• Title/Summary/Keyword: PC Internet

Search Result 752, Processing Time 0.028 seconds

An Analysis of Security Problem against Wireless Network in Smartphone (스마트폰 상에서 무선 네트워크 보안 문제점 분석)

  • Kim, Ki-Hawn;Lee, Young Sil;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.383-386
    • /
    • 2014
  • Due to the development of communication technology, a conventional major business through PC, laptop or Tablet PC can be performed via a smartphone and it is increasing the user's convenience. At this point, the user prefers to connect to the Internet using the wireless network because it occurs an additional charge according to the amount of data to be transmitted when using a data communication through 3G or 4G. However, when using a wireless network, there is a possibility of several attacks such as easily steal or modulate the information from the outside or to gain access to personal information stored in the user's smartphone with man-in-the-middle attacks by using the fake AP. IIn this paper, we describe how you can detect the AP when you use LAN of the smartphone, were analyzed for this vulnerability, has not been approved. Furthermore, Also, we discuss ways which can enhance the security when user the access to the internet services (i.e., internet, public/private cloud service, etc.) via wireless network in smartphone.

  • PDF

Analysis of the Password Leaking in Virtual Keyboard (가상키보드 비밀번호 유출 분석)

  • Yang, Hee-dong;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.827-835
    • /
    • 2022
  • In order to use online financial services, user authentication technology is necessary. Password check through keyboard typing is the most common technique. However, since it became known that key stokes on the keyboard can be intercepted easily, many Internet banking services and easy payment services have adopted the virtual keyboard. However, contrary to the expectation that the virtual keyboard will be safe, there is a risk that key strokes on the virtual keyboard can be leaked. In this paper, we analyzed the possibility of password leaking on the virtual keyboard and presented a password leaking method using mouse event hooking and screen capture in PC operating system. In addition, we inspected the possibility of password leak attacks on several famous Korea Internet banking websites and simple payment services, and as a result, we verified that the password input method through the virtual keyboard in the PC operating system is not secure.

A study about factors influencing on internet advertising effects -Focus on consumer characteristics- (인터넷 의류광고 태도에 미치는 영향요인 연구 -소비자특성 중심으로-)

  • Ko, Eun-Ju;Mok, Bo-Kyoung
    • Journal of Global Scholars of Marketing Science
    • /
    • v.7
    • /
    • pp.283-302
    • /
    • 2001
  • The purpose of this study was to examine the current situation about the internet usage and advertisement attitude, to investigate the relationship between consumer characteristics and internet advertising effect, and to identify the moderating effect of consumer characteristics on the relationship between advertising types and advertising effects. For the study, a sample of 152 apparel consumers participated in this survey research. The survey of design with a questionnaire was employed. Questionnaire was developed with the html language and data collection was done at Korea though the internet on October 2000. For data analysis, descriptive statistics (i.e., frequency, percent), ANOVA with duncan tests were used. First, the major place of using internet was found as home, company, school, PC room in order and the average time of using internet was found as three times weekly. The major purpose of using internet were information search, e-mail, PC communication and program-download. The experience of internet fashion advertising was high. Second, consumer characteristics(age, job) had significant effects on attitude to the product. 20 years-old age group and specialist group were found to influence on the higher attitude toward product. Third, main effects of consumer characteristics(age, job) were found to be significant. The correlation and interaction effects of consumer characteristics and internet advertisement types were not significant.

  • PDF

Design and Implementation of Wireless Network based On-line Realtime Game Contents (무선 네트워크 기반의 온라인 실시간 게임 콘텐츠 설계 및 구현)

  • Kim, Yu-Doo;Moon, Il-Young;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.2
    • /
    • pp.217-222
    • /
    • 2007
  • Recently PC games are trending toward online. But, mobile games are not using network actively. Because there are two problems that low speed of mobile network and low specification of mobile device in wireless internet environment. But, solving problems by these started HSDPA services and increased performance of devices. In this paper, we implement mobile on-line real time game for develop mobile network in wireless internet environment.

  • PDF

The Design and Implementation of remote measurement using Internet Embedded Module (인터넷 엠베디드 모듈을 이용한 원격 계측의 설계와 구현)

  • Lee, Hee-Young
    • Journal of the Korea Computer Industry Society
    • /
    • v.9 no.5
    • /
    • pp.183-190
    • /
    • 2008
  • Recently, according to development of information-oriented society, internet application technology on electricity electron controled technology fields are diversified and the necessity of remote measurement by internet is gradually increased. In this paper, to meet in these necessity we design and implementation of remote measurement system using internet embedded module, which was developed for on-line measurement of various kinds of analogue data. This system is consisted of two parts greatly, hardware module for measurement and software module to control it. The advantage of this system is that users can acquisition the remote data of temperature and illumination etc. without extra serve pc easily. In order to test the validity of the proposed system, we examine the response and operating characteristic about several states. As a result of the test, we proved the effectiveness of it.

