tag:blogger.com,1999:blog-49075957345199398932024-03-19T04:47:37.399+01:00Dr. Vleju Mircea BorisBmvBoorishttp://www.blogger.com/profile/08023922807759243722noreply@blogger.comBlogger11125tag:blogger.com,1999:blog-4907595734519939893.post-58420114266111027212015-12-04T09:58:00.000+01:002015-12-04T10:00:52.309+01:00Meet CaesarOur new dog, Caesar<br />
<br />
<br />
<a href="http://gfycat.com/KindUncommonChital">http://gfycat.com/KindUncommonChital</a>BmvBoorishttp://www.blogger.com/profile/08023922807759243722noreply@blogger.com0tag:blogger.com,1999:blog-4907595734519939893.post-73105582817854961782015-10-19T18:48:00.001+02:002015-10-19T19:14:16.424+02:00My PhD Thesis - Client-Centric Identity and Access Management in Cloud ComputingYou can find a version of my PhD thesis on the <a href="http://goo.gl/hSESTq">JKU website</a>. My PhD thesis is titled <a href="https://app.box.com/s/6rdx4y2xmi31afpovqfh1318o74m8p5e">Client-Centric Identity and Access Management in Cloud Computing</a>. I will post both the English and German Abstracts before linking the embedded version of the thesis.<br />
<br />
<a name='more'></a><br />
<h2 style="text-align: center;">
Abstract</h2>
The adoption of cloud computing technologies has seen a great growth in recent years.<br />
Cloud computing-based infrastructures present many advantages over traditional infrastructures<br />
(reduced costs, higher flexibility, on-demand services, rapid elasticity, etc.).<br />
While cloud computing boasts other advantages it should be noted that the adoption of<br />
cloud-based services comes with disadvantages, such as: loss of governance, provider<br />
lock-in, technical and legal issues, security and privacy issues.<br />
<br />
The purpose of this thesis is to investigate the Identity and Access Management<br />
(IAM) interactions between clients and cloud providers from a client-centric perspective<br />
and to propose solutions that would aid clients in using cloud-based services. With<br />
respect to IAM several issues were discovered: loss of control (the client no longer<br />
has control over where the data is stored and what the service provider does with it),<br />
the provider’s need to control the customer experience (leading them to ask for more<br />
information than required), the competitive cloud markets and threat of provider lock-in<br />
(leading clients to use multiple providers), user provisioning and de-provisioning across<br />
several providers, managing sensitive data and password fatigue across multiple service<br />
providers and the increased thread of social engineering attacks.<br />
<br />
The problems presented above can be mitigated by adopting a client-centric approach<br />
to IAM in cloud computing. To achieve this, the client-to-cloud interactions<br />
with respect to all aspects of IAM were studied and three distinct scenarios proposed:<br />
the direct interaction scenario (where the user is restricted to using the cloud provider’s<br />
IAM system), the obfuscated interaction scenario (where the client can choose between<br />
real identities and obfuscated or partially obfuscated ones which help protect sensitive<br />
identity information) and the protocol-based interaction scenario (which makes use of<br />
existing Federated Identity Management protocols to aid in authentication and authorization).<br />
With these detailed interaction scenarios a client-centric IAM meta-system<br />
will be introduced.<br />
<br />
The Identity Management Machine (IdMM) represents the main contribution of<br />
the thesis. The IdMM is a client-centric IAM meta-system, based on Abstract State<br />
Machines (ASMs). The system acts as a middleware between a client (represented by<br />
a company hosting a private identity directory) and the various cloud providers used.<br />
The IdMM is a Single Sign-On (SSO) service that automatically authenticates and authorizes<br />
a user to a given service. The advantage of the SSO approach is that users are<br />
not aware of their credentials to the cloud services thus diminishing the risk of phishing<br />
attacks. In the protocol-based interaction the IdMM acts as an identity provider while<br />
in the direct case the IdMM synchronizes the information stored on cloud services with<br />
the data stored in the client’s directory. User provisioning and de-provisioning (both on<br />
the cloud and on the client’s side) is handled automatically by the system. Periodically the cloud-based credentials are reset for a more secure interaction. Clients can also retrieve<br />
log activities for audit purposes. The IdMM is composed of several agents each<br />
responsible with the interaction between the system and the actors involved (users, the<br />
client’s directory, the cloud’s IAM system).<br />
<br />
While the adoption of the IdMM will help clients with the IAM related aspects of<br />
using cloud services other aspects must also be taken into account. A more detailed look<br />
at the generic interaction between client and clouds has to be specified. Other issues,<br />
such as legal and contracting issues with respect to Service-Level Agreements (SLAs),<br />
adaptation to end devices and security monitoring must also be mitigated. As such, the<br />
IdMM functions as both an stand-alone system and as a system within a Client-Cloud<br />
Interaction Middleware (CCIM) solution. In the CCIM solution the IdMM represents<br />
one of the key components next to security and SLA monitoring components as well as<br />
content adaptation and service negotiation components.<br />
<br />
<h2 style="text-align: center;">
Kurzfassung</h2>
Der Einsatz von Cloud-Computing-Technologien ist in den letzten Jahren stark gewachsen,<br />
da Cloud-Computing-basierte Infrastrukturen viele Vorteile gegenüber traditionellen<br />
Infrastrukturen bieten (niedrigere Kosten, höhere Flexibilität, Services auf Abruf,<br />
rasche Anpassungsfähigkeit, etc.). Trotz der vielen Vorteile birgt die Einführung von<br />
Cloud-basierten Services auch Nachteile, wie etwa: Verlust der Kontrolle, Bindung<br />
an den Serviceanbieter, technische und rechtliche Fragen, und Sicherheits- und Datenschutzprobleme.<br />
<br />
Das Forschungsziel dieser Dissertation ist das Untersuchen der Interaktionen für<br />
