SlideShare a Scribd company logo
1 of 24
Download to read offline
OPERATING
SYSTEMS AND
COMPUTING
NETWORKS
CARMEN RODRÍGUEZ-OSORIO PUIGDUETA
1. WINDOWS TOOLS
•BACKUP
Utility: Backup and Restore creates safety copies of your most important personal
files, so you're always prepared for the worst. Windows can choose what to back up.
Another option is that you pick the individual folders, libraries, and drives that you
want.
How does it work? :
Her you have
to decide what
to backup
Then it will appear a window to see the
backup progress. When this process is
finished another window will show up saying
that the process is complete. In that same
window there will be a button called
“Report”; if you press it a notepad box will be
opened containing the detailed information of
the previous process.
To know if the backup has been successful you can delete the original copy and click again
on “Backup”. After this you just need to select the file that has been copied.
Here you have to put where you want
to make the copy. It can be a disk or
even a CD or pen drive.
Now instead of choosing
the first option, we choose
the second one: “Restore
files and settings”.
 DISK DEFRAGMENTER
Utility: “Disk Defragmenter” is a tool that rearranges the data on your hard disk and
reunites fragmented files so your computer can run more efficiently.
How does it work?:
Select your hard disk
in the list of available
drives. Then, click on
“Defragment”.
 FILES AND SETTINGS TRANSFER WIZARD (F.A.S.T.)
Utility: it packs up and saves files and settings to transfer them to a new computer.
How does it work?:
You have here
two options:
transfer files and
settings to the
new computer or
transfer them
from the old one.
Now we’re going
to choose the
second option.
Here you have to select a
transfer method. You can
do it by direct cable, a
removable media…In the
last option there’s also a
“Browse” button to select a
location (folder or disk
drive).
Now you have to
select what to
transfer. You can
transfer only settings,
only files or both.
You have also the
option to select which
files and settings you
want to transfer.
In this box you
have all the
items that will
be transfer
depending on
the option you
choose.
Now we’re
going to choose
the first option:
transfer files
and settings to
the new
computer.
We have to select the
last option because we
have already transferred
files and setting from the
old computer.
Here you have to say where
the wizard should look the
items you have already
transferred (by cable,
removable media or other).
Of course you have to
select the same transfer
method that you chose in
the old computer.
In case you have
transferred it to a
network drive or a
removable drive for
example, you can click
on “Browse…” and
select where the items
are.
 SECURITY CENTER
Utility: it can help enhance the computer's security by checking the status of several
security essentials on the computer, including firewall settings, Windows automatic
updating, anti-malware software settings, Internet security settings, and User
Account Control settings. If Windows detects a problem with any of these security
essentials (for example, if the antivirus program is out of date), Security Center
displays a notification and places a Security Center icon in the notification area.
How does it work?:
First we are going to enable the . To do this you just need to click on the
Firewall box. Then, it will appear another window below. To enable it you have to click on
“Recommendations”.
We can see that
the security
essentials are not
marked on, but
When clicking on
this box you’re
saying that you have
a firewall solution
that you’ll monitor
yourself, so
Windows won’t
monitor the Firewall.
Now we are going to enable the . You have to click on the
Autoatic updates box. After that, another window will appear below. To enable it you have
to click on “Turn on automatic updates”.
Eventually, we’re going to enable the . To do this you have to
click on the Virus protection box. Later, another windoew will show up below. To enable it
you have to click on “Recommendations…”.
After all this processes the window that
appeared at the beginning must be like this,
with all the boxes marked with ON.
You can click on
“How?” to know
how to get another
antivirus program.
The other option is
clicking on the little
box below in case
you have an
antivirus program
and will monitor it
yourself.
 DISK CLEANUP
Utility: it frees up space on the hard disk by searching the disk for files that you can
safely delete. You can choose to delete some of the files or all of them. To do this
you can remove temporary Internet files, empty the recycle bin, remove installed
programs that you no longer use…
How does it work?:
You have to select
the drive you want
to clean up, for
example the local
disk C.
Here you can
choose the files
you want to
delete just by
clicking on the
little boxes
placed on the
left.
2. COMPUTER NETWORK
 LIST OF COMPONENTS FOR THE NETWORK HARDAWARE
-Network card, network adapter, or NIC (network interface card)
It’s designed to allow computers to physically access a networking medium. It
allows also any device to connect to the network without creating an address
conflict.
-Cable and connectors
There are three types of cables:
-Twisted pair using a RJ45 connector
-Coaxial cable
-Optical cables
-Hub or switch
They connect computers in a given network.
-Router
It forwards data packets between telecommunications networks, creating an overlay
internetwork. It is connected to two or more data lines from different networks.
It has a unique IP address in the network. This address is also known as gateway
address.
•SCHEMEOF THE EQUIPMENT AND DEVICES CONNECTIONS
*Ethernet cables: are copper wires carrying electric signals.
 NETWORKS SOFTWARE SETTINGS AND PROTOCOLS
-Name and workgroup
First we have to click on “Start” and on “My computer”. Once we are in “My
computer” window we click with the right button and select “Properties”.
Then we have to click on “Computer name” and select “Change”. Another window
will show up and here we have to change the name of the workgroup. We can also
change the computer name. When clicking on OK it will appear window saying that
you must restore the computer for the changes to take effect.
We change the
name of the
workgroup so
that all the
computers of
the network
have the same
name showing
that are part of
a whole (the
workgroup).
-IP address and other information
Go to “Start” and click on “Control Panel”. Double click on “Networks
connections”.
Clik on “Network connection”
Right click correct Local Are Connection by identifying correct network card and
click “Properties”.
Select “Internet Protocol (TPC/IP). Click on “Properties”.
Now we can key in the IP address, Subnet mask, Default gateway and DNS servers.
To do this first we have to select “Use the following IP address”. Then we can key
all the data. The IP address and the subnet mas must be the ones of our computer.
In the box of the default gateway we have to key the IP address but changing the
last number. In the Preferred DNS server we have to key also the IP address but
choosing a different last number.
-The IP address of the computer must be unique. None
of the computers in the network can share the same IP
address, because it would cause and IP address conflict.
-Default gateway is a router that can route the traffic to
the other network or Internet.
-DNS server is an application server that can translate
URL to IP address.
If youhave
DHCP server
setup on the
router or you
have DHCP
(Dynamic
Host
Configuration
Protocol)
server in
home
network, your
computer can
be assiged IP
address
automatically
by selecting
Obtain an IP
address
automatically
and Obtain
DNS server
address
automatically.
3. MSDOS COMMANDS
A command is a unique word used to perform a specific operation.
 PING
It’s a utility used to verify if a network data packet is capable of being distributed to
an address without errors. The ping utility is commonly used to check for network
errors.
It helps in determining TCP/IP Networks IP address as well as determines issues
with the network and assists in resolving them.
First we have to click on “Run…”
We have to key “cmd” in the box and click on OK:
Then it will show up a window in which we have to key “ping” and the IP address
of your computer. Below that it says “0% loss”, that means that the operation has
been successful and there are not errors.
If we change the IP address, the operation won’t be successful and it will say 100%
loss. This happens because the IP address must be the one of the computer in which
the operation has been done.
 IPCONFIG
It verifies a network connection as well as verifies the network settings.
First we have to click on “Run…”
We have to key “cmd” in the box and click on OK:
Then it will show up a window in which we have to key “ipconfig”.
Here we can see
the IP address, the
subnet mask and
the default
Gateway.
4. Security problems
 PROBLEM 2:
Win32.Boberog.AQ is one of the Windows illegal malicious programs which may
occupy system resources and slow down computers. Some of such malicious
programs may frequently pop up advertising messages to interrupt computer users,
while more severely they may destroy the data in computers.
This worm is designed to be copied from a computer to another, but automatically.
First it controls the characteristics of the computer that allows transfers files. Once
that worm is in the computer it can travels alone.
-Causes: this worm can appear on the computer when opening a program that is
infected. It’s normally transmitted by files attached in an email.
-How to prevent it?: the only thing you can do is not opening any attached file to
an email from an email address unknown.
-Possible solution: as the antivirus detects the problem but cannot solve it you have
to do something to remove it.
There are two possible solutions. The first one is a manual one pretty difficult that
requires a big knowledge of software. The other one is an automatic one.
You have to install Worm: win32/Boberog.AZ removal tool. This software will
remove this virus automatically. The software scans the PC thoroughly for detecting
all threats that exist within and helps to clean them. But, there are cases in which the
software download process would fail and, therefore it requires to follow the
following steps:
1)Click on the box placed in Internet Explorer “Tools”. Then select “Internet
Options”.
2) Click on the “Connections” option. Then select “LAN Settings”.
3) Then click on the box “Use a proxy server for your LAN” and click OK to
proceed.
4) Once this process is completed you can download the Automatic tool to scan PC
easily.
http://www.spydig.com/spyware-info/Win32-Boberog-AQ.html
http://www.slideshare.net/mikejacob/remove-wormwin32boberogaz
 PROBLEM 4:
-Causes: Windows XP will automatically load and startup all the programs that are
in the startup folder whether you intend to use them or not.
-How to prevent it?: delete a program when you don’t use it anymore so that it
doesn’t accumulate in the computer and make it runs slowly.
-Possible solution: to be able to speed up the boot up process of your XP Windows
PC you have to remove the programs that usually bog it down. Process:
1) Click on Start, then Run, and type "msconfig". Wait for a new window to pop up.
2) Look under the "BOOT.INI" tab. You will see a box labeled "Timeout:", and a
numerical value. By default, it's 30, which means 30 seconds of wait time before
boot. This can be changed, make it 4 seconds.
3) Delete The Temporary Files Periodically From Your Computer To Make The
Applications Run Faster. Type %temp% in the run dialog box by clicking on Start -
> Run, and click on "OK". You will see an open folder with many files. Click on the
Edit menu and click on Select all and then click on the File menu and select Delete.
4) Perform a Scandisk To See That Your Computer Hard Drive is in Healthy
Condition and it helps Your Computer Run Faster.
5) Always Perform a Disk Defragmentation at least once a month. Start the disk
defragmentation from the System Tools menu available in the Accessories menu
from the Start menu.
http://www.wikihow.com/Make-Windows-XP-Startup-Faster
 PROBLEM 5:
-Causes: a virus has been transmitted to your computer.
-How to prevent it?: install an antivirus from the beginning and update it before it
expires.
-Possible solution: try logging into Safe Mode with Networking and downloading
from there an anti-malware. Safe Mode with Networking sometimes keeps malware
from running and protecting itself.
To get into Safe Mode with Networking you have to:
1) Log out and reboot your machine.
2) When the machine starts the reboot sequence, press the F8 key repeatedly.
3) Select Safe Mode with Networking from the resulting menu.
4) Login. If the malware has changed your password, try logging in as
Administrator. By default, Administrator has no password.
5) The machine will continue booting, but the Windows desktop will look different.
6) When you're finished doing what you need to do, log out and reboot back into
normal mode.
www.yahooanswers.com

