The information gathering phase focuses on the determination of the characteristics of the target network in terms of: node availability: what hosts or network nodes are active?, ser- vice availability and role: what network applications run on those entities and what activity do each one of them perform?, network topology: how are nodes organized?, perimeter security and access control policies: what are the rules allowing or denying access to the network resources?, ...
Businesses nowadays are looking for a way to give flexibility to their staff. A great way to allow employee to work from home, it gives full access to all the resources that the main office might have, this is achieved by setting up what is called Virtual Private Network (VPN). A VPN is a private data network that makes use of the public communication infrastructure.Remote access SolutionRemote access allows users to log onto a network from a distant location. This is achieved with a remote...
Nowadays, information technology especially in computer is growing rapidly. As we can see, from hardware to software and from local area network to internet, every aspects is improving. For example, hardware nowadays is getting smaller in size and portable, such as USB storage media. The Transmission media for local area network and internet are also improving from solid cable to wireless and microwave. One of the hot issues in Information Technology today is Wireless Local Area Network (WLAN)....
Microsoft windows XP includes an inbuilt technological feature called Encryption file system that is used for file encryption which provides strong user-transparent encryption of any file or folder on an NTFS, it does this using a combination of public key cryptography and symmetric key cryptography making files decryption difficult without the correct key.Support for the use of groups on encrypted files is not provided by EFS.Authorized user who access encrypted files must have EFS...
802.11 is a set of IEEE standards which preside over wireless networking transmission methods. They are commonly used now-a-days in their 802.11a, 802.11b, 802.11g, and 802.11n versions by which it provides wireless connectivity in the home, office and the commercial establishments. It enlarge the IEEE 802.11 MAC standard giving assign an architecture and protocol backing both broadcast/multicast and uni cast delivery using "radio-aware metrics over self-configuring multi-hop...
A key is a set of columns, and can be used to identify or access a particular row or rows. The key is to determine the description of a table, index, or referential constraints. The same columns, which can be a plurality keys.A only part of the key is a key constraint, therefore, its value is equal. The only key column can not contain NULL values. For example, the employee number field can be defined as a unique key, because each value in the column, to determine if there is only one employee....
We all have our little secrets and we want to keep them safe and secure. But most of the time we fail. Knowingly or unknowingly we tend to give away those secrets to others, resulting in a huge loss or embarrassment. One such secret is our username and password, that we often give away to attackers on internet by becoming victims of what is known as phishing. Phishing is an attack where the attackers masquerade as a trustworthy entity and trick us into submitting our credentials, mostly our...
As part of the evaluation process in HCI, designers test and model users via various techniques such as user testing, experiments and predictive models in order to gain a better understanding of the various user profiles and how each type of user reacts and performs while using the interactive product. These techniques are explored in this and the following lecture (lecture 16).15.2 User Testing'User Testing' is a technique used in HCI that allows users to 'test' an interactive product under...
A mobile ad-hoc network is a self-configuring infrastructureless network of mobile devices associated by wireless link. In MANET the demanding factor is to implement an efficient multipath multicast transmission technique.In this study two routing protocol AOMDV and EGMP for multipath multicast transmission has been developed. From this study it is observed that multipath multicast transmission is efficient in MANET network. Our simulation results demonstrates that EGMP has high packet delivery...
In todays era, computer has become one of the basic needs for human beings. Computer which we used like every day was invented for solely one purpose i.e. for calculating numerical problems and mathematical calculations. The term computer is derived from Latin world called 'computare' which means to calculate. With the advancement of technologies, computer has become one of the powerful machines ever created. There are different environments or surroundings where computers are used. For...