Issuu on Google+

PRACTICAL ACTIVITY 5 Operating Systems, Computing Networks and presentation of information.

Javier Guerrero Matallanos 1ยบ Bach. Secciones


iNDEX

WINDOWS XP TOOLS

    

MOUSE PROPERTIES: PAGE 2 ADD OR REMOVE PROGRAMS: PAGE 3 USER ACCOUNTS: PAGE 4 SECURITY CENTER: PAGE 5 REGIONAL AND LANGUAGE OPTIONS: PAGE 6

COMPUTER NETWORK: PAGES 7-10

MS DOS COMMANDS: PAGES 11-13

SECURITY PROBLEMS: PAGES 14-21

1


MOUSE PROPERTIES

Path: My Computer - Control panel - Printers and other hardware - Mouse This Windows XP tool allows you to change the properties of your mouse (buttons configuration, double click speed, appearance, type of pointer, etc.). In this window (“Buttons”) you have the option to change the configuration of the buttons (you can assign to the right button the functions of the left, and to the left the ones of the right) selecting the option “Switch primary and secondary buttons”.

In the window “Pointers” you can choose between many kinds of pointers that Windows XP OS allows you to use.

The window “Pointer Options” allows you to change some aspects of the pointer, such as the speed the pointer moves (“Motion”) and other options related to the visibility of the pointer, as we can see in the image.

The window “Wheel” allows you to change some aspects of the wheel of the mouse.

Once you have select all the options, you have to click to “Apply”, to set the changes, and then click “OK” to close the window “Mouse properties”.

2


ADD OR REMOVE PROGRAMS

Path: My computer - Control panel - Add or remove programs This Windows XP tool allows you to add new programs to the computer using different methods, remove programs you don’t want and change the place where the programs are.

In this window you select the program you want to change or remove. If you click to “Remove” the tool will give you the option to uninstall the program and all his components. All the programs you have installed are in the list.

In this window, you can add programs by two different ways: 1. From a CD or a Floppy disk, selecting the first option “CD or Floppy”. 2. Using the Windows OS, by the internet, clicking in “Windows Update”. You can also add and remove some Windows components and set the options for some programs.

3


USER ACCOUNTS

Path: My computer – Control Panel – User Accounts This tool allows you to create new user accounts and change the options of the ones you have created. It´s important to have a Computer administrator account, because with this one you can control the computer and change all computer settings. To create a new user account you have to click on “Create a new account”. To change accounts you have to click in the one you want to select (has to be created before). Let’s create a new account:

The first step is to give a name to the new computer account. For example: JavierAdministrator. Then, you click to “Next”.

The next step is to pick an account type. You can choose among three possibilities: Computer administrator, limited or guest. When you select one, you can see the things you can do with each of them. Once you have selected the type you want, you have to click on “Create Account”.

4


SECURITY CENTER

Path: My computer – Control Panel – Security Center This Windows XP tool allows you to check and change some security options of your computer. It also tells you if something is going wrong. It consists of a Firewall and an Automatic Updates window. The Virus Protection window tells you if you installed an antivirus in your computer and also tells you if it is working in a right way.

The Windows Firewall will detect if anyone is trying to get at your PC, and automatically block the attempt. You can allow the access to someone in the “Exceptions” window. If you don’t want to allow the exception to get at your PC you have to select “Don’t allow exceptions”. The best option is to have always the firewall in “On”.

The Automatic Updates window allows you to select the way you want the Windows XP OS install updates and when does it have to do it. If you want the Windows XP OS to install all automatically you have to click in “Automatic”. In my opinion the best options are the second and the third one.

5


REGIONAL AND LANGUAGE OPTIONS

Path: My computer – Control Panel – Date, time, language and regional options – Regional and Language options With Regional and Language Options, you can change the format Windows uses to display dates, times, currency amounts, large numbers, and numbers with decimal fractions. You can also choose from a large number of input languages and text services, such as different keyboard layouts, Input Method Editors, and speech and handwriting recognition programs. When you switch to another input language, some programs offer special features, such as font characters or spelling checkers designed for different languages. Each language has a default keyboard layout, but many languages have alternate versions. Even if you do most of your work in one language, you might want to try other layouts. In English, for example, typing letters with accents might be simpler with the U.S.-International layout. You can set your location, in this way the system will provide your local information, such as news and weather.

By default, Windows XP installs the files for most input languages supported by Windows. However, if you want to enter or display text in the East Asian languages (Chinese, Japanese, or Korean) or the complex script and right-to-left languages (Arabic, Armenian, Georgian, Hebrew, the Indic languages, Thai, or Vietnamese), you can install the language files from the Windows CD-ROM or, if applicable, a network.

