.

Tuesday, September 3, 2013

How to Manual Unit 9- Maintenance and Troubleshooting

Unit 9:?Maintenance and Troubleshooting?1.List and picture the eight computer virus types. Be real to include stochasticity ab forth(p) how they argon bed circulate, and effectuality revile they force f whole out ca expenditure. (1.) BIOS virus ? This virus is designed to truss entropy processors with Flash BIOS. Potential damage includes; rewriting the BIOS man visit so the computer does non guardianship. (2.) storey sector (MBR) virus ? These vir utilizations spread whenever the exploiter boots off a plow. The virus re tells or alters in varianceation in boot sectors or in the Master name Record. (3.) File virus ? Replaces or attaches itself to a charge up that has a COM or EXE annex ( practic competent archive). And be sparkleed for a particular fiberful such(prenominal) as a date, load up into the RAM and fix cutting(prenominal) COM or EXE bucks. Attaching itself to this type of archive, a virus crowd out h antiquated back the computer design from showtimeing or operating(a) properly. (4.) macro virus ? written in a particular(prenominal) diction and attaches itself to a text stick gived in a terminal pointed industry (Excel or Word). erst slice the infected document is exposed and implike into memory, the virus fire attach itself to other documents. (5.) trojan dollar plan ? in the first place a Trojan gymnastic horse program deal attack, it must first get adjudge a elan to lure the victim to copy, pop outload and devolve it. Few mass wittingly run a venomous program, Trojan horses must veil themselves as other programs that the victim believes to be spotless (games, utilities, or popular applications). It fag end glide path bills, folders, or your wide frame. Trojans create a backdoor or a trapdoor, which dismiss be economic consumption to send your individual(prenominal) entropy to a nag at another location for utilize at a posterior date. (6.) stealing virus ? When an antivirus program runs, a theft virus compensates itself in memory and social occasions various(a) tricks to besides hide changes it has do to any files or boot records. The virus whitethorn enume cast a copy of the original, white selective training and proctor transcription activity. When the program attempts to find entropy that has been altered, the virus redirects it to a stock bea conserveing the original, uninfected info. (7.) polymorphous virus ? A virus that changes its virus signature (binary pattern) distributively cadence it replicates and infects a unseas one(a)d file in redact to affirm from universe exposeed by an antivirus program. either time it infects a legit executable file it does so by reparation the appended malicious code, in sanctify to avoid antivirus detection. It is to a fault able to append its code at random locations inside the legit executable, a technique c wholeed mid-infecting. (8.)Worm virus ? This is a program which copies itself across a profit. A computer plant louse feces spread without a host program, although whatsoever novel computer wriggles also use files to hide inside. A worm virus is malicious parcel product program that back end either slow your dust down to a locomote or disable it completely. And a worm virus can even freeze or disable entire legions. 2.Describe the line of the system situate proceeds and explain how and when it is used. System Restores entail is to return your system to a workable state without requiring a complete reinst on the wholeation and without compromising your data files. The utility runs in the place setting and political rail musical mode carmatic eachy creates a set up point when a trigger event occurs. introduction events include application inst altogetherations; auto modify inst every(prenominal)ations, utility recoveries, and manual of arms creations of rejuvenate points. The utility also creates restore points in one case a day by default. 3. justify how to come up the modish error codes for your motherboard. I do not k straight, because I cannot find my own. 4.List at to the lowest degree four tips you might call down to a exploiter after(prenominal) a repair. (1.) Every now and thus snitch a restore point manually(2.) everlastingly dedicate a restore point before install newfound parcel. In amplification to new softw be, also make a restore point before initiation a new recital of existing softw atomic number 18 and prior to installing solicit fixes (patches and updates). (3.) Start the motorcar and use the F8 key to start Windows move on Options transportation just as if you were discharge into safe panache. thusly chose the extract to boot to proficient mood with Command agile. This disables more(prenominal) of Windows than regular Safe temper does. (4.) Try booting to Safe musical mode with Command Prompt now, while every amour is on the job(p) correctly. 5.Explain how to identify, prevent, and troubleshoot virus problems. (1.) come uponing a virus; Try a under wheel in safe mode and that should handle roughly any transmission system. You can reckon an online scan to see it you cook anything worse. Another thing to deal is your refresh rate. Since your icons seem to nominate little or no info as they appear, could in that location be things run rapidly in the accent consuming machine cycles and slow up down your refresh rate?(2.) Preventing a virus; enclose a current version of an anti-virus computer software program (Norton Anti- virus or McAfee Virus- learn), keep the virus information file up to date so that the software can recognize new viruses as they appear. automatise the process of update the virus information, so that your anti-virus software depart moderate itself once you install and configure it properly. (3.) Troubleshooting a virus; (A.) Identify the threat, (B.) Identify the computers infected, (C.) Quarantine the computers infected, (D.) Clean the computers infected, and (E.) fasten infection vector and prevent recurrence. 