Monday 24 November 2014

What is C++

C++is a general-purpose programming language with a bias towards systems programming that
– is a better C,
– supports data abstraction,
– supports object-oriented programming, and
– supports generic programming.

Monday 9 June 2014

Strong Password Policy


¢Combines three  of the  four following character types:
Uppercase  characters  (twenty-six   letters  A-Z)
Lowercase  characters  (twenty-six   letters  a-z)
Numbers  (ten  numbers  0-9)
Special   characters  (thirty-two  printable  characters,   such  as  !,   $,   and  *)
¢You can calculate  the  key space  with the  following formula: C^N (CN)
C i s t he  number of possible  characters used,  and N is the  length of the  password
 
¢For example ,  a six-character password using only lower case  letters (twenty-six possibilities) i s calculated as 26^6 (266),  or about  308 million possibilities
¢
¢
¢If we are using all 94 printable character with six character password 946
¢    
 

Password Policy


¢Passwords should be strong.
This  means  they  are  at  l east  eight  characters  and  include  multiple  character  types , such  as  upper  case,   lower  case,   numbers,  and  symbol s.
¢Passwords should be changed regularly .
Users  should  be  forced  to  change  their  passwords  on  a  regular  basis  by setting  m ax i m um   password  ages,   or  password  expiration  times.
¢Passwords should not be reused.
Password  histories  prevent  users  f rom   using  the  same  passwords  repeatedly.
¢Default passwords should be changed.
If   a  system   comes  with  a  default  password,   that  default  password  should be  changed  before  the  system   is  brought  into  service.

¢Passwords should not be written down.
If   the  password  absolutely  must  be  written  down,   store in  a  safe  (not just  a  safe  place).
¢Passwords should not be shared.  
Only  one  person  should  know  the  password  to  any  single  account.   If   an administrator  resets  a  password,   the  password  should  be  set  to  expire  immediately.   This  requires  users  to  reset  the  password  the first  time  they  log  on.
¢Account lockout policies should be used.
  If   a  user  enters  the  wrong  password  too  many  times,   an  account lockout  pol i cy  locks  the  account.   This  prevents  password  guessing  attempts
¢
 

Wednesday 4 December 2013

Windows key shortcuts



Win : switch between the Start screen and the last-running Windows 8 app
Win + C : displays the Charms: the Settings, Devices, Share and Search options
Win + D : launches the desktop
Win + E : launches Explorer
Win + F : opens the File Search pane
Win + H : opens the Share pane
Win + I : opens Settings
Win + K : opens the Devices pane
Win + L : locks your PC
Win + M : minimises the current Explorer or Internet Explorer window (works in the full-screen IE, too)
Win + O : toggles device orientation lock on and off
Win + P : switch your display to a second display or projector
Win + Q : open the App Search pane
Win + R : opens the Run box
Win + U : open the Ease of Access Centre
Win + V : cycle through toasts (notifications)
Win + W : search your system settings (type POWER for links to all power-related options, say)
Win + X : displays a text menu of useful Windows tools and applets
Win + Z : displays the right-click context menu when in a full-screen app
Win + + : launch Magnifier and zoom in
Win + - : zoom out
Win + , : Aero peek at the desktop
Win + Enter : launch Narrator
Win + PgUp : move the current screen to the left-hand monitor
Win + PgDn : move the current screen to the right-hand monitor
Win + PrtSc : capture the current screen and save it to your Pictures folder
Win + Tab : switch between running apps

Friday 20 September 2013

Computer Forensics Versus Other Related Disciplines

 Investigators often examine a computer disk not knowing whether it contains evidence—they must search storage media.
if they find data, they piece it together to produce evidence.
Various forensics software tools can be used for most cases.
In extreme cases, investigators can use electron microscopes and other sophisticated equipment to retrieve information from machines that have been damaged or purposefully reformatted.



Computer Forensics Versus Other Related Disciplines

 Investigators often examine a computer disk not knowing whether it contains evidence—they must search storage media.
if they find data, they piece it together to produce evidence.
Various forensics software tools can be used for most cases.
In extreme cases, investigators can use electron microscopes and other sophisticated equipment to retrieve information from machines that have been damaged or purposefully reformatted.



Computer Forensics Versus Other Related Disciplines

 Investigators often examine a computer disk not knowing whether it contains evidence—they must search storage media.
if they find data, they piece it together to produce evidence.
Various forensics software tools can be used for most cases.
In extreme cases, investigators can use electron microscopes and other sophisticated equipment to retrieve information from machines that have been damaged or purposefully reformatted.