operating systems and networks

24
OPERATING SYSTEMS AND COMPUTING NETWORKS CARMEN RODRÍGUEZ-OSORIO PUIGDUETA

Upload: carmenpuigdueta

Post on 23-Jun-2015

145 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Operating systems and networks

OPERATING

SYSTEMS AND

COMPUTING

NETWORKS

CARMEN RODRÍGUEZ-OSORIO PUIGDUETA

Page 2: Operating systems and networks

1. WINDOWS TOOLS

•BACKUP

Utility: Backup and Restore creates safety copies of your most important personal

files, so you're always prepared for the worst. Windows can choose what to back up.

Another option is that you pick the individual folders, libraries, and drives that you

want.

How does it work? :

Her you have

to decide what

to backup

Page 3: Operating systems and networks

Then it will appear a window to see the

backup progress. When this process is

finished another window will show up saying

that the process is complete. In that same

window there will be a button called

“Report”; if you press it a notepad box will be

opened containing the detailed information of

the previous process.

To know if the backup has been successful you can delete the original copy and click again

on “Backup”. After this you just need to select the file that has been copied.

Here you have to put where you want

to make the copy. It can be a disk or

even a CD or pen drive.

Now instead of choosing

the first option, we choose

the second one: “Restore

files and settings”.

Page 4: Operating systems and networks

DISK DEFRAGMENTER

Utility: “Disk Defragmenter” is a tool that rearranges the data on your hard disk and

reunites fragmented files so your computer can run more efficiently.

How does it work?:

Select your hard disk

in the list of available

drives. Then, click on

“Defragment”.

Page 5: Operating systems and networks

FILES AND SETTINGS TRANSFER WIZARD (F.A.S.T.)

Utility: it packs up and saves files and settings to transfer them to a new computer.

How does it work?:

You have here

two options:

transfer files and

settings to the

new computer or

transfer them

from the old one.

Now we’re going

to choose the

second option.

Page 6: Operating systems and networks

Here you have to select a

transfer method. You can

do it by direct cable, a

removable media…In the

last option there’s also a

“Browse” button to select a

location (folder or disk

drive).

Now you have to

select what to

transfer. You can

transfer only settings,

only files or both.

You have also the

option to select which

files and settings you

want to transfer.

In this box you

have all the

items that will

be transfer

depending on

the option you

choose.

Page 7: Operating systems and networks

Now we’re

going to choose

the first option:

transfer files

and settings to

the new

computer.

We have to select the

last option because we

have already transferred

files and setting from the

old computer.

Here you have to say where

the wizard should look the

items you have already

transferred (by cable,

removable media or other).

Of course you have to

select the same transfer

method that you chose in

the old computer.

In case you have

transferred it to a

network drive or a

removable drive for

example, you can click

on “Browse…” and

select where the items

are.

Page 8: Operating systems and networks

SECURITY CENTER

Utility: it can help enhance the computer's security by checking the status of several

security essentials on the computer, including firewall settings, Windows automatic

updating, anti-malware software settings, Internet security settings, and User

Account Control settings. If Windows detects a problem with any of these security

essentials (for example, if the antivirus program is out of date), Security Center

displays a notification and places a Security Center icon in the notification area.

How does it work?:

First we are going to enable the . To do this you just need to click on the

Firewall box. Then, it will appear another window below. To enable it you have to click on

“Recommendations”.

We can see that

the security

essentials are not

marked on, but

When clicking on

this box you’re

saying that you have

a firewall solution

that you’ll monitor

yourself, so

Windows won’t

monitor the Firewall.

Page 9: Operating systems and networks

Now we are going to enable the . You have to click on the

Autoatic updates box. After that, another window will appear below. To enable it you have

to click on “Turn on automatic updates”.

Eventually, we’re going to enable the . To do this you have to

click on the Virus protection box. Later, another windoew will show up below. To enable it

you have to click on “Recommendations…”.

After all this processes the window that

appeared at the beginning must be like this,

with all the boxes marked with ON.

You can click on

“How?” to know

how to get another

antivirus program.

The other option is

clicking on the little

box below in case

you have an

antivirus program

and will monitor it

yourself.

Page 10: Operating systems and networks

DISK CLEANUP

Utility: it frees up space on the hard disk by searching the disk for files that you can

safely delete. You can choose to delete some of the files or all of them. To do this

you can remove temporary Internet files, empty the recycle bin, remove installed

programs that you no longer use…

How does it work?:

You have to select

the drive you want

to clean up, for

example the local

disk C.

Here you can

choose the files

you want to

delete just by

clicking on the

little boxes

placed on the

left.

Page 11: Operating systems and networks

2. COMPUTER NETWORK

LIST OF COMPONENTS FOR THE NETWORK HARDAWARE

-Network card, network adapter, or NIC (network interface card)

It’s designed to allow computers to physically access a networking medium. It

allows also any device to connect to the network without creating an address

conflict.

-Cable and connectors

There are three types of cables:

-Twisted pair using a RJ45 connector

-Coaxial cable

-Optical cables

-Hub or switch

Page 12: Operating systems and networks

They connect computers in a given network.

-Router

It forwards data packets between telecommunications networks, creating an overlay

internetwork. It is connected to two or more data lines from different networks.

It has a unique IP address in the network. This address is also known as gateway

address.

Page 13: Operating systems and networks

•SCHEMEOF THE EQUIPMENT AND DEVICES CONNECTIONS

*Ethernet cables: are copper wires carrying electric signals.

Page 14: Operating systems and networks

NETWORKS SOFTWARE SETTINGS AND PROTOCOLS

-Name and workgroup

First we have to click on “Start” and on “My computer”. Once we are in “My

computer” window we click with the right button and select “Properties”.

Then we have to click on “Computer name” and select “Change”. Another window

will show up and here we have to change the name of the workgroup. We can also

change the computer name. When clicking on OK it will appear window saying that

you must restore the computer for the changes to take effect.

We change the

name of the

workgroup so

that all the

computers of

the network

have the same

name showing

that are part of

a whole (the

workgroup).

Page 15: Operating systems and networks

-IP address and other information

Go to “Start” and click on “Control Panel”. Double click on “Networks

connections”.

Clik on “Network connection”

Page 16: Operating systems and networks

Right click correct Local Are Connection by identifying correct network card and

click “Properties”.

Select “Internet Protocol (TPC/IP). Click on “Properties”.

Page 17: Operating systems and networks

Now we can key in the IP address, Subnet mask, Default gateway and DNS servers.

To do this first we have to select “Use the following IP address”. Then we can key

all the data. The IP address and the subnet mas must be the ones of our computer.

In the box of the default gateway we have to key the IP address but changing the

last number. In the Preferred DNS server we have to key also the IP address but

choosing a different last number.

-The IP address of the computer must be unique. None

of the computers in the network can share the same IP

address, because it would cause and IP address conflict.

-Default gateway is a router that can route the traffic to

the other network or Internet.

-DNS server is an application server that can translate

URL to IP address.

If youhave

DHCP server

setup on the

router or you

have DHCP

(Dynamic

Host

Configuration

Protocol)

server in

home

network, your

computer can

be assiged IP

address

automatically

by selecting

Obtain an IP

address

automatically

and Obtain

DNS server

address

automatically.

Page 18: Operating systems and networks

3. MSDOS COMMANDS

A command is a unique word used to perform a specific operation.

PING

It’s a utility used to verify if a network data packet is capable of being distributed to

an address without errors. The ping utility is commonly used to check for network

errors.

It helps in determining TCP/IP Networks IP address as well as determines issues

with the network and assists in resolving them.

First we have to click on “Run…”

We have to key “cmd” in the box and click on OK:

Then it will show up a window in which we have to key “ping” and the IP address

of your computer. Below that it says “0% loss”, that means that the operation has

been successful and there are not errors.

Page 19: Operating systems and networks

If we change the IP address, the operation won’t be successful and it will say 100%

loss. This happens because the IP address must be the one of the computer in which

the operation has been done.

IPCONFIG

It verifies a network connection as well as verifies the network settings.

