ise-journal.blogspot.com
This Other Eden
http://ise-journal.blogspot.com/2010/06/project-4-3-hosts-file-attack.html
Saturday, June 5, 2010. Project 4-3: Hosts File Attack. In this project, i am replacing a IP address with fake IP address by editing the host file. Lets open up My Computer and go to C: windows system32 drivers etc. Double-Click on the file "hosts" and open in notepad. We are going to replace a website "http:/ www.course.com"with Google IP "74.125.47.99". In notepad we will type in "74.125.47.99 www.course.com". As shown in the picture below. Click on "File" and then "Save". Reflection for Project 4-3:.
ise-journal.blogspot.com
This Other Eden
http://ise-journal.blogspot.com/2010/08/project-11-3-using-truecrypt.html
Saturday, August 28, 2010. Project 11-3: Using TrueCrypt. TrueCrypt is an alternative to EFS, a third party application which is also used to protect files with cryptography. How to use TrueCrypt? Download TrueCrypt Installation file by clicking here. Click "Download" under "Windows 7/Vista/XP/2000" and save the file. Install the installation file and Launch TrueCrypt once complete. Click "Create Volume Button". Select "Create a file container" and click "Next". Click "Save" and click "Next". On the othe...
ise-journal.blogspot.com
This Other Eden
http://ise-journal.blogspot.com/2010/06/project-3-3-set-web-browser-security.html
Saturday, June 5, 2010. Project 3-3: Set Web Browser Security. In this project, I learnt that it is important to set browser security as it would keep my computer secure. First open up Internet Explorer and click on the "tools" and click on "Internet Options". Make sure that it is in the general tab. Next click on settings and click on view files. Now lets maximise the window and click on the "Last checked tab". Lets open a cookie to see what is contained inside. To change the security level. Next, click...
ise-journal.blogspot.com
This Other Eden
http://ise-journal.blogspot.com/2010/07/project-7-1-use-rainbow-tables.html
Saturday, July 31, 2010. Project 7-1: Use Rainbow Tables. In this Practical I learn how Rainbow Tables is more effective then the two other methods of cracking a password(brute force and dictionary attack). Firstly, go to. Http:/ downloads.sourceforge.net/ophcrack/ophcrack-win32-installer-3.3.1.exe. And save the file. Next Install the file and when ask to install the selected components as shown in the diagram below. Select "Download and Install free Vista tables (461mb)". Next open up ophcrack.
ise-journal.blogspot.com
This Other Eden
http://ise-journal.blogspot.com/2010/08/project-8-1-use-cognitive-biometrics.html
Friday, August 27, 2010. Project 8-1: Use Cognitive Biometrics. What is Cognitive Biometrics? Cognitive Biometrics add a two-factor authentication without placing tremendous burden on the user. To go to the website. In the "First Time User's" field, key in the requested information and click "CLICK TO ENROLL". Click on "Click to Continue". Click "Ok" after reading information. Accept "demo" as the name and click "Ok". Click on "Next" to enroll now. Start by following the on-screen instructions.
ise-journal.blogspot.com
This Other Eden
http://ise-journal.blogspot.com/2010/08/project-11-2-using-microsofts.html
Saturday, August 28, 2010. Project 11-2: Using Microsoft's Encrypting File System (EFS). What is Microsoft's Encrypting File System(EFS)? Microsoft's Encrypting File System(EFS) is a cryptography system for Windows operating systems that use the Windows NTFS file system. Because EFS is tightly integrated with the file system, file encryption and decryption are transparent to the user. Using Microsoft's Encrypting File System (EFS). Navigate to the directory of the saved files. Reflection on Project 11-2:.
codesinverse.blogspot.com
Codes in Verse: Hands-On Project 11-3 (Page 396)
http://codesinverse.blogspot.com/2010/08/hands-on-project-11-3-page-396.html
Friday, August 27, 2010. Hands-On Project 11-3 (Page 396). 8220;As an alternative to EFS, third party applications can also be downloaded to protect files with cryptography. In this project, you will download and install TrueCrypt.” (Ciampa, 2009). 1 The first step was to download TrueCrypt at truecrypt.org and install it. 2 Next, I opened up TrueCrypt and created a new volume. 4 Then, I selected the ‘Standard TrueCrypt Volume’. 6 Next, I set the volume size to 1 MB. 11 Following the instructions in the ...
codesinverse.blogspot.com
Codes in Verse: April 2010
http://codesinverse.blogspot.com/2010_04_01_archive.html
Friday, April 30, 2010. I registered this blogsite with the purpose of logging my ST2401 : IT SECURITY ESSENTIALS 1. Module progress in my course DISM in Singapore Polytechnic. I will look upon your treasures gypsy, is this understood? Subscribe to: Posts (Atom). A propos de moi. Dip in Infocomm Security (01). Jun Liang's Log Blog. Kin Wee's Log Blog. Ngai Fong's Log Blog. Zi Ying's Log Blog.
codesinverse.blogspot.com
Codes in Verse: WAD Practical 2 - Develop a Customer Registration form using JSTL
http://codesinverse.blogspot.com/2011/06/wad-practical-2-develop-customer.html
Sunday, June 12, 2011. WAD Practical 2 - Develop a Customer Registration form using JSTL. After completing this practical, you should be able to. Independently try out other example codes that come with the book and duplicate the examples in your WADprac project. Understand what scope variables are. Understand how to use include page directives. Able to access Application Data. Able to access Forms Data. Exercise 1 - Duplicate the example codes in the WADprac project. Fig 11: Created new folder 'pract2'.