os and network activity javier guerrero
TRANSCRIPT
PRACTICAL ACTIVITY 5 Operating Systems, Computing Networks and presentation of information.
Javier Guerrero Matallanos 1º Bach. Secciones
1
iNDEX
WINDOWS XP TOOLS
MOUSE PROPERTIES: PAGE 2
ADD OR REMOVE PROGRAMS: PAGE 3
USER ACCOUNTS: PAGE 4
SECURITY CENTER: PAGE 5
REGIONAL AND LANGUAGE OPTIONS: PAGE 6
COMPUTER NETWORK: PAGES 7-10
MS DOS COMMANDS: PAGES 11-13
SECURITY PROBLEMS: PAGES 14-21
2
MOUSE PROPERTIES
Path: My Computer - Control panel - Printers and other
hardware - Mouse
This Windows XP tool allows you to change the properties of
your mouse (buttons configuration, double click speed,
appearance, type of pointer, etc.).
In the window “Pointers” you can choose between many
kinds of pointers that Windows XP OS allows you to use.
The window “Wheel” allows you to change some aspects
of the wheel of the mouse.
Once you have select all the options, you have to click to “Apply”, to set the changes, and then click “OK” to close the
window “Mouse properties”.
In this window (“Buttons”) you have the option
to change the configuration of the buttons
(you can assign to the right button the
functions of the left, and to the left the ones of
the right) selecting the option “Switch primary
and secondary buttons”.
The window “Pointer Options” allows you to
change some aspects of the pointer, such as the
speed the pointer moves (“Motion”) and other
options related to the visibility of the pointer, as
we can see in the image.
3
ADD OR REMOVE PROGRAMS
Path: My computer - Control panel - Add or remove programs
This Windows XP tool allows you to add new programs to the computer using different methods, remove programs you
don’t want and change the place where the programs are.
In this window you select the
program you want to change
or remove. If you click to
“Remove” the tool will give
you the option to uninstall
the program and all his
components.
All the programs you have
installed are in the list.
In this window, you can add
programs by two different ways:
1. From a CD or a Floppy
disk, selecting the first
option “CD or Floppy”.
2. Using the Windows OS,
by the internet, clicking in
“Windows Update”.
You can also add and remove
some Windows components and
set the options for some
programs.
4
USER ACCOUNTS
Path: My computer – Control Panel – User Accounts
This tool allows you to create new user accounts and
change the options of the ones you have created.
It´s important to have a Computer administrator
account, because with this one you can control the
computer and change all computer settings.
To create a new user account you have to click on
“Create a new account”.
To change accounts you have to click in the one you
want to select (has to be created before).
Let’s create a new account:
The next step is to pick an account type. You can
choose among three possibilities: Computer
administrator, limited or guest.
When you select one, you can see the things you
can do with each of them.
Once you have selected the type you want, you
have to click on “Create Account”.
The first step is to give a name to the new
computer account. For example:
JavierAdministrator.
Then, you click to “Next”.
5
SECURITY CENTER
Path: My computer – Control Panel – Security
Center
This Windows XP tool allows you to check and
change some security options of your computer. It
also tells you if something is going wrong.
It consists of a Firewall and an Automatic Updates
window. The Virus Protection window tells you if
you installed an antivirus in your computer and also
tells you if it is working in a right way.
The Windows Firewall will detect if anyone is trying to get at
your PC, and automatically block the attempt. You can allow the
access to someone in the “Exceptions” window. If you don’t
want to allow the exception to get at your PC you have to select
“Don’t allow exceptions”. The best option is to have always the
firewall in “On”.
The Automatic Updates window allows you to select the
way you want the Windows XP OS install updates and
when does it have to do it. If you want the Windows XP
OS to install all automatically you have to click in
“Automatic”. In my opinion the best options are the
second and the third one.
6
REGIONAL AND LANGUAGE OPTIONS
Path: My computer – Control Panel – Date, time, language and regional options – Regional and Language options
With Regional and Language Options, you can change the format
Windows uses to display dates, times, currency amounts, large
numbers, and numbers with decimal fractions.
You can also choose from a large number of input languages and
text services, such as different keyboard layouts, Input Method
Editors, and speech and handwriting recognition programs. When
you switch to another input language, some programs offer
special features, such as font characters or spelling checkers
designed for different languages.
Each language has a default keyboard layout, but many languages
have alternate versions. Even if you do most of your work in one
language, you might want to try other layouts. In English, for
example, typing letters with accents might be simpler with the
U.S.-International layout.
You can set your location, in this way the system will provide your
local information, such as news and weather.
By default, Windows XP installs the files for most
input languages supported by Windows. However,
if you want to enter or display text in the East Asian
languages (Chinese, Japanese, or Korean) or the
complex script and right-to-left languages (Arabic,
Armenian, Georgian, Hebrew, the Indic languages,
Thai, or Vietnamese), you can install the language
files from the Windows CD-ROM or, if applicable, a
network.
7
Computer network
We are going to create a network composed by 7 computers sharing an internet connection and a printer.
To start creating the network we will need all those things:
OBJECT NUMBER YOU NEED
Computers 7
Network printer 1
Switch (or hub) 1
Router 1
Ethernet cable with RJ45 connector 9
Telephone socket 1
Telephone cable 1
Internet company 1
Network card for each computer (the computer
has it normally) 7
The network card it’s normally in the computer, but if you don’t have it or your computer is very old and doesn’t have it,
you’ll have to buy one.
The structure of the network will be a star topology (or structure), in which each network host is connected to a central
hub with a point-to-point connection. The network hosts (components of the network) will be connected to the central
hub or switch with an Ethernet cable with RJ45 connector. Then, the router will be connected to a telephone socket with
a telephone cable.
The switch is used to connect computers in a given network.
The router is a device that forwards data packets between telecommunications networks, creating an overlay
internetwork. The router has a unique IP address in the network and this address is also known as the gateway address
(we will see this later).
The computer has to be a network computer and not an ordinary computer, which can be only connected to each single
computer by an USB connector.
8
The final result has to be like this:
Once we have installed all the components we have to set the network settings.
We have to give a name to each of the computers of the network. We can do that by going to My Computer and then
clicking with the right button of the mouse in Properties.
To change the name of the computer, you have to click in “Change”.
ROUTER
TELEPHONE
SOCKET
9
When you do that, this window appears:
Here you can set the name of the computer, which is going to
be” JGuerreroM” and you have to select that you are member
of the workgroup called “GUERRENETWORK” which is the
network we have just created.
Once we have done that, we have to set the Internet protocol
properties (IP address and gateway address).
To do that we have to go to My computer – Control panel –
Internet and network connections – Network connections.
The next window will appear. You have to select the “Local area connection” (conexión de area local) and then in the
next window that will appear select “Internet protocol” (protocolo de internet).
10
Once you select the Internet protocol, click in properties and it will be displayed the next window:
You have to select the option “Use the following
IP address” and then set the configuration of the
computer (you have to do the same with the
others).
The IP address of each of the computers of the
network has to be unique, because if some of
them are the same, it causes IP address conflict.
So you have to give a different IP address for
each of the computers.
The default gateway is the IP address of the
network, and the seven computers in the
network have to have the same default
gateway.
Once you have done this, you can start using the network.
11
MSDOS COMMANDS
Once we have created the network and set the correct settings, we can check if it is working correctly by using the
MSDOS commands.
To get here we can follow the next path: START – Run.
It will be displayed the next window:
We have to write “cmd” and then click to ok and the MSDOS commands will be open.
Once here, we are going to use two commands to check if the network is working properly: ipconfig and ping.
IPCONFIG: displays the IP address, subnet mask, and default gateway for all adapters. In this way we can check if the IP
address and the default gateway is the same as the one we set for the computer.
If the network is working correctly has to be the same that we set before.
12
PING: is a command which tells you if the connection between your computer and a particular domain is working
correctly.
If you are having connectivity problems, you can use the ping command to check the destination IP address you want to
reach and record the results. The ping command displays whether the destination responded and how long it took to
receive a reply. If there is an error in the delivery to the destination, the ping command displays an error message.
You can use the ping command to:
Ping your computer (by address, not host name) to determine that TCP/IP is functioning. (Pinging your computer
does not verify that your network adapter is functioning.)
Ping the local router to determine whether the router is running.
Ping beyond your local router.
To check connectivity by using the ping command, at the command prompt, type ping and the IP address you want to
reach.
A response of "Destination net unreachable" means there was no route to the destination. You need to check the
routing table on the router listed in the "Reply from" address in the "Destination net unreachable" message.
A response of "Request timed out" means that there was no response to the ping in the default time period (1 second).
You can check for the following:
A router is down.
The destination host is down.
Physically verify that the host is running or check connectivity through another protocol.
There is no route back to your computer.
If the host is running, you can check for a return route by viewing the default gateway and local routing table on
the destination host.
We are going to check if our network is working correctly by using the ping command. As we see before, we have to
write ping and the IP address of our computer.
If all is correct and the IP address is the real one, this is what we have to see:
13
Let’s put a wrong IP address and we’ll see what happens.
We can see “Request timed out” and 100% lost, which means that it is not working (because the IP address doesn’t
exists, in this case).
14
SECURITY PROBLEMS
Problem 1: The antivirus detects an infection (Internet worm) win32/boberog.AQ in working
memory. It seems my antivirus detects it but cannot solve the problem.
Worm: win32/Boberog.AZ is known as dangerous Computer infection for the PC and has affected many computers with
its malicious properties and infection. This infection actually belongs to the family of dangerous computer worms which
are notorious for hampering your PC both in terms of performance as well as security. This infection is mainly
distributed by the hackers who use it for illegal activities and they use illicit means to infect your system and deteriorate
System workings. The main source of entry of Worm: win32/Boberog.AZ infection is through spam emails, hacked and
compromised websites, through corrupted freeware and shareware programs and through untrustworthy sites.
“Worm: win32/Boberog.AZ” is really dangerous virus, It needs to be removed as soon as possible. Click the image to
download the software which removes Worm: win32/Boberog.AZ infections completely.
