• 제목/요약/키워드: Internet Tools

검색결과 669건 처리시간 0.024초

현대 디지털 포렌식 이미징 소프트웨어 도구 특징 비교에 대한 연구 (A Feature Comparison of Modern Digital Forensic Imaging Software)

  • 함지윤;조슈아 아이작 제임스
    • 한국인터넷방송통신학회논문지
    • /
    • 제19권6호
    • /
    • pp.15-20
    • /
    • 2019
  • 초반의 디지털 수사가 형성될 무렵, 디스크 이미징과 같은 디지털 포렌식 수사의 기초적인 과정이 개발되었다. 디지털 포렌식 수사의 과정과 절차가 점점 발달함에 따라, 수사의 데이터 처리 및 분석 단계를 도와주는 기본적인 툴들은 초반과 동일하게 유지되었다. 본 연구는 현대 디지털 포렌식 이미징 소프트웨어 툴에 대한 연구이다. 그 중에서도, 기본적인 툴 개발 패턴을 이해하기 위해 현대 디지털 포렌식 이미징 툴의 특징과 개발 및 출시 주기와 개발 패턴에 집중하였다. 해당 설문 조사를 바탕으로 현재의 디지털 수사의 기본 소프트웨어 개발 및 유지 보수의 취약점을 보여준다. 또한 기본 툴들을 개선할 수 있는 방안을 제시한다.

ASIC 설계용 통합 CAD Framework 개발 (Development of Integrated CAD framework for ASIC Design)

  • 엄성용;신혜선;이규원;박선화
    • 인터넷정보학회논문지
    • /
    • 제2권4호
    • /
    • pp.25-32
    • /
    • 2001
  • ASIC 설계용으로 이미 개발된 여러 CAD 도구 또는 추후 개발될 CAD도구들은 고유의 기능을 가지고 있으며, 서로 다른 환경에서 상이한 방식으로 운영되는 경우가 많다. 따라서 목표하는 최종적인 결과를 도출하기 위한 작업을 수행하기 위해서는 상호 밀접한 관계가 있는 여러 CAD도구들을 하나의 시스템에 통합하여 운영할 수 있는 통합 CAD Framework의 사용이 효과적이다. 본 논문에서는 주로 Unix Shell 상에서 개발된 기존의 국내외 CAD도구들을 Unix 운영체계의 X-windows라는 규격화된 그래픽 인터페이스 상에서 통합하여 수행할 수 있게 하는 기법을 소개한다. 이를 위해 메뉴 구성 및 실행 환경 설정을 위한 각종 파일 양식과 메타 언어를 정의ㆍ개발하였으며, 성능 확인을 위해 기존에 개발되어 있던 두 가지 CAD 도구들을 제안된 CAD Framework상에 통합시킨 Prototype 시스템을 개발하고, 이를 토대로 테스트하였다.

  • PDF

The Personal Information Management Practices of the Graduates of the Department of Information Studies at Kuwait University

  • AlRukaibani, Bashaer;Chaudhry, Abdus Sattar
    • International Journal of Knowledge Content Development & Technology
    • /
    • 제9권1호
    • /
    • pp.19-42
    • /
    • 2019
  • This study examined activities involving the finding, organizing, managing, and re-finding of information by knowledge workers in Kuwait. This research also conducted a review of the tools needed for effective personal information management (PIM) and assessed perceptions about improving PIM through Internet use. Data were collected through semi-structured interviews conducted among 26 graduates of the Department of Information Studies at Kuwait University. These participants are currently employed in different sectors engaged in a variety of information-related activities. This study's findings indicated that participants gathered different types of information from a variety of sources. This information was stored using several devices and services, including desktop computers, shared drives, clouds, bookmarked websites, e-mail correspondence, and favorites lists. Participants organized information in personal folders according to categories such as subject/topic, time, project, document type, and geographical region. Preferred methods for information re-finding included searching by keyword and browsing through folders. Interviewees reported problems of information overload, fragmentation, and anxiety. Most were active in social media via mobile device, while some of them used Siri or Ask Google to retrieve information. Tools used for PIM included calendars, tasks, schedules, e-mail management tools, clouds, and social networking tools. Participants reported that the Internet helped with personal information management practices, but that some privacy issues arose in this context.

