WINDOWS Operating System
|
|
- Hubert Moore
- 8 years ago
- Views:
Transcription
1 WINDOWS Operating System OBJECTIVES! What is an OS?! Windows family! Major components " File system " Task manager " Manager " I/O services Networking Printing and other services " GUI! Maintenance and virus protection
2 Operating System! Manage the computational and I/O resources present in the computer! Implementation: " Single user, command line (CP/M, DOS ) " Time sharing (Multics, VMS, VM/CMS, Unix ) " Real Time (HP RTE, etc) " Others (distributed, )! Windows " Single user " Event-driven structure
3 Windows! Windows 3.1 " GUI built on top of DOS 3.1 " Ver 1-2 were useless compared to MacOS! Windows 95, 98, 98se, 98me " GUI is more seamlessly wrapped around DOS 6.2 " Serious competition for MacOS! Windows NT (3.51, 4.0, 2k) " NT = new technology " Preemptive multi-tasking " GUI with command line interface " True multi-user (but not time-shared) " Server versions; multi-cpu (SMP)! Windows XP " Fusion into a single kernel " Home, Prof, Server, Advanced Server, Datacenter (Enterprise)
4 Components: File System! Based largely on characteristics of disk storage Physical Structure Logical Structure Windows Disk with cyl tracks on magnetic surface. Head per surface. Partition Partition N 1 cyls N 2 cyls D: C: Active (boot) Partition N 3 cyls E: Position all heads at once and read from all heads in order. Defines CYLINDER. Cylinders may be divided into SECTORS. Basic quanta. Extended Partition Logical Partition Logical Partition N 4 F: etc
5 File System Structure! Hierarchical structure " Directories (folders) can contain files or other directories " Shortcuts are aliases or pointers to actual file or folder! Entire disk is allocated by directory and file! Performance is highly dependent on file system design
6 File Permissions! File system format varies between OS s! FAT = file allocation table (type of format) " File name limits (old 8.3 names) " File size and volume size limits! FAT16, FAT32 introduced improvements! NTFS introduced file ownership & permissions " Files are owned by a user or system " Owner can grant permissions " Groups can be given permissions " Encryption can be activated
7 File Extensions! Mac introduced files with forks " Resource: contains info about the file " Data: contains the file data " OS can tell from resource how to handle file (e.g., as containing a program to execute or data to read)! Windows does this with file extensions " myfile.txt text file " myfile.dat data file (user specific) " myfile.exe executable file " myfile.xls application specific data (Excel)! Windows associates icons with extensions depending on how they are registered.
8 Task Manager! Perhaps the most critical element of the OS " Determines what process is allowed to execute " Event-driven: responds to interupts (user, program, I/O, error, etc) " Should not allow one process to dominate " OS appears to operate process concurrently Right-click on Task Bar
9 Task Manager Functions! You can control how the OS handles processes " Suspend process " Stop (kill) process " Change priority (gets more or less CPU) " BE CAREFUL!
10 ! Examine computer performance Task Manager Functions
11 ! One of several related programs " Access this via Control Panel, or " Right click My Computer! Use Manager to check and reinstall drivers! Use Hardware Wizard to discover new hardware and install drivers " TRICK: use Manager to remove device and software " Then let Hardware Wizard discover and reinstall. Computer Manager
12 Other Management Services! See Control Panel " Administrative Tools " Select mgt tool! Other mgt tools in Control Panel are available
13 I/O Services! VERY trick part due to wide variety of hardware the computer may have to work with! Architecture: " Interupt driven (not common in PC s) " Memory mapped (common) " Direct Memory Access-DMA (high speed devices)! Hardware: " ISA: old and slow " PCI: current but showing age! Windows " Old: interupts must be set physically on each card " Plug-n-play: detects card and sets automatically (but requires special hardware designed for this purpose)
14 I/O Types! User: keyboard, mouse (PS-2 or USB)! Disks: " floppy: IDE or ATAPI " hard disk: IDE, ATA, ATA-100, SCSI, USB-2, Firewire, etc. " CDROM: IDE or ATAPI! Serial: telecom and many printers! Parallel: some printers! USB: high speed serial (USB-2 emerging)! Firewire: high speed serial
15 Networking! Has become the most important element of computing for many situations! Historical: " Serial or Parallel wiring between System A and System B (awkward, inflexible, limited distance) " Token Ring: all computers connected in a ring and a token which contains a message is passed from system to system; system can send when it receives a free token (harder to wire; has not survived) " Ethernet: CSMA-CD design (big party line); simple to install; low cost (the survivor and now being upgraded to faster speeds)
16 Protocols! Many designs proposed; one survived! TCP/IP " developed by ARPA as ARPAnet between universities and government, " message broken into packets and sent out in order, " packets are passed from node to node as conditions dictate, " packets may arrive in any order and must be reassembled into correct order, " retransmissions may be needed.! UDP " point-to-point connection " sequential transmission of packets " not used over long distances
