• Title/Summary/Keyword: web mail

Search Result 244, Processing Time 0.025 seconds

Threats and countermeasures of malware (악성코드의 위협과 대응책)

  • Lim, Dong Yul
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.13-18
    • /
    • 2015
  • The malware, as hackers generic name of executable code that is created for malicious purposes, depending on the presence or absence of a self-replicating ability infected subjects, and are classified as viruses, worms, such as the Trojan horse. Mainly Web page search and P2P use, such as when you use a shareware, has become penetration is more likely to occur in such a situation. If you receive a malware attack, whether the e-mail is sent it is automatically, or will suffer damage such as reduced system performance, personal information leaks. While introducing the current malware, let us examine the measures and describes the contents related to the malicious code.

  • PDF

Developing the Measurement System with Establishing the PHY Performance of Best Proper Cable Modem (최적의 케이블 모뎀 PHY 성능 구현 및 케이블 망 측정 시스템 개발)

  • Lee, Kyoung-Moon;Ko, Jae-Pyung;Lee, Jang-Myung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.2
    • /
    • pp.205-211
    • /
    • 2008
  • This paper describes the method aimed at establishing the equipment measuring the parameter of Cable Network by Best proper Cable Modem and PDA through RS232 interface. In this paper, we propose our creative experimental configuration and develope the Cable Modem (DOCSIS 2.0) superior more performing than the referred Cable Modem (DOCSIS 1.0, 1.1) and the measuring equipment of HFC network compositing of Cable Modem and PDA through RS232 interface. This equipment analyzes Upstream (U/S) and Downstream (D/S) Signal quality and generates the signal of Upstream by CW signal. The paper also provides the experimental results to check the Best Proper Cable Modem and the displayed screen for parameters for SNR, BER and the demodulated IQ diagram of 256QAM through LCD of PDA. Henceforth, it'll be possible to support a variety of the functions for E-mail, Internet, the speed test of WEB connection and the transmission of the measured result real time by PDA.

A Useful Method on Effective Primary English Education Based on Multimedia Contents and Video Conference (효율적인 초등학교 영어 학습을 위한 멀티미디어 컨텐츠와 Video Conference의 이용 방안 연구)

  • Kim, Yong-Sin;Kim, Jeong-Rang
    • Journal of The Korean Association of Information Education
    • /
    • v.4 no.1
    • /
    • pp.120-128
    • /
    • 2000
  • Even though we basically regard spoken English like listening and speaking rather than written language as an important principle in Elementary Education of English, actually students are being taught English only by imitating what they heard and watched through audio or video tapes in the scene of elementary school. Of course, it is successful to learn English focused on a spoken language not in EFL(English as a foreign language) but in ESL(English as a second language) circumstance. Therefore, we provide products of multimedia contents in order to give opportunities which can make use of English in the classroom through the Web in this paper. In addition to it, we write this paper on method to strengthen motivation for learning language even out of the classroom by putting English to practical use through video conference system or E-mail exchange.

  • PDF

Groupware Current Status Analysis Ⅰ (그룹웨어의 현황 분석 Ⅰ)

  • Kim, Sun-Uk;Gim, Bong-Jin
    • IE interfaces
    • /
    • v.10 no.3
    • /
    • pp.75-93
    • /
    • 1997
  • Unlike individual applications, it is extremely hard to obtain user requirements for group systems, since there exists very complicated dynamics in group. This may result in spreading a great amount of products with a broad range of contents. Thus, this study presents a comparative analysis of groupware products. As a result, these products have been categorized into three areas which include cooperation/document management systems, collaborative writing systems, and decision-making/meeting systems. While the systems reviewed here focus on the cooperation/document management systems, the other two areas will be dealt in details in part Ⅱ. The first area ends up with two large categories such as proprietary groupware products and intranet groupware products. However, it has been observed that there is a natural convergence between these two categories. Consequently, the comparative analysis has been performed in terms of functions provided on the two categories and a combined category. Each group of the functions has been divided into three parts which consist of basic functions, quasi-basic functions, and others. Such a decision has been made based on the frequency rate of the functions provided in the products. With a more strict rule, the basic functions comprise electronic mail, sanction, bulletin board, document management, scheduling, security, Web browser, and Internet connectivity. This study also provides a framework for integrated functional model of groupware systems. The basic functions are merged into the model. However, the model is so flexible that it can partially include the quasi-functions in addition to the basic functions. In the future, it is expected that a large number of products will stem from the modification of the functional model.

