CompTIA Network+ Lab Series Network Concepts. Lab 11: Business Continuity - Disaster Recovery

Size: px
Start display at page:

Download "CompTIA Network+ Lab Series Network Concepts. Lab 11: Business Continuity - Disaster Recovery"

Transcription

1 CompTIA Network+ Lab Series Network Concepts Lab 11: Business Continuity - Disaster Recovery Objective 5.4: Explain common threats, vulnerabilities, and mitigation techniques Document Version: otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported License. Development was funded by the Department of Labor (DOL) Trade Adjustment Assistance Community College and Career Training (TAACCCT) Grant No. TC A-48; The National Information Security, Geospatial Technologies Consortium (NISGTC) is an entity of Collin College of Texas, Bellevue College of Washington, Bunker Hill Community College of Massachusetts, Del Mar College of Texas, Moraine Valley Community College of Illinois, Rio Salado College of Arizona, and Salt Lake Community College of Utah. This workforce solution was funded by a grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties or assurances of any kind, express or implied, with respect to such information, including any information on linked sites, and including, but not limited to accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership.

2 Contents Introduction... 3 Objective: Explain common threats, vulnerabilities, and mitigation techniques... 3 Lab Topology... 5 Lab Settings Create a Data Backup Using Windows Server Backup Enable Windows Server Backup Features Create a Backup Volume Configure Windows Server Backup Review Questions Restore Data from a Data Backup Delete a File to Restore from Backup Restore Deleted Data to its Original Location Verify Recovery of the File Review Questions Use a Virus Test File to Test the Antivirus Software Using a Virus Test File To Test Antivirus Software Review Questions

3 Introduction This lab is part of a series of lab exercises designed to supplement coursework and provide students with a hands-on training experience based on real world applications. This series of lab exercises is intended to support courseware for CompTIA Network+ certification. Catastrophes of various types, fires, floods, illness, and terrorism or server crashes, hard drive failure, viruses, and downed networks, can upset an organization s ability to meet business needs causing disruptions to regular operational conditions. It is necessary for businesses, whether large or small, to have plans in place to mitigate the effects of potential catastrophes. Business continuity and disaster recovery plans are important components to any business plan to prevent major disruptions. The purpose of this lab is to characterize some key points in disaster recovery plans and demonstrate the need for implementation. Students will create and restore a data backup. They will examine the importance of virus and malware protection and test antivirus software. Objective: Explain common threats, vulnerabilities, and mitigation techniques Business continuity includes the planning of how a business will continue to operate despite big or small interruptions until normal conditions are restored. An important consideration to Include in business continuity planning is a disaster recovery plan providing for system and data protection in terms of data encryption, physically securing data, antivirus software installations, data backups and restoring backups. The focus here is on one component of the plan: data protection and recovery. In this lab, you will perform the following tasks: 1. Create a data backup 2. Restore data from a data backup 3. Download a virus test file to test antivirus software Key terms for this lab: data backups copying files from a computer s hard drive onto other digital media that is stored in a secure location data recovery - the process of restoring data that is lost through accidental or no accidental means adware a software program that delivers advertising content in a manner that is unexpected and unwanted by the user 3

4 antivirus (AV) software that can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus computer virus malicious software program that reproduces itself on a single computer and can spread by sharing the infected files and usually infects program executable files rootkit a set of software tools used by an attacker to hide the actions or presence of other signature file file that contains known patterns or sequences of bytes (strings) found in viruses; used by antivirus software to identify malware spyware general term used to describe software that spies on users by gathering information without consent, thus violating their privacy Trojan an executable program advertised as performing one activity but actually does something else (or it may perform both the advertised and malicious activities) worm malicious program designed to take advantage of vulnerability in an application or an operating system in order to enter a computer 4

5 Lab Topology 5

6 Lab Settings The information in the table below will be used to complete the lab. Additional details will be provided within the task sections as required. Required Virtual Machine and Applications Log in to the following virtual machine before starting the tasks in this lab: Windows 2k8 R2 Internal Windows 2k8 R2 Internal 2 password P@ssw0rd Windows 2k8 R2 Login (applies to all Windows machines) 1. Click on the Windows 2k8 R2 icon on the topology that corresponds to the machine you wish to log in to. 2. Use the PC menu in the NETLAB+ Remote PC Viewer to send a Ctrl-Alt-Del (version 2 viewer), or click the Send Ctrl-Alt-Del link in the bottom right corner of the viewer window (version 1 viewer). 3. In the password text box, type P@ssw0rd and press Enter to log in. 6

7 1 Create a Data Backup Using Windows Server Backup An essential component to data protection is data backup, copying files from a computer s hard drive onto other media stored in a safe location. This is one of the best ways to prepare for data recovery in the event of natural or unnatural disasters. Deciding on what data should be backed up, where the backup should be stored and the backup schedule are all important considerations. There are several solutions to make creating backups easier. Most operating systems can perform automated backups, and third-party software is available that typically provides more robust features. Windows Server Backup tool is the software used in this lab. Configuration options allow for data protection of the operating system, applications that are registered to Windows, volumes, or individual files. The backups can be stored to internal, external, or online storage areas and it has an automatic daily backup scheduler. Backing up on a regular schedule is a key point in disaster recovery. 1.1 Enable Windows Server Backup Features To use the Windows Server Backup tool, Windows Server Backup Features must first be installed on Server 2008 r2 using the Add Features Wizard in Server Manager. 1. Use the instructions provided in the Lab Settings section to log on to the Windows 2k8 R2 Internal 2 machine, if you are not logged in already. If Server Manager opens, skip to Step Click on Start-> Control Panel -> Administrative Tools -> Server Manager 3. When the Server Manager window appears, in the left panel click Features, then go to the right panel and click Add Features. The Select Features window in the Add Features Wizard opens. 7

8 4. To enable the Windows Server Backup Features: on the Select Features page, scroll the list until you find Windows Server Backup Features. Click the + sign next to Windows Server Backup Features and select the check boxes for Windows Server Backup and Command-line Tools. Click Next. 5. On the Confirm Installation Selections page, review the features displayed to be certain you have made the correct selection. If they are correct, click the Install button. If you need to make a change to your selections, click the Previous button. 8

9 6. The Installation Results page will present an overview of the components installed and installation results. Click Close after viewing the results (ignore any warning messages about Windows Automatic Update not being enabled if they appear in the results page). You have now successfully installed Windows Server Backup Features, which will enable you to use the Windows Server Backup tool. 1.2 Create a Backup Volume It is necessary to have a backup storage area. A second hard drive or volume on the local computer is one solution, but damage to the system could cause both the original and backup location to be destroyed. An alternative is to put the backup data on an external portable device such as a USB hard drive or optical disk media, so that the portable device or media could be stored in a remote location for security and safety. To complete the lab, you will to create a storage area on the server. You will add a volume on the local hard drive to store the backup. Keep in mind, in actuality, the decision on where to store the backup will be based on individual and organizational needs. With the Windows Server Backup Tool. backups can be stored on hard drives (internal or USB), network shares, and on a SAN, but no backup tape drives are supported. For the purpose of this exercise, you will create a volume on the internal hard drive of the server. This will be done by shrinking an existing volume and creating unallocated space to be used as a new volume. 9

10 1. Use the instructions provided in the Lab Settings section to log on to the Windows 2k8 R2 Internal 2 machine, if you are not logged in already. If Server Manager opens, skip to Step Click on Start-> Control Panel ->Administrative Tools -> Server Manager 3. Go to the left panel in Server Manager and click Storage, then go to right panel and double-click Disk Management. a. In the middle panel of Disk Management in the graphical view of the volumes, right-click on Disk 0 C: and click on Shrink Volume. b. Type in the Enter the amount of space to shrink the volume text box. This will create a volume with 45000MB of allocated space and leave the existing volume with of space. Click Shrink. 10

11 c. The Disk Management tool will be open. Now you will need to create a simple volume in the newly allocated space. d. Right-click on the unallocated space, select New Simple Volume and click on it. The New Simple Volume Wizard starts. Click Next. e. Click Next to accept the size on the Specify Volume Size page. This size is the total amount of space you allocated in the previous step. In a real-life situation, the actual volume size necessary would be set according to what the company backup plan required. f. On the Assign Drive Letter or Path page, you will assign a drive letter to the volume so that a path to the backup storage space is created. A good practice is to choose a drive letter at the end of the alphabet (we will use Z), so that new devices or other resource volumes can have the earlier letters. Be sure the radio button next to Assign the following Drive letter is selected and click the drop-down arrow. Drag the cursor until Z is highlighted, then click to choose the letter Z for the volume. Click Next. 11

12 g. Now you will need to format the volume to prepare it accept data. On the Format Partition page in the New Simple Volume Wizard, select the radio button next to Format this volume with the following settings: File system: NTFS Allocation unit size: Default Volume label: type Backup in the text box h. Check the box next to Perform a quick format. Click Next. i. The Completing the New Simple Volume Wizard page opens. Review the settings to be sure they match your selections. Click Finish. The Server Manager is open. 12

13 1.3 Configure Windows Server Backup The configuration of a backup strategy should be tailored to the environment where it will be implemented. As stated earlier, backups can be stored on different types of media in various locations and controlled by operating system utilities or third-party software, but the most important thing about backups, is that they are done. A plan should be made that states what will be backed up, when and how often, and what type of backup will be used. Generally, there are three types of backups. A full backup copies all data to a storage medium, regardless of whether the data is new or changed. An incremental backup copies only data that has changed since the last full or incremental backup. A differential backup copies only data that has changed since the last full backup. In this exercise, you will create a backup schedule using Windows Server Backup utility. 1. In the left panel of Server Manager, click Storage, then go to right panel and double-click Windows Server Backup. 2. On the right panel Actions pane, under the Windows Server Backup heading, click Backup Schedule. This opens the Backup Schedule Wizard s Getting Started page. Click on the More about scheduling backups link. Notice the page titles and the actions that can be performed on each page. 1. What is the title of the page where data to be included in the backup is selected? 13

14 3. Close the help page by clicking on the X in the top-right corner of the window. Click Next. The Select Backup Configuration page is open. On the Select Backup Configuration page, there are two choices: Full Server - the recommended option, which creates an image of the entire contents of the server and backs up all volumes Custom - used to back up just certain volumes/files allowing users to select the check boxes for the volumes/files to be backed up and clear the check boxes for the volumes/files that are to be excluded An organization should have a plan in place for a back-up schedule before starting the backup configuration process. Typically, backup schedules include a full backup that is done weekly and incremental backups done daily for data that has been changed. In this lab exercise, you will schedule a custom backup. 4. On the Select Backup Configuration page, click the radio button next to Custom. Click Next. This will open the Select Items for Backup page. 14

15 5. On the Select Items for Backup page, click Add Items. Click in the check box next to System state to select it for backup. Click OK. Review the selection you have made to be sure it is accurate and click Next. On the Specify backup time page, users can stipulate if they want to run backups just once a day or more than once a day. Selecting Once a day, enters the time to start running the daily backup. Selecting More than once a day allows a user to select multiple start times one for each backup to add throughout the day. It is not possible to specify weekly or monthly backups using the Windows Server Backup, but this can be done using the Schedule Task tool. 6. Click on the radio button next to Once a day and select a time close to the time that you are performing this lab, since you will need to run this backup in order to complete this task. Click Next. This will bring up the Specify Destination Type page. 15

