CS476 – Arrange files – 4366

I just want to arrange the first three files and put them in just one file, in Project Report file.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

College of Computing and Informatics
Project Report
Deadline: Tuesday 05/12/2023 @ 23:59
[Total Mark for this Project is 14] (5 Marks for this Report)
Student Details:
CRN: ###
Name: ###
ID: ###
Name: ###
ID: ###
Name: ###
ID: ###
Name: ###
ID: ###
Instructions:






This project report must be submitted on Blackboard (WORD format only) via the allocated
folder.
Email submission will not be accepted.
You are advised to make your work clear and well-presented; marks may be reduced for
poor presentation.
You MUST show all your work, and text must not be converted into an image.
Late submission will result in ZERO marks being awarded.
The work should be your own, copying from students or other resources will result in ZERO
Marking Criteria
I. Project Description
/0.5
II. Technology
/0.5
III. Schedule & Activities
/0.5
IV. Team
/0.5
V. Content (Accuracy of presented information is vital)
/2.5
VI. Citing Resources
/0.5
Total
/5
[Project Title]
I. Project Description
[Give a brief description about your project (one paragraph) spelling out the project major components.]
II. Tools
[Explain the tools you have chosen for your project. Give detailed explanation about the tool.]
III. Schedule & Activities
[You specify each project deliverable, allocate time and activities to attain that particular deliverable.]
IV. Team
[list team members, assign roles, responsibilities, and tasks to team members.]
V. Content
[Step by step execution must be listed in this section. You should also concisely touch upon the methods and
procedures you intend to adapt to attain the objectives]
[Include screenshot of each tools]
[Describe how did you use the tools]
VI. Citing Resources
[ Cite the resources where you will be getting the contents from]
College of Computing and Informatics
Project
Guidelines
Academic Year 2022-23
Semester 1
Pg. 01
Learning
Outcome(s):
Recognize the
Guidelines

fundamental
principles of
parallel and
distributed
The students must demonstrate that they have successfully acquired the requisite
skills and expertise for this assessment activity by exploring different tools.

Visit the website https://dnschecker.org/all-tools.php

It will give you a list of DNS checker online tools.

Explore any three categories from the list and execute min of three tools in each
processing,
parallel system
taxonomy, and
parallel system
performance
metrics.
category.
Example:
Pg. 02

Total Marks = 14
Tools
Project Report
Presentation
5 marks
5 marks
4 marks

Group Size = Min 2 People and Max 4 People

Group Size may vary according to the strength of the CRN but must not exceed 4
members.

One of the group member (group leader/coordinator) should submit all three files
such as Project Report, and presentation slides on blackboard. Marks will be given
based on your submission and quality of the contents.
Marking Critetria:

Three tool categories * Three tools execution in each category = 9 tools

For three categories 0.5 marks

9*0.5 = 4.5 marks

Total of 5 marks
Project Report

Each Project Report will be evaluated according to the marking criteria mentioned in
the Project Report Template File.
Presentation

Students (Group) need to present their projects (either F2F or Virtual) on week 13
and week14. (Considered as last two weeks before the final review)

Presentation schedule with date and allocated timing must be shared with the
students via Blackboard before the end of Week 12.

Each student can be judged both individually and as part of his/her group.
Pg. 03
Cyber Security Tools
Cyber Security tools are meant to guarantee the safety of your websites and their
compliance with global security regulations. It includes resources to perform security audits
on websites and find any weaknesses. To prevent data loss, hacking, and assaults, it is now
imperative that you have your websites periodically checked for security flaws.
Pg. 04
Password Encryption Utility
Utilizing standard encryption algorithms, the password encryption utility
assists developers and web administrators in encrypting passwords. This
utility encrypts passwords to facilitate their storage in databases.

the password is a key to the entrance. Therefore, password encryption is
necessary to develop a secure and safest website.

Encryption converts the data or information into a code, making it
inaccessible to unauthorized access.

The process makes your password unreadable or unusable to hackers.
That simple step provides more security by protecting your password
just by sitting on the server.
How does password encryption work?
The four main types of encryption exist
1. Symmetric key
The encryption and decryption keys are identical in that algorithm
2. Public key

The public key is accessible to everyone

public key is used to encrypt the data
3. Hashed
The cryptographic function in question is designed to accept input of varying
lengths and produce a fixed-size alphanumeric string as output.
Salted
Pg. 05
The methodology entails the addition of arbitrary numerical or alphabetical
characters either before or succeeding the password prior to the hashing
process.
Rules in password encryption

The password encryption technique should use a unidirectional
procedure for encrypting the password.

The process of matching the input and the stored passwords involves
comparing their digests or encryption forms.
How do encrypt the passwords?

Open the Password Encryption Tool.

Enter the password and click on the “Encrypt my Password” button.

The tool instantly processes your request and provides you with the results.
Does password-encryption alone is enough?
NO>> Many website administrators lack awareness of the fact that using
password encryption is a crucial measure in ensuring the security of a website.
The act of encrypting a password does not guarantee the overall security of a
website. If a website is inadequately coded, it increases the vulnerability for
potential hackers to exploit and perhaps get unauthorized access, leading to
potential data breaches.
Pg. 06
Example:
DES stands for Data Encryption
Standard and its symmetric-key
algorithm
It’s a hash algorithm. It takes
the input of any size and
converts it to fixed size 128 bits
(16 bytes) output
It’s a hash algorithm. It takes
the input of any size and
converts it to fixed size 160
bits output.
It’s a binary to ASCII encoding
scheme that uses the 64 characters
set present in most characters
It’s binary to text
encoding,
Pg. 07
Random Password Generator
The password generator tool is designed to create highly safe and impervious passwords of
varying lengths, ensuring resistance against hacking attempts. No passwords are stored by
our system, and all passwords are restricted to the user’s browser. No passwords are sent
from the browser to any external server. There is no need for concern about security since
these passwords may be used in any of your internet accounts or projects.

A password suggestion tool helps you generate a solid and secure
random password that both humans and computers are hard to crack.

• The primary goal of creating a strong password is to maintain our
privacy and shield sensitive or personal information from hackers.
Why do we need a strong random password?
Even if a device or account is already protected by a password, changing the old
password becomes necessary for the following reasons:

You forget your password.

• You unintentionally gave someone else access to your password.
• There was a data breach on the website, app, or online shop where you have an account.
What are the common mistakes that we make while creating a password?
• For our most important accounts, we mostly utilize the same security questions and password.
• When constructing the password, our goal is to connect it to the things that happen in our
everyday lives. such as our birthdate and contact details.
• The dictionary-attractive terms are what we mostly employ to generate passwords.
secure your account, perform the following checklist.
1. Prevent your web browser from saving your password.
Pg. 08
2. Avoid using terms from your dictionary or common vocabulary in your
password.
3. Don’t use the same security questions or password again.
4. Avoid using the name family members, or date of birth.
How to create Secure Password with Strong Password Generator Tool?
Random Password Generator The online tool is a freely accessible resource that
aids in the creation of a robust and reliable password, hence ensuring the
protection of valuable data and mitigating the risk of data breaches.
To use that tool, perform the following steps.

Open the Random Password Suggestion Tool.

The tool provides you several options to select to make your password more secure.

Select the Password Length and the number of passwords

The tool automatically generates the password as per your chosen criteria.

Please copy that password, and if you want to re-generate
Importance and Benefits of using our Password Generator

Random Password Generator is a free online tool that generates short, medium, and
long-length passwords. Users can use it anywhere in their accounts or projects without
worrying about leakage.
• You may indicate how many passwords you want to generate if you choose to create
more than one.

To make your password more safe, you may also make it using characters that aren’t
seen anywhere else.
Pg. 09

Your browser is the only place where any passwords created using this tool are kept
secure. In no manner is your password communicated to the server or to any other
location outside of your computer.
Example :
Pg. 10
Password Checker – A Password Strength
Meter
Over time, simple passwords have become more susceptible. The majority of
users use weak passwords, which makes their accounts vulnerable to hacking.
This easy-to-use password strength checker indicates whether or not your
password is strong enough to lessen the likelihood that it will be cracked or
hacked.
How to create secure passwords?

For this purpose, every user must ensure that their password is strong
enough not to be hacked or cracked or is challenging to do so.

Therefore, in password generation, one must adopt the following
practices.

The password length should be sixteen characters or more.

Use uppercase, lowercase, and symbol to it more effective.

Do not include your personal information, like your ID card number, birth date, etc., in
your password.

Do not ever use the word “password” or the same number or letter repeatedly.
How secure is my password?
People ponder whether the password they created is sufficiently safe. There are
two kinds of people: the first ones make the mistake of using common terms in
their passwords. The second is that it uses characters, numbers, letters, and
symbols to generate strong passwords.
. But how one knows if it owns a 100% protected password?
Pg. 11
To check how secure your password is, perform the following steps.

