ajipracticallog.blogspot.com
MY ISE PRACTICAL LOG: ISE Practical 7 (project 8.4)
http://ajipracticallog.blogspot.com/2010/08/ise-practical-7-project-84.html
MY ISE PRACTICAL LOG. Sunday, August 29, 2010. ISE Practical 7 (project 8.4). OpenID is a decentralized open-source Federated identity management (FIM). OpenID does net need to be installed on the computer system.It allows an existing account in OpenID to sign in to multiple websites without needing to create passwords. In this practical i learnt how to create an OpenID account. Users cans start creating their own account by going to https:/ pip.verisignlabs.com/. Users should verify their account by sig...
ajipracticallog.blogspot.com
MY ISE PRACTICAL LOG: ISE Practical 2 (project 1.4)
http://ajipracticallog.blogspot.com/2010/06/practical-2-project-14.html
MY ISE PRACTICAL LOG. Saturday, June 5, 2010. ISE Practical 2 (project 1.4). In this practical i am going to download and install Microsoft Windows Malicious Software Removal Tool. I downloaded Microsoft Windows Malicious Software Removal Tool from http:/ www.microsoft.com/downloads/details.aspx? Subscribe to: Post Comments (Atom). View my complete profile.
ise-journal.blogspot.com
This Other Eden
http://ise-journal.blogspot.com/2010/06/project-4-3-hosts-file-attack.html
Saturday, June 5, 2010. Project 4-3: Hosts File Attack. In this project, i am replacing a IP address with fake IP address by editing the host file. Lets open up My Computer and go to C: windows system32 drivers etc. Double-Click on the file "hosts" and open in notepad. We are going to replace a website "http:/ www.course.com"with Google IP "74.125.47.99". In notepad we will type in "74.125.47.99 www.course.com". As shown in the picture below. Click on "File" and then "Save". Reflection for Project 4-3:.
ise-journal.blogspot.com
This Other Eden
http://ise-journal.blogspot.com/2010/08/project-11-3-using-truecrypt.html
Saturday, August 28, 2010. Project 11-3: Using TrueCrypt. TrueCrypt is an alternative to EFS, a third party application which is also used to protect files with cryptography. How to use TrueCrypt? Download TrueCrypt Installation file by clicking here. Click "Download" under "Windows 7/Vista/XP/2000" and save the file. Install the installation file and Launch TrueCrypt once complete. Click "Create Volume Button". Select "Create a file container" and click "Next". Click "Save" and click "Next". On the othe...
ise-journal.blogspot.com
This Other Eden
http://ise-journal.blogspot.com/2010/06/project-3-3-set-web-browser-security.html
Saturday, June 5, 2010. Project 3-3: Set Web Browser Security. In this project, I learnt that it is important to set browser security as it would keep my computer secure. First open up Internet Explorer and click on the "tools" and click on "Internet Options". Make sure that it is in the general tab. Next click on settings and click on view files. Now lets maximise the window and click on the "Last checked tab". Lets open a cookie to see what is contained inside. To change the security level. Next, click...
ise-journal.blogspot.com
This Other Eden
http://ise-journal.blogspot.com/2010/07/project-7-1-use-rainbow-tables.html
Saturday, July 31, 2010. Project 7-1: Use Rainbow Tables. In this Practical I learn how Rainbow Tables is more effective then the two other methods of cracking a password(brute force and dictionary attack). Firstly, go to. Http:/ downloads.sourceforge.net/ophcrack/ophcrack-win32-installer-3.3.1.exe. And save the file. Next Install the file and when ask to install the selected components as shown in the diagram below. Select "Download and Install free Vista tables (461mb)". Next open up ophcrack.
ise-journal.blogspot.com
This Other Eden
http://ise-journal.blogspot.com/2010/08/project-8-1-use-cognitive-biometrics.html
Friday, August 27, 2010. Project 8-1: Use Cognitive Biometrics. What is Cognitive Biometrics? Cognitive Biometrics add a two-factor authentication without placing tremendous burden on the user. To go to the website. In the "First Time User's" field, key in the requested information and click "CLICK TO ENROLL". Click on "Click to Continue". Click "Ok" after reading information. Accept "demo" as the name and click "Ok". Click on "Next" to enroll now. Start by following the on-screen instructions.
ise-journal.blogspot.com
This Other Eden
http://ise-journal.blogspot.com/2010/08/project-11-2-using-microsofts.html
Saturday, August 28, 2010. Project 11-2: Using Microsoft's Encrypting File System (EFS). What is Microsoft's Encrypting File System(EFS)? Microsoft's Encrypting File System(EFS) is a cryptography system for Windows operating systems that use the Windows NTFS file system. Because EFS is tightly integrated with the file system, file encryption and decryption are transparent to the user. Using Microsoft's Encrypting File System (EFS). Navigate to the directory of the saved files. Reflection on Project 11-2:.
ajipracticallog.blogspot.com
MY ISE PRACTICAL LOG: ISE Practical 3 (project 2.1)
http://ajipracticallog.blogspot.com/2010/06/ise-practical-31.html
MY ISE PRACTICAL LOG. Thursday, June 3, 2010. ISE Practical 3 (project 2.1). In this practical i am going to download Microsoft's RootkitRevealer tool to help detect rootkits in my computer. First i went to http:/ technet.microsoft.com/en-us/sysinternals/bb897445.aspx. To download the rootkitrevealer. RootkitRevealer is an advanced tool which can detect rootkits of a users's computer easily. RootkitRevealer detects many rootkits such as AFX, Vanquish and HackerDefender. Subscribe to: Post Comments (Atom).