  • PDF

A System of Software Asset Management in Company using the Server (서버를 이용한 사내 소프트웨어 자산관리 시스템)

  • Lee, Young Gyo;Park, Jin Kyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.1-12
    • /
    • 2013
  • Illegal software use have been abroad through online (internet) and offline (CD, DVD, USB, etc.). It infringes intellectual property rights and weakens the will to software development. Also, it generates the software errors and virus intrusion in PC. It hinders national software industry and induces the personal and national trade friction. Many group (company, office, organization, institution, etc.) have been realized the prohibition of illegal software use. But, it is too hard to monitor and control illegal software use. In this paper, we propose a method of software management in a group. A software module of client agency is installed in all PC of the group. A main server of the software management controls the all of the PC through the communication. The server blocks the install of illegal software, permits the install / use of honest goods software, monitors the license (term, amount) in all the PC. The system prevents errors of illegal software use, all cuts the virus intrude through the illegal software, improves the performance of PC relatively.

A Study on the Automatic Measurement at an Unmanned Measuring Station Using Image Processing and Wireless Networks (화상처리 및 무선네트워크를 이용한 무인 측정 지점에서의 원격 계측 자동화에 관한 연구)

  • Lee, Han-Jun;Cha, Myung-Suk;Lee, Choong-Hoon
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.16 no.3
    • /
    • pp.15-22
    • /
    • 2007
  • An automatic measurement system which collects experimental data at an unmanned station where the networking to the internet could not be accessed was developed. With a Robo-rail accessing to the unmanned station, wireless local networking between server PC at the Rob-rail and client PC at the unmanned station is possible within 30 m from an access point equipment located at the unmanned station. An algorithm for transferring the data file which is saved in the client PC at the unmanned station to the server PC in the Robo-rail was proposed. IEEE-1394 camera was used to collect the data at the client PC. An extracting program from the IEEE-1394 captured images to character data and number data was developed using image processing technique, which drastically reduces the size of data file comparing to that of the raw image file.

PC remote control system using wireless Internet and PDA Design (무선 인터넷과 PDA를 이용한 PC 원격제어 시스템 설계)

  • 민경왕;박성순
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11b
    • /
    • pp.774-777
    • /
    • 2003
  • 사람들은 종종 시를 다투는 업무를 접할 때, 작업할 문서를 집이나 사무실에 두고 오는 실수를 범하는 경우가 있다. 이런 경우를 대비하여 항상 노트북을 준비한다거나, 항상 집에 사람을 대기시켜 놓고 필요할 때마다 심부름을 시킬 수는 없는 노릇이다. 그래서 요즘 노트북에서 PDA, 이동전화기 같은 매체들이 이동 중에도 업무를 할 수 있는 이점 때문에 이 분야에 많은 관심이 증가하고 있고, 사용되어진다. 어떻게 하면 PDA와 같은 제한된 사양에서 우리가 사용하고 있는 PC와 같은 성능을 발휘할 수 있을지, 효과를 극대화 하기 위하여 많은 Solution이 나오고 있는 실정이다. 본 논문에서는 무선 인터넷을 이용하여 선이 있는 고정의 상태가 아닌, 이동중의 상황에서도 통신이 가능한 PDA의 특성을 활용하여 서로 다른 매체인 PC와 PDA를 사용한 상호 통신에 대한 것과, PC의 바탕화면 공유 및 입력장치 제어를 PDA에서 가능하게 하기 위한 방법을 제안한다.

  • PDF

Development and Evaluation of Key Recovery System for Secure Recovery of Cryptographic Files in PC (PC상의 암호파일의 안전한 복구를 위한 키복구 시스템의 개발 및 평가)

  • 장수진;고정호;이강수
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.167-186
    • /
    • 2002
  • The encryption of a file on a PC before saving can maintain security of the file. However, if the key for the encrypted file is lost or damaged, the encrypted file can not be decrypted, resulting in serious economical loss to the user or the user group. In order to minimize the economical loss a secure and reliable key recovery technology is required. Presented in this paper is the development and evaluation of PKRS (PC based Key Recovery System) which supports encryption and decryption of file and recovery of the encrypted file in emergency. The encapsulating method, which attaches key recovery information to encrypted file, is applied to the PKRS. In addition, the PKRS is developed and evaluated according to the requirements of Requirements for Key Recovery Products proposed by NIST and requirements of Common Criteria 2.0 to prove the safety and reliability of the information security system. This system is applicable to a PC and can be further extended to internet or intranet environment information system where in encryption and recovery of file is possible.

  • PDF