Identitäts- und Zugriffsmanagement (IAM) zwischen Klienten und Services aus einer<br />
klientenzentrierten Perspektive und das Entwerfen von Lösungen, die den Klienten in<br />
der Verwendung von Cloud-basierten Services unterstützen. In Bezug auf IAM wurden<br />
mehrere Probleme identifiziert: Verlust der Kontrolle (ein Klient kann nicht mehr<br />
bestimmen, wo Daten gespeichert werden und wie der Serviceanbieter diese Daten<br />
verarbeitet), Optimierung des Kundenerlebnisses durch den Serviceanbieter (dadurch<br />
werden mehr Informationen als nötig erhoben), konkurrierende Cloud-Märkte und Gefährdung<br />
durch Anbieterbindung (die Klienten werden zur Nutzung mehrerer Anbieter<br />
gezwungen), Bereitstellung und Löschung von serviceanbieterübergreifenden Benutzerkonten,<br />
Verwaltung von sensitiven Daten und damit verbundener Passwortmüdigkeit<br />
über mehrere Serviceanbieter, und die verstärkte Bedrohung durch Social-Engineering-<br />
Angriffe.<br />
<br />
Die angeführten Probleme können durch eine klientenzentrierte Herangehensweise<br />
für IAM in Cloud Computing behandelt werden. Klient-Cloud Interaktion wurde<br />
in Bezug auf IAM untersucht, und drei Szenarien wurden erarbeitet: das direkte Interaktionsszenario<br />
(wo der Benutzer auf das IAM-System des Serviceanbieters beschränkt<br />
ist), das verschleierte Interaktionsszenario (wo der Benutzer zusätzlich aus echten, verschleierten<br />
und teils-verschleierten Identitäten auswählen kann) und das protokollbasierte<br />
Interaktionsszenario (wo auf bestehende Protokolle aus föderationsbasiertem<br />
Identitätsmanagement für Authentisierung und Autorisierung zurückgegriffen wird).<br />
Basierend auf diesen detaillierten Szenarien wird ein IAM Metasystem vorgestellt.<br />
<br />
Die zentrale Forschungsleistung dieser Dissertation ist die sogenannte Identity<br />
Management Machine (IdMM). Die IdMM ist ein klientzentriertes Metasystem modelliert<br />
mittels Abstract State Machines (ASM). Das System agiert als Middleware zwischen<br />
dem Klienten (repräsentiert durch ein Unternehmen, welches ein privates Identitätsverzeichnis<br />
betreibt) und den unterschiedlichen genutzten Serviceanbietern. Die<br />
IdMM ist ein Single Sign-On (SSO) Service, welches einen Benutzer für ein gegebenes<br />
Service automatisch authentisiert und autorisiert. Der SSO-Ansatz hat den Vorteil, dass<br />
die Benutzer ihre Zugangsdaten für Cloud-Services nicht kennen müssen und dadurch das Risiko von Phishing-Angriffen vermindert wird. In der protokollbasierten Interaktion<br />
agiert die IdMM als Identitätsprovider, und im direkten Interaktionsszenario synchronisiert<br />
die IdMM die Benutzerinformationen in der Cloud mit den lokal-gespeicherten<br />
Daten im Identitätsverzeichnis des Klienten. Bereitstellung und Löschung von Benutzern<br />
(in der Cloud und auf Seite des Klienten) wird automatisch durch das System<br />
durchgeführt. Periodisch werden die Cloud-basierten Zugangsdaten zurückgesetzt, um<br />
eine sichere Interaktion zu gewährleisten, und Klienten können protokollierte Aktivitäten<br />
für Auditierungszwecke abfragen. Die IdMM besteht aus mehreren Agenten,<br />
wobei jeder für eine bestimmte Interaktion zwischen dem System und den involvierten<br />
Aktoren (Benutzer, das Identitätsverzeichnis des Klienten, das IAM-System der Cloud)<br />
zuständig ist.<br />
<br />
Während die Einführung der IdMM den Klienten in den IAM-spezifischen Aspekten<br />
der Benutzung von Cloud-Services unterstützt, müssen weitere Aspekte berücksichtigt<br />
werden. Eine detailliertere Betrachtung der generischen Interaktion zwischen<br />
Klient und Clouds muss spezifiziert werden. Problematiken, wie etwa rechtliche und<br />
vertragliche Fragen in Bezug auf Service-Level-Vereinbarungen, Adaption an Endgeräte<br />
und Sicherheitsmonitoring müssen entsprechend behandelt werden. Daher funktioniert<br />
die IdMM sowohl als eigenständiges System als auch als Teilsystem einer<br />
Middleware-Lösung. In der Middleware-Lösung repräsentiert die IdMM eine Schlüsselkomponente<br />
neben Komponenten für Sicherheits- und Service-Level-Monitoring, Inhaltsaufbereitung<br />
und Serviceverhandlung.<br />
<br />
<br />
<iframe allowfullscreen="" frameborder="0" height="800" msallowfullscreen="" src="https://app.box.com/embed/preview/6rdx4y2xmi31afpovqfh1318o74m8p5e?theme=dark" webkitallowfullscreen="" width="600"></iframe>BmvBoorishttp://www.blogger.com/profile/08023922807759243722noreply@blogger.com0tag:blogger.com,1999:blog-4907595734519939893.post-39836849705851451052015-10-19T18:42:00.001+02:002015-10-19T19:14:24.798+02:00My Master Thesis - New Threats in Cloud ComputingI was unable to publish my master thesis because of a 5-year non diusclosure agreement with the company the sponsored me. Since that agreement expired you can have a look over my master thesis, entitled: <a href="https://app.box.com/s/1fuf96i39sfu761m3o661esldoru2m9y">New Threats in Cloud Computing - With focus on Cloud Misuse and Cloud Vulnerabilities from the Client Side</a><br />
<br />
<a name='more'></a><br />
<h2 style="text-align: center;">
Abstract</h2>
<br />
<i>With the continuous growth of Cloud Computing, more and more companies decide to</i><br />
<i>migrate to a Cloud-based solution. While the obvious advantages of Cloud Computing</i><br />
<i>are apparent, the disadvantages, especially concerning security, are not always so. We</i><br />
<i>will look at Cloud Computing from a Small or Medium Enterprise (SME) security point</i><br />
<i>of view. Security wise, such an Enterprise will have, without a doubt, a lot of concerns</i><br />
<i>when using Cloud Computing.</i><br />
<i><br /></i>
<i>The goal is to propose new Client-Side threats that can arise from a SME using Cloud</i><br />
<i>Computing, focusing on data leakage. The threats can then be mitigated from the</i><br />
<i>Client-Side, reducing the risks of data leakage, increased costs and loss of reputation.</i><br />
<i>The threats presented can be divided into two parts: Cloud Misuse threats and Cloud</i><br />
<i>Vulnerabilities threats. Cloud Misuse threats occur from a user (employee) misusing</i><br />
<i>the features offered in Cloud Computing. Such threats typically include performing</i><br />
