انواع فایل

دانلود فایل ، خرید جزوه، تحقیق،

انواع فایل

دانلود فایل ، خرید جزوه، تحقیق،

اندازه گذاری و تلرانس گذاری هندسی GD and T 83 ص

لینک دانلود و خرید پایین توضیحات

فرمت فایل word  و قابل ویرایش و پرینت

تعداد صفحات: 84

 

اندازه گذاری و تلرانس گذاری هندسی (GD and T )

Geometric dimensioning and to lerancing

تلرانس گذاری بصورت مثبت و منفی ( اندازه اسمی + حد بالا و پایین ) نمی تواند به طور کامل تمام جزئیات ساخت یک قطعه را در نقشه نشان می دهد و در بسیاری موارد سازنده را دچار ابهام می کند . مثال زیر این نکته را روشن می نماید .

همانطور که در شکل دیده می شود برای تعیین موقعیت سوراخ باید مرکز آن نسبت به یک موقعیت معین مثلاً گوشه قطعه کار مشخص شود . فاصله مرکز از گوشه در راستای x و y برابر دو mm است . اما طبیعی است که این اعداد خود دارای تلرانسی هستند و نمی توانند اعداد و mm منظور گردند . لذا تلرانس آنها بصورت مثبت و منفی 005/0 mm تعیین شده است به این مفهوم که عدد mm 2 می تواند بین 995/1 الی 005/2 mm باشد بدین ترتیب مراکز سوراخ در یک محدوده مربعی شکل با ابعاد 010/0 در 010/0 mm جای می گیرد. به عبارت دیگر مرکز سوراخ دریلر بخشی از این مربع که قرار می گیرد ظاهرا قابل قبول است که البته این مشابه شبهه برانگیز است. نکته جالب تر اینکه دیگر اگر مرکز سوراخ روی محیط مربع قرار گیرد نیز ظاهرا باید مورد قبول باشد چنانچه این شرط را بپذیریم پس مرکز سوراخ می تواند روی گوشه های مربع نیز باشد که در این صورت فاصله آن از مرکز واقعی واصلی برابر یعنی 007/0 mm است که خارج از حد بالا و پایین تلرانس تعیین شده است. (005/0 ) کاملا واضح است که این نوع تلرانس است کافی ندارد و می تواند باعث سوالات زیادی شود؟

-آیا مرکز سوراخ می تواند در هر جایی در موقع تلرانسی قرار گیرد؟

- آیا مرکز سوراخ می تواند در روی محیط مربع تلرانسی نیز باشد؟

- آیا مرکز سوراخ می تواند در روی گوشه های مربع تلرانسی باشد؟

فرض کنید به جای آنکه از یک مربع برای تعیین محدوده تلرانسی استفاده نماییم از یک دایره برای این کار بهره ببریم. مثلا به نحوی روی مته مشخص نماییم که مرکز سوراخ می تواند هر جایی درون دایره ای به شعاع 005/0 اینچ باشد (طول مرکز اصلی سوراخ) بدین ترتیب چون دایره دارای ویژگی همان بودن تمام نقاط روی محیط آن است مشکل مربع و گوشه های آن حل خواهد شد. پس باید علاوه بر تلرانس های مثبت و منفی دوکار دیگر جهت تکمیل و روشن کردن موقعیت سوراخ انجام دهیم:

1-موقعیت دقیق مرکز سوراخ و محدوده تلرانسی آن را با یک علامت یا توضیح شرح دهیم

2-از تلرانس دایروی استفاده کنیم تا تلرانس گذاری مربعی شبهه برانگیز نباشد.

GD and T همین مطلب را دنبال می کند که اولا تلرانس گذاری دایروی را در نقشه اعمال کنیم ثانیا ویژگی های بخش های مختلف نقشه را کامل تر تعیین نماییم (نظیر موقعیت یک سوراخ و ...) این کار از طریق علائم و نشانه های استانداردی انجام می شود که در مبحث GD and T مورد بررسی قرار می گیرد.



خرید و دانلود  اندازه گذاری و تلرانس گذاری هندسی GD and T 83 ص


اصول پیش زمینه و firewall 10 ص

لینک دانلود و خرید پایین توضیحات

فرمت فایل word  و قابل ویرایش و پرینت

تعداد صفحات: 10

 

- Background and Firewall Basics

Before being able to understand a complete discussion of firewalls, it's important to understand the basic principles that make firewalls work.

What is a network firewall?

A firewall is a system or group of systems that enforces an access control policy between two or more networks. The actual means by which this is accomplished varies widely, but in principle, the firewall can be thought of as a pair of mechanisms: one which exists to block traffic, and the other which exists to permit traffic. Some firewalls place a greater emphasis on blocking traffic, while others emphasize permitting traffic. Probably the most important thing to recognize about a firewall is that it implements an access control policy. If you don't have a good idea of what kind of access you want to allow or to deny, a firewall really won't help you. It's also important to recognize that the firewall's configuration, because it is a mechanism for enforcing policy, imposes its policy on everything behind it. Administrators for firewalls managing the connectivity for a large number of hosts therefore have a heavy responsibility.

Why would I want a firewall?

The Internet, like any other society, is plagued with the kind of jerks who enjoy the electronic equivalent of writing on other people's walls with spraypaint, tearing their mailboxes off, or just sitting in the street blowing their car horns. Some people try to get real work done over the Internet, and others have sensitive or proprietary data they must protect. Usually, a firewall's purpose is to keep the jerks out of your network while still letting you get your job done.

Many traditional-style corporations and data centers have computing security policies and practices that must be followed. In a case where a company's policies dictate how data must be protected, a firewall is very important, since it is the embodiment of the corporate policy. Frequently, the hardest part of hooking to the Internet, if you're a large company, is not justifying the expense or effort, but convincing management that it's safe to do so. A firewall provides not only real security--it often plays an important role as a security blanket for management.

Lastly, a firewall can act as your corporate ``ambassador'' to the Internet. Many corporations use their firewall systems as a place to store public information about corporate products and services, files to download, bug-fixes, and so forth. Several of these systems have become important parts of the Internet service structure (e.g., UUnet.uu.net, whitehouse.gov, gatekeeper.dec.com) and have reflected well on their organizational sponsors. Note that while this is historically true, most organizations now place public information on a Web server, often protected by a firewall, but not normally on the firewall itself.

What can a firewall protect against?

Some firewalls permit only email traffic through them, thereby protecting the network against any attacks other than attacks against the email service. Other firewalls provide less strict protections, and block services that are known to be problems.

Generally, firewalls are configured to protect against unauthenticated interactive logins from the ``outside'' world. This, more than anything, helps prevent vandals from logging into machines on your network. More elaborate firewalls block traffic from the outside to the inside, but permit users on the inside to communicate freely with the outside. The firewall can protect you against any type of network-borne attack if you unplug it.

Firewalls are also important since they can provide a single ``choke point'' where security and audit can be imposed. Unlike in a situation where a computer system is being attacked by someone dialing in with a modem, the firewall can act as an effective ``phone tap'' and tracing tool. Firewalls provide an important logging and auditing function; often they provide summaries to the administrator about what kinds and amount of traffic passed through it, how many attempts there were to break into it, etc.

Because of this, firewall logs are critically important data. They can be used as evidence in a court of law in most countries. You should safeguard, analyze and protect yoru firewall logs accordingly.

This is an important point: providing this ``choke point'' can serve the same purpose on your network as a guarded gate can for your site's physical premises. That means anytime you have a change in ``zones'' or levels of sensitivity, such a checkpoint is appropriate. A company rarely has only an outside gate and no receptionist or security staff to check badges on the way in. If there are layers of security on your site, it's reasonable to expect layers of security on your network.

What can't a firewall protect against?

