Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

After Conversation - A Forensic Icq Logfile Extraction Tool, Kim Morfitt, Craig Valli Jan 2005

After Conversation - A Forensic Icq Logfile Extraction Tool, Kim Morfitt, Craig Valli

Research outputs pre 2011

Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the logfiles from such programs are of forensic interest. This paper outlines research in progress that has resulted in the development of a tool for the extraction of ICQ logfile entries. Detailed reconstruction of data from logfiles was achieved with a number of different ICQ software, with other programs still to be tested. There are several limitations including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to address …


Taxonomy Of Wrt54g(S) Hardware And Custom Firmware, Marwan Al-Zarouni Jan 2005

Taxonomy Of Wrt54g(S) Hardware And Custom Firmware, Marwan Al-Zarouni

Research outputs pre 2011

This paper discusses the different versions of hardware and firmware currently available for the Linksys WRT54G and WRT54GS router models. It covers the advantages, disadvantages, and compatibility issues of each one of them. The paper goes further to compare firmware added features and associated filesystems and then discusses firmware installation precautions and ways to recover from a failed install.


Nitrate Reductase Activity In Macroalgae And Its Vertical Distribution In Macroalgal Epiphytes Of Seagrasses, Erica Young, Paul Lavery, Beverley Van Elven, Mat Dring, John A Berges Jan 2005

Nitrate Reductase Activity In Macroalgae And Its Vertical Distribution In Macroalgal Epiphytes Of Seagrasses, Erica Young, Paul Lavery, Beverley Van Elven, Mat Dring, John A Berges

Research outputs pre 2011

Macroalgal epiphytes within seagrass meadows make a significant contribution to total primary production by assimilating water column N and transferring organic N to sediments. Assimilation of NO3 – requires nitrate reductase (NR, EC 1.6.6.1); NR activity represents the capacity for NO3 – assimilation. An optimised in vitro assay for determining NR activity in algal extracts was applied to a wide range of macroalgae and detected NR activity in all 22 species tested with activity 2 to 290 nmolNO3 – min–1 g–1 frozen thallus. With liquid-N2 freezing immediately after sample collection, this method was practical for estimating NR activity in field …


Blackhat Fingerprinting Of The Wired And Wireless Honeynet, Suen Yek Jan 2005

Blackhat Fingerprinting Of The Wired And Wireless Honeynet, Suen Yek

Research outputs pre 2011

TCP/IP fingerprinting is a common technique used to detect unique network stack characteristics of an Operating System (OS) . Its usage for network compromise is renowned for performing host discovery and in aiding the blackhat to determine a tailored exploit of detected OSs. The honeyd honeynet is able to countermeasure blackhats utilising TCP/IP fingerprinting via host device emulation on a virtual network. Honeyd allows the creation of host personalities that respond to network stack fingerprinting as a real network would. The nature of this technique however, has shown to provide inconsistent and unreliable results when performed over wired and wireless …


How To Build A Faraday On The Cheap For Wireless Security Testing, Suen Yek Jan 2005

How To Build A Faraday On The Cheap For Wireless Security Testing, Suen Yek

Research outputs pre 2011

The commonly known security weaknesses associated with the 802.11b wireless standard have introduced a variety of security measures to countermeasure attacks. Using a wireless honeypot, a fake wireless network may be configured through emulation of devices and the TCP/IP fingerprinting of OS network stacks. TCP/IP fingerprinting is one of the most popular methods employed to determine the type of OS running on a target and this information can then be used to determine the type of vulnerabilities to target on the host. Testing the effectiveness of this technique to ensure that a wireless honeypot using honeyd may deceive an attacker …