Networking Assignment

Undergraduate
Essay
Technology
Pages 7 (1757 words)
Download 0
1) If the company makes the software in C+, it should be kept in mind that which kind of data storage technology is going to be used so that it would be easier to restrict an employee to only view his own profile and edit whatever is allowed. If the C+ software is storing employees' information on flat file system then by using C+ business logic the userid, with which the user logs in to the Unix system, should be retrieved from the Unix operating system and depending on that userid, the user is allowed to access the profile associated with that userid.

Introduction

What this means for attackers is that once they penetrate a single machine on a network they can then observe all traffic passing through the network. This allows intruders to quickly collect passwords and account names for many users. And all too often a password good one place is good another. In order to save from this vulnerability, you have to save a copy of Kernel offline because the advance hackers even patches the kernel of Unix system so that the system can not detect that it is under promiscuous mode by the help of "ifconfig" and "tcpdump" commands. (http://www.acm.uiuc.edu)
In terms of availability, it should be kept in mind that the several users are accessing the same application simultaneously. For every user the instance of the C++ application would be separate but if look at data file, the data file would act as a centralized data storage so C++ program must have the eligibility to maintain the proper locking mechanism of the data file so that only one user is updating the data file at a time. With locking mechanism in mind, the dead lock possibility should be carefully taken care off. ...
Download paper
Not exactly what you need?

Related papers

Networking Assignment Essay
When the machine is ready after the installation of Windows 2003 with Service Pack1 run "Dcpromo" Command from Star Menu so that the Active Directory Services could be installed. This service is able to keep every details of the resources of the network e.g., Workstations, network printers and users. This service is useful in assigning privileges to the users and manages their account policies.…
Computing networking
This will save extra cost and will save ports that will not be used. The 2 switches will then be connected to the central hub/switch, interconnecting the different offices of the company.…
Networking Security Engineering
To avoid this micro content management system can be designed to extract the maximum potential from the content and at the same time the data stored as XML within a native XML must searchable using Xpath. This gives to execute Xpath via a URL from within user's browser.…
Social Networking Sites
The social networking websites are online based or web based services which link various individuals from across the global and it allows them to create their own profile, blog, articulate and helps to communicate with different people across the world. Hence the study identifies seven important factors which influences to the motives behind the use of social networking sites. And also it takes…
Networking Assignment
What this means for attackers is that once they penetrate a single machine on a network they can then observe all traffic passing through the network. This allows intruders to quickly collect passwords and account names for many users. And all too often a password good one place is good another. In order to save from this vulnerability, you have to save a copy of Kernel offline because the advance…
Wireless networking
Networking can be of different types like; Local Area Networking (LAN), Wireless Local Area Networking (WLAN), Wide Area Networking (WAN), Metropolitan Area Networking (MAN) etc. LAN and WAN are the popular networking methods. Wireless Local Area Networking (WLAN) is mostly used networking of computers assembled around a small area. It is widely used in home computer networking connections. This…
Wireless Computer Networking
Networking can be of different types like; Local Area Networking (LAN), Wireless Local Area Networking (WLAN), Wide Area Networking (WAN), Metropolitan Area Networking (MAN) etc. LAN and WAN are the popular networking methods. Wireless Local Area Networking (WLAN) is mostly used networking of computers assembled around a small area. It is widely used in home computer networking connections. This…