Firewalls can't protect against attacks that don't go through the firewall. Many corporations that connect to the Internet are very concerned about proprietary data leaking out of the company through that route. Unfortunately for those concerned, a magnetic tape, compact disc, DVD, or USB flash drives can just as effectively be used to export data. Many organizations that are terrified (at a management level) of Internet connections have no coherent policy about how dial-in access via modems should be protected. It's silly to build a six-foot thick steel door when you live in a wooden house, but there are a lot of organizations out there buying expensive firewalls and neglecting the numerous other back-doors into their network. For a firewall to work, it must be a part of a consistent overall organizational security architecture. Firewall policies must be realistic and reflect the level of security in the entire network. For example, a site with top secret or classified data doesn't need a firewall at all: they shouldn't be hooking up to the Internet in the first place, or the systems with the really secret data should be isolated from the rest of the corporate network.

Another thing a firewall can't really protect you against is traitors or idiots inside your network. While an industrial spy might export information through your firewall, he's just as likely to export it through a telephone, FAX machine, or Compact Disc. CDs are a far more likely means for information to leak from your organization than a firewall. Firewalls also cannot protect you against stupidity. Users who reveal sensitive information over the telephone are good targets for social engineering; an attacker may be able to break into your network by completely bypassing your firewall, if he can find a ``helpful'' employee inside who can be fooled into giving access to a modem pool. Before deciding this isn't a problem in your organization, ask yourself how much trouble a contractor has getting logged into the network or how much difficulty a user who forgot his password has getting it reset. If the people on the help desk believe that every call is internal, you have a problem that can't be fixed by tightening controls on the firewalls.

Firewalls can't protect against tunneling over most application protocols to trojaned or poorly written clients. There are no magic bullets and a firewall is not an excuse to not implement software controls on internal networks or ignore host security on servers. Tunneling ``bad'' things over HTTP, SMTP, and other protocols is quite simple and trivially demonstrated. Security isn't ``fire and forget''.

Lastly, firewalls can't protect against bad things being allowed through them. For instance, many Trojan Horses use the Internet Relay Chat (IRC) protocol to allow an attacker to control a compromised internal host from a public IRC server. If you allow any internal system to connect to any external system, then your firewall will provide no protection from this vector of attack.



خرید و دانلود  اصول پیش زمینه و firewall 10 ص


اندازه گذاری و تلرانس گذاری هندسی GD and T 83 ص

لینک دانلود و خرید پایین توضیحات

فرمت فایل word  و قابل ویرایش و پرینت

تعداد صفحات: 84

 

اندازه گذاری و تلرانس گذاری هندسی (GD and T )

Geometric dimensioning and to lerancing

تلرانس گذاری بصورت مثبت و منفی ( اندازه اسمی + حد بالا و پایین ) نمی تواند به طور کامل تمام جزئیات ساخت یک قطعه را در نقشه نشان می دهد و در بسیاری موارد سازنده را دچار ابهام می کند . مثال زیر این نکته را روشن می نماید .

همانطور که در شکل دیده می شود برای تعیین موقعیت سوراخ باید مرکز آن نسبت به یک موقعیت معین مثلاً گوشه قطعه کار مشخص شود . فاصله مرکز از گوشه در راستای x و y برابر دو mm است . اما طبیعی است که این اعداد خود دارای تلرانسی هستند و نمی توانند اعداد و mm منظور گردند . لذا تلرانس آنها بصورت مثبت و منفی 005/0 mm تعیین شده است به این مفهوم که عدد mm 2 می تواند بین 995/1 الی 005/2 mm باشد بدین ترتیب مراکز سوراخ در یک محدوده مربعی شکل با ابعاد 010/0 در 010/0 mm جای می گیرد. به عبارت دیگر مرکز سوراخ دریلر بخشی از این مربع که قرار می گیرد ظاهرا قابل قبول است که البته این مشابه شبهه برانگیز است. نکته جالب تر اینکه دیگر اگر مرکز سوراخ روی محیط مربع قرار گیرد نیز ظاهرا باید مورد قبول باشد چنانچه این شرط را بپذیریم پس مرکز سوراخ می تواند روی گوشه های مربع نیز باشد که در این صورت فاصله آن از مرکز واقعی واصلی برابر یعنی 007/0 mm است که خارج از حد بالا و پایین تلرانس تعیین شده است. (005/0 ) کاملا واضح است که این نوع تلرانس است کافی ندارد و می تواند باعث سوالات زیادی شود؟