<i>accidental or malicious operations on a particular Service. They can often lead to</i><br />
<i>increased costs for a SME when using Cloud Computing as Cloud Providers charge</i><br />
<i>Clients based on how much a Client uses a given Service. Cloud Vulnerability threats</i><br />
<i>are threats that occur on the Cloud-Side itself, because of a given vulnerability within</i><br />
<i>the Cloud, but that can be mitigated from the Client-Side to ensure the confidentiality</i><br />
<i>and availability of data. A common side effect of such threats is data leakage.</i><br />
<i><br /></i>
<i>In order to fulfill the above proposed goal we describe a typical architecture for a SME</i><br />
<i>when using Cloud Computing as well as an abstract view of Services within the Cloud.</i><br />
<i>We do this by introducing the concept of Cloud Tasks (Storage, Compute, Privacy and</i><br />
<i>Network Tasks) which represent an abstract depiction of operations (tasks) done within</i><br />
<i>the Cloud.</i><br />
<i><br /></i>
<i>Finally, we further detail some of the solutions suggested for the proposed threats. As</i><br />
<i>some of the threats have Encryption as a solution, we describe different encryption</i><br />
<i>methods and how they can be applied to our Cloud Computing scenario.</i><br />
<br />
<br />
<iframe allowfullscreen="" frameborder="0" height="800" msallowfullscreen="" src="https://app.box.com/embed/preview/1fuf96i39sfu761m3o661esldoru2m9y?direction=ASC&theme=dark" webkitallowfullscreen="" width="600"> </iframe>BmvBoorishttp://www.blogger.com/profile/08023922807759243722noreply@blogger.com0tag:blogger.com,1999:blog-4907595734519939893.post-43968154118197464712012-01-24T12:21:00.000+01:002012-01-24T12:24:44.547+01:00Security issue with Joomla 1.6<br />
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US"><a href="http://www.joomla.org/">Joomla</a> is a
well-known, widely used open source <a href="http://en.wikipedia.org/wiki/Content_management_system">CMS</a>. According to their website, 2.7
percent of the Web is running on Joomla. Its small download size, easy
installation and easy to use interface make it a top choice for a fast development
of a website. If you also add the fact that it runs on a PHP/MySQL environment
and that it supports a wide variety of plugins, you can see why Joomla is so
appreciated. <o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US">I have recently
used Joomla for a website I was developing these past few months. I must say
that if you are thinking of using it for deploying a website fast and easily I would
recommend it. However, it is my personal opinion that to get a great look and
fell as well as to add some more complex functionalities you would need some
basic <a href="http://www.w3schools.com/cssref/default.asp">CSS</a>/<a href="http://www.w3schools.com/html/default.asp">HTML</a>/<a href="http://www.w3schools.com/php/default.asp">PHP</a> knowledge. For more complex functionalities you will
actually need to go in the source code sometimes which entails a good if not excellent
understanding of PHP. The good part is that, being open source, there is a
detailed documentation as well as a large community which can help you if you
run into any problems.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US">While I was
working on the website I discovered a very interesting bug which turned out to
be a very big security flaw. Note that this applies if you have more than one
user with admin privileges or which can access the global configuration
component in the administrator backend. </span><br />
<a name='more'></a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIASRZmy1mWMoHnGXQdDJIwr8PYQnlukqzibJ2SLL5F-ZMtWCjj-Cn9q-_IEE-Z5xCSUyZVTR1gYu4_8NtJOMG_NtmflIpDQEQIytJxR4OFGE7JzJVnJaYyDuKd0ma4C8qOSOb22NOTUM/s1600/joomla_issue_1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIASRZmy1mWMoHnGXQdDJIwr8PYQnlukqzibJ2SLL5F-ZMtWCjj-Cn9q-_IEE-Z5xCSUyZVTR1gYu4_8NtJOMG_NtmflIpDQEQIytJxR4OFGE7JzJVnJaYyDuKd0ma4C8qOSOb22NOTUM/s640/joomla_issue_1.jpg" width="600" /></a></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US">The Joomla installation I was working
on was installed by somebody else within my organization. As such I was allowed
admin access so I can develop the website. When I went to the <a href="http://docs.joomla.org/Help16:Site_Global_Configuration">Global Configuration</a> page I noticed that <a href="http://www.mozilla.org/en-US/firefox/new/">Firefox</a> kept asking me to save my password. I
initially refused it as I do not allow any browser to save any of my passwords
(hence why I use <a href="http://bmvbooris.blogspot.com/2011/05/keepass-password-safe.html">KeePass</a>). After some
time I started to wonder why would this component asking me to save a password
(since I did not enter any) so using <a href="http://getfirebug.com/">Firebug</a> I searched through the <a href="http://en.wikipedia.org/wiki/Document_Object_Model">DOM</a>. I
found the following DOM element used to store the password for the <a href="http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol">SMTP</a> server
of the super-admin. And sure enough the password was stored as plain text in
the value attribute of the DOM element. </span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg80TaqUl0f-WixGB9UhjqwzOow06jeyApGMvq1mQaJ0J6_9xYJE__CLsgCzxxe7UtREO7GU0XjFyiAkKP-YfnW_8DFImDFwXYFZeqrSzWKq8gk9dImtWMp_2aQnM9Op-XSph35-1xtvKM/s1600/joomla_issue_2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg80TaqUl0f-WixGB9UhjqwzOow06jeyApGMvq1mQaJ0J6_9xYJE__CLsgCzxxe7UtREO7GU0XjFyiAkKP-YfnW_8DFImDFwXYFZeqrSzWKq8gk9dImtWMp_2aQnM9Op-XSph35-1xtvKM/s640/joomla_issue_2.jpg" width="600" /></a></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US">Now let’s do some basic logic: how
many of you use a different password for the SMTP, <a href="http://en.wikipedia.org/wiki/IMAP">IMAP</a>/<a href="http://en.wikipedia.org/wiki/POP3">POP3</a> and webmail
interfaces? Probably very few. So using this system I managed to have complete
access to super-admin’s mail application. Using these credentials I actually
got access to the entire system used by our organization. Of course I did not
really accessed it; rather I sent the super-admin a message to tell him of what I found.
<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US">Anyways
super-admins take care. Even if you have different passwords another admin can
still get access to your SMTP account which means he can send spam using your
credentials. The only solution that I see (other than an update by Joomla) is
to restrict access to the Global Configuration Component to only super-admin.<o:p></o:p></span></div>BmvBoorishttp://www.blogger.com/profile/08023922807759243722noreply@blogger.com0tag:blogger.com,1999:blog-4907595734519939893.post-54885501428370489272011-06-28T09:42:00.000+02:002011-06-28T09:42:39.055+02:00Image based authentication<div style="text-align: justify;">
I found a very interesting <a href="http://www.usenix.org/events/sec00/full_papers/dhamija/dhamija_html/">paper</a> about a very different authentication method as opposed to what is used today. The basic idea is to forget about passwords and rather select a set of images that will be presented to a user when he wants to log in together with a set of decoy images. The user selects the appropriate images and the login is done via selecting only the correct images.</div>
<br />
<div style="text-align: justify;">
They claim that this system is more useful then traditional username-password mechanisms as it is easier for a person to remember images rather then complicated text. They also claim that "password" recovery would be made easier via this method. It would have been nice to see some well-known services using such a system. However, to my knowledge, no such authentication methods are in use. </div>
<br />
<div style="text-align: justify;">
Furthermore, such a system would render password managers obsolete, as, from what I understood in the paper, it would be very hard to store the images used for login. And to prevent the same type of problems that exists in password based systems you would have to choose different images. Maybe for just one account this would be great, but for multiple user accounts it would be hard. </div>
<br />
<div style="text-align: justify;">
I would really like some opinions of such an authentication method. Please feel free to comment.</div>
BmvBoorishttp://www.blogger.com/profile/08023922807759243722noreply@blogger.com0tag:blogger.com,1999:blog-4907595734519939893.post-22258339374013314052011-06-21T10:53:00.002+02:002011-06-21T10:54:32.070+02:00Dropbox drops security<div style="text-align: justify;">
I came across a very interesting piece of news today. For about 4 hours you could log in to a <a href="http://blog.dropbox.com/?p=821">Dropbox</a> account using only the username and with any password. This, once again, brings back to light the main problem in Cloud Computing: The loss of control. As a user, you are totally dependent on the Cloud Provider (in this case <a href="http://www.dropbox.com/">Dropbox</a>) to manage your data. It's a great most of the time, as you don't have to bother with all configurations - including security. But it does have its downside. If the Provider does some bad PooPoo you have no way of protecting the data. </div>
<br />
<div style="text-align: justify;">
On a personal note, I think Hussein Fahmy, Amalia Brad and I are especially proud of the fact that we foresaw something like this occurring. In my master thesis, <b><i><a href="http://bmvbooris.blogspot.com/2010/06/at-lastmy-greatest-workcompleted.html">"New Threats in Cloud Computing With focus on Cloud Misuse and Cloud Vulnerabilities from the Client Side"</a></i></b>, I actually presented a threat called Isolation Failure. The presumption was exactly what happened with Dropbox. An attacker somehow manages to gain access to the data stored on the cloud due to a vulnerability in the Cloud Provider. At that point, it was all based on presumptions as no such case had yet happened. Until <b>now</b>. What happened to Dropbox is exactly the way I described the scenario in my Thesis. I am particularly happy of the solution described in <a href="http://lifehacker.com/5813861/dropbox-accidentally-unlocked-all-accounts-for-4-hours">Lifehacker</a> as I gave the same solution to the threat in my thesis. So, in essence Dropbox just gave me a proof of concept for one of my suggested Threats.</div>
<br />
<div style="text-align: justify;">
I am curious to see what the repercussions of this "accident" will be. Will people actually listen and start to also think of the client-side of Cloud Computing? Will providers also inform clients that their data is not entirely safe? Will they inform them that malware on their machine will still leave to data-loss? </div>
<br />
<div style="text-align: justify;">
When I first began my studies in this field I was a bit unsure as to the feasibility and need to provide security on the Client-Side when using Cloud Computing. Now, more than ever, I am convinced that I have chosen the correct path in my studies.<br />
<br />
<br />
<div class="MsoNormal">
<span lang="EN-US">Finally I
am eager to find out what just happened? Dropbox says they “ made a code
update”. From where I’m standing it’s a code downgrade. Did they just comment
the part of the code that checked the credentials of the user? As far as I
know, Dropbox is built on top of Amazon S3 so I am also wondering if this
vulnerability was propagated there as well. Anyways, I am looking forward to
seeing what exactly happened. <o:p></o:p></span></div>
</div>
BmvBoorishttp://www.blogger.com/profile/08023922807759243722noreply@blogger.com1tag:blogger.com,1999:blog-4907595734519939893.post-1309693444517898722011-05-18T12:44:00.001+02:002011-05-18T13:26:40.661+02:00KeePass Password Safe<div class="separator" style="clear: both; text-align: center;"><a href="http://keepass.info/images/plockb75.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://keepass.info/images/plockb75.gif" /></a></div><br />
<div style="text-align: justify;">As promised in a previous <a href="http://bmvbooris.blogspot.com/2011/05/keep-your-friends-close-and-your.html">post</a>, I am now going to further detail KeePass and give some arguments on why I like using it. For more information please refer to the KeePass <a href="http://keepass.info/">website</a>.</div><br />
<div style="text-align: justify;">So, what is KeePass? KeePass is an open source password manager. This means it's a <b><i>free </i></b>application used to store user credentials. However, once you begin using it, you will find it can do much more than just store passwords. The nice thing about KeePass is that you can find a build/implementation for just about any OS out there. The different implementations are available for download <a href="http://keepass.info/download.html">here</a>. Note that there is also a portable version if you don't have access rights to install the application, or if you wish to keep the entire application on an USB stick.</div><br />
<span class="Apple-style-span" style="font-size: large;"><b>How KeePass works</b></span><br />
<br />
<a name='more'></a><br />
<br />