Open the Password Strength Meter.
• Type your created password into the designated field and press the “Check” button.

The tool is specifically built for Cyber Security concerned persons, and anyone can use it
with ease. Any password you enter this tool is safe and is not in any way sent anywhere
via the Internet. This tool is essential for generating a strong password on your own and
check either their strength is good or bad.
Types of Password Cracking
There are two main types.
Brute-forcing:
• Consider a scenario where a password consists of two characters. The bruteforce approach employs a comprehensive exploration of all conceivable
combinations of letters. To illustrate, first, the program will verify the presence of
the combination “aa,” followed by “ab,” and then “ac,” until all possible
combinations have been exhausted.
Dictionary attacks:
• The method, as its name suggests, focuses on matching dictionary terms to
passwords using a list of words.
Benefits of using our Password tester

• Your browser is the only place where all passwords verified by this tool are stored
secure. In no manner is your password communicated to the server or to any other
location outside of your computer.
• The tool also verifies that the password you provided has the correct number of
characters, capital and lowercase letters, spaces, and symbols.
Pg. 12
Example:
incorrect
Example:
correct
College of Computing and Informatics
Project Report
Deadline: Tuesday 05/12/2023 @ 23:59
[Total Mark for this Project is 14] (5 Marks for this Report)
Student Details:
CRN: 11033
Name: Manal Alghamdi
ID: s200043063
Name: Maha Sorani
ID: s200168673
Name: Lama Alsalem
ID: s200095464
Name: Leena Alomar
ID: s200236290
Instructions:






