Free Essay

Faults Within Windows

In:

Submitted By d3bodagr3at
Words 984
Pages 4
Faults within Windows OS
POS355
August 24, 2015
Dr. Boyd

Faults within Windows OS
The security within an operating system is vital to the overall operation of your operating system, and in this case even more important to Windows OS because of how it is used across various platforms. The security within Windows is provided to protect your operating system from any unwanted visitors whether it be accidental or not (Stallings, 2015), but not all security is perfect. Sometimes security contains flaws and some flaws are bigger than others and some flaws can destroy your system from the inside out. These faults can be patched and some are so minute that they can be resolved with something as little as switching the settings. Switching the settings sounds like something that would never be a fault, but what happens when the fault that was created was man made. The fault that lies within Windows was a nuisance but the real issued lied with how many users decided to handle that nuisance.
There are three different types of hackers trying to gain access to your system. These three hackers are called the Masquerader, the Misfeasor and the clandestine user. A Masquerader is someone who is not authorized but gains access and infiltrates your systems access controls to exploit your account ("Windows 7 Known Security Flaws", 2009). A Misfeasor is a person who has been granted access to data and resources but misuses and takes advantage of the information he has received ("Windows 7 Known Security Flaws", 2009). A clandestine user seizes control of a system and uses the control to gain access to controls ("Windows 7 Known Security Flaws", 2009). These intruders are the reason computers need security. These users create malware to steal information from you. This is made possible when your computer lacks the security needed to ensure you are notified of any outside interference. Some of these issues are created by the user and some are a computer related problem, but within Windows 7 the user creates the problem.
One of the biggest flaws within the Windows 7 system was its security pop ups. This may sound like a very small problem because it is, but what happens as a result of this fault could make the problem a very huge problem. The end users had endless pop ups that were meant to be designed to help but ultimately did more harm than good. This fault was created as a form of protection but became more of a nuisance. The security system within Windows 7 was created to inform users of someone trying to gain unauthorized access to your system, but it managed to inform users of everything no matter the severity of the issue ("Windows 7 Known Security Flaws", 2009)..
This created a spiral effect and made it impossible to determine if the threat was real or not. The notification occurred when you downloaded a new program that needed connection and when you actually had an intruder. This would leave users baffled and not knowing what was real and what was fake. This resulted in many users switching the settings from high notification security to medium notification security. The problem that occurred after switching your settings allowed malicious software bugs to go about their business within your operating system. The good thing is all the notifications are gone, but the bad thing is you just made the problem worse and allowed entrance to your operating system because it was impossible to detect when your computer was being compromised. The malicious bit of code operating within the medium setting could be used to turn off the user warning all together and allow a piece of software to gain administrative rights without any type of system notification. Windows then created a new operating system called Windows Vista that allowed the user to completely remove any and all security notifications like that was the best answer to their problem.
The true solution to this problem was very easy and for the sake of your information was the smartest route. Keep your security settings on high or do a regular check up on your computer to ensure that your system has not been compromised. A lot of this issue was man made because people were tired of being bombarded with excessive notifications, but the solution to their problem was simple. If the user reframes from using ill-advised sites and are doing a periodic virus scan medium settings are fine. Most security systems are not meant to take on the duty of being your only form of security, the security system is provided to help the user with things that may be out of his control. At no point should a user rely solely on the use of an operating systems security, but in the situation they do there are plenty of resources available to research and weigh their pros and cons.
Security faults exist and some are user encouraged. These faults are created because users believe the little adjustments they make to comfort them mean nothing. In reality these little minor issues sometimes become issues that are bigger and that’s when making sure you are notified if your compromised plays a huge role. Windows fault that is more of nuisance then a permanent problem, but the incorrect adjustments made within the settings create a landslide of a ripple effect with catastrophic results. Enjoy Windows OS for what it is and monitor it like the information you have on your computer is valuable. You never know when someone is aiming for your computer, so if you’re going to change settings always ensure that your consistently scan for viruses.

References
Windows 7 Known Security Flaws. (2009). Retrieved from http://www.aspfree.com/c/a/Windows-Security/Windows-7-Known-Security-Flaws/
Stallings, W. (2015). Operating Systems: Internals and Design Principles (8th ed.). Prentice Hall. (Stallings, 2015)

Similar Documents

Premium Essay

Nt1310 Unit 3 Assignment 1 Fault Analysis

...computer, I perceive that there is a typical form of blue screen highlighted. The Bug Check String which remains associated along with a similar type of fault reads as: SYSTEM_THREAD_EXCEPTION_NOT_HANDLED and the Bug Check Code get highlighted as: 0x1000007e. What must I do? "Fake" high cpu usage on Windows 10 It has been quite some time from now on that I keep experiencing my laptop fan to have become a lot noisier. In fact; I find that the “Task Manager” process keeps consuming a high amount of memory and CPU. Also; within a few seconds, I note that the unusually high...

Words: 1248 - Pages: 5

Premium Essay

Contrast and Comparison of Operating Systems

...Microsoft Windows, and MacOS systems. In particular we will contrast and compare the different operating systems in regards to memory management, processing, file management and security. Operating systems at the core is all about the kernel. The kernel in all of the operating systems is the main component that is responsible in the management of memory, processing, file management and security. Contrast and Comparison of Memory Management within Operating Systems Memory management in comparison and contrasts between the different operating systems is due to the way the kernel works in conjunction with the memory. Since each operating system has different kernel’s they each have similar and different ways that they manage memory. Contrasts and comparisons on Mac OS, Windows, and UNIX/Linux are described below. 1. UNIX: Though UNIX and Linux are extremely similar when it comes to how things work internally; there are slight differences that make UNIX distinct from its counterpart. One process that UNIX utilizes is known as swapping; this is done by moving chunks of the Virtual Memory (called pages), out of the main memory and moving others in. In order for this process to work at its best, those pages that are needed must be accessible in the Main Memory at the demand of the CPU. When a page is expected to be needed in the very near future it is termed a resident set. If the CPU attempts to access a page that is no longer available in the Main Memory, a page fault will occur...

Words: 3967 - Pages: 16

Free Essay

Ipd Capstone

...copyright laws is your responsibility.  By using or providing feedback on this documentation, you agree to the license agreement below. If you are using this documentation solely for non-commercial purposes internally within YOUR company or organization, then this documentation is licensed to you under the Creative Commons Attribution-NonCommercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA. This documentation is provided to you for informational purposes only, and is provided to you entirely "AS IS".  Your use of the documentation cannot be understood as substituting for customized service and information that might be developed by Microsoft Corporation for a particular user based upon that user’s particular environment. To the extent permitted by law, MICROSOFT MAKES NO WARRANTY OF ANY KIND, DISCLAIMS ALL EXPRESS, IMPLIED AND STATUTORY WARRANTIES, AND ASSUMES NO LIABILITY TO YOU FOR ANY DAMAGES OF ANY TYPE IN CONNECTION WITH THESE MATERIALS OR ANY INTELLECTUAL PROPERTY IN THEM.    Microsoft may have patents, patent applications, trademarks, or other intellectual property rights covering subject matter within this documentation.  Except as provided in a separate agreement from Microsoft, your use of this document does not give you any license to these patents, trademarks or other intellectual property. Information in...

Words: 15668 - Pages: 63

Free Essay

Itt Tech Lesson 2

...Lesson 2 Installing Microsoft Windows Server 2008 Knowledge Assessment Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. The ability to use the installation process to fix problems with an existing Windows Server system is called ___ _______. 2. Installation of just the necessary components for a particular server role, without the GUI and other software features, is called _________ 3. The ____ ______ screen appears by default when the Windows Server 2008 operating system is first installed. 4. A(n) ___ _____ offers the best performance of any multi-disk configuration option within the Disk Management MMC, but does so at the expense of fault tolerance. 5. The feature that allows users on different computers to access the Internet through a single connection is called___ _______. 6. The ___ _______ provides a single point of administration to configure networking and firewall configuration tasks on a Windows Server 2008 computer. 7. The setting describing the network environment, such as home or public network, is called the ____ ______. 8. Unsolicited inbound traffic can be blocked through the use of the ____ ___. 9. The network location setting controls the behavior of __________. 10. Once a disk is converted from a basic disk to a(n) __ _____, it can only be accessed only by operating...

Words: 803 - Pages: 4

Premium Essay

Memory Management

...different parts to types of memory, primary, also referred to as main, and secondary. The former has two parts, one part for the kernel, which is reserved for the operating system, and the other part for the programs currently being executed. Memory management units must work efficiently in transferring information between primary and secondary. In order for this to succeed, there are a few requirements that memory management units must meet in order to fulfill the demands of users. Memory management units require relocation, protection, sharing, both local and physical organization, among processes in both primary and secondary memory. Two examples of operating systems that meet these requirements, but yet both manage memory differently are Windows and OS X, which is used by Macintosh as an operating system. Since main memory is shared among different types of processes, it is very difficult for a programmer to tell which processes will be in main memory at the time of execution. In order to fully maximize processor utilization, it would be beneficial to be able to swap active processes in and out of main memory providing a broader spectrum of ready processes to execute. If a program is swapped out into a hard disk from main memory, it would be very...

Words: 2327 - Pages: 10

Premium Essay

Some

...Size), the amount of virtual address space used, and other tidbits. Within the memory descriptor we also find the two work horses for managing program memory: the set of virtual memory areas and the page tables. Gonzo’s memory areas are shown below: Kernel memory descriptor and memory areas Each virtual memory area (VMA) is a contiguous range of virtual addresses; these areas never overlap. An instance of vm_area_struct fully describes a memory area, including its start and end addresses, flags to determine access rights and behaviors, and the vm_file field to specify which file is being mapped by the area, if any. A VMA that does not map a file is anonymous. Each memory segment above (e.g., heap, stack) corresponds to a single VMA, with the exception of the memory mapping segment. This is not a requirement, though it is usual in x86 machines. VMAs do not care which segment they are in. A program’s VMAs are stored in its memory descriptor both as a linked list in the mmap field, ordered by starting virtual address, and as a red-black tree rooted at the mm_rb field. The red-black tree allows the kernel to search quickly for the memory area covering a given virtual address. When you read file /proc/pid_of_process/maps, the kernel is simply going through the linked list of VMAs for the process and printing each one. In Windows, the EPROCESS block is roughly a mix of task_struct and mm_struct. The Windows analog to a VMA is the Virtual Address Descriptor, or VAD; they are...

Words: 1340 - Pages: 6

Premium Essay

Memorymanagement

...using which processes can run even when they are not entirely in memory. Main memory is treated as an array of pages thus separating in to logical memory and physical memory, thus the size of the physical memory is not a limitation for the user. Memory management in Windows The physical memory in Windows is divided into a number of physical pages .If the pages are divided in to say 4KB size causes external fragmentation of memory. If the pages are divided into 2MB pages this causes internal fragmentation. Windows uses large pages to better the performance of translation look aside buffer TLB( is a cache used by memory management hardware to improve virtual address translation speed).The physical pages are in one of the following states free page, zeroed page, modified page, standby page ,bad page, transition page, valid page. Valid pages are in processes page tables ,while pages in other states are separated in to list based on their state. Virtual memory in Windows is implemented by demand paging with clustering. Demand paging is method in which the pages are loaded in to the memory as they are required in the course of the process’s execution. Clustering is used by Windows in this when there is a page fault (page is required for the further execution of the process) along with the page ,many other pages are also moved in to the physical memory. The free pages are handled by the virtual memory manager. Every process has a working set minimum(it is the minimum number of...

Words: 806 - Pages: 4

Free Essay

Microprocessor

...REFERENCES File System Definition: Computers use particular kinds of file systems to store and organize data on media, such as a hard drive, the CDs, DVDs, and BDs in an optical drive or on a flash drive. Any place that a PC stores data is employing the use of some type of file system. A file system can be thought of as an index or database containing the physical location of every piece of data on a hard drive. A file system is setup on a drive during a format. 1) In a computer, a file system (sometimes written filesystem) is the way in which files are named and where they are placed logically for storage and retrieval. The DOS, Windows, OS/2, Macintosh, and UNIX-based operating systems all have file systems in which files are placed somewhere in a hierarchical (tree) structure. A file is placed in a directory (folder in Windows) or...

Words: 14273 - Pages: 58

Free Essay

Essay 5.1

...NT1210: Introduction to Networking_V1.0 | Virtual Computing | Comparing Microsoft and VMware solutions | | Jacob D. Smith | 10/21/2015 | | With so many features called by differing names in each virtualization platform, comparing Microsoft and VMware virtualization solutions can sometimes seem a bit like comparing apples and oranges.  But, I’ll try to boil things down to a real-world perspective based on my experience implementing both solutions in the field throughout my career.  In this article, I’ll provide a summarized comparison of the feature sets provided by each of these latest releases using the currently available public information from both Microsoft and VMware as of this article’s publication date for additional reference. How to compare? Rather than simply comparing feature-by-feature using just simple check-marks in each category, I’ll try to provide as much detail as possible for you to intelligently compare each area.  As I’m sure you’ve heard before, sometimes the “devil is in the details”. For each comparison area, I’ll rate the related capabilities with the following color coded rankings: * Supported – Fully supported without any additional products or licenses * Limited Support – Significant limitations when using related feature, or limitations in comparison to the competing solution represented * Not Supported – Not supported at all or without the addition of other product licensing costs In this Essay, I’ve organized...

Words: 3954 - Pages: 16

Premium Essay

Mobility of Factors of Production

...CURRICULUM VITAE ISAIAH MWAURA KAGURANI P.O Box 367-00900 Kiambu Tel: 0716577528 E-mail:isaiahmwaura@gmail.com Personal Details Date of Birth: Marital Status: Gender: Age: Languages Spoken: I.D Number: Religion: October 1990 Single. Male 23Years English, Swahili, Kikuyu. 27930150 Christian Career Objective To work in a challenging environment where I would utilize my acquired knowledge to contribute to the Organization’s objective through individual effort and team work and at the same time gaining valuable Experience. Personal Attributes I am young, transparent, dynamic and well organized gentleman with high motivation towards greater achievements and have a passion for excellence. . Discipline, humility, team work, hard work and professionalism are my foundation to success. CURRICULUMVITAE Education Summary JAN 2010-TO DEC 2012: PRESBYTERIAN UNIVERSITY OF EAST AFRICA Bachelors Degree in Computer Science JAN 2009-APRIL 2009: CATHOLIC MISSION IKINU Certificate in computer applications Passed excellently average 85 % 2005-2008: HIGH SCHOOL SENIOR CHIEF KOINANGE Kenya Certificate of Secondary Education. Attained B- 1996-2004: SCHOOL KIAIBABU PRIMARY Kenya Certificate of Primary Education. Attained 346 out of 500 (B) Work Experience Gelati Kenya Limited Customer Support Engineer Jan 2013 to Date. • Deliver service and support to end-users using and operating automated call distribution phone software, via remote connection or over...

Words: 697 - Pages: 3

Free Essay

Fault Tolerance Disaster Recovery

...Fault Tolerance Disaster Recovery Kevin Bowman POS/421 Jeffery Comrie University of Phoenix April 15, 2013 In the world of Information Systems and network administration, there comes a time when system administrators and developers have to take into consideration the possibility of critical system failure which could lead to complete data loss. When it comes to technology and equipment the question is never if it fails rather when it fails. “Regardless of how bulletproof the design is, how fault-tolerant the system, or how well trained the operators and technicians, system failures are still possible.”(Witt, 2009) In the event the system does fail either by, disk failures, administrative errors, natural disasters, or unauthorized changes to data, a recovery plan must be in place to minimize downtime. In the scenario as described for Kudler Fine Foods, there would be a backup drive at each location, where daily backups of data will take place and those backups will be stored on a tape drive that way information is not lost at any time and stored offsite. The files would be stored off site in the event there is a natural disaster or fire or some other catastrophic event to take place that actually destroys the servers and hard drives, the tape drives being stored offsite preserves the data once a new server is in place. Data redundancy is a key aspect to recovering from such system failures. In the case of restoring Active Directory Directory Services in the event...