Download Worm: “win32/Boberog.AZ removal utility” to automatically remove this dangerous virus.
Once user’s click on the Worm: win32/Boberog.AZ malicious link of Infection, it gets installed into the PC and offensively
makes alteration and modification in System files and components. It will mess up your system files and alters Windows
Registry and browser settings. It will add unwanted annoying pop ups and fake alerts and ruin your PC performance
terribly and completely. In addition to this, Worm: win32/Boberog.AZ possess great security trouble and connects your
System to remote server from where hackers gain access to your PC and steal all your confidential information such as
login details, bank details and other financial records and share it with hackers who use it for illegal activities which can
put computer user’s in great trouble and danger. So, overall Worm: win32/Boberog.AZ infection is serious trouble and
danger and need to be removed immediately with the effective removal solution.
In order to remove the infection completely and forever from PC, you have to implement the solution of automatic with
the assistance of automatic Worm: win32/Boberog.AZ removal tool that scan your system throughout with its strong
scanning algorithm and traces all the infection related threat and get rid of the infection forever and completely and
15
removes the threat permanently from the System. So, it is strongly advised to remove the infection immediately from
PC, as soon detected with the above automatic removal solution.
Problem 2: I have a serious problem on my computer. When I open my browser program it
pops a message window which blocks the computer and claims the operating system is
locked due to the violation of some laws such as visiting pornography, child pornography,
and zoofila website among other fake claims, and then demands a fine of 100 Euro or $100
be paid by UKash or Paysafecard services.
The Metropolitan Police Ukash Ransomware is a computer virus, which will display a bogus alert that pretends to be
from the UK police and states that your computer has been blocked due to it being involved with the distribution of
pornographic material, SPAM and copyrighted content.
The Metropolitan Police virus will lock you out of your computer and applications, so whenever you’ll try to log on into
your Windows operating system or Safe Mode with Networking, it will display instead a lock screen asking you to pay a
non-existing fine of 100£ in the form of a Ukash or PaySafecard code.
Furthermore, to make this alert seem more authentic, this virus also has the ability to access your installed webcam so
that the alert shows what is happening in the room.
Metropolitan Police is nothing more than a scam and you should ignore any alert that this malicious software might
generate and remove this trojan ransomware from your computer.
Under no circumstance should you send any money to Metropolitan Police cyber criminals, as this could lead to identity
theft, and if you have, you should contact your credit card company and dispute the charge stating that the program is a
scam and a computer virus.
Something like this will appear:
16
17
To remove this virus from your computer you have to do the next things:
STEP 1: Remove Metropolitan Police lock screen from your computer.
Metropolitan Police Ukash Ransom has modified your Windows registry and added its malicious files to run at start-up,
so whenever you’re trying to boot your computer it will launch instead its bogus notification. To remove these malicious
changes, we can do the next:
Restore Windows to a previous state using System Restore.
System Restore can return your computer system files and programs to a time when everything was working fine, so we
will try to use this Windows feature to get rid of Metropolitan Police lock screen.
1. Restart your computer and then press and hold F8 during the initial startup to start your computer in safe mode
with a Command prompt.
Note: With some computers, if you press and hold a key as the computer is booting you will get a stuck key
message. If this occurs, instead of pressing and holding the “F8 key”, tap the “F8 key” continuously until you get
the Advanced Boot Options screen.
2. Use the arrow keys to select the Safe mode with a Command prompt option.
3. At the command prompt, type cd restore, and then press ENTER.
Next, we will type rstrui.exe , and then press ENTER
18
4. The System Restore window will start and you’ll need to select a restore point previous to this infection.
5. After System Restore has completed its task, you should be able to boot in Windows normal mode, from there
you’ll need to perform a system scan (as we are going to see on STEP 2) with Malwarebytes Anti-Malware to
remove the malicious files from your machine.
STEP 2: Remove Metropolitan Police malicious files from your computer.
In this step you have to do the next:
Run a computer scan with Malwarebytes Anti-Malware Free.
1. You can download Malwarebytes Anti-Malware Free from the below link, then double click on it to install this
program.
MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK (This link will open a download page in a new window from
where you can download Malwarebytes Anti-Malware Free).
19
2. When the installation begins, keep following the prompts in order to continue with the setup process.
DO NOT make any changes to default settings and when the program has finished installing, make sure you
leave both the Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware checked, then
click on the Finish button.
3. On the Scanner tab, select Perform quick scan and then click on the Scan button to start scanning your
computer.
20
4. Malwarebytes’ Anti-Malware will now start scanning your computer for Metropolitan Police malicious files as
shown below.
5. When the Malwarebytes scan will be completed, click on Show Result.
21
6. You will now be presented with a screen showing you the malware infections that Malwarebytes’ Anti-Malware
has detected. Please note that the infections found may be different than what is shown in the image. Make
sure that everything is Checked (ticked) and click on the Remove Selected button.
7. After your computer will restart, open Malwarebytes Anti-Malware and perform a Full System scan to verify
that there are no remaining threats.