| FILE_ID | DOCUMENT DETAILS | ACTION |
|---|---|---|
| DOC-03-1A |
Final Year Project Proposal
This proposal outlines a research project investigating how hybrid mesh-satellite systems can maintain stable connectivity in rural or disaster-relief areas. It explores the technical challenges of managing handoffs between different network nodes and proposes a framework to ensure reliable communication in environments where traditional infrastructure is unavailable.
|
[ EXTRACT PDF ] |
| DOC-03-1B |
Network Security Logbook
This technical log documents practical exercises in defensive and offensive network security. It includes research on historical malware like the Sadmind worm, impact analyses of Denial of Service (DoS) attacks, and laboratory work on firewall configuration and web application security. The report concludes with an investigation into stealthy malware propagation using process injection and sandboxing.
|
[ EXTRACT PDF ] |
| DOC-03-1C |
Penetration Testing and Ethical Vulnerability
A comprehensive logbook covering the methodologies used to identify and exploit system weaknesses. Tasks include passive and active enumeration, reverse engineering software with Ghidra, and exploring memory corruption through buffer overflow development. It also details successful privilege escalation in Linux systems by exploiting SUID misconfigurations.
|
[ EXTRACT PDF ] |
| DOC-03-1D |
Tablet Application for Children's Literacy
This report details the design and prototype of a gamified tablet application aimed at encouraging reading among children aged 4 to 8. It outlines a proposed research study to evaluate user engagement, including a methodology for observational data collection and a plan for assessing child comprehension through interactive quizzes.
|
[ EXTRACT PDF ] |