os and network activity javier guerrero

22
PRACTICAL ACTIVITY 5 Operating Systems, Computing Networks and presentation of information. Javier Guerrero Matallanos 1º Bach. Secciones

Upload: jguerrerom96

Post on 16-Aug-2015

39 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Os and network activity   javier guerrero

PRACTICAL ACTIVITY 5 Operating Systems, Computing Networks and presentation of information.

Javier Guerrero Matallanos 1º Bach. Secciones

Page 2: Os and network activity   javier guerrero

1

iNDEX

WINDOWS XP TOOLS

MOUSE PROPERTIES: PAGE 2

ADD OR REMOVE PROGRAMS: PAGE 3

USER ACCOUNTS: PAGE 4

SECURITY CENTER: PAGE 5

REGIONAL AND LANGUAGE OPTIONS: PAGE 6

COMPUTER NETWORK: PAGES 7-10

MS DOS COMMANDS: PAGES 11-13

SECURITY PROBLEMS: PAGES 14-21

Page 3: Os and network activity   javier guerrero

2

MOUSE PROPERTIES

Path: My Computer - Control panel - Printers and other

hardware - Mouse

This Windows XP tool allows you to change the properties of

your mouse (buttons configuration, double click speed,

appearance, type of pointer, etc.).

In the window “Pointers” you can choose between many

kinds of pointers that Windows XP OS allows you to use.

The window “Wheel” allows you to change some aspects

of the wheel of the mouse.

Once you have select all the options, you have to click to “Apply”, to set the changes, and then click “OK” to close the

window “Mouse properties”.

In this window (“Buttons”) you have the option

to change the configuration of the buttons

(you can assign to the right button the

functions of the left, and to the left the ones of

the right) selecting the option “Switch primary

and secondary buttons”.

The window “Pointer Options” allows you to

change some aspects of the pointer, such as the

speed the pointer moves (“Motion”) and other

options related to the visibility of the pointer, as

we can see in the image.

Page 4: Os and network activity   javier guerrero

3

ADD OR REMOVE PROGRAMS

Path: My computer - Control panel - Add or remove programs

This Windows XP tool allows you to add new programs to the computer using different methods, remove programs you

don’t want and change the place where the programs are.

In this window you select the

program you want to change

or remove. If you click to

“Remove” the tool will give

you the option to uninstall

the program and all his

components.

All the programs you have

installed are in the list.

In this window, you can add

programs by two different ways:

1. From a CD or a Floppy

disk, selecting the first

option “CD or Floppy”.

2. Using the Windows OS,

by the internet, clicking in

“Windows Update”.

You can also add and remove

some Windows components and

set the options for some

programs.

Page 5: Os and network activity   javier guerrero

4

USER ACCOUNTS

Path: My computer – Control Panel – User Accounts

This tool allows you to create new user accounts and

change the options of the ones you have created.

It´s important to have a Computer administrator

account, because with this one you can control the

computer and change all computer settings.

To create a new user account you have to click on

“Create a new account”.

To change accounts you have to click in the one you

want to select (has to be created before).

Let’s create a new account:

The next step is to pick an account type. You can

choose among three possibilities: Computer

administrator, limited or guest.

When you select one, you can see the things you

can do with each of them.

Once you have selected the type you want, you

have to click on “Create Account”.

The first step is to give a name to the new

computer account. For example:

JavierAdministrator.

Then, you click to “Next”.

Page 6: Os and network activity   javier guerrero

5

SECURITY CENTER

Path: My computer – Control Panel – Security

Center

This Windows XP tool allows you to check and

change some security options of your computer. It

also tells you if something is going wrong.

It consists of a Firewall and an Automatic Updates

window. The Virus Protection window tells you if

you installed an antivirus in your computer and also

tells you if it is working in a right way.

The Windows Firewall will detect if anyone is trying to get at

your PC, and automatically block the attempt. You can allow the

access to someone in the “Exceptions” window. If you don’t

want to allow the exception to get at your PC you have to select

“Don’t allow exceptions”. The best option is to have always the

firewall in “On”.

The Automatic Updates window allows you to select the

way you want the Windows XP OS install updates and

when does it have to do it. If you want the Windows XP

OS to install all automatically you have to click in

“Automatic”. In my opinion the best options are the

second and the third one.

Page 7: Os and network activity   javier guerrero

6

REGIONAL AND LANGUAGE OPTIONS

Path: My computer – Control Panel – Date, time, language and regional options – Regional and Language options

With Regional and Language Options, you can change the format

Windows uses to display dates, times, currency amounts, large

numbers, and numbers with decimal fractions.

You can also choose from a large number of input languages and

text services, such as different keyboard layouts, Input Method

Editors, and speech and handwriting recognition programs. When

you switch to another input language, some programs offer

special features, such as font characters or spelling checkers

designed for different languages.

Each language has a default keyboard layout, but many languages

have alternate versions. Even if you do most of your work in one

language, you might want to try other layouts. In English, for

example, typing letters with accents might be simpler with the

U.S.-International layout.

You can set your location, in this way the system will provide your

local information, such as news and weather.

By default, Windows XP installs the files for most

input languages supported by Windows. However,

if you want to enter or display text in the East Asian

languages (Chinese, Japanese, or Korean) or the

complex script and right-to-left languages (Arabic,

Armenian, Georgian, Hebrew, the Indic languages,

Thai, or Vietnamese), you can install the language

files from the Windows CD-ROM or, if applicable, a

network.

Page 8: Os and network activity   javier guerrero

7

Computer network

We are going to create a network composed by 7 computers sharing an internet connection and a printer.

To start creating the network we will need all those things:

OBJECT NUMBER YOU NEED

Computers 7

Network printer 1

Switch (or hub) 1

Router 1

Ethernet cable with RJ45 connector 9

Telephone socket 1

Telephone cable 1

Internet company 1

Network card for each computer (the computer

has it normally) 7

The network card it’s normally in the computer, but if you don’t have it or your computer is very old and doesn’t have it,

you’ll have to buy one.

The structure of the network will be a star topology (or structure), in which each network host is connected to a central

hub with a point-to-point connection. The network hosts (components of the network) will be connected to the central

hub or switch with an Ethernet cable with RJ45 connector. Then, the router will be connected to a telephone socket with

a telephone cable.

The switch is used to connect computers in a given network.

The router is a device that forwards data packets between telecommunications networks, creating an overlay

internetwork. The router has a unique IP address in the network and this address is also known as the gateway address

(we will see this later).

The computer has to be a network computer and not an ordinary computer, which can be only connected to each single

computer by an USB connector.

Page 9: Os and network activity   javier guerrero

8

The final result has to be like this:

Once we have installed all the components we have to set the network settings.

We have to give a name to each of the computers of the network. We can do that by going to My Computer and then

clicking with the right button of the mouse in Properties.

To change the name of the computer, you have to click in “Change”.

ROUTER

TELEPHONE

SOCKET

Page 10: Os and network activity   javier guerrero

9

When you do that, this window appears:

Here you can set the name of the computer, which is going to

be” JGuerreroM” and you have to select that you are member

of the workgroup called “GUERRENETWORK” which is the

network we have just created.

Once we have done that, we have to set the Internet protocol

properties (IP address and gateway address).

To do that we have to go to My computer – Control panel –

Internet and network connections – Network connections.

The next window will appear. You have to select the “Local area connection” (conexión de area local) and then in the

next window that will appear select “Internet protocol” (protocolo de internet).

Page 11: Os and network activity   javier guerrero

10

Once you select the Internet protocol, click in properties and it will be displayed the next window:

You have to select the option “Use the following

IP address” and then set the configuration of the

computer (you have to do the same with the

others).

The IP address of each of the computers of the

network has to be unique, because if some of

them are the same, it causes IP address conflict.

So you have to give a different IP address for

each of the computers.

The default gateway is the IP address of the

network, and the seven computers in the

network have to have the same default

gateway.

Once you have done this, you can start using the network.

Page 12: Os and network activity   javier guerrero

11

MSDOS COMMANDS

Once we have created the network and set the correct settings, we can check if it is working correctly by using the

MSDOS commands.

To get here we can follow the next path: START – Run.

