Lab#5WriteUp

Lab#5WriteUp - The Random Pool code changes rapidly. 7. How...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Brandon Howard Cyber Self Defense 4/23/07 Lab #5 Write Up 1. Explain a hidden volume versus a standard volume. In a standard volume there is left over empty free space that is filled with random information to make it seem like the file is full. In a hidden volume the difference is that that free space is the hidden volume, it is hidden inside of the standard volume and appears to be just that random information unless you know the password 2. How many encryption algorithms are available? Eleven 3. Name the three hash algorithms provided. RIPEMD-160, SHA-1, and Whirlpool 4. What are the recommendations for a password? That it be longer than twenty characters and have special, non-alphabet characters included. 5. What file system types are available? Why is NTFS not available? Only FAT is available as a system type. NTFS is not available because it is used for hidden volumes and we were working with a standard volume. 6. What happens as you move your mouse across the screen?
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: The Random Pool code changes rapidly. 7. How many clusters are used to make up the enclosed file system? Two 8. How big is the file system? Nineteen Kb 9. In the same dialog box there are references to “cluster tip area? And “alternate data streams.” To what do these terms refer? Cluster tip area refers to the unused area at the end of the volume that is unused because files rarely fill all of the allowed clusters. Alternate Data Stream refers to Window’s extension of NTFS that allows compatibility with Apple’s HFS (Hierarchical File System). 10. After you erase the file, can you find it in the recycle bin? No. 11. After you erased the foo.txt from your desktop, reopened Truecrypt, remounted your foo.tc file, is it still there when you try to access it? Yes, the encrypted one is still there, we only erased the unencrypted copy....
View Full Document

This lab report was uploaded on 04/21/2008 for the course IT 101 taught by Professor Watt during the Spring '07 term at RIT.

Page1 / 2

Lab#5WriteUp - The Random Pool code changes rapidly. 7. How...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online