Free Essay

Securing Windows Xp

In:

Submitted By johnise6478
Words 2078
Pages 9
Securing Windows XP
By Johnise Felder

Professor Dawn Smith
CMIT 364

Windows XP operating system sets new standards for optimal performance and system reliability. Whether you are a network administrator or just an end-user you can expect to get the most from this system due to its dependable computing and efficient uses. Windows XP operating system was built on Windows NT/2000 technology, which was proven to be more stable than previous operating systems such as 95, 98 or Me (Millennium Edition). Windows XP has a much brighter look and better GUI (graphical user interface) technology. This operating system automatically keeps your PC up to date with the latest security enhancements such as windows firewall that helps to protect your computer from viruses and worms that are spread throughout the Internet. Windows XP also allows quicker access to wireless networks from your laptop and with the built-in Encrypting File System (EFS), found only in Windows XP Professional this provides an additional level of file protection from hackers and data theft by encrypting files with a randomly generated encryption key based cryptographic scheme that encrypts all files in a folder. Users with itinerant profiles can use the same key with trusted remote systems. EFS have some key features that it offers such as, transparent encryption, strong protection of encryption keys, integral data-recovery system and secure temporary and paging files.
Most end-users with personal computers use Windows XP operating system on their home system; there are several steps that should be taken to secure your home PC just as a Network Administrator would secure their networks. First, lets talk about enabling a password for the guest account this should be done to ensure that no one can log into the computer and access valuable information since most of us store critical information like taxes and credit card numbers on our personal computer. Developing a strong password for any account is very important. When setting up a password for a user the administrator should take in affect the following password policies. The administrator should start off with enforcing password history, which will determine the number of unique new passwords a user must use before an old password can be reused. Don’t forget the maximum password age and minimum password age. The maximum password age determines how many days a password can be used before the user is required to change it. The minimum password age determines how many days a user must keep new passwords before they can change them, this setting is designed to work with the enforcement password history. Your minimum password length will determine how short your password can be, this is a requirement because it makes for a safer password that cannot be guessed by outsiders or hackers. And last but not least your password must meet complexity requirements, meaning there should be a special character, number, lowercase, uppercase and Unicode character to make it complex. The guest account on a Windows XP Professional machine is very different when it comes to the Windows XP Home Edition. A guest account on a Windows XP Professional machine is a huge loophole for hackers. Once you have installed Win XP Pro on your machine it is very critical that you disable the account, if your machine belongs to a domain, or to computers that don’t use Simple File Sharing model. When it comes to the Home Edition of XP, disabling the guest account is only removing the listing of the guest account from the Fast User Switching Welcome screen, and the log-on local right. A guest will still be able to connect to share information of an affected machine. The only possible solution for avoiding these things is to just implement a strong password to the guest account.
Enabling the Internet connection firewall too can protect your personal computer from hackers and outside intruders. A firewall is used to monitor network activity that may be directed to or from your computer. Another good way to secure your computer is virus protection and anti-spyware. Active antivirus software is a necessity when connecting to the Internet since other Internet users can see your computer. When it comes to Internet Explorer (IE), or any web browser there are a lot of features that should be enforced when using these web browsers. Managing your cookies is another feature that should be used. Cookies allow your computer to keep track of a users data, so far as preferences and often their passwords on a particular site they may have visited.
Deleting your cookies in Internet options. Deletion of the cookies might contain some website that contain viruses that were visit through pop-ups and may have planted there cookies on your pc. Windows XP does not come with built in virus protection so it is the sole responsibility of the end user to obtain such software. Major manufacturers include Norton Antivirus, avast! Antivirus, and Trend Micro (normally found on large networks). Spyware was created to steal personal information and valuable data for unsavory purposes like identity theft. This software is installed on the computer without the users informed consent usually in the form of pop-ups. Anti-spyware is used to prevent this from happening. To stay on top of the latest viruses that are out you can receive alerts through instant messaging, e-mail and RSS notifications.
Home computer users should always enable a daily backup schedule, since no computer is immune to system failures and hardware crashes. Backing up your Operating System and data is a critical step in computing. Hardware eventually breaks down in the same manner as a vehicle may. Could your data withstand this incident? Are you prepared to lose all your family photos? Are you prepared to lose all the important telephone numbers that were saved in your address book? I would assume the answers to these critical questions are no. Windows XP makes data backup easier by allowing all users to have their own accounts installed on the same computer. You can enable data backup right from your computer, it would be beneficial to set the day and time that you may be at work that way there are no interruptions on the computer while its backing up your data, or you can save the data to CD’s or DVD’s.