  • PDF

A Case Study on Server Consolidation of Public Organizations: Concentrated on NDMS (공공기관의 서버통합 사례연구: NDMS를 중심으로)

  • Na, Kwan-Sik
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.1
    • /
    • pp.67-78
    • /
    • 2012
  • Organizations have many physical servers in their departments such as application servers, web servers, database servers, mail servers, and so forth. The problem of server sprawl is common in information system centers of most profit and nonprofit organizations. Server sprawls are characterized by the use of dedicated servers for single applications. This server sprawl causes the problems such as the low resource utilization, the large space consumption, and the high management cost. Server consolidation is crucial to solve these problems by providing savings in hardware, software, maintenance, facility, and labor costs. This paper proposed a method to implement server consolidation for public organizations by the NDMS(National Disaster Management Systems) case study.

A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code

  • Kim, Hee Wan
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.288-294
    • /
    • 2021
  • There are various ways to be infected with malicious code due to the increase in Internet use, such as the web, affiliate programs, P2P, illegal software, DNS alteration of routers, word processor vulnerabilities, spam mail, and storage media. In addition, malicious codes are produced more easily than before through automatic generation programs due to evasion technology according to the advancement of production technology. In the past, the propagation speed of malicious code was slow, the infection route was limited, and the propagation technology had a simple structure, so there was enough time to study countermeasures. However, current malicious codes have become very intelligent by absorbing technologies such as concealment technology and self-transformation, causing problems such as distributed denial of service attacks (DDoS), spam sending and personal information theft. The existing malware detection technique, which is a signature detection technique, cannot respond when it encounters a malicious code whose attack pattern has been changed or a new type of malicious code. In addition, it is difficult to perform static analysis on malicious code to which code obfuscation, encryption, and packing techniques are applied to make malicious code analysis difficult. Therefore, in this paper, a method to detect malicious code through dynamic analysis and static analysis using Trojan-type Downloader/Dropper malicious code was showed, and suggested to malicious code detection and countermeasures.

A Classification Model for Predicting the Injured Body Part in Construction Accidents in Korea

  • Lim, Jiseon;Cho, Sungjin;Kang, Sanghyeok
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.230-237
    • /
    • 2022
  • It is difficult to predict industrial accidents in the construction industry because many accident factors, such as human-related factors and environment-related factors, affect the accidents. Many studies have analyzed the severity of injuries and types of accidents; however, there were few studies on the prediction of injured body parts. This study aims to develop a classification model to predict the part of the injured body based on accident-related factors. Construction accident cases from June 2018 to July 2021 provided by the Korea Construction Safety Management Integrated Information were collected through web crawling and then preprocessed. A naïve Bayes classifier, one of the supervised learning algorithms, was employed to construct a classification model of the injured body part, which has four categories: 1) torso, 2) upper extremity, 3) head, and 4) lower extremity. The predictor variables are accident type, type of work, facility type, injury source, and activity type. As a result, the average accuracy for each injured body part was 50.4%. The accuracy of the upper extremity and lower extremity was relatively higher than the cases of the torso and head. Unlike the other classifications, such as spam mail filtering, a naïve Bayes classifier does not provide a good classification performance in construction accidents. The reasons are discussed in the study. Based on the results of this study, more detailed guidelines for construction safety management can be provided, which help establish safety measures at the construction site.

