In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of passwords, it is very useful to know how effective the widely available applications for cracking passwords. This research analyzes, in which way an attacker is able to obtain the password of a Windows Vista PC. During this research the physical access to the PC is needed. This research shows that password consists of 8 characters with small letter characters and numbers can easily be cracked if it has know usual combinations. Whereas a Dictionary Attack will probably not find unusual combinations. Adding captel letter characters will make the process harder as there are several more combinations, so it will take longer time but is still feasible. Taking into account special characters it will probably take too long time and even most Dictionary Attacks will fail. For rainbow tables the size of the table has to be considered. If it is not too big, even these small passwords cannot be cracked. For longer passwords probably the simplest ones, small letter characters and numbers, can be cracked only. In this case brute force takes too long time in most cases and a dictionary will contain only a few words this long and even the rainbow tables become too large for normal use. They can only be successful if enough limitations are known and the overall size of the table can be limited.
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreDespite the multiplicity of institutions contributing to the decision-making process in the United States of America, they interact to crystallize positions regarding international and strategic situations. The formulation of the national security policy depends on a number of institutions that complement each other in order to achieve an advanced security situation. Thus, the decision reflects the process of interaction of the existing regulatory institutions. This is because the essence of the national security and achieving its requirements also stems from the existence of a coherent system of shared beliefs and principles in the American society. Besides, these elements are the bases for achieving
... Show MoreThe interactive websites are the interaction between the product and the user, and interactive design is based on the user interface for communication and how the interface responds to the user and how to help him to achieve his goals and enjoy the use of the interface. The interactive design is based on the design of interactive programs, i.e., programs that directly interact with the user, taking into account the different culture of the audience, the age group and many other factors. An example for the use of the user interface: Web designs, smartphone application designs and it even includes computer operating systems and electronic game interface. The interaction is the communication between the source and the receiver. The we
... Show MoreBackground: Axillary lymph node (ALN) enlargement with diffuse cortical thickening and conserved echogenic hilum may represent a diagnostic and therapeutic challenge. Sonographic strain elastography may help the characterization of borderline ALN.
Aim: To evaluate the strain elastography of borderline ALN and to calculate a cutoff value of strain ratio (SR) that can identify suspicious ALN with the highest sensitivity and specificity to reduce unnecessary invasive procedures.
Subjects and Methods: A prospective study included 45 patients who attended the Breast clinic in Oncology Teaching Hospital with borderline axillary lymphadenopathy (intact hilum and diffusely thic
... Show MoreResearches in the field of evaluation of industrial products emotionally are internationally new and non-existing in the Arabic speaking countries, which is considered the crux of the problem in the current research, in addition to the need of the designers and design students to know how to measure the emotional responses for the industrial product in order to get benefit from them in their designs. The research objective is to get a tool that uses emojis in measuring the emotional responses for the products. The researcher designed an emotional verbal wheel and emojis wheel. The sample of the research consisted of (7) chairs different in design and use, and the respondents were (89) students. The most important results are:
1- Desi
The estimation of recharge to ground water is the important basics to improve the use of ground water with other available resources, and to save ground water resource from depletion, especially when using large quantity of ground water during a long time such as for agricultural purposes. Al-Wand River Basin in Iraq suffers from water shortage of its requirement of Blajo–Al-Wand Project, and to cover this shortage, the ground water plays a good role to overcome this problem. In this study, three methods were used to estimate the recharge and ground water storage for Al-Wand Basin, these methods are: Water Table Fluctuation (WTF), Water Balance of Climatic for Basin, and Water Table Balance for Basin. The results showe
... Show MoreThe electrocoagulation process became one of the most important technologies used for water treatment processes in the last few years. It’s the preferred method to remove suspended solids and heavy metals from water for treating drinking water and wastewater from textile, diary, and electroplating factories. This research aims to study the effect of using the electrocoagulation process with aluminum electrodes on the removal efficiency of suspended solids and turbidity presented in raw water and optimizing by the response surface methodology (RSM). The most important variables studied in this research included electrode spacing, the applied voltage, and the operating time of the electrocoagulation process. The samples
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreAlthough there are many wastewater treatment plants, we still suffer from many problems resulting from a lack of experience or technical operating problems. In this research, the service’s efficiency is evaluated according to the design laws required for small factories in the province of Najaf, which works with filtering technology through point filtration, the old project in the Al-Baraka plant, and the second works. Within the biological treatment mbbr + activated sludge, which is a biomass technology where samples were taken from both plants and annual values of the pollutant rate after treatment in the old Al-Baraka plant project COD 64 mg/L and the demand for biochemical oxyge
The experiment aimed to Manufacture a device for checking the nozzles and testing its efficiency and to study the effect of research factors on the studied traits. The device was manufactured locally through using materials available in the Iraqi market. The system is Both Hydraulic and electronic (ISO 5682-1)1 relay on sensors technology and the test platform was built and designed on a movable trolly at the department of Agricultural Machines and Equipment / College of Agricultural Science / University of Baghdad. The design includes the use of mechanical water pump and electrical AC water pump. The design includes a nozzle holder that can accommodate three nozzles per test. The design also consists of spreading wings and stationa
... Show More