- •Laboratory work №1
- •Computer performance: speed, efficiency, energy costs
- •Amdahl's Law
- •Cpu time
- •Full answer
- •Cpu Time Definition - What does cpu Time mean?
- •Techopedia explains cpu Time
- •Amdahl's Law
- •Speedup:
- •Amdahl's Law Defined
- •A Calculation Example
- •Amdahl's Law Illustrated
- •Optimizing Algorithms
- •Optimizing the Sequential Part
- •Execution Time vs. Speedup
- •Measure, Don't Just Calculate
- •2.1 Architecture of computer
- •2.2 Types of memory
- •2.3 Number system
- •Memory unit.
- •Input - Output
- •Adding Binary Numbers
- •Subtracting Binary Numbers
- •Multiplying Binary Numbers
- •Dividing Binary Numbers
- •4.1 Main functions, structure and types of operating system
- •4.2 Windows os
- •4.3 Working with files and directories
- •Windows system key combinations
- •Windows program key combinations
- •1. Beginning work in word processor
- •2. Creating and editing simple text documents
- •3. Work with formula editor Equation 3.0
- •Exercise 8 - Selecting and Formatting Multiple Lines
- •Exercise 9 - Formatting Last Two Lines
- •Exercise 10 - Formatting Words using the Font Dialog box
- •Symbols
- •Structures
- •10.1. The definition and structure of database
- •10.2. Creation of a new database
- •10.3. Methods of creation new table
- •Control questions
- •6.1 The main tools for work in Power Point
- •6.2 Presentations in ms Office Power Point
- •7.1. Electronic spreadsheet ms Excel
- •7.2. Entering Excel Formulas and Formatting Data
- •7.3 Cell Addressing
- •Worksheets
- •The Formula Bar
- •Entering Excel Formulas and Formatting Data
- •Copy, Cut, Paste, and Cell Addressing
- •Exercise 2
- •Absolute Cell Addressing
- •Mixed Cell Addressing
- •What is Absolute Cell Addressing ?
- •What is Mixed Cell Addressing?
- •Using Reference Operators
- •Understanding Functions
- •Alternate Method: Enter a Function with the Ribbon
- •Fill Cells Automatically
- •Exercise 2
- •Exercise 3
- •Exercise 4
- •Chart example :
- •Exercise 10 Create a Column Chart
- •Apply a Chart Layout
- •Global and local networks. Internet
- •Bases of html
- •The internet
- •Examples of a web page
- •Html Tags
- •The start tag is often called the opening tag. The end tag is often called the closing tag. Web Browsers.
- •Example Explained
- •10.1 Software and hardware for generating key information. 10.2 Protecting programs from unauthorized use via usb-key and the software manufacturer.
- •2. Brief theoretical information
- •Information for the developer.
- •3. The order of execution of work
- •4. Contents of the report
- •5. Test Questions
- •Installation Certification Center.
- •III) Request a certificate. Processing request.
- •3. The order of execution of work
- •4. Contents of the report
- •Test Questions
- •1. Objective
- •3.The order of execution of work
- •Image 1
- •Creating a strong password→
- •Verify your account via sms or Voice Call→
- •Control what others see about you across Google services→
- •Choose the information you share with others
- •More details about your name & photo
- •Preview how your information shows up
- •Preview how your information shows up
- •About Google Accounts→
- •Common issues
- •Product-specific age requirements
- •Disabled account due to incorrect birth date
- •History
- •Technical details
- •Network structure
- •Base station subsystem[edit]
- •Gsm carrier frequencies
- •Voice codecs
- •Subscriber Identity Module (sim)[edit]
- •Phone locking[edit]
- •Gsm security[edit]
- •Standards information[edit]
- •Gsm open-source software[edit]
- •Issues with patents and open source[edit]
- •13.1 Obtaining the electronic services on the portal of e-government of kazakhstan
- •Laboratory work №14
- •Information culture.Internet culture.
10.1 Software and hardware for generating key information. 10.2 Protecting programs from unauthorized use via usb-key and the software manufacturer.
The objective of the work: Read the HASP USB key device. The software supplied with the device. Learning to protect the program from unauthorized use by a software producer HASP keys.
Brief theoretical information. To effectively use the HASP protection system you should be familiar with the principles of its operation and the terminology set out in this chapter. If you intend to use the NetHASP key, you should also read Chapter 4 to review the principles of work and NetHASP terminology.