-آیا مرکز سوراخ می تواند در هر جایی در موقع تلرانسی قرار گیرد؟

- آیا مرکز سوراخ می تواند در روی محیط مربع تلرانسی نیز باشد؟

- آیا مرکز سوراخ می تواند در روی گوشه های مربع تلرانسی باشد؟

فرض کنید به جای آنکه از یک مربع برای تعیین محدوده تلرانسی استفاده نماییم از یک دایره برای این کار بهره ببریم. مثلا به نحوی روی مته مشخص نماییم که مرکز سوراخ می تواند هر جایی درون دایره ای به شعاع 005/0 اینچ باشد (طول مرکز اصلی سوراخ) بدین ترتیب چون دایره دارای ویژگی همان بودن تمام نقاط روی محیط آن است مشکل مربع و گوشه های آن حل خواهد شد. پس باید علاوه بر تلرانس های مثبت و منفی دوکار دیگر جهت تکمیل و روشن کردن موقعیت سوراخ انجام دهیم:

1-موقعیت دقیق مرکز سوراخ و محدوده تلرانسی آن را با یک علامت یا توضیح شرح دهیم

2-از تلرانس دایروی استفاده کنیم تا تلرانس گذاری مربعی شبهه برانگیز نباشد.

GD and T همین مطلب را دنبال می کند که اولا تلرانس گذاری دایروی را در نقشه اعمال کنیم ثانیا ویژگی های بخش های مختلف نقشه را کامل تر تعیین نماییم (نظیر موقعیت یک سوراخ و ...) این کار از طریق علائم و نشانه های استانداردی انجام می شود که در مبحث GD and T مورد بررسی قرار می گیرد.



خرید و دانلود  اندازه گذاری و تلرانس گذاری هندسی GD and T 83 ص


اصول پیش زمینه و firewall 10 ص

لینک دانلود و خرید پایین توضیحات

فرمت فایل word  و قابل ویرایش و پرینت

تعداد صفحات: 10

 

- Background and Firewall Basics

Before being able to understand a complete discussion of firewalls, it's important to understand the basic principles that make firewalls work.

What is a network firewall?

A firewall is a system or group of systems that enforces an access control policy between two or more networks. The actual means by which this is accomplished varies widely, but in principle, the firewall can be thought of as a pair of mechanisms: one which exists to block traffic, and the other which exists to permit traffic. Some firewalls place a greater emphasis on blocking traffic, while others emphasize permitting traffic. Probably the most important thing to recognize about a firewall is that it implements an access control policy. If you don't have a good idea of what kind of access you want to allow or to deny, a firewall really won't help you. It's also important to recognize that the firewall's configuration, because it is a mechanism for enforcing policy, imposes its policy on everything behind it. Administrators for firewalls managing the connectivity for a large number of hosts therefore have a heavy responsibility.

Why would I want a firewall?

The Internet, like any other society, is plagued with the kind of jerks who enjoy the electronic equivalent of writing on other people's walls with spraypaint, tearing their mailboxes off, or just sitting in the street blowing their car horns. Some people try to get real work done over the Internet, and others have sensitive or proprietary data they must protect. Usually, a firewall's purpose is to keep the jerks out of your network while still letting you get your job done.

Many traditional-style corporations and data centers have computing security policies and practices that must be followed. In a case where a company's policies dictate how data must be protected, a firewall is very important, since it is the embodiment of the corporate policy. Frequently, the hardest part of hooking to the Internet, if you're a large company, is not justifying the expense or effort, but convincing management that it's safe to do so. A firewall provides not only real security--it often plays an important role as a security blanket for management.

Lastly, a firewall can act as your corporate ``ambassador'' to the Internet. Many corporations use their firewall systems as a place to store public information about corporate products and services, files to download, bug-fixes, and so forth. Several of these systems have become important parts of the Internet service structure (e.g., UUnet.uu.net, whitehouse.gov, gatekeeper.dec.com) and have reflected well on their organizational sponsors. Note that while this is historically true, most organizations now place public information on a Web server, often protected by a firewall, but not normally on the firewall itself.

What can a firewall protect against?

