Preview

Nt1330 Unit 3 Assignment 1 Data Analysis

Good Essays
Open Document
Open Document
1023 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3 Assignment 1 Data Analysis
Open the excel file which is password protected and goto Macro's (I am using Office 2007 so the menu's maybe different View >> Macros). Click on "Record Macro >> OK" and then click on "Stop Recording" from the same menu. Now goto "View Macros", you will find a Macro with a default name E.g. Macro1 - Select the macro name and click on Edit. Now a Visual Basic Editor opens up. Re-place the default code and Paste the below code.

Sub Macro1()
'
' Breaks worksheet and workbook structure passwords. Jason S

' probably originator of base code algorithm modified for coverage

' of workbook structure / windows passwords and for multiple passwords

' Jason S http://jsbi.blogspot.com

' Reveals hashed passwords NOT original passwords

Const DBLSPACE As String = vbNewLine & vbNewLine
…show more content…
Const AUTHORS As String = DBLSPACE & vbNewLine & "Adapted from Bob McCormick base code by" & "Jason S http://jsbi.blogspot.com"

Const HEADER As String = "AllInternalPasswords User Message"

Const VERSION As String = DBLSPACE & "Version 1.0 8 Sep 2008"

Const REPBACK As String = DBLSPACE & "Please report failure to jasonblr@gmail.com "

Const ALLCLEAR As String = DBLSPACE & "The workbook should be cleared"

Const MSGNOPWORDS1 As String = "There were no passwords on " & AUTHORS & VERSION

Const MSGNOPWORDS2 As String = "There was no protection to " & "workbook structure or windows." & DBLSPACE

Const MSGTAKETIME As String = "After pressing OK button this " & "will take some time." & DBLSPACE & "Amount of time " & "depends on how many different passwords, the "

Const MSGPWORDFOUND1 As String = "You had a Worksheet " & "Structure or Windows Password set." & DBLSPACE & "The password found was: " & DBLSPACE & "$$" & DBLSPACE & "Note it down for potential future use in other workbooks by " & "the same person who set this password." & DBLSPACE & "Now to check and clear other passwords." & AUTHORS &

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 3 Summary

    • 734 Words
    • 3 Pages

    Although Zigbee implements a wide assortment of security measures, there are still a variety of vulnerabilities and attack methods that can be used. These attacks and how they can be carried out will be described in this Section.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The project contains two parts, photogrammetric survey, and GIS analysis. The photogrammetric survey part was done by Agisoft photoscan software. This kind of survey is desired in many fields, such as Archeology field. This is because of the tendency of collapsing in Archeology’s targets. On the other hand, ArcMap and ArcScene are responsible for the data analysis part. With GIS, the complexity of the 3D data can be simplified, the data can be interpreted, and new data can be generated. Plus, we can comfortably work on improving our model by digitizing, coloring, outlining, and updating data even after we finish the project.…

    • 909 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    This year you were able to average 95.05% on CSAT. The department goal is 96%. Based on your score, you partially met the department goal in CSAT. Your rework for the year was 6.48 %. Based on the department goal and the department average, you are exceeding expectations in rework. Your Net Promoter Score is 66.22 % for the year. This percentage is within the department range. This year you averaged 8.85 points per hour. the department goal for the year is 10 points per hour. Based on the department goal and the department average You landed right within the meeting expectations. your whole house in range averaged 95.78%. This percentage landed right within the department goal and the department range. Your whole house completed was 92.57 percent.…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Visual Promethee main window is displayed that uses a typical spreadsheet to manage the data of effectiveness multi-criteria problem (Figure 4.7). The main window contain all the data have related to the PROMETHEE method (preference function, statistics and evaluation, weights…), this information can be easily input and defined by the decision maker.in addition to that Visual PROMETEE can provide additional features like quantitative criteria as well as qualitative criteria. Besides Visual PROMETHEE software can also handle the definition of variable thresholds in the preference functions (q, p, s), can also…

    • 388 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Assignment

    • 629 Words
    • 3 Pages

    In a bus configuration, each computer in the network is responsible for carrying out its own communications without the help of a central unit. A common communications cable (the bus) connects all of the computers in the network. As data travels along the cable, each unit performs a query to determine if it is the intended recipient of the message. The bus network is less expensive than the star configuration and is thus widely in use for systems that connect only a few microcomputers and systems that do not emphasize the sharing of common resources.…

    • 629 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    Layer 5: The session layer...This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the applications at each end. It deals with session and connection coordination.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Data collection would be accomplished by the assigned individual who would screen the emails in the support distribution email box, then move all the misdirected emails to a separate email folder labeled “Misdirected” each day, then and there forwarding a copy to the correct department. The moving of the emails allows a total to be collected each day, so at the end of the week they would be totaled and recorded to measure the effectiveness of the new process. There was a study conducted using research from comparable organizations, using a similar process that concluded that we should have a benchmark of 1 misdirected email a week. Furthermore, we would need someone to monitor the total number of non-technical support request that come in to…

    • 736 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Create a Windows application that contains two textboxes and two buttons. One of thetextboxes and one of the buttons are initially invisible. The first textbox should be used to input a password. The textbox should be masked to some character of your choice so that the characters entered by the user are not seen on the screen. When the user clicks the first button, the second textbox and button should be displayed with a prompt asking the user to reenter his or her password. Now, when the user clicks the second button, have the application compare the values entered to make sure they are the same. Display an appropriate message indicating whether they are the…

    • 1713 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Comp230 Week 5

    • 1799 Words
    • 8 Pages

    strComputer = ". " Set objWMIService = GetObject _ ("winmgmts:\\" & strComputer & "\root\CIMV2") Set colOperatingSystems = objWMIService.…

    • 1799 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lifeline Cultural Identity from EDGCI-524 01 Human Growth & Development taught by Professor Eileen Quinn Knight,…

    • 118 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The three-assessment chosen is John Maxwell Leadership Levels Assessment (JMLL), Myers Briggs Type Indicator (MBTI), and DISC Assessment (dominance, influence, steadiness and compliance). JMLL Preslar focused on lifelong lessons clients will experience through: position, permission, production, people development, and pinnacle (2012. MBTI examined Rashid and Duys the perception and judgement toward different situation that could strengthen or weaken a person ability to live a fulfilling life or career (2015). DISC Newsome examined the influence personality traits have on decision concerning relationship, careers, and life (2000).…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Student Name

    • 624 Words
    • 4 Pages

    sqlStr = "SELECT Computer,Room_Num,Speed,Num_CPUs,OS_Type,HDD_Size FROM Computers where Num_CPUs = 1 OR Speed < 2.1 OR HDD_Size < 300 order by Room_Num"…

    • 624 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Macro Examples

    • 1120 Words
    • 5 Pages

    True/False Questions. Read each statement carefully, and neatly write the word TRUE on the line next to the statement if you believe the statement is true, or neatly write the word FALSE on the line next to the statement if you believe the statement is false.…

    • 1120 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Risks of Macros

    • 300 Words
    • 2 Pages

    A primary security risk in using macros is that macros can be programmed to act like viruses and delete files and cause a lot of damage to your system. Depending on the service pack installed you may get an alert every time you open a file that contains a macro. It would be a good security practice to never enable macros unless you are completely confident and aware of the source. Any unsigned macros are automatically disabled. Any macros that are unknown or downloaded, the Microsoft security system will think it has a virus.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    To Working with VB Forms and Connect the Oracle 10g to Visual Studio 6.0 for Database Connectivity…

    • 421 Words
    • 2 Pages
    Satisfactory Essays

Related Topics