Briefly discuss the potential use case of application

Assignment Help Computer Engineering
Reference no: EM132835171

Lab 1

Q1. What internet company are you using? and What is the brand and the model of your router?.

Q2. What is the LAN IP address of your computer?

Q3. What is the LAN IP address of your router?

Q4. Attach the photo of your router (do not show any sensitive information such as SSID and password)

Lab 2.

1. First, run XAMPP on your local computer. Then, modify the DNS hosts file so that a fake domain name (any domain name that you have never visited, for example: tattarrattat.com) can point to the IP address of your computer (not 127.0.0.1, but 192.168.*.* or the subnet IP you are currently using).
• Please refer to the guide for changing the hosts file
• Make sure to remove the edit once you are done with the experimenting.
• Screen capture the result and paste it below. It will show the fake domain address with the Xampp default pag.)

2. Use DNS Benchmark by grc.com to evaluate the performance of your current DNS server provided by the ISP
• Download:
• This software won't work in MacOS and in the UToledo network
• If you are using an older version of the Mac, you can try to use namebench, a similar tool that ceased the development a long time ago.
• As a last option, you can try DNSPerf.com website. But I am not sure who reliable is the result.
o https://www.dnsperf.com/#!dns-resolvers
• For windows users, you should use the DNS Benchmark by grc.com.
• Please screen capture the result and paste it below. Does your default DNS have the fastest response time?

3. Configure OpenDNS at the computer or at the router level. Experiment different configurations within OpenDNS website.
• Please see the lab 6 slide for more details for setup. (from starting to confirming the setup. If you do not complete the initial setup, you won't be able to complete the steps below.)
• You may add network control mechanisms through "Settings" in the dashboard page. (for example, web contents filtering, security, etc.)
• Stats and logs must be enabled under the "Settings » Stats and Logs". You can also purge your DNS data once you are done with this assignment.
• In my case, it appears that OpenDNS won't be able to filter or pick up the stats for anything that uses encryption. Was yours the same? Please review the stats and logs and report it briefly.

Lab 3. Assignment - File Encryption Application

MacOS Users
1. Create an encrypted virtual disk by following the steps below.
1) Search Disk Utility and open.
2) In the file menu, click File » New Image » Blank Image
3) Specify the size (200 MB), Format (exFAT), Encryption (128 bit key option). Leave other options as they are. (also remember where the file is saved.)
4) When promoted, please fill in the password and verify it.
5) When done, go to the folder. You will see a .dmg disk image file created. Double click to mount it. When, promoted, please enter the password.
6) You may add contents you wish to encrypt within the folder.
7) When done, please dismount virtual disk through Finder » Location.
Question: Did you complete the steps above? Completed/Did not complete

2. Download the following disk image, use the password below to mount/open the disk. Please verify the contents inside.
Question:What file do you see? This file is being transferred through http protocol. Will someone be able to intercept the data packet and review the contents within the virtual disk? What do you think?
3. Please briefly discuss the potential use case of this application.

Since the steps to use TrueCrypt is much more involved, it very likely that I have already demonstrated the steps during the class. (If I did not, I will update you with a video tutorial link.) Therefore, please refer to the video recording.

1. Create an "encrypted file container" with a hidden partition (or TrueCrypt volume) inside. You may choose any encryption algorithm to do the encryption.
a. Give 500 MB to the outer volume size and give 200 MB to the hidden volume.
b. When mount the encrypted file using TrueCrypt, it will determine which volume or partition to mount depending on the password you feed.
c. Please experiment with this by adding/deleting files within the outer or hidden partitions.
Question: Did you complete the steps above? Completed/Did not complete

2. Download the following disk image, use the password below to mount/open the disk. Please verify the contents inside.
Password for outer volume: infs3400INFS#$))
Password for hidden volume: infs3600INFS#^))
Question: What file do you see from the outer volume? What do you see from the hidden volume? This file is being transferred through http protocol. Will someone be able to intercept the data packet and review the contents within the virtual disk? What do you think?

3. Use your imagination. Please briefly discuss the potential use case of this application.

Attachment:- File Encryption Application.rar

Reference no: EM132835171

Questions Cloud

Explain the core modules of Hadoop : Identify and explain the core modules of Hadoop. Install MongoDB database on your local PC.
Explain the purpose of an amortization schedule : Explain whether you would you rather have a savings account that paid interest compounded on a monthly basis or compounded on an annual basis? Why?
Estimate the variable cost per machine-hour : Management believes that maintenance cost is a mixed cost that depends on Machine-hours. Estimate the variable cost per machine-hour
Discuss some of the protected characteristics covered : Discuss some of the protected characteristics covered by equal employment opportunity laws and why they are important in today's employment setting
Briefly discuss the potential use case of application : What internet company are you using? and What is the brand and the model of your router and discuss the potential use case of application
Define firewall security techniques : Define a firewall. Define firewall security techniques. Write the strengths and weaknesses of the Microsoft Windows firewall
Explain the advantages as a borrower of lending institution : Explain the advantages as a borrower or from the perspective of the lending institution. which organization type is it easiest or most difficult to raise money?
Compute the estimated property value : The income is considered as a perpetuity that will grow by 2.5% per year. Using a discount rate of 9.5%, compute the estimated property value.
How much could he withdraw at the beginning of each month : How much could he withdraw at the beginning of each month for the next 30 years and end up with zero in the account

Reviews

len2835171

3/21/2021 10:26:20 PM

3 Lab assignments mentioned above. once accepted, i can send lab videos link to help you solve it.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd