In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of passwords, it is very useful to know how effective the widely available applications for cracking passwords. This research analyzes, in which way an attacker is able to obtain the password of a Windows Vista PC. During this research the physical access to the PC is needed. This research shows that password consists of 8 characters with small letter characters and numbers can easily be cracked if it has know usual combinations. Whereas a Dictionary Attack will probably not find unusual combinations. Adding captel letter characters will make the process harder as there are several more combinations, so it will take longer time but is still feasible. Taking into account special characters it will probably take too long time and even most Dictionary Attacks will fail. For rainbow tables the size of the table has to be considered. If it is not too big, even these small passwords cannot be cracked. For longer passwords probably the simplest ones, small letter characters and numbers, can be cracked only. In this case brute force takes too long time in most cases and a dictionary will contain only a few words this long and even the rainbow tables become too large for normal use. They can only be successful if enough limitations are known and the overall size of the table can be limited.
The current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreRecycling process presents a sustainable pavement by using the old materials that could be milled, mixed with virgin materials and recycling agents to produce recycled mixtures. The objective of this study is to evaluate the impact of water on recycled asphalt concrete mixtures, and the effect of the inclusion of old materials into recycled mixtures on the resistance of water damage. A total of 54 Marshall Specimens and 54 compressive strength specimens of (virgin, recycled, and aged asphalt concrete mixtures) had been prepared, and subjected to Tensile Strength Ratio test, and Index of Retained Strength test. Four types of recycling agents (used oil, oil + crumb rubber, soft grade asphalt cement, and asphalt cement + Su
... Show MoreEvaluating the part of historical center in Baghdad City
Iraq has witnessed development in many fields and the electricity production sector is one of the most important of these fields. This is attributed to the State’s philosophy in supporting this sector through the development of economic development projects to serve and raise the level of the Iraqi individual. Electricity production in Iraq is affected by many variables such as load growth, economic and financial conditions, planning, etc. All these led to a disparity in the production of electric power to cover the demand for energy. The paper deals with the electricity generation sector overview in Iraq, Analysis of the effects of variables on the implementation of power generatio
. This rtsearch involveda a study of the relationship
between GPS coordinates and planimetry coordinates. It was found that there is a relation between GPS output coordinates and
the coordinates of a distance point from the positi on of the GPS point
. In order to pricist the direction of distance a reference point had been
used which is
( Greenwich Mean observatory) GMO.
The angles between the studying
... Show MoreThe study aims mainly to evaluate the performance of Sharq Dijila water treatment plant in removing turbidity for the period of 1-4-2001 to 31-3-2004. Daily data for turbidity of raw, clarified, filtered, and supplied water were analyzed. The results of the study showed that there is a wide variation in turbidity levels of raw water fluctuating between 10-1000 NTU with mean value of 41.3 NTU. Turbidity values of the clarified water varied between 1.4-77 NTU. Based on the turbidity value of 10 NTU and 20 NTU (the design maximum turbidity) the readings gave an acceptable percentage of 32.4% and 86% respectively. The turbidity of filtered water ranged between 0.2-4.5 NTU which are completely in compliance with Iraqi and WHO standards. In ac
... Show More