Briefly discuss the potential use case of application

Assignment Help Computer Engineering
Reference no: EM132835171

Lab 1

Q1. What internet company are you using? and What is the brand and the model of your router?.

Q2. What is the LAN IP address of your computer?

Q3. What is the LAN IP address of your router?

Q4. Attach the photo of your router (do not show any sensitive information such as SSID and password)

Lab 2.

1. First, run XAMPP on your local computer. Then, modify the DNS hosts file so that a fake domain name (any domain name that you have never visited, for example: tattarrattat.com) can point to the IP address of your computer (not 127.0.0.1, but 192.168.*.* or the subnet IP you are currently using).
• Please refer to the guide for changing the hosts file
• Make sure to remove the edit once you are done with the experimenting.
• Screen capture the result and paste it below. It will show the fake domain address with the Xampp default pag.)

2. Use DNS Benchmark by grc.com to evaluate the performance of your current DNS server provided by the ISP
• Download:
• This software won't work in MacOS and in the UToledo network
• If you are using an older version of the Mac, you can try to use namebench, a similar tool that ceased the development a long time ago.
• As a last option, you can try DNSPerf.com website. But I am not sure who reliable is the result.
o https://www.dnsperf.com/#!dns-resolvers
• For windows users, you should use the DNS Benchmark by grc.com.
• Please screen capture the result and paste it below. Does your default DNS have the fastest response time?

3. Configure OpenDNS at the computer or at the router level. Experiment different configurations within OpenDNS website.
• Please see the lab 6 slide for more details for setup. (from starting to confirming the setup. If you do not complete the initial setup, you won't be able to complete the steps below.)
• You may add network control mechanisms through "Settings" in the dashboard page. (for example, web contents filtering, security, etc.)
• Stats and logs must be enabled under the "Settings » Stats and Logs". You can also purge your DNS data once you are done with this assignment.
• In my case, it appears that OpenDNS won't be able to filter or pick up the stats for anything that uses encryption. Was yours the same? Please review the stats and logs and report it briefly.

Lab 3. Assignment - File Encryption Application

MacOS Users
1. Create an encrypted virtual disk by following the steps below.
1) Search Disk Utility and open.
2) In the file menu, click File » New Image » Blank Image
3) Specify the size (200 MB), Format (exFAT), Encryption (128 bit key option). Leave other options as they are. (also remember where the file is saved.)
4) When promoted, please fill in the password and verify it.
5) When done, go to the folder. You will see a .dmg disk image file created. Double click to mount it. When, promoted, please enter the password.
6) You may add contents you wish to encrypt within the folder.
7) When done, please dismount virtual disk through Finder » Location.
Question: Did you complete the steps above? Completed/Did not complete

2. Download the following disk image, use the password below to mount/open the disk. Please verify the contents inside.
Question:What file do you see? This file is being transferred through http protocol. Will someone be able to intercept the data packet and review the contents within the virtual disk? What do you think?
3. Please briefly discuss the potential use case of this application.

Since the steps to use TrueCrypt is much more involved, it very likely that I have already demonstrated the steps during the class. (If I did not, I will update you with a video tutorial link.) Therefore, please refer to the video recording.

1. Create an "encrypted file container" with a hidden partition (or TrueCrypt volume) inside. You may choose any encryption algorithm to do the encryption.
a. Give 500 MB to the outer volume size and give 200 MB to the hidden volume.
b. When mount the encrypted file using TrueCrypt, it will determine which volume or partition to mount depending on the password you feed.
c. Please experiment with this by adding/deleting files within the outer or hidden partitions.
Question: Did you complete the steps above? Completed/Did not complete

2. Download the following disk image, use the password below to mount/open the disk. Please verify the contents inside.
Password for outer volume: infs3400INFS#$))
Password for hidden volume: infs3600INFS#^))
Question: What file do you see from the outer volume? What do you see from the hidden volume? This file is being transferred through http protocol. Will someone be able to intercept the data packet and review the contents within the virtual disk? What do you think?

3. Use your imagination. Please briefly discuss the potential use case of this application.

Attachment:- File Encryption Application.rar

Reference no: EM132835171

Questions Cloud

Explain the core modules of Hadoop : Identify and explain the core modules of Hadoop. Install MongoDB database on your local PC.
Explain the purpose of an amortization schedule : Explain whether you would you rather have a savings account that paid interest compounded on a monthly basis or compounded on an annual basis? Why?
Estimate the variable cost per machine-hour : Management believes that maintenance cost is a mixed cost that depends on Machine-hours. Estimate the variable cost per machine-hour
Discuss some of the protected characteristics covered : Discuss some of the protected characteristics covered by equal employment opportunity laws and why they are important in today's employment setting
Briefly discuss the potential use case of application : What internet company are you using? and What is the brand and the model of your router and discuss the potential use case of application
Define firewall security techniques : Define a firewall. Define firewall security techniques. Write the strengths and weaknesses of the Microsoft Windows firewall
Explain the advantages as a borrower of lending institution : Explain the advantages as a borrower or from the perspective of the lending institution. which organization type is it easiest or most difficult to raise money?
Compute the estimated property value : The income is considered as a perpetuity that will grow by 2.5% per year. Using a discount rate of 9.5%, compute the estimated property value.
How much could he withdraw at the beginning of each month : How much could he withdraw at the beginning of each month for the next 30 years and end up with zero in the account

Reviews

len2835171

3/21/2021 10:26:20 PM

3 Lab assignments mentioned above. once accepted, i can send lab videos link to help you solve it.

Write a Review

Computer Engineering Questions & Answers

  Create the logic that matche the master and transaction file

Create the logic for a program that matches the master and transaction file records, and outputs one line for each transaction, indicating job number.

  ECT200 Introduction to Computing Assignment

ECT200 Introduction to Computing Assignment Help and Solution, Abu Dhabi University - Assessment Writing Service - What aspects of your life have been

  Write an algorithm using pseudocode

Write an algorithm, using pseudocode, to make the robot: stand up walk forward until it senses a wall turn around walk back to the chair sit down in its original starting position Finally, output the total number of steps taken.

  What does daisy-chaining mean in the context of the vmebus

The VMEbus has six address modifier lines, AMO to AM5. What is their significance and how are they used?

  Predict the future role of the communication technology you

select one 1 of the following topics in which you will base your responses in the form of a term papernetwork

  What was the impact of rush to market software product

Microsoft issued the Windows ME operating system. What was the impact of this 'rush to market' software product on users and Microsoft's reputation? Explain.

  How you would correct the design issues

Analyze the new system and determine the design issues with this new system. Describe how you would correct the design issues with the system to make.

  What is the average access time for combined read

It is also estimated that 80% of the memory accesses are for read and 20% for write operations. A cache write-through procedure is used.

  Where does the responsibility of the software developer

Where does the responsibility of the software developer reside in considering the discrimination in techonology based on gender race and disability?

  Threads-post substantive comments on those threads

Select AT LEAST 3 other students' threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.

  Write a program that takes as input two values

Write a program that takes as input two values: the first represents the cost of an item, and the second is the amount of money being paid for it.

  Make the three data members private

Write a class to contain the following information about towns: the name (a sequence of characters); the population (an integer);

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd