Ask Computer Engineering Expert

Hands-On Project 5-3: Using the Cipher Command

Objective: Use the Encrypting File System to encrypt directories and files.

Description: In this project, you use the cipher command to investigate the functions of the Encrypting File System (EFS) in Windows 7 or Windows Server 2008. EFS requires that users have an EFS digital certificate for encrypting and decrypting files and directories. Users who do not have an EFS certificate have one created automatically the first time they encrypt a file. Users can choose from certificates to allow other users to access encrypted files.

1. Log on either to the Windows Server 2008 or Windows 7 computer as the Teamx administrator.

2. Open a command prompt, type cd \ and press Enter.

3. Create a directory called Private by typing mkdir Private and pressing Enter. Type cd Private and press Enter to change to the Private directory.

4. Create a file called SecretFile.txt by typing copy con SecretFile.txt and pressing Enter. Note that you have not returned to the command prompt; you are still in the file-creating mode.

5. Type This is a secret file. Press Enter, press Ctrl+Z, and then press Enter to end the file. Type dir and press Enter to verify that the file exists. Type type SecretFile.txt to verify the contents of the file.

6. Type cd .. and press Enter to return to the parent directory (C:\). Type cipher and press Enter to display the encryption status for the contents of C:\. Notice that no files or directories are encrypted, as indicated by the "U" (for "unencrypted") that precedes each listing.

7. Type cipher /? and press Enter to see the cipher command help file.

8. Type cipher /E Private and press Enter to encrypt the Private directory. Type cipher and press Enter to verify that the Private directory has been encrypted.

9. Type type \Private\SecretFile.txt to verify that you can still access the file.

10. Create a new file in the Private directory named SecretFile2.txt. Type copy con C:\Private\SecretFile2.txt and press Enter. Type This is also a secret file. Press Enter, press Ctrl+Z, and then press Enter to end the file. Verify that the SecretFile2.txt file exists and that its content is "This is also a secret file."

11. Type cd Private and press Enter. Type cipher and press Enter to see the encryption status of the two files.

12. On the Windows Server 2008 computer, create a domain user named Shifty Smith with a logon name of ssmith and a password of Pa$word. Log off either computer, and then log on as Shifty Smith. 13. Open a command prompt, and change to the C:\Private directory. Enter the type command in an attempt to display the contents of SecretFile.txt and SecretFile2.txt. You should be denied access to SecretFile2.txt.

14. Log out and then log on as the Teamx administrator. Open a command prompt, and change to the C:\Private directory.

15. Type cipher /C and press Enter to see details about the encrypted file, including which users can decrypt the file.

16. Click Start, click Computer, double-click Local Disk (C:), and double-click Private. (Note that Private is shown in green to indicate that it is encrypted.) Right-click SecretFile2.txt, click Properties, click Advanced, click Details, and click Add. Note that Shifty Smith does not have an EFS digital certificate to select, which means that you cannot give Shifty the ability to see the encrypted file.

17. Log off and then log on as Shifty Smith. Right-click the desktop, click New, click Text Document, and name the document Shifty. Right-click the document, click Properties, click Advanced, check the Encrypt contents to secure data box, and click OK. Click OK again. In the Encryption Warning window, click the Encrypt the file only option button, and click OK. Log out.

18. Log on as the Teamx administrator. Repeat Step 16; this time you should see Shifty's EFS certificate. Select it and then click OK four times. Log out.

19. Log on as Shifty Smith, and repeat Step 13. This time you should have access to SecretFile2.txt. Type cipher /C and press Enter. Note that Shifty now is listed as having the ability to decrypt SecretFile2.txt.

20. Close all windows and log out of both systems.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92223273

Have any Question?


Related Questions in Computer Engineering

Does bmw have a guided missile corporate culture and

Does BMW have a guided missile corporate culture, and incubator corporate culture, a family corporate culture, or an Eiffel tower corporate culture?

Rebecca borrows 10000 at 18 compounded annually she pays

Rebecca borrows $10,000 at 18% compounded annually. She pays off the loan over a 5-year period with annual payments, starting at year 1. Each successive payment is $700 greater than the previous payment. (a) How much was ...

Jeff decides to start saving some money from this upcoming

Jeff decides to start saving some money from this upcoming month onwards. He decides to save only $500 at first, but each month he will increase the amount invested by $100. He will do it for 60 months (including the fir ...

Suppose you make 30 annual investments in a fund that pays

Suppose you make 30 annual investments in a fund that pays 6% compounded annually. If your first deposit is $7,500 and each successive deposit is 6% greater than the preceding deposit, how much will be in the fund immedi ...

Question -under what circumstances is it ethical if ever to

Question :- Under what circumstances is it ethical, if ever, to use consumer information in marketing research? Explain why you consider it ethical or unethical.

What are the differences between four types of economics

What are the differences between four types of economics evaluations and their differences with other two (budget impact analysis (BIA) and cost of illness (COI) studies)?

What type of economic system does norway have explain some

What type of economic system does Norway have? Explain some of the benefits of this system to the country and some of the drawbacks,

Among the who imf and wto which of these governmental

Among the WHO, IMF, and WTO, which of these governmental institutions do you feel has most profoundly shaped healthcare outcomes in low-income countries and why? Please support your reasons with examples and research/doc ...

A real estate developer will build two different types of

A real estate developer will build two different types of apartments in a residential area: one- bedroom apartments and two-bedroom apartments. In addition, the developer will build either a swimming pool or a tennis cou ...

Question what some of the reasons that evolutionary models

Question : What some of the reasons that evolutionary models are considered by many to be the best approach to software development. The response must be typed, single spaced, must be in times new roman font (size 12) an ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As