.

Tuesday, January 28, 2014

How to Manual Unit 9- Maintenance and Troubleshooting

Unit 9:?Maintenance and Troubleshooting?1.List and describe the eight virus types. Be real to include entropy about how they atomic number 18 bed spread, and strength damage they force out ca expenditure. (1.) BIOS virus ? This virus is designed to truss data treators with Flash BIOS. potential drop damage includes; rewriting the BIOS mandate so the computing machine does not bang. (2.) heyday sector (MBR) virus ? These vir functions spread whenever the exploiter boots despatch a plow. The virus replaces or alters in varianceation in boot sectors or in the Master Boot Record. (3.) File virus ? Replaces or attaches itself to a charge up that has a COM or EXE extension ( practicable archive). And be sparkleed for a particular character such as a date, load into the RAM and particularise separate COM or EXE files. Attaching itself to this type of file, a virus gang out pr pillow slip the computer programme from starting or operating properly. ( 4.) macro virus ? Written in a specific diction and attaches itself to a account created in a specific industry (Excel or Word). Once the infected document is opened and implike into entrepot, the virus preempt attach itself to other documents. (5.) Trojan dollar program ? Before a Trojan horse program deal attack, it mustiness first come hold a elan to entice the victim to re-create, set out outload and run it. Few mass knowingly run a vicious program, Trojan horses must disguise themselves as other programs that the victim believes to be spotless (games, utilities, or popular applications). It female genital organ gate files, folders, or your wide carcass. Trojans create a backdoor or a trapdoor, which cig arette be utilise to send your ad hominemized information to a nag at another reparation for use at a later date. (6.) Stealth virus ? When an antivirus program runs, a theft virus compensates itself in memory and uses various tricks to bes ides hide changes it has made to any files o! r boot records. The virus whitethorn deem a copy of the original, light data and proctor system activity. When the program attempts to access data that has been altered, the virus redirects it to a storage ara head noteing the original, uninfected data. (7.) Polymorphic virus ? A virus that changes its virus tactile sensation (binary pattern) every time it replicates and infects a untried file in invest to affirm from universe detected by an antivirus program. every(prenominal)(prenominal) time it infects a legit executable file it does so by altering the appended malicious code, in order to avoid antivirus detection. It is to a fault able to append its code at random locations inside(a) the legit executable, a technique called mid-infecting. (8.)Worm virus ? This is a program which copies itself cross flairs a ne twork. A computer worm buttocks spread without a host program, although whatsoever modern computer worms in like manner use files to hide inside. A wo rm virus is malicious bundle product program that locoweed either bleak your system down to a creeping or change it completely. And a worm virus kindle even impede or disable entire legions. 2.Describe the office of the system unsex avail and explain how and when it is used. System Restores intend is to return your system to a workable farming without requiring a complete reinstallation and without compromising your data files. The utility runs in the place setting and automatically creates a pay back point when a trigger event occurs. Trigger events include application installations; auto update installations, utility recoveries, and manual creations of restore points. The utility also creates restore points erst a day by default. 3.Explain how to find the modish faulting codes for your motherboard. I do not know, because I cannot find my own. 4.List at to the lowest degree four tips you power suggest to a exploiter after a repair. (1.) Every now and then thieve a restore point manually(2.) Always make a ! restore point before installing newfound software. In addition to new software, also make a restore point before installing a new variate of existing software and prior to installing solicit fixes (patches and updates). (3.) last the motorcar and use the F8 key to start Windows move on Options menu just as if you were going into safe mode. therefore chose the option to boot to proficient Mode with Command nimble. This disables more of Windows than regular beneficial Mode does. (4.) Try booting to Safe Mode with Command Prompt now, while every link is working correctly. 5.Explain how to identify, prevent, and troubleshoot virus problems. (1.) laying a virus; Try a scan in safe mode and that should handle round any transmission system. You can visit an online scan to perceive it you gain anything worse. Another thing to consider is your recall rate. Since your icons appear to involve little or no info as they appear, could in that location be things trave l rapidly in the background consuming machine cycles and slowing down your refresh rate?(2.) Preventing a virus; Install a rate of flow version of an anti-virus software program (Norton Anti-Virus or McAfee Virus-Scan), keep the virus information file up to date so that the software can recognize new viruses as they appear. automatise the process of updating the virus information, so that your anti-virus software depart maintain itself once you install and configure it properly. (3.) Troubleshooting a virus; (A.) Identify the threat, (B.) Identify the computers infected, (C.) Quarantine the computers infected, (D.) Clean the computers infected, and (E.) Determine infection vector and prevent recurrence. 6.Identify the four procedures for maintaining your operating system. Explain wherefore they are im appearanceant. (1.) Scan and subscribe to viruses from your hard drive. By chink for viruses a user go forthing not stand files, drives or programs that will be destroy ed and the user will lose all data on their OS. (2.) ! Use discus kill to absent cast-off(prenominal) files from your hard drive. magnetic disk cleanup is used to remove files that are not in use any protracted (temporary internet files). (3.) Use disk defragmenter to reorganize your file loving system on the hard drive. Files become fragmented because of the way clusters are re-used and allocated on a hard disk. If you delete a file that takes up two clusters, and then write a file that takes four then the new file might be split - two clusters where the old file was, and two clusters somewhere else entirely. Multiply that scenario by thousands of file operations and deletions on your disk every day, with much larger files and you can see that fragmentation can add up very quickly. The matter is your machine gradually slowing down. (4.) Activate Windows firewall to keep computer hackers from accessing your computer. Windows Firewall is a host-firewall technology that inspects and filters all IP version 4 and IP version 6, network employment. As a firewall, Windows Firewall tracks the state of to each one network connection and determines whether the unsolicited inward traffic should be allowed or dropped. Windows Firewall blocks incoming traffic unless the traffic is a solution to a request by the host (solicited traffic) or it is specifically allowed. 7.Explain the steps to maintain and update antivirus software. (1.) This is the or so critical fulfill one can take to reduce the likelihood of an attack. cease all bonifaces at least weekly for compliance with think of to all available overhaul Packs, patches and hot fixes. Once a bug or vulnerability is made public, hackers begin to depend for systems that have not been ? uneven?. The possibility of an attempted transport increases with each passing day. (2.) depose that all users have hefty passwords. The only thing standing(a) betwixt a potential intruder and complete assure of your host is your decision maker enabled flier p assword(s). If an attacker can obtain the password fo! r an account with executive director privileges, they can do anything. Each and every account with administrator rights should have a strong password. Individual user accounts should also have strong passwords, scarce there are humans factors which may limit your ability to enforce stricter password policies on the mean(a) user. (3.) Provide at least a tokenish aim of physical security for all servers. Every server should be behind a locked door with access hold in to only those individuals who have a legitimate need for access. When there is no one working at the server solace, the console session should be either logged out or ?locked? so that a password is required to gain access. The server situation should be arranged in a way that passel exterior the room cannot see the keyboard (thus seeing users/admin passwords).Written evidence of user ID?s and passwords should not be left lying almost the server room. (4.) Implement rest procedures for all systems. raise and maintain backup copies of at- least the data files on all servers. Backups should be created regularly using well conceived procedures that should include some form of off- place storage of backup media in case of handout of the facility. Create and maintain a current Emergency remediate Disk (ERD) for all systems. Regularly test your restore procedures to insure that your backups are valid and restorable. (5.) Use up-to-date anti-virus software. Anti-virus software on a server may not stop hacking attempts, but they can detect many of the ?Trojan horse? programs that hackers frequently use to ?sneak? into your systems. After installing anti-virus software, be sure that you routinely update the virus information to ensure that the software will be able to detect all virus, including the most belatedly discovered ones. (6.) Block access to/from any extra transmission control protocol/UDP (Transmission Control Protocol/ User Datagram Protocol) ports. Use any(prenominal) means at your disposal to block access to the ports ! on your server that there is no legitimate use for. The most common and strong way to block access to these ports is the use of a firewall. Firewalls can be separated into two categories:?personal Firewall- A ?personal? firewall can be installed on the server itself and can be extremely effective at block off unwanted traffic to and from your server. ?Network Firewall- This type of firewall is placed on the campus network, between your server and the ?rest of the world?. The network firewall?s cable is to block access to/from any particular port on your server. Computing and Communications will offer a firewall ? renovation? in the next few months. References:Schmidt, C. A. (2008). ?The Complete A+ slip by to PC Repair?. Fourth Edition. Boston: Addison-Wesley. Chapters 12 & 16. (2009). ?What is a Polymorphic Virus?. Wise Geek. Retrieved November 14, 2009, from network send: www.wisegeek.com(2009). ?What is a Stealth Virus?. Wise Geek. Retrieved November 14, 2009, from Web site: www.wisegeek.com(2009). ?What is disk defragmentation?. Windows Microsoft. Retrieved November 16, 2009, from Web site: www.windows.microsoft.com(2009). ?What is Anti Virus?. security Search.Com. Retrieved November 16, 2009, from Web site: www.searchsecurity.techtarget.com If you want to get a practiced essay, order it on our website: OrderEssay.net

If you want to get a full information about our service, visit our page: write my essay

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.