Preferred Language
Articles
/
bsj-2816
Evaluating Windows Vista user account security

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of passwords, it is very useful to know how effective the widely available applications for cracking passwords. This research analyzes, in which way an attacker is able to obtain the password of a Windows Vista PC. During this research the physical access to the PC is needed. This research shows that password consists of 8 characters with small letter characters and numbers can easily be cracked if it has know usual combinations. Whereas a Dictionary Attack will probably not find unusual combinations. Adding captel letter characters will make the process harder as there are several more combinations, so it will take longer time but is still feasible. Taking into account special characters it will probably take too long time and even most Dictionary Attacks will fail. For rainbow tables the size of the table has to be considered. If it is not too big, even these small passwords cannot be cracked. For longer passwords probably the simplest ones, small letter characters and numbers, can be cracked only. In this case brute force takes too long time in most cases and a dictionary will contain only a few words this long and even the rainbow tables become too large for normal use. They can only be successful if enough limitations are known and the overall size of the table can be limited.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Proposed Security Models for Node-level and Network-level Aspects of Wireless Sensor Networks Using Machine Learning Techniques

     As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Jan 26 2022
Journal Name
Iraqi Journal Of Science
A Mathematical Model for Iraqi Airways Company about Evaluating Its Objectives and Strategies

In this paper, we introduced a mathematical model for Iraqi Airways Company about evaluating its objectives and strategies. First, we studied Iraqi Airways schedules with different departure cities for each airline path. Then, we applied some fuzzy integrals for determining the best airline path.

View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Impact of empowerment and functional flexibility in evaluating worker performance :an empirical study

This study was conducted in the Department of Employment and Loans at the Ministry of Labor and Social Affairs to indicate the importance and impact of both the empowerment and the functional flexibility in evaluating the performance of the employees. To achieve the objectives of the study, the data was collected through a questionnaire form designed for this purpose based on previous studies. Data obtained for a significant evaluation of the relationship between the components of both the empowerment and the functional flexibility with the components of the evaluation and determining the degree of importance of each component of both the empowerment and functional flexibility for the components of the evaluation by the extractio

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Evaluating the Moisture Susceptibility of Asphalt Mixtures Containing Aluminum Dross as a Filler

One of the most essential components of asphalt pavements is the filler. It serves two purposes. First, this fine-grained material (diameter less than 0.075 mm) improves the cohesiveness of aggregate with bitumen. Second, produce a dense mixture by filling the voids between the particles. Aluminum dross (AD), which is a by-product of aluminum re-melting, is formed all over the world. This material causes damage to humans and the environment; stockpiling AD in landfills is not the best solution. This research studies the possibility of replacing part of the conventional filler with aluminum dross. Three percent of dross was used, 10, 20, and 30% by filler weight. The MarshallMix design method was adopted to obtain the op

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Evaluating the Fibroblast Growth Factor-23 and Phosphate in Iraqi Patients with Acromegaly

Fibroblast growth factors-23 (FGF-23) are a class of cell signaling proteins produced by macrophages. They have a range of roles, but they play a particularly important role in the development of animal cells, where they are essential for appropriate growth. Phosphate, which is found in the body as both organic and mineral phosphate, plays crucial roles in cell structure, communication, and metabolism. Most phosphate in the body resides in bone, teeth, and inside cells, with less than 1% circulating in serum. The aim of the study is to evaluate the levels of the Fibroblast Growth Factors-23 and phosphate and receiver operating characteristic (ROC) in acromegaly patients against healthy control. A case control study Fibroblast Growth Fact

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Oct 02 2016
Journal Name
Journal Of The Faculty Of Medicine Baghdad
The predictive value of selected ultrasound features in evaluating malignancy in thyroid nodules

Background: Thyroid ultrasound has been widely used to differentiate benign from malignant nodules; many investigators have tried to point out few ultrasonographic features in order to identify those lesions, which are at a higher risk of malignancy.
Objectives: To evaluate the efficacy of selected conventional ultrasound (US) features of thyroid focal lesions useful for predicting malignancy and establishing indications for fine-needle aspiration cytology (FNAC).
Patients and Methods:Two hundred and four consecutive patients with thyroid nodules who visited the outpatient clinic of the surgical department of Tikrit University teaching hospital for the period from January 2011 to April 2014, and who underwent surgery for clinical s

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Jan 29 2024
Journal Name
Advances In Systems Analysis, Software Engineering, And High Performance Computing
Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection

Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,

... Show More
Crossref (11)
Crossref
View Publication
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
Evaluating Arabic Language Teachers Appraisal Form in Light of the Comprehensive Quality Standards

The current research aims to evaluate the appraisal form for Arabic language teachers in light of comprehensive quality standards by designing standards for the competencies of primary school teacher in accordance with comprehensive quality requirements. The researcher adopted the descriptive approach. The research community included the Arabic language supervisors in the Education Directorates of Diyala Provincial and Baghdad. The research sample consisted of (14) supervisors from the Diyala Provincial Department of Education and the First Rusafa Education Directorate in Baghdad Governorate by (8) supervisors and (6) Supervisors respectively specializing in Arabic language. As for the research tool, questionnaire prepared by the researc

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Research Journal Of Pharmacy And Technology
Scopus Crossref
View Publication
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Geological Journal
Evaluating Machine Learning Techniques for Carbonate Formation Permeability Prediction Using Well Log Data

Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To

... Show More
Scopus (7)
Crossref (6)
Scopus Crossref
View Publication