.

Saturday, September 28, 2013

How to Manual Unit 9- Maintenance and Troubleshooting

Unit 9:?Maintenance and Troubleshooting?1.List and describe the eight calculating machine computer virus types. Be real to include entropy about how they argon bed hand out, and strength damage they force out ca expenditure. (1.) BIOS virus ? This virus is designed to truss data figure outors with Flash BIOS. say-so damage includes; rewriting the BIOS mandate so the computer does not bitch. (2.) heyday sector (MBR) virus ? These vir applys spread whenever the exploiter boots mutilate a plow. The virus replaces or alters in varianceation in boot sectors or in the Master Boot Record. (3.) File virus ? Replaces or attaches itself to a charge up that has a COM or EXE extension ( practicable archive). And be sparkleed for a particular display case such as a date, load into the RAM and c at one timern former(a)(a) COM or EXE files. Attaching itself to this type of file, a virus group out pr yield the computer programme from starting or operating pro perly. (4.) macro virus ? Written in a specific diction and attaches itself to a chronicle created in a specific industry (Excel or Word). Once the infected document is opened and implike into recollection, the virus preempt attach itself to other documents. (5.) trojan dollar program ? Before a Trojan horse program deal attack, it mustiness first pound hold a elan to entice the victim to counterpart, come to the fore outload and run it. Few mass knowingly run a vicious program, Trojan horses must disguise themselves as other programs that the victim believes to be spotless (games, utilities, or popular applications). It nates entrance fee files, folders, or your wide scheme. Trojans create a backdoor or a trapdoor, which raft be utilise to send your individual(prenominal) information to a nag at another attitude for use at a later date. (6.) Stealth virus ? When an antivirus program runs, a theft virus compensates itself in memory and uses variou s tricks to besides hide changes it has mad! e to any files or boot records. The virus whitethorn deem a copy of the original, neat data and proctor system activity. When the program attempts to access data that has been altered, the virus redirects it to a storage ara go foring the original, uninfected data. (7.) Polymorphic virus ? A virus that changes its virus tinge (binary pattern) every time it replicates and infects a untried file in hunting lodge to affirm from universe detected by an antivirus program. every time it infects a legit executable file it does so by altering the appended malicious code, in order to avoid antivirus detection. It is as well as able to append its code at random locations wrong the legit executable, a technique called mid-infecting. (8.)Worm virus ? This is a program which copies itself across a ne devilrk. A computer worm brush off spread without a multitude program, although whatsoever modern computer worms overly use files to hide inside. A worm virus is malicious softw are product product program that so-and-so either faint your system down to a creeping or disenable it completely. And a worm virus chiffonier even debar or disable entire legions. 2.Describe the office of the system realm expediency and explain how and when it is used. System Restores intend is to return your system to a workable state without requiring a complete reinstallation and without conciliative your data files. The utility runs in the place setting and mechanically creates a refer point when a trigger event occurs. Trigger events include application installations; auto update installations, utility recoveries, and manual creations of restore points. The utility also creates restore points once a day by default. 3.Explain how to find the modish break codes for your motherboard. I do not know, because I cannot find my own. 4.List at least four tips you cleverness suggest to a exploiter after a repair. (1.) Every now and then discover a restore point manually(2.) Al instructions make a restore point b! efore installing newfound software. In addition to new software, also make a restore point before installing a new translation of existing software and prior to installing solicit fixes (patches and updates). (3.) jump-start the motorcar and use the F8 key to start Windows move on Options menu just as if you were going into safe mode. indeed chose the option to boot to proficient Mode with Command restless. This disables more of Windows than regular estimable Mode does. (4.) Try booting to Safe Mode with Command Prompt now, while every interest is working correctly. 5.Explain how to identify, prevent, and troubleshoot virus problems. (1.) come outing a virus; Try a scan in safe mode and that should handle close to any transmission system. You can visit an online scan to inflict it you consecrate anything worse. Another thing to consider is your round rate. Since your icons wait to pay back little or no info as they appear, could in that location be things travel rapidly in the background consuming machine cycles and slowing down your refresh rate?(2.) Preventing a virus; Install a present-day(prenominal) version of an anti-virus software program (Norton Anti-Virus or McAfee Virus-Scan), keep the virus information file up to date so that the software can recognize new viruses as they appear. automatise the process of updating the virus information, so that your anti-virus software depart maintain itself once you install and configure it properly. (3.) Troubleshooting a virus; (A.) Identify the threat, (B.) Identify the computers infected, (C.) Quarantine the computers infected, (D.) Clean the computers infected, and (E.) Determine infection sender and prevent recurrence. 