Some firewalls permit only email traffic through them, thereby protecting the network against any attacks other than attacks against the email service. Other firewalls provide less strict protections, and block services that are known to be problems.

Generally, firewalls are configured to protect against unauthenticated interactive logins from the ``outside'' world. This, more than anything, helps prevent vandals from logging into machines on your network. More elaborate firewalls block traffic from the outside to the inside, but permit users on the inside to communicate freely with the outside. The firewall can protect you against any type of network-borne attack if you unplug it.

Firewalls are also important since they can provide a single ``choke point'' where security and audit can be imposed. Unlike in a situation where a computer system is being attacked by someone dialing in with a modem, the firewall can act as an effective ``phone tap'' and tracing tool. Firewalls provide an important logging and auditing function; often they provide summaries to the administrator about what kinds and amount of traffic passed through it, how many attempts there were to break into it, etc.

Because of this, firewall logs are critically important data. They can be used as evidence in a court of law in most countries. You should safeguard, analyze and protect yoru firewall logs accordingly.

This is an important point: providing this ``choke point'' can serve the same purpose on your network as a guarded gate can for your site's physical premises. That means anytime you have a change in ``zones'' or levels of sensitivity, such a checkpoint is appropriate. A company rarely has only an outside gate and no receptionist or security staff to check badges on the way in. If there are layers of security on your site, it's reasonable to expect layers of security on your network.

What can't a firewall protect against?

Firewalls can't protect against attacks that don't go through the firewall. Many corporations that connect to the Internet are very concerned about proprietary data leaking out of the company through that route. Unfortunately for those concerned, a magnetic tape, compact disc, DVD, or USB flash drives can just as effectively be used to export data. Many organizations that are terrified (at a management level) of Internet connections have no coherent policy about how dial-in access via modems should be protected. It's silly to build a six-foot thick steel door when you live in a wooden house, but there are a lot of organizations out there buying expensive firewalls and neglecting the numerous other back-doors into their network. For a firewall to work, it must be a part of a consistent overall organizational security architecture. Firewall policies must be realistic and reflect the level of security in the entire network. For example, a site with top secret or classified data doesn't need a firewall at all: they shouldn't be hooking up to the Internet in the first place, or the systems with the really secret data should be isolated from the rest of the corporate network.

Another thing a firewall can't really protect you against is traitors or idiots inside your network. While an industrial spy might export information through your firewall, he's just as likely to export it through a telephone, FAX machine, or Compact Disc. CDs are a far more likely means for information to leak from your organization than a firewall. Firewalls also cannot protect you against stupidity. Users who reveal sensitive information over the telephone are good targets for social engineering; an attacker may be able to break into your network by completely bypassing your firewall, if he can find a ``helpful'' employee inside who can be fooled into giving access to a modem pool. Before deciding this isn't a problem in your organization, ask yourself how much trouble a contractor has getting logged into the network or how much difficulty a user who forgot his password has getting it reset. If the people on the help desk believe that every call is internal, you have a problem that can't be fixed by tightening controls on the firewalls.

Firewalls can't protect against tunneling over most application protocols to trojaned or poorly written clients. There are no magic bullets and a firewall is not an excuse to not implement software controls on internal networks or ignore host security on servers. Tunneling ``bad'' things over HTTP, SMTP, and other protocols is quite simple and trivially demonstrated. Security isn't ``fire and forget''.

Lastly, firewalls can't protect against bad things being allowed through them. For instance, many Trojan Horses use the Internet Relay Chat (IRC) protocol to allow an attacker to control a compromised internal host from a public IRC server. If you allow any internal system to connect to any external system, then your firewall will provide no protection from this vector of attack.



خرید و دانلود  اصول پیش زمینه و firewall 10 ص


ویروسها ، کرمها وتروژانها 15 ص

لینک دانلود و خرید پایین توضیحات

فرمت فایل word  و قابل ویرایش و پرینت

تعداد صفحات: 17

 

What are viruses, worms, and Trojans?

http://www.microsoft.com/athome/security/viruses/fwbenefits.mspx

 

Viruses, worms, and Trojans are malicious programs that can cause damage to your computer and information on your computer. They can also slow down the Internet, and they might even use your computer to spread themselves to your friends, family, co-workers, and the rest of the Web. The good news is that with an ounce of prevention and some good common sense, you are less likely to fall victim to these threats. Think of it as locking your front door to protect your entire family.

