Abstmct-The deployment of low·interaction honeypots used mainly as deception tools has become more and more common these days. Another interesting but more resource and time consuming playground is made available thanks to high interaction honeypots where a blackhat can connect to the system and download, install and execute his own tools in a less con strained environment.Once catched in the honeypot, the black hat leaves many fingerprints behind him: network (information gathering scans, IRC chats, mail, etc) and system activity (what he did on the system, which tools he used, etc). The aim of honeypot forensics is to identify these fingerprints as part of the evidence gathering process.We present a methodology that will help the analyst to achieve this goal. The first step is to analyze the honeypot's ingress and egress network traffic. The second one is to took at the actions performed by the blackhat and the tools he used on the honeypot. The next step is to correlate these data: network and system events are joined to identify com mon events or patterns, and also to highlight unexplained items and focus on them.
Background. Revision of failed bariatric procedures is a significant challenge for bariatric surgeons, because of the increasing number of recurring morbid obesity or complications, especially in patients with a previous Vertical Banded Gastroplasty (VBG). Methods. Since November 1998, 109 patients with failed or complicated VBG were followed in a retrospective study. 49 patients underwent re-VBG and, since 2004, 60 underwent Roux-en-Y Gastric Bypass-on-Vertical Banded Gastroplasty (RYGB-on-VBG). Results. At 3 years follow-up, mean BMI decreased from 37.4 to 31.2 Kg/m2 in the first group, and from 35.0 to 28.4 Kg/m2 in the second. Early complications were 7 (14.3%) in the first group and 4 (6.5%) in the second; late complications were 33 (59.1%) and 11 (18.3%), respectively. Conclusion. Although both operations seem to be effective as bariatric revision procedures in terms of BMI, the mid-term outcomes of RYGB-on-VBG demonstrate the lowest rate of complications and better quality of life.
Thirteen patients who underwent surgery for retinal detachment and injection of intraocular tamponade media (silicone oil, fluorosilicone oil, or perfluorocarbon liquid) underwent magnetic resonance imaging (MRI), using spin-echo T1- and T2-weighted images. The ophthalmic tamponade media showed different signal intensity, according to their chemical structure. Unlike ophthalmoscopy or ultrasonography, MRI showed no oil-related artefact, making possible recognition of recurrent retinal detachment.
Printers are common devices whose networked use is vastly unsecured, perhaps due to an enrooted assumption that their services are somewhat negligible and, as such, unworthy of protection. This article develops structured arguments and conducts technical experiments in support of a qualitative risk assessment exercise that ultimately undermines that assumption. Three attacks that can be interpreted as postexploitation activity are found and discussed, forming what we term the Printjack family of attacks to printers. Some printers may suffer vulnerabilities that would transform them into exploitable zombies. Moreover, a large number of printers, at least on an EU basis, are found to honour unauthenticated printing requests, thus raising the risk level of an attack that sees the crooks exhaust the printing facilities of an institution. There is also a remarkable risk of data breach following an attack consisting in the malicious interception of data while in transit towards printers. Therefore, the newborn IoT era demands printers to be as secure as other devices such as laptops should be, also to facilitate compliance with the General Data Protection Regulation (EU Regulation 2016/679) and reduce the odds of its administrative fines.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.