How JustAnswer Works:

  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.

Ask syseng Your Own Question

syseng
syseng, Computer Systems Engineer
Category: Programming
Satisfied Customers: 6086
Experience:  Over 20 years experience, including Linux development and platform support
13852270
Type Your Programming Question Here...
syseng is online now
A new question is answered every 9 seconds

Lesson 11 1. Give three examples of excellent passwords and

Customer Question

Lesson 11
1. Give three examples of excellent passwords and explain why each would be a good choice to protect a system from unauthorized users.
4. System managers can’t protect their resources without recognizing all threats and even learning to think like an intruder. Knowing that and knowing that it’s unethical to use a computer system without proper authorization, imagines that you are an unauthorized user who wants to break into your system. Describe how you might begin guessing the password XXXXX a legitimate user.
6. Imagine that you are manager of a university computer center. List at least three reasons that you would give to convince a busy, reluctant staff member to perform regular backups and manage your system’s archives appropriately, and briefly elaborate.
9.List 20 viruses and research three in detail, describing which files they infect, how they spread, and their intended effects.
Submitted: 5 years ago.
Category: Programming
Expert:  syseng replied 5 years ago.

Hello,

 

Thank you for contacting Just Answer.

 

The first three questions can be done quickly, the last may take a bit more time. When do you need to have this completed?

Customer: replied 5 years ago.

By the end of the week.

Regards,

Elke Johnson

Expert:  syseng replied 5 years ago.
Ok, that should not be a problem. I plan to have something to you today or tomorrow for you to review.
Customer: replied 5 years ago.
Many thanks.
Expert:  syseng replied 5 years ago.

Here is what I have thus far. I will have the last question to you tonight or tomorrow morning:

 

Give three examples of excellent passwords and explain why each would be a good choice to protect a system from unauthorized users.

 

1. First Example - ?7blue7? - This password XXXXX 8 characters which exceeds the miniumum number of characters needed for reasonably
secure use with encryption algorithms such as NTLMv2 and WPA (because 8 characters renders useless the techniques that crack these
algorithms quickly). This password XXXXX XXXXX relatively easy for humans to remember while including numbers and special characters
that render brute force attacks and password XXXXX ineffective.

2. Second Example - @ThePark7Guys8And8! - This password XXXXX XXXXX characters long and includes special characters, numbers, and both
upper and lower case letters. Brute force attacks and password XXXXX would be ineffective agaist this password. It's length would
also make "birthday" attacks with certain algorithms such as MD5 less effective. This password XXXXX works well as a passphrase
because it reads in a way that humans can remember.

3. Third Example - Gum=CrBonCy.duFfoIOm(tUpoEId,ceN - This password XXXXX XXXXX characters long and at the present time virtually
impossible to break using brute force and obviously password XXXXX It includes upper and lower case letters, numbers, and special
characters and more than one of each. This password XXXXX XXXXX to crackers that work on passwords designed to be easy for humans
to remember because in this case it was generated by a random password XXXXX designed to produce passwords that do not follow
any type of logic or pattern.

 

System managers can't protect their resources without recognizing all threats and even learning to think like an intruder. Knowing
that and knowing that it's unethical to use a computer system without proper authorization, imagines that you are an unauthorized
user who wants to break into your system. Describe how you might begin guessing the password XXXXX a legitimate user.

 

Users will typically create passwords that have some meaning to them that makes the password XXXXX to remember so the more you know
about the user the easier it is to guess the password. Some information that would be useful in guessing passwords include first,
middle and last name, name of pet, personal phone numbers, name of significant other, favorite things such as a car or brand name.
Then if you also know the password XXXXX rules of the network, placing numbers and special characters before or after the
favorite word is typical. Dumpster diving for information and shoulder surfing are other social engineering methods that will help
gain information for guessing passwords.

 

Imagine that you are manager of a university computer center. List at least three reasons that you would give to convince a busy,
reluctant staff member to perform regular backups and manage your system's archives appropriately, and briefly elaborate.

Setting aside the threat of loss of employment, here are three reasons for proper backups:

1. Backups save time. When a data loss incident occurs and backups are not available, busy IT administrators will have to drop
other tasks to concentrate on gathering lost data from desktop computers in order to compile and hopefully regain what was lost.
This activity can consume an enormous amount of time that could be avoided by proper backups - and the company would not pay the
overtime it takes to locate the lost data.

2. Backups repair malware damage. In the event that a malware attack is successful and damages files and systems, backups can be
used to quickly bring systems back to working order. Other options such as repairing or reinstalling or reimageing operating
systems, reinstalling programs, and the potential loss of data cost much more in time and money than the time it takes to backup and
restore.

