Identify Shared Network Files Once an attacker has connected to the wireless network he may have access to files stored on any computer in the network that are configured to be shared among other users.

Project 5-2: Identify Shared Network Files Once an attacker has connected to the wireless network he may have access to files stored on any computer in the network that are configured to be shared among other users. Although file sharing is a useful network feature it can also allow an attacker to steal files that contain personal contact information, Social Security numbers, credit card numbers, and other sensitive information. Often file sharing on a folder is enabled but later forgotten. In this project you discover any shared items on your computer that are open. 1. Use your Web browser Internet Explorer to go to technet.microsoft.com/ en-us/sysinternals/bb897442.aspx. It is not unusual for Web sites to change the location of where files are stored. If the URL above no longer functions then open a search engine like Google and search for ‘‘Sysinternals ShareEnum’’. 2. Read the information under Introduction. 3. Click Run ShareEnum now from Live.Sysinternals.com. 4. When the File Download – Security Warning dialog box appears click Run. 5. When the Internet Explorer – Security Warning dialog box appears click Run. If necessary, agree to the license for using this software. 6. When the ShareEnum – www.sysinternals.com dialog box appears click Refresh to start the scan. If the message Information may be incomplete because you are not a domain administrator for one or more of the selected domain appears click OK. 7. The output of the scan will appear. Scroll across the output to read about the items that can be shared on this computer. Note under the column Everyone what the permissions are (Everyone means that all network users—including attackers—can Read the information or even Read/ Write to change it). Did you know that these items were set to be shared? Could the sharing of any of these items be turned off that are no longer being used?

8. Click Export to create a copy of this report. 9. Enter a file name and location to save this report. 10. Close all windows. Closing shared files is done through the operating system and may vary depending upon the version you are using. To find the latest information, open a search engine like Google and search for disable shared folders XXX, where XXX is the operating system and version you are using.

find the cost of your paper

If you were to select a person at random, what is the probability that they would have an IQ score of 130 or more, assuming the scores are distributed Normally

If you look at the scores on most IQ tests, they have a mean of 100 and a standard deviation of 15. For class discussion: (a) Why do you think….

Dice are small cubes, held in the hand and then dropped or thrown on a flat surface, as part of a game.

Dice are small cubes, held in the hand and then dropped or thrown on a flat surface, as part of a game. Each surface of a die has a number….

A web manager for a retail merchant tests two different presentations of a product to determine whether there is a difference in the length of time that people stay on that product page.

A web manager for a retail merchant tests two different presentations of a product to determine whether there is a difference in the length of time that people stay on….