Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Other Computer Sciences

Defense Of A Small Network, Isabella Adkins Jan 2023

Defense Of A Small Network, Isabella Adkins

Williams Honors College, Honors Research Projects

A sample network will be virtually created consisting of three routers, one switch, and three hosts. The network will be secured using various methods such as enabling passwords and encryption. After the network has been properly secured, various attacks will be attempted with the goal of breaking into the network. These attacks include reconnaissance (gathering information), penetrating the network using the tool Metasploit, and attempting to get a credential phishing email to end users. If successful in the attacks, the network will be revisited and analyzed for any weaknesses or oversights.


Discord Api Wrapper, Joshua Brown Jan 2023

Discord Api Wrapper, Joshua Brown

Williams Honors College, Honors Research Projects

Discordwrap is a Python library that abstracts the Discord API so that developers can easily integrate their existing projects with Discord. This paper outlines Discordwrap's creation, from start to finish, including implementation as well as key design decisions, such as the decision to provide a functional library interface rather than an object-oriented one.


Small Business Office Network, Michael Gerome Jan 2023

Small Business Office Network, Michael Gerome

Williams Honors College, Honors Research Projects

This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …


Exploration Of Digital Synthesis, Angelo Indre Jan 2023

Exploration Of Digital Synthesis, Angelo Indre

Williams Honors College, Honors Research Projects

“An Exploration of Digital Synthesis” is a comprehensive investigation into the world of digital audio and music production. The paper explores the fundamental concepts of sound synthesis, including MIDI, virtual instruments (VSTs), and the JUCE framework. The central focus of the paper is the implementation of a custom synthesizer, which serves as a case study for the practical application of digital synthesis. The paper addresses the key question of how to create a functioning synthesizer from scratch, providing detailed insights into the programming and design process. Overall, the paper represents a significant contribution to the fields of digital audio and …


A Different Way To Penetrate Nba Defenses, Trey Trucksis Jan 2023

A Different Way To Penetrate Nba Defenses, Trey Trucksis

Williams Honors College, Honors Research Projects

This project proposal will document the design, configuration, and penetration testing of a network consisting of three routers (labeled as Lakers, Celtics, Cavaliers), one switch (labeled as NBA), and three end devices (labeled as Kali, Windows 10, and Ubuntu) each connected to one of three routers present on the network. Each router will be attached to a different subnet on the network. The network will be secured using encrypted passwords on the router interfaces, OSPF MD5 authentication between the routers, port security on the switch, as well as Access Control Lists to to control the privileges of each subnetwork accordingly. …