<div style="text-align: justify;">The user credentials are stored in database files which are then encrypted using one master password and a Key file. The database files have the .kdbx or .kdb file extensions. As any keen Microsoft Office user will tell you, adding an "x" to the end of the extension makes the corresponding file less crappy and much, much cooler. KeePass 2 for Windows uses the .kdbx file extension. Unlike Ms. Office, however, you can easily import and export KDB files without having to worry about data loss.</div><br />
<div style="text-align: justify;">When creating a new database you will be prompted to choose a password and a key file. Both will be used to lock the database. I particularly like how the key file is generated (see image below). Prompting you to move the mouse just gives a feel of more randomness then just generating some values and sowing them to the user. I don't think I have to mention why you should NOT share this key with anyone.</div><div class="separator" style="clear: both; text-align: center;"><a href="http://keepass.info/screenshots/getrand.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://keepass.info/screenshots/getrand.jpg" /></a></div><div class="separator" style="clear: both; text-align: left;"><br />
</div><div style="text-align: justify;">The last step in creating the database file is to choose a master password. Trust me, this is difficult. Obviously, you need to choose a strong password here. But, also think that you will have input this password many times a day, sometimes using on-screen keyboards. I would recommend a password that can be typed as ergonomically as possible.</div><br />
<div style="text-align: justify;">So now that the database is created you can start adding entries in it. You can create groups, subgroups for passwords (e.g. Social Network group, email group, etc.). You can change the icon of each group to a predefined icon used by KeePass or to custom icons (this features is actually really nice). When creating a group also check the <u><b>Auto-Type</b></u> tab, as any entry created in this group will inherit this Auto-Type.</div><br />
<div style="text-align: justify;">The next step is to add the actual entries. For each entry you can add the title, username, password, URL (here it is preferable to add the URL where you will perform the login: <a href="https://www.google.com/accounts/ServiceLogin">https://www.google.com/accounts/ServiceLogin</a> instead of simply <a href="http://www.google.com/">http://www.google.com</a>) some notes about the entry and a date when the entry (or password) expires. Like with the key file, KeePass has a really nice and powerful password generator.</div><div class="separator" style="clear: both; text-align: center;"><a href="http://keepass.info/screenshots/keepass_2x/addentry.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://keepass.info/screenshots/keepass_2x/addentry.png" /></a></div><div class="separator" style="clear: both; text-align: center;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="http://keepass.info/screenshots/keepass_2x/pwgen.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://keepass.info/screenshots/keepass_2x/pwgen.png" /></a></div><div class="separator" style="clear: both; text-align: center;"><br />
</div><br />
<br />
<div style="text-align: justify;">The <u><b>Advanced</b></u> tab allows you to add more information about the entity. You can add String fields and file attachments. For example, if you have mobile phone contract, you can add the PIN and PUK as strings (I would select the "enable in memory protection" option) and the contract as a PDF attachment. All the values inserted here will be encrypted.</div><br />
<div style="text-align: justify;">The <b><u>Properties</u></b> tab allows you to choose properties like the background and foreground colors, etc. The <b><u>Auto-Type</u></b> tab is very important as it allows you to choose what actions should be taken on Auto-Type. The default one is {USERNAME}{TAB}{PASSWORD}{ENTER} (just like you would do if you want to login). You can make your custom auto-types as well (like {PASSWORD}{ENTER} if just need to type the password). The final tab presents a history of the entity.</div><br />
<div style="text-align: justify;">Once you finished adding all your passwords, it's time to start using KeePass. When an application asks you for your credentials press <b>Ctrl+Alt+K</b> and the KeePass window will pop up. Select the appropriate entry and press <b>Ctrl+V</b> and the auto-type will be performed. Here are the most important shortcuts</div><ul><li style="text-align: justify;"><b>Ctrl+Alt+K</b> - Show KeePass window</li>
<li style="text-align: justify;"><b>Ctrl+V</b> - Perform auto-type</li>
<li style="text-align: justify;"><b>Ctrl+B</b> - Copy username to clipboard</li>
<li style="text-align: justify;"><b>Ctrl+C</b> - Copy password to clipboard (note that after a given number of seconds it will be erased from the clipboard)</li>
<li style="text-align: justify;"><b>Ctrl+U</b> - Open entry's URL in default browser</li>
</ul><div><b><span class="Apple-style-span" style="font-size: large;">Settings I recommend</span></b><br />
<br />
<div style="text-align: justify;">Just installing KeePass won't be enough to protect yourself. Here are some settings I recommend in order to make KeePass more secure and easier to use (to open the setting go to <b><i>Tools-Options</i></b>):</div><div style="text-align: justify;"><br />
</div><br />
<ul><li style="text-align: justify;">Under the <b><u>Security</u></b> Tab</li>
<ul><li style="text-align: justify;"><b><i>Lock workspace after KeePass inactivity</i></b> - Select this one. I left the default 300s. It is useful if you have the habit of not locking your workspace when you are taking a break.</li>
<li style="text-align: justify;"><b><i>Clipboard auto-clear time</i></b> - I left this to 5s. This is the time after which any data (like password) will be cleared from the clipboard. So if you select an entry and press <b>Ctrl+C</b>, the password will be cleared from the clipboard after the selected time</li>
<li style="text-align: justify;"><b><i>Lock workspace when minimizing main window</i></b> - Check this to lock when the main window is minimized</li>
</ul><li style="text-align: justify;">Under the Interface tab</li>
<ul><li style="text-align: justify;"><b><i>Close button [X] minimizes main window instead of terminating the applications</i></b> - <b><u>Check </u></b>this. It saves a lot of WTF's when you press Ctrl+Alt+K and the KeePass window does not popup</li>
<li style="text-align: justify;"><b><i>Minimize to tray instead of taskbar</i></b> - Check this if you have a space problem on your taskbar</li>
<li style="text-align: justify;"><b><i>Minimize main window after copying data to the clipboard</i></b> - This is very useful if you are just being asked for a password. You press Ctrl+Alt+K, select the entry, press Ctrl+C and then the KeePass window minimizes and you just have to press Ctrl+V in the application that asks for your password</li>
