...A Dissertation Report On “USB Slave to Slave File Transfer System” Submitted by Miss. Awari Madhuri Vilas (Seat No. 1143) Under the Guidance of Prof. Matte P.N. Dissertation report submitted in the partial fulfillment of Requirement for the degree of Master of Engineering in E&TC (VLSI and Embedded Systems) of Savitribai Phule Pune University, Pune (Maharashtra) G. H. Raisoni College of Engineering and Management, Chas, Dist- Ahmednagar – 414 008 (Maharashtra) Department of Electronics & Telecommunication Engineering (2015-16) Certificate The foregoing report entitled “USB Slave to Slave File Transfer...
Words: 1206 - Pages: 5
...Tools used: dd (coreutils) 8.21, sha1sum (GNU coreutils) 8.21, xxd version 1.10, Eye of mate Image Viewer 1.8.1, Script version 2.20.1 Received the USB device from officer Linda Mood of the USSS Cyber forensics Team in an antistatic bag with tamper resistant tape. Her initials were written over the tape. I removed the USB flash drive from the bag. It was a 2GB black and green retractable Sony flash drive with the serial number of D33021. Using the mount command I confirmed that the USB had not mounted. Command: mount Using the date command I showed when I began the forensic work on the USB device. Sun Feb 1 13:21:34 EST 2015 Command: date Using the command fdisk I looked to see what the size of the device was and how much data was on the USB. It was shown to have 1MB or 1474560 bytes of information. Command: sudo fdisk -l Using the hash command sha1sum on the device I obtained the hash for the USB. 32b9fcb741aab43a4f80393d3df67c32c726924f /dev/sdb Command: sudo sha1sum /dev/sdb Using dd I was able to image the information from the USB device to another file named Ailes.case01.dd. Command: Sudo dd if=/dev/sdb of=Ailes/case01.dd bs=8192 Using the date command I showed when the copy was made. Sun Feb 1 13:25:55 EST 2015 Command: date Using the sha1sum command again I compared the original USB hash to the new image Ailes.case01.dd. 32b9fcb741aab43a4f80393d3df67c32c726924f /dev/sdb 32b9fcb741aab43a4f80393d3df67c32c726924f Ailes.case01.dd ...
Words: 1068 - Pages: 5
...already know can be detected using a threshold. Fig 3.3.1 Working of Infrared Sensors 3.3.2 USB DONGLE A dongle - also called an internet dongle - is a small USB device that is used to access the internet. It can be referred to as a dongle,...
Words: 652 - Pages: 3
...similar functionality. Free and always will be: Kali Linux, like its predecessor, is completely free and always will be. You will never, ever have to pay for Kali Linux. Open source Git tree: We are huge proponents of open source software and our development tree is available for all to see and all sources are available for those who wish to tweak and rebuild packages. FHS compliant: Kali has been developed to adhere to the Filesystem Hierarchy Standard, allowing all Linux users to easily locate binaries, support files, libraries, etc. Vast wireless device support: We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices. Custom kernel patched for injection: As penetration testers, the development team often needs to do wireless assessments so our kernel has the latest injection patches included. Secure development environment: The Kali Linux team is made up of a small group of trusted individuals who can only commit packages and interact with the repositories while using multiple secure protocols. GPG signed packages and repos: All Kali...
Words: 26373 - Pages: 106
...Mentor’s Signature: _______________________________________________________ Running head: SECURING THE USB INTERFACE 1 Securing the Universal Serial Bus Interface for the Enterprise Environment Steve Wild Western Governor’s University SECURING THE USB INTERFACE 2 Summary The USB interface is one vector of possible attack against a company and must be proactively defended against data theft, data loss, and corporate espionage in order for a company to maintain a secure enterprise environment, minimize downtime, and maximize productivity. Project Goals and Objectives There are several goals that will be accomplished during this project: explore the hardware problems, explore the software problems, explore the policy problems, and give real world examples. The objectives are: provide example hardware solutions, provide example software solutions, provide example policy solutions, and to provide a concise best practices guide in the conclusion. Project Deliverables The deliverables of this project are the review of other works, the discussion, and the conclusion. The review of other works will look at several different articles and reports from at least 5 different sources and...
Words: 3010 - Pages: 13
...NT1210 Unit 1 HomeWork Assignment 1: 1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 2. How many bits are in a byte? ____8_____ 3. Fill out the following Chart Term | Size(Bytes) | Size(2n Bytes) | Rounded Size (Bytes) | Kilobyte | 1024 | 2 10 | 1000 | Megabyte | 1,048,576 | 2 20 | 1,000,000 | Gigabyte | 1,073,741,824 | 2 30 | 1,000,000,000 | Terabyte | 1,099,511,627,776 | 2 40 | 1,000,000,000,000 | 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) b. Used for long-term memory d. Connects to the CPU over a bus using a cable 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. 6. Define Character set: A list of all the characters on a computer with matching binary values ex: a = 110001 in ASCII which uses a 7bit code. 7. Character encoding scheme is another name for character set? a. True 8 & 9. Complete the following Decimal to binary chart. Decimal | Binary | | Decimal | Binary | 193 | 11000001 | | 255 | 1111111 | 52 | 00110100 | | 19 | 10011 | 50 | 110010 | | 172 | 10101100 | 170 | 10101010 | | 14 | 1110 | 6 | 110 (binary) | | 0 | 0000 | 10. Which of the...
Words: 1421 - Pages: 6
...following device classifications: • Portable USB-based memory sticks, also known as flash drives, thumb drive, jump drives, or key drives. • Memory cards in SD, CompactFlash, Memory Stick, or any related flash-based supplemental storage media. • USB card readers that allow connectivity to a PC. • Portable MP3 and MPEG-playing music and media player-type devices such as IPods with internal flash or hard drive based memory that supports a data storage function. • PDAs, cell phone handsets, and smart phones with internal flash or hard drive based memory that support a data storage function. • Digital cameras with internal or external memory support. • Removable memory based media, such as DVDs, CDs, and floppy disks. • Any hardware that provides connectivity to USB devices through means such as wireless (Wi-Fi, WiMAX, IrDA, Bluetooth, among others) or wired network access. This policy applies to any hardware and related software that could be used to access corporate resources, even if said equipment is not corporately sanctioned, owned, or supplied. The overriding goal of this policy is to protect the confidentiality, integrity, and availability of resources and assets that reside within Richman Investments technology infrastructure. A breach could result in loss of information, damage to critical applications, loss of revenue, and damage to the company’s public image. Therefore, all users employing the use of removable media and/or USB-based technology to back up, store, or otherwise...
Words: 1274 - Pages: 6
...program files · Empty the Recycle Bin · Delete files from the temporary folder · Delete files created by other Windows tools · Remove unused, optional Windows components To use the Disk Cleanup utility: 1. Click Start ( ), click All Programs, click Accessories, click System Tools, and then click Disk Cleanup. 2. After the Disk Cleanup utility analyzes the hard drive, a report with a list of options appears on the computer. Click the appropriate check boxes to remove unwanted files from the computer, and then click OK. 3. Click Yes on the confirmation screen that appears on the computer. Step 2: Reinstall HP Software Note|Before starting the installation process again, please confirm the following:· Unplug the USB cable from the device (if you are connecting to the printer via USB cable). · Make sure your PC has been rebooted at least once since the failed installation. | Reinstall the HP software by re-inserting the CD that came with your device. Please follow the onscreen instructions, and connect the USB cable only when prompted by the software. The illustration below shows a typical USB...
Words: 1178 - Pages: 5
...Chapter 1 First Look at Computer Parts and Tools Reviewing the Basics 1. Which is faster, a Hi-Speed USB port or a SuperSpeed USB port? SuperSpeed USB is faster than Hi-Speed USB 2. What type of output does a S/PDIF port provide? High quality sound to an audio system 3. List five types of video ports. VGA, S-Video, DVI, HDMI, DisplayPort video ports 4. What is the purpose of an expansion slot on a motherboard? An expansion slot on a motherboard is used for an expansion card, which provides a port or other function that is not provided by the motherboard. 5. What should be the setting for a dual-voltage selector switch on a power supply when using the computer in the United States? Set the switch to 115 volts 6. What unit of measure is used to describe the amount of work a surge suppressor can do before it stops protecting the circuit from an electrical surge? Joule 1 7. Hot wires in home wiring are normally colored ____ and ground wires in computers are normally colored _____. Black, black 8. What is the difference between a transformer and a rectifier? Which are found in a PC power supply? A rectifier is a device that converts alternating current to direct current. A transformer is a device that changes the ratio of current to voltage. A computer power supply functions as both. 9. What device can you use to make sure a computer is protected against power surges? A surge suppressor 10. A power supply receives 120 volts of ___ power from a wall outlet and converts it to...
Words: 883 - Pages: 4
...Report Computer Shop 3: PC World Business Registration No: 447999-U Shop Address: No.339, Jalan Ong Kim Wee,75300 Melaka. Business Card: Notebook Brand (Model No & Picture ) | Acer Aspire E5-411-P137 Notebook | Asus A455LD-WX075H A-Series Notebook | Operating System | Windows 8.1(64 bit) | Windows 8.1 | Display | 14" HD (1366 x 768) 16:9 | 14" HD LED Glare panel 1366x768 | Processor | Intel Pentium N3530 Quad-core(4 core), 2.16 GHz, 2 MB cache | Intel® Core™ i5-4210U Processor- 1.7GHz, 3M Cache- Max Turbo Frequency 2.7 GHz | Memory | 4 GB DDR3L SDRAM | 4GB DDR3L | Storage | 500 GB HDD | 1TB SATA Hard Drive | Graphic | Intel HD Graphics with Shared Memory | NVIDIA® GeForce® GT 820M with 2GB DDR3 VRAM | Audio | Stereo speakers , microphone, high definition audio | Built-in high quality speaker and microphoneSonicMaster audio technology vocal master | Wireless | IEEE 802.11b/g/n, Gigabit Ethernet, Bluetooth 4.0 | Support for 802.11 b / g / nBluetooth ™ V4.0 (optional)10/100/1000 Base T | Interface | SD cardHDMILAN2 x USB 2.0USB 3.0 | 1 x audio interface (input / output Combo)1 x VGA port / Mini D-sub 15-pin for external monitor1 x USB 3.0 interface2 x USB 2.0 interface (optional)1 x Ethernet (RJ-45) jack1 x HDMI Interface | Battery | 6-cell, Lithium Ion (Li-Ion), 5000mAh | 4 cell battery 2600mAh | Power Adapter | Input: AC 120/230 V ( 50/60 Hz )Output: 40 Watt , 19 V | Input: AC 100-240VOutput: 19 V DC, 3.42 A, 65W | Dimension | 13.6 in...
Words: 642 - Pages: 3
...Dropbox: “It Just Works” Have you ever been in the library or away from your computer and realized that you’ve forgotten the USB drive at home so that you are stuck with no way to get your documents? Drew Houston wanted to get rid of that reoccurring problem people were facing so he created Dropbox. This service allows users and businesses to share information, documents, and reports anywhere, without the use of a USB or jump drive. Houston always strived to exceed expectations throughout his life, so after about 2 years of Dropbox being on the market, he was already thinking of how to expand and grow the company. Houston’s next problem was whether or not Dropbox should continue selling one product or if they should segment their user base and produce differentiated products. I personally have had the same problem of forgetting or losing my USB drive at home when I need to print a report out at school. I don’t know why this invention wasn’t thought of or created before 2007. This is a game changing invention because now I can share documents or files with not just one person, but many different people at once. Dropbox allows me to never have to worry about my USB drive again. Drew Houston was headed for success the day he was born. At the age of five he was already writing software and testing games, which led him to his first job as a network engineer. Someone with this much passion for technology was destined to end up earning a degree from MIT, in which he did...
