In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of passwords, it is very useful to know how effective the widely available applications for cracking passwords. This research analyzes, in which way an attacker is able to obtain the password of a Windows Vista PC. During this research the physical access to the PC is needed. This research shows that password consists of 8 characters with small letter characters and numbers can easily be cracked if it has know usual combinations. Whereas a Dictionary Attack will probably not find unusual combinations. Adding captel letter characters will make the process harder as there are several more combinations, so it will take longer time but is still feasible. Taking into account special characters it will probably take too long time and even most Dictionary Attacks will fail. For rainbow tables the size of the table has to be considered. If it is not too big, even these small passwords cannot be cracked. For longer passwords probably the simplest ones, small letter characters and numbers, can be cracked only. In this case brute force takes too long time in most cases and a dictionary will contain only a few words this long and even the rainbow tables become too large for normal use. They can only be successful if enough limitations are known and the overall size of the table can be limited.
Since the COVID-19 pandemic alarm was made by the severe acute respiratory syndrome (SARS)-coronavirus (CoV) 2, several institutions and agencies have pursued to clarify the viral virulence and infectivity. The fast propagation of this virus leads to an unprecedented rise in the number of cases worldwide. COVID-19 virus is exceptionally contagious that spreads through droplets, respiratory secretions, and direct contact. The enveloped, single-stranded RNA virus has a specific envelop region called (S) region encoding (S protein) that specifically binds to the host cell receptor. Viral infection requires receptors' participation on the host cell membrane's surface, a key- step for the viral invasion of susceptible cells.
Rec
... Show MoreRate of zinc consumption during the cathodic protection of copper pipeline which carries saline water was measured by weight loss technique in the absence and presence of bacteria. Variables studied were solution flow rate, temperature, time and NaCl concentration. It was found that within the present range of variables; the rate of zinc consumption increases with the increase of all operating conditions. The presence of bacteria increases the zinc consumption. Fourth order multi-term model and one-term model were suggested to represent the consumption data. Nonlinear regression analysis was used to estimate the coefficients of these models, while statistical analysis was used to determine the effect of each coefficient. Both models were re
... Show MoreConsumer protection requires seeking one official entity to accomplish its tasks. The large number of devices control and implementation in it, return to several ministries, and executive bodies lose coordination and cooperation, and unite efforts to eliminate the types of fraud and control the quality of production within the approved standards. This is in addition to the seriousness of the existence of administrative and legal corruption which hinders the role of inspection committees and representatives of official bodies with the relationship and prevents them from carrying out their duties entrusted to them or presenting them with administrative complications to thwart their duties in consumer protection. This is despite the
... Show MoreIn this work, the copper metal was treated using Nd:YAG laser with energy 1Joul to enhance corrosion resistance and improve surface properties. The copper metal has many applications in industry as well as water, oil and gas pipes. The same conditions, (laser power density, scan speed, distance between paths, medium gas-air) were applied in the laser surface treatment, After laser treatment, the samples microstructures were investigated using optical microscope (OM) to examine micro structural changes due to laser irradiation. Specimen surfaces were investigated using atomic force microscopy (AFM), X-ray diffraction (XRD), macro hardness, and corrosion test before and after laser treatment to
... Show MoreAutomation is one of the key systems in modern agriculture, providing potential solutions to the challenges related to the growing world population, demographic shifts, and economic situation. The present article aims to highlight the importance of precision agriculture (PA) and smart agriculture (SA) in increasing agricultural production and the importance of environmental protection in increasing production and reducing traditional production. For this purpose, different types of automation systems in the field of agricultural operations are discussed, as well as smart agriculture technologies including the Internet of Things (IoT), artificial intelligence (AI), machine learning (ML), big data analysis, in addition to agricultural robots,
... Show MoreВ статье рассматривается вопрос о связи флективных изменений с мыслительными процессами на материале русского и арабского языков, анализируются семантические, фонетические, морфологические и синтаксические основы фонограмматической когниции. Цель статьи выявление прямой связи между количественным звуковым изменением согласного состава слова и мыслительными процессами, с помощью которых человеческ
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
This study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show More