In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of passwords, it is very useful to know how effective the widely available applications for cracking passwords. This research analyzes, in which way an attacker is able to obtain the password of a Windows Vista PC. During this research the physical access to the PC is needed. This research shows that password consists of 8 characters with small letter characters and numbers can easily be cracked if it has know usual combinations. Whereas a Dictionary Attack will probably not find unusual combinations. Adding captel letter characters will make the process harder as there are several more combinations, so it will take longer time but is still feasible. Taking into account special characters it will probably take too long time and even most Dictionary Attacks will fail. For rainbow tables the size of the table has to be considered. If it is not too big, even these small passwords cannot be cracked. For longer passwords probably the simplest ones, small letter characters and numbers, can be cracked only. In this case brute force takes too long time in most cases and a dictionary will contain only a few words this long and even the rainbow tables become too large for normal use. They can only be successful if enough limitations are known and the overall size of the table can be limited.
Rate of zinc consumption during the cathodic protection of copper pipeline which carries saline water was measured by weight loss technique in the absence and presence of bacteria. Variables studied were solution flow rate, temperature, time and NaCl concentration. It was found that within the present range of variables; the rate of zinc consumption increases with the increase of all operating conditions. The presence of bacteria increases the zinc consumption. Fourth order multi-term model and one-term model were suggested to represent the consumption data. Nonlinear regression analysis was used to estimate the coefficients of these models, while statistical analysis was used to determine the effect of each coefficient. Both models were re
... Show MoreSince the COVID-19 pandemic alarm was made by the severe acute respiratory syndrome (SARS)-coronavirus (CoV) 2, several institutions and agencies have pursued to clarify the viral virulence and infectivity. The fast propagation of this virus leads to an unprecedented rise in the number of cases worldwide. COVID-19 virus is exceptionally contagious that spreads through droplets, respiratory secretions, and direct contact. The enveloped, single-stranded RNA virus has a specific envelop region called (S) region encoding (S protein) that specifically binds to the host cell receptor. Viral infection requires receptors' participation on the host cell membrane's surface, a key- step for the viral invasion of susceptible cells.
Rec
... Show MoreThe inhibitive action of pomegranate peel as a plant source the corrosion of carbon-steel in phosphoric acid solutions was studied using the weight-loss method. Organic compounds present in natural materials are successfully used to reduce the rate of corrosion because they are cheap, renewable and effective. The results showed that the inhibition potency was enhanced with increasing increasing the amount of the inhibitor and the immersion time but it decreased with the increase of the concentration of the acid solution. The results also revealed a gradual increase in the corrosion rate with the increase of temperature, while the corrosion protection efficiency and surface coverage decreased.
In this work, the copper metal was treated using Nd:YAG laser with energy 1Joul to enhance corrosion resistance and improve surface properties. The copper metal has many applications in industry as well as water, oil and gas pipes. The same conditions, (laser power density, scan speed, distance between paths, medium gas-air) were applied in the laser surface treatment, After laser treatment, the samples microstructures were investigated using optical microscope (OM) to examine micro structural changes due to laser irradiation. Specimen surfaces were investigated using atomic force microscopy (AFM), X-ray diffraction (XRD), macro hardness, and corrosion test before and after laser treatment to
... Show MorePeople who undertaken different X-ray examinations are already exposed to ionizing radiation which causes biological effects. Therefore assessing the patient radiation dose is a prerequisite element in optimizing the X-ray practice and to avoid the unnecessary radiation dose. The aim of this research is to assess the skin radiation dose for those patients who undertaking routine X-ray examinations in selected three hospitals in Al Najaf city.
Three X-ray units were involved in this experimental study; these were belonging to three hospitals in Al Najaf city-Iraq, namely Al-Sadder teaching hospital, Al-Hakeem general hospital and Al-Zahraa hospital. Data of exposure parameters (tube potential (kVp), tube c
... Show MoreThe current study introduces a novel technique to handle electrochemical localized corrosion in certain limited regions rather than applying comprehensive cathodic protection (CP) treatment. An impressed current cathodic protection cell (ICCPC) was fabricated and firmly installed on the middle of a steel structure surface to deter localized corrosion in fixed or mobile steel structures. The designed ICCPC comprises three essential parts: an anode, a cathode, and an artificial electrolyte. The latter was developed to mimic the function of the natural electrolyte in CP. A proportional-integrated-derivative (PID) controller was designed to stabilize this potential below the ICCPC at a cathodic potential of −850 mV, which is crucial for prote
... Show MoreWar is one of the phenomena accompanying the human race since ancient times, so we find that the human element has mastered the use manufacture of weapons and worked on their development in order to provide means of protection and prevention from any external aggression by the enemies. The rapid developments on those weapons has led to an increase in their danger, Therefore, we find that the world limits their use production and that’s why many treaties have been concluded to dismantle them and limit their spread, and to preserve the security and stability of countries from the negative damages resulting from non-conventional weapons. From this standpoint, there are many existing international efforts to prevent the spread of non-conve
... Show MoreConsumer protection requires seeking one official entity to accomplish its tasks. The large number of devices control and implementation in it, return to several ministries, and executive bodies lose coordination and cooperation, and unite efforts to eliminate the types of fraud and control the quality of production within the approved standards. This is in addition to the seriousness of the existence of administrative and legal corruption which hinders the role of inspection committees and representatives of official bodies with the relationship and prevents them from carrying out their duties entrusted to them or presenting them with administrative complications to thwart their duties in consumer protection. This is despite the
... Show MoreThis paper presents a 3D watermarking model based on the nearest distance between two vertices in mesh, where the embedding path moves as deep as possible until the embedding data is completed. The proposed algorithm achieved good results according to invisibility and robustness. The visibility was measured in term
of Root Mean Square Error (RMSE) and Hausdroff Distance (HD), which obtained good results. As related to robustness, the proposed method showed resistance to geometrical attack (translation, scaling and rotation) as well as acceptable resistance to signal processing attacks like noise addition and simplification.
With the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data.
... Show More