Programming

Programming Questions? Ask a Programmer for Answers ASAP

Ask a Computer Expert,
Get an Answer ASAP!

Programming

Lesson 11 1. Give three examples of excellent passwords and

Customer Question
Lesson 11 1. Give three examples...
Lesson 11
1. Give three examples of excellent passwords and explain why each would be a good choice to protect a system from unauthorized users.
4. System managers can’t protect their resources without recognizing all threats and even learning to think like an intruder. Knowing that and knowing that it’s unethical to use a computer system without proper authorization, imagines that you are an unauthorized user who wants to break into your system. Describe how you might begin guessing the password XXXXX a legitimate user.
6. Imagine that you are manager of a university computer center. List at least three reasons that you would give to convince a busy, reluctant staff member to perform regular backups and manage your system’s archives appropriately, and briefly elaborate.
9.List 20 viruses and research three in detail, describing which files they infect, how they spread, and their intended effects.
Submitted: 8 years ago.Category: Programming
Show More
Show Less
Ask Your Own Programming Question
Answered in 10 minutes by:
6/21/2009
Programmer: syseng, Computer Systems Engineer replied 8 years ago
syseng
syseng, Computer Systems Engineer
Category: Programming
Satisfied Customers: 6,933
Experience: Over 20 years experience, including Linux development and platform support
Verified

Hello,

 

Thank you for contacting Just Answer.

 

The first three questions can be done quickly, the last may take a bit more time. When do you need to have this completed?

Ask Your Own Programming Question
Customer reply replied 8 years ago

By the end of the week.

Regards,

Elke Johnson

Programmer: syseng, Computer Systems Engineer replied 8 years ago
Ok, that should not be a problem. I plan to have something to you today or tomorrow for you to review.
Ask Your Own Programming Question
Customer reply replied 8 years ago
Many thanks.
Programmer: syseng, Computer Systems Engineer replied 8 years ago

Here is what I have thus far. I will have the last question to you tonight or tomorrow morning:

 

Give three examples of excellent passwords and explain why each would be a good choice to protect a system from unauthorized users.

 

1. First Example - ?7blue7? - This password XXXXX 8 characters which exceeds the miniumum number of characters needed for reasonably
secure use with encryption algorithms such as NTLMv2 and WPA (because 8 characters renders useless the techniques that crack these
algorithms quickly). This password XXXXX XXXXX relatively easy for humans to remember while including numbers and special characters
that render brute force attacks and password XXXXX ineffective.

2. Second Example - @ThePark7Guys8And8! - This password XXXXX XXXXX characters long and includes special characters, numbers, and both
upper and lower case letters. Brute force attacks and password XXXXX would be ineffective agaist this password. It's length would
also make "birthday" attacks with certain algorithms such as MD5 less effective. This password XXXXX works well as a passphrase
because it reads in a way that humans can remember.

3. Third Example - Gum=CrBonCy.duFfoIOm(tUpoEId,ceN - This password XXXXX XXXXX characters long and at the present time virtually
impossible to break using brute force and obviously password XXXXX It includes upper and lower case letters, numbers, and special
characters and more than one of each. This password XXXXX XXXXX to crackers that work on passwords designed to be easy for humans
to remember because in this case it was generated by a random password XXXXX designed to produce passwords that do not follow
any type of logic or pattern.

 

System managers can't protect their resources without recognizing all threats and even learning to think like an intruder. Knowing
that and knowing that it's unethical to use a computer system without proper authorization, imagines that you are an unauthorized
user who wants to break into your system. Describe how you might begin guessing the password XXXXX a legitimate user.

 

Users will typically create passwords that have some meaning to them that makes the password XXXXX to remember so the more you know
about the user the easier it is to guess the password. Some information that would be useful in guessing passwords include first,
middle and last name, name of pet, personal phone numbers, name of significant other, favorite things such as a car or brand name.
Then if you also know the password XXXXX rules of the network, placing numbers and special characters before or after the
favorite word is typical. Dumpster diving for information and shoulder surfing are other social engineering methods that will help
gain information for guessing passwords.

