Tuesday, November 20, 2012

Chapter 20 Projects

PROJECT 20-1: Sharing and Securing Folders

Using two computers, networked together, do the following to practice sharing and securing
folders using Windows XP:

1. Create a user account on Computer 1 named User1. In the My Documents folder for that
account, create a folder named Folder1.
2. On Computer 2, create a user account named User2. Try to access Folder1 on Computer 1.
What is the result? What must you do so that the folder can be accessed?

The end result is that the file isn't secured and that means any user can access this file. There are multiple ways to access this file. Both computers have the same OS and I just simply mapped both of the drives on the computers.

3. Now make the folder private so that others cannot see or access it on the network. Describe how you did that.

You can change the permissions on the folders. Right click on the folder, select properties, open the security tab, click the "edit" button, and remove the other users from the dialog that appears by highlighting their username and clicking "remove". Just don't remove yourself.


 PROJECT 20-2: Download and Use AV Software

A free trial of AVG Anti-Virus software is available on the AVG site at www.avg.com. Do
the following to download, install, and run the software:

1. Download the free trial version of AVG Anti-Virus software from the www.avg.com site
and install the software.

I installed this latest free trail of AVG through Virtualbox with the OS as Windows XP.

During the installation: 
After the AVG installation:


2. Perform a complete scan of the system. Were any suspicious programs found?

I scanned the computer and I did have 1 threat. It was just a corrupted ".exe file" and it was removed. 

After the scan:

 The end results of the scan:


3. Update the software with the latest virus signatures.

4. Set the AV software to scan the system daily.

5. Set the software to scan incoming e-mail.


PROJECT 20-3: Researching Running Processes

Boot to the Windows desktop and then use Task Manager to get a list of all the running
processes on your machine. Get a print screen of this list. Make a written list of each
process running and write a one-sentence explanation of the process. Note that you most
likely will need to use the Internet to research some of these processes.
Next, boot the system into Safe Mode and use Task Manager to list running processes.
Which processes that were loaded normally are not loaded when the system is running in
Safe Mode?

Task Manager Processes running normal:



 I will make a list of five of the Processes on this list but not all 40 of them. I'm picking the Processes that look unfamiliar to me. So I can do some internet research and label them in this small list.

Processes List:

  • armsvc.exe - Adobe Update Service
  • csrss.exe - Client Server Runtime SubSystem
  • dwm.exe - The Ultimate Troubleshooter
  • igfxtray.exe - Intel Graphics Tray
  • smss.exe - Session Manager SubSystem

armsvc.exe - Adobe Update Service is a service that helps manually update Adobe Reader.

csrss.exe - Client Server Runtime SubSystem makes a Win32 API call, it is usually CSRSS which communicates with the operating system's Kernel to execute the API call. 

dwm.exe - The Ultimate Troubleshooter has the full database in a easy interface which makes the process of fine tuning your PC, or troubleshooting your computer's problems. 

igfxtray.exe - When you double click the Intel Graphics Tray on it enables you to quickly change the display resolution, save your current Display Scheme, or configure your onboard graphics card. 

smss.exe - Session Manager SubSystem purpose is to start, manage, and delete user sessions.


Task Manager Processes running in Safe Mode:



You can see the difference in these pictures between Normal and Safe Mode. There are less Processes in Safe Mode, less CPU Usage, and less Physical Memory. Then in normal there is more Processes, more CPU Usage, and more Physical Memory. We definitely have a less number of Processes running while in Safe Mode.

 PROJECT 20-4: Learning to Use Autoruns

Autoruns by TechNet and Sysinternals (technet.microsoft.com) is similar to, but gives more
information than does MSconfig. Download Autoruns and run it on your PC. How many
registry keys does Autoruns list that contain startup items on your PC? Use Msconfig to get
a similar list. Compare the list of startup items to that generated by Msconfig. Describe any
differences between the two lists.

Autoruns:
 Msconfig:
 
You can see a big difference between the programs here in the pictures. I prefer Autoruns because it is more detailed about everything I need to know for the computer. Msconfig I would recommend to a novice user because it's simpler. However, Msconfig doesn't give as much information specifically as Autoruns.

PROJECT 20-5: Using the Internet to Learn About Viruses

One source of information about viruses on the Web is F-Secure Corporation. Go to the
Web site www.f-secure.com, for information about viruses. Information about viruses
includes complete descriptions, symptoms, and solutions. Print a description of three viruses
from this Web site, with these characteristics:

  • One virus that destroys data on a hard drive
  • One harmless virus that only displays garbage on the screen
  • One virus that hides in a boot sector

The site also lists information about the most recent viruses. Search the Web site at
www.f-secure.com, list three recent viruses, and describe their payloads.


I will just link the information for each of the three viruses from the "www.f-secure.com" website.