17 TCP/IP Protocol! IP (Internet Protocol): defines how subnets are addressed and accessed, " Addresses: to where each XXX is an octet (0:255); NOT all are valid addresses) " GT: xx.yy (Class B subnet: 65k addresses) xx.yy and others " GT-AE: yy (Knight 3 rd -4 th floors) " Unrouted: 192:168.xx.yy (others too)! Routers are used to pass packets to destination! Routing tables define how routers work
18 ! Address assignment: IP Protocol cont d " Fixed: must get address from OIT who registers it with Domain Name Servers (DNS) " Dynamic: request temporary address (use Dynamic Host Control Protocol DHCP) " DHCP server can restrict to known hardware addresses (Media Access Control or MAC address which is unique to each ethernet network card)! DNS maps addresses into NAMES to make it easier to remember identification! DO NOT make up your own addresses!
19 TCP! Simple and effective but vulnerable " starts with certain handshakes " these can be spoofed by hackers (denial of service attacks start at this level)! Defines Ports (0-65k in number) " lowest 4k or so are standardized " remainder are user defined! Communications is carried out between ports depending on service specified " some software listens on a port for any communication and then responds " firewalls block access to certain ports " Hackers probe know vulnerable ports " Many Linux systems by default listen and respond on many std ports - VULNERABLE Port Service http (web) SMB
20 ! Historic: Windows Networking " NetBios: primitive network communications " NetBEUI: Ethernet-based, non-routable protocol basic to all Windows until XP dynamnically creates addresses use when TCP is too complex! NBT: NetBios encapsulated into TCP/IP
21 Higher Level Networking! Session and Application levels! Server Message Block (SMB) protocol " supports file sharing between systems " similar to NFS for Unix/Linux and AppleShare " Uses ports (445 for Win2k/XP) " Passes data without encryption on 139 " Credentials but not data are encrypted on 445
22 Using SMB! Right-click My Network Places and use Map Network Drive Can use current username and password Can click different user name and use different credentials
23 ! When completed, the external share appears as if it were a local disk (e.g., with a drive letter)! Access it just like a disk! To disconnect: " Right-click on drive icon and select Disconnect " Right-click on My Network Places and select Disconnect Network Drive ; then select which drive. Map Network Drive
24 Maintenance & Viruses! Assumption: all large & complex operating systems contain software flaws! Strategy Windows 2k & XP: " always assume a machine connected to the network is vulnerable to attack and compromise " Make sure that the latest Windows Service Packs (SP s) are applied (right click My Computer to verify) " Subscribe to Auto Updates and download and install as soon as they are available (patches can be uninstalled if they prove problemmatic). Auto Updates is built into WinXP and is in Win2k at SP4.
25 Maintenance & Viruses (2)! Viruses & worms " make sure that GT-provided anti-virus software is installed and with latest signatures (go to OIT web site to obtain software) " configure anti-virus software to check any external media, file transfers and attachments NOTE: exclude Eudora mail spool file to prevent file lockup when attempting to scan incoming . use auto-update service if available! Spam " no solutions are foolproof " Recommendation: SpamAssassin (get SAProxy from
26 Current Security Issues! our networks are continually scanned by outsiders for old and new vulnerabilities (detected at firewalls)! Direct attacks: " attack vulnerable ports and services on ports " Example: msblaster worm attacks Windows File Sharing RPC port 135 (used for normal file sharing)! Indirect attacks: " or deliver a file containing viral program Infection begins when user executes file Social engineering: misrepresent the file to trick the user into opening what they think is an important file or program. " spoofing: make it appear comes from trusted friend (harvest address books on compromised systems)
Network User's Guide for HL-2070N
f Multi-Protocol On-board Print Server Network User's Guide for HL-2070N Please read this manual thoroughly before using the printer. You can print or view this manual from the Printer CD-ROM at any time,
More informationCourse Description and Outline. IT Essential II: Network Operating Systems V2.0
Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
More informationHoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
More informationMcAfee.com Personal Firewall
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
More informationFreshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
More informationCore Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
More informationChapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
More informationIntelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main
More informationDell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com
CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise
More informationGuest PC. for Mac OS X. User Guide. Version 1.6. Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved.
Guest PC for Mac OS X Version 1.6 User Guide Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Table of Contents About Guest PC... 1 About your Virtual Computer... 1 Creating a Virtual
More informationInstallation and Configuration Guide
Installation and Configuration Guide Overview This document is designed to provide a quick installation and configuration guide for WinGate using the client NAT connection. WinGate Internet Gateway and
More informationTechnology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 4 System Software: The Operating System, Utility Programs, and File Management. Chapter Topics
More information1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
More informationSecurity Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
More informationNETWORK USER S GUIDE. HL-5250DN series HL-5270DN. Multi-Protocol On-board Ethernet Print Server
Multi-Protocol On-board Ethernet Print Server NETWORK f USER S GUIDE HL-5250DN series HL-5270DN Please read this manual thoroughly before using the printer. You can print or view this manual from the Printer
More informationMedical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents
More informationConfiguring Windows Server Clusters
Configuring Windows Server Clusters In Enterprise network, group of servers are often used to provide a common set of services. For example, Different physical computers can be used to answer request directed
More informationMedical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...
More informationExam: 070-215 QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4
Exam: 070-215 QUESTION 1 You want to provide complete redundancy for all data stored on your hardware RAID-5 disk array. You install a second hardware RAID-5 disk array. You want to create a mirror of
More informationConfigure thin client settings locally
This chapter contains information to help you set up your thin client hardware, look and feel, and system settings using the Control Center. Tip While it is not recommended to use dialog boxes for configuring
More informationimagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000
English imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000 Version 1.0.1 731-01873A-EN Contents Overview... 1 Network... 2 Network Environments...2
More informationMedical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak CR V4.1 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
More informationBASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE
BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE 12/11/2012 Index 1 INTRODUCTION... 1-1 2 FACTORY DEFAULT SETTINGS... 2-1 3 CPE BASIC OPERATIONS... 3-1 3.1 PASSWORD MODIFICATION...
More informationThinPoint Quick Start Guide
ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...
More informationNetwork Setup Guide. Introduction. Setting up for use over LAN
Network Setup Guide This manual contains the setup information required to use the machine over wired LAN. If you use the machine with USB connection, refer to your setup sheet. Introduction To use the
More informationStep-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
More informationUltra Thin Client TC-401 TC-402. Users s Guide
Ultra Thin Client TC-401 TC-402 Users s Guide CONTENT 1. OVERVIEW... 3 1.1 HARDWARE SPECIFICATION... 3 1.2 SOFTWARE OVERVIEW... 4 1.3 HARDWARE OVERVIEW...5 1.4 NETWORK CONNECTION... 7 2. INSTALLING THE
More informationFortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
More informationRelease Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationInstallation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
More informationPrint Server User s Manual Version: 2.0 (January, 2006)
Print Server User s Manual Version: 2.0 (January, 2006) COPYRIGHT Copyright 2006/2007 by this company. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
More informationEUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0
EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0 Copyright 2011 ECDL Foundation All rights reserved. No part of this publication may be reproduced in any form except as permitted
More informationIT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI 12.1.3 Windows OS directory structures
IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives 2.3 Disk management tools In Windows Vista and Windows 7, use the following path: Start > Start Search > type diskmgmt.msc
More informationFile Sharing. Peter Lo. CP582 Peter Lo 2003 1
File Sharing Peter Lo CP582 Peter Lo 2003 1 File Sharing What is it? How is it different from File Transfer How it it done? CP582 Peter Lo 2003 2 This lecture we move away from the topic of transferring
More informationEaseUS Todo Backup user guide. EaseUS Todo Backup. Central Management Console. User guide - 1 -
EaseUS Todo Backup Central Management Console User guide - 1 - Table of Contents Welcome... - 3 - Overview... - 3 - How to use this manual... - 3 - Getting started... - 4 - Hardware requirements... - 4
More informationAdvanced Diploma In Hardware, Networking & Server Configuration
Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationLegal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationAgency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
More informationSECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
More informationChapter 5: Fundamental Operating Systems
Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose
More information3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R-
MODEL ATC-2004 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2004 is a 4 Port RS232/RS485 to TCP/IP converter integrated with a robust system and network management features
More informationDN-13007. 2 USB 2.0 Hi-Speed Ports/MFP Server User`s Manual. Version 1.17
DN-13007 2 USB 2.0 Hi-Speed Ports/MFP Server User`s Manual Version 1.17 1 Table of Contents CHAPTER1 INTRODUCTION...4 1.1 About this Manual...4 1.2 Support Services...4 CHAPTER2 PRODUCT OVERVIEW...4 2.1
More informationOperating System Installation Guidelines
Operating System Installation Guidelines The following document guides you step-by-step through the process of installing the operating systems so they are properly configured for boot camp. The document
More informationSophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you
More informationLocking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
More informationUser s Manual. Copyright 2010 Vantec Thermal Technologies. All Rights Reserved.
Copyright 2010 Vantec Thermal Technologies. All Rights Reserved. User s Manual Package Contents: 1 NextStar FX Gigabit NAS Adapter x1 2 AC Adapter x1 3 Installation Guide x1 4 Rubber Feet x4 5 User s CD
More informationLectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
More information1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
More informationSATO Network Interface Card Configuration Instructions
SATO Network Interface Card Configuration Instructions Table of Contents 1. Reset of wired/wireless interface card... 3 2. Installing the All-In-One Utility (recommended)... 4 3. Configuring wired/wireless
More informationKaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
More informationHands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities
Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities of Windows and Linux operating systems Identify specific vulnerabilities and explain ways
More informationHow To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
More informationFinding Lutron Processors on a Network
Finding Lutron Processors on a Network 1.0 Overview This document will act as a guide for establishing this communication and will describe various ways to overcome the network and computer challenges
More informationUpon completion of this chapter, you will able to answer the following questions:
CHAPTER 2 Operating Systems Objectives Upon completion of this chapter, you will able to answer the following questions: What is the purpose of an OS? What role do the shell and kernel play? What is the
More informationKASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
More informationHost Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
More informationInstalling Windows XP Professional
CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows
More informationWindows Server 2008 Versions Hard Drives & File Systems
Windows Server 2008 Versions Windows 3.1, 95, 98, ME, NT, XP, Vista, 7, 8, 2000, 2003, 2008, 2012 All are a GUI environment (icons, mouse). Common items in Windows : Start button, My Computer, Network
More informationSSL Guide. (Secure Socket Layer)
SSL Guide (Secure Socket Layer) To find basic information about network and advanced network features of your Brother machine: uu Network User's Guide. To download the latest manual, please visit the Brother
More informationVMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
More informationLecture 6: Operating Systems and Utility Programs
Lecture 6: Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone
More informationWindows 2003 Server Installation Guide
Windows 2003 Server Installation Guide Revision 2.0 April 14, 2011 Licenses This manual is the exclusive property of Prometric, Inc. This manual is licensed for use with restrictions to authorized centers
More informationChapter 5: System Software: Operating Systems and Utility Programs
Understanding Computers Today and Tomorrow 12 th Edition Chapter 5: System Software: Operating Systems and Utility Programs Learning Objectives Understand the difference between system software and application
More informationInformation in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
More informationHOUR 3. Installing Windows Server 2003
HOUR 3 Installing Windows Server 2003 In this hour, we discuss the different types of Windows Server 2003 installations, such as upgrading an existing server or making a clean install on a server that
More informationHow To Use The Symantec Vpnclient 7.0.1.1 (Vpnclient) On A Pc Or Mac Or Ipad (Windows) With A Network Card (Windows Xp) With An Ipad Or Ipa (
Release Notes Symantec TM VPN Client Enterprise This document contains the following information about the Symantec Enterprise VPN Client, Version 7.0.1: What s new System requirements Installing the VPN
More informationBurst Technology bt-loganalyzer SE
Burst Technology bt-loganalyzer SE Burst Technology Inc. 9240 Bonita Beach Rd, Bonita Springs, FL 34135 CONTENTS WELCOME... 3 1 SOFTWARE AND HARDWARE REQUIREMENTS... 3 2 SQL DESIGN... 3 3 INSTALLING BT-LOGANALYZER...
