Microsoft Environment Analysis

In: Computers and Technology

Submitted By flippity
Words 571
Pages 3
Donell Jones
NT2580

Unit 2 Assignment 2: Microsoft Environment Analysis

5 vulnerabilities for this workgroup LAN based on the Microsoft Security Advisories numbers.
2755801, 2719662, 2854544, 2846338, 2847140.
2846338 involves privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority.
Three vulnerabilities and Solutions related to client configurations.
Advisory Number: 2719662
Microsoft is announcing the availability of an automated Microsoft Fix it solution that disables Windows Sidebar and Gadgets on supported editions of Windows Vista and Windows 7. Disabling Windows Sidebar and Gadgets can help protect customers from potential attacks that leverage Gadgets to execute arbitrary code. Customers should consider the following ways that an attacker could leverage Gadgets to execute arbitrary code: Microsoft is aware that some legitimate Gadgets running in Windows Sidebar could contain vulnerabilities. An attacker who successfully exploited a Gadget vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could create a malicious Gadget and then trick a user into installing the malicious Gadget. Once installed, the malicious Gadget could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. In addition, Gadgets can access your computer's files, show you objectionable content, or change their behavior at any time. Gadgets could also potentially harm your computer. Recommendation: Customers who are concerned about vulnerable or malicious Gadgets should apply the automated Microsoft Fix it solution…...

Similar Documents

Microsoft

... can always look at the old invoice’s to check how the invoice should be made. After creating the New Monthly invoice’s the invoices should be sent out as follow. 1. Miklos/Lynx Scan the Invoice & send as a PDF File... Then email to Cheryl White & CC the email to Ray 2. Jumar/Lowe’s Scan the Invoice & send as a PDF File... Then Email To 'Kevin Tate' & CC the email to Ray, Don Pooley, & 'Vanessa Trueman' 3. GDIT General Dynamics Scan the Invoice & Send as a PDF File... Then Email To 'Tetterton, Susan' & CC the email to Ray 4. Pragmatics Fax the invoice. Look in Microsoft word for Fax cover sheet... the Fax # 1-703-761-4089, To Accounts Payable, Company: Pragmatics. Then Attach the Fax Verification report to invoice. 5. BPS Business Performance Systems Scan the Invoice & send as a PDF File... then email to David Isaac & CC to Ray 6. SRA US Marshalls Doesn’t get sent out, the invoice is for are records. Bi Weekly Billing The Only Bi Weekly Billing is For Project SAIC (SAIC-DHS-EA-FAS) After Creating the Invoice for SAIC, Scan The Invoice & Send as a PDF File... Then Email To 'Porcaro, Stacey W.' & CC the email to Ray, Dittmar Cynthia C, & Bailey, Patricia E.' Weekly Billing There are three projects that are billed every week. 1. Lockheed Martin (CLOCS) After putting the time & expenses into VIP for Don Langguth print out reports from Journyx, VIP, QuickBooks then give......

Words: 2910 - Pages: 12

Microsoft

...Strategic Initiative Microsoft The beginning of the computer generation started in 1975 with Paul Allen and Bill Gates. Throughout the years the company has developed into one of the top leading company within the computer, IT, gaming system, and music environment. With any major company its progress is the development of a strategic plan implemented into the development and increase of revenues. For a Microsoft the profit margins have developed and improved through the years alone with it is planning and developing products. The discussion of Microsoft’s strategic planning, financial planning, and the risks the business takes to increase it financial gains. Strategic Planning Microsoft has witnessed important progress up until fiscal year 2012 in terms of revenue, cash flow, and ensuring the liquidity of its assets to reassure investors over their interests. The Microsoft Investor Relations Annual Reports (2013) website states that the fruition of Microsoft’s performance manifested in the past few years with its continual revenue growth, which rose 12% from 2010 to reach $69.9 billion in 2011, and continued to rise to a record $73.7 billion in 2012. Furthermore, cash flow from operations went up $2.9 billion in the 2011 fiscal year to reach $27 billion, and climbed another $4.6 billion to reach $31.6 billion in fiscal year 2012. The Microsoft Investor Relations Annual Reports (2013) website states that the measures taken to facilitate liquidity proved to...