Also another good method to secure your small home or office operating system is to use a router instead of Internet Connection Sharing (ICS). When it comes to ICS it allows you to share that connection with other computers that may be in your home or small office. With this being said if the main PC is infected, this causes the other PC’s to be vulnerable to infections. With a router it’s faster and easier to configure and more secure.
Another tool that is very useful to securing your XP system is making sure that you have Service Pack 2 (SP2) installed on your machine. Every month, Microsoft releases new update drivers, software, tools and security enhancements that enhance the performance of your computer. These updates can be downloaded from the home of the user or normally in an organization environment; customer machines are already set to automatically install updates. This process is done to keep the users computer current. The updates improve your computers health and security. Microsoft update is easy to install and setup and allow the user to customize them for their personal use. To set up automatic updates on your operating system you will go to the start menu. Then you will click control panel, performance and maintenance and click system. You will then see an automatic update tab giving you the option to click the setting of your choice. Using a software restriction policy, will allow you to prevent unwanted programs from running on your machine. Having this software to run without permissions can be very critical to the machine if you are unaware of what is being downloaded.
In an office location big or small organization, it is very critical for all users to lock their workstation when leaving their system unattended. A password-protected screensaver is a good approach when it comes to securing XP. This allows your machine to lock after a set amount of minutes you have set on your machine. Not having this feature enable on your system is grounds for an internal threat from taking advantage of an unlocked console. A lot of users have a tendency of leaving and not applying by the rule. Using the Security Configuration Manager and templates that were provided with XP Professional is another good measure for securing your operating system. SCM allows security administrators to define security templates that can be applied to individual machines or any number of machines via group policy or to your local computer. These security templates can contain password policies, lockout policies, Kerberos policies; audit policies and event log settings just to name a few. I think that a define security template is more beneficial to the users than the predefine templates; because this allows the user to secure there machine the way that they prefer. The use of group policy is an additional helpful tool in securing your operating system. It allows you to administer configuration of computer and users settings in an Active Directory environment. By logging on as an administrator you can use a fairly straightforward tool called the Group Policy snap-in to define security settings for a local computer, to control the use of more than 800 aspects of the operating system’s conduct, and to computerize what happens at startup and shutdown and when users log on or off. This tool is very supportive because it want allow every one to have there hands in the pot when it comes to configuring the machines logged on as an administrator. When you feel that you have secured your operating system with the best tools out there, you can always test and verify how secure your machine really is. Some organizations will set forth a plan to have attackers to work in attempt to gain access to there network. Some individuals will also use time-honored techniques like creating a honeypot, which is a sacrificial system that attracts attackers. A lot of home users don’t have access to these type of techniques. So for the home users there are numerous free security scanners and security assessment tools that are available. But be careful because some free sites might contain viruses, so be careful on what you download. You can also check your security updates against the latest updates that are provided on the Microsoft Baseline Security Analyzer website. In conclusion to securing windows XP operating system I hope the information that I have supplied in this paper is beneficial to everyone who may read it. It is the sole responsibility of the end user to ensure that each of our individual workstations is secured. For major companies it is the sole responsibility of the Network Administrator to ensure that the company’s information is safe and secure and that no outsiders have access to the information that the company is producing. The fact still remains that this country is ran with pertinent information, which is stored on servers and desktop computers if an outside attacker is ever compromised this information this country could be in extremely deep trouble. During my research I found that there have been instances in the United States of America where intruders were able to access information and use it for all the wrong purposes.
Without information and computer security everyone is vulnerable to attacks and threats. Most identity thefts happen because someone was unaware that an intruder was compromising their information. I think that there should be more IT security awareness steps taken at each person’s place of employment to offer education.

Bibliography

Klinder, Benie (2001). LabMice.net Windows 2000/XP/.Net Resource Index. Retrieved June 14, 2007, from SearchWinIT.com http://labmice.techtarget.com/articles.winxpsecuritychecklist.htm

Field, Dave (2005). 70-270 Installing, Configuring, and Administering Microsoft Windows XP Professional Second Edition (pg. 94-96) Microsoft Press

Vaughan, Eric (2005, September 30). Securing Windows XP, Retrieved June 14, 2007, http://tweakhound.com/xp/security/page_1.htm

Siechert, Carl (2006). Windows Security Tools and Techniques, Ch.7 Keeping Your System Secure (pg. 234) Microsoft Press 2006

Hassell, Jonathan (2006), Hardening Windows, Second Edition, Ch. 4 Windows XP Security (pg, 125) Apress 2006

Similar Documents

Premium Essay

Nt1330 Unit 8 Assignment 1

...Group Policy in a Mixed Client OS Environment Unit 8 Assignment 1 ITT Technical Institute Floyd Washington Jr. May 16, 2015 Group policy is a tool used for customizing, controlling, and securing Windows operating systems. It was introduced in Windows 2000 as part of the IntelliMirror technologies. Group policy can be applied at the local computer level or to OU’s, domains, or sites in an Active Directory environment. Group policy was supported by Windows XP Professional, but not XP Home Editions. Group Policy in Vista adds many settings which gives administrators more control over users and computers. In this essay I will discuss five of the newer features that was not in the older versions of windows. * The first policy that I will discuss is the Control Removable Media policy. Devices like thumb drives, flash memory card readers, and external USB hard disks made it easy for users to transfer data between two computers. Although convenient, the ease that removable media created brought about the rise in industry espionage. User could easily copy and share company secrets with competitors by copying the information on to a removable device and uploading it to another computer. Software was made available to block access to USB ports on sensitive terminals. * The second policy that I will discuss is the Control power management settings. Power management on a single computer can save energy and money. Enforcing a power management strategy can save a company...

Words: 532 - Pages: 3

Premium Essay

Huffman Trucking

...transportation company with 1,400 employees and hubs in Los Angeles, California, Saint Louis, Missouri, and Bayonne, New Jersey with its central facility still located in Cleveland, Ohio. The company today has over 800 tractors, and has expected revenue of $600,000,000 for the 2004 fiscal year (Apollo Group, Inc, 2003,2004,2012). When reviewing all of the facilities and systems within every single facility it’s noticeable that they are all running independent systems, which some don’t even have firewalls installed for the network. Compiling all of the systems in the four offices, and plants we find different operating systems (OS). This OS include Windows 3.1, Windows 3.X, Windows 9.X, Windows NT, Windows 95, Windows 98, Windows 2000 Professional, Windows XP Professional, Mac OS, Novel Netware 4.11, Windows 2000 Server, Windows Proxy Server 2, Windows Exchange 5, and CISCO (Apollo Group, Inc, 2003,2004,2012). In addition, to different types telephonies systems, webmail servers, and different types of hardware in every location. I don’t believe the OS were chosen by the Ohio office per say. Looking at the history of the company Huffman trucking, by the end of the war the company had grown and acquired companies in the East coast, and with the Motor Carrier Act of 1980 deregulating the industry Huffman trucking was able to become national company. Throughout the years the company was focusing on the growth, and profits and did not want to spend what they thought was unnecessary funds on...

Words: 563 - Pages: 3

Free Essay

Mansoor Ali Cv

...------------------------------------------------- ------------------------------------------------- Mansoor Ali 19-W, Abbas Street, GulghastColony, Multan 60000, Punjab, Pakistan. Mobile:+971 52 7919 604 / E-mail:Mansoorali.meet@gmail.com Pursue a challenging career in a leading and progressive organization. Providing ample growth and learning opportunities to contribute positively towards its goal to the best of my expertise and to further enhance my professional skills. ------------------------------------------------- ------------------------------------------------- ORGANISATIONAL EXPERIENCE Tenure | Company Name | Designation | Since Dec 2009 | Suzuki Fort Motors, Multan. | Customer Care Manager I.T. Manager | Job Profile: * Attended all trainings from Pak Suzuki Motor Co. Ltd. (I.T. & Customer Care Management). * Maintain customer inquiry record. * Maintain walk in customer record. * Manage calls to customer regarding dealing of sales staff. * Solve customer problems regarding after sales service. * Maintain DMIS (Dealer Management Information System). * Establish DMIS networking to sales executive desk. * Maintain networking system at dealership. * To assist regional office for required information. * To coordinate accounts, sales & parts regarding DMIS. * Troubleshooting of I.T. network. * To provide all necessary information received from PSMCL (Pak Suzuki Motor Corporation Limited)...

Words: 536 - Pages: 3

Premium Essay

Microcontroller

...Coin-Cell Battery Cable Guide Antenna System Board Assembly Getting Help Finding Information  Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. If you purchased a Dell™ n Series computer, any references in this document to Microsoft® Windows® operating systems are not applicable. Information in this document is subject to change without notice. © 2008 Dell Inc. All rights reserved. Reproduction of this material in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, and OptiPlex are trademarks of Dell Inc.; Intel is registered trademarks of Intel Corporation in the U.S. and other countries; Microsoft, Windows, Windows Vista, the Windows Start button, and Outlook are registered trademarks of Microsoft Corporation in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. Model DC01T September 2008      Rev. A00 Back to Contents Page   Antenna Dell™ OptiPlex™ FX160/160 Service Manual    Removing the Antenna   Replacing...

Words: 18309 - Pages: 74

Premium Essay

Help Friends by Sending a Gift!

...CHAPTER 2 In this chapter, you will learn: • About the various operating systems and the differences between them • About the components of Windows operating systems • How operating systems interface with users, files and folders, applications, and hardware Introducing Operating Systems I n Chapter 1, you were introduced to the different hardware devices. In this chapter, you’ll learn about the different operating systems, how they are designed and work, and what they do. You’ll learn about the different components of an OS and see how an OS provides the interface that users and applications need to command and use hardware devices. You’ll learn to use several Windows tools and utilities that are useful to examine a system, change desktop settings, and view and manage some hardware devices. As you work through this chapter, you’ll learn that computer systems contain both hardware and software and that it’s important for you as a computer technician to understand how they work together. Although the physical hardware is the visible part of a computer system, the software is the intelligence of the system that makes it possible for hardware components to work. 35 9781133726890, A+ Guide to Managing and Maintaining Your PC, Jean Andrews - © Cengage Learning. All rights reserved. No distribution allowed without express authorization 36 CHAPTER 2 Introducing Operating Systems OPERATING SYSTEMS PAST AND PRESENT An operating system (OS) is software that...

Words: 16220 - Pages: 65

Free Essay

Spur

...Appendix A Mapping Course Content to the CompTIA A+ Essentials 220-701 Exam Objectives Exam Objective | A+ Certification Lesson and Topic Reference | A+ Certification Activity Reference | Domain 1.0 Hardware | 1.1 Categorize storage devices and backup media | * FDD | Personal Computer Components, Storage Devices | | * HDD | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Solid state vs. magnetic | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Optical drives | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * CD / DVD / RW / Blu-Ray | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Removable storage | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Tape drive | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Solid state (e.g. thumb drive, flash, SD cards, USB) | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices...

Words: 6966 - Pages: 28

Premium Essay

Network

...Professional Qualification Certification Status | Credential | Certification / Version | | Date Achieved | | Ubiquiti airMAX & Unifi Wi-Fi Training | airMAX Certified & Unifi Wi-Fi | | April 12, 2013 | | Modules: * Understanding Wireless Communication * Active Server Pages * Link Planning and ManagementMicrosoft Certified Technology Specialist | Administrator. * Ubiquiti Protocols and Technologies * Hands-on UniFi Campus WIFI Course * RF FundamentalsMicrosoft Internet Security and Acceleration (ISA) Server 2006, Configuration | | Feb 19, 2010 | | Microsoft Certified Professional | Installing, Configuring, and Administering Windows...

Words: 774 - Pages: 4

Premium Essay

Microsoft

...customers, shareholders, partners, and employees by honoring our commitments, providing results, and striving for the highest quality. Introduction About Microsoft Microsoft Corporation is a software company based in Redmond, Washington. Microsoft's flagship product, the Windows operating system, is the single most popular operating system for home desktop use. Its other desktop products, namely Microsoft Office, Internet Explorer, and Windows Media Player, are either bundled directly with the Windows operating system, or are often sold together with Windows as preinstalled software on new computer systems. The company also manufactures and sells computer hardware such as keyboards and mice, owns several content-distribution channels such as MSNBC, the MSN Internet portal, and the Microsoft Encarta electronic encyclopedia. The Microsoft Windows operating system was introduced as an optional addition to the MS-DOS operating system. The idea of a graphical user interface was pioneered by Apple Computer's Apple II and Macintosh. However, due to prior work with IBM, Microsoft successfully convinced the hardware giant to ship Microsoft Windows preinstalled on IBM personal computers. This step strategically had made Windows to be one of the most recognized...

Words: 1847 - Pages: 8

Premium Essay

Issma

...Connection Windows 7 Configuration Procedure (WPA) IMPORTANT: This document assumes that your wireless network interface card supports the WPA standard. If you are unable to connect using this method, please obtain the Windows Vista Procedure (Unsecured) from your Systems Support Technician. 1. Right-click on the wireless connection , it might also look like this . 2. Click on Open Network and Sharing Center: 3. On the Network and Sharing Center, click on “Manage Wireless Networks”, on your left-hand side. This will take you to the wireless networks that have been saved on that particular machine. 4. This is “search and destroy”. If the user has added the ITTCAMPUSWPA connection to their list of safe networks, you should remove the connection – it is most likely not configured correctly. 5. Once you delete the offending connection, if any, click on the back button to return to the Network and Sharing Center. Now we will configure the connection from scratch. 6. Click on “Manually connect to a wireless network”. 7. On the next screen you will type “ITTCAMPUSWPA” for the network name and make sure “WPA-Enterprise” is selected from the drop-down list for the security type. Usually the “Start this connection automatically” is checked by default, but if it is not, go ahead and check it. Click on “Next” button. 8. On the next window click on “Change connection settings”. 9. On the Ittcampuswpa Wireless Network Properties window, make...

Words: 1016 - Pages: 5

Free Essay

People

...NAME: DATE: Part One: Windows OS Basics (1) VMWare: This keyboard shortcut sends a CTRL-ALT-DEL signal to the VMware Guest (it mimics CTRL-ALT-DEL in our virtual software): CTRL-ALT-INS (2) VMWare: This keyboard shortcut lets you switch from windowed mode to full-screen mode and back again in our virtual software: CTRL-ALT-ENTER (3) Unlike CTRL-ALT-DEL, this keyboard shortcut brings up Task Manager in XP, 2000, Vista and 7 no matter how the system is configured: CTRL-SHIFT-ESC (4) What is the default appearance of the mouse pointer when it is waiting for an action to complete in Windows XP? (I-beam, hour-glass, two-headed arrow, or arrow) (5) What is the default appearance of the mouse pointer when it is not on an active area of the window? (I-beam, hour-glass, two-headed arrow, or arrow) (6) What is the default appearance of the mouse pointer when you wish to resize a window on the desktop? (I-beam, hour-glass, two-headed arrow, or arrow) (7) If you press certain keys (example, the Alt key), the Windows OS will designate hot keys (accelerator keys) by changing them in this way: (boldface, italics, underline, or blinking) (8) Provide two other names for the Status Area (where you see the clock, date, and background programs): System Tray ,Notification Area_ (9) Windows 7 allows you to “pin” applications to the Taskbar. What does Windows XP provide that was similar for your frequently-used applications?(two words) Quick Launch ...

Words: 309 - Pages: 2

Free Essay

Bsa/310 Wk 3 Indiv

...Kudler Accounting System By Victor Cromartie BSA /310 February 25, 2013 Adaptation to an accounting system within a business or enterprise adds informative value across the company’s infrastructure. The value displayed by the accounting system role plays in effective facets such as faster processing to all accounting functions and foundationally offering over the top results to errors prone from human weaknesses within the data processing schema. System adaption can improve managerial resourcing and monitor processing thus allowing for better control within Kudler entities presently and within the future. Values stream outward as time and responsibilities are placed into organized role task for employees, allowing for improved customer service among consumers and stakeholders. Core features within the accounting system will address priority levels of information, enhancing decision making in all facets of company planning and viable control functions. A point of central consideration should be the inventory focus within Kudler Fine Foods. Inventory remains essential in balancing all spherical points within the Kudler organization. [pic] Characteristics of the System In the opinion of this accounting firm, Kudler Fine Foods needs to purchase software to record, maintain, and report their information. Every organization has several processes with some experiencing more complex than others. If Kudler wants to remain...

Words: 1103 - Pages: 5

Free Essay

Hostel Management

...all lawyers, advocates and other related people can use this software. Existing System At present all records are typed in typewriter and they are filed. Because of thousands of records searching for the required data is time consuming. Typing using the typewriter leads many problems. For each error they have to make a note and get the signatures. Also system is not pool proof. Proposed System In the proposed system all information will entered to system. All scheduling can be done in the computer it self. Hardware and Software requirements Hardware Requirements Processor : Pentium IV 2GHz and Above RAM : 2GB RAM Monitor : 15” Color Monitor Keyboard Mouse Software Requirements Operating System. : Windows XP Developing Tool : Visual Basic 6.0 Database : MS Access The frontend of this project is Visual...

Words: 455 - Pages: 2

Free Essay

Antonio Illescas, Systems Engeeniering

...las características de dicha máquina cliente. El programa instalador debe ocuparse de cargar la aplicación en la máquina cliente así como cualquier otro archivo o recurso que ésta emplee en su funcionamiento, ya sea en el estado actual o en el futuro previsto. Se distinguen tres tipos de instalaciones: instalación XCOPY programa instalador de aplicación programa instalador de módulo Instalación XCOPY Es el método más sencillo de instalación y no precisa el uso de ninguna herramienta de Visual Studio.NET por lo que constituye un método accesible a cualquier desarrollo. Se basa en el proceso de copia de la carpeta de la aplicación en la máquina cliente utilizando para ello el comando XCOPY de MSDOS disponible en cualquier sistema Windows. Para utilizarlo debe accederse a la línea de comandos desde Inicio Þ Todos los Programas Þ Accesorios Þ Símbolo del Sistema y la sintaxis a emplear es XCOPY ruta_carpeta_origen ruta_carpeta_destino /s donde /s indica que debe copiarse la carpetas y sus ficheros, pero también las de todas las subcarpetas independientemente del nivel de Carlos Hidalgo Lache 2 SINFOCORP SRL Manual para crear Instalador VB.NET anidamiento. Por ejemplo, si la aplicación se encuentra en la carpeta c:\Calculadora y se debe tener en d:\Operaciones la sentencia es...

Words: 4418 - Pages: 18

Free Essay

Asus X51V Live Update User Critique

...and failure. User manuals are found with every device we use today and many do their intended job professionally: Solve problems. The online user manual for the ASUS X51V motherboard provides the reader with instructions on how to update the BIOS and Drivers through a program called ASUS Live Update. The manual consists of a numbered list accompanied by an image for each number. While ASUS does succeed in solving the problem provided, the quality of the guide lacking and barely does the job of catering to the reader. Considering the Reader The ASUS Live Update guide was published in 2010, a year after the release of Windows 7, but utilizes Windows XP for their example. While it may unnecessary to include older versions of windows, due to compatibility issues, the reader could be confused by the images if they are using a user interface from Windows Vista or Windows 7. The method for opening the file displayed on the image may be very similar across the Operating Systems but not every user will find this as obvious. In this sense, the images are hindering the user more than they are helping the reader. The author also seems to assume that the reader has knowledge of everything within the manual and feels no need to describe just what the BIOS or Drivers are. A low-end user who may just be experimenting or has been told that they should look into these may be entirely lost on the subject. Unfortunately, ASUS is not there to hold the reader’s hand or explain anything to them, only...

Words: 838 - Pages: 4

Premium Essay

Network

...Administration 15 Operating Systems 17 Email System 19 Maintenance 21 Network Security 23 Summary 25 References 26 Technology Analysis and Assessment Plan Listed below is a simple diagram of the hardware layout in Acme Gym Inc., a small local fitness company that serves the community from a single location. Following the diagram is a detailed description of the current technology available on-site and an assessment of its weaknesses. There are currently four workstation computers located across several office locations. All four workstations currently contain essentially the same hardware and software consisting of: * Microsoft Windows XP operating system * 2 GHz CPU * 2 GB RAM * 120 GB Hard drive * DVD burner drive * Built-in USB and Ethernet ports The server on-site is currently running Microsoft Windows Server 2000 operating system. It contains the following hardware: * 2 each removable 250 GB hard drives in a RAID configuration (one drive used as a ghost drive, to ensure data integrity) * 2 GHz CPU * 2 GB RAM * DVD burner drive * Built-in USB and Ethernet ports The server currently maintains all customer related databases and also serves as domain (www.acmegym.com) and email host for the company. A standalone printer is the only peripheral currently connected to...

Words: 5202 - Pages: 21