Free Essay

Video Summary 7

In: Computers and Technology

Submitted By taaazzy
Words 831
Pages 4
Video Summary 7
5_04- FILE SHARING AND PERMISSIONS, 5_06-WIRELESS SECURITY
AND 5_07-MALWARE
5_04-FILE SHARING AND PERMISSIONS * Click start * Click on my documents * Right click on Projects * Click on tools * Click on View * Click on Use simple file sharing (recommended) * Then click OK * Right click on Projects * Click on Sharing and Security * To share this folder with other users of this computer only, drag it to the Shared Document folder * Click on Customize * Click on tools * Click on Folder Options * Click on Use simple file sharing * Click OK * Click on Projects again * Click on share the folder * Change user limits
PERMISSIONS
* Share permissions * NTFS permissions * Click on permissions under User limits * Click on Everyone * Limit the permission for everyone * Click on security for special permission ie; Administrator * Specific permissions are covered on Security + test and Network + test * Deny overrides on all other permissions * Click on advanced in Security * Click on permissions * Inheritance means child objects inherit permissions of parent * Permissions are inherited * Click on start * Right click on My documents * Click on Manage * Click on Shared Folders * Click on Shares * Click on projects * Administrative shares are visible only to administrators

On this Video Slide I pretty much learned how to Share files and get permission to do so. I also learned how to limit, erase and edit the file sharing as well. Above I have showed how to do so even showed how to step by step. The slide was pretty much a step by step slide.

5_06- Wireless Security * Wireless devices communicate * Directly- Ad Hoc mode * Remember this term * Through an access point (AP) * Wireless Access Point (WAP) * Most networks use a wireless AP * Creates a hot spot * Security must be configured * WAP * Is sometimes used to refer to both a “Wireless Application Protocol” or a “Wireless Access Point” * SSID- Service Set Identifier * Broadcasts presence of WAP * Disable SSID broadcasting to hide WAP * Filter MAC addresses * List accepted MAC addresses * All others will be blocked * SSID name and password * Default set by manufacturer * Manufacturer’s website * Check manufacturer’s website * Reset SSID name and password * DHCP addresses * Disable automatic assignment * Assign static IP * Encryption * Very important feature * Three types * WEP (Wired Equivalent Privacy) * WPA (Wi-Fi Protected Access) * WPA2 (Wi-Fi Protected Access 2) * WEP (WIRED EQUIVALENT PRIVACY) * 64 & 128 bit encryption * Static encryption key * More susceptible to hacking * WPA ( Wi- Fi PROTECTED ACCESS) * Requires username and password * Dynamic encryption key * More secure * WPA2 (Wi-Fi PROTECTED ACCESS 2) * Latest version of encryption * 802.11i or AES protocol * Available with XP Service Pack 2 or later

On this video slide I learned about Wireless Security. The differences between Ad Hoc Mode and Wireless access point. I also learned how to configure Wireless Security, disable SSID broadcast, filter MAC addresses, change name and password, disable DHCP and configure encryptions (WEP, WPA and WPA2). This slide was very informing on a lot of issues concerning wireless security.

5_07- MALWARE * Worm- Spreads throughout network without other programs- typically infects email * Virus- Replicates by attaching to other program * Trojan Horse- pretends to be legitimate program * A Logic Bomb-sits dormant in your system until activated- usually by a date or code word * A Boot Sector virus- infects MBR or boot sector- fixmbr or fixboot * Click on Start * Click on My Computer * Click on Local Disk (C:) * Click on the File that says Music * By default Windows does not show file extensions * Click on tools ( top right middle) * Click on Folder Options… * Click on View * Uncheck Hide extensions for known file types * Click OK * Most computer professionals prefer to not hide file extensions
SOCIAL ENGINEERING * Phishing * Tricks user into revealing confidential information * XP with SP2 * Phishing filter * Pop-up blocker * Manage Add-ons * Legitimate companies will NEVER ask for sensitive and private information through an email * It is a BAD idea to click on links in email messages * Click on Start * Click on Internet * Click on Tools ( far right top corner) * Click on Phishing Filter * Click on Phishing Filter Settings * Click on Advanced * Click on Phishing Filter * Click on Turn on automatic website checking
POP-UP BLOCKER * Open Internet * Click on Tools ( top right upper corner) * Click on Pop-Up blocker * Click on Pop-Up blocker settings
ADD-ONS
* Click on Tools (top right upper corner) * Click on Manage Add-ons * Click on find more Add-ons * Click setting * Enable/Disable the add-ons
DO’S AND DON’TS * Install an anti-virus program * Don’t open email attachments that have not been scanned by your anti-virus program * Don’t click links inside an email message * NEVER transmit private information via email * Be aware that “ FreeWare” may not really be free- you may also be downloading spyware

In this video slide I learned about MALWARE and the different viruses. Long as I download a anti-virus/ MALWARE for my laptop I will be okay. After learning a little bit about that I learned about Phishing, how to control pop-up blockers and how to Add-on.

Similar Documents

Free Essay

Unit 7 Video Summary 5

...Unit 7 Assignment 1: Video Summary 5 BIOS is the first program activated during boot. This instruction set is permanent. Power-on self test checks basic system hardware, checks memory, and assigns system resources. The startup BIOS also checks CMOS settings. This is not permanent because it comes from RAM so it may be changed. BIOS and CMOS are different. BIOS is stored in ROM and permanent. CMOS is stored in RAM and volatile. CMOS settings are not lost during power outage because the CMOS battery provide power while shutdown. A common system of low battery is a slow clock. The system will still reboot if you clear the checksum error. The bootstrap loader runs POST, which checks CMOS, which reads MBR, which finds active partition, which loads the 1st OS file. To make changes to the BIOS by changing the Motherboard or flash the BIOS. BIOS is Firmware not hardware, or software. EEPROM stands for Electronically erasable programmable ROM. New BIOS lets you download a copy of new BIOS firmware from the manufacturer’s website. You can run BIOS flash installer. There are four system resources IRQ, I/O addresses, Memory Addresses, and DMA. IRQ is the interrupt request. It’s the communication channel from the hardware device to the CPU. IO address stands for Input/Output address and it’s the Hardware devices assigned address. The CPU sends instructions to address and the Device listens for address. The IO address is similar to device name. CPU communicates with the hard drive by using...

Words: 338 - Pages: 2

Premium Essay

Nt 1110 Unit 9 Video Summary 7

...Security Introduction Security introduction is what the first video is about; it tells us what topics the next seven videos will cover. * Local Security Policy * Physical Security * Firewall * Wireless Security * Authentication * Encryption * Viruses Physical Security & Authentication In this video we learn about how to secure your computer and servers theft or tampering. You would do this by locking and controlling access to servers and locking computer cases as well. To protect them even further you should put server locations in high traffic areas, and create administrative alerts with audible alarms. You should also store backup in a separate and secure location, and lock user operating systems. Always physically destroy hard drives. This video also teaches us about CMOS password and how to set them up. We can create limits to the access through CMOS with full, limited, view only, and no access. We also learn about password protecting the hard drive. * Physical Security * Authentication * CMOS Password * Kerberos-Method used to encrypt passwords What I learned from this video is that companies go through great lengths to protect their computers and servers from intrusion. This video was basic and straight forward and not confusing at all, if anything its confusing that we should have to do so much to secure our files. I guess this information would best be used if you working for security...

Words: 613 - Pages: 3

Premium Essay

Nt 1110 Unit 9 Video Summary 7

...Security Introduction Security introduction is what the first video is about; it tells us what topics the next seven videos will cover. * Local Security Policy * Physical Security * Firewall * Wireless Security * Authentication * Encryption * Viruses Physical Security & Authentication In this video we learn about how to secure your computer and servers theft or tampering. You would do this by locking and controlling access to servers and locking computer cases as well. To protect them even further you should put server locations in high traffic areas, and create administrative alerts with audible alarms. You should also store backup in a separate and secure location, and lock user operating systems. Always physically destroy hard drives. This video also teaches us about CMOS password and how to set them up. We can create limits to the access through CMOS with full, limited, view only, and no access. We also learn about password protecting the hard drive. * Physical Security * Authentication * CMOS Password * Kerberos-Method used to encrypt passwords What I learned from this video is that companies go through great lengths to protect their computers and servers from intrusion. This video was basic and straight forward and not confusing at all, if anything its confusing that we should have to do so much to secure our files. I guess this information would best be used if you working for security...

Words: 613 - Pages: 3

Free Essay

Video Summary

...Video Summary Timetable General Information Assignment Requirements for each assignment (refer to the template example below) 1. Watch video clips from the Video Mentor DVD or using the online link. o http://media.pearsoncmg.com/pcp/itt_media/1256386782/index.html 2. Write summaries of the information presented in each clip. (2-3 sentences is fine) 3. Create a bulleted list of the topics presented in the video clips. 4. Create a bulleted list of terms used in the video clips with their definitions. 5. Provide a summary of your thoughts on the information presented in the video clips, including what you learned from the presentation, what may have been confusing, and where you might use the information. Note: To receive full credit the paper must be turned in as an MS Word document that includes ALL items. Partial credit will be given to handwritten submissions Summary # Unit Due Assignment 1 3 Wk 4 Video clips: 1.07 – Ports and Connectors, 1.09 – Video, & 1.11A – Printers Hardware and 1.11B – Printers Configs 2 4 Wk 5 Video clip 1.04 – Motherboards 3 5 Wk 6 Video clip 1.05 – CPUs 4 6 Wk 7 Video clips 1.06 – Storage Devices and 1.08 – Memory 5 7 Wk 8 Video clips 1.01 – BIOS and 1.02 – System Resources 6 8 Wk 9 Any four of the video clips in Part 3 (Operating Systems) 7 9 Wk 10 All the video clips in Part 5 (Computer Security) (ALT-Poster) 8 10 Wk 11 Four video clips from both Parts 2 and 4 (eight clips in all) ALT: Pick a topic that is equivalent...

Words: 307 - Pages: 2

Premium Essay

Syllabus

...|[pic] |Course Syllabus | | |College of Natural Sciences | | |SCI/163 Version 4 | | |Elements of Health and Wellness | Copyright © 2013, 2012, 2011, 2009 by University of Phoenix. All rights reserved. EL14FS05 Course Start Date:  04/16/2014 Course End Date:  05/14/2014 Wednesday’s *6 PM to 10 PM* El Centro Learning Center 3095 North Imperial Suite 101 El Centro, California - 92243 Phone: 800-473-4346 Instructor:  Rosyo Ramirez, MPA Course Description This course reinforces the concept that learning effectively and living well involves both the mind and body. It presents the fundamentals of wellness and preventive health including strategic planning to attain and maintain personal optimal health. In addition, physical and mental diseases are discussed along with the dangers of environmental pollution, stress, addiction, and other negative factors that can affect personal health. Policies Faculty and students/learners will be held...

Words: 2617 - Pages: 11

Premium Essay

Biological and Cognitive Psychology Powerpoint

...|[pic] |Course Design Guide | | |College of Social Sciences | | |PSY/315 Version 3 | | |Statistical Reasoning in Psychology | Copyright © 2012, 2010, 2006 by University of Phoenix. All rights reserved. Course Description This is an introductory course in applied statistics, with particular emphasis in psychology. Both descriptive and inferential statistics are included. In addition, this course provides the basic statistical background and understanding needed. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently...

Words: 1529 - Pages: 7

Premium Essay

Mo Mo Mo Mo

...Management Crummer Graduate School of Business Rollins College PEARSON Prentice Hall Upper Saddle River, New Jersey 07458 About the Authors vi Foreword xx Preface xxi PART i l l 1, Introduction to Operations Management 1 Operations and Productivity 1 Global Company Profile: Hard Rock Cafe 2 What Is Operations Management? 4 Organizing to Produce Goods and Services 4 Why Study OM? 4 What Operations Managers Do 7 How This Book Is Organized 7 The Heritage of Operations Management 8 Operations in the Service Sector 9 Differences between Goods and Services 10 Growth of Services 11 Service Pay 12 Exciting New Trends in Operations Management 12 The Productivity Challenge 14 Productivity Measurement 15 Productivity Variables 17 Productivity and the Service Sector 19 Ethics and Social Responsibility 20 Summary 20 • Key Terms 21 • Solved Problems 21 < Self-Test 22 • Internet and Student CD-ROM/DVD Exercises 22 • Discussion Questions 22 • Ethical Dilemma 23 • Problems 23 • Case Studies: National Air Express 24; Zychol Chemicals Corporation 25 • Video Case Study: Hard Rock Cafe: Operations Management in Services 25 • Additional Case Study 26 • Bibliography 26 • Internet Resources 26 Developing Missions and Strategies 34 Mission 34 Strategy 35 Achieving Competitive Advantage Through Operations 36 Competing on Differentiation 36 Competing on Cost 37 Competing on Response 37 Ten Strategic OM Decisions 39 Issues in Operations Strategy 42 Research 42 Preconditions 43 Dynamics...