Words: 1788 - Pages: 8

Microsoft

... 1983, was for the MS-DOS operating system and had the distinction of introducing the mouse to a broad population. Word 1.0 could be purchased with a bundled mouse, though none was required. Following the precedents of LisaWrite and MacWrite, Word for Macintosh attempted to add closer WYSIWYG features into its package. Word for Mac was released in 1985. Word for Mac was the first graphical version of Microsoft Word. Word is used for Scripts and other writing pieces. Excel Microsoft Excel is a spreadsheet program that originally competed with the dominant Lotus 1-2-3, but eventually outsold it. It is available for the Windows and OS X platforms. Microsoft released the first version of Excel for the Mac OS in 1985, and the first Windows version (numbered 2.05 to line up with the Mac and bundled with a standalone Windows run-time environment) in November 1987. Outlook/Entourage Microsoft Outlook (not to be confused with Outlook Express) is a personal information manager and e-mail communication software. The replacement for Windows Messaging, Microsoft Mail, and Schedule+ starting in Office 97, it includes an e-mail client, calendar, task manager and address book. On the Mac OS, Microsoft offered several versions of Outlook in the late 1990s, but only for use with Microsoft Exchange Server. In Office 2001, it introduced an alternative application with a slightly different feature set called Microsoft Entourage. It reintroduced Outlook in Office 2011, replacing......

Words: 497 - Pages: 2

Microsoft

...M I C R O S O F T T E C H N O L O G Y A S S O C I AT E Student Study Guide EXAM 98-366 Networking Fundamentals Preparing for MTA Certification for Cert ca n Certification MICROSOFT TECHNOLOGY ASSOCIATE (MTA TECHNOLOGY ASSOCIATE (MTA) ECHNOLOGY C (MTA A) STUDENT STUDY GUIDE F UDY FOR IT PROS 98-366 Networking Fundamentals Authors Shari Due (Networking). Shari is an IT Network Specialist Instructor at Gateway Technical College in Racine, Wisconsin where she has worked for the past 15 years. Previously, she worked for Digital Equipment Corporation (DEC) in Elk Grove, Illinois. She holds a Bachelor of Science from the University of Wisconsin-Parkside in Math and Economics with a minor in Computer Science and a MBA from the University of Wisconsin-Eau Claire. Shari’s current industry certifications include: Comptia Server+, Linux+, A+, Network+, and i-Net+. Her past certifications include: MCSE-NT 4.0, CCNA, and Pathworks for Macintosh. She is a Cisco Certified Instructor for Cisco’s Network Academy and teaches the CCNA curriculum. She is the author of Advanced WordPerfect Using Macro Power: A Guide for VMS and DOS Users from Digital Press. Patricia Phillips (Lead Author and Project Manager). Patricia taught computer science for 20 years in Janesville, Wisconsin. She served on Microsoft’s National K-12 Faculty Advisory Board and edited the Microsoft MainFunction website for technology teachers for two years. For the past five years she has worked with Microsoft...

Words: 12317 - Pages: 50

Microsoft Environment Analysis

...Donell Jones NT2580 Unit 2 Assignment 2: Microsoft Environment Analysis 5 vulnerabilities for this workgroup LAN based on the Microsoft Security Advisories numbers. 2755801, 2719662, 2854544, 2846338, 2847140. 2846338 involves privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority. Three vulnerabilities and Solutions related to client configurations. Advisory Number: 2719662 Microsoft is announcing the availability of an automated Microsoft Fix it solution that disables Windows Sidebar and Gadgets on supported editions of Windows Vista and Windows 7. Disabling Windows Sidebar and Gadgets can help protect customers from potential attacks that leverage Gadgets to execute arbitrary code. Customers should consider the following ways that an attacker could leverage Gadgets to execute arbitrary code: Microsoft is aware that some legitimate Gadgets running in Windows Sidebar could contain vulnerabilities. An attacker who successfully exploited a Gadget vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could create a malicious Gadget and then trick a user into installing the malicious Gadget. Once installed, the malicious Gadget could run arbitrary code in the context of the current user. If the current user is logged on with...

Words: 571 - Pages: 3

Microsoft

...In the late 1990s, Microsoft became so inconceivably rich and mighty that the U.S. government hauled the company into court and threatened to break it up over anti-trust violations. Microsoft agreed to end its unlawful monopolistic practices after the Department of Justice charged that the company used one-sided contracts that stifled competition and maintained its monopoly position. Microsoft was accused of constructing a barrier of exclusionary and excessively limiting licensing agreements to prevent others an opening to develop and market competing products. The Department charged that Microsoft used the following unfair practices: * Exclusionary Per Processor Licenses * Unreasonably Long Licenses * Restrictive Non-Disclosure Agreements The settlement ends these exercises and will help to correct the effects of Microsoft's past illegal behavior, is effective immediately and will be in effect for six and a half years. Since 1988, Microsoft's share of the market has never dropped below 70 percent. However, Microsoft's loss of control has long been evident. The stock is still exchanging at about half the level it reached at the height of the tech boom 13 years ago. The change in personal computing device adoption has drastically weakened the rule of the Windows operating system platform. As recently as three years ago, Microsoft's Windows was still completely dominant—the platform ran 70% of personal computing devices. Now, thanks to the rise of Google's......

Words: 312 - Pages: 2

Microsoft

... friends computer that I don’t have to do a lot of research to figure out how to navigate the operating system. If I were to work on a Mac, then I would have to research and play around with it for some time till I got the jist of it; even then, I might not be able to navigate everywhere I needed to go. The cons are there are not a lot of options to pick from. Windows may have things you don’t like about it and unless you buy a different computer, your pretty much stuck using Windows as your operating system. I do believe that Microsoft has bridged a significant gap between technology and the lay-person. They have enabled everyone, young/old, male/female, educated/untrained to have access to technology. Without the efforts of Microsoft, I don't believe personal computing would be as pervasive as it is today. Today, however, I believe that MS stifles technology. They seems more marketing-centric than technology-centric these days. Instead of providing clean, efficient interfaces, each release of an MS product becomes bloated with useless features that the customer never asked for. Marketing seems to have run amuck at MS. I am glad to see open source restoring some sanity into personal computing. Efforts such as Open Office, Linux and Mozilla bring a breath of fresh air into an otherwise stifling and oppressive computing environment. 2. Our society seems undecided on how to approach hackers. On one hand, laws are in force that requires criminal...

Words: 837 - Pages: 4

Microsoft

.... ------------------------------------------------- 1982 March 24. Microsoft U.K. Ltd. (United Kingdom) is incorporated. June 28. Microsoft announces a new corporate logo, new packaging, and a comprehensive set of retail dealer support materials. ------------------------------------------------- 1983 February 18. Paul Allen resigns as Microsoft's executive vice president, but remains on the Board of Directors. May 2. Microsoft introduces the Microsoft Mouse. September 29. Microsoft introduces Word for MS-DOS 1.00. November 10. Microsoft unveils Microsoft Windows®, an extension of the MS-DOS operating system that provides a graphical operating environment. The first retail version of Windows would not ship until November 1985. ------------------------------------------------- 1984 January 24. Microsoft ships BASIC and Multiplan simultaneously with the introduction of the Macintosh, becoming a leader in developing software for Apple computers. July 11. Microsoft Press introduces its first two titles: Cary Lu's The Apple Macintosh Book and Peter Norton's Exploring the IBM PCjr Home Computer. ------------------------------------------------- 1985 August 12. Microsoft celebrates its 10th anniversary with Fiscal Year 1985 sales figures of $140 million. September 3. Microsoft selects the Republic of Ireland as the site of its first production facility outside of the United States to produce software products to be sold in the European market. November 20.......

Words: 7316 - Pages: 30

Unit 2 Assignment 2 : Microsoft Environment Analysis

...Elvie Bramich Unit2 Assignment 2 : Microsoft Environment Analysis 1. WHAT VULNERABILITIES EXIST FOR THIS WORKGROUP LAN BASED ON ADVISORIES?LIST FIVE OF THEM. Answer: 2755801, 2719662, 2854544, 2846338, 2847140. 2. DO ANY VULNERABILITIES INVOLVE PRIVILEDGE ELEVATION?IS THIS CONSIDERED A HIGH-PRIORITY ISSUE? Answer: 2846338 involves privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority. 3. IDENTIFY AND DOCUMENT AT LEAST 3 VULNERABILITIES AND THE SOLUTIONS RELATED TO THE CLIENT CONFIGURATIONS. Answer: Three vulnerabilities and Solutions related to client configurations. Advisory Number: 2719662 Microsoft is announcing the availability of an automated Microsoft Fix it solution that disables Windows Sidebar and Gadgets on supported editions of Windows Vista and Windows 7. Disabling Windows Sidebar and Gadgets can help protect customers from potential attacks that leverage Gadgets to execute arbitrary code. Customers should consider the following ways that an attacker could leverage Gadgets to execute arbitrary code: Microsoft is aware that some legitimate Gadgets running in Windows Sidebar could contain vulnerabilities. An attacker who successfully exploited a Gadget vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An...

Words: 468 - Pages: 2

Business Analysi

... arrived with the acquisition of NeXT Step Computers Inc. in 1997 and its CEO, Steve Jobs. So, how did the company that invented the personal computer find itself in this situation, and how did it recover? An environmental analysis of Apple’s corporate history will examine the reasons including its competition with Microsoft, leadership changes, predatorial marketing and pricing practices, and the proliferation Intel chips and boards. Finally, to understand Apple’s recovery it is vital to study the decision to rehire Steve Jobs, initiate production of entry-level computer systems, introduce a new operating system, and enter the digital music market. Apple Falls far from the Tree Perhaps the greatest mistake Apple made was in dropping litigation against Microsoft over copyright infringement of the Macintosh Operating System. In 1985 with the release its Windows 1.0, Microsoft had seemingly copied the Macintosh Operating System. The similarities between Windows 1.0 and the Macintosh o/s were staggering, including the use of a mouse, a drag and drop interface, and tiled graphics. Apple viewed the move as blatant piracy and sued Microsoft for copyright infringement. To resolve the dispute outside of court, a meeting was arranged between John Sculley and Microsoft Chairman, Bill Gates. In the meeting, Sculley agreed that to drop its suit against Microsoft if it agreed to delay its release of its new spreadsheet program, Excel. ......

Words: 3798 - Pages: 16

Nt2580 Unit 2 Assignment 2: Microsoft Environment Analysis

...Unit 2 Assignment 2: Microsoft Environment Analysis 1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them. Answer: 2755801, 2719662, 2854544, 2846338, 2847140. 2. Do any vulnerabilities involve privilege elevation? Is this considered a high-priority issue? Answer: 2846338 involves privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority. 3. Identify and document at least three vulnerabilities and the solutions related to the client configurations. Answer: Three vulnerabilities and Solutions related to client configurations. Microsoft is announcing the availability of an automated Microsoft Fix it solution that disables Windows Sidebar and Gadgets on supported editions of Windows Vista and Windows 7. Disabling Windows Sidebar and Gadgets can help protect customers from potential attacks that leverage Gadgets to execute arbitrary code. Customers should consider the following ways that an attacker could leverage Gadgets to execute arbitrary code: Microsoft is aware that some legitimate Gadgets running in Windows Sidebar could contain vulnerabilities. An attacker who successfully exploited Gadget vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could create a malicious Gadget and......

Words: 285 - Pages: 2

Job Analysi

... organizations that they may be experiencing. These types of problems in organizations can range from employee turnover, employee theft, and employee attitude in the work environment. Researchers can get access to data by looking in major publications or journals produced by associations, and private entities, or by attending annual conferences. Industrial/Organizational psychologists can use different research methods that would include the basic methods, procedures, techniques, and tools used to conduct important research. These basic techniques of scientific method are inductive and deductive reasoning, development of research questions, hypothesis creation, design and implementation of studies, and the nature and definition of constructs form the basis the general areas of Industrial/Organizational psychology (Spector, 2012). Industrial/Organizational psychologists also use many different statistical techniques to analyze the data that important research produces. When looking at Descriptive statistics which is a term given to the analysis of data which help describe, show or summarize data in a meaningful way such that patterns might emerge from the data gathered. Though Descriptive statistics do not allow us to make any conclusions beyond that data that was analyzed or reach any type of conclusion regarding the hypotheses that might have been made. We use descriptive statistics to explain what is happening with the data. With inferential statistics, they would be...