<li style="text-align: justify;"><b><i>Focus entry after quick search</i></b> - Very useful. You should check this one</li>
</ul><li style="text-align: justify;">Under the <b><u>Integration</u></b> Tab</li>
<ul><li style="text-align: justify;">Select the <b style="font-style: italic;">Run KeePass at Windows startup</b> option</li>
</ul><li style="text-align: justify;">For the rest of the settings I recommend you use the default values</li>
</ul><div style="text-align: justify;"><b><span class="Apple-style-span" style="font-size: large;">Sync KeePass databases</span></b></div><br />
<div style="text-align: justify;"><br />
</div><div style="text-align: justify;">If you are using more than one computer you might need some sort of sync mechanism for password databases. While KeePass does not provide this directly, there is a plugin that can help. It is called <a href="http://keepass.info/plugins.html#keepasssync">KeePassSync</a>. </div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Close KeePass, and then download the plugin. Copy the KeePassSync.plgx file to the KeePass installation directory and start KeePass. Go to <b>Tools-KeePassSync-Show Options</b>. Select one of the providers mentioned there and create an account. Even if you already have an account with one of those providers I recommend that you create another account where you just keep the password database. <b>DO NOT</b> upload the key file to this account.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Once you created the account simply click the <b>Edit KeePass Entry</b> and enter the username and password. Under the <b><u>General</u></b> tab check the <b>Synchronize </b>option. Click ok. Your database should now be in sync. If not, go to <b>Tools-KeePassSync-Sync</b>. On the other computers you just need to enter the username and password of the provider and click Sync</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b><span class="Apple-style-span" style="font-size: large;">Why use KeePass</span></b></div><br />
<div style="text-align: justify;">Well, because it's safe. Up until now, none of the encryption methods it uses have been broken, so your password should be safe. As for me, there are many reasons while I prefer this application to others:</div><div style="text-align: justify;"><br />
</div><br />
<ul><li style="text-align: justify;"><b>It is a standalone application, not some browser plugin</b> - This means I know when the application is running, when the database is open, and when it closed. It also means that I can store passwords for archives, sensitive data such as contracts, etc.</li>
<li style="text-align: justify;"><b>It is really easy to use</b> - With just a couple of key combinations you can use the application without the need to play around with the mouse. Much faster than typing your username and password every time.</li>
<li style="text-align: justify;"><b>Key file-password combination provides better security</b> - Even if someone finds out your password he cannot gain access to the database without the key file (and vice versa). If you are really paranoid about someone getting access I recommend you store the key file (maybe even the database) on one of <a href="http://www.google.com/products/catalog?q=fingerprint+usb+stick&um=1&ie=UTF-8&tbm=shop&cid=4089104718239236128&sa=X&ei=Bo_TTbOaKsjRsgahyNDkAg&ved=0CCIQ8wIwAw&biw=1858&bih=995#">these</a>.</li>
<li style="text-align: justify;"><b>Gets around the "<i>one password to rule them all</i>" problem</b> - In most password managers this is a problem. If someone finds your password then you are in trouble. But with KeePass there is a difference. First there is the above mentioned key file-password combination. Secondly, you don't have to have "<i>one password to rule them all</i>". You can have multiple passwords to rule some passwords. Nobody is forcing you to put all your passwords in <b>ONE </b>database file. You can create as many as you want and choose different passwords/keys for each one.</li>
<li style="text-align: justify;"><b>Synchronization is an option, not a must</b> - This is one of my favorite features. Unless you want to, which means that you must create all the sync parameters, all the data <b>is stored locally</b>. <b>You </b>(not somebody you have to trust in) have full control over the access of the data. This is why I prefer it to LastPass. <i>Which do you think is more appealing to a hacker</i>? To waste his time trying to hack your passwords in the hope that maybe you stored some passwords that will enable him to steal some money, or a treasure chest of databases filled with user credentials from thousand if not millions of users. This is the biggest problem in any Identity Management service offered via the Internet. It represents a single point of failure. Just think of how much damage could occur if a service like LastPass loses all the passwords it stores. With KeePass, even if you use the sync feature, you have control where you store the database and more importantly, it is not centralized in a treasure chest of password databases. </li>
</ul><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b><span class="Apple-style-span" style="font-size: large;">And finally</span></b></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">If you have more questions about KeePass feel free to post them as comments to this blog. </div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">P.S. I really like the Google Chrome spell-checker, which does not recognize KeePass and gives as the first suggestion "Keep ass"</div><br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEJ8THCa9_xnqGW1OX6YzDWN0DE_HLQMjauVAPAKvY18ITwWv66BSFJEg-xRoylNkMr4csSzGDDIZxzpbGLLHJujWa2H77Q50SJJRaak2PVc-XX2vIW7tZbhlDJDi7X9JZCeeEQ0YHLro/s1600/GCAutoCorrect.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEJ8THCa9_xnqGW1OX6YzDWN0DE_HLQMjauVAPAKvY18ITwWv66BSFJEg-xRoylNkMr4csSzGDDIZxzpbGLLHJujWa2H77Q50SJJRaak2PVc-XX2vIW7tZbhlDJDi7X9JZCeeEQ0YHLro/s1600/GCAutoCorrect.jpg" /></a></div><br />
<br />
<br />
</div><div><br />
</div><div><br />
</div><div><br />
</div>BmvBoorishttp://www.blogger.com/profile/08023922807759243722noreply@blogger.com0tag:blogger.com,1999:blog-4907595734519939893.post-55266859658038231582011-05-16T16:18:00.006+02:002011-05-18T13:27:27.104+02:00Keep your friends close and your passwords closer<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8WEbkXU9jw9SjR5zAk1IIp2gR4ovMKTo65TdxvEpgNuB9ClpQklA-ZAe1s-K67qCZPG5UOQDlt-uHOoEgzyP8GajqTMO1HNkF-NpTY8YYrAvloHJtH5R8oKSwbnhqnnnz4brbhwRZRiU/s1600/signin.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="162" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8WEbkXU9jw9SjR5zAk1IIp2gR4ovMKTo65TdxvEpgNuB9ClpQklA-ZAe1s-K67qCZPG5UOQDlt-uHOoEgzyP8GajqTMO1HNkF-NpTY8YYrAvloHJtH5R8oKSwbnhqnnnz4brbhwRZRiU/s320/signin.jpg" width="320" /></a></div><div><br />
</div><div><br />