Words: 3823 - Pages: 16

Premium Essay

Duke Portfolio Summary

...News article summaries Requirements: Summarize three news articles, blog posts, podcasts or videos from within the last 12 months describing a discovery, advance, therapy or ethical, legal, social issue in genetics or genomics. The summaries should be approximately one to two pages in length and include the following: * If it is an article or blog post you must print and attach a copy to your summary * If it is a podcast or video please provide a link * Title of article * Date and source of publication * Author’s name * Synopsis of article * Brief discussion of the genetic or genomic concepts discussed in the article and how these relate to topics covered in lecture or course readings * Opinions or feelings: Paragraph stating your opinions or attitude towards the subject of the article. This involves identifying what the ethical, social or policy issue(s) are, stating your position about these issues and providing well-reasoned, logical and informed support for your position. Due Dates: Summary one is due Monday 7/07 Summary two is due Monday 7/14 Summary three is due Monday 7/21 Grading Rubric: The four article summaries will be graded according to the attached grading rubric. Part 2: Reflective Essay Requirements: Complete a reflective essay that reflects upon how science impacts society. For the topic of your essay, choose any genetic or genomic issue that you identified in your news article summaries in Part 1...

Words: 920 - Pages: 4

Free Essay

Biotic Component

...Material Ecosystem Structure, Function, and Change Select and complete one of the following assignments: Option 1: Ecosystem Components Paper Option 2: Ecosystem Components Video and Summary Option 1: Ecosystem Components Paper Select a representative natural ecosystem in your area or one that you are interested in—such as a lake, preserve, or park—that is managed for native species. • Write a 700- to 1,050-word paper explaining the following: o The major structural and functional dynamics (processes) of that ecosystem including change over time o How humans may have affected biogeochemical cycles in that ecosystem, including impacts to the nitrogen, phosphorus, or carbon cycle o How knowledge about that ecosystem’s structure and function can help or has helped to develop plans for its management and restoration o The implication of species interactions in ecosystem management and restoration • Include two outside references. • Format your paper consistent with APA guidelines. Option 2: Ecosystem Components Video and Summary Select a representative natural ecosystem in your area or one that you are interested in—such as a lake, preserve, or park—that is managed for native species. • Shoot a 7- to 10-minute video chronicling the following: o The major structural and functional dynamics (processes) of that ecosystem including change over time o How humans may have affected biogeochemical...

Words: 309 - Pages: 2

Free Essay

Video 8.05 Summary

...Video Summary 6 Video 3.13 Summary – User State Migration Tool — This video covers the User State Migration Tool (USMT) which transfers all the settings from your old computer to your new computer. The USMT is found on a domain; you can also use a tool called Files and Settings Transfer Wizard—both of these applications are found in the system tools directory. These tools make using your new computer much like your previous computer with less pain. This helps the company/department become more efficient and would in effect be less downtime and thus less painful than the old way. Topics— * User State Migration Tool (USMT) * Files and Settings Transfer Wizard Terms— * User State Migration Tool (USMT) * Is a Microsoft command line utility program intended to allow advanced users, comfortable with Scripting language, to transfer files and settings between PCs. This task is also performed by Windows Easy Transfer, recommended for general users. * Files and Settings Transfer Wizard * Is a file transfer and backup program which allows backing up or transferring user files and settings between computers. Summary— I personally never knew these programs/applications existed. Now that I know, I can use these instead of burning files to DVD/CD then transferring the information in that archaic method. And all this time I thought it was a pain to work in a windows environment. However, I still don’t understand how the new and old PCs are to be connected to...

Words: 687 - Pages: 3

Premium Essay

Seo Techniques

...Video 1 - I want to be #1 On Google. Summary | key learning | value for my client | Selecting a keyword for optimization over search engine is a difficult task Everyone wants to be number one in google, but only a few of them know how to get you there.This SEO video either make you laugh or get you thinking how a SEO technique worksBusiness need to understand SEO is slow and ongoing process it takes at least 6-8 months to get someone on the top of search engine and need to maintain that. For generic keywords it’s even more time period and dedication | Generic keywords take more time to get a company on top pages of googleLong tail keywords generate more traffic SEO is time consuming and continuous process, but generate genuine traffic if done in proper way. | This video might help my client to set right expectation before starting SEO campaign and shall help him to understand the importance of keyword selection. | Video 2- #1 SEO Tutorials for Beginners | What is SEO? Summary | key learning | value for my client | SEO is the activity of optimizing Web pages or whole sites in order to make them more search engine friendly, thus getting higher positions in search results.I think this video has been prepared for the beginners to help them understand simple but effective SEO characteristics. After watching this video you will find yourself at a moderate level of expertise in using simple but effective SEO techniques from where you can take yourself to next levels...

Words: 962 - Pages: 4

Premium Essay

Comm600 Full Course Latest 2016 Feb All Weeks Discussions All Assignments and All Quizzesb

...graded on the quality, depth, and level of expansion and detail in your main and reply posts. Instructions: This semester we'll be exploring the topic of "Millennials" in articles that you be assigned to analyze, evaluate, and use as references for the assigned essays in this course. To begin thinking about this topic, please view either of the two videos on millennials that follow. Please note the attached critical thinking strategies to consider as you view. Then respond in the attached Discussion area to at least ONE of the following questions.: 1. What information was new or surprising to you, and why? 2. What information or concept left you confused, and why? 3. What comment(s) did you disagree with, and why? 4. What information do you find most important, and why? Please include the title of the video you viewed in the subject line of your post. Millennials: 60-minutes documentary This "60 Minutes" video about the millennial generation is 12 minutes long. Feel free to watch it in segments if you would like to:http://news.yahoo.com/video/millennials-coming-200724108-cbs.html The people being interviewed in the video talk about the changes coming to society as a result of the millennial generation's influences. Questions to consider as...

Words: 6465 - Pages: 26

Premium Essay

Analytical Summaries

...Analytical Summaries 1 Analytical Summaries Amanda Fisher 6/28/2014 HUM200 Michael Pankrast Argosy University Analytical Summaries 2 Shooting in the Dark The article “Shooting in the Dark” is about the connection between violent crimes and video game use. Social scientist have been studying the effects of media violence and video game violence since the 1950’s to the 1980’s. Research has shown that boys are more likely to play violent video games than girls. Research has also shown that playing violent video games does stir up hostile urges and aggression in the short term and that younger kids that develop a gaming habit (over a one to two year period) can be slightly more aggressive. It has not yet been determined whether or not playing video games for a period longer than two years can lead to acts of violent crime. Christopher Barlett, a psychologist at Iowa State University, conducted a study in which he had 47 students play “Mortal Kombat: Deadly Alliance” for 15 minutes and had another group of students play a nonviolent video game. The results of the study showed that students that played “Mortal Kombat” were more aggressive than the group of students that played a nonviolent video game. Similar studies done have shown...

Words: 1758 - Pages: 8

Free Essay

Developmental Aspects of Play

...Introduction to World Music Professor Glenn McMillan 1003 M Room gmac@mec.cuny.edu Office Hours Appointments Only 718 270 4929 Music 100 Please leave email Introduction to World Music Syllabus-Spring 2013 This course is an introduction to music and to the musical mechanics from a global perspective. There will be three aims: • to increase the students understanding of music, including its elements, structures, and terminology through live performances, students and guest artists; • to increase the students awareness, cultural connections to explore and their understanding of global relationships; how these cultures utilize musical elements, and the role that music plays within that culture; and • Most importantly, to increase the students understanding of the origins of the students’ owns individual music appreciation and the connection to the global village. Course Objectives • To explore and reconsider ideas about cultural contact in the process of musical change • To understand music terminology • To understand, review and write reports on live performances using terminology demonstrating knowledge of musical elements within rhythm, pitch, and structure • To understand and further identify the social, economic, historical, philosophical and psychological elements, which affect the form of the assigned music • To identify aurally and explain rhythm...

Words: 1249 - Pages: 5

Free Essay

Abnormal Therapy Paper

...Syllabus College of Social Science PSY/300 Version 5 General Psychology Copyright © 2013, 2012, 2011, 2010, 2006 by University of Phoenix. All rights reserved. Course Description General Psychology is a survey course which introduces the student to the major topics in scientific psychology as applied to human behavior. Applications of these principles will be made to the human experience. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Kowalski, R., & Westen, D. (2011). Psychology (6th ed.). Hoboken, NJ: Wiley. All electronic materials are available on the student website. Week One: The Science of Psychology Details Due Points Objectives 1.1 Examine the major underlying assumptions of the various schools of thought in psychology. 1.2 Explain how psychological research applies to various aspects of personal and social life. 1.3 Determine what guidelines should be applied...

Words: 4795 - Pages: 20