website design

Now I need unit 3, 4 and 5 done. Can you help me?
Need unit 3 by tomorrow and unit 4 and 5  by Thursday next week September 9th

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Document Analysis

 

Define several forms of metadata that can be useful to an investigation. How is it valuable to an investigator?

Post between 250 and 300 words.

References: 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Dictionary Attacks

 

Windows stores passwords using the NT LAN Manager (NTLM) hash.  This hash is created by hashing the plain text password with the MD4 algorithm.  There is no salt used.  The lack of salt enables the use of a rainbow table to lookup passwords from their hash.   For this assignment you will create a rainbow table for a set of passwords. 

More about NTLM: http://techgenix.com/how-cracked-windows-password-part1/

For this assignment you will create a Rainbow table for NTLM passwords.   Use the following list of steps as a guide.

  1. Use the sys library to read a command line argument that is the name of a password dictionary file.
    For your submission used the password dictionary file found at this link: http://www.openwall.com/passwords/wordlists/password-2011.lst (Links to an external site.)
  2. Open the password dictionary. 
  3. Loop through the contents of the password dictionary one password at a time.
  4. Sort the list of keys from your dictionary
  5. Use a for loop to print all keys and passwords. Print on hash and password pair per line. Structure each line as follows to allow a password to be looked up easily from it’s hash:
    [hash]:[password]
  6. Store the output of your program as rainbow_table.txt. 
    *** Run your program as ‘python3 rainbowtable.py dictionary.txt > rainbow_table.txt’
  7. Name your script rainbowtable.py

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Rainbow Table

Windows stores passwords using the NT LAN Manager (NTLM) hash.  This hash is created by hashing the plain text password with the MD4 algorithm.  There is no salt used.  The lack of salt enables the use of a rainbow table to lookup passwords from their hash.   For this assignment you will create a rainbow table for a set of passwords. 

More about NTLM: http://techgenix.com/how-cracked-windows-password-part1/

For this assignment you will create a Rainbow table for NTLM passwords.   Use the following list of steps as a guide.

  1. Use the sys library to read a command line argument that is the name of a password dictionary file.
    For your submission used the password dictionary file found at this link: http://www.openwall.com/passwords/wordlists/password-2011.lst (Links to an external site.)
  2. Open the password dictionary. 
  3. Loop through the contents of the password dictionary one password at a time.
  4. Sort the list of keys from your dictionary
  5. Use a for loop to print all keys and passwords. Print on hash and password pair per line. Structure each line as follows to allow a password to be looked up easily from it’s hash:
    [hash]:[password]
  6. Store the output of your program as rainbow_table.txt. 
    *** Run your program as ‘python3 rainbowtable.py dictionary.txt > rainbow_table.txt’
  7. Name your script rainbowtable.py

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Subject : Software Engineering

 

Try to answer the following question, 

why are evolutionary models considered by many to be the best approach to software development in a modern context?

 Please refer to Section 2.5.3 from the textbook

This is discussion Post.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ERD model

APA format, in-text citation, references included

2 pages

1. What is your understanding of Entity Integrity Vs Referential Integrity in ERD model. Illustrated with simple examples for ease of understanding of the concepts.

2. Describe various types of keys in ERD model (Primary, Foreign, Superkey etc) with simple examples.

3. Describe 3 entities and illustrate different types of joins using these 3 entities assume you have three entities student, course & enrollment and these tables are related.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Problem 2- Org Behavior

1. Discuss whether diversity helps or hinders a group.

Text-

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Problem 2- Planning the project

1. Identify a major public infrastructure project that is either underway, complete, or proposed in your region. This could be a bridge, road, building, or something of that nature. For the project you have identified, think of as many stakeholders and stakeholder groups as you can. Create a three-column table. In column 1, list the stakeholders. In column 2, list what each stakeholder wants to get from the project. In column 3, list the influence each stakeholder has over the project.

2. How can the stakeholders change over the course of a project? Give examples of changes in who the stakeholders are, and also in how their interests or influence over the project might change throughout the term of the project.

Text-

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

ISBN: 978-1-77420-013-1 

Authors: Adrienne Watt 

Publisher: BCcampus 

Publication Date: August 14, 2014 

Edition: 2nd Edition

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Problem 2- Project Processes

Activity 2

Activity I: A young engineer decides to save $240 per year toward retirement in 40 years.

  1. If he invests this sum at the end of every year at 9%, then how much will be accumulated by retirement time?
  2. If by astute investing the interest rate could be raised to 12%, then what sum could be saved?
  3. If he deposits one fourth of this annual amount each quarter ($60 per quarter) in an interest bearing account earning a nominal annual interest rate of 12%, compounded quarterly, how much could be saved by retirement time?
  4. In part (c), then what annual effective interest rate is being earned?

Activity II: Maurice Micklewhite has decided to replant his garden. Show him what the cost is of making an erroneous decision at various stages of the project, starting with conceptual design and ending with the ongoing maintenance of the garden.

Read

Chapter 3. Engineering Economic Analysis

Chapter 4. Life-Cycle Costing

Book

Title: Project Management ISBN: 9780134478661 Authors: SHTUB Publisher: Pearson Edition: 3RD 17

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

App sec – 2

Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

§ Understand and document the purpose of each access control change request

§ Know what access controls were in place before any changes

§ Get an approval of change by management

§ Understand the scope of the change, both with respect to users, computers, and objects

§ Have evaluated the expected impact of the change

§ Know how to evaluate whether the change meets the goals

§ Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

§ Status or setting prior to any change

§ Reason for the change

§ Change to implement

§ Scope of the change

§ Impact of the change

§ Status or setting after the change

§ Process to evaluate the change

3 references needed in APA format 

1000 words 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now