Take a Virtual, Interactive Tour 

Student Work, Cyber Security, Software Engineering

  |  
4 Min Read

Toasty Sec for Powershell

After experiencing the lengthy task of adding incoming, first-year students to a database by hand, Adam Morris took his experience working in the Cyber Warfare Range to improve administrative work.

 

Knowing there was a better way to complete this work, Adam commissioned his friend Kelvin Ashton to create a program script tool kit as their Student Innovation Project (SIP). Thus, Toasty Sec, named from a flying toaster screensaver that coincided with late night hunger, was created as a tool for security/system administrators.

 

Features like adding and deleting users, hashing files and port scanners were created through PowerShell. Improvements via Toasty Sec includes the ability to access the user’s hardware information.

 

A hash is a unique identifier found on every file. If the hash has changed, the file has been modified. When it comes to cyber security, a user wants to know why a file has been modified. This is where Toasty Sec comes in. This tool kit gives the user the ability to scan the entire disk in a few minutes and hash everything found within the file.

 

UAT-blog-toastyPort scanners are another important part of cyber security. Ports connect to everything on a computer. Your device may experience issues if an unwanted port is open. To keep your device secure, Toasty Sec catches and identifies which ports are open. Toasty Sec even detects SQL injections, the most common type of web-based attack.

 

Both students are graduating with a BS in Network Security and Technology Forensics, and Adam is also studying Network Engineering. Kelvin states, “It’s one project that we based around all of our degrees.”

 

Before their SIP, neither UAT student knew how to use PowerShell. After taking a scripting class to bring their understanding of basic programming structure up to par, they learned that the true challenge came with learning the different programming languages. Kelvin figured out how to transform one language to another through its methodologies by using object-oriented programming. This was the game changer for their SIP.

 

Learn more about UAT’s Cyber Security degrees.

 

Comment

The Sixth Day of Techmas: UAT's 6 Top Blogs of 2025

On the 6th day of Techmas, we’re celebrating University of Advancing Technology's (UAT) six top blogs of 2025! From Artificial Intelligence (AI) art reaching the Moon to award-winning hackathon wins, ...
Picture of Katy Toerner Katy Toerner 4 Min Read

The Fourth Day of Techmas - 4 Cybersecurity tips from UAT's Cyber Faculty

On the fourth day of Techmas, University of Advancing Technology's (UAT) Cyber Security Faculty are here to help you stay safe online this holiday season! From phishing scams disguised as festive ...
Picture of Katy Toerner Katy Toerner 4 Min Read

Staying Secure: Best Practices for National Computer Security Day

Happy National Computer Security Day! To celebrate this, we are going to go over 4 tips and why they are important to keep your computer safe. We when we look at risk, one of the biggest indicators ...
Picture of Sarah Bunce Sarah Bunce 4 Min Read