It will be displayed the next window:

We have to write “cmd” and then click to ok and the MSDOS commands will be open.

Once here, we are going to use two commands to check if the network is working properly: ipconfig and ping.

IPCONFIG: displays the IP address, subnet mask, and default gateway for all adapters. In this way we can check if the IP

address and the default gateway is the same as the one we set for the computer.

If the network is working correctly has to be the same that we set before.

Page 13: Os and network activity   javier guerrero

12

PING: is a command which tells you if the connection between your computer and a particular domain is working

correctly.

If you are having connectivity problems, you can use the ping command to check the destination IP address you want to

reach and record the results. The ping command displays whether the destination responded and how long it took to

receive a reply. If there is an error in the delivery to the destination, the ping command displays an error message.

You can use the ping command to:

Ping your computer (by address, not host name) to determine that TCP/IP is functioning. (Pinging your computer

does not verify that your network adapter is functioning.)

Ping the local router to determine whether the router is running.

Ping beyond your local router.

To check connectivity by using the ping command, at the command prompt, type ping and the IP address you want to

reach.

A response of "Destination net unreachable" means there was no route to the destination. You need to check the

routing table on the router listed in the "Reply from" address in the "Destination net unreachable" message.

A response of "Request timed out" means that there was no response to the ping in the default time period (1 second).

You can check for the following:

A router is down.

The destination host is down.

Physically verify that the host is running or check connectivity through another protocol.

There is no route back to your computer.

If the host is running, you can check for a return route by viewing the default gateway and local routing table on

the destination host.

We are going to check if our network is working correctly by using the ping command. As we see before, we have to

write ping and the IP address of our computer.

If all is correct and the IP address is the real one, this is what we have to see:

Page 14: Os and network activity   javier guerrero

13

Let’s put a wrong IP address and we’ll see what happens.

We can see “Request timed out” and 100% lost, which means that it is not working (because the IP address doesn’t

exists, in this case).

Page 15: Os and network activity   javier guerrero

14

SECURITY PROBLEMS

Problem 1: The antivirus detects an infection (Internet worm) win32/boberog.AQ in working

memory. It seems my antivirus detects it but cannot solve the problem.

Worm: win32/Boberog.AZ is known as dangerous Computer infection for the PC and has affected many computers with

its malicious properties and infection. This infection actually belongs to the family of dangerous computer worms which

are notorious for hampering your PC both in terms of performance as well as security. This infection is mainly

distributed by the hackers who use it for illegal activities and they use illicit means to infect your system and deteriorate

System workings. The main source of entry of Worm: win32/Boberog.AZ infection is through spam emails, hacked and

compromised websites, through corrupted freeware and shareware programs and through untrustworthy sites.

“Worm: win32/Boberog.AZ” is really dangerous virus, It needs to be removed as soon as possible. Click the image to

download the software which removes Worm: win32/Boberog.AZ infections completely.

Download Worm: “win32/Boberog.AZ removal utility” to automatically remove this dangerous virus.

Once user’s click on the Worm: win32/Boberog.AZ malicious link of Infection, it gets installed into the PC and offensively

makes alteration and modification in System files and components. It will mess up your system files and alters Windows

Registry and browser settings. It will add unwanted annoying pop ups and fake alerts and ruin your PC performance

terribly and completely. In addition to this, Worm: win32/Boberog.AZ possess great security trouble and connects your

System to remote server from where hackers gain access to your PC and steal all your confidential information such as

login details, bank details and other financial records and share it with hackers who use it for illegal activities which can

put computer user’s in great trouble and danger. So, overall Worm: win32/Boberog.AZ infection is serious trouble and

danger and need to be removed immediately with the effective removal solution.

In order to remove the infection completely and forever from PC, you have to implement the solution of automatic with

the assistance of automatic Worm: win32/Boberog.AZ removal tool that scan your system throughout with its strong

scanning algorithm and traces all the infection related threat and get rid of the infection forever and completely and

Page 16: Os and network activity   javier guerrero

15

removes the threat permanently from the System. So, it is strongly advised to remove the infection immediately from

PC, as soon detected with the above automatic removal solution.

Problem 2: I have a serious problem on my computer. When I open my browser program it

pops a message window which blocks the computer and claims the operating system is

locked due to the violation of some laws such as visiting pornography, child pornography,

and zoofila website among other fake claims, and then demands a fine of 100 Euro or $100

be paid by UKash or Paysafecard services.

The Metropolitan Police Ukash Ransomware is a computer virus, which will display a bogus alert that pretends to be

from the UK police and states that your computer has been blocked due to it being involved with the distribution of

pornographic material, SPAM and copyrighted content.

The Metropolitan Police virus will lock you out of your computer and applications, so whenever you’ll try to log on into

your Windows operating system or Safe Mode with Networking, it will display instead a lock screen asking you to pay a

non-existing fine of 100£ in the form of a Ukash or PaySafecard code.

Furthermore, to make this alert seem more authentic, this virus also has the ability to access your installed webcam so

that the alert shows what is happening in the room.

Metropolitan Police is nothing more than a scam and you should ignore any alert that this malicious software might

generate and remove this trojan ransomware from your computer.

Under no circumstance should you send any money to Metropolitan Police cyber criminals, as this could lead to identity

theft, and if you have, you should contact your credit card company and dispute the charge stating that the program is a

scam and a computer virus.

Something like this will appear:

Page 17: Os and network activity   javier guerrero

16

Page 18: Os and network activity   javier guerrero

17

To remove this virus from your computer you have to do the next things:

STEP 1: Remove Metropolitan Police lock screen from your computer.

Metropolitan Police Ukash Ransom has modified your Windows registry and added its malicious files to run at start-up,

so whenever you’re trying to boot your computer it will launch instead its bogus notification. To remove these malicious

changes, we can do the next:

Restore Windows to a previous state using System Restore.

System Restore can return your computer system files and programs to a time when everything was working fine, so we

will try to use this Windows feature to get rid of Metropolitan Police lock screen.

1. Restart your computer and then press and hold F8 during the initial startup to start your computer in safe mode

with a Command prompt.

Note: With some computers, if you press and hold a key as the computer is booting you will get a stuck key

message. If this occurs, instead of pressing and holding the “F8 key”, tap the “F8 key” continuously until you get

the Advanced Boot Options screen.

2. Use the arrow keys to select the Safe mode with a Command prompt option.

3. At the command prompt, type cd restore, and then press ENTER.

Next, we will type rstrui.exe , and then press ENTER

Page 19: Os and network activity   javier guerrero

18

4. The System Restore window will start and you’ll need to select a restore point previous to this infection.

5. After System Restore has completed its task, you should be able to boot in Windows normal mode, from there

you’ll need to perform a system scan (as we are going to see on STEP 2) with Malwarebytes Anti-Malware to

remove the malicious files from your machine.

STEP 2: Remove Metropolitan Police malicious files from your computer.

In this step you have to do the next:

Run a computer scan with Malwarebytes Anti-Malware Free.

1. You can download Malwarebytes Anti-Malware Free from the below link, then double click on it to install this

program.

MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK (This link will open a download page in a new window from

where you can download Malwarebytes Anti-Malware Free).

Page 20: Os and network activity   javier guerrero

19

2. When the installation begins, keep following the prompts in order to continue with the setup process.

DO NOT make any changes to default settings and when the program has finished installing, make sure you

leave both the Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware checked, then

click on the Finish button.

3. On the Scanner tab, select Perform quick scan and then click on the Scan button to start scanning your

computer.

Page 21: Os and network activity   javier guerrero

20

4. Malwarebytes’ Anti-Malware will now start scanning your computer for Metropolitan Police malicious files as

shown below.

5. When the Malwarebytes scan will be completed, click on Show Result.

Page 22: Os and network activity   javier guerrero

21

6. You will now be presented with a screen showing you the malware infections that Malwarebytes’ Anti-Malware

has detected. Please note that the infections found may be different than what is shown in the image. Make

sure that everything is Checked (ticked) and click on the Remove Selected button.

7. After your computer will restart, open Malwarebytes Anti-Malware and perform a Full System scan to verify

that there are no remaining threats.