Preferred Language
Articles
/
bsj-2816
Evaluating Windows Vista user account security

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of passwords, it is very useful to know how effective the widely available applications for cracking passwords. This research analyzes, in which way an attacker is able to obtain the password of a Windows Vista PC. During this research the physical access to the PC is needed. This research shows that password consists of 8 characters with small letter characters and numbers can easily be cracked if it has know usual combinations. Whereas a Dictionary Attack will probably not find unusual combinations. Adding captel letter characters will make the process harder as there are several more combinations, so it will take longer time but is still feasible. Taking into account special characters it will probably take too long time and even most Dictionary Attacks will fail. For rainbow tables the size of the table has to be considered. If it is not too big, even these small passwords cannot be cracked. For longer passwords probably the simplest ones, small letter characters and numbers, can be cracked only. In this case brute force takes too long time in most cases and a dictionary will contain only a few words this long and even the rainbow tables become too large for normal use. They can only be successful if enough limitations are known and the overall size of the table can be limited.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Anticorrosion Behavior of Deposited Magnetite on Galvanized Steel in Saline Water Using RF-Magnetron Sputtering

Thin films of Magnetite have been deposited on Galvanized Steel (G-S) alloy using RF-reactive magnetron sputtering technique and protection efficiency of the corrosion of G-S. A Three-Electrodes Cell was used in saline water (3.5 % NaCl) solution at different temperatures (298, 308, 318 & 328K) using potentiostatic techniques with. Electrochemical Impedance Spectroscopy (EIS) and fitting impedance data via Frequency Response Analysis (FRA) were applied to G-S alloy with Fe3O4 and tested in 3.5 % NaCl solution at 298K.Results taken from Nyquist and Bode plots were analyzed using software provided with the instrument. The results obtained show that the rate of corrosion of G.S alloy increased with increasing the temperatures from 298 t

... Show More
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sat Aug 20 2022
Journal Name
Journal Of Legal Sciences
Administrative control of administrative protection work in Iraq

       This research deals with the work of administrative protection (civil defense), which is vested in the authority of administrative control, and the latter directly related to public freedoms, as the maintenance of public order from various disasters and damage usually requires restriction

In the area of ​​protection of population and property, the administration is forced to put restrictions on some public freedoms in particular, as the administrative protection aims to protect the security of citizens from the risks and the safety of their property, and the prevention of harmful residues that may arise from its exercise. (Civil Defense) Take a set of measures to reduce disasters and damag

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of Legal Sciences
International protection of the high seas region from nuclear pollution

        أن مصادر تلوث البيئة البحرية متعددة ,حيث تتعدد استنادا لتنوع الأنشطة المقامة في المنطقة ,منها أنشطة استغلال قاع البحار ؛عملية إغراق النفايات والتخلص منها في البيئة البحرية ؛ أنشطة السفن ؛ من عمليات الإسقاط من الجو ,ويمكن تصنيف مصادر تلوث البيئة البحرية :التلوث من المصادر الأرضية ؛التلوث من الأنشطة في أعالي البحار ؛التلوث من الجو .والتلوث النووي سريع الانتشار ويمتد لمساحات واسعة .

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Synthesizing and Using Iron Oxide Nanoparticles as Nanocomposite in Cotton Fabrics Nanofinishing

Metal oxide nanoparticles, including iron oxide, are highly considered as one of the most important species of nanomaterials in a varied range of applications due to their optical, magnetic, and electrical properties. Iron oxides are common compounds, extensive in nature, and easily synthesized in the laboratory. In this paper, iron oxide nanoparticles were prepared by co-precipitation of (Fe+2) and (Fe+3) ions, using iron (II and III) sulfate as precursor material and NH4OH solution as solvent at 90°C. After the synthesis of iron oxide particles, it was characterized using X-ray diffraction (XRD), infrared spectroscopy (FTIR), and scanning electron microscopy (SEM). These tests confirmed the obtaining o

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Oct 08 2024
Journal Name
Technology In Agronomy
Harnessing automation techniques for supporting sustainability in agriculture

Automation is one of the key systems in modern agriculture, providing potential solutions to the challenges related to the growing world population, demographic shifts, and economic situation. The present article aims to highlight the importance of precision agriculture (PA) and smart agriculture (SA) in increasing agricultural production and the importance of environmental protection in increasing production and reducing traditional production. For this purpose, different types of automation systems in the field of agricultural operations are discussed, as well as smart agriculture technologies including the Internet of Things (IoT), artificial intelligence (AI), machine learning (ML), big data analysis, in addition to agricultural robots,

... Show More
Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Преподаватель ХХi век
Фонограмматическая когниция в русском и арабском языках: основы флективного когнитивного строя

В статье рассматривается вопрос о связи флективных изменений с мыслительными процессами на материале русского и арабского языков, анализируются семантические, фонетические, морфологические и синтаксические основы фонограмматической когниции. Цель статьи выявление прямой связи между количественным звуковым изменением согласного состава слова и мыслительными процессами, с помощью которых человеческ

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
Scopus (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Audio Hiding in Color Image Using SLT Schemes

As usage of internet grows in different applications around the world, many techniques were developed to guard an important data against from illegal access and modification from unauthorized users by embedding this data into visual media called host media. Audio hiding in an image is a challenge because of the large size of the audio signal. Some previous methods have been presented to reduce the data of the audio signal before embedding it in the cover image, however, these methods was at the cost of reducing the quality of the audio signal. In this paper, a Slantlet transform (SLT) based method is applied to obtain better performance in terms of audio quality. In addition, the data hiding scheme in the cover color image has been imple

... Show More
View Publication Preview PDF