This project report must be submitted on Blackboard (WORD format only) via the allocated
folder.
Email submission will not be accepted.
You are advised to make your work clear and well-presented; marks may be reduced for
poor presentation.
You MUST show all your work, and text must not be converted into an image.
Late submission will result in ZERO marks being awarded.
The work should be your own, copying from students or other resources will result in ZERO
Marking Criteria
I. Project Description
/0.5
II. Technology
/0.5
III. Schedule & Activities
/0.5
IV. Team
/0.5
V. Content (Accuracy of presented information is vital)
/2.5
VI. Citing Resources
/0.5
Total
/5
[DNS Propagation Tests]
I. Project Description
[Give a brief description about your project (one paragraph) spelling out the project major components.]
DNS checker provide all kind of tools that can help website owners verify the extent of the spread of these
websites globally in a correct and up-to-date manner and avoid obstacles and threats that may limit their propagation
and performance.
II. Tools
[Explain the tools you have chosen for your project. Give detailed explanation about the tool.]
IP tools:
IP Address (Internet Protocol Address) is a numeric address labeling each device connected to the
network. IP addresses are essential for computers and the Internet to work properly. DNS-checker provide
many useful tools to solve any IP related problems whether online What is my IP address, IP locator, IP
WHOIS lookup or IPv6 WHOIS lookup, discover the IP location of any IPs and track the location of those IP
addresses using integrated geo IP services. The tools will also verify any entered IP address against anti-spam
databases to determine if it is blacklisted, indicating whether it is banned from various services or not.
Schedule & Activities
[You specify each project deliverable, allocate time and activities to attain that particular deliverable.]
III. Team
[list team members, assign roles, responsibilities, and tasks to team members.]
IV. Content
[Step by step execution must be listed in this section. You should also concisely touch upon the methods and
procedures you intend to adapt to attain the objectives]
[Include screenshot of each tools]
[Describe how did you use the tools]
1-ping IP address:
A ping test evaluates the connectivity of a device or server within a network, determines the device’s
online or offline status, and measures the latency between two computers. The test involves sending
ICMP(Internet Control Message Protocol) packets known as “echo requests”(ping) to an IP address or
domain and receiving ICMP replies known as “echo responses” (pong). The detailed results obtained include
data on the number of packets transmitted and the number of packets lost during the ping operation.
The results will be beneficial in many different ways. In the absence of data loss, the connection
provided is secure and the IP is accessible. On the other hand, if data is lost, the equipped device or host may
experience unreliable connections. This could be due to a request being “timed out”, or the IP being offline or
the host’s settings preventing it from responding to ping requests. Furthermore, if the domain or IP address is
an invalid one, the response may be unpredictable, resulting in an error message of “Could not resolve a
hostname”.
1- We inter the
domain we want
to check upon.
Useful
results that
indicarte
the
accesiblity
of tested
website.
2-IP address lookup:
It is a useful tool that gets real-time information on all IP addresses including country, city, ISP and
region.
It works by tracking tools which communicate directly with various geodatabases to determine the
location of an IP address and other associated information.
Using this tool can swiftly identify an IP address’s location based on coordinates using four geo IP
databases. Utilizing cutting-edge technology, the tool retrieves comprehensive details associated with the IP
address, including its approximate location on a map.
Upon accessing the tool, IP address is automatically retrieved and checked against the IP2Location
database, with the results displayed on the screen. If an information is needed on another IP address, simply
input it into the search bar. Additionally, the ability to search for IP address locations just by using a domain
name.
In just a few seconds, the IP locator provides key information such as state, country, city, ISP name,
latitude, and longitude. It also indicates proxy, Tor, and spam status, allowing to check whether the IP owner
is using software to conceal their IP address or if it is flagged for suspicious activities.
The required information is easily accessible with a simple scroll through the database results. More
detailed information from other databases, including IPInfo.io, IPGeoLocation.io, and DP IP, can be viewed
by clicking on “more.”
IP checker is accessible for free to anyone wishing to trace IP address locations and obtain crucial
details. It is compatible with all devices connected to the internet.
The IP address lookup tool operates by directly interacting with various geo databases to ascertain the
geographical location and other relevant information associated with an IP address. The process involves
automatic IP address retrieval upon accessing the tool, entry of another IP address or domain name for lookup,
querying of IP2Location, IPInfo.io, IPGeoLocation.io, and DP IP databases, geolocation calculation using
extracted coordinates, and the display of retrieved details on the screen, including country, state, city, ISP
name, latitude, longitude, and information about proxy, Tor, or spam usage.
Using the same website
for IP address lookup
1
2
3
4
3-IP blacklist check:
blacklist check tool employs real-time data and advanced algorithms to identify if IPs, domains, and
emails are blacklisted, aiding in the detection of suspicious activities and facilitating proactive measures to
safeguard your online presence.
For IP addresses, the tool helps identify issues with online services by checking if the server’s IP
address is blacklisted across various databases. Resolving any security concerns is crucial for seamless
connectivity and uninterrupted online operations.
To ensure smooth email deliverability, the tool allows users to verify email addresses against multiple
blacklists, aiding in the quick identification and resolution of potential blacklisting problems to maintain a
positive email sender reputation.
For website integrity, the tool enables users to verify domains against various blacklists, ensuring they
haven’t been flagged for suspicious or malicious activities. Regular monitoring of a domain’s blacklist status
helps prevent security breaches and maintains a trusted online presence.
The blacklist checker operates in real-time and is user-friendly, allowing individuals without technical
expertise to utilize it effectively. Users enter the IP address, domain name, or email address they want to
check, initiate the scanning process, and receive results indicating whether the resource is blacklisted (“Yes”)
or not (“No”). In case of blacklisting, users can click on “details” to understand the reasons behind the listing.
This shows that this
website is not been
blacklisted
V. Citing Resources
[ Cite the resources where you will be getting the contents from]
College of Computing and Informatics
Project
Guidelines
Academic Year 2022-23
Semester 1
Pg. 01
Learning
Outcome(s):
Recognize the
Guidelines

fundamental
principles of
parallel and
distributed
The students must demonstrate that they have successfully acquired the requisite
skills and expertise for this assessment activity by exploring different tools.

Visit the website https://dnschecker.org/all-tools.php

It will give you a list of DNS checker online tools.

Explore any three categories from the list and execute min of three tools in each
processing,
parallel system
taxonomy, and
parallel system
performance
metrics.
category.
Webmaster tool
Webmaster tool
It helps the owners and developers of the website to analyze the
performance of their parges in varuses ways.
some of the tools that proved are
1- link analyzer
Pg. 02
it analyze the entered domain\URL and desaide wither the link should be follows or not,
also it check frome the anchor text which is the text that link the internal and external
pages in other worlds it keep track of external and internal links
What does the link analyzer tool do?
1- measure how many links your webpage contains
2- keep track on follow nofollow links
3- avoid search engine penalties be checking the heal of the wib search engein
4-It displays all internal, external, or both links by separating them into categories.
How to use the link analyzer tool to analyze links?
To analyze the links open the link analyzer tool. Enter any URL in the above input field and
press enters to send a request to our system. Our tool will instantly visit the live URL in realtime and gather the required data from its HTML source code, and after analyzing the data, it
will show output in a few seconds.
What will be the output of the website link analyzer tool?
The link analyzer tool will show the following data:
Total Anchor Links of your web page.
Internal Links of your web page.
External Links of your web page.
Why should I add a nofollow attribute to my outbound links?
The outbound links from your pages can damage your page’s reputation if you are linking too
many outbound links without the nofollow attribute in anchor tags. According to search
engines, the lousy neighborhood of your website will also damage your ranking and page
authority. However, keeping the external links with nofollow will save your entire domain or
web page.
Should I add a nofollow attribute to the Internal links of my web page?
not recommended because this will not benefit you in any way. but, if you want a few pages
of your website not to include in the search engines index, you can add a noindex meta tag in
your specific pages, instructing the search engines not to include those pages in their search
2- user agent
Pg. 03
This tool shows what your web browser sends in the “User-Agent” header for your HTT
What is my user agent ?
the user agent Information identifies your browser and operating system and its versions.
Note: Without a browser, we cannot surf the internet. Browsers are the internet need.
They are equipped with security policies, server agreements, and connectivity codes to run
ideally. Generally, when the browser wants to connect with any website’s server, it sends the
user-agent info to connect
What is the user agent?
it’s a string of text unique for each software or browser on the internet and holds the technical
information about your device and operating system. User-agent is present in the HTTP
headers when the browser wants to connect with the web server
Each bit of the user agent contains some detailed information. However, there is no standard
way to write the user-agent. It varies from browser to browser. Some browsers stuff the useragent header with a lot of information.
Once a browser and web server connection is established, content negotiation begins. That
lets the website serve its various versions depending upon the user-agent string. Once the
user-agent passes its ID card to the web server, it provides the files, media, and scripts suitable
for the particular user.
Purpous of using user agent:
Pg. 04
1-User-agent helps in making different web pages available for various web browsers. That is
helpful because it serves simple pages for the old browsers. Sometimes, you might have seen
this message; “Open this with Internet Explorer.”
2-User-agent helps in displaying the different contents to different operating systems. For
example, the mobile version of the website is slimmed and organized vertically for user
easiness.
3- User-agent helps gather the statistics on how the operating system and browsers are used.
That data helps in gathering the market-share statistics of different browsers.
Can I change or fake my user agent?
Yes, you can change your user agent, and that process is called user-agent spoofing.
Web developers usually daily change the user agent to check the progress of their website’s
behavior in different browsers and devices.
For switching the user agent, you can rely on a browser extension or use the developer console
to manually change the user agent that your browser will send with its HTTP requests.
3- page rank checker
What is PR?
PageRank is a search algorithm developed by Google and was later used by webmasters to
judge the quality of a website regarding backlinking and search engine optimization (SEO)
high Page rank value indicates a high-value and authority website.
Suppose a website with a high Page rank value links to another website with an anchor tag.
The chances for another website to be crawled and indexed increase
This means that links between pages and linking between websites matter a lot.
Pg. 05
The Google PageRank service has been closed, but the page ranking checker by DNS Checker
tells you a given website’s last detected PageRank
PR checker or PageRank checker is a measurement tool for checking a website’s
competitiveness analyzed by Google
Should a website contain links to other pages?
external links are not preferred because you cannot guarantee the savete of these links but
internal links are good to add because you can check from their savety and it is win win
setwiation so you have to be shoure that any links you add to your wibsite are all save and not
invected because that may lead to penalize you from sexisting in search engines
Pg. 06
Example:

Total Marks = 14
Tools
Project Report
Presentation
5 marks
5 marks
4 marks

Group Size = Min 2 People and Max 4 People

Group Size may vary according to the strength of the CRN but must not exceed 4
members.

One of the group member (group leader/coordinator) should submit all three files
such as Project Report, and presentation slides on blackboard. Marks will be given
based on your submission and quality of the contents.
Pg. 07
Marking Critetria:

Three tool categories * Three tools execution in each category = 9 tools

For three categories 0.5 marks

9*0.5 = 4.5 marks

Total of 5 marks
Project Report

Each Project Report will be evaluated according to the marking criteria mentioned in
the Project Report Template File.
Presentation

Students (Group) need to present their projects (either F2F or Virtual) on week 13
and week14. (Considered as last two weeks before the final review)

Presentation schedule with date and allocated timing must be shared with the
students via Blackboard before the end of Week 12.

Each student can be judged both individually and as part of his/her group.

Still stressed with your coursework?
Get quality coursework help from an expert!