More Related Content

What's hot

Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenanceramsashu15
 
General PC Maintenance and Troubleshooting
General PC Maintenance and TroubleshootingGeneral PC Maintenance and Troubleshooting
General PC Maintenance and TroubleshootingRaj Alam
 
BASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTERBASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTERJohndion Ruloma
 
ANDY FLETT TOOLS summary
ANDY FLETT TOOLS summaryANDY FLETT TOOLS summary
ANDY FLETT TOOLS summaryAndy Flett
 
COC 3 - Setup Computer Systems
COC 3  - Setup Computer SystemsCOC 3  - Setup Computer Systems
COC 3 - Setup Computer SystemsDanilo Anos
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenanceMohit Patodia
 
COMPUTER Trouble shooting
COMPUTER Trouble shootingCOMPUTER Trouble shooting
COMPUTER Trouble shootingargusacademy
 
Control panel by
Control panel byControl panel by
Control panel byNoor Fatima
 
How to use disk cleanup on your PC
How to use disk cleanup on your PCHow to use disk cleanup on your PC
How to use disk cleanup on your PCrochoaz78
 
CE Diagnostic answers
CE Diagnostic answersCE Diagnostic answers
CE Diagnostic answersMichael Lew
 
Pandas tool for data scientist
Pandas tool for data scientist Pandas tool for data scientist
Pandas tool for data scientist MoTechInc
 
Basic computer for small business
Basic computer for small businessBasic computer for small business
Basic computer for small businessAjo Alex
 

What's hot (18)

Installation guide_Rajeev
Installation guide_RajeevInstallation guide_Rajeev
Installation guide_Rajeev
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Virginiatools
VirginiatoolsVirginiatools
Virginiatools
 
General PC Maintenance and Troubleshooting
General PC Maintenance and TroubleshootingGeneral PC Maintenance and Troubleshooting
General PC Maintenance and Troubleshooting
 
BASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTERBASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTER
 
ANDY FLETT TOOLS summary
ANDY FLETT TOOLS summaryANDY FLETT TOOLS summary
ANDY FLETT TOOLS summary
 
COC 3 - Setup Computer Systems
COC 3  - Setup Computer SystemsCOC 3  - Setup Computer Systems
COC 3 - Setup Computer Systems
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
 
cs506_linux
cs506_linuxcs506_linux
cs506_linux
 
COMPUTER Trouble shooting
COMPUTER Trouble shootingCOMPUTER Trouble shooting
COMPUTER Trouble shooting
 
Createlistener
CreatelistenerCreatelistener
Createlistener
 
Control panel by
Control panel byControl panel by
Control panel by
 
2.4
2.42.4
2.4
 
How to use disk cleanup on your PC
How to use disk cleanup on your PCHow to use disk cleanup on your PC
How to use disk cleanup on your PC
 
CE Diagnostic answers
CE Diagnostic answersCE Diagnostic answers
CE Diagnostic answers
 
Pandas tool for data scientist
Pandas tool for data scientist Pandas tool for data scientist
Pandas tool for data scientist
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
Basic computer for small business
Basic computer for small businessBasic computer for small business
Basic computer for small business
 

Viewers also liked

το καρναβάλι της Ναυπάκτου 2013
το καρναβάλι της Ναυπάκτου 2013το καρναβάλι της Ναυπάκτου 2013
το καρναβάλι της Ναυπάκτου 2013irkou
 
Neurologia cuantica 2
Neurologia cuantica 2Neurologia cuantica 2
Neurologia cuantica 2Xavi Gasset
 
Dealerdirect fax ned 02052013
Dealerdirect fax ned 02052013Dealerdirect fax ned 02052013
Dealerdirect fax ned 02052013Auto Verkopen
 
CANDID VOICES FROM THE FIELD RESEARCH REPORT
CANDID VOICES FROM THE FIELD RESEARCH REPORT CANDID VOICES FROM THE FIELD RESEARCH REPORT
CANDID VOICES FROM THE FIELD RESEARCH REPORT Karen McMinn
 
Ejercicio4
Ejercicio4Ejercicio4
Ejercicio4Leiro95
 
Bienio negro (nov 1933 feb 1936)
Bienio negro (nov 1933 feb 1936)Bienio negro (nov 1933 feb 1936)
Bienio negro (nov 1933 feb 1936)Orlando Rodríguez
 
Resume sameer khan
Resume sameer khanResume sameer khan
Resume sameer khanSameer Khan
 
iPhoneでリアルタイムマルチプレイを実現!Photon Network Engine
iPhoneでリアルタイムマルチプレイを実現!Photon Network EngineiPhoneでリアルタイムマルチプレイを実現!Photon Network Engine
iPhoneでリアルタイムマルチプレイを実現!Photon Network EngineGMO GlobalSign Holdings K.K.
 

