Preferred Language
Articles
/
bsj-2816
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of passwords, it is very useful to know how effective the widely available applications for cracking passwords. This research analyzes, in which way an attacker is able to obtain the password of a Windows Vista PC. During this research the physical access to the PC is needed. This research shows that password consists of 8 characters with small letter characters and numbers can easily be cracked if it has know usual combinations. Whereas a Dictionary Attack will probably not find unusual combinations. Adding captel letter characters will make the process harder as there are several more combinations, so it will take longer time but is still feasible. Taking into account special characters it will probably take too long time and even most Dictionary Attacks will fail. For rainbow tables the size of the table has to be considered. If it is not too big, even these small passwords cannot be cracked. For longer passwords probably the simplest ones, small letter characters and numbers, can be cracked only. In this case brute force takes too long time in most cases and a dictionary will contain only a few words this long and even the rainbow tables become too large for normal use. They can only be successful if enough limitations are known and the overall size of the table can be limited.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Crucial File Selection Strategy (CFSS) for Enhanced Download Response Time in Cloud Replication Environments
...Show More Authors

Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Enhancing Smart Cities with IoT and Cloud Computing: A Study on Integrating Wireless Ad Hoc Networks for Efficient Communication
...Show More Authors

Smart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things,

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact Cloud Computing On The Development of Accounting Education: Evidence From Sultanate of Oman
...Show More Authors

Cloud computing is the new technological trend for future generations. It represents a new way to use IT resources more efficiently. Cloud computing is one of the most technological models for developing and exploiting infrastructure resources in the world. Under the cloud, the user no longer needs to look for major financing to purchase infrastructure equipment as companies, especially small and medium-sized ones, can get the equipment as a service, rather than buying it as a product. The idea of ​​cloud computing dates back to the sixties of the last century, but this idea did not come into actual application until the beginning of the third millennium, at the hands of technology companies such as Apple, Hp, IBM, which had

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Effective Rules for Building and Securing of Blogs
...Show More Authors

Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Преподаватель ХХi век
Фонограмматическая когниция в русском и арабском языках: основы флективного когнитивного строя
...Show More Authors

В статье рассматривается вопрос о связи флективных изменений с мыслительными процессами на материале русского и арабского языков, анализируются семантические, фонетические, морфологические и синтаксические основы фонограмматической когниции. Цель статьи выявление прямой связи между количественным звуковым изменением согласного состава слова и мыслительными процессами, с помощью которых человеческ

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Predictive Significance of Interleukins 17A and 33 in Risk of Relapsing–Remitting Multiple Sclerosis
...Show More Authors

Cytokines are signaling molecules between inflammatory cells that play a significant role in the pathogenesis of a disease. Among these cytokines are interleukins (ILs) 17A and 33, and accordingly, the current case-control study sought to investigate the role of each of the two cytokines in the risk of developing multiple sclerosis (MS). Sixty-eight relapsing-remitting MS (RRMS) Iraqi patients and twenty healthy individuals (control group) were enrolled. Enzyme linked immunosorbent assay (ELISA) kits were used to determine serum levels of IL-17A and IL-33. Results revealed that IL-17A and IL-33 levels were significantly higher in MS patients than in controls (14.1 ± 4.5 vs. 7.5 ± 3.8 pg/mL; p < 0.001 and 65.3 ± 16

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Cathodic Protection of Copper Pipes Carrying Saline Water in the Presence of Aerobic Bacteria
...Show More Authors

Rates of zinc consumption during cathodic protection of a copper pipeline carrying saline water were measured by the loss in weight technique. The study of sacrificial anode cathodic protection of short copper tube using zinc strip extended axially in the pipe revealed that : (i) The increase of zinc consumption with time of exposure (1-3 h's) at different flow rates (turbulent flow) (300-600 l/hr) while the temperature , solution concentration and the pH were fixed at 20ºC, 3.5%wt NaCl, and pH=8 respectively in absence and presence of bacteria.(ii)Increase of zinc consumption with flow rates (300-600 l/hr) at different temperatures (10-40ºC) while solution concentration and time of exposure were fixed at 3.5 %wt NaCl and 3hr's respective

... Show More
Preview PDF
Publication Date
Tue Dec 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Cathodic Protection of Copper Pipes Carrying Saline Water in the Presence of Aerobic Bacteria
...Show More Authors

Rates of zinc consumption during cathodic protection of a copper pipeline carrying saline water were measured by the loss in weight technique. The study of sacrificial anode cathodic protection of short copper tube using zinc strip extended axially in the pipe revealed that : (i) The increase of zinc consumption with time of exposure (1-3 h's) at different flow rates (turbulent flow) (300-600 l/hr) while the temperature , solution concentration and the pH were fixed at 20ºC, 3.5%wt NaCl, and pH=8 respectively in absence and presence of bacteria.(ii)Increase of zinc consumption with flow rates (300-600 l/hr) at different temperatures (10-40ºC) while solution concentration and time of exposure were fixed at 3.5 %wt NaCl and 3hr's respect

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Engineering
Stator Faults Diagnosis and Protection in 3-Phase Induction Motor Based on Wavelet Theory
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Animal Behaviour And Biometeorology
Comprehension of the zinc chloride's ameliorative apoptotic and genotoxic effects on mice with cadmium-induced hepatotoxicity
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref