WINDOWS Operating System

Size: px
Start display at page:

Download "WINDOWS Operating System"

Transcription

1 WINDOWS Operating System OBJECTIVES! What is an OS?! Windows family! Major components " File system " Task manager " Manager " I/O services Networking Printing and other services " GUI! Maintenance and virus protection

2 Operating System! Manage the computational and I/O resources present in the computer! Implementation: " Single user, command line (CP/M, DOS ) " Time sharing (Multics, VMS, VM/CMS, Unix ) " Real Time (HP RTE, etc) " Others (distributed, )! Windows " Single user " Event-driven structure

3 Windows! Windows 3.1 " GUI built on top of DOS 3.1 " Ver 1-2 were useless compared to MacOS! Windows 95, 98, 98se, 98me " GUI is more seamlessly wrapped around DOS 6.2 " Serious competition for MacOS! Windows NT (3.51, 4.0, 2k) " NT = new technology " Preemptive multi-tasking " GUI with command line interface " True multi-user (but not time-shared) " Server versions; multi-cpu (SMP)! Windows XP " Fusion into a single kernel " Home, Prof, Server, Advanced Server, Datacenter (Enterprise)

4 Components: File System! Based largely on characteristics of disk storage Physical Structure Logical Structure Windows Disk with cyl tracks on magnetic surface. Head per surface. Partition Partition N 1 cyls N 2 cyls D: C: Active (boot) Partition N 3 cyls E: Position all heads at once and read from all heads in order. Defines CYLINDER. Cylinders may be divided into SECTORS. Basic quanta. Extended Partition Logical Partition Logical Partition N 4 F: etc

5 File System Structure! Hierarchical structure " Directories (folders) can contain files or other directories " Shortcuts are aliases or pointers to actual file or folder! Entire disk is allocated by directory and file! Performance is highly dependent on file system design

6 File Permissions! File system format varies between OS s! FAT = file allocation table (type of format) " File name limits (old 8.3 names) " File size and volume size limits! FAT16, FAT32 introduced improvements! NTFS introduced file ownership & permissions " Files are owned by a user or system " Owner can grant permissions " Groups can be given permissions " Encryption can be activated

7 File Extensions! Mac introduced files with forks " Resource: contains info about the file " Data: contains the file data " OS can tell from resource how to handle file (e.g., as containing a program to execute or data to read)! Windows does this with file extensions " myfile.txt text file " myfile.dat data file (user specific) " myfile.exe executable file " myfile.xls application specific data (Excel)! Windows associates icons with extensions depending on how they are registered.

8 Task Manager! Perhaps the most critical element of the OS " Determines what process is allowed to execute " Event-driven: responds to interupts (user, program, I/O, error, etc) " Should not allow one process to dominate " OS appears to operate process concurrently Right-click on Task Bar

9 Task Manager Functions! You can control how the OS handles processes " Suspend process " Stop (kill) process " Change priority (gets more or less CPU) " BE CAREFUL!

10 ! Examine computer performance Task Manager Functions

11 ! One of several related programs " Access this via Control Panel, or " Right click My Computer! Use Manager to check and reinstall drivers! Use Hardware Wizard to discover new hardware and install drivers " TRICK: use Manager to remove device and software " Then let Hardware Wizard discover and reinstall. Computer Manager

12 Other Management Services! See Control Panel " Administrative Tools " Select mgt tool! Other mgt tools in Control Panel are available

13 I/O Services! VERY trick part due to wide variety of hardware the computer may have to work with! Architecture: " Interupt driven (not common in PC s) " Memory mapped (common) " Direct Memory Access-DMA (high speed devices)! Hardware: " ISA: old and slow " PCI: current but showing age! Windows " Old: interupts must be set physically on each card " Plug-n-play: detects card and sets automatically (but requires special hardware designed for this purpose)

14 I/O Types! User: keyboard, mouse (PS-2 or USB)! Disks: " floppy: IDE or ATAPI " hard disk: IDE, ATA, ATA-100, SCSI, USB-2, Firewire, etc. " CDROM: IDE or ATAPI! Serial: telecom and many printers! Parallel: some printers! USB: high speed serial (USB-2 emerging)! Firewire: high speed serial

15 Networking! Has become the most important element of computing for many situations! Historical: " Serial or Parallel wiring between System A and System B (awkward, inflexible, limited distance) " Token Ring: all computers connected in a ring and a token which contains a message is passed from system to system; system can send when it receives a free token (harder to wire; has not survived) " Ethernet: CSMA-CD design (big party line); simple to install; low cost (the survivor and now being upgraded to faster speeds)

16 Protocols! Many designs proposed; one survived! TCP/IP " developed by ARPA as ARPAnet between universities and government, " message broken into packets and sent out in order, " packets are passed from node to node as conditions dictate, " packets may arrive in any order and must be reassembled into correct order, " retransmissions may be needed.! UDP " point-to-point connection " sequential transmission of packets " not used over long distances

17 TCP/IP Protocol! IP (Internet Protocol): defines how subnets are addressed and accessed, " Addresses: to where each XXX is an octet (0:255); NOT all are valid addresses) " GT: xx.yy (Class B subnet: 65k addresses) xx.yy and others " GT-AE: yy (Knight 3 rd -4 th floors) " Unrouted: 192:168.xx.yy (others too)! Routers are used to pass packets to destination! Routing tables define how routers work

18 ! Address assignment: IP Protocol cont d " Fixed: must get address from OIT who registers it with Domain Name Servers (DNS) " Dynamic: request temporary address (use Dynamic Host Control Protocol DHCP) " DHCP server can restrict to known hardware addresses (Media Access Control or MAC address which is unique to each ethernet network card)! DNS maps addresses into NAMES to make it easier to remember identification! DO NOT make up your own addresses!

19 TCP! Simple and effective but vulnerable " starts with certain handshakes " these can be spoofed by hackers (denial of service attacks start at this level)! Defines Ports (0-65k in number) " lowest 4k or so are standardized " remainder are user defined! Communications is carried out between ports depending on service specified " some software listens on a port for any communication and then responds " firewalls block access to certain ports " Hackers probe know vulnerable ports " Many Linux systems by default listen and respond on many std ports - VULNERABLE Port Service http (web) SMB

20 ! Historic: Windows Networking " NetBios: primitive network communications " NetBEUI: Ethernet-based, non-routable protocol basic to all Windows until XP dynamnically creates addresses use when TCP is too complex! NBT: NetBios encapsulated into TCP/IP

21 Higher Level Networking! Session and Application levels! Server Message Block (SMB) protocol " supports file sharing between systems " similar to NFS for Unix/Linux and AppleShare " Uses ports (445 for Win2k/XP) " Passes data without encryption on 139 " Credentials but not data are encrypted on 445

22 Using SMB! Right-click My Network Places and use Map Network Drive Can use current username and password Can click different user name and use different credentials

23 ! When completed, the external share appears as if it were a local disk (e.g., with a drive letter)! Access it just like a disk! To disconnect: " Right-click on drive icon and select Disconnect " Right-click on My Network Places and select Disconnect Network Drive ; then select which drive. Map Network Drive

24 Maintenance & Viruses! Assumption: all large & complex operating systems contain software flaws! Strategy Windows 2k & XP: " always assume a machine connected to the network is vulnerable to attack and compromise " Make sure that the latest Windows Service Packs (SP s) are applied (right click My Computer to verify) " Subscribe to Auto Updates and download and install as soon as they are available (patches can be uninstalled if they prove problemmatic). Auto Updates is built into WinXP and is in Win2k at SP4.