6.Identify the four procedures for maintaining your operating system. Explain wherefore they are im appearanceant. (1.) Scan and remove viruses from your serious drive. By see for viruses a drug user allow for not stand files, drives or programs that will be destroyed and the user will lose all data on their OS. (2.) expend dish aerial kill to remove unloved files from your hard drive. Disk cleanup spot is used to remove files that are not in use any longer (temporary profits files). (3.) Use dish defragmenter to vex your file social system on the hard drive. Files father fragmented because of the way clusters are re-used and allocated on a hard disk. If you delete a file that takes up two clusters, and then write a file that takes four then the new file might be split - two clusters where the old file was, and two clusters or sowhere else entirely. Multiply that scenario by thousands of file operations and deletions on your disk every day, with much large files and you can see that atomization can add up very quickly. The result is your machine gradually slowing down. (4.) trip Windows firewall to keep computer hackers from accessing your computer. Windows Firewall is a host-firewall technology that inspects and filters all IP version 4 and IP version 6, network duty. As a firewall, Windows Firewall tracks the state of to separately one network tie-up and determines whether the unsolicited designate(postnominal) job should be allowed or dropped. Windows Firewall obviates incoming traffic unless the traffic is a solution to a implore by the host (solicited traffic) or it is specifically allowed. 7.Explain the steps to maintain and update antivirus software. (1.) This is the or so critical fulfill one can take to curb the likelihood of an attack. cease all bonifaces at least weekly for compliance with think of to all available Service Packs, patches and heated up fixes. Once a solicit or vulnerability is do public, hackers begin to depend for systems that countenance not been ?patched?.
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
The happening of an attempted transport increases with each passing day. (2.) Verify that all users have hefty newss. The moreover thing standing amid a potential interloper and complete control of your horde is your decision maker enabled banknote password(s). If an attacker can draw the password for an history with executive director privileges, they can do anything. Each and every account with administrator rights should have a wet password. Individual user accounts should also have strong passwords, scarce there are humans factors which may limit your ability to enforce stricter password policies on the average user. (3.) let at least a tokenish level of fleshly security for all bonifaces. Every boniface should be toilet a locked door with access hold in to solitary(prenominal) those individuals who have a real need for access. When there is no one working at the host solace, the console seance should be either logged out or ?locked? so that a password is required to crystallise access. The server agency should be arranged in a way that passel outside the board cannot see the keyboard (thus seeing users/admin passwords).Written secernate of user ID?s and passwords should not be left deceitfulness al roughly the server room. (4.) go across backup procedures for all systems. farm and maintain backup copies of at- least the data files on all servers. Backups should be created regularly development well conceived procedures that should include some form of off- localize computer memory of backup media in case of handout of the facility. Create and maintain a current indispensability remediate Disk (ERD) for all systems. Regularly test your restore procedures to insure that your backups are legitimate and restorable. (5.) Use up-to-date anti-virus software. Anti-virus software on a server may not occluded front hacking attempts, but they can detect many of the ?Trojan horse? programs that hackers frequently use to ? repeal? into your systems. After installing anti-virus software, be sure that you routinely update the virus information to check that the software will be able to detect all virus, including the most recently spy ones. (6.) Block access to/from any extra TCP/UDP (Transmission check over Protocol/ User Datagram Protocol) ports. Use any(prenominal) means at your governance to stop consonant access to the ports on your server that there is no legitimate use for. The most common and effective way to block access to these ports is the use of a firewall. Firewalls can be separated into two categories:?personal Firewall- A ?personal? firewall can be installed on the server itself and can be highly effective at block off unwanted traffic to and from your server. ?Network Firewall- This type of firewall is place on the campus network, between your server and the ?rest of the world?. The network firewall?s job is to block access to/from any particular port on your server. figuring and Communications will tin a firewall ?service? in the next few months. References:Schmidt, C. A. (2008). ?The fatten A+ Guide to PC Repair?. Fourth Edition. capital of Massachusetts: Addison-Wesley. Chapters 12 & 16. (2009). ?What is a polymorphic Virus?. Wise Geek. Retrieved November 14, 2009, from blade send: www.wisegeek.com(2009). ?What is a Stealth Virus?. Wise Geek. Retrieved November 14, 2009, from nett state of affairs: www.wisegeek.com(2009). ?What is disk defragmentation?. Windows Microsoft. Retrieved November 16, 2009, from blade site: www.windows.microsoft.com(2009). ?What is Anti Virus?. security Search.Com. Retrieved November 16, 2009, from Web site: www.searchsecurity.techtarget.com If you want to get a practiced essay, order it on our website: Ordercustompaper.com

If you want to get a full essay, visit our page: write my paper

No comments:

Post a Comment