6


Computer network

We are going to create a network composed by 7 computers sharing an internet connection and a printer. To start creating the network we will need all those things:

OBJECT

NUMBER YOU NEED

Computers

7

Network printer

1

Switch (or hub)

1

Router

1

Ethernet cable with RJ45 connector

9

Telephone socket

1

Telephone cable

1

Internet company

1

Network card for each computer (the computer has it normally)

7

The network card it’s normally in the computer, but if you don’t have it or your computer is very old and doesn’t have it, you’ll have to buy one. The structure of the network will be a star topology (or structure), in which each network host is connected to a central hub with a point-to-point connection. The network hosts (components of the network) will be connected to the central hub or switch with an Ethernet cable with RJ45 connector. Then, the router will be connected to a telephone socket with a telephone cable. The switch is used to connect computers in a given network. The router is a device that forwards data packets between telecommunications networks, creating an overlay internetwork. The router has a unique IP address in the network and this address is also known as the gateway address (we will see this later). The computer has to be a network computer and not an ordinary computer, which can be only connected to each single computer by an USB connector.

7


The final result has to be like this:

ROUTER

TELEPHONE SOCKET

Once we have installed all the components we have to set the network settings. We have to give a name to each of the computers of the network. We can do that by going to My Computer and then clicking with the right button of the mouse in Properties.

To change the name of the computer, you have to click in “Change�. 8


When you do that, this window appears:

Here you can set the name of the computer, which is going to be” JGuerreroM” and you have to select that you are member of the workgroup called “GUERRENETWORK” which is the network we have just created. Once we have done that, we have to set the Internet protocol properties (IP address and gateway address). To do that we have to go to My computer – Control panel – Internet and network connections – Network connections.

The next window will appear. You have to select the “Local area connection” (conexión de area local) and then in the next window that will appear select “Internet protocol” (protocolo de internet).

9


Once you select the Internet protocol, click in properties and it will be displayed the next window:

You have to select the option “Use the following IP address� and then set the configuration of the computer (you have to do the same with the others). The IP address of each of the computers of the network has to be unique, because if some of them are the same, it causes IP address conflict. So you have to give a different IP address for each of the computers. The default gateway is the IP address of the network, and the seven computers in the network have to have the same default gateway.

Once you have done this, you can start using the network.

10


MSDOS COMMANDS

Once we have created the network and set the correct settings, we can check if it is working correctly by using the MSDOS commands. To get here we can follow the next path: START – Run. It will be displayed the next window:

We have to write “cmd” and then click to ok and the MSDOS commands will be open. Once here, we are going to use two commands to check if the network is working properly: ipconfig and ping. IPCONFIG: displays the IP address, subnet mask, and default gateway for all adapters. In this way we can check if the IP address and the default gateway is the same as the one we set for the computer.

If the network is working correctly has to be the same that we set before.

11


PING: is a command which tells you if the connection between your computer and a particular domain is working correctly. If you are having connectivity problems, you can use the ping command to check the destination IP address you want to reach and record the results. The ping command displays whether the destination responded and how long it took to receive a reply. If there is an error in the delivery to the destination, the ping command displays an error message. You can use the ping command to: 

Ping your computer (by address, not host name) to determine that TCP/IP is functioning. (Pinging your computer does not verify that your network adapter is functioning.)

Ping the local router to determine whether the router is running.

Ping beyond your local router.

To check connectivity by using the ping command, at the command prompt, type ping and the IP address you want to reach. A response of "Destination net unreachable" means there was no route to the destination. You need to check the routing table on the router listed in the "Reply from" address in the "Destination net unreachable" message. A response of "Request timed out" means that there was no response to the ping in the default time period (1 second). You can check for the following: 

A router is down.

The destination host is down. Physically verify that the host is running or check connectivity through another protocol.

There is no route back to your computer. If the host is running, you can check for a return route by viewing the default gateway and local routing table on the destination host.

We are going to check if our network is working correctly by using the ping command. As we see before, we have to write ping and the IP address of our computer. If all is correct and the IP address is the real one, this is what we have to see:

12


Let’s put a wrong IP address and we’ll see what happens.

We can see “Request timed out” and 100% lost, which means that it is not working (because the IP address doesn’t exists, in this case).

13


SECURITY PROBLEMS

Problem 1: The antivirus detects an infection (Internet worm) win32/boberog.AQ in working memory. It seems my antivirus detects it but cannot solve the problem. Worm: win32/Boberog.AZ is known as dangerous Computer infection for the PC and has affected many computers with its malicious properties and infection. This infection actually belongs to the family of dangerous computer worms which are notorious for hampering your PC both in terms of performance as well as security. This infection is mainly distributed by the hackers who use it for illegal activities and they use illicit means to infect your system and deteriorate System workings. The main source of entry of Worm: win32/Boberog.AZ infection is through spam emails, hacked and compromised websites, through corrupted freeware and shareware programs and through untrustworthy sites. “Worm: win32/Boberog.AZ” is really dangerous virus, It needs to be removed as soon as possible. Click the image to download the software which removes Worm: win32/Boberog.AZ infections completely.

Download Worm: “win32/Boberog.AZ removal utility” to automatically remove this dangerous virus. Once user’s click on the Worm: win32/Boberog.AZ malicious link of Infection, it gets installed into the PC and offensively makes alteration and modification in System files and components. It will mess up your system files and alters Windows Registry and browser settings. It will add unwanted annoying pop ups and fake alerts and ruin your PC performance terribly and completely. In addition to this, Worm: win32/Boberog.AZ possess great security trouble and connects your System to remote server from where hackers gain access to your PC and steal all your confidential information such as login details, bank details and other financial records and share it with hackers who use it for illegal activities which can put computer user’s in great trouble and danger. So, overall Worm: win32/Boberog.AZ infection is serious trouble and danger and need to be removed immediately with the effective removal solution. In order to remove the infection completely and forever from PC, you have to implement the solution of automatic with the assistance of automatic Worm: win32/Boberog.AZ removal tool that scan your system throughout with its strong scanning algorithm and traces all the infection related threat and get rid of the infection forever and completely and

14


removes the threat permanently from the System. So, it is strongly advised to remove the infection immediately from PC, as soon detected with the above automatic removal solution.

Problem 2: I have a serious problem on my computer. When I open my browser program it pops a message window which blocks the computer and claims the operating system is locked due to the violation of some laws such as visiting pornography, child pornography, and zoofila website among other fake claims, and then demands a fine of 100 Euro or $100 be paid by UKash or Paysafecard services.

The Metropolitan Police Ukash Ransomware is a computer virus, which will display a bogus alert that pretends to be from the UK police and states that your computer has been blocked due to it being involved with the distribution of pornographic material, SPAM and copyrighted content. The Metropolitan Police virus will lock you out of your computer and applications, so whenever you’ll try to log on into your Windows operating system or Safe Mode with Networking, it will display instead a lock screen asking you to pay a non-existing fine of 100£ in the form of a Ukash or PaySafecard code. Furthermore, to make this alert seem more authentic, this virus also has the ability to access your installed webcam so that the alert shows what is happening in the room. Metropolitan Police is nothing more than a scam and you should ignore any alert that this malicious software might generate and remove this trojan ransomware from your computer. Under no circumstance should you send any money to Metropolitan Police cyber criminals, as this could lead to identity theft, and if you have, you should contact your credit card company and dispute the charge stating that the program is a scam and a computer virus. Something like this will appear:

15


16


To remove this virus from your computer you have to do the next things:

STEP 1: Remove Metropolitan Police lock screen from your computer. Metropolitan Police Ukash Ransom has modified your Windows registry and added its malicious files to run at start-up, so whenever you’re trying to boot your computer it will launch instead its bogus notification. To remove these malicious changes, we can do the next: Restore Windows to a previous state using System Restore. System Restore can return your computer system files and programs to a time when everything was working fine, so we will try to use this Windows feature to get rid of Metropolitan Police lock screen. 1. Restart your computer and then press and hold F8 during the initial startup to start your computer in safe mode with a Command prompt. Note: With some computers, if you press and hold a key as the computer is booting you will get a stuck key message. If this occurs, instead of pressing and holding the “F8 key”, tap the “F8 key” continuously until you get the Advanced Boot Options screen. 2. Use the arrow keys to select the Safe mode with a Command prompt option.

3. At the command prompt, type cd restore, and then press ENTER. Next, we will type rstrui.exe , and then press ENTER

17


4. The System Restore window will start and you’ll need to select a restore point previous to this infection.

5. After System Restore has completed its task, you should be able to boot in Windows normal mode, from there you’ll need to perform a system scan (as we are going to see on STEP 2) with Malwarebytes Anti-Malware to remove the malicious files from your machine.

STEP 2: Remove Metropolitan Police malicious files from your computer. In this step you have to do the next: Run a computer scan with Malwarebytes Anti-Malware Free. 1. You can download Malwarebytes Anti-Malware Free from the below link, then double click on it to install this program. MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK (This link will open a download page in a new window from where you can download Malwarebytes Anti-Malware Free).

18


2. When the installation begins, keep following the prompts in order to continue with the setup process. DO NOT make any changes to default settings and when the program has finished installing, make sure you leave both the Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware checked, then click on the Finish button.

3. On the Scanner tab, select Perform quick scan and then click on the Scan button to start scanning your computer.

19


4. Malwarebytes’ Anti-Malware will now start scanning your computer for Metropolitan Police malicious files as shown below.

5. When the Malwarebytes scan will be completed, click on Show Result.

20


6. You will now be presented with a screen showing you the malware infections that Malwarebytes’ Anti-Malware has detected. Please note that the infections found may be different than what is shown in the image. Make sure that everything is Checked (ticked) and click on the Remove Selected button.

7. After your computer will restart, open Malwarebytes Anti-Malware and perform a Full System scan to verify that there are no remaining threats.

21


Operating System, Networks and Security problems