 

Imagine that you are manager of a university computer center. List at least three reasons that you would give to convince a busy,
reluctant staff member to perform regular backups and manage your system's archives appropriately, and briefly elaborate.

Setting aside the threat of loss of employment, here are three reasons for proper backups:

1. Backups save time. When a data loss incident occurs and backups are not available, busy IT administrators will have to drop
other tasks to concentrate on gathering lost data from desktop computers in order to compile and hopefully regain what was lost.
This activity can consume an enormous amount of time that could be avoided by proper backups - and the company would not pay the
overtime it takes to locate the lost data.

2. Backups repair malware damage. In the event that a malware attack is successful and damages files and systems, backups can be
used to quickly bring systems back to working order. Other options such as repairing or reinstalling or reimageing operating
systems, reinstalling programs, and the potential loss of data cost much more in time and money than the time it takes to backup and
restore.

3. Backups can repair system file damage due to updates and installations. If systems that are automatically updated have issues
with the updates, backups again save time by providing a quick and effiecient way to restore or roll back a system to it's
previously working state. Update uninstalls are problematic, often taking time to troubleshoot issues with the uninstall before the
system is again fully operational (and many times update uninstallation ends up requiring a complete reinstallation of the operating
system).

 

 

 

 

 

 

 

 

Ask Your Own Programming Question
Customer reply replied 8 years ago
I will be waiting for the last question.
Programmer: syseng, Computer Systems Engineer replied 8 years ago

Hello - I posted the answer to the last question in your recent post, however here it is again. Let me know if you have questions.

 

List 20 viruses and research three in detail, describing which files they

infect, how they spread, and their intended effects.


Bloodhound.Exploit.254 Trojan, Virus, Worm 06/25/2009
W32.SillyFDC.BCC Worm 06/25/2009
W32.SillyFDC.BCA Worm 06/24/2009
W32.SillyFDC.BCB Worm 06/25/2009
Packed.Generic.238 Trojan, Virus, Worm 06/23/2009
Packed.Generic.237 Trojan, Virus, Worm 06/23/2009
Bloodhound.Exploit.244 Trojan, Virus, Worm 06/22/2009
Trojan.Spadenf Trojan 06/23/2009
W32.SillyFDC.BBZ Worm 06/21/2009
Packed.Generic.236 Worm 06/19/2009
W32.SillyFDC.BBY Worm 06/19/2009
W32.Troresba Worm 06/19/2009
Bloodhound.Exploit.256 Trojan, Virus, Worm 06/18/2009
Suspicious.S.Zlob Trojan 06/18/2009
Bloodhound.Exploit.245 Trojan, Virus, Worm 06/18/2009
Bloodhound.Exploit.249 Trojan, Virus, Worm 06/18/2009
Bloodhound.Exploit.250 Trojan, Virus, Worm 06/18/2009
Bloodhound.Exploit.251 Trojan, Virus, Worm 06/18/2009
Bloodhound.Exploit.252 Trojan, Virus, Worm 06/18/2009
Bloodhound.PDF.15 Trojan 06/18/2009


1. W32.SillyFDC.BCC

 

Discovered: June 25, 2009
Updated: June 25, 2009 7:19:26 AM
Type: Worm
Infection Length: 42,496 bytes
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows

Vista, Windows NT, Windows Server 2003, Windows 2000

When executed, the worm copies itself as the following file:
%Windir%\tstray.exe

Next, the worm creates the following registry entries so that it runs every

time Windows starts:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal

Server\Install\Software\Microsoft\Windows\CurrentVersion\Run\"Text Tray

Service" = "tstray.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"Text Tray

Service" = "tstray.exe"

The worm creates the following registry entry to bypass the Windows firewall:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\

FirewallPolicy\StandardProfile\AuthorizedApplications\List\"%SystemDrive%\[OR

IGINAL THREAT FILE NAME].exe" = "%SystemDrive%\[ORIGINAL THREAT FILE

NAME].exe:*:Enabled:Text Tray Service"