The first virus that destroys data on the hard drive is a Worm. Here is the link for more information about the Worm.

http://www.f-secure.com/v-descs/magistr.shtml

The second virus that just displays garbage on the screen is called Leningrad. Here is the link for more information about Leningrad.

http://www.f-secure.com/v-descs/crash.shtml

The third stealthy virus that hides in a boot sector is called the Boot/Brain virus. Here is the link for more information about the Boot/Brain Virus.

http://www.f-secure.com/v-descs/brain.shtml

Saturday, November 17, 2012

Chapter 19 Projects

PROJECT 19-1: E-Mail Hoax

Search through your spam and junk mail for an e-mail you think might be a hoax. (Please don’t
click any links or open any attachments as you search.) Using the Web sites listed earlier in the 19 chapter for debunking virus hoaxes, search for information about this potential hoax. You
might need to enter the subject line in the e-mail message into a search box on the Web site.

I had an email in my junk mail about "24/7 Instant Approval! Apply Direct with a Lender Today!" ,and it was talking about lending money 24/7 instantly. But I honest to God feel like it's just a scam email like most of the emails in my junk mail. Where they are offering me Cruise deals for these unrealistic offers and that is basically it. Anything that just comes off as unrealistic is usually a scam. This email about lending money is just trying to lure me in for a scam.


PROJECT 19-2: Using Firefox

Go to the Mozilla Web site (www.mozilla.org) and download and install Firefox. Use it to
browse the Web. How does it compare to Internet Explorer? What do you like better about it?
What do you not like as well? When might you recommend to someone that they use Firefox
rather than Internet Explorer? Also, download the FoxFilter plug-in from www.mozilla.org
and install it. What are the differences between FoxFilter and the IE content filter?


I like Firefox myself better than Internet Explorer and there is a comparison to why I pick Firefox over Internet Explorer. There is more web page viewing space with out a lot of scrolling compared to other internet browsers with the Firefox browser. Firefox lets you surf the internet faster and more secure. The images and text are more clearer in Firefox than Internet Explorer. Here I will show you the difference!

Firefox:

Internet Explorer:


There really isn't much of a difference in my opinion between FoxFilter and the IE content filter because they both filter out inappropriate content.

PROJECT 19-3: Using a Port Scanner

Port scanning software can be used to find out how vulnerable a computer is with open
ports. This project will require the use of two computers on the same network to practice
using port scanning software. Do the following:

1. Download and install Advanced Port Scanner by Famatech at www.radmin.com on
Computer 1.
2. On Computer 2, make sure that Windows Firewall is turned on and that the Block all
incoming connections box is checked. Also, disable any third-party personal firewalls.
3. On Computer 1, start Advanced Port Scanner and make sure that the range of IP
addresses includes the IP address of Computer 2. Then click Scan.
4. Browse the list and find Computer 2. List the number and purpose of all open ports
found on your Computer 2.
5. On Computer 2, turn Windows Firewall off.
6. On Computer 1, rescan and list the number and purpose of each port now open on
Computer 2.
If Computer 2 has another personal firewall installed, turn on that firewall. On Computer 1,
rescan and list the number and purpose of each port now open on Computer 2 when the
personal firewall is running.

First I installed the program off of the website:




Second I started the scan after the program finished installing:


Third the scan finished and here is the end results:



PROJECT 19-4: Managing User Accounts

Do the following to experiment with managing user accounts:

1. Using Windows Vista, create a Standard user account and log on using that account. Can
you view the contents of the Documents folder for an account with Administrator privileges?

This is the new Standard user account I made with the Administrator account:


Here is the message I get when I try to access the Documents folder:


2. Using the Standard account, try to install a program. What message do you receive?

I am asked to login to the Administrator account.

3. What happens if you try to create a new account while logged on under the Standard account?

I am asked again to login to the Administrator account.

PROJECT 19-5: Using Password Checker

Microsoft offers a password checker for users to know the strength of their passwords.
To use the utility, go to the Microsoft Web site at www.microsoft.com and search for “Password Checker.” Use this free Microsoft utility to verify that a password you have made up is a strong password. Based on the measure of the strength of several of your passwords,
what do you think the password checker is looking for?

Weak Password:


Strong Password:



What is a strong password?




Friday, November 9, 2012

Chapter 18 Projects

PROJECT 18-1: Practicing TCP/IP Networking Skills

While connected to the Internet or another TCP/IP network, answer these questions:

1. What is your current IP address? 192.168.1.3

2. Release and renew your IP address. Now what is your IP address? 192.168.1.3

3. Are you using dynamic or static IP addressing? How do you know? I checked in the command prompt with "ipconfig/all" and checked if DHCP was enabled. The DHCP is in fact enabled meaning I am using a dynamic IP address.

4. What is your adapter address for this connection? D0-DF-9A-AE-7F-23

5. What is your default gateway IP address? 192.168.1.1

6. What response do you get when you ping the default gateway?



PROJECT 18-2: Researching Remote Assistance

A technician needs to know how to find information he needs to help users and troubleshoot
problems. Using sources you can trust, answer the following. List your source of
information for each question.

1. What are the steps to cancel a Remote Assistance invitation before it expires?


1. Open the Windows Remote Assistance window that is waiting for an incoming connection.
2. Click the "X" on the upper right corner of the window.
3. Click "Yes" when asked if you want to close the session.

2. What are the steps to extend a Remote Assistance invitation from six to 12 hours?

1. Click on start button and type in "System", choose the one which is labeled in the image below.
2. Choose "Remote Settings" in tasks list on the left.
3. Check "Allow Remote Assistance connections to this computer" box, and you can click on "Advanced".
4. Now you can extend the time of invitations in Vista Remote Assistance by resetting the number in box.


3. What are the steps to start a Remote Assistance session when using Windows Messenger?

 1. For vista click start, All programs, Accessiries and remete Desktop Connection. For xp, click Start, all programs, Accessories, Communication, and Remote Desktop.( After Service Pack 3 is a applied to Windoes XP, the location of remote Desktop on the start menu might change to Start, All Programs, Accessories).
2. Enter the IP Address or the host name of the computer to which you want to connect. Begin the host name with two bkackslashes as in // VistaFiteServer.
3. If you plan to transfer files from one computer to the other, click Options and then click the Local Resourses tab shown in the left side. Click more. Ckeck Drives. Click OK. Cklich Connect to make conection. Click Connect again when a warning box appears. If another warning , click Yes.
4. Log on using a user name and password for the remote computer.
5. To close the seccion just close the window.

4. What is the time until expiration for an invitation when using Windows Vista? When
using Windows XP?

The expiration limitations for using an invitation on Microsoft Windows Vista and Windows Xp are both 6 hours.

PROJECT 18-3: Investigating Verizon FiOS

Verizon (www.verizon.com) is currently offering an alternative to DSL and cable modem
for broadband Internet access. FiOS is a fiber-optic Internet service that uses fiber-optic
cable all the way to your house for both your residential telephone service and Internet
access. Search the Web for answers to these questions about FiOS:

1. Give a brief description of FiOS and how it is used for Internet access.



Source: http://www.whyisfiosbetter.jigsy.com/  (This was a very helpful website and I thought it would be useful to link it to this blog.)

2. What downstream and upstream speeds can FiOS support?

10gbps download 4gbps upload has been tested highest you will see sold is 50/20 or 35/35


3. When using FiOS, does your telephone voice communication share the fiber-optic cable
with Internet data? Yes


4. What does Verizon say about FiOS cabling used for television?

Verizon FiOS, the first fiber optic network used for TV and Internet service, is being hailed by experts as the future of telecommunications.

5. Is FiOS available in your area? No

PROJECT 18-4: Practicing Using FTP

Practice using FTP by downloading the latest version of Firefox, a Web browser, using three
different methods. Do the following:

1. Using your current browser, go to the Mozilla Web site at www.mozilla.org and download
the latest version of Firefox. What is the version number? What is the name of the
downloaded file? In what folder on your hard drive did you put the file?

1.The latest version I downloaded was Firefox 16.0.2 for Windows English.

2. This is the name of the file.


3.  Here is the path I downloaded the file: C:\Users\Joe\Downloads

2. Using your current browser as an FTP client, locate the same version of Firefox and the same
file at the Mozilla FTP site (ftp.mozilla.org) and download it to your PC. What is the path to
the Firefox file on the FTP site? In what folder on your hard drive did you put the file?

1. Here is the path for the download from the FTP client: ftp://ftp.mozilla.org/pub/firefox/releases/16.0.2/win32/en-US/

2. The same path I downloaded the first .exe file: C:\Users\Joe\Downloads


PROJECT 18-5: Teaching Yourself About Windows Meeting Space

Using the Windows Help and Support window, search for information on Windows Meeting
Space. Describe the tool. When would you want to use it? What can you do with Windows
Meeting Space? Set up and test the tool with a friend on a network connection.


When would you want to use it?

Windows Meeting Space can be used when you want to meet up with friends, family, fellow college students, or people inside your workplace.

What can you do with Windows Meeting Space?
  • Organizing, inviting, and viewing participants
  • Distributing an agenda, attendee list, and other documents
  • Including Local and remote attendees
  • Linking multiple activities
  • Viewing shared presentations
  • Sharing and distributing files
  • Passing notes
  • Supporting unsecured environments (such as customer sites and hotspots) that have no infrastructure by using the Microsoft P2P infrastructure