Words: 1096 - Pages: 5
...With world leaders currently convening high-level negotiations on how best to address the rising threat of global warming, and public apprehension about the phenomenon at an all-time high, it's encouraging to note several recent developments coming from the high-tech sector. It's about time. Our ever-shrinking world is abuzz with activity attempting to address the manmade rise of greenhouse gases. Eco-visionary James Lovelock published a radical idea in Nature to increase ocean uptake of CO2 through giant ocean tubes. New Zealand has kicked off an ambitious plan to get 90% of its energy from renewable sources by 2025. JC Penney, Office Depot and Kohl's have announced green building plans. In May, General Electric said it had doubled sales from environmentally friendly products, to $12 billion over, in two years. One need only take a look at any online discussion thread of green issues to see anxiety, and often outright ridicule, about the sizable ecological impact so many of us Web surfers are having. Computers are hard to (and rarely) recycled, and when they are, it's typically in developing nations by people without proper training or safety gear. Often they are children. That's distressing, because today's computers are made with a sizable amount of lead, cadmium, brominated fire retardants and plastics that can leach toxic breakdown products. While processor speed has faithfully followed Moore's Law, energy use has also swelled, as more and more people are able to...
Words: 953 - Pages: 4
...LS4208 Product Reference Guide LS4208 Product Reference Guide 72E-69413-03 Revision A January 2007 © 2005-2007 by Symbol Technologies, Inc. All rights reserved. No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Symbol. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice. The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on a licensed basis. Symbol grants to the user a non-transferable and non-exclusive license to use each software or firmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Symbol. No right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a licensed program, or use a licensed program in a network without written permission from Symbol. The user agrees to maintain Symbol’s copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part. The user agrees...
Words: 35954 - Pages: 144
...directory, NETW360W5iLab, will be created and contain the following files: 1. Chanalyzer_Installer.3.4.msi: Installation program that installs Chanalyzer on your computer 2. Capture1.wsr: First, capture file for analysis 3. Capture2.wsr: Second, capture file for analysis 4. Capture3.wsr: Third, wireless capture file for analysis 5. Capture4.wsr: Fourth, wireless capture file for analysis 3. Install the Chanalyzer spectrum analysis program by double-clicking on the Chanalyzer_Installer.3.4.msi file. 4. Start the Chanalyzer. Once the Chanalyzer is running, open the first capture file, Capture1.wsr, and let the recording run for a few minutes. Using this capture, answer the following questions in your lab report. Question 1: Are any channels being used that overlap other channels? Question 2: If you had to install a new wireless LAN, what channel would you use? 5. Close Capture1.wsr and open the file Capture2.wsr. Let the recording run for a few minutes. Using this...
Words: 855 - Pages: 4
...BTW12.0.0.7800 USB Profile Package BTW12.0.0.7800 USB Profile Package Release Notes August 20, 2013 Confidential and Proprietary Information © Broadcom Corp.,2008, All rights reserved. Printed in United States of America. 16340 West Bernardo Drive San Diego, CA 92127 Phone: (858) 385-8800 Fax: (858) 385-8810 Broadcom Corporation., Confidential and Proprietary Page 1 BTW12.0.0.7800 USB Profile Package LICENSED SOFTWARE Broadcom Corporation., Confidential and Proprietary Page 2 BTW12.0.0.7800 USB Profile Package INTRODUCTION This software package consists of the BTW12 build 12.0.0.7800 that contains the software applications and drivers that can be installed on the Intel x86 / x64 USB platforms. The software has been tested on the Windows Blue operating system (Windows 8.1 version 6.3.9471) and on the RTM version of Windows 8. The installer provided can install the relevant drivers based on the platform on which the software is being installed. This release of BTW12 contains drivers for the x86 / x64 UART platforms that have passed WHCK tests and are signed by Microsoft. CUSTOMER SUPPORT PORTAL (CSP) Customers can submit enhancements, changes and/or defects against releases of software or firmware via the Broadcom Customer Support Portal (CSP). CSP cases are replicated into the Broadcom Bluetooth engineering change management database for review by the engineering community and change control boards. If your project or program is not listed...
Words: 2476 - Pages: 10