Next, the worm copies itself to all removable and mapped drives as the

following file:
%DriveLetter%\driver\usb\MSwindows.exe

It also creates the following file:
%DriveLetter%\driver\usb\Desktop.ini

It then creates the following file so that it runs when the above drives are

accessed:
%DriveLetter%\autorun.inf

 

2. W32.SillyFDC.BCA

 

Discovered: June 24, 2009
Updated: June 25, 2009 3:36:10 AM
Type: Worm
Infection Length: 45,056 bytes
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows

Vista, Windows NT, Windows Server 2003, Windows 2000

When executed, the worm copies itself as the following file:
%UserProfile%\Local Settings\Application Data\winlogon.exe

The worm also creates the following file:
%Temp%\~DF3069.tmp

The worm then creates the following registry entry so that it runs every time

Windows starts:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"srv" =

"%UserProfile%\Local Settings\Application Data\winlogon.exe"

It then accesses the following URLs:

[http://]qwertyu.net.ru/ping[REMOVED]
[http://]qwertyu.net.ru/ping[REMOVED]

The worm then copies itself to all removable and mapped drives as the

following file:
%DriveLetter%\$RECYCLE.BIN\autorun.exe

The worm creates the following file so that it runs when the above drives are

accessed:
%DriveLetter%\autorun.inf

 

3. W32.SillyFDC.BCB

 

Discovered: June 24, 2009
Updated: June 25, 2009 4:52:38 AM
Type: Worm
Infection Length: 48,640 bytes
Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows

Vista, Windows NT, Windows Server 2003, Windows 2000

When executed, the worm copies itself as the following file:
%Windir%\vmnat.exe

It then creates the following files:

%System%\drivers\sysdrv32.sys
%Temp%\11A49.dmp
%Temp%\1b63_appcompat.txt

The worm then creates the following registry entry so that it runs every time

Windows starts:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"Windows

Virtual Manager" = "vmnat.exe"

The worm copies itself to all removable and mapped drives as the following

file:
%DriveLetter%\RECYCLER\[SID]\autorunme.exe

It also creates the following file:
%DriveLetter%\RECYCLER\[SID]\Desktop.ini

It then creates the following file so that it runs when the above drives are

accessed:
%DriveLetter%\autorun.inf

Ask Your Own Programming Question
Customer reply replied 8 years ago
I already acepted the other answer from you, remember?
Ask syseng Your Own Question
syseng
syseng
syseng, Computer Systems Engineer
Category: Programming
Satisfied Customers: 6,933
6,933 Satisfied Customers
Experience: Over 20 years experience, including Linux development and platform support

syseng is online now

A new question is answered every 9 seconds

How JustAnswer works:

  • Ask an ExpertExperts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional AnswerVia email, text message, or notification as you wait on our site. Ask follow up questions if you need to.
  • 100% Satisfaction GuaranteeRate the answer you receive.

JustAnswer in the News:

Ask-a-doc Web sites: If you've got a quick question, you can try to get an answer from sites that say they have various specialists on hand to give quick answers... Justanswer.com.
JustAnswer.com...has seen a spike since October in legal questions from readers about layoffs, unemployment and severance.
Web sites like justanswer.com/legal
...leave nothing to chance.
Traffic on JustAnswer rose 14 percent...and had nearly 400,000 page views in 30 days...inquiries related to stress, high blood pressure, drinking and heart pain jumped 33 percent.
Tory Johnson, GMA Workplace Contributor, discusses work-from-home jobs, such as JustAnswer in which verified Experts answer people’s questions.
I will tell you that...the things you have to go through to be an Expert are quite rigorous.

What Customers are Saying:

My Expert answered my question promptly and he resolved the issue totally. This is a great service. I am so glad I found it I will definitely use the service again if needed.

One Happy CustomerNew York

Wonderful service, prompt, efficient, and accurate. Couldn't have asked for more. I cannot thank you enough for your help.

Mary C.Freshfield, Liverpool, UK

This expert is wonderful. They truly know what they are talking about, and they actually care about you. They really helped put my nerves at ease. Thank you so much!!!!

