Welcome Welcome friends to the 2021 DC IT Student Expo! As you scroll down this page you will find student names and brief descriptions of their projects. Each individual room is accessed by clicking the 'LEARN MORE' button below the description. Following our opening remarks the day is broken up into three 45 minute blocks following our opening remarks. Each block will showcase the capstone project achievements of students from our advanced IT programs including Cyber Security (ISCN), Computer Programmer Analyst (CPA), Artificial Intelligence (AI) and Computer Systems Technology (CSTY). Please feel encouraged to ask questions! Throughout the event we invite you to use the form linked below to provide feedback to these soon-to-be graduates about their presentation. DC students who include their DC Mail address in the form will be entered into a draw to win 1 of 2 $50 gift cards for Canada Computers! Project Feedback Form Agenda: 3:00 to 3:10PM - Land Acknowledgment & Opening Remarks 3:10 to 3:40PM - Keynote - 'From Legacy to Leading Edge' with James McIntosh 3:40 to 4:40PM - Hour 1 Expo Presentations 4:40 to 5:40PM - Hour 2 Expo Presentations 5:40 to 6:40PM - Hour 3 Expo Presentations 6:40 to 7:00PM - Closing Remarks Opening remarks & Keynote - 3:00 to 3:30PM Click the link below to join us for the kick-off of the 2021 Durham College IT Student Expo. main room - opening remarks & keynote Hour 1 - 3:40 to 4:40pm Project Feedback Form Cache Poisoning - DNS Spoofing Attacks (ISCN) Jithin Poovathinkal Jose, Abdullahi Ali Cache poisoning, a spoofing DNS attack that diverts all internet traffic to an imposter website. The aim is to return an incorrect answer to DNS requests, sending the user to a website with malicious intent. Learn More Tapstone (CPA) Ryan Howse A gatcha/tapper hybrid mobile game that aims to solve a problems with games in this genre. LEARN MORE AI Fire Detection System (AI) Dheeraj Reddy, Purnima Yadav, Ayush Parolia, Ramesh Krishna This project is focused on fire detection on live streaming using Artificial Intelligence Agents. Learn More Knowledge-Based Management System (CSTY) Khalel Maynard, Aaron Peacock, Sean Faloona A knowledge base management system operating as part of an Active Directory system. Active Directory runs off a Windows Server and is responsible for DNS, DHCP, User Authentication, and Group Policy. The knowledge base is a web application running on an Ubuntu server using Apache, PostgreSQL and PHP. Learn More Evil Twin Attacks (ISCN) Rawle Harris, Ravaine Mullings An evil twin attack is the WLAN equivalent of a phishing attack, and is a fraudulent Wi-Fi access point that appears legitimate but is designed to intercept data. Learn More Defending Against Honeypot Attacks (ISCN) Thanmai Kanaparthi, Nikita Shinde Demonstration on how honeypot traps are set, and how to detect and counteract those attempts at unauthorized use of information systems. Learn More Khan's COBOL Guide Hamza Khan A php based website giving a centralized overview of the COBOL language to help students starting to learn the language. Learn More Creators Hub (CPA) Darcy St. Jean A website dedicated to helping game developers and artists collaborate and share ideas, assets, and skills easily and more conveniently than traditional means. Learn More DC Software Hub (CPA) Mervat Mustafa, Oghenefejiro Abohweyere Serving students with a one-stop web portal providing all necessary software and related information for the student's program of study. Learn More Springfree HR System (CPA) Dylan Lopez An HR management system developed from the ground up that aims to transition from Excel based information management to database driven, allowing employees to update and view their personal HR related information. Learn More Health Trek (CPA) Adam Peltenburg, Evan Health An android application that creates routes for cyclists and joggers alike. Also records the statistics of the route such as distance and predicted duration to know if the route is right for you. Learn More Asset Management via Lansweeper Robert Kozak, Charles Simmonds, Richie Huang Asset management solution using Lansweeper software in a simulated, diversified business network. Learn More Data Access via Active Directory (CSTY) Daniel Grandinetti, Fox Steele, Mahir Abdellahi Microsoft SQL Database: Microsoft Database working in conjunction with MS Access to keep track of a real functioning library and its day to day maintenance. Adding/Removing and routine checkups are maintained through MS Access and fully controlled by the Library. Learn More Cross-Platform EMail Service (CSTY) John McKay, Matthew Weston MS Exchange Server employing Active Directory and Domain Controller with both windows and Linux workstations connected to active directory and exchange Learn More Cross-Platform DBMS + File Server Implementation (CSTY) Dave Elliot, Jaksh Patel, Nathan Tabak A network infrastructure deployment involving a start-up employing AD, DC, DHCP, DNS, FS, PS, and DFS technologies. The group will aim to also provide cluster management and replication for redundancy of server features. Backups with DFS replication will be featured as well as cloud backup employed through One Drive. A database will be featured with access from domain network. A fileshare will be featured that includes the backups in a authenticated folder, as this allows for easy access to backups should they be needed. Learn More FTP Deployment on Linux (CSTY) Joshua Weese, Lucas Calandra Deployment of an FTP server on Linux platform that includes SCP, SFTP, and UFW; all in a network infrastructure setup, will also include a 2016 microsoft server with active directory install with ous and roles Learn More Hour 2 - 4:40 to 5:40PM Project Feedback Form LLMNR/NBT-NS Poisoning & NBT-NS (ISCN) Venkateswara Rao Gaddamanugu, Kunal Sikri LLMNR/NBT-NS Poisoning (Link-Local Multicast Name Resolution (LLMNR) and Netbios Name Service (NBT-NS)) Learn More Picnic Panic (CPA) Scott Jenkins Featuring original art and spriting, Picnic Panic is a Unity2D Automation Puzzle game with the goal to bring the genre to a more casual audience. Learn More Speeder (AI) Michael Molnar, Faizan Ali, Utsav Vanodiya, and Hibba Imtiaz With the availability of route planning applications like Google Maps and Waze, this project offers a unique approach to the challenge of generating optimal paths via Machine Learning Algorithms. Learn More The EternalBlue Exploit (ISCN) Eric Mizzi, Talha Khan A presentation on the EternalBlue exploit. We will describe the attack as well as demonstrate how it is carried out. Learn More DHCP Starvation Attacks (ISCN) Kishan Patel, Shuaib Omar During a DHCP starvation attack, a hostile actor floods a DHCP server with bogus DISCOVER packets until the DHCP server exhausts its supply of IP addresses. Once that happens, attackers can deny network service to legitimate users, or even supply an alternate DHCP connection that leads to a Man-in-the-Middle (MITM) attack. Learn More Cross-Platform Mailing System (CSTY) Joseph Vasquez, Nikhil Sujanani, Jay Vincent Diwa Active Directory Infrastructure with Microsoft Exchange 2016 mailbox role for mail flow between Windows and Ubuntu Client. AD roles consists of DHCP, DNS, DFS, File and Print Server and Server Backups for redundancy. Learn More Secured Network Infrastructure (CSTY) Aveann Busuego, Ty Boyd, Elinam Amegah A small-to-medium network infrastructure complete with AD DS, DFS, RADIUS Authentication for security and a Remote Access Server functioning as the VPN gateway that uses certficate services for remote client access. Learn More QuickGig (CPA) K. Romero, M. Migliore, P. Rudolf, T. Segovia QuickGig is a WebApp that allows users needing work done to post details of the job and seek quotes. On the other end it facilitates those looking for work to search for jobs to make bids on opportunities. Learn More Smart Mirror (CPA) Levi Willms A Smart Mirror built with a Raspberry Pi 4, monitor, and a custom frame. Current funcitonality is as an Asset Tracking Module that finds the values of specific stocks and cryptocurrencies, combining their price and quantity for a total value and displayed through your mirror! Learn More Group Planner (CPA) Brejanth Rajendran A basic calendar app that will allow the user to add their friends/co workers and allow them to sync calendars with one another. Learn More Warhammer Warscrolls (CPA) Alan Carruthers An Android mobile app programmed in Java which allows you to view a list of Warscrolls from the Warhammer tabletop game, as well as their individual details. Learn More Database Application via Network Infrastructure (CSTY) Frank Jemmett, Eric Ligsay, Aditya Patel Business Network Infrastructure – Complete working network infrastructure with an Email Server and database. The database will have a front-end consisting of forms to add records and reports to view record information. Learn More Lansweeper (CSTY) Casper Wideman Remote asset management on a small school oriented network using Windows virtual machines and Lansweeper asset management software. Learn More Network Infrastructure + Performance Management (CSTY) Reilly Twomey, Adam Balkissoon AD Driven network for a small business. Features include DNS, DHCP, DFS with Replication, PS, with failover redundancy. Learn More EMail, Support Ticketing + File Server (CSTY) Mohammad Asmal, Luckman Mohanarajah, Chris Papanikolaou Network Infrastructure with mail system deployment using Exchange server, ticketing/asset a management systems, file server. Learn More Hour 3 - 5:40 to 6:40PM Project Feedback Form