- •Laboratory work №1
- •Computer performance: speed, efficiency, energy costs
- •Amdahl's Law
- •Cpu time
- •Full answer
- •Cpu Time Definition - What does cpu Time mean?
- •Techopedia explains cpu Time
- •Amdahl's Law
- •Speedup:
- •Amdahl's Law Defined
- •A Calculation Example
- •Amdahl's Law Illustrated
- •Optimizing Algorithms
- •Optimizing the Sequential Part
- •Execution Time vs. Speedup
- •Measure, Don't Just Calculate
- •2.1 Architecture of computer
- •2.2 Types of memory
- •2.3 Number system
- •Memory unit.
- •Input - Output
- •Adding Binary Numbers
- •Subtracting Binary Numbers
- •Multiplying Binary Numbers
- •Dividing Binary Numbers
- •4.1 Main functions, structure and types of operating system
- •4.2 Windows os
- •4.3 Working with files and directories
- •Windows system key combinations
- •Windows program key combinations
- •1. Beginning work in word processor
- •2. Creating and editing simple text documents
- •3. Work with formula editor Equation 3.0
- •Exercise 8 - Selecting and Formatting Multiple Lines
- •Exercise 9 - Formatting Last Two Lines
- •Exercise 10 - Formatting Words using the Font Dialog box
- •Symbols
- •Structures
- •10.1. The definition and structure of database
- •10.2. Creation of a new database
- •10.3. Methods of creation new table
- •Control questions
- •6.1 The main tools for work in Power Point
- •6.2 Presentations in ms Office Power Point
- •7.1. Electronic spreadsheet ms Excel
- •7.2. Entering Excel Formulas and Formatting Data
- •7.3 Cell Addressing
- •Worksheets
- •The Formula Bar
- •Entering Excel Formulas and Formatting Data
- •Copy, Cut, Paste, and Cell Addressing
- •Exercise 2
- •Absolute Cell Addressing
- •Mixed Cell Addressing
- •What is Absolute Cell Addressing ?
- •What is Mixed Cell Addressing?
- •Using Reference Operators
- •Understanding Functions
- •Alternate Method: Enter a Function with the Ribbon
- •Fill Cells Automatically
- •Exercise 2
- •Exercise 3
- •Exercise 4
- •Chart example :
- •Exercise 10 Create a Column Chart
- •Apply a Chart Layout
- •Global and local networks. Internet
- •Bases of html
- •The internet
- •Examples of a web page
- •Html Tags
- •The start tag is often called the opening tag. The end tag is often called the closing tag. Web Browsers.
- •Example Explained
- •10.1 Software and hardware for generating key information. 10.2 Protecting programs from unauthorized use via usb-key and the software manufacturer.
- •2. Brief theoretical information
- •Information for the developer.
- •3. The order of execution of work
- •4. Contents of the report
- •5. Test Questions
- •Installation Certification Center.
- •III) Request a certificate. Processing request.
- •3. The order of execution of work
- •4. Contents of the report
- •Test Questions
- •1. Objective
- •3.The order of execution of work
- •Image 1
- •Creating a strong password→
- •Verify your account via sms or Voice Call→
- •Control what others see about you across Google services→
- •Choose the information you share with others
- •More details about your name & photo
- •Preview how your information shows up
- •Preview how your information shows up
- •About Google Accounts→
- •Common issues
- •Product-specific age requirements
- •Disabled account due to incorrect birth date
- •History
- •Technical details
- •Network structure
- •Base station subsystem[edit]
- •Gsm carrier frequencies
- •Voice codecs
- •Subscriber Identity Module (sim)[edit]
- •Phone locking[edit]
- •Gsm security[edit]
- •Standards information[edit]
- •Gsm open-source software[edit]
- •Issues with patents and open source[edit]
- •13.1 Obtaining the electronic services on the portal of e-government of kazakhstan
- •Laboratory work №14
- •Information culture.Internet culture.
4. Contents of the report
Reporting form - a detailed description of the work done at each step in the electronic document (Microsoft Word). Give the structure of a key diskette. The content of the file public and private keys.
5. Test Questions
Share this utility HASP Envelope
Share this utility HASP test
Share this utility HASPEdit
Laboratory work №3
Certification Authorities on the basis of Certificate
Services in Windows Server 2003
introduction Work is carried out in a virtual machine. The operating systems Windows 2003 Server. Administrator password blank.Running Virtual Machine:Start the virtual machine console. Start => All Programs => Microsoft Virtual PC
Remove from the virtual machine console, all information
Add the information to the console for the virtual machine Windows 2003 Server 4. Run a virtual machine running Windows 2003 Server
Installation Certification Center.
1. In the Windows Components Wizard to add a component Update Root Certificates and Certificate Services
2. In the course of installing Certificate Services select "Stand-alone root CA"
3. Specify the name of the Certification Authority. (XXXXXX - replace) 4. Inlet installation disc will be requested of the Windows distribution. Specify the path: C: \ Distrb \ Win2003Sp1 \ I386
5.View the results of the installation. For this:a. run the management console - Start => Run => mmc,
b.
The console opens, add the snap - Certification
Authority
c. To view the contents created by a certification authority. View CA certificate and all the folders. Copy the CA certificate to a file.
