Security Student Name :Ala’a Ahmad Mohammad qwassmeh

Slides:



Advertisements
Similar presentations
Welcome to your new computer!
Advertisements

Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
This tutorial will take approximately 15 minutes. Click here to advance. Click here to go back.
Using Ghost cast to Image PCs
Setup windows 2003 server (standard edition.). Start the computer from the CD.
Pennsylvania’s Protection From Abuse Database
Title of Presentation Author 1, Author 2, Author 3, Author 4 Abstract Introduction This is my abstract. This is my abstract. This is my abstract. This.
1 CS 502: Computing Methods for Digital Libraries Lecture 17 Descriptive Metadata: Dublin Core.
Operating the JH-15 SDR radio
Step 1 - Start your PC and place your Windows XP CD in your CD/DVD- ROM drive. Your PC should automatically detect the CD and you will get a message saying.
Software Development. Chapter 3 – Your first Windows 8 app.
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. M I C R O S O F T ® Preparing for Electronic Distribution Lesson 14.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
Microsoft Windows 7 Part 1 Fundamentals of Using Windows 7.
1. Chapter 25 Protecting and Preparing Documents.
Chapter 1 Creating a Dreamweaver Web Page and Local Site
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
ATTC Network Web Administration Training Laurie Krom Part of the “Get to kNOw” Summer 2008 Training Series.
Project 2 Working on the Windows XP Desktop Windows XP Service Pack 2 Edition Comprehensive Concepts and Techniques.
Copying Music From a CD Margaret S. Britt. Loading Media Player  Click Start  Select the Windows Media Player.
Introducing the World Wide Web Internet- a structure made up of millions of interconnected computers whose users communicate with each other and share.
Using Advanced Options Lesson 14 © 2014, John Wiley & Sons, Inc.Microsoft Official Academic Course, Microsoft Word Microsoft Word 2013.
How to make all IP address the same. 7 6.
1 Double Click to Edit. Installing Evernote 22 First, download the installation software. Open your favorite web browser and visit the Evernote Web site.
Microsoft Office 2003: Advanced 1 ADVANCED MICROSOFT EXCEL Lesson 17 – Working with Multiple Worksheets and Workbooks.
What is Voice Thread? VoiceThread is an application that runs inside your web browser, so there is no software to download, install, or update. VoiceThread.
Metadata and Meta tag. What is metadata? What does metadata do? Metadata schemes What is meta tag? Meta tag example Table of Content.
All About Me An Introduction To Opening And Saving Student Work.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Securing A Wireless Home Network. Simple home wired LAN.
HOW TO INSTALL WINDOWS 7? This step-by-step guide demonstrates how to install Windows 7 Ultimate. The guide is similar for other versions of Windows 7.
Lindsey Velez, Director of Instructional Technology Single Sign-On One Click.
Lesson 6 – Part 2 Word Lesson 6 presentation prepared by Michele Smith – North Buncombe High School, Weaverville, NC. Content from Microsoft Office Word.
 2007 Pearson Education, Inc. All rights reserved Introduction to the Visual Basic Express 2005 IDE.
MyMISLab First Day of Class Registration Walkthrough.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
How to Apply PDF in Flipbook on Website. Description If you are finding solution for applying PDF in flipbook mode on website, and adding multimedia items.
How To Run AVG Antivirus Software 2017 In DOS. AVG is antivirus software used to detect and remove the virus from your system. It is an international.
Development Environment
HOW TO CONNECT EXPRESS VPN-WINDOWS
Network Access on Apple iOS
Prerequisites Essentials of Windows® 2000 By Robert T. Grauer
Presented By: Rohit Maurya
Information Protection & Cyber Security
Brother Printer Support Helpline Number Ireland:
Lesson 9 Sharing Documents
Steps to Fix the Roku 3 Issues:
Microsoft Word 2003 Illustrated Complete
Rootkit A rootkit is a set of tools which take the ability to access a computer or computer network at administrator level. Generally, hackers install.
Windows 94
Connecting To A Router Seems A Trouble On Lenovo Laptop.
How To Stop Trend Micro To Scan The Device
Canon Wireless Printer Support Number USA & Canada
Tablet and eBook Orientation
Search Techniques and Advanced tools for Researchers
Standard for Success Teacher Training.
Tablet and eBook Orientation
How to Stop my Acer laptop From Automatically Updating On Windows 10?
Monster.com: An Introduction
Tablet and eBook Orientation
Tablet and eBook Orientation
Working on the Windows XP Desktop
Standard for Success Teacher Training.
University of Warith AL-Anbiya’a
Network Locations in Windows 7
Training Presentation For
Tutorial Introduction to help.ebsco.com.
The Hacking Suite For Governmental Interception
Presentation transcript:

Security Student Name :Ala’a Ahmad Mohammad qwassmeh Instructor: Dr:Ramzi Saifan

Security Topics Of Presentations 1) Injection Files 2) WPS 3) Windows (Change Password) 4) Viber

Injection Files we have many ways to hacking that the attacker used ... some of them are easy to discover it and some of them are complicated virus is kind of hacking that can attacker used .

Target group the attacker import about the target group .... to know how they can access each of them by the correct way to make hacking.

Example target group :Student choose the 2 files to blind them ( file contain code , pdf file )use (nj-Binder) to make blending.

the result file is in that image we have trouble in icon and extension that program used to take icon from any program (resource )

now the extension of the result file is (exe )we need to change it to (pif , scr,cmd,bat) we need also to change name of the file too . now this file is ready

META DATA

METADATA Introduction Meta data is "data [information] that provides information about other data".[1] Three distinct types of meta data exist: structural meta data, descriptive meta data, and administrative meta data.

METADATA Three distinct types of meta data Descriptive meta data: describes a resource for purposes such as discovery and identification. It can include elements such as title, abstract, author, and keywords. Structural meta data: indicates how compound objects are put together, for example, how pages are ordered to form chapters . Administrative meta data: provides information to help manage a resource, such as when and how it was created, file type and other technical information, and who can access it.

METADATA

METADATA

METADATA

METADATA

METADATA How to create a project ?

METADATA Files Analysis

WPS Wi-Fi Protected Setup (WPS; originally, Wi-Fi Simple Config) is a network security standard to create a secure wireless home network. Two modes in a home network for adding a new device to the network: *PIN method. *Push button method

WPS Push button method

WPS Example

WPS Turn off and disabled step 1

WPS Tun off and disabled step 2

Windows Change Password How can I change password if I forget my password !! if I click Shift 3 times it will be open this window

Windows Ok what I can do ?? I need to cd windows to change order of shift when I click it 3 times and if I can change it to open cmd .. I can to change password without loses any data and without format my computer ..

Windows Steps go to boot window

Windows cont..

Windows click Next

Windows Click on Command Prompt

Windows

Windows

Windows