25 Maintenance & Viruses (2)! Viruses & worms " make sure that GT-provided anti-virus software is installed and with latest signatures (go to OIT web site to obtain software) " configure anti-virus software to check any external media, file transfers and attachments NOTE: exclude Eudora mail spool file to prevent file lockup when attempting to scan incoming . use auto-update service if available! Spam " no solutions are foolproof " Recommendation: SpamAssassin (get SAProxy from

26 Current Security Issues! our networks are continually scanned by outsiders for old and new vulnerabilities (detected at firewalls)! Direct attacks: " attack vulnerable ports and services on ports " Example: msblaster worm attacks Windows File Sharing RPC port 135 (used for normal file sharing)! Indirect attacks: " or deliver a file containing viral program Infection begins when user executes file Social engineering: misrepresent the file to trick the user into opening what they think is an important file or program. " spoofing: make it appear comes from trusted friend (harvest address books on compromised systems)

Network User's Guide for HL-2070N

Network User's Guide for HL-2070N f Multi-Protocol On-board Print Server Network User's Guide for HL-2070N Please read this manual thoroughly before using the printer. You can print or view this manual from the Printer CD-ROM at any time,

More information

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Course Description and Outline. IT Essential II: Network Operating Systems V2.0 Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

McAfee.com Personal Firewall

McAfee.com Personal Firewall McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise

More information

Guest PC. for Mac OS X. User Guide. Version 1.6. Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved.

Guest PC. for Mac OS X. User Guide. Version 1.6. Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Guest PC for Mac OS X Version 1.6 User Guide Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Table of Contents About Guest PC... 1 About your Virtual Computer... 1 Creating a Virtual

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide Overview This document is designed to provide a quick installation and configuration guide for WinGate using the client NAT connection. WinGate Internet Gateway and

More information

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc. Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 4 System Software: The Operating System, Utility Programs, and File Management. Chapter Topics

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy

More information

NETWORK USER S GUIDE. HL-5250DN series HL-5270DN. Multi-Protocol On-board Ethernet Print Server

NETWORK USER S GUIDE. HL-5250DN series HL-5270DN. Multi-Protocol On-board Ethernet Print Server Multi-Protocol On-board Ethernet Print Server NETWORK f USER S GUIDE HL-5250DN series HL-5270DN Please read this manual thoroughly before using the printer. You can print or view this manual from the Printer

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00 Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents

More information

Configuring Windows Server Clusters

Configuring Windows Server Clusters Configuring Windows Server Clusters In Enterprise network, group of servers are often used to provide a common set of services. For example, Different physical computers can be used to answer request directed

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0. Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...

More information

Exam: 070-215 QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4

Exam: 070-215 QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4 Exam: 070-215 QUESTION 1 You want to provide complete redundancy for all data stored on your hardware RAID-5 disk array. You install a second hardware RAID-5 disk array. You want to create a mirror of

More information

Configure thin client settings locally

Configure thin client settings locally This chapter contains information to help you set up your thin client hardware, look and feel, and system settings using the Control Center. Tip While it is not recommended to use dialog boxes for configuring

More information

imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000

imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000 English imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000 Version 1.0.1 731-01873A-EN Contents Overview... 1 Network... 2 Network Environments...2

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1 Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak CR V4.1 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents

More information

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE 12/11/2012 Index 1 INTRODUCTION... 1-1 2 FACTORY DEFAULT SETTINGS... 2-1 3 CPE BASIC OPERATIONS... 3-1 3.1 PASSWORD MODIFICATION...

More information

ThinPoint Quick Start Guide

ThinPoint Quick Start Guide ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...

More information

Network Setup Guide. Introduction. Setting up for use over LAN

Network Setup Guide. Introduction. Setting up for use over LAN Network Setup Guide This manual contains the setup information required to use the machine over wired LAN. If you use the machine with USB connection, refer to your setup sheet. Introduction To use the

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Ultra Thin Client TC-401 TC-402. Users s Guide

Ultra Thin Client TC-401 TC-402. Users s Guide Ultra Thin Client TC-401 TC-402 Users s Guide CONTENT 1. OVERVIEW... 3 1.1 HARDWARE SPECIFICATION... 3 1.2 SOFTWARE OVERVIEW... 4 1.3 HARDWARE OVERVIEW...5 1.4 NETWORK CONNECTION... 7 2. INSTALLING THE

More information

FortKnox Personal Firewall

FortKnox Personal Firewall FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Print Server User s Manual Version: 2.0 (January, 2006)

Print Server User s Manual Version: 2.0 (January, 2006) Print Server User s Manual Version: 2.0 (January, 2006) COPYRIGHT Copyright 2006/2007 by this company. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0 EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0 Copyright 2011 ECDL Foundation All rights reserved. No part of this publication may be reproduced in any form except as permitted

More information

IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI 12.1.3 Windows OS directory structures

IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI 12.1.3 Windows OS directory structures IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives 2.3 Disk management tools In Windows Vista and Windows 7, use the following path: Start > Start Search > type diskmgmt.msc

More information

File Sharing. Peter Lo. CP582 Peter Lo 2003 1

File Sharing. Peter Lo. CP582 Peter Lo 2003 1 File Sharing Peter Lo CP582 Peter Lo 2003 1 File Sharing What is it? How is it different from File Transfer How it it done? CP582 Peter Lo 2003 2 This lecture we move away from the topic of transferring

More information

EaseUS Todo Backup user guide. EaseUS Todo Backup. Central Management Console. User guide - 1 -

EaseUS Todo Backup user guide. EaseUS Todo Backup. Central Management Console. User guide - 1 - EaseUS Todo Backup Central Management Console User guide - 1 - Table of Contents Welcome... - 3 - Overview... - 3 - How to use this manual... - 3 - Getting started... - 4 - Hardware requirements... - 4

More information

Advanced Diploma In Hardware, Networking & Server Configuration

Advanced Diploma In Hardware, Networking & Server Configuration Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term

More information

Chapter 5: Fundamental Operating Systems

Chapter 5: Fundamental Operating Systems Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose

More information

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R-

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R- MODEL ATC-2004 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2004 is a 4 Port RS232/RS485 to TCP/IP converter integrated with a robust system and network management features

More information

DN-13007. 2 USB 2.0 Hi-Speed Ports/MFP Server User`s Manual. Version 1.17

DN-13007. 2 USB 2.0 Hi-Speed Ports/MFP Server User`s Manual. Version 1.17 DN-13007 2 USB 2.0 Hi-Speed Ports/MFP Server User`s Manual Version 1.17 1 Table of Contents CHAPTER1 INTRODUCTION...4 1.1 About this Manual...4 1.2 Support Services...4 CHAPTER2 PRODUCT OVERVIEW...4 2.1

More information

Operating System Installation Guidelines

Operating System Installation Guidelines Operating System Installation Guidelines The following document guides you step-by-step through the process of installing the operating systems so they are properly configured for boot camp. The document

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

User s Manual. Copyright 2010 Vantec Thermal Technologies. All Rights Reserved.

User s Manual. Copyright 2010 Vantec Thermal Technologies. All Rights Reserved. Copyright 2010 Vantec Thermal Technologies. All Rights Reserved. User s Manual Package Contents: 1 NextStar FX Gigabit NAS Adapter x1 2 AC Adapter x1 3 Installation Guide x1 4 Rubber Feet x4 5 User s CD

More information

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003 Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while

More information

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:

More information

SATO Network Interface Card Configuration Instructions

SATO Network Interface Card Configuration Instructions SATO Network Interface Card Configuration Instructions Table of Contents 1. Reset of wired/wireless interface card... 3 2. Installing the All-In-One Utility (recommended)... 4 3. Configuring wired/wireless

More information

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses

More information

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities of Windows and Linux operating systems Identify specific vulnerabilities and explain ways

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

Finding Lutron Processors on a Network

Finding Lutron Processors on a Network Finding Lutron Processors on a Network 1.0 Overview This document will act as a guide for establishing this communication and will describe various ways to overcome the network and computer challenges

More information

Upon completion of this chapter, you will able to answer the following questions:

Upon completion of this chapter, you will able to answer the following questions: CHAPTER 2 Operating Systems Objectives Upon completion of this chapter, you will able to answer the following questions: What is the purpose of an OS? What role do the shell and kernel play? What is the

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011) Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit

More information

Installing Windows XP Professional

Installing Windows XP Professional CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows

More information

Windows Server 2008 Versions Hard Drives & File Systems

Windows Server 2008 Versions Hard Drives & File Systems Windows Server 2008 Versions Windows 3.1, 95, 98, ME, NT, XP, Vista, 7, 8, 2000, 2003, 2008, 2012 All are a GUI environment (icons, mouse). Common items in Windows : Start button, My Computer, Network

More information

SSL Guide. (Secure Socket Layer)

SSL Guide. (Secure Socket Layer) SSL Guide (Secure Socket Layer) To find basic information about network and advanced network features of your Brother machine: uu Network User's Guide. To download the latest manual, please visit the Brother

More information

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................

More information

Lecture 6: Operating Systems and Utility Programs

Lecture 6: Operating Systems and Utility Programs Lecture 6: Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone

More information

Windows 2003 Server Installation Guide

Windows 2003 Server Installation Guide Windows 2003 Server Installation Guide Revision 2.0 April 14, 2011 Licenses This manual is the exclusive property of Prometric, Inc. This manual is licensed for use with restrictions to authorized centers

More information

Chapter 5: System Software: Operating Systems and Utility Programs

Chapter 5: System Software: Operating Systems and Utility Programs Understanding Computers Today and Tomorrow 12 th Edition Chapter 5: System Software: Operating Systems and Utility Programs Learning Objectives Understand the difference between system software and application

More information

Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the

Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names,

More information

HOUR 3. Installing Windows Server 2003

HOUR 3. Installing Windows Server 2003 HOUR 3 Installing Windows Server 2003 In this hour, we discuss the different types of Windows Server 2003 installations, such as upgrading an existing server or making a clean install on a server that

More information

How To Use The Symantec Vpnclient 7.0.1.1 (Vpnclient) On A Pc Or Mac Or Ipad (Windows) With A Network Card (Windows Xp) With An Ipad Or Ipa (

How To Use The Symantec Vpnclient 7.0.1.1 (Vpnclient) On A Pc Or Mac Or Ipad (Windows) With A Network Card (Windows Xp) With An Ipad Or Ipa ( Release Notes Symantec TM VPN Client Enterprise This document contains the following information about the Symantec Enterprise VPN Client, Version 7.0.1: What s new System requirements Installing the VPN

More information

Burst Technology bt-loganalyzer SE

Burst Technology bt-loganalyzer SE Burst Technology bt-loganalyzer SE Burst Technology Inc. 9240 Bonita Beach Rd, Bonita Springs, FL 34135 CONTENTS WELCOME... 3 1 SOFTWARE AND HARDWARE REQUIREMENTS... 3 2 SQL DESIGN... 3 3 INSTALLING BT-LOGANALYZER...

More information

Paragon Backup Retention Wizard

Paragon Backup Retention Wizard Paragon Backup Retention Wizard User Guide Getting Started with the Paragon Backup Retention Wizard In this guide you will find all the information necessary to get the product ready to use. System Requirements

More information

Product Description. Licenses Notice. Introduction TC-200

Product Description. Licenses Notice. Introduction TC-200 User Manual TC-200 Introduction TC-200 Product Description The TC-200 provides the fastest Thin Client performance on the market, It runs embedded Linux, swing user interface, Citrix 6.3, Microsoft RDP

More information

Networking Basics for Automation Engineers

Networking Basics for Automation Engineers Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------

More information

Operating Instructions

Operating Instructions Operating Instructions (For Setting up the Printer Driver and the Panasonic Document Management System) Digital Imaging Systems Model No. DP-800P / 800E / 806P Installation Table of Contents Installation

More information

Chapter 2 Preparing Your Network

Chapter 2 Preparing Your Network Chapter 2 Preparing Your Network This document describes how to prepare your network to connect to the Internet through a router and how to verify the readiness of your broadband Internet service from

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version.

Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version. Release notes version 7.01 Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version. It s available as a free downloadable upgrade to existing version 7.0 customers

More information

Setting up VPN and Remote Desktop for Home Use

Setting up VPN and Remote Desktop for Home Use Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3 IV. Remote Connect to Your Work Computer... 4

More information

C R E A T E D 8 / 2 1 / 2 0 1 3. Recommended Settings for AVImark

C R E A T E D 8 / 2 1 / 2 0 1 3. Recommended Settings for AVImark C R E A T E D 8 / 2 1 / 2 0 1 3 Recommended Settings for AVImark Introduction The following pages contain instructions for setting up AVImark. If you need assistance, please call our friendly technical

More information

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS MODEL ATC-2000 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2000 is a RS232/RS485 to TCP/IP converter integrated with a robust system and network management features designed

More information

Version 3.8. Installation Guide

Version 3.8. Installation Guide Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro

More information

Firewall and Port Settings

Firewall and Port Settings Firewall and Port Settings If you re having trouble accessing the shares and accounts that have been created on your MSS II your firewall settings could be the problem. The firewalls job is to protect

More information

Parallels Desktop for Mac

Parallels Desktop for Mac Parallels Software International, Inc. Parallels Desktop for Mac Quick Start Guide 3.0 (c) 2005-2007 Copyright 2006-2007 by Parallels Software International, Inc. All rights reserved. Parallels and Parallels

More information

Computers: Tools for an Information Age

Computers: Tools for an Information Age Computers: Tools for an Information Age Chapter 3 Operating Systems: Software in the Background Objectives of Chapter 3 Describe the functions of an Operating System Explain the basics of a personal computer

More information

Network Scanner Tool R3.1. User s Guide Version 3.0.04

Network Scanner Tool R3.1. User s Guide Version 3.0.04 Network Scanner Tool R3.1 User s Guide Version 3.0.04 Copyright 2000-2004 by Sharp Corporation. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,

More information

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4. Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions

More information

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0 EUCIP - IT Administrator Module 2 Operating Systems Version 2.0 Module 2 Goals Module 2 Module 2, Operating Systems, requires the candidate to be familiar with the procedure of installing and updating

More information

Networking Operating Systems (CO32010)

Networking Operating Systems (CO32010) Networking Operating Systems (CO32010) 2. Processes and scheduling 1. Operating Systems 1.1 NOS definition and units 1.2 Computer 7. Encryption Systems 1.3 Multitasking and Threading 1.4 Exercises 6. Routers

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

EaseUS Partition Master

EaseUS Partition Master Reviewer s Guide Contents Introduction... 2 Chapter 1... 3 What is EaseUS Partition Master?... 3 Versions Comparison... 4 Chapter 2... 5 Using EaseUS Partition Master... 5 Partition Manager... 5 Disk &

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

3.5 EXTERNAL NETWORK HDD. User s Manual

3.5 EXTERNAL NETWORK HDD. User s Manual 3.5 EXTERNAL NETWORK HDD User s Manual Table of Content Before You Use Key Features H/W Installation Illustration of Product LED Definition NETWORK HDD Assembly Setup the Network HDD Home Disk Utility

More information

integration tools setup guide SIM 3 Remote Guide to controlling a SIM 3 Audio Analyzer remotely over a network connection from a laptop

integration tools setup guide SIM 3 Remote Guide to controlling a SIM 3 Audio Analyzer remotely over a network connection from a laptop setup guide integration tools SIM 3 Remote Guide to controlling a SIM 3 Audio Analyzer remotely over a network connection from a laptop 2010 Meyer Sound. All rights reserved. SIM 3 Remote Setup Guide,

More information

USB Print Server User Manual (GPSU01)

USB Print Server User Manual (GPSU01) USB Print Server User Manual (GPSU01) Welcome Thank you for purchasing this 1-port USB Print Server that allows any networked computer to share a USB printer. It complies with USB 1.1 specifications,

More information

Using VMware Workstation

Using VMware Workstation VMware Workstation 10 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

1 You will need the following items to get started:

1 You will need the following items to get started: QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide

More information

READYNAS INSTANT STORAGE. Quick Installation Guide

READYNAS INSTANT STORAGE. Quick Installation Guide READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux

More information

DocuPrint C3290 FS Features Setup Guide

DocuPrint C3290 FS Features Setup Guide DocuPrint C3290 FS Features Setup Guide Adobe and PostScript are trademarks of Adobe Systems Incorporated in the United States and/or other countries. Apple, Bonjour, ColorSync, EtherTalk, Macintosh, and

More information

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information