Date of Graduation

12-2013

Document Type

Thesis

Degree Name

Bachelor of Science

Degree Level

Undergraduate

Department

Computer Science and Computer Engineering

Advisor/Mentor

Panda, Brajendra N

Committee Member/Reader

Thompson, Craig W.

Committee Member/Third Reader

Thompson, Dale R.

Abstract

For various reasons, circumstances might arise in which an investigator, enlisting the help of a system administrator, needs access to an instance of MySQL that is password protected by an individual system user. If this password is unknown and the user is uncooperative or unavailable, alternative means must be utilized to gain access to the data stored within the program. Two main approaches will be explored, each with its pros and cons. In one case, the password can be bypassed entirely, granting the investigator unfettered access to the program data. The second method allows a narrower look at only some of the data. Either method will give the investigator, at least to some extent, the opportunity to overcome the problem of a missing or uncooperative system user.

Share

COinS