Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9

Computer security is an important element that should be consider in computer networking. The basic element in computer security is password security in operating systems. This research focus on Windows XP Professional and Red Hat Linux 9 operating systems because both of these platform is popular u...

Full description

Saved in:
Bibliographic Details
Main Author: Norkhushaini, Awang
Format: Thesis
Language:eng
eng
Published: 2004
Subjects:
Online Access:https://etd.uum.edu.my/1392/1/NORKHUSHAINI_BT._AWANG.pdf
https://etd.uum.edu.my/1392/2/1.NORKHUSHAINI_BT._AWANG.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uum-etd.1392
record_format uketd_dc
institution Universiti Utara Malaysia
collection UUM ETD
language eng
eng
topic QA76 Computer software
spellingShingle QA76 Computer software
Norkhushaini, Awang
Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
description Computer security is an important element that should be consider in computer networking. The basic element in computer security is password security in operating systems. This research focus on Windows XP Professional and Red Hat Linux 9 operating systems because both of these platform is popular used by Malaysian users. The main objective of this research is to identify the vulnerability of password security in both operating systems. Two computers have been connected to stimulate the attacking scenario such as in computer network. Both operating system which is Windows XP Professional and Red Hat Linux 9 have been configured with firewall that come with the system. This is to ensure that both operating systems is prevent with high level security. From the research study, found that password security on both platform is easy to be crack even firewall is configure earlier. Therefore some steps should be taken to ensure security in computer network is zero from hackers.
format Thesis
qualification_name masters
qualification_level Master's degree
author Norkhushaini, Awang
author_facet Norkhushaini, Awang
author_sort Norkhushaini, Awang
title Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
title_short Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
title_full Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
title_fullStr Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
title_full_unstemmed Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
title_sort comparing the vulnerability of password security on windows xp profesional and red hat linux 9
granting_institution Universiti Utara Malaysia
granting_department Faculty of Information Technology
publishDate 2004
url https://etd.uum.edu.my/1392/1/NORKHUSHAINI_BT._AWANG.pdf
https://etd.uum.edu.my/1392/2/1.NORKHUSHAINI_BT._AWANG.pdf
_version_ 1747827137101955072
spelling my-uum-etd.13922013-07-24T12:11:45Z Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9 2004-11-10 Norkhushaini, Awang Faculty of Information Technology Faculty of Information Technology QA76 Computer software Computer security is an important element that should be consider in computer networking. The basic element in computer security is password security in operating systems. This research focus on Windows XP Professional and Red Hat Linux 9 operating systems because both of these platform is popular used by Malaysian users. The main objective of this research is to identify the vulnerability of password security in both operating systems. Two computers have been connected to stimulate the attacking scenario such as in computer network. Both operating system which is Windows XP Professional and Red Hat Linux 9 have been configured with firewall that come with the system. This is to ensure that both operating systems is prevent with high level security. From the research study, found that password security on both platform is easy to be crack even firewall is configure earlier. Therefore some steps should be taken to ensure security in computer network is zero from hackers. 2004-11 Thesis https://etd.uum.edu.my/1392/ https://etd.uum.edu.my/1392/1/NORKHUSHAINI_BT._AWANG.pdf application/pdf eng validuser https://etd.uum.edu.my/1392/2/1.NORKHUSHAINI_BT._AWANG.pdf application/pdf eng public masters masters Universiti Utara Malaysia Beaver K. & McClure S. (2004) Hacking For Dummies. United States of America:Hungry Minds Bolzem M. (2000, September). The Duality of Microsoft's Position On Linux. System Development, pp. 94-96 Brainwave Consulting (2004). Why Is System & Network Security Important?.Retrieved August 2, 2004, from http://www.ultratech-Ilc.com/BrainWave/ Cole E. (1999). Huckers Belutc. United States of America: New Riders Publishing Couprie D., Goodbrand A., Li B. & Zllu D. (1996) Soji Systems Methodology. Retrieved July 10, 2004, from http://sern.ucalgary.ca David a. Kelly (July/August 2004) Oracle Magazine Volume XVIII Number 4 Linzuc-A Hit with enterprise of sizes and a nocturnal for low-cost cluster Donald L. & Chellis J. (2002) . MC'SE: Windows XP Professional Study Guide. New York: Sybex Dictionary Online, Retrieved Jun 20, 2004, from http://www.m-w.com Enterprise Business Solutions: Solving Password Management Challenges For The Technologies Sector (2004) Retrieved August 20,2004, from http://www.protocom.com/ whitepapers/solutions technologies.pdf Fisher D. (2003) Study Reveals Bad Password Habits. Retrieved September 1,2004, from http://searchsecurity.techtarget.com Fisher K. (2004). Linux Servers Targeted More Open For Attacks. Retrieved August 10, 2004, from http://Narstechnica.com/news/posts/1077304227.html Grant R. (2004). Linux for Non-Geeks: A Hands-On. Project-Based, Take-N-Slow Guidebook. United States of America: No Starch Press LeBlanc D.A., Hoag M. & Blornquist E. (2001). Linux. Drummies (3rd ed.). United States of America: Hungry Minds Marina M., Rosslina H. & Siti Zalela M . (2002) Pengoperasian. Malaysia : Dewan Bahasa dan Pustaka Mary E. Behr (2001) The Cricked trend the Crackers Respond. Retrieved July 23, 2004, from www.pwcrack.com Robert J. Shimonski (2002). Introduction to password cracking. Retrieved July 23, 2004, from http://www.alphaworks.ibm.com/developerworks/ratings.nsf/RateArticle?CreateDocument Schenk T. (2004). Leading Universities Around the World Choose Red Hat Academic Solutions for Servers and Clients. Retrieved July 20, 2004, from http://www.redhat.com/solutions/industries/education/ Siever E., Figgins S. & Weber A. (2003) Linux in a Nutshell (4th ed.). United Kingdom: O'Reilly Stanley H. Kremen. (1998). Apprehending The Computer Hacker: The Collection and Use of Evidence. Retrieved August 23,2004, from http://www.shkdplc.com/cfo/articles/hack.html united States General Accounting Office (1990). Information security: Computer attacks a Department of Defense pose increasing risk. Retrieved August 10. 2004, from http:/www.fas.org/irp/gao Wong L.C. (2004, July 27). The Star In Tech pp. IT8 Zviran M., Haga W.J. (1993): A Comparison of Password Technique for for Multilevel Authentication Mechanism.The Computer Journal, 36 pp. 227-237