3. Backups can repair system file damage due to updates and installations. If systems that are automatically updated have issues
with the updates, backups again save time by providing a quick and effiecient way to restore or roll back a system to it's
previously working state. Update uninstalls are problematic, often taking time to troubleshoot issues with the uninstall before the
system is again fully operational (and many times update uninstallation ends up requiring a complete reinstallation of the operating
system).

 

 

 

 

 

 

 

 

Customer: replied 5 years ago.
I will be waiting for the last question.
Expert:  syseng replied 5 years ago.

Hello - I posted the answer to the last question in your recent post, however here it is again. Let me know if you have questions.

 

List 20 viruses and research three in detail, describing which files they

infect, how they spread, and their intended effects.


Bloodhound.Exploit.254 Trojan, Virus, Worm 06/25/2009
W32.SillyFDC.BCC Worm 06/25/2009
W32.SillyFDC.BCA Worm 06/24/2009
W32.SillyFDC.BCB Worm 06/25/2009
Packed.Generic.238 Trojan, Virus, Worm 06/23/2009
Packed.Generic.237 Trojan, Virus, Worm 06/23/2009
Bloodhound.Exploit.244 Trojan, Virus, Worm 06/22/2009
Trojan.Spadenf Trojan 06/23/2009
W32.SillyFDC.BBZ Worm 06/21/2009
Packed.Generic.236 Worm 06/19/2009
W32.SillyFDC.BBY Worm 06/19/2009
W32.Troresba Worm 06/19/2009
Bloodhound.Exploit.256 Trojan, Virus, Worm 06/18/2009
Suspicious.S.Zlob Trojan 06/18/2009
Bloodhound.Exploit.245 Trojan, Virus, Worm 06/18/2009
Bloodhound.Exploit.249 Trojan, Virus, Worm 06/18/2009
Bloodhound.Exploit.250 Trojan, Virus, Worm 06/18/2009
Bloodhound.Exploit.251 Trojan, Virus, Worm 06/18/2009
Bloodhound.Exploit.252 Trojan, Virus, Worm 06/18/2009
Bloodhound.PDF.15 Trojan 06/18/2009


1. W32.SillyFDC.BCC

 

Discovered: June 25, 2009
Updated: June 25, 2009 7:19:26 AM
Type: Worm
Infection Length: 42,496 bytes
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows

Vista, Windows NT, Windows Server 2003, Windows 2000

When executed, the worm copies itself as the following file:
%Windir%\tstray.exe

Next, the worm creates the following registry entries so that it runs every

time Windows starts:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal

Server\Install\Software\Microsoft\Windows\CurrentVersion\Run\"Text Tray

Service" = "tstray.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"Text Tray

Service" = "tstray.exe"

The worm creates the following registry entry to bypass the Windows firewall:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\

FirewallPolicy\StandardProfile\AuthorizedApplications\List\"%SystemDrive%\[OR

IGINAL THREAT FILE NAME].exe" = "%SystemDrive%\[ORIGINAL THREAT FILE

NAME].exe:*:Enabled:Text Tray Service"

Next, the worm copies itself to all removable and mapped drives as the

following file:
%DriveLetter%\driver\usb\MSwindows.exe

It also creates the following file:
%DriveLetter%\driver\usb\Desktop.ini

It then creates the following file so that it runs when the above drives are

accessed:
%DriveLetter%\autorun.inf

 

2. W32.SillyFDC.BCA

 

Discovered: June 24, 2009
Updated: June 25, 2009 3:36:10 AM
Type: Worm
Infection Length: 45,056 bytes
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows

Vista, Windows NT, Windows Server 2003, Windows 2000

When executed, the worm copies itself as the following file:
%UserProfile%\Local Settings\Application Data\winlogon.exe

The worm also creates the following file:
%Temp%\~DF3069.tmp

The worm then creates the following registry entry so that it runs every time

Windows starts:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"srv" =

"%UserProfile%\Local Settings\Application Data\winlogon.exe"

It then accesses the following URLs:

[http://]qwertyu.net.ru/ping[REMOVED]
[http://]qwertyu.net.ru/ping[REMOVED]

The worm then copies itself to all removable and mapped drives as the

following file:
%DriveLetter%\$RECYCLE.BIN\autorun.exe

The worm creates the following file so that it runs when the above drives are

accessed:
%DriveLetter%\autorun.inf

 

3. W32.SillyFDC.BCB

 

Discovered: June 24, 2009
Updated: June 25, 2009 4:52:38 AM
Type: Worm
Infection Length: 48,640 bytes
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows

Vista, Windows NT, Windows Server 2003, Windows 2000

When executed, the worm copies itself as the following file:
%Windir%\vmnat.exe

It then creates the following files:

%System%\drivers\sysdrv32.sys
%Temp%\11A49.dmp
%Temp%\1b63_appcompat.txt

The worm then creates the following registry entry so that it runs every time

Windows starts:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"Windows

Virtual Manager" = "vmnat.exe"

The worm copies itself to all removable and mapped drives as the following

file:
%DriveLetter%\RECYCLER\[SID]\autorunme.exe

It also creates the following file:
%DriveLetter%\RECYCLER\[SID]\Desktop.ini

It then creates the following file so that it runs when the above drives are

accessed:
%DriveLetter%\autorun.inf

Customer: replied 5 years ago.
I already acepted the other answer from you, remember?

JustAnswer in the News:

 
 
 
Ask-a-doc Web sites: If you've got a quick question, you can try to get an answer from sites that say they have various specialists on hand to give quick answers... Justanswer.com.
JustAnswer.com...has seen a spike since October in legal questions from readers about layoffs, unemployment and severance.
Web sites like justanswer.com/legal
...leave nothing to chance.
Traffic on JustAnswer rose 14 percent...and had nearly 400,000 page views in 30 days...inquiries related to stress, high blood pressure, drinking and heart pain jumped 33 percent.
Tory Johnson, GMA Workplace Contributor, discusses work-from-home jobs, such as JustAnswer in which verified Experts answer people’s questions.
I will tell you that...the things you have to go through to be an Expert are quite rigorous.
 
 
 

What Customers are Saying:

 
 
 
  • My Expert answered my question promptly and he resolved the issue totally. This is a great service. I am so glad I found it I will definitely use the service again if needed. One Happy Customer New York
< Last | Next >
  • My Expert answered my question promptly and he resolved the issue totally. This is a great service. I am so glad I found it I will definitely use the service again if needed. One Happy Customer New York
  • Wonderful service, prompt, efficient, and accurate. Couldn't have asked for more. I cannot thank you enough for your help. Mary C. Freshfield, Liverpool, UK
  • This expert is wonderful. They truly know what they are talking about, and they actually care about you. They really helped put my nerves at ease. Thank you so much!!!! Alex Los Angeles, CA
  • Thank you for all your help. It is nice to know that this service is here for people like myself, who need answers fast and are not sure who to consult. GP Hesperia, CA
  • I couldn't be more satisfied! This is the site I will always come to when I need a second opinion. Justin Kernersville, NC
  • Just let me say that this encounter has been entirely professional and most helpful. I liked that I could ask additional questions and get answered in a very short turn around. Esther Woodstock, NY
  • Thank you so much for taking your time and knowledge to support my concerns. Not only did you answer my questions, you even took it a step further with replying with more pertinent information I needed to know. Robin Elkton, Maryland
 
 
 

Meet The Experts:

 
 
 
  • ATLPROG

    Computer Software Engineer

    Satisfied Customers:

    7463
    MS in IT.Several years of programming experience in Java C++ C C# Python VB Javascript HTML
< Last | Next >
  • http://ww2.justanswer.com/uploads/SP/spatlanta2010/2011-6-23_12450_photo.64x64.gif ATLPROG's Avatar

    ATLPROG

    Computer Software Engineer

    Satisfied Customers:

    7463
    MS in IT.Several years of programming experience in Java C++ C C# Python VB Javascript HTML
  • http://ww2.justanswer.com/uploads/ComputersGuru/2010-02-13_051118_Photo41.JPG LogicPro's Avatar

    LogicPro

    Computer Software Engineer

    Satisfied Customers:

    5603
    Expert in C, C++, Java, DOT NET, Python, HTML, Javascript, Design.
  • http://ww2.justanswer.com/uploads/unvadim/2010-11-15_210218_avatar.jpg unvadim's Avatar

    unvadim

    Computer Software Engineer

    Satisfied Customers:

    1158
    Good knowledge of OOP principles. 3+ years of programming experience with Java and C++. Sun Certified Java Programmer 5.0.
  • http://ww2.justanswer.com/uploads/lifesaver333/2010-10-17_191349_ls.jpeg lifesaver's Avatar

    lifesaver

    Computer Software Engineer

    Satisfied Customers:

    950
    Several years of intensive programming and application development experience in various platforms.
  • http://ww2.justanswer.com/uploads/EH/ehabtutor/2012-8-2_202016_1.64x64.jpg ehabtutor's Avatar

    ehabtutor

    Computer Software Engineer

    Satisfied Customers:

    864
    Bachelor of computer science, 5+ years experience in software development, software company owner
  • http://ww2.justanswer.com/uploads/RA/rajivsharma086/2012-6-6_17128_displaypic.64x64.jpg Raj's Avatar

    Raj

    Computer Engg.

    Satisfied Customers:

    860
    BE CS, 4+ Experience in Programming and Database (ERP)
  • http://ww2.justanswer.com/uploads/eljonis/2010-01-06_130406_eljon2.jpg Eljon's Avatar

    Eljon

    Consultant

    Satisfied Customers:

    590
    11 yrs of programming (PHP, WordPress, XSL, SQL, JavaScript)