16 The Specify Destination Type page is used to indicate where to store the backup. There are three choices, a dedicated hard drive, a volume on a designate hard drive, or network share. This decision is usually made prior to starting the backup, based on what is right for the organization. In a previous section, you created a volume on which to store the backup. 7. On the Specify Destination Type page, select the radio button next to Back up to a volume. Click Next. 8. On the Select Destination Volume page, you will add the volume you created in a previous section as the backup volume. Click the Add button. This will open the Add volumes page. 9. Find the volume created earlier (Backup Z:) and click on it to highlight. Click OK, and then click Next. 16

17 10. Review the settings on the Confirmation page, then click Finish to approve the settings. 11. After confirming the settings, a status summary page will open. Review the status. Click Close. You will see the Server Manager with the Windows Backup Server tool in the middle pane. Information about when the next backup is scheduled to run, which items will be backed up, and the destination for the backup are found here. 12. Instead of waiting for your backup to run, on the right panel Actions pane, under the Windows Server Backup heading, click Backup Once. 17

18 13. On the Backup Options page, click the Scheduled backup options radio button then click Next. 14. On the Confirmation page, review your selections and click Backup to start the process. 15. The Backup Progress page opens and you can see the initialization of the backup. Once the process is under way, click Close. 18

19 16. You can continue to view the progress of the backup under the Windows Server Backup Messages heading. 17. Completed backup information is also shown under the Windows Server Backup Messages heading. Confirm the completed backup and now you will move to the next task of restoring data from the backup. 1.4 Review Questions 1. Explain the disadvantages of installing a second hard drive in a computer to back up data from the primary hard drive of the same computer. 2. Describe alternative storage location(s) that could be used for data backup storage. What are the advantages and disadvantages of using such locations? 3. Explain full, incremental, and differential backups. 19

20 2 Restore Data from a Data Backup Equally as important as a data backup plan, is the data restore plan. Hard drive failure, corrupt data, or any other situation that leaves you with data loss will be detrimental to normal business operations. A backup plan that is established and implemented is a defense against data loss. A data restore plan is a defense against loss of normal business operation. Data recovered from backups is a critical component in disaster recovery planning. Both a backup strategy and recovery strategy need to be in place for disaster recovery to be successful. Creating backups without a recovery strategy test can be as dangerous as no backup plan at all. To ensure that backups are not corrupt or damaged and that they are actually being run, organizations need to test the data recovery from the backups to ensure they will be prepared to do so in response to a critical situation. In this task, you will recover deleted data using the backup you made in the previous exercise. 2.1 Delete a File to Restore from Backup In order to be able to restore data, you will first need to simulate data loss by deleting a file or folder on the current hard drive and then retrieve it from the backup. 1. Use the instructions provided in the Lab Settings section to log into the Windows 2k8 R2 Internal 2 machine, if you are not already logged in. 2. Click on Start->Computer a. Double-click Local Disk (C:) b. Double-click Program Files (x86) c. Right-click the WinPcap folder and click Open 20

21 d. Select the file, rpcapd. e. Right-click, drag the cursor to Delete on the dropdown menu and click. f. When the Delete File box opens, click Yes to confirm deleting the rpcapd file. 3. Click the "X" in the upper-right corner of the WinPcap folder to close the window. 2.2 Restore Deleted Data to its Original Location 1. Open Windows Server Backup if it is not already open, Start->Administrative Tools->Server Manager, click the + next to Storage in the right pane, click Windows Server Backup. 2. On the right panel Actions pane, under the Windows Server Backup heading, click Recover. This opens the Recovery Wizard s Getting Started page. 3. Select the radio button next to A backup stored on another location. This is the correct choice because you have created a separate volume from the system volume on the server for the storage location. Click Next. 21

22 4. On the Specify Location Type page, select the radio button next to Local drives. Click Next. 5. On the Select Backup Location page, choose the backup volume created in the previous exercise. Click Next. 6. On the Select Server page, highlight the server s data you would like to recover. You have backed up the local machine data so there is only one choice. Highlight the server and click Next. On the Select Backup Date page, users have the option of choosing the timeframe from which they want to recover the data. 1. Why would a user not necessarily choose to recover from the most recent backup? 22

23 7. On the Select Backup Date page, click the date on calendar for the backup from which to restore the data. Then, choose the time of the backup from the drop down menu (your selection should be the backup that you created during the previous task). Click Next. You will need to select the type of data you want to recover. In an actual disaster, analyzing the situation will determine the most appropriate choice or as in this scenario, backup testing is taking place and someone intentionally deleted data to recover. 8. On the Select Recovery Type page, choose Files and folder for the type of data to recover. Earlier in the lab, you deleted the rpcapd file from the WinPcap folder to be able to test the backup. Click Next. The Select Items to Recover page opens. 9. Now it is time to select the actual data item to recover. In the Available Items pane, the name of the server where the data is located is indicated. Click on the + next to the name to expand the content tree. You will need to follow the same path you did when deleting the file to find it in the backed up items. a. Click the + next to Local disk (C:) b. Click the + next to Program Files (x86) c. Click on the WinPcap folder d. Notice in the Name panel on the left, the file rpcapd is listed; this is the data that will be restored. e. Click Next. 23

24 2. On the Specify Recovery Options page, what options must be specified? 10. Select the radio button next to Another location to choose the recovery destination. To set the path for the data click the Browse button and: a. Click the + next to Local disk (C:) b. Click the + next to Program Files (x86) c. Click on the WinPcap folder. d. Click OK 11. Review the rest of the page, but do not make any changes. Click Next to add the path for the recovery and accept the defaults for all other settings on the page. 3. What configurations would be selected to avoid overwriting a newer copy with an older copy stored in a backup file? 12. Review the items on the Confirmation page and then click the Recover button. The Recovery process will begin. 24

25 When the recovery process starts, the Recovery Progress page opens. This page will provide a continuous status of the recovery progress, but does not need to remain open while the recovery is taking place. The progress of the recovery can be monitored in the Windows Server Backup Messages. 13. Once the process starts, click the Close button and monitor the progress from the Windows Server Backup Messages. 2.3 Verify Recovery of the File When the recovery is complete, verify that the file is back in the correct location. 1. Click Start->Computer 2. Double-click Local Disk (C:) 3. Double-click Program Files (x86) 4. Double-click WinPcap 1. Is the restored file in the correct location? 2. What is the filename? 2.4 Review Questions 1. Describe three different recovery types that can be done using the Windows Server Backup utility. - 25

26 3 Use a Virus Test File to Test the Antivirus Software Data backup and recovery are strategies to guard against damaging events having a profound effect on normal business operations, but to protect systems and data from being vulnerable to attacks that can harm the system or its resources, other measures should be in place. Malware is an umbrella term for programs written to cause harm or intrude upon a system or its resources. Familiar terms like viruses, Trojan horses, and worms are all considered malware. Installing anti-malware and antivirus software on a system is a method to protect systems from malware attacks. The prevalence of malware attacks is evidenced everyday by businesses and individuals around the world. Incidences of millions of daily attacks thwarted and billions of infected files discovered are part of the discussion in the IT security community. It is the role of the IT departments or individual users to be diligent in protecting systems. Installing and testing antivirus software is a good starting point in protecting systems from malware threats. Most operating systems and types of devices are prone to attack. To ensure that a network and its systems are being protected, check to be sure that an antivirus program is running on all devices. If a device does not have an antivirus installed, then the first step in the process is to install one. For individual workstations, there are many free reliable antivirus software programs available. Some operating systems include a builtin antivirus program. In an enterprise environment, using a server/client model, antivirus programs on the server need to be more fully featured and robust than the typical free programs, so a paid solution is often implemented. Servers and workstations should run antivirus software whether connected to the Internet or just an internal network. Malware infected computers can spread infections rapidly to other connected systems. Many malware threats come through the Internet or . Types of malware threats that are of great concern include: Virus code added to legitimate programs on a system and activated when the program is run, then writes itself to memory and runs instead of the legitimate program. They are designed for various purposes to be annoying, destructive, and malicious. Worm do not need to be attached to other programs, like their biological counterpart, can replicate quickly, which can cause high bandwidth consumption and resource overload. If a worm carries a payload, it can carry out an action such as deleting files or stealing data. Trojan or Trojan Horse disguises itself as a normal file or program and deceives users into downloading and installing them. Once that is accomplished, Trojans can cause a great deal of harm such as creating back doors to give users with malicious intent access to the system, deleting files, or something as simple but annoying as causing windows to keep popping up. 26

27 rootkit stealthy, malicious software program designed to conceal itself in a system and allows remote access and control of a system without detection by the user or security programs. It can be very difficult to detect and remove, which is one reason security protection measures such as operating system updates, application patches, and keeping antivirus software definitions up to date are critical. At the minimum, antivirus software should protect against viruses, Trojans, and worms and offer tools for detecting, quarantining, and removing such threats. It is also crucial to the usefulness of an anti-malware, or antivirus program that signature files are updated regularly. Signature files uniquely identify a specific virus and are used for virus detection. Virus definition is a term often used to refer to the database of signature files downloaded by an antivirus program. The antivirus program compares the data content on the system against the virus definition database to detect a virus. In this task, you will simulate downloading a virus and observe the reaction of the antivirus software. 3.1 Using a Virus Test File To Test Antivirus Software In this task, you will be testing antivirus software using a virus test file. Because you have no Internet access on these systems the test file has been downloaded and placed on the desktop for use in this exercise, it is named testav.zip. When connected to a system with Internet access the test files can be downloaded from You can read more about EICAR at 1. Use the instructions in the Lab Settings section to log into the Windows 2k8 R2 Internal 2 machine, if you are not already logged in. 2. If the Initial Configuration Tasks and/or Server Manager windows appear, close them by clicking on the X in the top-right corner of the window. 3. On the desktop, locate the shortcut to start the ClamWin Antivirus program and double-click on the icon to launch the program. Before the program launches you will be asked if you would like to update signature files. On a system connected to the Internet, you would select the Yes button to keep the signatures current. For the purpose of the exercises, click No and the program will open. 27

28 4. Eicar files are standardized test file for signature based virus detection software. These files can be used to verify that antivirus is installed and scanning what it was expected to scan. These files are not viruses, but simulate a virus based on the code structure of the file. The testav.zip is a renamed copy of an eicar test file. 5. With your antivirus software running, double-click the [C:] folder, then select to highlight the Users folder. 6. Click the Scan button to begin scanning to see if the ClamWin antivirus software is functioning. 7. When the scan is completed, ClamWin Antivirus, the antivirus software running on this system, will display information about the files and folders that were scanned and any infected files that are discovered. Notice that the testav.zip was recognized as the Eicar-Test-Signature and marked as an infected file. This is one way to test the installation and configuration of an antivirus program. Regardless of the antivirus software program being used, this should be the result. Click the Close and then Close again to stop ClamWin Antivirus. 28

29 3.2 Review Questions 1. Describe two types of malware discussed in this task, Including how they can gain access to a system to infect it and what potential harm they can cause to a computer system. 2. Why is a rootkit considered to be one of the more difficult types of malware to detect and remove? 3. Explain how a computer not connected to the Internet is vulnerable to malware and could become infected if not running an antivirus software program. 29

CompTIA Network+ Lab Series Network Concepts. Lab 6: Network Management

CompTIA Network+ Lab Series Network Concepts. Lab 6: Network Management CompTIA Network+ Lab Series Network Concepts Lab 6: Network Management Objective 4.2: Identify types of configuration management documentation: Baselines Objective 4.4: Conduct network monitoring to identify

More information

CompTIA Network+ Lab Series Network Concepts. Lab 2: Types of Networks

CompTIA Network+ Lab Series Network Concepts. Lab 2: Types of Networks CompTIA Network+ Lab Series Network Concepts Objective 1.5: Identify common TCP and UDP default ports Objective 1.6: Explain the function of common networking protocols Document Version: 2015-09-18 otherwise