Setting CryptoPro CSP
a. From the Control Panel run CryptoPro CSP
b. Go to the Hardware tab,
c. Customize readers, select the drive and Registry
d. Customize random number by biological DFS
At the Crypto CSP configuration completed
III) Request a certificate. Processing request.
a. On the desktop, open the certificate request label.
b. Open shortcut advanced certificate request
c. Open this link Create and submit a request to this CA.
d. Fill in the required fields the request and issue a certificate request.
e. Processing a certificate request
i. The management console of your Certification Authority go to the tab "RequestsPending "
ii. Edit an existing query.
iii. Go to the tab "Issued certificates". Open the issued certificate and become familiar with its contents f. Obtaining a certificate.
i. Connect to the server WEB Certification Center on the link http: // localhost / certsrv
ii.Select the action View the status of a pending certificate request iii.Select the certificate that you want to obtain and install it iv)Cancel CryptoPro CSP settings. Cancel all the settings you have entered v)removal .. Remove Center Certification Center Certification
List of recommended references
June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th Edition - Comprehensive, Thomson Course Technology, a division of Thomson Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski (University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
Craig Van Slyke Information Communication Technologies: Concepts, Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008, Pages: 4288
Brynjolfsson, E. and A. Saunders (2010). Wired for Innovation: How Information Technology Is Reshaping the Economy. Cambridge, MA: MIT Press
Kretschmer, T. (2012), "Information and Communication Technologies and Productivity Growth: A Survey of the Literature", OECD Digital Economy Papers, No. 195, OECD Publishing.
Laboratory work № 4.
The study of cryptographic data protection functions Krypton Series devices
The objective of the work:
The aim is to study the principles of hardware and software Krypton.
Brief theoretical information
Application program interface Crypton DK - is a dynamically linked library (DLL) functions for working with cryptographic data protection (SKZD) Krypton / Crypton on Win32. It is designed for independent developers of applications requiring embedded encryption functions using encoders series Krypton / Crypton.
Crypton DK provides cryptographic functions for symmetric key system. Hardware or software encoders not included Crypton DK.
Using Crypton DK library enables companies to application developers who do not have the FSB license to distribute kriptosredstv, to implement their programs cryptographic functions.
After reading the description Crypton DK and making sure that the implemented encryption features correspond necessary software company may acquire Crypton DK and encoder - Crypton Emulator software or hardware Krypton. With Crypton DK organized challenge to the cryptographic functions in the program, which is able to encrypt the information it processed in software or hardware token.
In the subsequent dissemination of the encoder program can be supplied by the company-developer, if she has a license FSB, either directly by the Company ANKAD program users. In the latter case, the responsibility for implementing shifrosredstv not on the company's developers.
Crypton DK consists of the following elements:
• CryptAPI library implementing CryptonAPI programming interface;
• header files for programs written in C;
• programming examples in C;
• man-pages describing all CryptonAPI functions;
• dongle.
Drivers for SKZD OS Windows Crypton API supplied with SKZD
Crypton DK describes Windows-analogues of the BIOS functions to Krypton and examples
of their use. DOS-programs can call these functions interrupt 4Sh.
CryptonDK Library copy-protected by a dongle connected to the parallel port kompyutera.Takim way, independent software developers using the encryption function of the library, is automatically protected against copying. Hardware keys copy protection transparent to other devices that use a parallel port, such as printers. In addition, the keys allow you to connect them to each other, it can be used on one computer secure software products from different manufacturers. Handling Win32 application to encrypt the device:
1. Application Layer (not dependent on OS)
Win32App1.exe Win32App2.exe ... Win32AppN.exe
2.Level, which provides the application interface with the driver (not dependent on OS) CryptAPI.dll 3. The level of OS kernel (two drivers are used, depending on the OS)
CRYPTON.SYS (Windows NT) CRYPTON.VXD (Windows 95)
4. Physical Layerfee encryption
Driver encryption card encryption virtualizes fee t.e.kazhdoe Win32 application has its own virtual encryption card with your keys K1 and K2, but the K3 key and replace the node are common for all applications. Levels 3 and 4 can be emulated drayverami- emulators CRYPTONL.SYS (Windows NT) and CRYPTONL.VXD (Windows 95).
Support for DOS DOS-programs can use interrupt 0x4c in a DOS emulation mode. You can disable support for driver DOS session with the utility "DOS driver setup" (CryptDOS.exe). With the help of the same tool you can select which driver (working with the card encryption or
emulator) to be used to interrupt 0x4C. Handling DOS-application to the encryption device on Windows: When referring to a device request from the MS-DOS application goes through several levels:
1.MS-DOS application level V86App1.exe V86App2.exe ... V86AppN.exe
2. Level, which provides real-mode programming interface with protected-mode functions cryptdos.vxd 3. The level of OS kernel crypton.vxd
4. Physical Layer fee encryption
When the session starts DOS-driver cryptdos.vxd starts automatically. This driver intercepts interrupt 0x4S. When the DOS-application generates a software interrupt 0x4C, the driver passes control to the driver board crypton.vxd encryption.
Description BIOS KRYPTON is the DOS-functions in the manual programmer (file program.txt), the supplied SKZD "Krypton-4".