Read on to learn about the characteristics and differences of viruses, worms, and Trojans.

What is a virus?

What is a worm?

What is a Trojan?

How do worms and other viruses spread?

How can I tell if I have a worm or other virus?

Next steps: Reducing your virus risk

What is a virus?

A virus is a piece of computer code that attaches itself to a program or file so it can spread from computer to computer, infecting as it travels. Viruses can damage your software, your hardware, and your files.

Virus (n.) Code written with the express intention of replicating itself. A virus attempts to spread from computer to computer by attaching itself to a host program. It may damage hardware, software, or information.

Just as human viruses range in severity from Ebola to the 24-hour flu, computer viruses range from the mildly annoying to the downright destructive. The good news is that a true virus does not spread without human action to move it along, such as sharing a file or sending an e-mail.

What is a worm?

A worm, like a virus, is designed to copy itself from one computer to another, but it does so automatically by taking control of features on the computer that can transport files or information. Once you have a worm in your system it can travel alone. A great danger of worms is their ability to replicate in great volume. For example, a worm could send out copies of itself to everyone listed in your e-mail address book, and their computers would then do the same, causing a domino effect of heavy network traffic that would slow down business networks and the Internet as a whole. When new worms are unleashed, they spread very quickly, clogging networks and possibly making you wait twice as long for you (and everyone else) to view Web pages on the Internet.

Worm (n.) A subclass of virus. A worm generally spreads without user action and distributes complete copies (possibly modified) of itself across networks. A worm can consume memory or network bandwidth, thus causing a computer to stop responding.

Because worms don't need to travel via a "host" program or file, they can also tunnel into your system and allow somebody else to take control of your computer remotely. Recent examples of worms included the Sasser worm and the Blaster worm.

What is a Trojan?

Just as the mythological Trojan horse appeared to be a gift, but turned out to contain Greek soldiers who overtook the city of Troy, today's Trojans are computer programs that appear to be useful software, but instead they compromise your security and cause a lot of damage. A recent Trojan came in the form of an e-mail message that included attachments claiming to be Microsoft security updates, but turned out to be viruses that attempted to disable antivirus and firewall software.

Trojan (n.) A computer program that appears to be useful but that actually does damage.

Trojans spread when people are lured into opening a program because they think it comes from a legitimate source. To better protect users, Microsoft often sends out security bulletins by e-mail, but these bulletins will never contain attachments. We also publish all our security alerts on our Security Web site before we send notice of them to our customers.

Trojans can also be included in software that you download for free. Never download software from a source that you don't trust. Always download Microsoft updates and patches from Microsoft Windows Update or Microsoft Office Update.

How do worms and other viruses spread?

Virtually all viruses and many worms cannot spread unless you open or run an infected program.

Many of the most dangerous viruses were primarily spread through e-mail attachments—the files that are sent along with an e-mail message. You can usually tell if your e-mail includes an attachment because you'll see a paperclip icon that represents the attachment and includes its name. Photos, letters written in Microsoft Word, and even Excel spreadsheets are just some of the file types you might receive through e-mail each day. The virus is launched when you open the file attachment (usually by double-clicking the attachment icon).

Tip:  Never open anything that is attached to an e-mail message unless you were expecting the attachment and you know the exact contents of that file.

If you receive an e-mail message with an attachment from someone you don't know, you should delete it immediately. Unfortunately, you're no longer safe opening attachments from people you do know. Viruses and worms have the ability to steal the information out of e-mail programs and send themselves to everyone listed in your address book. So, if you get e-mail from someone with a message you don't understand or a file you weren't expecting, always contact the person and confirm the contents of the attachment before you open it.

Other viruses can spread through programs you download from the Internet or from virus-ridden computer disks that you borrow from friends or even buy in a store. These are less common ways to contract a computer virus. Most people get viruses from opening and running unknown e-mail attachments.



خرید و دانلود  ویروسها ، کرمها وتروژانها    15 ص