  • PDF

Android Based Mobile Combination Login Application (안드로이드 기반 모바일 통합로그인 애플리케이션)

  • Lim, Jung-Gun;Choi, Chang-Suk;Park, Tae-Eun;Ki, Hyo-Sun;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.151-156
    • /
    • 2013
  • Android that was made by Google and Open Handset Alliance is the open source software toolkit for mobile phone. In a few years, Android will be used by millions of Android mobile phones and other mobile devices, and become the main platform for application developers. In this paper, the integrated login application based on Google's Android platform is developed. The main features of the mobile combination login application content based on Android are as follows. First, the application has more convenient login functionality than the functionality of general web browser as the web browser of the mobile-based applications(web browser style applications) as well as security features and faster screen(view) capability by reducing the amount of data transfer. Second, the application is so useful for management of ID and Password, and it can easily manage multiple ID information such as message, mail, profile. The results of performance evaluation of the developed application show the functionality that can login many kinds of portal sites simultaneously as well as the ability that can maintain login continuously. Currently, we are trying to develope a couple of the technologies that can insert multiple accounts into one ID and check all information on one screen.

The Recognition and Utilization of Middle School Technology.Home Economics Teacher's Guidebook (중학교 "기술.가정" 교과 교사용 지도서에 대한 가정 교사의 인식 및 활용)

  • Kang, Eun-Yeong;Shin, Hye-Won
    • Journal of Korean Home Economics Education Association
    • /
    • v.19 no.2
    • /
    • pp.1-12
    • /
    • 2007
  • This study analyzed the recognition and utilization regarding teacher's guidebook for middle school technology-home economics class in the 7th Educational Curriculum. The data were collected via e-mail to teachers teaching home economics in middle schools. These e-mail addresses were acquired from middle school web pages registered on the Educational Board. The 355 data were analyzed using the SPSS program. The results were as follows: First, teachers recognized highly the necessity of teacher's guidebook. However, as the actual guidebook was not adequately helpful, the overall degree of satisfaction was relatively low. Teachers utilizing guidebook had more positive recognition on teacher's guidebook than teachers who did not. And teachers majored in technology education thought teacher's guidebook more helpful compared with teachers majored in home economics education. Second, teachers referenced teacher's guidebook mostly for field practice guidance. Third, teachers who did not utilize teacher's guidebook used other reference materials such as Internet Web sites and audiovisual materials. They were most commonly used for the reason that the contents were ample and easy to access. Fourth, the followings were suggested to improve teacher's guidebook. The provision of learning contents that can be practically used in class, the various samples of teaching-learning method, the specified methods of planning and criteria for performance assessment, the adequate supplementations regarding textbook contents, and the improvement of the outward layout format of the guidebook.

  • PDF

ICT Utilization and Recognition by Home Economics Teachers in Secondary schools (중등학교 가정과 교사의 ICT 활용수업의 실태와 인지도)

  • Kim Mi-Young;Kim Kyung-Ae;Wee Eun-Hah
    • Journal of Korean Home Economics Education Association
    • /
    • v.16 no.3
    • /
    • pp.63-80
    • /
    • 2004
  • The purpose of this study was to investigate the actual ICT utilization and recognition, to identify the effective and relevant chapters of home economics which can be taught using ICT in teaching and learning method. There were 372 secondary school teachers being participated in the survey. The results of this study can be summarized as follows 1. The reason why they have ICT utilization Instruction is to help the learners improve the academic accomplishment in the development stage through providing data from web-surfing and presentational data such as developed CD, animation and presentations. 2. Regarding ICT utilization capability. teachers have the capability to send and receive E-mail, make a presentation data. practical use of Internet. In addition, the group with less than 10 years experience have a higher capability in information technology. 3. Concerning ICT utilization recognition, this result shows that ICT Instruction is the most effective to motivate learners, and teachers anticipate ICT Instruction would improve the quality of the teaching & learning. 4. The chapter such as 'how to make clothing and recycling'(database). 'the foundation of cooking and its application' (database). 'gender and acquaintance of the opposite sex', 'nutrition of during adolescence' (simulation program) should be the first priority in the development.

  • PDF