More information

CompTIA Network+ Lab Series Network Concepts. Lab 4: IPv4 vs IPv6 Calculating, Configuring and Testing

CompTIA Network+ Lab Series Network Concepts. Lab 4: IPv4 vs IPv6 Calculating, Configuring and Testing CompTIA Network+ Lab Series Network Concepts Lab 4: IPv4 vs IPv6 Calculating, Configuring and Testing Objective 1.5: Identify common TCP and UDP default ports Objective 1.6: Explain the function of common

More information

SECURITY+ LAB SERIES. Lab 7: Analyze and Differentiate Types of Attacks and Mitigation Techniques

SECURITY+ LAB SERIES. Lab 7: Analyze and Differentiate Types of Attacks and Mitigation Techniques SECURITY+ LAB SERIES Lab 7: Analyze and Differentiate Types of Attacks and Mitigation Techniques Document Version: 2015-09-24 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported

More information

ETHICAL HACKING LAB SERIES. Lab 3: Using the SYSTEM Account

ETHICAL HACKING LAB SERIES. Lab 3: Using the SYSTEM Account ETHICAL HACKING LAB SERIES Lab 3: Using the SYSTEM Account Certified Ethical Hacking Domain: System Hacking Document Version: 2015-08-14 otherwise noted, is licensed under the Creative Commons Attribution

More information

ETHICAL HACKING LAB SERIES. Lab 19: Using Certificates to Encrypt

ETHICAL HACKING LAB SERIES. Lab 19: Using Certificates to Encrypt ETHICAL HACKING LAB SERIES Lab 19: Using Certificates to Encrypt Email Certified Ethical Hacking Domain: Cryptography Document Version: 2015-08-14 otherwise noted, is licensed under the Creative Commons

More information

POD INSTALLATION AND CONFIGURATION GUIDE. Security+

POD INSTALLATION AND CONFIGURATION GUIDE. Security+ POD INSTALLATION AND CONFIGURATION GUIDE Security+ Document Version: 2015-08-12 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported License. Development was funded by the Department

More information

POD INSTALLATION AND CONFIGURATION GUIDE. A+ v2

POD INSTALLATION AND CONFIGURATION GUIDE. A+ v2 POD INSTALLATION AND CONFIGURATION GUIDE A+ v2 Document Version: 2014-01-22 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported License. Development was funded by the Department

More information

SECURITY+ LAB SERIES. Lab 3: Protocols and Default Network Ports Connecting to a Remote System

SECURITY+ LAB SERIES. Lab 3: Protocols and Default Network Ports Connecting to a Remote System SECURITY+ LAB SERIES Lab 3: Protocols and Default Network Ports Connecting to a Remote System Document Version: 2015-09-24 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported

More information

ETHICAL HACKING LAB SERIES. Lab 7: Breaking Windows Passwords

ETHICAL HACKING LAB SERIES. Lab 7: Breaking Windows Passwords ETHICAL HACKING LAB SERIES Lab 7: Breaking Windows Passwords Certified Ethical Hacking Domain: System Hacking Document Version: 2015-08-14 otherwise noted, is licensed under the Creative Commons Attribution

More information

SECURITY+ LAB SERIES. Lab 6: Secure Network Administration Principles Log Analysis

SECURITY+ LAB SERIES. Lab 6: Secure Network Administration Principles Log Analysis SECURITY+ LAB SERIES Lab 6: Secure Network Administration Principles Log Analysis Document Version: 2015-09-24 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported License.

More information

POD INSTALLATION AND CONFIGURATION GUIDE. Forensics

POD INSTALLATION AND CONFIGURATION GUIDE. Forensics POD INSTALLATION AND CONFIGURATION GUIDE Forensics Document Version: 2016-05-05 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported License. Development was funded by the Department

More information

ETHICAL HACKING LAB SERIES. Lab 13: Exploitation with IPv6

ETHICAL HACKING LAB SERIES. Lab 13: Exploitation with IPv6 ETHICAL HACKING LAB SERIES Lab 13: Exploitation with IPv6 Certified Ethical Hacking Domains: System Hacking, Penetration Testing Document Version: 2015-08-14 otherwise noted, is licensed under the Creative

More information

QGIS LAB SERIES GST 103: Data Acquisition and Management Lab 1: Reviewing the Basics of Geospatial Data

QGIS LAB SERIES GST 103: Data Acquisition and Management Lab 1: Reviewing the Basics of Geospatial Data QGIS LAB SERIES GST 103: Data Acquisition and Management Lab 1: Reviewing the Basics of Geospatial Data Objective Explore and Understand Geospatial Data Models and File Formats Document Version: 2014-08-15

More information

ETHICAL HACKING LAB SERIES. Lab 15: Abusing SYSTEMS

ETHICAL HACKING LAB SERIES. Lab 15: Abusing SYSTEMS ETHICAL HACKING LAB SERIES Lab 15: Abusing SYSTEMS Certified Ethical Hacking Domain: Denial of Service Document Version: 2015-08-14 otherwise noted, is licensed under the Creative Commons Attribution 3.0

More information

CompTIA Network+ Lab Series Network Concepts. Lab 3: TCP/IP Utilities

CompTIA Network+ Lab Series Network Concepts. Lab 3: TCP/IP Utilities CompTIA Network+ Lab Series Network Concepts Lab 3: TCP/IP Utilities Objective 1.5: Identify common TCP and UDP default ports Objective 1.6: Explain the function of common networking protocols Objective

More information

Linux+ Base Pod Installation and Configuration Guide

Linux+ Base Pod Installation and Configuration Guide Linux+ Base Pod Installation and Configuration Guide This document provides detailed guidance on performing the installation and configuration of the Linux+ Base Pod on a NETLAB+ system. The Linux+ Base