Keys HASP. HASP keys are of the following types: local key.
Local key - HASP keys is designed for stand-alone (not part of the network) computer. This category includes all the keys except for the NetHASP. Demo keys. Each HASP Developer Kit includes a demo HASP key (also demo key). Demo keys have all the capabilities of their class keys, but have a standard developer demo code (see. P. 38). Use the demo keys for software protection can not, because they are available to anyone. These options are best used for the HASP protection system evaluation. HASP Memory.
All the HASP keys, except HASP4 without memory are rewritable memory. Using the HASP memory, you can do the following: controlling access to various software modules and software packages. Assign each user a unique number of your programs. Donating Program for rent and distribute their demo version with a limited number of starts. Keep key passwords, fragments of program code, variables, and other important information.
Key Type Memory Size.
HASP4 without memory No HASP4 M1 HASP4 M4 112 bytes 496 bytes 512 bytes HASP4 Time All keys NetHASP 496 bytes
HASP Identifier.
Each HASP key memory has a unique identification number (ID- Number), or an identifier that is available for the control of protected applications. The identifiers allow you to distinguish between the application user. Checking the program HASP ID, you can take different actions depending on the availability of a specific key. You can not order HASP keys with predefined identifiers. They are appointed by the pseudo-random manner during the production of keys, which guarantees protection against replay.
Protection Methods HASP.
HASP system allows to protect software in two different ways: Utility HASP Envelope (envelope) HASP API (Application Programming Interface - an application program interface) HASP envelope Using the HASP Envelope is the main method of protection. The executable file is a protective soft shell, file encoding, and has properties such as the recognition of key and Anti debugging. The shell does not allow the file is executed without a HASP key.
Protection shell is made quickly and without too much effort. At the same time, it is sufficiently reliable, because it makes debugging and disassembly of your programs is almost impossible. To protect the shell source code does not require programming.
The software user interface HASP (API) If you have the source code of the program, which must be protected, you can dock it to the module HASP API - an object file or DLL. Since the API module itself is encrypted and protected, the method provides a high degree of protection. API allows you to access key
The order of execution of work
Installing the software HASP
In the list of computer equipment to ensure that there are no devices of Aladdin (eToken, HASP). If these devices are present in the equipment list - to remove them.
Remove, if present, the software eToken and HASP.
Connect to Centurion computer, open the Resource Q and enter the setup directory.
Run the setup.exe program.
Follow
the instructions of the setup program to install software on your
computer HASP system. Install the components marked below.
6. Connect the HASP USB connector to the computer. a) In the case of correct installation of electronic key HASP must light indicator light. b) If the LED does not light up, the device driver update manually. 7. The computer equipment list to find a connected device.
Using the HASP software
Run this program Aladdin DiagnostiX to test electronic HASP key.
2. Run the demo program - HASP Demo for Win16. Describe the operation of the program 3. Start the demonstration program - HASP Demo for Win32. Describe the operation of the program
The protection of applications using the HASP.
Using HASP Envelope tool to protect your favorite applications from unauthorized launch. Authorized run - if the HASP key in the system. Neanktsionirovanny start - in the absence of the HASP system.
1. Create a folder: Protected applications
2. Copy it 3 executable file, such as the calculator program - calc.exe
3. Use the HASP Envelope to protect the selected programs from unauthorized launch.
4. Run the program.
5. Close the program
6. Remove the USB connector from the HASP
7. Run the protected program.
Try several options to protect programs with a single key HASP
5. Test Questions
1. Share this utility HASP Envelope
2. Share this utility HASP test
3. Share this utility HASPEdit
4. With such an identifier HASP
5. How to encrypt and decrypt the data to detect the HASP
List of recommended references
June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th Edition - Comprehensive, Thomson Course Technology, a division of Thomson Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski (University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
Craig Van Slyke Information Communication Technologies: Concepts, Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008, Pages: 4288
Brynjolfsson, E. and A. Saunders (2010). Wired for Innovation: How Information Technology Is Reshaping the Economy. Cambridge, MA: MIT Press
Kretschmer, T. (2012), "Information and Communication Technologies and Productivity Growth: A Survey of the Literature", OECD Digital Economy Papers, No. 195, OECD Publishing.
Laboratory work №11
Protecting programs from unauthorized use via USB-key and developer tools.
The objective of the work:
Read the HASP USB key device. The software supplied with the device. Learning to protect the program from unauthorized use by a developer tools
