Preferred Language
Articles
/
bsj-2816
Evaluating Windows Vista user account security

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of passwords, it is very useful to know how effective the widely available applications for cracking passwords. This research analyzes, in which way an attacker is able to obtain the password of a Windows Vista PC. During this research the physical access to the PC is needed. This research shows that password consists of 8 characters with small letter characters and numbers can easily be cracked if it has know usual combinations. Whereas a Dictionary Attack will probably not find unusual combinations. Adding captel letter characters will make the process harder as there are several more combinations, so it will take longer time but is still feasible. Taking into account special characters it will probably take too long time and even most Dictionary Attacks will fail. For rainbow tables the size of the table has to be considered. If it is not too big, even these small passwords cannot be cracked. For longer passwords probably the simplest ones, small letter characters and numbers, can be cracked only. In this case brute force takes too long time in most cases and a dictionary will contain only a few words this long and even the rainbow tables become too large for normal use. They can only be successful if enough limitations are known and the overall size of the table can be limited.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Boosting the Network Performance using Two Security Measure Scenarios for Service Provider Network

Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed

Scopus (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the Level of Entrepreneurial Orientation: Analytical Research in the National Security Advisory

The current research aims to measure the level of entrepreneurial orientation and its dimensions (creativity, independence, proactivity, risk tolerance, and achievement) in the National Security Chancellery, as its importance and role in guiding senior leaders of the chancellery to make strategic decisions with high quality in various Iraqi concerns, more specifically the security aspect. The data was collected from 94 individuals (the research sample) from the research community (120) individuals at different administrative levels and intentionally where the questionnaire was adopted as a main tool for data collection and the primary data was analyzed through descriptive and inferential statistical methods (arithmetic mean, standard dev

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Jun 26 2019
Journal Name
Iraqi Journal Of Science
Quantum Key Distribution and Chaos Bandwidth Effects on Impact Security of Quantum Communications

The influence of bias current on the bandwidth of chaotic signals in semiconductor lasers by optical feedback has been studied experimentally and numerically. The measured data reveal that the bandwidth increase when the system becomes chaotic and this chaotic signal has a broadband spectrum so it can be used as a carrier for the quantum key. Mixing chaotic signal and quantum key make a very small change in chaotic bandwidth that does not affect the security of data transmitted.

Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
Scopus (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of The College Of Education For Women
The Counselor Brent Scowcroft and his Role in Achieving the Requirements of the American National Security

       Despite the multiplicity of institutions contributing to the decision-making process in the United States of America, they interact to crystallize positions regarding international and strategic situations. The formulation of the national security policy depends on a number of institutions that complement each other in order to achieve an advanced security situation. Thus, the decision reflects the process of interaction of the existing regulatory institutions. This is because the essence of the national security and achieving its requirements also stems from the existence of a coherent system of shared beliefs and principles in the American society. Besides, these elements are the bases for achieving

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
The Problem of Designing the User Interface in the Interactive Websites (website of the Faculty of Fine Arts and Ways of Developing it)

The interactive websites are the interaction between the product and the user, and interactive design is based on the user interface for communication and how the interface responds to the user and how to help him to achieve his goals and enjoy the use of the interface. The interactive design is based on the design of interactive programs, i.e., programs that directly interact with the user, taking into account the different culture of the audience, the age group and many other factors. An example for the use of the user interface: Web designs, smartphone application designs and it even includes computer operating systems and electronic game interface. The interaction is the communication between the source and the receiver.  The we

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Dec 28 2021
Journal Name
The Iraqi Journal Of Veterinary Medicine
Evaluating Expression of the STAG1 Gene as a Potential Breast Cancer Biomarker

STAG proteins, which are part of the cohesin complex and encoded by the STAG genes, are known as Irr1/Scc3 in yeast and as SA/STAG/stromalin in mammals. There are more variants as there are alternate splice sites, maybe three open reading frames (ORFs) code for three main proteins, including: SA1 (STAG1), SA2 (STAG2) and SA3 (STAG3). The cohesin protein complex has various essential roles in eukaryotic cell biology. This study compared the expression of the STAG1 gene in four different breast cancer cell lines, including: MCF-7, T-47D, MDA-MB-468, and MDA-MB-231 and normal breast tissue. RNA was extracted from these cell lines and mRNA was converted to cDNA, and then expression of the STAG1 gene was quantified by three sets of specific prim

... Show More
Preview PDF
Publication Date
Sat Feb 12 2022
Journal Name
Engineering, Technology & Applied Science Research
Evaluating the Efficiency of Finance Methods in Residential Complex Projects in Iraq

Financial funding of a construction firm plays an important role in all aspects of the process development. It has been noted that financial crises have a direct impact on the construction industry. The Iraqi government, whether locally or globally, has faced a severe shortage of financing which has resulted in incomplete projects. Due to the financial crisis that Iraq went through which led to the suspension of many residential complex projects and the difficulty of the use of public financing methods, we researched the private financing (public-private partnership) methods instead of public financing methods in residential complex projects implementation. This study verified the financial problems and the factors that relate to th

... Show More
Crossref (1)
Crossref
View Publication
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Construction Engineering And Management
Scopus (60)
Crossref (51)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Proposing a General Formula for Evaluating the Parametric Cost Using MLR Method

This research takes up address the practical side by taking case studies for construction projects that include the various Iraqi governorates, as it includes conducting a field survey to identify the impact of parametric costs on construction projects and compare them with what was reached during the analysis and the extent of their validity and accuracy, as well as adopting the approach of personal interviews to know the reality of the state of construction projects. The results showed, after comparing field data and its measurement in construction projects for the sectors (public and private), the correlation between the expected and actual cost change was (97.8%), and this means that the data can be adopted in the re

... Show More
Crossref
View Publication Preview PDF