Preferred Language
Articles
/
bsj-2816
Evaluating Windows Vista user account security

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of passwords, it is very useful to know how effective the widely available applications for cracking passwords. This research analyzes, in which way an attacker is able to obtain the password of a Windows Vista PC. During this research the physical access to the PC is needed. This research shows that password consists of 8 characters with small letter characters and numbers can easily be cracked if it has know usual combinations. Whereas a Dictionary Attack will probably not find unusual combinations. Adding captel letter characters will make the process harder as there are several more combinations, so it will take longer time but is still feasible. Taking into account special characters it will probably take too long time and even most Dictionary Attacks will fail. For rainbow tables the size of the table has to be considered. If it is not too big, even these small passwords cannot be cracked. For longer passwords probably the simplest ones, small letter characters and numbers, can be cracked only. In this case brute force takes too long time in most cases and a dictionary will contain only a few words this long and even the rainbow tables become too large for normal use. They can only be successful if enough limitations are known and the overall size of the table can be limited.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
M A Modified Similarity Measure for Improving Accuracy of User-Based Collaborative Filtering: Nadia Fadhil

Production sites suffer from idle in marketing of their products because of the lack in the efficient systems that analyze and track the evaluation of customers to products; therefore some products remain untargeted despite their good quality. This research aims to build a modest model intended to take two aspects into considerations. The first aspect is diagnosing dependable users on the site depending on the number of products evaluated and the user's positive impact on rating. The second aspect is diagnosing products with low weights (unknown) to be generated and recommended to users depending on logarithm equation and the number of co-rated users. Collaborative filtering is one of the most knowledge discovery techniques used positive

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Content of Data Journalism in Security Topics - Security Media Cell Model Research extracted from a master’s thesis

This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Robust Password Encryption Technique with an Extra Security Layer

        People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o

... Show More
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jul 01 2013
Journal Name
Political Sciences Journal
Democracy and human security

Since the widespread use of the concept of human security in 1994, and as stated in the report of human development (UNDP) issued by the United Nations Development Programmer,And framed it with multiple dimensions of political, economical, social and cultural. This concept has became beyond the state and its security ,and covered all what, can threaten human life and humanitarian groups, according to the humanitarian needs in the following aspects: The economic, the food,health,environmental , individual, community and the political aspect,which totally means ,the disability of the security traditional perspective to deal with these issues.The achievement of human security,that handles the maintenance of human dignity for meeting their b

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Randomand and social security

The problem of informal settlements in Iraqi is one of the most serious problems due
to its economic, social and security impacts which jeopardize the society safety and stability.
This study investigates the present situation of informal settlements in the Baghdad
governorates as well as approaches followed in making decisions to either upgrade or remove
those areas. Requirements of each decision are also discussed.
Study methods relied on both office and field studies to collect data and information
needed. The study revealed important findings that would help take appropriate measures that
deal with the informal settlements in Iraqi. The study also proposes effective mechanisms to
preclude both an increase in c

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2009
Journal Name
Iraqi Journal Of Physics
Effect of Glass Inclination of Windows Facing East and West on Solar Radiation Transmittance into Buildings

To reduce solar radiation transmittance into buildings through windows facing east or west during summer, a window inclination from vertical position is suggested. The inclination of the window glazing and the rate of unwanted solar radiation during summer can be calculated knowing the dialy inclination of the sun rays. The inclination of window glazing depends on the latitude of the position required. For instance in Baghdad which is at about 33o north latitude a slope of 15o for window glazing is sufficient to prevent about 419 MJ/m2 of total solar radiation energy from penetration during summer for clear glazing of window facing east. This value drops to about 96 MJ/m2 during winter. Therefore the ratio between the energy saved for co

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Legal Sciences
Cyberspace Security : Reading in the Legal Concept

After the tremendous development witnessed by the world of communications at the beginning of the third millennium, the activities that are performed through cyberspace have increased, and its importance has therefore increased, and the risks to which this space is exposed have increased, and in view of the global trend towards regulating this space and the practices that take place through it, as well as finding legal and technical ways to secure it. And to secure the services that are provided through it, it was necessary to determine the nature of this space and therefore its security. In order to create an appropriate theoretical framework around it that may be used if the Iraqi legislator goes towards organizing this space and secur

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Advanced Computer Science And Applications
Crossref (3)
Crossref
View Publication
Publication Date
Fri Jul 01 2011
Journal Name
25th International Cartographic Conference
User generated content and formal data sources for integrating geospatial data

Today, problems of spatial data integration have been further complicated by the rapid development in communication technologies and the increasing amount of available data sources on the World Wide Web. Thus, web-based geospatial data sources can be managed by different communities and the data themselves can vary in respect to quality, coverage, and purpose. Integrating such multiple geospatial datasets remains a challenge for geospatial data consumers. This paper concentrates on the integration of geometric and classification schemes for official data, such as Ordnance Survey (OS) national mapping data, with volunteered geographic information (VGI) data, such as the data derived from the OpenStreetMap (OSM) project. Useful descriptions o

... Show More
Publication Date
Thu Feb 11 2021
Journal Name
Journal Of Legal Sciences
Administrative Facilities Competent to Achieve Drug Security

    It is known that the economic impact of medicines is not negligible as a pillar of national income because of the profits of its industry contribute to industrial development, and the health impact of medicines can not be underestimated or underestimated, as many people already die in various low-lying countries The middle income because of the difficulty in providing them with safe and effective essential medicines or their inability to buy them to be available to enable them to cure and save their lives.

    This requires the development of policies and strategies to save lives by researching the concept of drug security to provide the best possible level of modern health care supported by soun

... Show More
Crossref
View Publication Preview PDF