More informationParagon Backup Retention Wizard
Paragon Backup Retention Wizard User Guide Getting Started with the Paragon Backup Retention Wizard In this guide you will find all the information necessary to get the product ready to use. System Requirements
More informationProduct Description. Licenses Notice. Introduction TC-200
User Manual TC-200 Introduction TC-200 Product Description The TC-200 provides the fastest Thin Client performance on the market, It runs embedded Linux, swing user interface, Citrix 6.3, Microsoft RDP
More informationNetworking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
More informationOperating Instructions
Operating Instructions (For Setting up the Printer Driver and the Panasonic Document Management System) Digital Imaging Systems Model No. DP-800P / 800E / 806P Installation Table of Contents Installation
More informationChapter 2 Preparing Your Network
Chapter 2 Preparing Your Network This document describes how to prepare your network to connect to the Internet through a router and how to verify the readiness of your broadband Internet service from
More informationJOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
More informationDanware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version.
Release notes version 7.01 Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version. It s available as a free downloadable upgrade to existing version 7.0 customers
More informationSetting up VPN and Remote Desktop for Home Use
Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3 IV. Remote Connect to Your Work Computer... 4
More informationC R E A T E D 8 / 2 1 / 2 0 1 3. Recommended Settings for AVImark
C R E A T E D 8 / 2 1 / 2 0 1 3 Recommended Settings for AVImark Introduction The following pages contain instructions for setting up AVImark. If you need assistance, please call our friendly technical
More informationUser s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS
MODEL ATC-2000 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2000 is a RS232/RS485 to TCP/IP converter integrated with a robust system and network management features designed
More informationVersion 3.8. Installation Guide
Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro
More informationFirewall and Port Settings
Firewall and Port Settings If you re having trouble accessing the shares and accounts that have been created on your MSS II your firewall settings could be the problem. The firewalls job is to protect
More informationParallels Desktop for Mac
Parallels Software International, Inc. Parallels Desktop for Mac Quick Start Guide 3.0 (c) 2005-2007 Copyright 2006-2007 by Parallels Software International, Inc. All rights reserved. Parallels and Parallels
More informationComputers: Tools for an Information Age
Computers: Tools for an Information Age Chapter 3 Operating Systems: Software in the Background Objectives of Chapter 3 Describe the functions of an Operating System Explain the basics of a personal computer
More informationNetwork Scanner Tool R3.1. User s Guide Version 3.0.04
Network Scanner Tool R3.1 User s Guide Version 3.0.04 Copyright 2000-2004 by Sharp Corporation. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,
More informationClick to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.
Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions
More informationEUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0
EUCIP - IT Administrator Module 2 Operating Systems Version 2.0 Module 2 Goals Module 2 Module 2, Operating Systems, requires the candidate to be familiar with the procedure of installing and updating
More informationNetworking Operating Systems (CO32010)
Networking Operating Systems (CO32010) 2. Processes and scheduling 1. Operating Systems 1.1 NOS definition and units 1.2 Computer 7. Encryption Systems 1.3 Multitasking and Threading 1.4 Exercises 6. Routers
More informationDocufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
More informationEaseUS Partition Master
Reviewer s Guide Contents Introduction... 2 Chapter 1... 3 What is EaseUS Partition Master?... 3 Versions Comparison... 4 Chapter 2... 5 Using EaseUS Partition Master... 5 Partition Manager... 5 Disk &
More informationWindows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
More informationIntroduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
More information3.5 EXTERNAL NETWORK HDD. User s Manual
3.5 EXTERNAL NETWORK HDD User s Manual Table of Content Before You Use Key Features H/W Installation Illustration of Product LED Definition NETWORK HDD Assembly Setup the Network HDD Home Disk Utility
More informationintegration tools setup guide SIM 3 Remote Guide to controlling a SIM 3 Audio Analyzer remotely over a network connection from a laptop
setup guide integration tools SIM 3 Remote Guide to controlling a SIM 3 Audio Analyzer remotely over a network connection from a laptop 2010 Meyer Sound. All rights reserved. SIM 3 Remote Setup Guide,
More informationUSB Print Server User Manual (GPSU01)
USB Print Server User Manual (GPSU01) Welcome Thank you for purchasing this 1-port USB Print Server that allows any networked computer to share a USB printer. It complies with USB 1.1 specifications,
More informationUsing VMware Workstation
VMware Workstation 10 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
More information1 You will need the following items to get started:
QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide
More informationREADYNAS INSTANT STORAGE. Quick Installation Guide
READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux
More informationDocuPrint C3290 FS Features Setup Guide
DocuPrint C3290 FS Features Setup Guide Adobe and PostScript are trademarks of Adobe Systems Incorporated in the United States and/or other countries. Apple, Bonjour, ColorSync, EtherTalk, Macintosh, and
More informationLegal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More information