More information

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. User Guide This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. Copyright 2002-2016 Max Secure Software. All rights reserved. Contents 2 Contents Introduction... 3 System

More information

QGIS LAB SERIES GST 103: Data Acquisition and Management Lab 5: Raster Data Structure

QGIS LAB SERIES GST 103: Data Acquisition and Management Lab 5: Raster Data Structure QGIS LAB SERIES GST 103: Data Acquisition and Management Lab 5: Raster Data Structure Objective Work with the Raster Data Model Document Version: 2014-08-19 (Final) Author: Kurt Menke, GISP Copyright National

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

Common Preventive Maintenance Techniques for Operating Systems

Common Preventive Maintenance Techniques for Operating Systems Common Preventive Maintenance Techniques for Operating Systems OS Preventive Maintenance Plan To ensure that an OS remains fully functional, you must implement a preventive maintenance plan. A preventive

More information

GST 101: Introduction to Geospatial Technology Lab 2 - Spatial Data Models

GST 101: Introduction to Geospatial Technology Lab 2 - Spatial Data Models GST 101: Introduction to Geospatial Technology Lab 2 - Spatial Data Models Objective Explore and Understand Spatial Data Models Document Version: 3/3/2015 FOSS4G Lab Author: Kurt Menke, GISP Bird's Eye

More information

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each. Name Date Chapter 10: Security After completion of this chapter, students should be able to: Explain why security is important and describe security threats. Explain social engineering, data wiping, hard

More information

Small Office Security 2. Scan PC for viruses and vulnerabilities

Small Office Security 2. Scan PC for viruses and vulnerabilities Small Office Security 2 Scan PC for viruses and vulnerabilities Table of content Table of content... 1 Scan PC for viruses... 2 What is Scan... 2 Starting scan... 2 Starting scan from the main application

More information

Version 11. NOVASTOR CORPORATION NovaBACKUP

Version 11. NOVASTOR CORPORATION NovaBACKUP NOVASTOR CORPORATION NovaBACKUP Version 11 2009 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Course Outline (version 2)

Course Outline (version 2) Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

3.5 SECURITY. How can you reduce the risk of getting a virus?

3.5 SECURITY. How can you reduce the risk of getting a virus? 3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain

More information

GST 104: Cartographic Design Lab 7: Design and Label a Downtown Street Map

GST 104: Cartographic Design Lab 7: Design and Label a Downtown Street Map GST 104: Cartographic Design Lab 7: Design and Label a Downtown Street Map Objective Utilize QGIS and Inkscape to Design and Label a Street Map of a Downtown Area Document Version: 2014-06-16 (Beta) Author:

More information

Zillya Internet Security User Guide

Zillya Internet Security User Guide Zillya Internet Security User Guide Content Download Zillya Internet Security... 4 Installation Zillya Internet Security... 4 System Status... 7 System Scanning... 9 When Zillya Internet Security finds

More information

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Data Communication. Chapter # 5: Networking Threats. By: William Stalling Data Communication Chapter # 5: By: Networking Threats William Stalling Risk of Network Intrusion Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals

More information

Lab 4: Protocols and Default Network Ports - Connecting to a Remote System

Lab 4: Protocols and Default Network Ports - Connecting to a Remote System CompTIA Security+ Lab Series Lab 4: Protocols and Default Network Ports - Connecting to a Remote System CompTIA Security+ Domain 1 - Network Security Objective 1.4: Implement and use common protocols Objective

More information

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Chapter 4 Using the Entry-Master Disk Utilities

Chapter 4 Using the Entry-Master Disk Utilities Chapter 4 Using the Entry-Master Disk Utilities Now that you have learned how to setup and maintain the Entry-Master System, you need to learn how to backup and restore your important database files. Making

More information

NHS South Commissioning Support Unit

NHS South Commissioning Support Unit NHS South Commissioning Support Unit ICT Anti-virus Policy This document can be made available in a range of languages and formats on request to the policy author. Version: Ratified by: V.2.1 Alliance

More information

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps 2018 By: RemoveVirus.net Remove A Virus From Your PC In 5 Simple Steps PCs, like Macs and Mobile Devices are susceptible to different types of malware. Avoid panicking when you realize that your PC has

More information

SecureAPlus User Guide. Version 3.4

SecureAPlus User Guide. Version 3.4 SecureAPlus User Guide Version 3.4 September 2015 Copyright Information Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious

More information

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats. AntiVirus Pro Advanced Protects your computer from viruses, malware, and Internet threats. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

Panda Antivirus Server for Mac User Manual

Panda Antivirus Server for Mac User Manual Panda Antivirus Server for Mac User Manual !"#$%&'()*+,$-'*(& Use of this product is subject to acceptance of the Panda Security End User License Agreement enclosed. Panda Security is registered in the

More information

Integrating RDX QuikStor TM into NetJapan ActiveImage TM Protector

Integrating RDX QuikStor TM into NetJapan ActiveImage TM Protector Integrating RDX QuikStor TM into NetJapan ActiveImage TM Protector Backup is the life insurance of a company as it protects its systems and data. Backup also ensures that valuable data is available after

More information

Sophos Enterprise Console help. Product version: 5.5

Sophos Enterprise Console help. Product version: 5.5 Sophos Enterprise Console help Product version: 5.5 Contents 1 About Sophos Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7 2.2 Toolbar buttons...7

More information

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES CERT-In Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES Department of Information Technology Ministry of Communications and Information Technology Government of India Anti Virus

More information

Comodo Antivirus Software Version 2.2

Comodo Antivirus Software Version 2.2 Comodo Antivirus Software Version 2.2 User Guide Guide Version 2.2.082318 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

Sophos Enterprise Console

Sophos Enterprise Console Sophos Enterprise Console Help Product Version: 5.5 Contents About Sophos Enterprise Console...1 Guide to the Enterprise Console interface... 2 User interface layout... 2 Toolbar buttons...2 Dashboard

More information

Owner of the content within this article is Written by Marc Grote

Owner of the content within this article is  Written by Marc Grote Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de What s new in Forefront TMG Beta 2 Part 1 Abstract In this two part article series, I will show

More information

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved.

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved. Lasso CDP Client Guide August 2005, Version 1.6.8 Lasso CDP Client Guide Page 1 of 32 Copyright Copyright 2005 Lasso Logic, LLC. All Rights Reserved. No part of this publication may be reproduced, stored

More information

Integrating RDX QuikStor into NetJapan ActiveImage Protector

Integrating RDX QuikStor into NetJapan ActiveImage Protector Integrating RDX QuikStor into NetJapan ActiveImage Protector INTEGRATION BRIEF Backup is the life insurance of a company as it protects its crown jewels. Backup ensures data availability and business continuity

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email

More information

GST 104: Cartographic Design Lab 4: IDP and Refugee Proportional Symbol Map

GST 104: Cartographic Design Lab 4: IDP and Refugee Proportional Symbol Map GST 104: Cartographic Design Lab 4: IDP and Refugee Proportional Symbol Map Objective Design and construct a proportional symbol map in QGIS, then export the maps for layout in Inkscape. Document Version:

More information

FAQ. Safe Anywhere PC 12. Disclaimer:

FAQ. Safe Anywhere PC 12. Disclaimer: FAQ Safe Anywhere PC 12 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch pad, F-Secure

More information

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Quick Heal AntiVirus Pro. Tough on malware, light on your PC. Tough on malware, light on your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware tools. Signature based detection Detects

More information

Small Office Security 2. Mail Anti-Virus

Small Office Security 2. Mail Anti-Virus Small Office Security 2 Mail Anti-Virus Table of content Table of content... 1 Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/Disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus...

More information

Comodo Client - Security for Linux Software Version 2.2

Comodo Client - Security for Linux Software Version 2.2 Comodo Client - Security for Linux Software Version 2.2 User Guide Guide Version 2.2.091818 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Client

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Getting Started with the Online Backup Software... 2 Installing the Online Backup Software... 2 Configuring a Device...

More information

SECURE USE OF IT Syllabus Version 2.0

SECURE USE OF IT Syllabus Version 2.0 ICDL MODULE SECURE USE OF IT Syllabus Version 2.0 Purpose This document details the syllabus for the Secure Use of IT module. The syllabus describes, through learning outcomes, the knowledge and skills

More information

Get Max Internet Security where to buy software for students ]

Get Max Internet Security where to buy software for students ] Get Max Internet Security where to buy software for students ] Description: Features of Max Secure Internet Security 2013 Exciting, Easy to understand GUI Easy, Quick installation Get immediate protection

More information

BounceBack 18. User Manual

BounceBack 18. User Manual BounceBack 18 User Manual 2016 CMS Products, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice. The information

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Typical Installation Guide. Installation Guide. Typical installation only. Standard version 2.5

Typical Installation Guide. Installation Guide. Typical installation only. Standard version 2.5 E s s e n t i a l S e c u r i t y a g a i n s t E v o l v i n g T h r e a t s Typical Installation Guide 2 Installation Guide Typical installation only Standard version 2.5 2 Copyright 1997 2005 Eset LLC.

More information

ECDL / ICDL IT Security. Syllabus Version 2.0

ECDL / ICDL IT Security. Syllabus Version 2.0 ECDL / ICDL IT Security Syllabus Version 2.0 Module Goals Purpose This document details the syllabus for the IT Security module. The syllabus describes, through learning outcomes, the knowledge and skills

More information

Comodo Antivirus Software Version 2.1

Comodo Antivirus Software Version 2.1 Comodo Antivirus Software Version 2.1 User Guide Guide Version 2.1.030515 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

Manual Removal Norton Internet Security Won't Open Or

Manual Removal Norton Internet Security Won't Open Or Manual Removal Norton Internet Security Won't Open Or Dec 3, 2014. Finally during the reinstall - I had to delete a key to get a new key other wise I would I have it shown on the prgrams and features -

More information

File Protection. Whitepaper

File Protection. Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of... 3 2. Backup considerations... 4 Exchange VM support... 4 Restore

More information

QGIS LAB SERIES GST 101: Introduction to Geospatial Technology Lab 7: Basic Geospatial Analysis Techniques

QGIS LAB SERIES GST 101: Introduction to Geospatial Technology Lab 7: Basic Geospatial Analysis Techniques QGIS LAB SERIES GST 101: Introduction to Geospatial Technology Lab 7: Basic Geospatial Analysis Techniques Objective Use Basic Spatial Analysis Techniques to Solve a Problem Document Version: 2014-06-05

More information

Full file at

Full file at Chapter 2 Solutions Answers to the Chapter 2 Review Questions 1. The Melissa virus was transported by. c. e-mail 2. Which of the following are used for updates in Windows XP Professional? (Choose all that

More information

1. Overview... 2 Documentation... 2 Licensing... 2 File Archiving requirements... 2

1. Overview... 2 Documentation... 2 Licensing... 2 File Archiving requirements... 2 User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

AntiVirus 8.5 Update 2. User Guide

AntiVirus 8.5 Update 2. User Guide AntiVirus 8.5 Update 2 User Guide Notices Version Information Ivanti Endpoint Security: AntiVirus User Guide - Ivanti Endpoint Security: AntiVirus Version 8.5 Update 2 - Published: Apr 2018 Document Number:

More information

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to

More information

Endpoint Security for Mac

Endpoint Security for Mac Endpoint Security for Mac USER'S GUIDE Endpoint Security for Mac User's Guide Publication date 2015.12.23 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define

More information

File Protection Whitepaper

File Protection Whitepaper File Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of File Protection over traditional file copy methods... 3

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth

More information

Lesson-1 Computer Security

Lesson-1 Computer Security Threats to computer Security: What do they mean by a threat? Lesson-1 Computer Security A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to

