Preferred Language
Articles
/
bsj-2816
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of passwords, it is very useful to know how effective the widely available applications for cracking passwords. This research analyzes, in which way an attacker is able to obtain the password of a Windows Vista PC. During this research the physical access to the PC is needed. This research shows that password consists of 8 characters with small letter characters and numbers can easily be cracked if it has know usual combinations. Whereas a Dictionary Attack will probably not find unusual combinations. Adding captel letter characters will make the process harder as there are several more combinations, so it will take longer time but is still feasible. Taking into account special characters it will probably take too long time and even most Dictionary Attacks will fail. For rainbow tables the size of the table has to be considered. If it is not too big, even these small passwords cannot be cracked. For longer passwords probably the simplest ones, small letter characters and numbers, can be cracked only. In this case brute force takes too long time in most cases and a dictionary will contain only a few words this long and even the rainbow tables become too large for normal use. They can only be successful if enough limitations are known and the overall size of the table can be limited.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2011
Journal Name
Desalination
Cathodic protection system of copper–zinc–saline water in presence of bacteria
...Show More Authors

Rate of zinc consumption during the cathodic protection of copper pipeline which carries saline water was measured by weight loss technique in the absence and presence of bacteria. Variables studied were solution flow rate, temperature, time and NaCl concentration. It was found that within the present range of variables; the rate of zinc consumption increases with the increase of all operating conditions. The presence of bacteria increases the zinc consumption. Fourth order multi-term model and one-term model were suggested to represent the consumption data. Nonlinear regression analysis was used to estimate the coefficients of these models, while statistical analysis was used to determine the effect of each coefficient. Both models were re

... Show More
Crossref (33)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Synthesizing and Using Iron Oxide Nanoparticles as Nanocomposite in Cotton Fabrics Nanofinishing
...Show More Authors

Metal oxide nanoparticles, including iron oxide, are highly considered as one of the most important species of nanomaterials in a varied range of applications due to their optical, magnetic, and electrical properties. Iron oxides are common compounds, extensive in nature, and easily synthesized in the laboratory. In this paper, iron oxide nanoparticles were prepared by co-precipitation of (Fe+2) and (Fe+3) ions, using iron (II and III) sulfate as precursor material and NH4OH solution as solvent at 90°C. After the synthesis of iron oxide particles, it was characterized using X-ray diffraction (XRD), infrared spectroscopy (FTIR), and scanning electron microscopy (SEM). These tests confirmed the obtaining o

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Effective Rules for Building and Securing of Blogs
...Show More Authors

Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Predictive Significance of Interleukins 17A and 33 in Risk of Relapsing–Remitting Multiple Sclerosis
...Show More Authors

Cytokines are signaling molecules between inflammatory cells that play a significant role in the pathogenesis of a disease. Among these cytokines are interleukins (ILs) 17A and 33, and accordingly, the current case-control study sought to investigate the role of each of the two cytokines in the risk of developing multiple sclerosis (MS). Sixty-eight relapsing-remitting MS (RRMS) Iraqi patients and twenty healthy individuals (control group) were enrolled. Enzyme linked immunosorbent assay (ELISA) kits were used to determine serum levels of IL-17A and IL-33. Results revealed that IL-17A and IL-33 levels were significantly higher in MS patients than in controls (14.1 ± 4.5 vs. 7.5 ± 3.8 pg/mL; p < 0.001 and 65.3 ± 16

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Apr 05 2023
Journal Name
Journal Of Engineering
Effect of Nb Addition on Hardness and Wear Resist of Cu-Al-Ni Shape Memory Alloy Fabricated By Powder Metallurgy
...Show More Authors

Cu-Al-Ni shape memory alloy specimens has been fabricated using powder metallurgy technique with tube furnace and vacuum sintering environment , three range of Nb powder weight percentage (0.3,0.6,0.9)% has been added. Micro hardness and sliding wear resist has been tested followed by X-ray diffraction, scanning electron microscope (SEM) and energy dispersive X-ray spectroscope (EDX) for micro structure observation. The experimental test for the samples has showed that the increase of Nb powder weight percentage in the master alloy has a significant effect on increasing the hardness and decreasing the wear resist therefore it will enhance the mechanical properties for this alloy.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Taxonomy of Memory Usage in Swarm Intelligence-Based Metaheuristics
...Show More Authors

Metaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory char

... Show More
View Publication Preview PDF
Crossref (3)
Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
E-Government Public Cloud Model (EGPCM)
...Show More Authors

   The concept of implementing e-government systems is growing widely all around the world and becoming an interest to all governments. However, governments are still seeking for effective ways to implement e-government systems properly and successfully. As services of e-government increased and citizens’ demands expand, the e-government systems become more costly to satisfy the growing needs. The cloud computing is a technique that has been discussed lately as a solution to overcome some problems that an e-government implementation or expansion is going through. This paper is a proposal of a  new model for e-government on basis of cloud computing. E-Government Public Cloud Model EGPCM, for e-government is related t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology &amp; Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Sep 01 2017
Journal Name
2017 9th Computer Science And Electronic Engineering (ceec)
Modelling the power cost and trade-off of live migration the virtual machines in cloud-radio access networks
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref