use Kali to crack the passwords.

     

Use the attached file called hashes and   then use Kali to crack the passwords.

You can use Hashcat is a password   cracking tool used by ethical hackers/ penetration testers to break down the   hash into a plaintext.

The best dictionary that   you can use is rockyou.txt wordlist.

You need to know the type of the hash function being used. This   can be done by hash-identifier.

 

Setup a windows XP image and follow the   instruction given in metasploitable part 2 where we have compromised windows   XP.

Follow the instruction and provide   screenshots for all the steps you did.

 

Configure a bootable USB that can be used to bypass windows   OS admin login

Tasks discussion

 

There are TWO tasks that you would need to do( they are separate): 

Task 1 (Minimum 250 words): 

–  How would you describe the schools of ethical thought? 

– Minimum two references. 

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 250 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index.

**JAVA** For this project, you are going to write a program to find the anagrams in a given dictionary for a given word. If two words have the same letters but in different order, they are called anagrams. For example, “listen” and “silent” are a pair of

 

For this project, you are going to write a program to find the anagrams in a given dictionary for a given word. If two words have the same letters but in different order, they are called anagrams. For example, “listen” and “silent” are a pair of anagrams.

**JAVA**

First let’s focus on “LetterInventory.java”.

Its purpose is to compute the canonical “sorted letter form” for a given word.

1. Implement the constructor, which takes the String input word. You can assume that the input word contains only valid letters (e.g. no punctuation or blanks), but it may contain letters in different cases.

2. Implement the method: public String getCanonical() It should return the canonical “sorted letter form” for the input word (given in the constructor). It should use only lower cases. For example, if the given word is “AliBaba”, then this method should return “aaabbil”.

****I have already completed all of the above tasks I am struggling with the next part****

**below is the code I have for LetterInventory.java**

import java.util.*;

public class LetterInventory {

   private String input;
 

    //stores the original word.
 

    public LetterInventory(String input) {
        this.input = input;
    }
    //uses an array of chars to hold word and sorts it into alphabetical order.
    //displays it in lower case.
    public String getCanonical() {
        input = input.toLowerCase(); // converting input to lower case
        char [] word = input.toCharArray();
        Arrays.sort(word);
        String sorted = new String (word);
        return sorted;
 

    }
}

*** this is where i am stuck ***

Once “LetterInventory.java” is working as expected, we can now focus on “AnagramFinder.java”. It will read an input “dictionary” file, which contains quite many words, to build a map. The “key” for the map is a word’s canonical form, the “value” for the map will be all the words in the given dictionary that share the same canonical form. For example, if both “listen” and “silent” are in the dictionary, one entry in the map would have key as “eilnst” and value as an ArrayList of words “listen” and “silent”.

Implement the constructor, which takes in the input dictionary file and build the map. You can assume the words in the dictionary contain only valid letters. You should take advantage of “LetterInventory”.

3. Now implement the method: public void printAnagrams(String word) It should try to search the anagrams for the given word in the map. Again, you can assume the input word contains only valid letters, and you should take advantage of “LetterInventory”.

Print out any anagrams found. For now, don’t worry about the case where the input word is the same as the word inside the dictionary, just print them out.

Here is some sample print out:

Your input is: silent. Found anagrams: listen, silent, tinsel.

Your input is: AliBaba. Sorry, didn’t find any anagrams.

A sample main method is already written for you to test various functionalities with some sample input words.

*** Below is the shell for the main method ***

import java.io.*;
import java.util.*;

public class AnagramFinder {
    public static void main(String[] args) throws FileNotFoundException {
        String[] originals = new String[] {
            “realfun”,
            “mias”,
            “EVIL”,
            “unable”,
            “Silent”,
            “AliBaba”
        };

       for(String original: originals) {
            LetterInventory inv = new LetterInventory(original);
            System.out.println(“Original: ” + original + “, Canonical: ” + inv.getCanonical());
        }

       System.out.println(“n”);

       File f = new File(“HW_sample_dict.txt”);
 

        AnagramFinder finder = new AnagramFinder(f);

       for(String original: originals) {
            finder.printAnagrams(original);
        }
    }

   public AnagramFinder(File f) throws FileNotFoundException {
       //TODO implement  
    }

   public void printAnagrams(String word) {
        //TODO implement
    }

   public void printAnagrams2(String word) {
        // Extra Credit: optional to implement
    }
}
 

** can leave out extra credit part i just need help with the first 2 methods in the main file **

** the dict.txt is 400 pages long so I did not include it (the file just contains thousands of words) **

Digital Forensics – 5

 Go  to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.
Using WORD, in your OWN WORDS, write an ORIGINAL brief essay of 500 words or more  :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

misleading graphs discussion board post

Discuss why the graph is misleading. Go beyond simply repeating the information found on the website.  Discuss the following:

What about the graph makes it misleading? How could you make the graph more accurate?

Does the source of the graph have any impact on the interpretation of the data?

Your answers need to include your interpretation of the material that you have watched and read along with your personal experiences.  It is okay to use outside sources—if you do, list the author’s name and the article’s title at the bottom of your post.  Please use complete paragraphs in your posts. 

Assignment

 

Wk 4 Research Assignment

Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements. 

Questions 2

 please answer below questions(plagiarism applies)

  1. What is a database management system (DBMS)?
  2. What are the properties of a DBMS?
  3. Provide three examples of a real-world database (e.g., the library contains a database of books).
  4. How is a DBMS distinguished from a file-based system?
  5. What is data independence and why is it important?
  6. What is the purpose of managing information?
  7. Discuss the uses of databases in a business environment.
  8. What is metadata?

Project 2: Cloud Vendor Presentation

In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
  • One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.
  • One slide on the conclusion.

DB unit5 #1

 I need DB Initial post and 2 responses, please see attached doc for my classmates post.

Discussion Overview

Without perimeter controls, there is no organization. Everything in your organization depends on your ability to control the outside world from getting data and infrastructure that they are not authorized to get

Topic 1: Perimeter Control

In two or more paragraphs, explain what, in your opinion, is the most important perimeter control or control system. Support your response and be sure to cite your sources.

Network Architecture

 Implement a LAN, CAN, and WAN for a university with three campuses. The campus locations are Washington, DC; Vienna, VA, and Phoenix, AZ. Include the architecture and components for each location.

Writing Requirements

  • APA format, 3-4 pages in length (excluding cover page, abstract, and reference list)
  • Paper should include at least 3-4 references