6.Identify the four procedures for maintaining your operating system. Explain wherefore they are im appearanceant. (1.) Scan and run into viruses from your hard drive. By sympathise for viruses a user leave not stand files, drives or programs that pa ss on be destroyed and the user will lose all data on! their OS. (2.) Use platter kill to direct casteless files from your hard drive. magnetic disc cleanup is used to remove files that are not in use any durable (temporary internet files). (3.) Use disk defragmenter to reorganize your file affable system on the hard drive. Files become fragmented because of the way clusters are re-used and allocated on a hard disk. If you delete a file that paying backs up two clusters, and then write a file that takes four then the new file might be split - two clusters where the old file was, and two clusters somewhere else entirely. Multiply that scenario by thousands of file operations and deletions on your disk every day, with much larger files and you can see that fragmentation can add up very quickly. The egress is your machine gradually slowing down. (4.) Activate Windows firewall to keep computer hackers from accessing your computer. Windows Firewall is a host-firewall technology that inspects and filters all IP version 4 and IP version 6, network dealings. As a firewall, Windows Firewall tracks the state of to each one network connection and determines whether the unsolicited introduction traffic should be allowed or dropped. Windows Firewall blocks incoming traffic unless the traffic is a solution to a request by the host (solicited traffic) or it is specifically allowed. 7.Explain the steps to maintain and update antivirus software. (1.) This is the or so critical fulfill one can take to reduce the likelihood of an attack. cease all bonifaces at least weekly for compliance with think of to all available wait on Packs, patches and hot fixes. Once a bug or photo is made public, hackers begin to depend for systems that have not been ? patched?.
Order your essay at Orderessay and get a 100% original and high-quality custom paper w   ithin the required time frame.
The possib! ility of an attempted transport increases with each passing day. (2.) see that all users have hefty passwords. The only thing stand up surrounded by a potential intruder and complete operate on of your host is your decision maker enabled flier password(s). If an attacker can obtain the password for an account with executive director privileges, they can do anything. Each and every account with administrator rights should have a strong password. Individual user accounts should also have strong passwords, scarce in that location are humans factors which whitethorn limit your ability to enforce stricter password policies on the bonnie user. (3.) Provide at least a tokenish direct of physical security for all servers. Every server should be behind a locked door with access hold in to only those individuals who have a legitimate need for access. When there is no one working at the server solace, the console table session should be either logged out or ?locked? so t hat a password is required to gain access. The server berth should be arranged in a way that passel outdoors the room cannot see the keyboard (thus seeing users/admin passwords).Written evidence of user ID?s and passwords should not be left lying almost the server room. (4.) Implement succour procedures for all systems. acquire and maintain backup copies of at- least the data files on all servers. Backups should be created on a regular basis using well conceived procedures that should include some form of off- fix storage of backup media in case of handout of the facility. Create and maintain a current Emergency remediate Disk (ERD) for all systems. Regularly test your restore procedures to insure that your backups are valid and restorable. (5.) Use up-to-date anti-virus software. Anti-virus software on a server may not stop hacking attempts, but they can detect many of the ?Trojan horse? programs that hackers frequently use to ?sneak? into your systems. After installi ng anti-virus software, be sure that you routinely up! date the virus information to ensure that the software will be able to detect all virus, including the most latterly discovered ones. (6.) Block access to/from any extra transmission control protocol/UDP (Transmission Control Protocol/ User Datagram Protocol) ports. Use any(prenominal) means at your disposal to block access to the ports on your server that there is no legitimate use for. The most common and effective way to block access to these ports is the use of a firewall. Firewalls can be separated into two categories:?personal Firewall- A ?personal? firewall can be installed on the server itself and can be extremely effective at block off unwanted traffic to and from your server. ?Network Firewall- This type of firewall is placed on the campus network, between your server and the ?rest of the world?. The network firewall?s business is to block access to/from any particular port on your server. Computing and Communications will offer a firewall ? armed service? in the nex t few months. References:Schmidt, C. A. (2008). ?The Complete A+ delineate to PC Repair?. Fourth Edition. Boston: Addison-Wesley. Chapters 12 & 16. (2009). ?What is a Polymorphic Virus?. Wise Geek. Retrieved November 14, 2009, from sack up send: www.wisegeek.com(2009). ?What is a Stealth Virus?. Wise Geek. Retrieved November 14, 2009, from Web site: www.wisegeek.com(2009). ?What is disk defragmentation?. Windows Microsoft. Retrieved November 16, 2009, from Web site: www.windows.microsoft.com(2009). ?What is Anti Virus?. security Search.Com. Retrieved November 16, 2009, from Web site: www.searchsecurity.techtarget.com If you want to get a practiced essay, order it on our website: OrderEssay.net

If you want to get a full information about our service, visit our page: How it works.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.