Analysis of AI Content Detector Tools

  • Yo-Seob Lee;Phil-Joo Moon
    • International journal of advanced smart convergence
    • /
    • 제12권4호
    • /
    • pp.154-163
    • /
    • 2023
  • With the rapid development of AI technology, ChatGPT and other AI content creation tools are becoming common, and users are becoming curious and adopting them. These tools, unlike search engines, generate results based on user prompts, which puts them at risk of inaccuracy or plagiarism. This allows unethical users to create inappropriate content and poses greater educational and corporate data security concerns. AI content detection is needed and AI-generated text needs to be identified to address misinformation and trust issues. Along with the positive use of AI tools, monitoring and regulation of their ethical use is essential. When detecting content created by AI with an AI content detection tool, it can be used efficiently by using the appropriate tool depending on the usage environment and purpose. In this paper, we collect data on AI content detection tools and compare and analyze the functions and characteristics of AI content detection tools to help meet these needs.

다양한 형태의 웹 탐색도구의 이용자집단간 비교효용성 및 평가에 관한 연구 (The comparative effectiveness and evaluation study of user groups of the various web search tools)

  • 박일종;윤명순
    • 한국도서관정보학회지
    • /
    • 제31권1호
    • /
    • pp.87-114
    • /
    • 2000
  • The purpose of this study is offering appropriate system and training program to helf the system designer and the trainer in addition to analyze information use behavior about the web search tools and evaluate the estimated system by user groups. The results of the study are as follows $\circledS1$ It is desirable to consider age than other demographic variables in the case of web search tool. $\circledS2$ It is desirable to design Directory Search Tool in the case of web search tool which serves the student user group. $\circledS3$ An Intelligent Search Tool is more appropriate for the students who are using keyword search tool than any other tools. $\circledS4$ A discussion about standard classification of the web information should be accomplished soon because users feel confused in using web search tools due t o absence of standard mode of classification about classified item. $\circledS5$ Librarians need the cognition about data on internet s a source of information and need positive service and user training program about these information because student users hardly get help from librarians or library orientation for learning method to use web search tool. $\circledS6$ Internet use experience and years of computer use had effect on their use ability when using web search tool, whereas computer use experience, library use experience and Online Public Access Catalogs (OPAC) use experience had no effect on it. Especially, OPAC use experience had no effect on use ability of web search tool of student user group because student user groups had no information about internet and web search tool and they did not recognized the difference about search method between web search tool and OPAC. $\circledS7$In the case of web search tool, it si important to index the increasing web resource automatically by a searching robot. But in the case of student users, web search tool is much more needed to index by index expert due to the absence of ability about selecting and combining keyword.

  • PDF

Development of a Forensic Analyzing Tool based on Cluster Information of HFS+ filesystem

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권3호
    • /
    • pp.178-192
    • /
    • 2021
  • File system forensics typically focus on the contents or timestamps of a file, and it is common to work around file/directory centers. But to recover a deleted file on the disk or use a carving technique to find and connect partial missing content, the evidence must be analyzed using cluster-centered analysis. Forensics tools such as EnCase, TSK, and X-ways, provide a basic ability to get information about disk clusters, but these are not the core functions of the tools. Alternatively, Sysinternals' DiskView tool provides a more intuitive visualization function, which makes it easier to obtain information around disk clusters. In addition, most current tools are for Windows. There are very few forensic analysis tools for MacOS, and furthermore, cluster analysis tools are very rare. In this paper, we developed a tool named FACT (Forensic Analyzer based Cluster Information Tool) for analyzing the state of clusters in a HFS+ file system, for digital forensics. The FACT consists of three features, a Cluster based analysis, B-tree based analysis, and Directory based analysis. The Cluster based analysis is the main feature, and was basically developed for cluster analysis. The FACT tool's cluster visualization feature plays a central role. The FACT tool was programmed in two programming languages, C/C++ and Python. The core part for analyzing the HFS+ filesystem was programmed in C/C++ and the visualization part is implemented using the Python Tkinter library. The features in this study will evolve into key forensics tools for use in MacOS, and by providing additional GUI capabilities can be very important for cluster-centric forensics analysis.

아시아 인터넷 공공 도서관(Internet Public Library Asia) 구축에 관한 연구 (Construction of Internet Public Library Asia)

  • 이원숙;일본명;일본명;일본명;일본명
    • 한국비블리아학회지
    • /
    • 제13권2호
    • /
    • pp.59-73
    • /
    • 2002
  • 본 연구에서는, 우선 인터넷의 보급에 의해 변화되어진 전통적인 공공 도서관 서비스를 몇가지의 예를 통하여 조사하였다. 이 과정에서 아시아지역에서 발신되어진 양질의 정보 자원을 아시아어로 소개하는 다언어 서브젝트 게이트웨이의 필요성에 대하여 깨달았다. 그리하여 본 연구에서는 한국어. 일본어, 중국어로 쓰여져 있는 정보 자원중 공공 도서관의 이용자들에서 유용하다고 생각되어지는 자료를 웹으로부터 수집하여, 각각의 정보 자원에 관한 소개를 전술한 3개 언어와 영어로 기술하는 Internet Public Library Asia의 구축을 진행해왔다. 본 시스템에서 사용하는 메타 데이터 스키마는DC(Dublin Core Metadata Element Set)$^{1)}$와 IEEE LOM$^{2)}$을 기본으로 만들어졌고, 다언어 메타 데이터는 각각의 언어를 모국어로 하는 메타 데이터 작성자들에 의하여 협동으로 작성되어졌다. 또 본 시스템에서는 메타 데이터뿐만 아니라 이용자 인터페이스도 다언어로 제공하여 이용자가 언어에 구애받지 않고 검색할 수 있도록 돕고 있다. 메타 데이터의 기술에는 XML을 사용하였고, 기술되어진 메타 데이터는 PostgreSQL를 이용하여 데이터 베이스화 하였다. 다언어 이용자 인터페이스의 실현에는 XSLT등의 기술을 사용하고 있다.

  • PDF

Design of watermark trace-back system to supplement connection maintenance problem

  • Kim, Hwan-Kuk;Han, Seung-Wan;Seo, Dong-Il;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2151-2154
    • /
    • 2003
  • Internet is deeply rooted in everyday life and many things are performed using internet in real-world, therefore internet users increased because of convenience. Also internet accident is on the increase rapidly. The security vendor developed security system to protect network and system from intruder. Many hackings can be prevented and detected by using these security solutions. However, the new hacking methods and tools that can detour or defeat these solutions have been emerging and even script kids using these methods and tools can easily hack the systems. In consequence, system has gone through various difficulties. So, Necessity of intruder trace-back technology is increased gradually. Trace-back technology is tracing back a malicious hacker to his real location. trace-back technology is largely divided into TCP connection trace-back and IP packet trace-back to trace spoofed IP of form denial-of-service attacks. TCP connection trace-back technology that autonomously traces back the real location of hacker who attacks system using stepping stone at real time. In this paper, We will describe watermark trace-back system using TCP hijacking technique to supplement difficult problem of connection maintenance happened at watermark insertion. Through proposed result, we may search attacker's real location which attempt attack through multiple connection by real time.

  • PDF

디지털시대의 농업기술센터의 커뮤니케이션 전략 (Communication Strategies for Agricultural Technology Center in the Digital Age)

  • 이채식;서규선
    • 농촌지도와개발
    • /
    • 제7권2호
    • /
    • pp.295-306
    • /
    • 2000
  • The objectives of this paper were to review the difference between the analog and digital age, and to suggest new communication strategies for Agricultural Extension Service Centers in the digital age. Literature review and discussion on the information age and its supporting technologies, such as the Internet and other digital tools, has enabled communication to occur during time periods and in locations based upon individual needs. With increasing number of internet subscribers using email and the world wide web, the internet is now considered a new mass media for communication, and may soon consider such electronic connectivity as essential in agricultural extension services. Communication strategies in the future should recognize and adapt to the changing needs farmers and extension educators in the information age. Utilization of internet technology and digital tools in communication may attract and retain farmers and extension educators in the future, thus. some of new strategies for communication in agricultural extension services should include the following; 1) traditional linear model should be change into interactive model in communication. 2) Agricultural extension service should include creative role with diffusion process. 3) Agricultural extension service should establish new receiver paradigm and form new partnership with farmer.

  • PDF

전자상거래상의 인터넷 에스크로 서비스의 규제에 관한 연구 (A Study of Regulating Internet Escrow Services in Electronic Commerce)

  • 김정곤
    • Journal of Information Technology Applications and Management
    • /
    • 제11권2호
    • /
    • pp.215-226
    • /
    • 2004
  • As with the fast spread of internet uses in recent years, electronic commerce has evolved. The proliferation of electronic commerce has increased diverse forms of fraud cases since internet helps intended criminals remain anonymous. In absence of effective tools to warrant the reliability of parties offering products or services through electronic commerce, consumers have to absorb damages unfairly. Internet escrow service has been considered to be an option to establish reliability between buyers and sellers and to protect consumers from possible fraud cases. However, like other industries, fraudulent escrow services have appeared in internet. This study has been intended to analyze fraudulent internet escrow services and to propose an effective regulatory system of internet escrow services. To do that, this study benchmarked the regulation of the State of California, primarily focusing on the formation of escrow company, regulation of escrow business, and remedies for wrongdoing, so Korea can consider the adoption of similar systems.

  • PDF