Viewers also liked (13)

το καρναβάλι της Ναυπάκτου 2013
το καρναβάλι της Ναυπάκτου 2013το καρναβάλι της Ναυπάκτου 2013
το καρναβάλι της Ναυπάκτου 2013
 
Neurologia cuantica 2
Neurologia cuantica 2Neurologia cuantica 2
Neurologia cuantica 2
 
Dealerdirect fax ned 02052013
Dealerdirect fax ned 02052013Dealerdirect fax ned 02052013
Dealerdirect fax ned 02052013
 
CANDID VOICES FROM THE FIELD RESEARCH REPORT
CANDID VOICES FROM THE FIELD RESEARCH REPORT CANDID VOICES FROM THE FIELD RESEARCH REPORT
CANDID VOICES FROM THE FIELD RESEARCH REPORT
 
Ejercicio4
Ejercicio4Ejercicio4
Ejercicio4
 
Bienio negro (nov 1933 feb 1936)
Bienio negro (nov 1933 feb 1936)Bienio negro (nov 1933 feb 1936)
Bienio negro (nov 1933 feb 1936)
 
Resume sameer khan
Resume sameer khanResume sameer khan
Resume sameer khan
 
LINGKAR, Panduan Pendidikan Untuk Pengurangan Risiko Bencana TK/RA
LINGKAR, Panduan Pendidikan Untuk Pengurangan Risiko Bencana TK/RALINGKAR, Panduan Pendidikan Untuk Pengurangan Risiko Bencana TK/RA
LINGKAR, Panduan Pendidikan Untuk Pengurangan Risiko Bencana TK/RA
 
HDI
HDIHDI
HDI
 
iPhoneでリアルタイムマルチプレイを実現!Photon Network Engine
iPhoneでリアルタイムマルチプレイを実現!Photon Network EngineiPhoneでリアルタイムマルチプレイを実現!Photon Network Engine
iPhoneでリアルタイムマルチプレイを実現!Photon Network Engine
 
Presentacio 5è A
Presentacio 5è APresentacio 5è A
Presentacio 5è A
 
Frozen flower
Frozen flowerFrozen flower
Frozen flower
 
Presentació sant jordi 4t b de primària
Presentació sant jordi 4t b de primàriaPresentació sant jordi 4t b de primària
Presentació sant jordi 4t b de primària
 

Similar to Operating systems and networks

Operating systems
Operating systemsOperating systems
Operating systemssandrahezro
 
Operating systems and computing networks
Operating systems and computing networksOperating systems and computing networks
Operating systems and computing networksRociocmf
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptxChandniK7
 
Installation of TCP/IP protocol and windows components
Installation of TCP/IP protocol and windows componentsInstallation of TCP/IP protocol and windows components
Installation of TCP/IP protocol and windows componentsWarda Chaudhry
 
Help! My PC Just Died & Our Techie Is On Vacation!
Help! My PC Just Died & Our Techie Is On Vacation!Help! My PC Just Died & Our Techie Is On Vacation!
Help! My PC Just Died & Our Techie Is On Vacation!Kathy Lussier
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer TroubleshootingRence Montanes
 
Installation of oracle 12c RAC on linux vm
Installation of oracle 12c RAC  on linux vmInstallation of oracle 12c RAC  on linux vm
Installation of oracle 12c RAC on linux vmRon Morgan
 
Boss components
Boss componentsBoss components
Boss componentsmcganesh
 
CCleaner and case studies in Cyber Security
CCleaner and case studies in Cyber SecurityCCleaner and case studies in Cyber Security
CCleaner and case studies in Cyber SecuritykartikaVashisht
 
Connectivity methods in networking
Connectivity methods in networkingConnectivity methods in networking
Connectivity methods in networkingGohAr_MaLiik
 
Ubuntu getting started
Ubuntu getting startedUbuntu getting started
Ubuntu getting startedErnesto Celis
 

Similar to Operating systems and networks (20)

Operating systems
Operating systemsOperating systems
Operating systems
 
computing networks and operating system
computing networks and operating system computing networks and operating system
computing networks and operating system
 
Presentation1
Presentation1Presentation1
Presentation1
 
Operating systems and computing networks
Operating systems and computing networksOperating systems and computing networks
Operating systems and computing networks
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptx
 
Virginiatools
VirginiatoolsVirginiatools
Virginiatools
 
Virginiatools
VirginiatoolsVirginiatools
Virginiatools
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
 
Apple mac
Apple macApple mac
Apple mac
 
Installation of TCP/IP protocol and windows components
Installation of TCP/IP protocol and windows componentsInstallation of TCP/IP protocol and windows components
Installation of TCP/IP protocol and windows components
 
Help! My PC Just Died & Our Techie Is On Vacation!
Help! My PC Just Died & Our Techie Is On Vacation!Help! My PC Just Died & Our Techie Is On Vacation!
Help! My PC Just Died & Our Techie Is On Vacation!
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer Troubleshooting
 
Installation of oracle 12c RAC on linux vm
Installation of oracle 12c RAC  on linux vmInstallation of oracle 12c RAC  on linux vm
Installation of oracle 12c RAC on linux vm
 
Boss components
Boss componentsBoss components
Boss components
 
Presentation operation system
Presentation operation systemPresentation operation system
Presentation operation system
 
Users guide
Users guideUsers guide
Users guide
 
CCleaner and case studies in Cyber Security
CCleaner and case studies in Cyber SecurityCCleaner and case studies in Cyber Security
CCleaner and case studies in Cyber Security
 
Connectivity methods in networking
Connectivity methods in networkingConnectivity methods in networking
Connectivity methods in networking
 
Clean up
Clean upClean up
Clean up
 
Ubuntu getting started
Ubuntu getting startedUbuntu getting started
Ubuntu getting started
 

