Use encrypting file system to encrypt directories and files

Assignment Help Basic Computer Science
Reference no: EM131413474

Hands-On Project 5-3: Using the Cipher Command

Objective: Use the Encrypting File System to encrypt directories and files.

Description: In this project, you use the cipher command to investigate the functions of the Encrypting File System (EFS) in Windows 7 or Windows Server 2008. EFS requires that users have an EFS digital certificate for encrypting and decrypting files and directories. Users who do not have an EFS certificate have one created automatically the first time they encrypt a file. Users can choose from certificates to allow other users to access encrypted files.

1. Log on either to the Windows Server 2008 or Windows 7 computer as the Teamx administrator.

2. Open a command prompt, type cd \ and press Enter.

3. Create a directory called Private by typing mkdir Private and pressing Enter. Type cd Private and press Enter to change to the Private directory.

4. Create a file called SecretFile.txt by typing copy con SecretFile.txt and pressing Enter. Note that you have not returned to the command prompt; you are still in the file-creating mode.

5. Type This is a secret file. Press Enter, press Ctrl+Z, and then press Enter to end the file. Type dir and press Enter to verify that the file exists. Type type SecretFile.txt to verify the contents of the file.

6. Type cd .. and press Enter to return to the parent directory (C:\). Type cipher and press Enter to display the encryption status for the contents of C:\. Notice that no files or directories are encrypted, as indicated by the "U" (for "unencrypted") that precedes each listing.

7. Type cipher /? and press Enter to see the cipher command help file.

8. Type cipher /E Private and press Enter to encrypt the Private directory. Type cipher and press Enter to verify that the Private directory has been encrypted.

9. Type type \Private\SecretFile.txt to verify that you can still access the file.

10. Create a new file in the Private directory named SecretFile2.txt. Type copy con C:\Private\SecretFile2.txt and press Enter. Type This is also a secret file. Press Enter, press Ctrl+Z, and then press Enter to end the file. Verify that the SecretFile2.txt file exists and that its content is "This is also a secret file."

11. Type cd Private and press Enter. Type cipher and press Enter to see the encryption status of the two files.

12. On the Windows Server 2008 computer, create a domain user named Shifty Smith with a logon name of ssmith and a password of Pa$word. Log off either computer, and then log on as Shifty Smith. 13. Open a command prompt, and change to the C:\Private directory. Enter the type command in an attempt to display the contents of SecretFile.txt and SecretFile2.txt. You should be denied access to SecretFile2.txt.

14. Log out and then log on as the Teamx administrator. Open a command prompt, and change to the C:\Private directory.

15. Type cipher /C and press Enter to see details about the encrypted file, including which users can decrypt the file.

16. Click Start, click Computer, double-click Local Disk (C:), and double-click Private. (Note that Private is shown in green to indicate that it is encrypted.) Right-click SecretFile2.txt, click Properties, click Advanced, click Details, and click Add. Note that Shifty Smith does not have an EFS digital certificate to select, which means that you cannot give Shifty the ability to see the encrypted file.

17. Log off and then log on as Shifty Smith. Right-click the desktop, click New, click Text Document, and name the document Shifty. Right-click the document, click Properties, click Advanced, check the Encrypt contents to secure data box, and click OK. Click OK again. In the Encryption Warning window, click the Encrypt the file only option button, and click OK. Log out.

18. Log on as the Teamx administrator. Repeat Step 16; this time you should see Shifty's EFS certificate. Select it and then click OK four times. Log out.

19. Log on as Shifty Smith, and repeat Step 13. This time you should have access to SecretFile2.txt. Type cipher /C and press Enter. Note that Shifty now is listed as having the ability to decrypt SecretFile2.txt.

20. Close all windows and log out of both systems.

Reference no: EM131413474

Questions Cloud

How the dnssec system can help to prevent these attacks : You have been asked to prepare a two-page report that explains how DNS cache poisoning attacks work and how the DNSSEC system can help to prevent these attacks.
Write quality essay that incorporates critical thinking : PHI-105 Types of Communication Table. In order to write a quality persuasive essay that incorporates critical thinking, you must include a mixture of informative, explanatory, and persuasive statements because to persuade someone you must: Inform ..
How will you use the concepts in the class : Describe the concepts as if you were explaining them to a friend - How will you use the concepts in the class or in your personal or professional life?
Deficiencies in the four functions of management : Reviewing the information concerning GM's handing of a safety issue and recall included in the "GM Ignition Switch Recall." Write an essay (1,250 - 1,500 words) that addresses the following: 1. What deficiencies in the four functions of management..
Use encrypting file system to encrypt directories and files : Create a file called SecretFile.txt by typing copy con SecretFile.txt and pressing Enter. Note that you have not returned to the command prompt; you are still in the file-creating mode.
What are the ways that restrictions shaped american society : What are some of the ways that restrictions and beliefs based on race, ethnicity, gender, and national origin shaped American society in the latter half of the 1800s?
What processes would be the focus of your improvement effort : You want to improve the care delivery in the high-risk environments in your hospital, such as the operating room, intensive care unit, emergency department and chemotherapy unit. What processes would be the focus of your improvement efforts?
Discuss the biggest influence on a person gender : Based on the readings in the text and the supplemental article for this module, what factors do you believe have the biggest influence on a person's gender identity or sexual orientation
Analyze way aggregated data can show a different perspective : In a paper, present and analyze at least two ways aggregated data can show a different perspective on care of patients.Include at least two research sources in your paper and cite them in a References page at the end in APA format. As always, follo..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is its torque constant in ounce-inches per ampere

What is its torque constant in ounce-inches per ampere

  Give time line which identify specific steps of installation

Give a time line, which identifies specific steps (including training) and related resources required to implement the recommended system.

  Compare time complexity of convolution with kernel

Compare the time complexity of convolution with a n x n kernel when using: direct convolution with the 2-D mask, and separable kernel.

  Find the maximum pcm bit rate that can be supported

An analog signal is to be converted into a PCM signal that is a binary polar NRZ line code. The signal is transmitted over a channel that is absolutely bandlimited to 4 kHz. Assume that the PCM quantizer has 16 steps and that the overall equivalen..

  Create a function that reads the contents of a file

C PROGRAMMING:how would I create a function that reads the contents of a file and inputs the contents into the main program...for example:

  Write a program that allows the user to enter two values

Write a program that allows the user to enter two values. Display the results of adding the two values, subtracting them from each other, multiplying them, and dividing them. Save the file as MathExercise.cpp.

  Why would people maintaining the system prefer one to other

What are the economic advantages of each? Why would people maintaining the system prefer one to the other? How popular is each network today? How do they compare to proprietary commercial networks such as Myrinet and Quadrics?

  What are some applications that would use biconnected graph

A graph is said to be biconnected if two paths that do not share edges or vertices exist between every pair of vertices.

  Assignment on mobile app work breakdown structure

Assignment On Mobile App (Work Breakdown Structure), This assignment contains two (2) deliverables: a summary document to be delivered in a word processor document format and a Work Breakdown Structure (WBS) to be delivered in a project file.

  Select the primary key from the candidate keys

How do you select the primary key from the candidate keys? How do foreign keys relate to candidate keys? Provide examples from either your workplace or class assignments.

  How the personality of the manager affects the match

How does the choice of project manager affect the start-up of the project? Include a discussion of the point in the process at which the project manager is assigned and how the personality of the manager affects the match between the manager and t..

  Purposes of the digital millennium copyright act?

purposes of the Digital Millennium Copyright Act?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd