Identify Shared Network Files Once an attacker has connected to the wireless network he may have access to files stored on any computer in the network that are configured to be shared among other users.

Project 5-2: Identify Shared Network Files Once an attacker has connected to the wireless network he may have access to files stored on any computer in the network that are configured to be shared among other users. Although file sharing is a useful network feature it can also allow an attacker to steal files that contain personal contact information, Social Security numbers, credit card numbers, and other sensitive information. Often file sharing on a folder is enabled but later forgotten. In this project you discover any shared items on your computer that are open. 1. Use your Web browser Internet Explorer to go to technet.microsoft.com/ en-us/sysinternals/bb897442.aspx. It is not unusual for Web sites to change the location of where files are stored. If the URL above no longer functions then open a search engine like Google and search for ‘‘Sysinternals ShareEnum’’. 2. Read the information under Introduction. 3. Click Run ShareEnum now from Live.Sysinternals.com. 4. When the File Download – Security Warning dialog box appears click Run. 5. When the Internet Explorer – Security Warning dialog box appears click Run. If necessary, agree to the license for using this software. 6. When the ShareEnum – www.sysinternals.com dialog box appears click Refresh to start the scan. If the message Information may be incomplete because you are not a domain administrator for one or more of the selected domain appears click OK. 7. The output of the scan will appear. Scroll across the output to read about the items that can be shared on this computer. Note under the column Everyone what the permissions are (Everyone means that all network users—including attackers—can Read the information or even Read/ Write to change it). Did you know that these items were set to be shared? Could the sharing of any of these items be turned off that are no longer being used?

8. Click Export to create a copy of this report. 9. Enter a file name and location to save this report. 10. Close all windows. Closing shared files is done through the operating system and may vary depending upon the version you are using. To find the latest information, open a search engine like Google and search for disable shared folders XXX, where XXX is the operating system and version you are using.

find the cost of your paper

Relationship Between Human Creative Expression And Culture

PART ONE The resources in this learning block are examples of artifacts that have helped create new attitudes toward women and the LGBT community while at the same time being….

Managing interpersonal relationships

Managing interpersonal relationships: What are the Layers of Self Disclosure? Which layers do you think are appropriate to discuss on your “first date?” Students Examples Christian Perez Managing Interpersonal Relationships….

Comparative Essay

Assignment 3: Project Paper – Comparative Essay This “Assignment 3” writing assignment is a comparative essay focused on topics encountered in our HUM 111 class. The project will be based on research….