Sign In
Not register? Register Now!
You are here: HomeOther (Not Listed)Technology
Pages:
1 page/≈275 words
Sources:
Level:
MLA
Subject:
Technology
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 5.4
Topic:

Network Security Class (Other (Not Listed) Sample)

Instructions:

This was a homework on Network Security class. 1)I was to open notepad and type a few sentences. Save the file. Run it through hash calc which i had downloaded and installed in my computer.Then find the hash value. 2)Now without opening the file, rename it. Run it through hashcalc.Find out if the hash value were the same? What it was. 3)Now had to open the file and put a space immidiately after the last character in my sentence.Then find the hash value? Homework 2: Very Basic encryption http://www.binaryhexconverter.com/ascii-text-to-binary-converter http://commons.wikimedia.org/wiki/File:ASCII-Table.svg I had to create a 12 character message and use the links above to convert my message to binary.The key was datasecurity. Had to send the cipher text i got after xor-ing the converted message with the key.

source..
Content:
Name
Tutor
Subject
Date
Hash values.
MD5: bd6bf325dccce989d34e04a73b4a55b9
MD4: 8f29064c895e7324934906b20bb1a259
SHA1: d180d758f2f3e0e072960d5290e367cdb8d176fa
SHA256: 2d84706ec0d5a327d45cea61d49a49994a3b0bf2f795da59ec1dcced09b90010
SHA384: 3329fe94b7e14a18515470e979f2c850e85bf41b01f6657652ac78d7e920ca1a4ac25d3d37899d7735d10b703da28629
SHA512: 4ccbf60be690f4aa98cdc4541df42a1ea8cf52547a9a7ba8d0ee1cd7b2fe90a647fd092996618beb11c84edb3253669c058c04f9dcdb7a6c5bfde66d7aea4c66
RIPEMD160: 4ef0f386675fccb0802b7fc573459ca11c154b8b
PENAMA: bed8b034a5caa1e884a7f80a70dab0850e98e67ed9d1e365ddeb8e999f50c9f9
TIGER: 22054e08870f9ef36d8e20495853e00ae8175ed555bae304
2)With renaming the file without opening a notepad file.
MD5: bd6bf325dccce989d34e04a73b4a55b9
MD4: 8f29064c895e7324934906b20bb1a259
SHA1: d180d758f2f3e0e072960d5290e367cdb8d176fa
SHA256: 2d84706ec0d5a327d45cea61d49a49994a3b0bf2f795da59ec1dcced09b900
SHA384: 3329fe94b7e14a18515470e979f2c850e85bf41b01f6657652ac78d7e920ca1a4ac25d3d37899d7735d10b703da28629
SHA512: 4ccbf60be690f4aa98cdc4541df42a1ea8cf52547a9a7ba8d0ee1cd7b2fe90a647fd092996618beb11c84edb3253669c058c04f9dcdb7a6c5bfde66d7aea4c66
RIPEMD160: 4ef0f386675fccb0802b7fc573459ca11c154b8b
PENAMA: 1e884a7f80a70dab0850e98e67ed9d1e365ddeb8e999f50c9f9
TIGER: 22054e08870f9ef36d8e20495853e00ae8175ed555bae304
3)With an open file having a space at the last sentence.
MD5: 964b5b6a82b5d291f3137dd8bb3c69cd
MD4: f79456f53b9fe9db60cef1af612e4666
SHA1: 919c5336ee8df65b067cac663ea2fa8e34463496
SHA256: 0ea881c196ed96351df47d01c825c905e5dcce42ee279aa9f9be030dc510a5e7
SHA384: b0de463511e54e5ab9dd4bad86306e6c9fe3359fb165cdd1e9d2c3c8a936cdb5838c51be7c15c4c4ce5050cf2790c1de
SHA512: c27627ece84ceb3b5f6f0632dae85616d66a3...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • The Virtual World- Final Fantasy XIV
    Description: The aim of this paper was to analyze any electronic-based virtual world or game found in X-box or Nintendo ds...
    6 pages/≈1650 words| No Sources | MLA | Technology | Other (Not Listed) |
  • Database Design
    Description: Create a Crows Foot ERD to include the following business rules for the Prod Co Company...
    1 page/≈275 words| 1 Source | MLA | Technology | Other (Not Listed) |
  • Mobile Applications for Insurance Companies Research
    Description: This covers third party bodily injury and property damage arising out of use of motor vehicles. It’s the cheapest and most widely used policy in Kenya....
    20 pages/≈5500 words| 10 Sources | MLA | Technology | Other (Not Listed) |
Need a Custom Essay Written?
First time 15% Discount!