SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. III (Nov – Dec. 2015), PP 71-73
www.iosrjournals.org
DOI: 10.9790/0661-17637173 www.iosrjournals.org 71 | Page
Secure System Password (SSP) Application for NT Editor
Hacking Tool
T.Sethupathy, P.Veni, S. Selwin Joseph, C. Sathya
1,2,3
Final Year/Dept of CSE SNS College of Technology Coimbatore-35
4
Assistant Professor/CSE SNS College of Technology Coimbatore-35
Abstract: In windows, the password will be stored in SAM registry by default. This SAM registry hides the
windows password when the system is in ON state. The password in SAM registry will be cleared or changed by
using NT Editor Tool. So that data can be accessed by any user. Security for the windows will be done by the
proposed system as an application. If the user wants to install new OS then the data in the hard disk will be
encrypted for prevention of unauthorized access. The application will be start monitoring to avoid password re-
modification or clearing the password. Features in this application is, if the user hacks the application
password, SSP does not allow the users to access USB, Ethernet and CD/DVD drive. Application will stop the
access of the driver ports, until it is re-installed or the password is set right.
Keywords: Hacking, NT Editor Tool, SAM Register, Data encryption.
I. Introduction:
Hacking is the act of manipulating computers to get them to do exactly what you want [1]. A hacker is
the person who does the hacking. A hacker is generally defined as someone who is very good with computers
and programming [2]. However, in popular culture, a hacker is considered someone who attempts to break into
computer systems.
The Security Account Manager (SAM) is a database file[3] inOperating System that stores
users' passwords. It can be used to authenticate local and remote users. The Security Account Manager (SAM) is
a database[4] present on servers running Windows Server 2003 that stores user accounts and security
descriptors for users on the local computer.
Offline NT Password & Registry Editor[5] is a free Linux-based utility, which as the name suggests,
works offline. The code creates its own boot environment. Once you burn the ISO image to a CD-ROM, you'll
have a tool at your disposal for resetting Windows NT, 2000, XP and Vista account passwords. You won’t even
have to know any of the current account user names or passwords on the system to make it work.
The Data encryption is the act of changing electronic information into an unreadable state by using
algorithms or ciphers. The cryptosystem which is most used throughout the world for protecting information is
the Data Encryption [6] Standard (DES) which was announced by the National Bureau of Standard (NBS). The
DES must be stronger than the other cryptosystems in its security.
II. System Analysis:
3.1 Existing system:
In windows, the password will be stored in SAM registry by default which is placed in windows
program files. This SAM registry hides the password from other user and admin too. This secures the password
of windows but only after the operating system turns ON.
But the password in the SAM registry gets clear or can be changed by using NT Editor Tool. This will
be called as NT Editor hacking mechanism. This tool will be activated before an operating system turns ON.
Using this NT Editor tool the password can be easily modified or cleared. From this the other user can easily
enter into the system, access it and retrieve data. To avoid the NT Editor hacking, SSP application has been
proposed to secure the windows password.
3.2 Proposed System
Step 1: Security Check-Installation of New OS will encrypt the data found in the hard disk.
Step 2:SSP Application starts from installation process. In the installation process, the user has a circle provided
by the application to select (Fig 3.2.1) the position for drawing patterns. In this circle the user has to mark (Fig
3.2.2) the points around it to draw patterns. All the points in the circle may or may not be covered for creating
patterns. Same pattern has to be given twice (Fig 3.2.3) for confirmation and the verification will be done after
the system has been restarted. This security pattern decreases the probability to crack the password by the
hacker.
Secure System Password (SSP) Application for NT Editor Hacking Tool
DOI: 10.9790/0661-17637173 www.iosrjournals.org 72 | Page
3.3 Working Process:
3.3.1 Security Check starts when the user tries to install New OS. This will encrypt the data
found in the hard disk.
3.3.2 SSP application should be placed before the operating system is being started by the
BIOS.
3.3.3 SSP application contains the lock patterns as well as some additional functions for
security issues.
3.3.4 In this application, if the password for this lock is modified or cleared then the
applicationwill cancel the access permission for USB and CD or DVD drive.So that the
user cannot mount the tool to clear the password which is stored in SAM registry.
3.3.5 Two tier security is provided for data protection and various hacking technologies.
3.4 Work Flow Diagram:
After installation, for each and every time while power on the system or laptop the process goes on like
this flow.
Secure System Password (SSP) Application for NT Editor Hacking Tool
DOI: 10.9790/0661-17637173 www.iosrjournals.org 73 | Page
3.4.1Process Diagram:
References:
[1]. http://wiki.cas.mcmaster.ca/index.php/Operating_Systems_Security
[2]. http://searchsecurity.techtarget.com/definition/hacker
[3]. https://en.wikipedia.org/wiki/Security_Account_Manager#cite_note-1
[4]. https://technet.microsoft.com/en-us/library/cc756748(v=ws.10).aspx
[5]. http://www.techrepublic.com/blog/windows-and-office/reset-lost-windows-passwords-with-offline-registry-editor/
[6]. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=563518

Weitere ähnliche Inhalte

Was ist angesagt?

Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7Aris Lesmana
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 
Object Oriented Secure Modeling using SELinux Trusted Operating System
Object Oriented Secure Modeling using SELinux Trusted Operating SystemObject Oriented Secure Modeling using SELinux Trusted Operating System
Object Oriented Secure Modeling using SELinux Trusted Operating SystemEswar Publications
 
Windows Vista and Trust Worthy Computing
Windows Vista and Trust Worthy ComputingWindows Vista and Trust Worthy Computing
Windows Vista and Trust Worthy Computingsamavedam_vijay
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating SystemMeghaj Mallick
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMfaraz hussain
 
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...Toshiharu Harada, Ph.D
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating systemBhagyashree Barde
 
Security and protection
Security and protectionSecurity and protection
Security and protectionNital Shingala
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYRohitK71
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating systemabdullah roomi
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityseAppin Ara
 

Was ist angesagt? (20)

Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Object Oriented Secure Modeling using SELinux Trusted Operating System
Object Oriented Secure Modeling using SELinux Trusted Operating SystemObject Oriented Secure Modeling using SELinux Trusted Operating System
Object Oriented Secure Modeling using SELinux Trusted Operating System
 
Windows Vista and Trust Worthy Computing
Windows Vista and Trust Worthy ComputingWindows Vista and Trust Worthy Computing
Windows Vista and Trust Worthy Computing
 
9.system analysis
9.system analysis9.system analysis
9.system analysis
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Operating system security
Operating system securityOperating system security
Operating system security
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
 
Certificate_2
Certificate_2Certificate_2
Certificate_2
 
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating system
 
PPT_Compiled
PPT_CompiledPPT_Compiled
PPT_Compiled
 
Security and protection
Security and protectionSecurity and protection
Security and protection
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
 

Andere mochten auch

4 reglas de oro negociar
4 reglas de oro negociar4 reglas de oro negociar
4 reglas de oro negociarsupervegallevis
 
How to update_the_firmware_of_tronfy_tvb_x2_local_update
How to update_the_firmware_of_tronfy_tvb_x2_local_updateHow to update_the_firmware_of_tronfy_tvb_x2_local_update
How to update_the_firmware_of_tronfy_tvb_x2_local_updateWilliamfire
 
A Deeper Study Into Cell Parts, Processes and Substances
A Deeper Study Into Cell Parts, Processes and SubstancesA Deeper Study Into Cell Parts, Processes and Substances
A Deeper Study Into Cell Parts, Processes and SubstancesJoel Lim
 
Neil Bron Jalac- CV1 (2)
Neil Bron Jalac- CV1 (2)Neil Bron Jalac- CV1 (2)
Neil Bron Jalac- CV1 (2)Neil Jalac
 
Diferencia entre delitos informaticos y delitos computacionales
Diferencia entre delitos informaticos y delitos computacionalesDiferencia entre delitos informaticos y delitos computacionales
Diferencia entre delitos informaticos y delitos computacionalesDieGo Chang Kee Ramos
 
WolfPack Raumluftqualität Messung | TVOC PID Monitor
WolfPack Raumluftqualität Messung | TVOC PID MonitorWolfPack Raumluftqualität Messung | TVOC PID Monitor
WolfPack Raumluftqualität Messung | TVOC PID MonitorICOdata Shop
 
Neil Bron Jalac- CV1 (2)
Neil Bron Jalac- CV1 (2)Neil Bron Jalac- CV1 (2)
Neil Bron Jalac- CV1 (2)Neil Jalac
 
5-1 Modificaciones sustanciales contrato
5-1 Modificaciones sustanciales contrato5-1 Modificaciones sustanciales contrato
5-1 Modificaciones sustanciales contratosupervegallevis
 
1-7 Fuentes del derecho laboral
1-7 Fuentes del derecho laboral1-7 Fuentes del derecho laboral
1-7 Fuentes del derecho laboralsupervegallevis
 
Thesis section: Role of Oxidative Stress in the pathogenesis of neurodegenera...
Thesis section: Role of Oxidative Stress in the pathogenesis of neurodegenera...Thesis section: Role of Oxidative Stress in the pathogenesis of neurodegenera...
Thesis section: Role of Oxidative Stress in the pathogenesis of neurodegenera...Professor Yasser Metwally
 

Andere mochten auch (20)

4 reglas de oro negociar
4 reglas de oro negociar4 reglas de oro negociar
4 reglas de oro negociar
 
How to update_the_firmware_of_tronfy_tvb_x2_local_update
How to update_the_firmware_of_tronfy_tvb_x2_local_updateHow to update_the_firmware_of_tronfy_tvb_x2_local_update
How to update_the_firmware_of_tronfy_tvb_x2_local_update
 
A Deeper Study Into Cell Parts, Processes and Substances
A Deeper Study Into Cell Parts, Processes and SubstancesA Deeper Study Into Cell Parts, Processes and Substances
A Deeper Study Into Cell Parts, Processes and Substances
 
Neil Bron Jalac- CV1 (2)
Neil Bron Jalac- CV1 (2)Neil Bron Jalac- CV1 (2)
Neil Bron Jalac- CV1 (2)
 
Diferencia entre delitos informaticos y delitos computacionales
Diferencia entre delitos informaticos y delitos computacionalesDiferencia entre delitos informaticos y delitos computacionales
Diferencia entre delitos informaticos y delitos computacionales
 
WolfPack Raumluftqualität Messung | TVOC PID Monitor
WolfPack Raumluftqualität Messung | TVOC PID MonitorWolfPack Raumluftqualität Messung | TVOC PID Monitor
WolfPack Raumluftqualität Messung | TVOC PID Monitor
 
Neil Bron Jalac- CV1 (2)
Neil Bron Jalac- CV1 (2)Neil Bron Jalac- CV1 (2)
Neil Bron Jalac- CV1 (2)
 
Hardware veronica
Hardware veronicaHardware veronica
Hardware veronica
 
Orientación profesional
Orientación profesionalOrientación profesional
Orientación profesional
 
Plan de empresa rcerviñoforjan
Plan de empresa rcerviñoforjanPlan de empresa rcerviñoforjan
Plan de empresa rcerviñoforjan
 
10-4 Anexo I - rd 39-97
10-4 Anexo I - rd 39-9710-4 Anexo I - rd 39-97
10-4 Anexo I - rd 39-97
 
Presentación sobre plagio 1077473647
Presentación sobre plagio 1077473647Presentación sobre plagio 1077473647
Presentación sobre plagio 1077473647
 
5-1 Modificaciones sustanciales contrato
5-1 Modificaciones sustanciales contrato5-1 Modificaciones sustanciales contrato
5-1 Modificaciones sustanciales contrato
 
Beeldcom les5
Beeldcom les5Beeldcom les5
Beeldcom les5
 
Vacuum tube
Vacuum tubeVacuum tube
Vacuum tube
 
Aprendizaje
AprendizajeAprendizaje
Aprendizaje
 
1-7 Fuentes del derecho laboral
1-7 Fuentes del derecho laboral1-7 Fuentes del derecho laboral
1-7 Fuentes del derecho laboral
 
Adiponectin
AdiponectinAdiponectin
Adiponectin
 
Air polluction for environmental studies
Air polluction for environmental studiesAir polluction for environmental studies
Air polluction for environmental studies
 
Thesis section: Role of Oxidative Stress in the pathogenesis of neurodegenera...
Thesis section: Role of Oxidative Stress in the pathogenesis of neurodegenera...Thesis section: Role of Oxidative Stress in the pathogenesis of neurodegenera...
Thesis section: Role of Oxidative Stress in the pathogenesis of neurodegenera...
 

Ähnlich wie Secure System Password (SSP) Application for NT Editor Hacking Tool

Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Eswar Publications
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DESIRJET Journal
 
[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protection[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protectionHieu Le Dinh
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionCSCJournals
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
marlenis del carmen duarte gonzalez tegnologioa
marlenis del carmen duarte gonzalez tegnologioamarlenis del carmen duarte gonzalez tegnologioa
marlenis del carmen duarte gonzalez tegnologioamarlenisdrt
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Damir Delija
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application SecuritySunipa Bera
 

Ähnlich wie Secure System Password (SSP) Application for NT Editor Hacking Tool (20)

Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Paper2
Paper2Paper2
Paper2
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protection[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protection
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
Desktop and Server Security
Desktop and Server SecurityDesktop and Server Security
Desktop and Server Security
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
marlenis del carmen duarte gonzalez tegnologioa
marlenis del carmen duarte gonzalez tegnologioamarlenis del carmen duarte gonzalez tegnologioa
marlenis del carmen duarte gonzalez tegnologioa
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...
 
INTRODUCTION
INTRODUCTIONINTRODUCTION
INTRODUCTION
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
 

Mehr von iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

Mehr von iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Kürzlich hochgeladen

Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 

Kürzlich hochgeladen (20)

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 

Secure System Password (SSP) Application for NT Editor Hacking Tool

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. III (Nov – Dec. 2015), PP 71-73 www.iosrjournals.org DOI: 10.9790/0661-17637173 www.iosrjournals.org 71 | Page Secure System Password (SSP) Application for NT Editor Hacking Tool T.Sethupathy, P.Veni, S. Selwin Joseph, C. Sathya 1,2,3 Final Year/Dept of CSE SNS College of Technology Coimbatore-35 4 Assistant Professor/CSE SNS College of Technology Coimbatore-35 Abstract: In windows, the password will be stored in SAM registry by default. This SAM registry hides the windows password when the system is in ON state. The password in SAM registry will be cleared or changed by using NT Editor Tool. So that data can be accessed by any user. Security for the windows will be done by the proposed system as an application. If the user wants to install new OS then the data in the hard disk will be encrypted for prevention of unauthorized access. The application will be start monitoring to avoid password re- modification or clearing the password. Features in this application is, if the user hacks the application password, SSP does not allow the users to access USB, Ethernet and CD/DVD drive. Application will stop the access of the driver ports, until it is re-installed or the password is set right. Keywords: Hacking, NT Editor Tool, SAM Register, Data encryption. I. Introduction: Hacking is the act of manipulating computers to get them to do exactly what you want [1]. A hacker is the person who does the hacking. A hacker is generally defined as someone who is very good with computers and programming [2]. However, in popular culture, a hacker is considered someone who attempts to break into computer systems. The Security Account Manager (SAM) is a database file[3] inOperating System that stores users' passwords. It can be used to authenticate local and remote users. The Security Account Manager (SAM) is a database[4] present on servers running Windows Server 2003 that stores user accounts and security descriptors for users on the local computer. Offline NT Password & Registry Editor[5] is a free Linux-based utility, which as the name suggests, works offline. The code creates its own boot environment. Once you burn the ISO image to a CD-ROM, you'll have a tool at your disposal for resetting Windows NT, 2000, XP and Vista account passwords. You won’t even have to know any of the current account user names or passwords on the system to make it work. The Data encryption is the act of changing electronic information into an unreadable state by using algorithms or ciphers. The cryptosystem which is most used throughout the world for protecting information is the Data Encryption [6] Standard (DES) which was announced by the National Bureau of Standard (NBS). The DES must be stronger than the other cryptosystems in its security. II. System Analysis: 3.1 Existing system: In windows, the password will be stored in SAM registry by default which is placed in windows program files. This SAM registry hides the password from other user and admin too. This secures the password of windows but only after the operating system turns ON. But the password in the SAM registry gets clear or can be changed by using NT Editor Tool. This will be called as NT Editor hacking mechanism. This tool will be activated before an operating system turns ON. Using this NT Editor tool the password can be easily modified or cleared. From this the other user can easily enter into the system, access it and retrieve data. To avoid the NT Editor hacking, SSP application has been proposed to secure the windows password. 3.2 Proposed System Step 1: Security Check-Installation of New OS will encrypt the data found in the hard disk. Step 2:SSP Application starts from installation process. In the installation process, the user has a circle provided by the application to select (Fig 3.2.1) the position for drawing patterns. In this circle the user has to mark (Fig 3.2.2) the points around it to draw patterns. All the points in the circle may or may not be covered for creating patterns. Same pattern has to be given twice (Fig 3.2.3) for confirmation and the verification will be done after the system has been restarted. This security pattern decreases the probability to crack the password by the hacker.
  • 2. Secure System Password (SSP) Application for NT Editor Hacking Tool DOI: 10.9790/0661-17637173 www.iosrjournals.org 72 | Page 3.3 Working Process: 3.3.1 Security Check starts when the user tries to install New OS. This will encrypt the data found in the hard disk. 3.3.2 SSP application should be placed before the operating system is being started by the BIOS. 3.3.3 SSP application contains the lock patterns as well as some additional functions for security issues. 3.3.4 In this application, if the password for this lock is modified or cleared then the applicationwill cancel the access permission for USB and CD or DVD drive.So that the user cannot mount the tool to clear the password which is stored in SAM registry. 3.3.5 Two tier security is provided for data protection and various hacking technologies. 3.4 Work Flow Diagram: After installation, for each and every time while power on the system or laptop the process goes on like this flow.
  • 3. Secure System Password (SSP) Application for NT Editor Hacking Tool DOI: 10.9790/0661-17637173 www.iosrjournals.org 73 | Page 3.4.1Process Diagram: References: [1]. http://wiki.cas.mcmaster.ca/index.php/Operating_Systems_Security [2]. http://searchsecurity.techtarget.com/definition/hacker [3]. https://en.wikipedia.org/wiki/Security_Account_Manager#cite_note-1 [4]. https://technet.microsoft.com/en-us/library/cc756748(v=ws.10).aspx [5]. http://www.techrepublic.com/blog/windows-and-office/reset-lost-windows-passwords-with-offline-registry-editor/ [6]. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=563518