In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of passwords, it is very useful to know how effective the widely available applications for cracking passwords. This research analyzes, in which way an attacker is able to obtain the password of a Windows Vista PC. During this research the physical access to the PC is needed. This research shows that password consists of 8 characters with small letter characters and numbers can easily be cracked if it has know usual combinations. Whereas a Dictionary Attack will probably not find unusual combinations. Adding captel letter characters will make the process harder as there are several more combinations, so it will take longer time but is still feasible. Taking into account special characters it will probably take too long time and even most Dictionary Attacks will fail. For rainbow tables the size of the table has to be considered. If it is not too big, even these small passwords cannot be cracked. For longer passwords probably the simplest ones, small letter characters and numbers, can be cracked only. In this case brute force takes too long time in most cases and a dictionary will contain only a few words this long and even the rainbow tables become too large for normal use. They can only be successful if enough limitations are known and the overall size of the table can be limited.
The research aims to measure, assess and evaluate the efficiency of the directorates of Anbar Municipalities by using the Data Envelopment Analysis method (DEA). This is because the municipality sector is consider an important sector and has a direct contact with the citizen’s life. Provides essential services to citizens. The researcher used a case study method, and the sources of information collection based on data were monthly reports, the research population is represented by the Directorate of Anbar Municipalities, and the research sample consists of 7 municipalities which are different in terms of category and size of different types. The most important conclusion reached by the research i
... Show MoreRock failure during drilling is an important problem to be solved in petroleum technology. one of the most causes of rock failure is shale chemical interaction with drilling fluids. This interaction is changing the shale strength as well as its pore pressure relatively near the wellbore wall. In several oilfields in southern Iraq, drilling through the Tanuma formation is known as the most challenging operation due to its unstable behavior. Understanding the chemical reactions between shale and drilling fluid is determined by examining the features of shale and its behavior with drilling mud. Chemical interactions must be mitigated by the selection of suitable drilling mud with effective chemical additives. This study is describing t
... Show MoreFlow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relativel
... Show MoreBackground: Dental erosion is a common oral condition which results due to consumption of high caloric and low pH acidic food such as carbonated drinks and fruit juices. It is expected that these food types can cause irreversible damage to dental hard tissues and early deterioration of the dental restorations. So, this study aimed to evaluate and compare the erosive potential effects of orange fruit juice and Miranda orange drink on the microhardness of an orthodontic composite material. Materials and methods: Thirty discs with a thickness of 2 mm and a diameter of 10 mm were prepared from orthodontic bonding composite. The prepared discs were equally divided into three groups (n=10). Microhardness analysis was carried out both prior to
... Show MoreThe molluscum contagiosum virus (MCV) is a dermatotropic poxvirus. The causative agent of molluscum contagiosum (MC) is nonlethal, common and worldwide. Additionally, little inflammation is associated with MC papules. The present study aims to evaluate the immune status of MC patients by measuring the level of immunoglobulins IgG and IgM by using the radial immune diffusion assay (RIA) and the level of interleukin 18 receptor 1 (IL-18R1) by the Enzyme-linked immunosorbent assay (ELISA).The study is conducted during November 2013 to April, 2014 in outpatient clinic of Baquba Teaching Hospital. There are 75 patients, diagnosed with clinical lesions of MCV on different areas of the body, whose age is ranged between 2-50 years including 40(53.
... Show MoreGinger (Zingiber officinale Rosc.) is a traditional plant that is widely used as a spice or folk medicine. Lambda-cyhalothrin (LCT) is a synthetic pyrethroid that is widely used to control insecticide. The present study aimed to evaluate the potential protective effect of ginger ethanolic extract (GEE) on liver toxicity experimentally induced by LCT in albino rats. The experiment involved thirty adult male rats (Rattus norvegicus), randomly allocated to one of three groups (n=10/group: control group, administered distilled water orally for 12 weeks; LCT-treated group, received 5.43 mg/kg BW (1/15 LD50 dose calculated in this study as 81.5 mg/kg BW) orally, for 12 weeks; LCT-GEE-treated group, received t
... Show MoreThis study aims at evaluating the performance of MA students in the College of Education for Women in using the digital transformation and identifying the significant difference in performance evaluation according to the variable of academic qualification (Master or PHD). In order to achieve the aim of the research the researcher prepared a questionnaire of 20 items, and this happens after the researcher's getting acquaintance of the literature of previous studies related to the variable of the research. The apparent validity of the items was examined by exposing them to 10 juries specialized in education, psychology and evaluation and measurement. The stability of the items was examined via two methods, the test-repetition and half-divisio
... Show MoreThe use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show More