Words: 486 - Pages: 2

Free Essay

High Availablity Blueprints

...the proper installation of Microsoft’s Cluster Server and several of Microsoft’s cluster-aware applications. He follows this with a brief discussion of disaster-tolerant architectures, and concludes with a case study. High-Availability Topics Rupani begins with a definition of several high-availability concepts, such as planned and unplanned outages, single points of failure, mean time between failures and interruptions, fault tolerance, and redundancy. He then provides an overview of several important high-availability technologies. RAID RAID technology is the most common method to provide data resiliency. With RAID (Redundant Arrays of Independent Disks), data is redundantly stored on multiple disks such that, should one disk fail, the data can still be reconstructed. RAID arrays typically provide a hot-swappable capability so that a failed disk can be replaced without taking down the array. There are several configurations of RAID. Most stripe data across multiple disks to achieve improved performance. Mirrored disks, used by fault-tolerant systems and designated as RAID 1, provide an entire copy of the database on a backup disk. The most common form of RAID in use today is RAID 5, which provides one additional disk and which stripes data and parity across disks. Since there is one extra disk, the data can be reconstructed should any one disk fail. There are several other forms of RAID designated as RAID 0, 2, 3, and 4, and combinations of these. Rupani...

Words: 2470 - Pages: 10

Free Essay

A Fully Functional Network Design for Shelly Fashion

...NETWORKS AND TELECOMMUNICATONS A FULLY FUNCTIONAL NETWORK DESIGN FOR SHELLY FASHION PRESENTED BY: Osazuwa Olufemi George Business requirement Shelly fashion is a clothing boutique that sells clothes to both male and female customers. Their goal is to be the biggest retail clothing store in the country which aims to provide customers from the ages of 5 to 45 years of age a wide variety of quality clothing. The clothing retail store is open six days a week to customers who come in and buy their clothes directly at the store. The transaction is recorded and stored on the store’s computer with a Store Management Software which keeps track of inventory, sales, and computes the profits of the retail store biannually. Shelly fashion is looking to expand its reach using internet technology so it would be able to meet with the growing number of customers and also to connect all its other and future branches together to form a centralized network. With the network the retail store would be able to launch its home delivery option where customers would be able to buy clothes online and have their goods brought to them at their homes without having to be physically present at store. The business owners want to embark on a project to set up a telecommunications network which should be able to reach their business requirements. Shelly fashion’s business requirements for the proposed network are as follows: * Reduce operating cost by cutting cost too make telephone calls...

Words: 2953 - Pages: 12

Free Essay

Management

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |POS/355 Version 9 | | |MU12BIT08 | | |Introduction to Operational Systems | | |Wk 1 June 10 | | |Wk 2 June 17 | | |Wk 3 June 24 | | |Wk 4 July 01 | | |Wk 5 July 08 ...

Words: 2247 - Pages: 9

Premium Essay

Hi Hi Hi

...which is the understanding that all parties agree on the content of the contract before it is finalised. The parties must also have the intention to be legally bound and must be in a legal capacity to enter into the contract. In this case I do not believe there is a contract as the shop keeper had the golf clubs in the window, and this meant the difference between an “offer” and a “willingness to negotiate”. This would mean that when the customer entered the shop and stated that he would like to purchase the golf clubs the contract had not been formed, because the shopkeeper is well within his rights to refuse the customer, even though the shopkeeper had the product in the window for purchase. This would not be the case if the product in the window had been labelled as an offer, in which case the customer could then enter the shop and agree to the offer. So, the golf clubs in the window was merely a willingness to negotiate. The same can be said for the legal case Pharmaceutical Society of Great Britain vs Boots the Chemists (1952). This is a case where determining the point of the “sale” was crucial. In this case it was determined that the goods on display within the pharmacy were a willingness to negotiate and not an offer, and there was only acceptance when the customer took the product to the register to pay and the pharmacist then agreed to sell that product to the customer. Because of laws that require listed poisons to be supervised by a registered pharmacist, that sale...

Words: 1405 - Pages: 6