• Title/Summary/Keyword: hack

Search Result 931, Processing Time 0.024 seconds

A Study on Cheating Patterns in Online FPS Games and their Countermeasures : By the Case of Point Blank in Indonesia (온라인 FPS 게임의 치팅 유형과 대응 방안에 관한 연구 : 인도네시아 포인트 블랭크 사례를 중심으로)

  • Im, Sung-Jin;Lee, Dae-Hyun
    • Journal of Korea Game Society
    • /
    • v.11 no.2
    • /
    • pp.81-91
    • /
    • 2011
  • Hacking tools are evolving along the growth of on-line game industry. Those tools allow users with no programming knowledge to hack the game, which causes a lot of problems in on-line game services. Specifically, FPS games based on peer-to-peer networks are vulnerable to hacks. This paper analyzes cheating patterns by the case of Point Blank in Indonesia and prioritize countermeasures, which helps game companies handle hacks efficiently.

Development of Shot Accuracy Trainer for Wheelchair Curling (휠체어 컬링 샷 정확도 향상을 위한 훈련장비 개발)

  • Kil, Se Kee;Lee, Hyun Been;Kim, Tae Whan;Lee, Sang Cheol;Hwang, Jong Hak;Shim, Hyun Min;Han, Young Hwan
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.11 no.4
    • /
    • pp.377-383
    • /
    • 2017
  • In this study, it is proposed and developed a shot accuracy trainer for wheelchair curling. This trainer is developed to improve curling shot accuracy by supplying functions of changing guide width in which curling stone passes by and of time mesurement of Hack to Hog. And it also can supply training video of athlete to coach to analyze. From the pilot test from coaching staff of wheelchair curling team, association executives and icemaker of rink, we tried to verify the usability of proposed system.

Blockchain Technology and Utilization Schemes in Tactical Communication Network

  • Yoo, In-Deok;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Jo, Se-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.49-55
    • /
    • 2018
  • In this paper, we propose schemes of blockchain utilization in tactical communication environment. The military tactical communication environment has similar characteristics with blockchain network such as distributed architecture, decentralization, and the need for data integrity. A communication node constituting a tactical communication network is constituted by a system capable of configuring and connecting a network for each node. When a communication node, having such capabilities, is configured as a node of blockchain network, various functions could be performed. In this paper, we propose utilization schemes of authentication, integrity, record management, and privilege control based blockchain technology. Functions for authentication, integrity verification, and record management need to ensure the stored data and could track history. The requirement of function's characteristics are matched to blockchain which is storing data sequentially and difficult to hack data, so that it could perform functionally and sufficiently well. Functions for authority control should be able to assign different privileges according to the state of the requestor. Smart contract will function when certain conditions are satisfied and it will be able to perform its functions by using it. In this paper, we will look over functions and utilization schemes of blockchain technology which could reliably share and synchronize data in a tactical communication environment composed of distributed network environment.

A Security Model Analysis Adopt to Authentication State Information in IPTV Environment (IPTV 환경에서 가입자의 인증 상태정보를 이용한 인증보안 모델 설계)

  • Jeong, Yoon-Su;Jung, Yoon-Sung;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.421-430
    • /
    • 2010
  • Now a days, as a communications network is being broadband, IPTV(Internet Protocol Television) service which provides various two-way TV service is increasing. But as the data which is transmitted between IPTV set-top box and smart card is almost transmitted to set-top box, the illegal user who gets legal authority by approaching to the context of contents illegally using McComac Hack Attack is not prevented perfectly. In this paper, set-top box access security model is proposed which is for the protection from McComac Hack Attack that tries to get permission for access of IPTV service illegally making data line which is connected from smart card to set-top box by using same kind of other set-top box which illegal user uses. The proposed model reports the result of test which tests the user who wants to get permission illegally by registration the information of a condition of smart card which is usable in set-top box in certification server so that it prevents illegal user. Specially, the proposed model strengthen the security about set-top box by adapting public key which is used for establishing neighbor link and inter-certification process though secret value and random number which is created by Pseudo random function.

EFFECT OF PHOTOCHEMICAL REACTIONS ON LUMINESCENCE OF CRYSTALLINE RDX

  • Kim, Hack-Jin;Kang, Tai-Jong
    • Journal of Photoscience
    • /
    • v.2 no.2
    • /
    • pp.83-87
    • /
    • 1995
  • Luminscence spectra and decay of crystalline hexahydro-1,3,5-trinitro-1,3,5-s-tetrazine (RDX) are observed at 90 K and the effects of photochemical reaction on the luminescence of RDX are investigated. The uv light from high power Hg lamp is used for the photochemical reaction of RDX. While no significant changes are observed in the luminescence spectra after the photochemical reaction, the intensity profile of the spectra changes with the progress of chemical reactions. The biexponential decay of luminescence is modified by chemical reactions. Features of the electronic states of crystalline RDX are discussed in relation to the luminescence.

  • PDF

Inhibitory Effects of Ginseng Total Saponin on Methamphetamine-induced Striatal Dopamine Increase in Mice

  • Oh, Ki-Wan;Kim, Hack-Seang;Wagner, George-C.
    • Archives of Pharmacal Research
    • /
    • v.20 no.5
    • /
    • pp.516-518
    • /
    • 1997
  • In conclusion, biochemical analysis revealed that GTS inhibited the methamphetamine-induced DA increase and the methamphetamine-induced DOPAC decrease in the mouse striatum. These results indicate that GTS could modulate the methamphetamine-induced striatal dopaminergic neuronal systems.

  • PDF

Acoustic-characteristic estimation of an elastic plate to simulate a room sound-field (실내 음장을 모사하기 위한 탄성판의 음향특성 평가)

  • Ko Byeong-Seob;Park Byoung-Uk;Kim Hack-Yoon
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • spring
    • /
    • pp.207-210
    • /
    • 2000
  • 실내음장을 정밀하게 모사하기 위하여 음의 파동성을 고려한 탄성판의 음향특성을 평가하지 않으면 안된다. 따라서, 본 논문에서는 Baffle에 지지된 탄성판의 음향특성을 정량적으로 나타낼 수 있는 근사적인 평가 값에 대하여 고찰하고, 또한 탄성판의 음향특성의 하나인 방사 어드미턴스에 대하여 이에 대한 음향학적 특성에 대하여 평가한다

  • PDF

An Improved Secondary Path Modeling Method by Modified Kuo Model

  • Park, Byoung-Uk;Kim, Hack-Yoon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.1E
    • /
    • pp.33-42
    • /
    • 2003
  • Kuo et al proposed an on-line method for an adaptive prediction error filter for improving secondary path modeling performance in the modeling method of the secondary path. This method have some disadvantages, namely having to use additive noise with the result that noise control performance is not good since it is focused on the estimated performance of the secondary path. In this paper, we proposes a modified Kuo model using gain control parameter and delay. It uses a reference signal for additive noise to improve the problems in the existing Kuo model.