Secure System Password (SSP) Application for NT Editor Hacking Tool
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6
Abstract
Abstract: In windows, the password will be stored in SAM registry by default. This SAM registry hides the windows password when the system is in ON state. The password in SAM registry will be cleared or changed by using NT Editor Tool. So that data can be accessed by any user. Security for the windows will be done by the proposed system as an application. If the user wants to install new OS then the data in the hard disk will be encrypted for prevention of unauthorized access. The application will be start monitoring to avoid password remodification or clearing the password. Features in this application is, if the user hacks the applicationpassword, SSP does not allow the users to access USB, Ethernet and CD/DVD drive. Application will stop the access of the driver ports, until it is re-installed or the password is set right.
Authors and Affiliations
T. Sethupathy, , P. Veni , S. Selwin Joseph, , C. Sathya
A New Approach to Compressed Image Steganography Using Wavelet Transform
Abstract : This paper proposes a novel steganographic technique that embeds compressed payload image within cover image. The pixel adjustment of the cover image is done optimally using Fourier Transform, so that visual c...
The Development of A Project Based Learning (PJBL) Models To Build An Attitude of Obedience To The traffic Rules Of two Wheeled Vehicles For Junior High School Students
This study aims to produce a product in the form of a Project Based Learning model to build a compliant attitude to traffic regulations. The study subjects were taken as many as 42 students consisting of 9 limited test s...
A Hybrid Evolutionary Optimization Model for Solving Job Shop Scheduling Problem using GA and SA
Abstract: The heuristic optimization techniques were commonly used in solving several optimization problems. The present work aims to develop a hybrid algorithm to solve the scheduling optimization problem of JSSP. There...
Selecting the correct Data Mining Method: Classification & InDaMiTe-R
One of the most difficult tasks in the whole KDD process is to choose the right data mining technique, as the commercial software tools provide more and more possibilities together and the decision requir...
Web Usability Recommendation Model: An Approach to Enhance Web Usability
Abstract: The success of any business mainly e- business is mostly depends on its website. To attract and sustain web users is one of the biggest challenges for any e-business. Web Usability plays key role to retain web...