Operating systems and networks

  • 2. 1. WINDOWS TOOLS •BACKUP Utility: Backup and Restore creates safety copies of your most important personal files, so you're always prepared for the worst. Windows can choose what to back up. Another option is that you pick the individual folders, libraries, and drives that you want. How does it work? : Her you have to decide what to backup
  • 3. Then it will appear a window to see the backup progress. When this process is finished another window will show up saying that the process is complete. In that same window there will be a button called “Report”; if you press it a notepad box will be opened containing the detailed information of the previous process. To know if the backup has been successful you can delete the original copy and click again on “Backup”. After this you just need to select the file that has been copied. Here you have to put where you want to make the copy. It can be a disk or even a CD or pen drive. Now instead of choosing the first option, we choose the second one: “Restore files and settings”.
  • 4.  DISK DEFRAGMENTER Utility: “Disk Defragmenter” is a tool that rearranges the data on your hard disk and reunites fragmented files so your computer can run more efficiently. How does it work?: Select your hard disk in the list of available drives. Then, click on “Defragment”.
  • 5.  FILES AND SETTINGS TRANSFER WIZARD (F.A.S.T.) Utility: it packs up and saves files and settings to transfer them to a new computer. How does it work?: You have here two options: transfer files and settings to the new computer or transfer them from the old one. Now we’re going to choose the second option.
  • 6. Here you have to select a transfer method. You can do it by direct cable, a removable media…In the last option there’s also a “Browse” button to select a location (folder or disk drive). Now you have to select what to transfer. You can transfer only settings, only files or both. You have also the option to select which files and settings you want to transfer. In this box you have all the items that will be transfer depending on the option you choose.
  • 7. Now we’re going to choose the first option: transfer files and settings to the new computer. We have to select the last option because we have already transferred files and setting from the old computer. Here you have to say where the wizard should look the items you have already transferred (by cable, removable media or other). Of course you have to select the same transfer method that you chose in the old computer. In case you have transferred it to a network drive or a removable drive for example, you can click on “Browse…” and select where the items are.
  • 8.  SECURITY CENTER Utility: it can help enhance the computer's security by checking the status of several security essentials on the computer, including firewall settings, Windows automatic updating, anti-malware software settings, Internet security settings, and User Account Control settings. If Windows detects a problem with any of these security essentials (for example, if the antivirus program is out of date), Security Center displays a notification and places a Security Center icon in the notification area. How does it work?: First we are going to enable the . To do this you just need to click on the Firewall box. Then, it will appear another window below. To enable it you have to click on “Recommendations”. We can see that the security essentials are not marked on, but When clicking on this box you’re saying that you have a firewall solution that you’ll monitor yourself, so Windows won’t monitor the Firewall.
  • 9. Now we are going to enable the . You have to click on the Autoatic updates box. After that, another window will appear below. To enable it you have to click on “Turn on automatic updates”. Eventually, we’re going to enable the . To do this you have to click on the Virus protection box. Later, another windoew will show up below. To enable it you have to click on “Recommendations…”. After all this processes the window that appeared at the beginning must be like this, with all the boxes marked with ON. You can click on “How?” to know how to get another antivirus program. The other option is clicking on the little box below in case you have an antivirus program and will monitor it yourself.
  • 10.  DISK CLEANUP Utility: it frees up space on the hard disk by searching the disk for files that you can safely delete. You can choose to delete some of the files or all of them. To do this you can remove temporary Internet files, empty the recycle bin, remove installed programs that you no longer use… How does it work?: You have to select the drive you want to clean up, for example the local disk C. Here you can choose the files you want to delete just by clicking on the little boxes placed on the left.
  • 11. 2. COMPUTER NETWORK  LIST OF COMPONENTS FOR THE NETWORK HARDAWARE -Network card, network adapter, or NIC (network interface card) It’s designed to allow computers to physically access a networking medium. It allows also any device to connect to the network without creating an address conflict. -Cable and connectors There are three types of cables: -Twisted pair using a RJ45 connector -Coaxial cable -Optical cables -Hub or switch
  • 12. They connect computers in a given network. -Router It forwards data packets between telecommunications networks, creating an overlay internetwork. It is connected to two or more data lines from different networks. It has a unique IP address in the network. This address is also known as gateway address.
  • 13. •SCHEMEOF THE EQUIPMENT AND DEVICES CONNECTIONS *Ethernet cables: are copper wires carrying electric signals.
  • 14.  NETWORKS SOFTWARE SETTINGS AND PROTOCOLS -Name and workgroup First we have to click on “Start” and on “My computer”. Once we are in “My computer” window we click with the right button and select “Properties”. Then we have to click on “Computer name” and select “Change”. Another window will show up and here we have to change the name of the workgroup. We can also change the computer name. When clicking on OK it will appear window saying that you must restore the computer for the changes to take effect. We change the name of the workgroup so that all the computers of the network have the same name showing that are part of a whole (the workgroup).
  • 15. -IP address and other information Go to “Start” and click on “Control Panel”. Double click on “Networks connections”. Clik on “Network connection”
  • 16. Right click correct Local Are Connection by identifying correct network card and click “Properties”. Select “Internet Protocol (TPC/IP). Click on “Properties”.
  • 17. Now we can key in the IP address, Subnet mask, Default gateway and DNS servers. To do this first we have to select “Use the following IP address”. Then we can key all the data. The IP address and the subnet mas must be the ones of our computer. In the box of the default gateway we have to key the IP address but changing the last number. In the Preferred DNS server we have to key also the IP address but choosing a different last number. -The IP address of the computer must be unique. None of the computers in the network can share the same IP address, because it would cause and IP address conflict. -Default gateway is a router that can route the traffic to the other network or Internet. -DNS server is an application server that can translate URL to IP address. If youhave DHCP server setup on the router or you have DHCP (Dynamic Host Configuration Protocol) server in home network, your computer can be assiged IP address automatically by selecting Obtain an IP address automatically and Obtain DNS server address automatically.
  • 18. 3. MSDOS COMMANDS A command is a unique word used to perform a specific operation.  PING It’s a utility used to verify if a network data packet is capable of being distributed to an address without errors. The ping utility is commonly used to check for network errors. It helps in determining TCP/IP Networks IP address as well as determines issues with the network and assists in resolving them. First we have to click on “Run…” We have to key “cmd” in the box and click on OK: Then it will show up a window in which we have to key “ping” and the IP address of your computer. Below that it says “0% loss”, that means that the operation has been successful and there are not errors.
  • 19. If we change the IP address, the operation won’t be successful and it will say 100% loss. This happens because the IP address must be the one of the computer in which the operation has been done.  IPCONFIG It verifies a network connection as well as verifies the network settings. First we have to click on “Run…” We have to key “cmd” in the box and click on OK:
  • 20. Then it will show up a window in which we have to key “ipconfig”. Here we can see the IP address, the subnet mask and the default Gateway.
  • 21. 4. Security problems  PROBLEM 2: Win32.Boberog.AQ is one of the Windows illegal malicious programs which may occupy system resources and slow down computers. Some of such malicious programs may frequently pop up advertising messages to interrupt computer users, while more severely they may destroy the data in computers. This worm is designed to be copied from a computer to another, but automatically. First it controls the characteristics of the computer that allows transfers files. Once that worm is in the computer it can travels alone. -Causes: this worm can appear on the computer when opening a program that is infected. It’s normally transmitted by files attached in an email. -How to prevent it?: the only thing you can do is not opening any attached file to an email from an email address unknown. -Possible solution: as the antivirus detects the problem but cannot solve it you have to do something to remove it. There are two possible solutions. The first one is a manual one pretty difficult that requires a big knowledge of software. The other one is an automatic one. You have to install Worm: win32/Boberog.AZ removal tool. This software will remove this virus automatically. The software scans the PC thoroughly for detecting all threats that exist within and helps to clean them. But, there are cases in which the software download process would fail and, therefore it requires to follow the following steps: 1)Click on the box placed in Internet Explorer “Tools”. Then select “Internet Options”. 2) Click on the “Connections” option. Then select “LAN Settings”. 3) Then click on the box “Use a proxy server for your LAN” and click OK to proceed. 4) Once this process is completed you can download the Automatic tool to scan PC easily. http://www.spydig.com/spyware-info/Win32-Boberog-AQ.html http://www.slideshare.net/mikejacob/remove-wormwin32boberogaz  PROBLEM 4: -Causes: Windows XP will automatically load and startup all the programs that are in the startup folder whether you intend to use them or not. -How to prevent it?: delete a program when you don’t use it anymore so that it doesn’t accumulate in the computer and make it runs slowly.
  • 22. -Possible solution: to be able to speed up the boot up process of your XP Windows PC you have to remove the programs that usually bog it down. Process: 1) Click on Start, then Run, and type "msconfig". Wait for a new window to pop up. 2) Look under the "BOOT.INI" tab. You will see a box labeled "Timeout:", and a numerical value. By default, it's 30, which means 30 seconds of wait time before boot. This can be changed, make it 4 seconds. 3) Delete The Temporary Files Periodically From Your Computer To Make The Applications Run Faster. Type %temp% in the run dialog box by clicking on Start - > Run, and click on "OK". You will see an open folder with many files. Click on the Edit menu and click on Select all and then click on the File menu and select Delete.
  • 23. 4) Perform a Scandisk To See That Your Computer Hard Drive is in Healthy Condition and it helps Your Computer Run Faster. 5) Always Perform a Disk Defragmentation at least once a month. Start the disk defragmentation from the System Tools menu available in the Accessories menu from the Start menu. http://www.wikihow.com/Make-Windows-XP-Startup-Faster  PROBLEM 5: -Causes: a virus has been transmitted to your computer. -How to prevent it?: install an antivirus from the beginning and update it before it expires.
  • 24. -Possible solution: try logging into Safe Mode with Networking and downloading from there an anti-malware. Safe Mode with Networking sometimes keeps malware from running and protecting itself. To get into Safe Mode with Networking you have to: 1) Log out and reboot your machine. 2) When the machine starts the reboot sequence, press the F8 key repeatedly. 3) Select Safe Mode with Networking from the resulting menu. 4) Login. If the malware has changed your password, try logging in as Administrator. By default, Administrator has no password. 5) The machine will continue booting, but the Windows desktop will look different. 6) When you're finished doing what you need to do, log out and reboot back into normal mode. www.yahooanswers.com