Words: 2421 - Pages: 10

Microsoft

... areas in China. There are six regions in China, Northeast China, North China, East China, Southwest China, Northwest China and South Central China. But the levels of economic development between different regions are totally different. There are three most economically developed zones in China, they are: the Yangtze River Delta Economic Zone in East China, the Pearl River Delta Economic Zone in South Central China and the Bohai economic zone in North China. There are three typical cities in these three economic zones, Shanghai, Beijing and Guangzhou. Then we pay attention to the inequality between rich and poor people in these regions. There is a huge gap between the rich people and ordinary people in China today. There are some reasons, which cause such inequality in China. First, it is the unbalanced economic development between regions. The north, south and east China are developing better than the west and central part. Second, the income inequality between jobs. Third, the gap power corruption factors also have a negative impact on such inequality. Forth, we cannot overlook the reason of the unequal opportunities. There is a specific example of opportunities unequal in China. In recent years, there is a popular word to describe a group of people whose parents are very rich---second generation rich. This kind of people does not need to do anything else and they can have good life condition depend on their parents since they are born. They drove luxury cars, and......

Words: 590 - Pages: 3

Assignment 2.4 Microsoft Environment Analysis

...Unit 2 Assignment 2 Microsoft Environment Analysis ITT Technical Institute Instructor: Date 1. What vulnerabilities exist for this workgroup LAN based on the advisories?Publication Date | Advisory # | Title | December 29, 2015 (Originally published September 21, 2012) | 2755801 | Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge | December 8, 2015 | 3123040 | Inadvertently Disclosed Digital Certificate Could Allow Spoofing | December 8, 2015 (Originally published July 14, 2015) | 3057154 | Update to Harden Use of DES Encryption | November 30, 2015 | 3119884 | Improperly Issued Digital Certificates Could Allow Spoofing | November 10, 2015 | 3108638 | Update for Windows Hyper-V to Address CPU Weakness | October 13, 2015 (Originally published September 24, 2015) | 3097966 | Inadvertently Disclosed Digital Certificates Could Allow Spoofing | October 13, 2015 (Originally published May 12, 2015) | 3042058 | Update to Default Cipher Suite Priority Order | October 13, 2015 (Originally published May 13, 2014) | 2960358 | Update for Disabling RC4 in .NET TLS | September 8, 2015 | 3083992 | Update to Improve AppLocker Publisher Rule Enforcement | July 14, 2015 | 3074162 | Vulnerability in Microsoft Malicious Software Removal Tool Could Allow Elevation of Privilege | June 9, 2015 (Originally published May 5, 2014) | 2962393 | Update for Vulnerability in Juniper Networks Windows In-Box Junos...

Words: 818 - Pages: 4

Microsoft

... applications believes that Microsoft cannot handle their load, in which case still use UNIX and Linux systems. Throughout the remainder of this paper we will discuss the external environment, Industry structure, Industry Life Cycle, and some analysis of Microsoft and their future. Upon the conclusion of this paper, you should feel more in tune with the current situation Microsoft is placed in, and what we think they should engage in to remain competitive in their Industry. Businesses are ever evolving and therefore their strategy must change with it, or the business will lose its competitive advantage. We feel our recommendations will help Microsoft reposition themselves as leaders in the software, and technology industry. The current life cycle of the industry can be look at as a shakeout period. Shakeout period of the life cycle still has growth in it demand, however, the growth is not as steep as the growth period of the life cycle. At the maturity stage, the demand is coming to a stop and starts to decline as the demand is meet. Technology in itself is ever changing. It is becoming faster and faster and more convenient for consumers to have with them. It has begun to integrate into our lives. As this new technology becomes available, the demand for it is steadily increases and becomes a need. External Analysis Externally, Microsoft is an industry that is constantly growing and changing. As technology is becoming smaller, faster and more readily-available,......

Words: 1566 - Pages: 7