AlexLos Angeles, CA

Thank you for all your help. It is nice to know that this service is here for people like myself, who need answers fast and are not sure who to consult.

GPHesperia, CA

I couldn't be more satisfied! This is the site I will always come to when I need a second opinion.

JustinKernersville, NC

Just let me say that this encounter has been entirely professional and most helpful. I liked that I could ask additional questions and get answered in a very short turn around.

EstherWoodstock, NY

Thank you so much for taking your time and knowledge to support my concerns. Not only did you answer my questions, you even took it a step further with replying with more pertinent information I needed to know.

RobinElkton, Maryland

< Previous | Next >

Meet the Experts:

ATLPROG

ATLPROG

Computer Software Engineer

7,677 satisfied customers

MS in IT.Several years of programming experience in Java C++ C C# Python VB Javascript HTML

LogicPro

LogicPro

Computer Software Engineer

7,131 satisfied customers

Expert in C, C++, Java, DOT NET, Python, HTML, Javascript, Design.

unvadim

unvadim

Computer Software Engineer

1,168 satisfied customers

Good knowledge of OOP principles. 3+ years of programming experience with Java and C++. Sun Certified Java Programmer 5.0.

lifesaver

lifesaver

Computer Software Engineer

950 satisfied customers

Several years of intensive programming and application development experience in various platforms.

ehabtutor

ehabtutor

Computer Software Engineer

936 satisfied customers

Bachelor of computer science, 5+ years experience in software development, software company owner

