takuminopage.wordpress.com
Practical 2 | Jun Liang's Page
https://takuminopage.wordpress.com/practical-2
Jun Liang's Page. Familiarisation of Lab environment. Monday, 1 May 2010. Basically, using Vmware is like using another computer system (guest) in the current computer (host) that is running the VMware. It’s the same as navigating through a normal computer but the system software could not be maintained or updated up to date and you can also change add or remove devices virtually, compared to physically doing so on a host computer. Monday, 1 May 2010. Monday, 1 May 2010. The Microsoft Windows Malicious S...
takuminopage.wordpress.com
Practical 1 | Jun Liang's Page
https://takuminopage.wordpress.com/it-security-essentials-1
Jun Liang's Page. IT SECURITY ESSENTIALS 1. Monday, 26 April 2010. What is VMware Server? It’s a virtual machine that enables the user to work with different operating system concurrently such as from Windows, Solaris, Linux and NetWare. Getting started with VMware server. Monday, 26 April 2010. Recent article that relates to today’s security attack. Basically, Firefox registers a URL protocol handler to handle firefoxurl. If an IE user visits a webpage that tries to call a firefoxurl (e.g. i...RSS solve...
takuminopage.wordpress.com
Practical 4 | Jun Liang's Page
https://takuminopage.wordpress.com/practical-4
Jun Liang's Page. Configure Data Execution Prevention (DEP). Monday, 15 May 2010. Data Execution Prevention (DEP). Is a security feature included in Microsoft Windows operating systems that prevent an application or service from executing code from a non-executable memory such as viruses and other security threats. This helps prevent certain exploits that store code by a buffer overflow. These types of attacks can harm your programs and files. Project 3-2: Test AV Software. Monday, 15 May 2010. This file...
takuminopage.wordpress.com
Practical 3 | Jun Liang's Page
https://takuminopage.wordpress.com/practical-3
Jun Liang's Page. Scan for Rootkits Using RootkitRevealer. Monday, 8 May 2010. The tool works by scanning the system’s registry for rootkits. Because they are so deeply hidden, rootkits can be difficult to detect. The first line of defense is to install a firewall and antivirus on your computer. Most antivirus programs now offer rootkit as well as virus detection. You should make sure both the firewall and antivirus are the latest updates, and scan your system regularly. Project 2-2: Use a Keylogger.
takuminopage.wordpress.com
Practical 8 | Jun Liang's Page
https://takuminopage.wordpress.com/practical-8
Jun Liang's Page. Project 11-1: Installing Hash Generators and Comparing Hashes. Tuesday, 24 July 2010. What is a hash? A hash creates an unique signature for a set of data. For example, a person visits an ATM, she inserted her ATM card and enter her PIN number on a keypad. The ATM machine takes the PIN number and hashes it with a algorithm. Which means that the hashed PIN numbers have to match with the hash values stored on the card in order to make cash transactions. Here are the steps to do:. Project ...
takuminopage.wordpress.com
April | 2010 | Jun Liang's Page
https://takuminopage.wordpress.com/2010/04
Jun Liang's Page. Archive for April, 2010. April 26, 2010. Personal logs are located at the right panel. Posted in Uncategorized Leave a Comment. IT Security Essentials – Personal Logs. Create a free website or blog at WordPress.com.
takuminopage.wordpress.com
Practical 7 | Jun Liang's Page
https://takuminopage.wordpress.com/practical-7
Jun Liang's Page. Project 8-1: Use Cognitive Biometrics. Tuesday, 10 July 2010. What is Cognitive Biometrics? Using this helps process people for remembering without memorizing their passwords. Go to http:/ www.passfaces.com/demo. Under First Time Users, enter the requested information and click “Click to Enroll”. Project 8-2: Create a CardSpace Personal Card Using Microsoft Windows Vista. Tuesday, 10 July 2010. Here are the steps to create a Windows CardSpace:. Click Start Control Panel User Accounts.
takuminopage.wordpress.com
Practical 5 | Jun Liang's Page
https://takuminopage.wordpress.com/practical-5-2
Jun Liang's Page. Project 4-1: Using the Wireshark Protocol Analyzer. Monday, 22 May 2010. Packets data can be traced by searching in the search filter. Account names and passwords can be found too. Perform the following steps:. Start Wireshark to capture packets. Go to the this. Type your desire username and password. Search for HTTP in the Filter, the password can be found in the GET message. But due to trademark issues, the name had to be changed to Wireshark. What is a Protocol Analyzer. 8211; Secure...
takuminopage.wordpress.com
Practical 6 | Jun Liang's Page
https://takuminopage.wordpress.com/practical-6-2
Jun Liang's Page. Project 7-1: Use Rainbow Tables. Tuesday, 6 July 2010. What is a Rainbow Table? A rainbow table is a table used for recovering the plaintext password from a password hash. Introducing Rainbow Tables, a program which cracks passwords. To download the tables which can be used to crack Windows passwords. Steps to install rainbow tables:. Launch the program and load the rainbow tables by clicking Tables and then select the table. Click Install and OK. Steps to generate a password using hash:.