014
  • Ethics suggest that all persons are by nature moral, as it would not be possible for humans to exist collectively or even individually without an innate ethical sense. In order for the public sector to thrive in business, the board of directors needs to be guided by ethics and take into account the abiding interests of humanity and public good. It is argued in this paper that the abuse of power in the public sector has often been associated with unethical leadership and conducts which undermines the ubuntu notion. The irregularities which often arise in the awarding of tenders in the state-owned companies are some of the challenges that are prone to the public sector. In order to address these challenges and promote a flourishing democracy it is argued that ethical leadership as envisaged in the King III Report needs to be adhered to by the boards of directors. This paper concludes that the direction and control of ethics in any organisation is vital especially where the line between corporate governance and ethical leadership has become blurred.

A study on the offering of the latest film information using XML Parser (XML Parser를 활용한 최신 영화 정보 제공 연구)

  • Choi, Jae-Hyung;Koo, Min-Jeong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.1
    • /
    • pp.19-23
    • /
    • 2017
  • With the increase in the number of smart phone users, smart phones themselves are seeing progress in terms of available functions. Many applications, too, are being developed to increase convenience in daily life. This study issued a list of information on films that the user wishes to see, by using an XML parser to call news articles related to the films in question to the news site RSS. The Android App server was built using Ubuntu and the latest film information was provided through the board that was built. The menu was consisted in a manner so that when the information interested was clicked on, a more detailed set of information became available.

Flush+Reload Cache Side-Channel Attack on Block Cipher ARIA (블록 암호 ARIA에 대한 Flush+Reload 캐시 부채널 공격)

  • Bae, Daehyeon;Hwang, Jongbae;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1207-1216
    • /
    • 2020
  • Since the server system in the cloud environments can simultaneously operate multiple OS and commonly share the memory space between users, an adversary can recover some secret information using cache side-channel attacks. In this paper, the Flush+Reload attack, a kind of cache side-channel attacks, is applied to the optimized precomputation table implementation of Korea block cipher standard ARIA. As an experimental result of attack on ARIA-128 implemented in Ubuntu environment, we show that the adversary can extract the 16 bytes last round key through Flush+Reload attack. Furthermore, the master key of ARIA can be revealed from last and first round key used in an encryption processing.