TheDoctor

TheDoctor

Software Engineer

893 satisfied customers

M.S. in Internet Information Systems

The-PC-Guy

The-PC-Guy

Software Engineer

800 satisfied customers

Extensive Knowledge in PHP, MYSQL, CSS & Javascript

< Previous | Next >

Related Programming Questions
Just wanted to see if you would be interested in helping me
Hello Again! Just wanted to see if you would be interested in helping me with two more programs? I will attach the Program outlines and the Word documents. Please let me know if you would like to help… read more
George Sibiya
George Sibiya
PhD
216 satisfied customers
I need to design an antisense oligo against beta catenin and
I need to design an antisense oligo against beta catenin and HCV-related sequences for clinical use … read more
Kris R
Kris R
IT Manager
Computing
2,629 satisfied customers
I need to know how to create and move a stack of playing
I need to know how to create and move a stack of playing cards in visual basic … read more
Ingo U
Ingo U
Master\u0027s Degree
262 satisfied customers
Write a C++ program to read in various types of test
Write a C++ program to read in various types of test questions (multiple choice and True/False) from a test bank (text file), and load the questions into an array of questions. You will need to implem… read more
LogicPro
LogicPro
Computer Software Engineer
Bachelor of Technology
7,131 satisfied customers
I want to copy a formula horizontally across a row and can't
I want to copy a formula horizontally across a row and can't get it to repeat … read more
The-PC-Guy
The-PC-Guy
Software Engineer
Bachelor's Degree
800 satisfied customers
I'm trying to make a python object oriented checkers game,
I'm trying to make a python object oriented checkers game, but I'm lost. I'm trying to find a source code for a python checkers game. Is there any way you would be able to help me … read more
George Sibiya
George Sibiya
PhD
216 satisfied customers
I have a spreadsheet with customer sales and market
I have a spreadsheet with customer sales and market information for the first half of 2017. The list has over 10,000 rows. I added the market segment manually from a drop down menu. Very time consumin… read more
The-PC-Guy
The-PC-Guy
Software Engineer
Bachelor's Degree
800 satisfied customers
Not sure how to explain this...but I have an excel report
Hi! Not sure how to explain this...but I have an excel report with a field name for first name and one for last name. The report contains multiple people from the same household, one row for each. Eac… read more
The-PC-Guy
The-PC-Guy
Software Engineer
Bachelor's Degree
800 satisfied customers
Wanting to insert function into a invoice I am building on
wanting to insert function into a invoice I am building on excel, how to add a subtraction … read more
The-PC-Guy
The-PC-Guy
Software Engineer
Bachelor's Degree
800 satisfied customers
How do I get my restored Microsoft Wordpad .rtf files to
How do I get my restored Microsoft Wordpad .rtf files to stop coming up in Landscape orientation. I want them to normally come up in Portrait orientation? (Tech Viet helped me a few days ago.)… read more
syseng
syseng
Computer Systems Engineer
6,933 satisfied customers
I am looking for help understanding the content of some
Hi. I am looking for help understanding the content of some files. Ideally, I could have someone explain what certain things mean so that I am not making assumptions. The files are in HTML, JS, SQL, a… read more
George Sibiya
George Sibiya
PhD
216 satisfied customers
Searching for a tutorial on WordPress theme ColorMag Pro -
Searching for a tutorial on WordPress theme ColorMag Pro - some I have found have no sound and or the narration isn't understandable. … read more
RussellA
RussellA
Solutions Architect
Bachelor\u0027s Degree
123 satisfied customers
VWorker01.pyw import sys; print (sys.version) n = 4; m = 2 M
vWorker01.pyw import sys; print (sys.version) n = 4; m = 2 M = n * [n * [0.0]] print("show M contents: ") print (M) for i in iter(range(m,n)): M[i][i] = 1.0 print ("show M contents: ") print(M)# For c… read more
George Sibiya
George Sibiya
PhD
216 satisfied customers
I must have messed up something on my
I must have messed up something on my oshaukutaoutdoors.wordpress.com site as I can't get into it. I am hoping you can help me out … read more
RussellA
RussellA
Solutions Architect
Bachelor\u0027s Degree
123 satisfied customers
Is there a way I can get Microsoft excel to stop using the
is there a way I can get Microsoft excel to stop using the scientific notation and altering my data? for example, some numbers shows up as 75645+0545. I need this to stop and to get it to stop saving … read more
The-PC-Guy
The-PC-Guy
Software Engineer
Bachelor's Degree
800 satisfied customers
I want to remove search items from my gmail search list the
i want to remove search items from my gmail search list the case is .... when i search something in gmail it shows me a list o messages, but i already deleted these messages.. now i don't want that th… read more
Pete
Pete
Engineer
Bachelor\u0027s Degree
1,124 satisfied customers
I work in computer/network security. In order to really
I work in computer/network security. In order to really become an expert in that field, I need to have an intimate understanding of the C programming language. This helps to do tasks like code auditin… read more
Martin
Martin
Network Engineering Diploma
141 satisfied customers
I need the source code or the library in Java that defines
I need the source code or the library in Java that defines OUAnimatedApplication and OUColour … read more
George Sibiya
George Sibiya
PhD
216 satisfied customers
Disclaimer: Information in questions, answers, and other posts on this site ("Posts") comes from individual users, not JustAnswer; JustAnswer is not responsible for Posts. Posts are for general information, are not intended to substitute for informed professional advice (medical, legal, veterinary, financial, etc.), or to establish a professional-client relationship. The site and services are provided "as is" with no warranty or representations by JustAnswer regarding the qualifications of Experts. To see what credentials have been verified by a third-party service, please click on the "Verified" symbol in some Experts' profiles. JustAnswer is not intended or designed for EMERGENCY questions which should be directed immediately by telephone or in-person to qualified professionals.

Disclaimer: Information in questions, answers, and other posts on this site ("Posts") comes from individual users, not JustAnswer; JustAnswer is not responsible for Posts. Posts are for general information, are not intended to substitute for informed professional advice (medical, legal, veterinary, financial, etc.), or to establish a professional-client relationship. The site and services are provided "as is" with no warranty or representations by JustAnswer regarding the qualifications of Experts. To see what credentials have been verified by a third-party service, please click on the "Verified" symbol in some Experts' profiles. JustAnswer is not intended or designed for EMERGENCY questions which should be directed immediately by telephone or in-person to qualified professionals.

Show MoreShow Less

Ask Your Question

x