More information

Get BitDefender Security for File Servers 2 Years 5 PCs computer new software download ]

Get BitDefender Security for File Servers 2 Years 5 PCs computer new software download ] Get BitDefender Security for File Servers 2 Years 5 PCs computer new software download ] Description: FILE SERVERS - THE BACKBONE OF THE NETWORK File servers are not just a network repository for the company

More information

Aras Innovator 11. Backup and Recovery Procedures

Aras Innovator 11. Backup and Recovery Procedures Document #: 11.0.02015040601 Last Modified: 1/4/2018 Copyright Information Copyright 2018 Aras Corporation. All Rights Reserved. Aras Corporation 300 Brickstone Square Suite 700 Andover, MA 01810 Phone:

More information

Internet Security Mail Anti-Virus

Internet Security Mail Anti-Virus Internet Security 2012 Mail Anti-Virus Table of Contents Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus... 2 Changing Mail

More information

Ryan KS office thesee

Ryan KS office thesee SERVERR and WORKSTATION REMOTE MANAGEMENT SERVICES Ryan Dental Systems Dental Computer Systems Support and Sales 303 2 nd Street, PO Box 194, Inland NE 68954 5506 SW 31stPh: 402-461-5575 Terrace Topeka

More information

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 8 ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

ESET NOD32 ANTIVIRUS 7

ESET NOD32 ANTIVIRUS 7 ESET NOD32 ANTIVIRUS 7 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

File Protection Whitepaper

File Protection Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of over traditional file copy methods... 3 2. Backup considerations...

More information

Anti-Virus. Anti-Virus Scanning Overview. This chapter contains the following sections:

Anti-Virus. Anti-Virus Scanning Overview. This chapter contains the following sections: This chapter contains the following sections: Scanning Overview, page 1 Sophos Filtering, page 2 McAfee Filtering, page 4 How to Configure the Appliance to Scan for Viruses, page 6 Sending an Email to

More information

Quick Start Guide. Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008

Quick Start Guide. Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008 Quick Start Guide Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008 ESET NOD32 Antivirus provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning

More information

eprotect Backup Utility

eprotect Backup Utility eprotect Backup Utility The eprotect utility is provided to simplify the process of taking a backup of an Export-It and/or Export-It Plus installation. Syscob recommends that users do a backup at regular

More information

FOR macos. Quick Start Guide. Click here to download the most recent version of this document

FOR macos. Quick Start Guide. Click here to download the most recent version of this document FOR macos Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based

More information

EICAR institute (European Institute for Computer Antivirus Research) to test the functionality of antivirus programs.

EICAR institute (European Institute for Computer Antivirus Research) to test the functionality of antivirus programs. ESET Cybersecurity As the popularity of Unix-based operating systems increases, malware authors are developing more threats to target Mac users. ESET Cybersecurity offers powerful and efficient protection

More information

File Maintenance Windows 7 Word What is File Maintenance?

File Maintenance Windows 7 Word What is File Maintenance? File Maintenance Windows 7 Word 2013 What is File Maintenance? As you use your computer and create files you may need some help in storing and retrieving those files. File maintenance shows you how to

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Anti-virus SCEP and Windows Defender. Common symptoms of an infection. How to Open SCEP or Windows Defender

Anti-virus SCEP and Windows Defender. Common symptoms of an infection. How to Open SCEP or Windows Defender Anti-virus SCEP and Windows Defender The University of Aberdeen uses System Center Endpoint Protection software (SCEP) and Windows Defender to protect servers and networked Windows PCs against viruses,

More information

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document QUICK START GUIDE Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011 Click here to download the most recent version of this document ESET NOD32 ANTIVIRUS PROVIDES STATE-OF-THE-ART PROTECTION

More information

Quick Heal Total Security

Quick Heal Total Security For secure online banking, smooth Internet surfing, and robust protection for your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

Data protection for small and medium business & home networks

Data protection for small and medium business & home networks Data protection for small and medium business & home networks Roxio Retrospect delivers powerful yet easy-to-use data protection for your servers, 24x7 applications, desktops, and notebooks. It protects

More information

Comodo Antivirus Software Version 2.0

Comodo Antivirus Software Version 2.0 Comodo Antivirus Software Version 2.0 User Guide Guide Version 2.0.010215 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

How To Remove Virus From Computer Without Using Antivirus In Windows Xp

How To Remove Virus From Computer Without Using Antivirus In Windows Xp How To Remove Virus From Computer Without Using Antivirus In Windows Xp How to remove a virus - how to clean PC and laptop of virus, spyware and other PC internet security software that includes up to

More information

Client Computing Security Standard (CCSS)

Client Computing Security Standard (CCSS) Client Computing Security Standard (CCSS) 1. Background The purpose of the Client Computing Security Standard (CCSS) is to (a) help protect each user s device from harm, (b) to protect other users devices

More information

IT ANTI-VIRUS POLICY Version 2.5

IT ANTI-VIRUS POLICY Version 2.5 IT ANTI-VIRUS POLICY Version 2.5 IT Anti-Virus Policy COR/053/V2.05 December 2016 updated January 2018 Version 2.5 1 Subject and version number of document: Serial number: IT Anti-Virus Policy Version

More information

Cloud Compute. Backup Portal User Guide

Cloud Compute. Backup Portal User Guide Cloud Compute Backup Portal User Guide Contents Service Overview... 4 Gaining Access... 5 Operational Guide... 6 Landing Page... 6 Profile View... 6 Detailed View... 8 Overview... 8 Cloud Backup... 8

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Security Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Security Essentials : Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Security Essentials Objectives Learn why it is important to comply with established security policies Learn ways to authenticate and classify

More information

Antivirus: Proactively detects and disables more known and even unknown new malware threats than any other security product.

Antivirus: Proactively detects and disables more known and even unknown new malware threats than any other security product. Quick Start Guide ESET Cybersecurity provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the award-winning NOD32

More information