Combatting Man in the Middle Attacks (ISCN) Emmanuel Sebastian, Anuj Bhrambhatt In this we will discuss this type of attack along with the methods and tools used in MITM, as well as how to conduct the attack itself. Most importantly we explain the how to mitigate MITM attack. Learn More MundoLudos (CPA) Shaun McCrum, Simon Yarrow The MundoLudos software facilitates the management of scalable trading card game collections. Through the recording and synchronous distribution of diverse data it brings trading card game collections together, where the value is in your hand. Learn More Chatbot for Academic Insights (AI) Nikhil Patel, Parth Shah, Harsh Patel, Amulya Pedapudi With the use of AI Technologies create a better user experience for students and faculties improving the academic performance of the students and augmenting the analytical capabilities of the faculty members. Learn More Phishing Attacks Explained (ISCN) Chinmay Narendrakumar, Mehr un Nissa Rameez Phishing is the fraudulent attempt to obtain sensitive information or data. We will be demonstrating a phishing attack, describing the attack scenario, and the countermeasures needed to protect against it. Learn More Vulnerabilities in WiFi Security (ISCN) Kyle Fitzgerald, Maxime Villeneuve Connecting to WiFi often requires a password. With WEP passwords known to be easy to hack, we created WPA2. However, WPA2 passwords are not a secure as one might first think. Learn More Network Infrastructure Supporting Collaboration Software (CSTY) Winston Law, Sukhveer Brar, Umang Gohil A collaboration system on network infrastructure using Microsoft Teams Learn More Document Management System (CSTY) Scott Berry Document Management System using SharePoint on a full-domain network infrastructure. Learn More MMS Track Day Management (CPA) Lisa and Nathan Legawa Our project focuses on building a database management system for a local motosport marshalling club, focusing on facilitating the management of event details, such as worker management, selection and reporting. Learn More Construction Sight (CPA) Kyle St. Amant, Mike Sanocki Create and keep track of construction sites! Easily assign and monitor the status of your workers and building progress. Learn More Text-Novel Converstion to Visual-Novel (CPA) Jaime Barillas, Duc Le Convert short stories and novels into a Visual Novel format. Add your own art to complete the package, then playback the Visual Novel version of your story. All in one simple to use program! Learn More American Sign Language Training (CPA) Duncan McBryan The ASL App is a mobile application designed to help people who want to learn some American sign language. You can read through lessons, takes quizzes, or search through a variety of signs to find what you need. Learn More Network Infrastructure - Cross Platform Authentication (CSTY) Mike Vanderklaauw, Zenaida Travis, Niran Weerasinghe, Matt Stirling Integrating Windows and Linux Systems for an expanding corporation scenario.Our team has implemented a complete system, and will be showcasing the following: 1. Cross-authorization, integration and updated security of Windows and Linux accounts within the active directory. 2. File sharing, printing, and mail services for existing and new accounts. Learn More Streaming - Network Infrastructure (CSTY) Austin Bastarache, Kyle Williams, Tyler Levere, Jacob Bontius A database for a streaming service that stores information about movies. Information includes: Budget, Actors, etc. This will incorporate a GUI front end for the employees to input data and find specific movie information. For redundancy, this will be backed up to a secondary hard drive in-case of failure. Learn More Networked Database Management (CSTY) Matthew Van Luven, Kiefer D'Costa A network infrastructure deployment using a domain, file share server, window 10 pc holding a database, with front end access Learn More Cross-Platform Supported Network Infrastructure (CSTY) Dmitri Sfetkopoulos A free alternative to Microsoft Active Directory built around Fedora 33 and FreeIPA. Featuring SSO for all services and centralized administration Learn More Closing remarks before you leave Thank you so very much for attending the 2021 Durham College IT Student Expo, and we hope (despite some external chaos trying to derail us) that you enjoyed hanging out with our students and your peers, and found the projects interesting. If you haven't yet filled out a project feedback form, please consider taking a moment to fill just one out before you leave. Your responses will comprise some of the final feedback our students receive before graduating and moving on to their careers. Huge thanks to James McIntosh for sharing his experience with us and hanging out with some students! Have a great week and thank you again!