NS LAB
NS LAB
Norton 360 with LifeLock keeps improving on its history as a top antivirus
option with its PC maintenance features, making it the best for Windows
computers.
Pros
PC protections including firewall and backup
Excellent malware protection
Password manager
LifeLock identity theft protection
Cons
Ransomware detection could be improved
Slows the computer during full scans
One of the more expensive offerings
Norton introduced its first antivirus software in 1991 under the Symantec
umbrella.
McAfee Antivirus Plus is our top choice for multiple devices because its
subscriptions offer protection for every device in the home for a reasonable
cost.
Pros
Offers protection for all devices, including Android and iOS
Good malware detection
Offers a number of deals for the product
Good firewall
Cons
No options for protecting one single device
McAfee Antivirus Plus is the one antivirus platform that recognizes the growing
number of devices used in a single household, which could include four or more
different operating systems.
Pros
Affordable pricing
Easy-to-use dashboard
Protects online financial transactions
Cons
Resource intensive
Most versions only work on Windows
Pros
Removes malware
Blocks ransomware
Real-time detection
Cons
Free version has a lot less protection and features
Pros
Excellent phishing detection
Fast virus scanning
Labels malicious links during online searches
Cons
Webroot is not as well known as other antivirus companies
EXPERIMENT-2 Installation and study of various
parameters of firewall.
Setting Up a Firewall:
From the Start menu, click Control Panel, then click System and
Security
Under Windows Firewall, select either Check firewall status to
determine whether the firewall is turned on or off, or Allow a program
through Windows Firewall to allow a blocked program through the
firewall
2.Select Program features
Click Turn Windows Firewall on or off from the left side menu
Configure the settings for your home/work (private) or public network
Click OK to save your changes
Turn on Windows Firewall for each network location you use - Home or
work (private) or Public
#include<bits/stdc++.h>
// decrypt
printf("%c",inpString[i]);
encryptDecrypt(sampleString);
printf("\n");
encryptDecrypt(sampleString);
return 0;
The basic idea behind XOR – encryption is, if you don’t know the
XOR-encryption key before decrypting the encrypted data, it is
impossible to decrypt the data. For example, if you XOR two
unknown variables you cannot tell what the output of those
variables is. Consider the operation A XOR B, and this returns
true. Now if the value of one of the variable is known we can tell
the value of another variable. If A is True then B should be False
or if A is False then B should be true according to the properties
of the boolean XOR operation. Without knowing one of the value
we can not decrypt the data and this idea is used in XOR –
encryption.
EXPERIMENT-4 Study of VPN.
3.Burp Suit
Burp Suite is a popular platform that is widely used for
performing security testing of web applications. It has various
tools that work in collaboration to support the entire testing
process, from initial mapping and analysis of an application's
attack surface, through to finding and exploiting security
vulnerabilities.
4.Angry IP Scanner
Angry IP scanner is a lightweight, cross-platform IP address and
port scanner. It can scan IP addresses in any range. It can be freely
copied and used anywhere. In order to increase the scanning
speed, it uses multithreaded approach, wherein a separate
scanning thread is created for each scanned IP address.
6.Ettercap
Ettercap stands for Ethernet Capture. It is a network security tool
for Man-in-the-Middle attacks. It features sniffing of live
connections, content filtering on the fly and many other
interesting tricks. Ettercap has inbuilt features for network and
host analysis. It supports active and passive dissection of many
protocols.
You can run Ettercap on all the popular operating systems such
as Windows, Linux, and Mac OS X.
7.EtherPeek
EtherPeek is a wonderful tool that simplifies network analysis in
a multiprotocol heterogeneous network environment. EtherPeek
is a small tool (less than 2 MB) that can be easily installed in a
matter of few minutes.
8.SuperScan
SuperScan is a powerful tool for network administrators to scan
TCP ports and resolve hostnames. It has a user friendly interface
that you can use to −
Scan any port range from a built-in list or any given range.
Modify the port list and port descriptions using the built in editor.
10.WebInspect
WebInspect is a web application security assessment tool that
helps identify known and unknown vulnerabilities within the
Web application layer.
11.LC4
LC4 was formerly known as L0phtCrack. It is a password
auditing and recovery application. It is used to test password
strength and sometimes to recover lost Microsoft Windows
passwords, by using dictionary, brute-force, and hybrid attacks.
13.Network Stumbler
Network stumbler is a WiFi scanner and monitoring tool for
Windows. It allows network professionals to detect WLANs. It is
widely used by networking enthusiasts and hackers because it
helps you find non-broadcasting wireless networks.
14.ToneLoc
ToneLoc stands for Tone Locator. It was a popular war dialling
computer program written for MS-DOS in the early 90’s. War
dialling is a technique of using a modem to automatically scan a
list of telephone numbers, usually dialling every number in a local
area code.
SSL
A protocol that provides privacy and integrity for
communications. This protocol is used by
Web servers to provide security for connections between Web
servers and Web browsers,LDAP to provide security for
connections between LDAP clients and LDAP servers,Host-on-
Demand V2 to provide security for connections between the
client and the host system.
Client Authentication
Client authentication is an option in SSL that requires a server to
authenticate a client's digital certificate before allowing the client
to log on or access certain resources. The server requests and
authenticates the client's digital certificate during the SSL
handshake. At that time the server can also determine whether it
trusts the CA that issued the digital certificate to the client.
Secure Electronic Mail
Many electronic mail systems, using standards such as Privacy
Enhanced Mail (PEM) or Secure/Multipurpose Internet Mail
Extensions (S/MIME) for secure electronic mail, use digital
certificates for digital signatures and for the exchange of keys to
encrypt and decrypt messages.
Virtual Private Networks (VPNs)
Virtual private networks, also called secure tunnels, can be set up
between firewalls to enable protected connections between secure
networks over insecure communication links. All traffic destined
to these networks is encrypted between the firewalls.
The protocols used in tunneling follow the IP Security (IPsec)
standard. For the key exchange between partner firewalls, the
Internet key exchange (IKE) standard, previously known as
ISAKMP/Oakley, has been defined.
The standards also allow for a secure, encrypted connection
between a remote client (for example, an employee working from
home) and a secure host or network.