37,357 research outputs found

    Ransomware in High-Risk Environments

    Get PDF
    In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizations and endpoint users. Hackers are using a multitude of approaches and tools, including ransomware threats, to take over targeted systems. These acts of cybercrime lead to huge damages in areas of business, healthcare systems, industry sectors, and other fields. Ransomware is considered as a high risk threat, which is designed to hijack the data. This paper is demonstrating the ransomware types, and how they are evolved from the malware and trojan codes, which is used to attack previous incidents, and explains the most common encryption algorithms such as AES, and RSA, ransomware uses them during infection process in order to produce complex threats. The practical approach for data encryption uses python programming language to show the efficiency of those algorithms in real attacks by executing this section on Ubuntu virtual machine. Furthermore, this paper analyzes programming languages, which is used to build ransomware. An example of ransomware code is being demonstrated in this paper, which is written specifically in C sharp language, and it has been tested out on windows operating system using MS visual studio. So, it is very important to recognize the system vulnerability, which can be very useful to prevent the ransomware. In contrast, this threat might sneak into the system easily, allowing for a ransom to be demanded. Therefore, understanding ransomware anatomy can help us to find a better solution in different situations. Consequently, this paper shows a number of outstanding removal techniques to get rid from ransomware attacks in the system

    STUDI PERENCANAAN SISTEM DISTRIBUSI AIR BERSIH PADA GEDUNG DITRESKRIMSUS KEPOLISIAN DAERAH JAWA TIMUR

    Get PDF
    The plumbing system is an inseparable part of a high-rise building. The plumbing system is used for various purposes such as providing clean water and distributing sewage and waste water. To meet the needs of clean water in the Ditreskrimsus Building of the East Java Regional Police, requires planning a clean water distribution system, a 5-storey building with the type and number of plumbing equipment required clean water amounting to 58.996 m3 / day. The capacity of the lower water reservoir (Ground Water Tank) used is 8 m3, the upper water tank (Roof Tank) is used as a water reservoir of 7 m3. Based on the results of the calculation, a transfer pump is used to drain water from the lower water tank (Ground Water Tank) to the upper water tank (Roof Tank) with a flowing capacity of 16.2 m3 / hour and a transfer pump head of 7-54 m. for clean water distribution, you can use the thrust of the potential height of the water from the upper reservoir to the sanitary equipment on each floor. The pump used is the Ebara 50x40 FSHA brand

    Addendum: A Classification of Plane Symmetric Kinematic Self-similar Solutions

    Full text link
    In our recent paper, we classified plane symmetric kinematic self-similar perfect fluid and dust solutions of the second, zeroth and infinite kinds. However, we have missed some solutions during the process. In this short communication, we add up those missing solutions. We have found a total of seven solutions, out of which five turn out to be independent and cannot be found in the earlier paperComment: 7 pages Late

    Ransomware in High-Risk Environments

    Get PDF
    In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizations and endpoint users. Hackers are using a multitude of approaches and tools, including ransomware threats, to take over targeted systems. These acts of cybercrime lead to huge damages in areas of business, healthcare systems, industry sectors, and other fields. Ransomware is considered as a high risk threat, which is designed to hijack the data. This paper is demonstrating the ransomware types, and how they are evolved from the malware and trojan codes, which is used to attack previous incidents, and explains the most common encryption algorithms such as AES, and RSA, ransomware uses them during infection process in order to produce complex threats. The practical approach for data encryption uses python programming language to show the efficiency of those algorithms in real attacks by executing this section on Ubuntu virtual machine. Furthermore, this paper analyzes programming languages, which is used to build ransomware. An example of ransomware code is being demonstrated in this paper, which is written specifically in C sharp language, and it has been tested out on windows operating system using MS visual studio. So, it is very important to recognize the system vulnerability, which can be very useful to prevent the ransomware. In contrast, this threat might sneak into the system easily, allowing for a ransom to be demanded. Therefore, understanding ransomware anatomy can help us to find a better solution in different situations. Consequently, this paper shows a number of outstanding removal techniques to get rid from ransomware attacks in the system

    The Amorphous-Crystal Interface in Silicon: a Tight-Binding Simulation

    Get PDF
    The structural features of the interface between the cystalline and amorphous phases of Si solid are studied in simulations based on a combination of empirical interatomic potentials and a nonorthogonal tight-binding model. The tight-binding Hamiltonian was created and tested for the types of structures and distortions anticipated to occur at this interface. The simulations indicate the presence of a number of interesting features near the interface. The features that may lead to crystallization upon heating include chains with some defects, most prominently dimers similar to those on the Si(001) 2x1 reconstructed free surface. Within the amorphous region order is lost over very short distances. By examining six different samples with two interfaces each, we find the energy of the amorphous-crystal interface to be 0.49 +/- 0.05 J/m^2Comment: Submitted to Phys. Rev.

    Impact of Extended Starobinsky Model on Evolution of Anisotropic, Vorticity-free Axially Symmetric Sources

    Full text link
    We study the implications of RnR^n extension of Starobinsky model on dynamical instability of Vorticity-free axially symmetric gravitating body. The matter distribution is considered to be anisotropic for which modified field equations are formed in context of f(R)f(R) gravity. In order to achieve the collapse equation, we make use of the dynamical equations, extracted from linearly perturbed contracted Bianchi identities. The collapse equation carries adiabatic index Γ\Gamma in terms of usual and dark source components, defining the range of stability/insatbility in Newtonian (N) and post-Newtonian (pN) eras. It is found that supersymmetric supergravity f(R)f(R) model represents the more practical substitute of higher order curvature corrections.Comment: 20 page
    corecore