First we have to click on “Run…”

We have to key “cmd” in the box and click on OK:

Page 20: Operating systems and networks

Then it will show up a window in which we have to key “ipconfig”.

Here we can see

the IP address, the

subnet mask and

the default

Gateway.

Page 21: Operating systems and networks

4. Security problems

PROBLEM 2:

Win32.Boberog.AQ is one of the Windows illegal malicious programs which may

occupy system resources and slow down computers. Some of such malicious

programs may frequently pop up advertising messages to interrupt computer users,

while more severely they may destroy the data in computers.

This worm is designed to be copied from a computer to another, but automatically.

First it controls the characteristics of the computer that allows transfers files. Once

that worm is in the computer it can travels alone.

-Causes: this worm can appear on the computer when opening a program that is

infected. It’s normally transmitted by files attached in an email.

-How to prevent it?: the only thing you can do is not opening any attached file to

an email from an email address unknown.

-Possible solution: as the antivirus detects the problem but cannot solve it you have

to do something to remove it.

There are two possible solutions. The first one is a manual one pretty difficult that

requires a big knowledge of software. The other one is an automatic one.

You have to install Worm: win32/Boberog.AZ removal tool. This software will

remove this virus automatically. The software scans the PC thoroughly for detecting

all threats that exist within and helps to clean them. But, there are cases in which the

software download process would fail and, therefore it requires to follow the

following steps:

1)Click on the box placed in Internet Explorer “Tools”. Then select “Internet

Options”.

2) Click on the “Connections” option. Then select “LAN Settings”.

3) Then click on the box “Use a proxy server for your LAN” and click OK to

proceed.

4) Once this process is completed you can download the Automatic tool to scan PC

easily.

http://www.spydig.com/spyware-info/Win32-Boberog-AQ.html

http://www.slideshare.net/mikejacob/remove-wormwin32boberogaz

PROBLEM 4:

-Causes: Windows XP will automatically load and startup all the programs that are

in the startup folder whether you intend to use them or not.

-How to prevent it?: delete a program when you don’t use it anymore so that it

doesn’t accumulate in the computer and make it runs slowly.

Page 22: Operating systems and networks

-Possible solution: to be able to speed up the boot up process of your XP Windows

PC you have to remove the programs that usually bog it down. Process:

1) Click on Start, then Run, and type "msconfig". Wait for a new window to pop up.

2) Look under the "BOOT.INI" tab. You will see a box labeled "Timeout:", and a

numerical value. By default, it's 30, which means 30 seconds of wait time before

boot. This can be changed, make it 4 seconds.

3) Delete The Temporary Files Periodically From Your Computer To Make The

Applications Run Faster. Type %temp% in the run dialog box by clicking on Start -

> Run, and click on "OK". You will see an open folder with many files. Click on the

Edit menu and click on Select all and then click on the File menu and select Delete.

Page 23: Operating systems and networks

4) Perform a Scandisk To See That Your Computer Hard Drive is in Healthy

Condition and it helps Your Computer Run Faster.

5) Always Perform a Disk Defragmentation at least once a month. Start the disk

defragmentation from the System Tools menu available in the Accessories menu

from the Start menu.

http://www.wikihow.com/Make-Windows-XP-Startup-Faster

PROBLEM 5:

-Causes: a virus has been transmitted to your computer.

-How to prevent it?: install an antivirus from the beginning and update it before it

expires.

Page 24: Operating systems and networks

-Possible solution: try logging into Safe Mode with Networking and downloading

from there an anti-malware. Safe Mode with Networking sometimes keeps malware

from running and protecting itself.

To get into Safe Mode with Networking you have to:

1) Log out and reboot your machine.

2) When the machine starts the reboot sequence, press the F8 key repeatedly.

3) Select Safe Mode with Networking from the resulting menu.

4) Login. If the malware has changed your password, try logging in as

Administrator. By default, Administrator has no password.

5) The machine will continue booting, but the Windows desktop will look different.

6) When you're finished doing what you need to do, log out and reboot back into

normal mode.

www.yahooanswers.com