</div><div style="text-align: justify;">With the continued growth of internet usage more and more people face a challenging problem. The more frequent you visit different websites, the greater the change you will have to create some account for that particular website. Gone are the good all days when you had just one account (email) and one password for your Windows/Linux/Mac. There is a mis-attributed quotation from Bill Gates "<a href="http://en.wikiquote.org/wiki/Bill_Gates#Misattributed">640K ought to be enough for anybody</a>". I wonder if it refers to 640K of user credentials. Because honestly, while I'm not quite there, I don't have much to go.</div><div><br />
<a name='more'></a><br />
</div><div><div style="text-align: justify;">Having many registrations does pose a very interesting problem: "where do you store the usernames and passwords?". The simplest solution is to create one username(like <span class="Apple-style-span" style="color: #999999;">myname</span>) and use it for all accounts (<span class="Apple-style-span" style="color: #9fc5e8; font-size: x-small;"><i>myname@gmail.com</i></span>, <span class="Apple-style-span" style="color: #9fc5e8; font-size: x-small;"><i>myname@yahoo.com</i></span> and so on). In order to remember the different passwords the simplest choice is to select only one and stick with it. In fact there are a great deal of users that do just that (and yes I do know people who use such a system). If you are such a person I advise you to STOP being ridiculous and switch to something different A.S.A.P. I think it is obviuos why it is wrong. </div></div><div><br />
</div><div><div style="text-align: justify;">The best means choosing credentials when registering is to make your registration seem as random as possible. I for one, use my <b><span class="Apple-style-span" style="color: #999999;">bmvbooris </span></b>id on services where I need/want to be identified. That is, where someone interested can Google "bmvbooris" and see information about me. For all other registrations (such as news feeds) I use different alliacies as usernames (sometimes even randomly generated). The other important part is that I always use randomly generated strong passwords. I believe that strong passwords, in general, are a must if you want a safe browsing experience. An interesing article written by Gina Trapani called "<a href="http://lifehacker.com/184773/geek-to-live--choose-and-remember-great-passwords">Geek to Live: Choose (and remember) great passwords</a>" gives some hints on how to choose easy to remember <b>strong </b>passwords.</div></div><div><br />
</div><div><div style="text-align: justify;">And now the big problem: many many many usernames and even more hard to remember passwords. Where do I store all of them??? Sure, the best place to store passwords is in your head. And for the most frequently used services this can be applied. However what about those websites that you visit just once ore twice a month? Its quite hard to remember a password if you don't use it very often. That's why I would recommend a password manager. It is the most effective way to store passwords. There are many to choose from, but I personally prefer <a href="http://keepass.info/">KeePass</a>. </div></div><div><br />
</div><div><div style="text-align: justify;">"KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish)" (from the KeePass <a href="http://keepass.info/">website</a>). The complete list of features can be found <a href="http://keepass.info/features.html">here</a>.</div></div><div><br />
</div><div><div style="text-align: justify;">Another favorite among password manager users is <a href="http://lastpass.com/">LastPass</a>, the "<i>password manager that makes web browsing easier and more secure</i>". Although not as secure as they thought since they recently got <a href="http://news.cnet.com/8301-1009_3-20060004-83.html?tag=mncol;txt">hacked</a>. An interesting guide on choosing a password manager can be found <a href="http://thenextweb.com/lifehacks/2011/04/06/a-beginners-guide-to-password-managers-and-why-you-should-start-using-one/">here</a>. </div></div><div><br />
</div><div><div style="text-align: justify;">In a later <a href="http://bmvbooris.blogspot.com/2011/05/keepass-password-safe.html">post</a>, I will further detail KeePass.</div></div><div><br />
</div><div><br />
</div><div><br />
</div><div><br />
</div><div><div><br />
</div><div><br />
<div><div><div><br />
</div><div><br />
</div></div></div></div></div>BmvBoorishttp://www.blogger.com/profile/08023922807759243722noreply@blogger.com0tag:blogger.com,1999:blog-4907595734519939893.post-9271073376283608502010-06-25T15:10:00.002+02:002010-06-25T15:17:49.461+02:00At last…my greatest work…COMPLETED!!!!!<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4bS3eRuY5uLRL9GRBfcDJDBGbtGQyOun8AiTArzJkBSKyIlaMHmbtIZ2XXpSh-Lqlf60sQXLcyb3vva4X89FyRRdELmX55TZOTrLuh7BZ6oEpRjO5wxzWRRNRVmdRQxdyBzUYIKiI2Wg/s1600/dexters-laboratory-001.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4bS3eRuY5uLRL9GRBfcDJDBGbtGQyOun8AiTArzJkBSKyIlaMHmbtIZ2XXpSh-Lqlf60sQXLcyb3vva4X89FyRRdELmX55TZOTrLuh7BZ6oEpRjO5wxzWRRNRVmdRQxdyBzUYIKiI2Wg/s1600/dexters-laboratory-001.jpg" /></a></div><div class="separator" style="clear: both; text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: justify;"></div><div class="MsoNormal"><div style="text-align: justify;">Finally, after months of endless work I finished writing my master thesis. It was not easy, but I fought it on the <a href="http://www.presentationmagazine.com/winston_churchill_speech_fight_them_on_beaches.htm">beaches</a>, I fought it on the landing grounds, in the fields, in the streets and in the hills around Hagenberg. And I never <b>surrendered</b>. All that is left now is the defense of the thesis.</div></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><div style="text-align: justify;">So, let me tell you a little bit about the topic of the thesis. My thesis title is “New Threats in <a href="http://en.wikipedia.org/wiki/Cloud_computing">Cloud Computing</a>”. In it, we propose new threats that can arise from a SME (Small and Medium Enterprise) using Cloud Computing. The focus was on <b>Client-Side</b> threats especially pertaining to <b>data leakage</b>. I propose 12 threats in this thesis. I also propose some abstract solutions for mitigating these threats.</div><br style="mso-special-character: line-break;" /></div><div class="MsoNormal"><div style="text-align: justify;">The thesis is about 130 pages long and contains a chapter about Cloud Computing, a chapter about Security in Cloud Computing, the problem statement and methodology, the suggested threats and a chapter about certain solution methods.</div></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><div style="text-align: justify;">Unfortunately, it appears that I would not be able to post the thesis online because of legal issues with the company that funded my studies in <a href="http://www.isi-hagenberg.at/">ISI</a>. </div></div>BmvBoorishttp://www.blogger.com/profile/08023922807759243722noreply@blogger.com0tag:blogger.com,1999:blog-4907595734519939893.post-7007215565574216982010-05-06T14:47:00.001+02:002015-10-19T19:14:02.267+02:00My Bachelor Thesis – Web Image Processing<div class="MsoNormal" style="text-align: justify;">
