Ghossoon. M. W. Al-Saadoon

Learn More
—Trojan virus attacks pose one of the most serious threats to computer security. A Trojan horse is typically separated into two parts – a server and a client. It is the client that is cleverly disguised as significant software and positioned in peer-to-peer file sharing networks, or unauthorized download websites. The most common means of infection is(More)
One of the main problems which are considered in this paper is Bluesnarfing which is a high jacking process that will take control over another Bluetooth device without permission. In this case the attacker is capable to tabulate and recognizes the victim's data such as phone book, calendar, messages and other features as well. This paper resembles an(More)
Security issues are a core part of distributed computing systems, and are part of everyday life since they are used in web servers, email, mobile phones, bank transactions etc. Applications which send an unencrypted password over a communication channel are extremely vulnerable. In addition, the only techniques that have been applied to most systems are(More)
  • 1