I will now post my Bachelor Thesis entitled “<a href="https://app.box.com/s/mulip1f36imzum972lnvvws6g0tj9zzp">Web Image Processing</a>”.<br />
<br />
<a name='more'></a><br />
<h2 style="text-align: center;">
Abstract</h2>
<div style="text-align: left;">
<div class="MsoNormal" style="text-align: justify;">
<i>Today’s world is a world where technology is in its element. With the incredible growth of the Internet and of Internet users, nowadays, any piece of information is only a click away. At the same time technology has offered us another great invention: the camera. Most of us have at least one image capturing device and thus a private collection of photos. Therefore, it comes as no surprise that more and more web sites offer the possibility to store photo albums online. However, there are few that offer some support to edit or process those images after they are uploaded<o:p></o:p></i></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<i>For this reason I decided that the thesis into Web Image Processing would be a wonderful opportunity to develop such a web application. But, there were a lot of challenges to creating such an application. The main problem was choosing an efficient implementation for the actual image processing. After much thought I came up with a very ingenious way to process images on the web<o:p></o:p></i></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<i>The application is a web application that allows users to store entire photo albums online. Unlike most websites that do this, the user can also edit the images directly without having to download, edit and then re-upload the image. The novelty in the design of the application is that the actual image editor uses Java Web Start to launch it and handles the retrieving and storing of images. This implementation offers may advantages. The first is the ability to create a platform independent application so all users can edit images (no matter what operating system they have). The second is that Java Web Start download and installs the application automatically without any input from the user (so no more boring installation wizards)<o:p></o:p></i></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<i>During the development of the application, I have tried to make the server-side implementation and the Image Editor as independent from one another as possible. To that end I have implemented the web application in both PHP and JSP. Also, the Image editor is designed is such a way, that if someone wants to add a image editing functionality to their web page, all they have to do is create 2 scripts for downloading and storing the image file. And the application will take care of the rest.<o:p></o:p></i></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<i>But of course, developing this application with not have possible without a fair amount of theoretical knowledge. To that end I have dedicated three chapters in the theoretical knowledge necessary to create such an application. The first one deals with the various web tools employed (PHP, JSP, and JWS). The second one deals with representing and storing images. All information about images can be found here. The third chapter deals with actual image processing. Several algorithms as well as different image processing filters are explained.<o:p></o:p></i></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<i>I strongly believe Web Image Processing has a future. As we grow more and more dependent on image capturing devices and the Internet, the need for storing images online will also constantly grow. And with it the need to process those image online, on the web, will also slowly increase. I hope to convince you that this thesis and indeed this application have a future. I hope I created an application and a theoretical basis capable of proving this to you as.<o:p></o:p></i></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal">
<b><i><span lang="RO" style="font-family: CMBX12; mso-ansi-language: RO; mso-bidi-font-family: CMBX12;">This work is the result of my own activity. I have neither given nor received nauthorized assistance on this work.</span></i></b></div>
</div>
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<div style="text-align: center;">
<br /></div>
</div>
<div style="text-align: center;">
<iframe allowfullscreen="" frameborder="0" height="800" msallowfullscreen="" src="https://app.box.com/embed/preview/mulip1f36imzum972lnvvws6g0tj9zzp?theme=dark" webkitallowfullscreen="" width="600"></iframe><br />
<br />
<h2>
</h2>
</div>
BmvBoorishttp://www.blogger.com/profile/08023922807759243722noreply@blogger.com0tag:blogger.com,1999:blog-4907595734519939893.post-90257529223279097562010-04-22T23:00:00.001+02:002010-04-22T23:00:29.088+02:00Welcome To My Blog<p class="MsoNormal" style="text-align: justify;">June 1<sup>st</sup> 1996. That’s the first day I ever watched a program in English. I remember it like it was yesterday.<span style="mso-spacerun:yes"> </span>That was the day we first had cable. Before that, all I saw was <a href="http://www.tvr.ro/">TVR 1</a>. I spent the whole day watching Cartoon Network. Those were the good old days. No money to worry about, no stress with school and most certainly no thesis to finish. After a while my father would watch movies and would see people using remote controls. As we did not have such magical devices, he would often say: “Those lazy capitalists! They can’t be bothered to get up and change the channel”. The funny thing is that nowadays we have so many remote controls in our home that sometimes we still change channels manually, since we can’t find the proper remote.</p> <p class="MsoNormal" style="text-align: justify;">It was the same thing when we first got Internet. This time it was my mother who did not understand why we need Internet. Now days she spends a lot of time talking to people on Skype and reading newspapers. Thank God she doesn't know how to use Facebook yet !!!</p> <p class="MsoNormal" style="text-align: justify;">Finally, not to be outdone, I had the same feeling with Facebook. I failed to see the point of it. That’s why, for a long time I had no account. Today, of course, I use Facebook and I must say that I like it. It’s interesting to see what other people are doing and thinking. </p> <p class="MsoNormal" style="text-align: justify;">The thing is I had the same feeling about blogging. So, coming from the above mentioned family tradition, I decided give it a try. So, what will I post? Well all sorts of things. Starting from study/work related things, to funny images and jokes and of course philosophical discussions. </p> <p class="MsoNormal" style="text-align: justify;">I really hope that you will have as much fun reading this blog, as I have writing it.</p>BmvBoorishttp://www.blogger.com/profile/08023922807759243722noreply@blogger.com1