Full file at

Size: px
Start display at page:

Download "Full file at"

Transcription

1 Chapter 2 Solutions Answers to the Chapter 2 Review Questions 1. The Melissa virus was transported by. c. 2. Which of the following are used for updates in Windows XP Professional? (Choose all that apply.) b. Windows Update 3. A Windows Server 2003 server administrator, whom you know from another firm, is complaining about a virus that was installed on one of his firm s servers from a device driver file that the server administrator downloaded from a freeware Internet site. What steps could that server administrator have taken to avoid getting a virus in this way? (Choose all that apply.) a. both a and c 4. You can use an emergency repair disk in. a. Windows The mode in Mac OS X enables you to view operating system files as they load. d. verbose 6. Which of the following is used by the Linux.Millen.Worm and the Code Red worms? (Choose all that apply.) c. buffer overflow 7. A server operator in your organization is planning to do a quick virus scan of a NetWare server before releasing the server for daily use, just after completing the overnight backups. She does not have much time and wants to do a fast virus scan only on executable files. Which of the following files are examples of executable files she should scan? (Choose all that apply.) a., c., and d. 8. Your Red Hat Linux 9.x system will not boot, and you decide to replace the MBR. What mode can you use to boot the system in order to replace the MBR? b. rescue mode 9. An employee in your company obtained a Microsoft Word XP template from a friend in another company and has distributed that template to other users. You have used a virus scanner on the template and found that it contains a virus. What should you do next? d. Have users disable macros in Word XP 10. Which of the following are steps you can take to protect a system from malicious software? (Choose all that apply.) a., b., c., and d. 11. Which of the following is not true of a service pack from Microsoft? a. Only one service pack is issued at a time and there are options in that service pack so that it can be applied to any Microsoft operating system. 12. On what menu in Windows Server 2003 can you access the Enable Boot Logging option? d. Advanced Options menu when you boot the system 1

2 13. Which of the following should you look for in a malicious software scanning tool? (Choose all that apply.) a., b., c., and d. 14. Where is the MBR found on a Red Hat Linux system? a. boot or partition sector of a hard disk 15. When a virus infects the boot sector of a hard disk,. b. it is common that disks placed in the floppy drive may become infected, too 16. Well-known vulnerabilities to malicious software exist in which of the following systems? (Choose all that apply.) c. and d. 17. Which of the following is an example of a NetWare 6.x file that may commonly house a virus? c. startup.ncf 18. Which of the following is an example of a Mac OS X folder that contains items that are commonly targeted by a virus? b. Startupitems folder 19. Which of the following is an example of a Red Hat Linux file that can be a target of a virus? d. inittab 20. The Simpsons AppleScript virus. a. is a Trojan horse sent with an message 21. As server administrator, you are the backup person for the SQL Server database administrator, who has informed you that the SQL Administrator account uses the password sa. Is the SQL Server at any risk with this password? c. Yes, because the Digispid.B.Worm targets SQL Server systems that have this password. 22. How do you check for updates available in Red Hat Linux 9.x? b. Click the exclamation point icon in the Panel 23. Which of the following systems use an Automated System Recovery set? (Choose all that apply.) c. Windows Server Which Trojan horse alters a system folder in Windows XP? d. Backdoor.Egghead 25. A major update in NetWare 6.x is performed through. a. consolidated support packs 2

3 Hands-On Projects Tips and Solutions for Chapter 2 Project 2-1 For this project, students use the Cert Coordination Center to learn more about viruses. In Step 3, at this writing there are 317 matches found for a search on virus. Project 2-2 This project enables students to practice accessing the Windows registry with the Registry Editor. In Step 3, the subkeys under HKEY_LOCAL_MACHINE are: HARDWARE SAM SECURITY SOFTWARE SYSTEM Project 2-3 In this project, students practice viewing the /etc/inittab file in Red Hat Linux 9.x. In Step 5, students should note that a new window opens for the Emacs editor, which displays the contents of the /etc/inittab file. Remind students not to make any changes to the /etc/inittab file and to exit properly. Project 2-4 In this activity, students learn how to access the recovery console in Windows 2000 Server or Windows Server They will need access to the Windows 2000 Server setup floppy disks or the Windows 2000 Server or Windows Server 2003 installation CD-ROM. In Step 4, students should report seeing a character-based screen and a prompt at which to type command-line commands. In Step 5, after students type help and press Enter they will see a list of commands that can be used in the recovery console. In Step 6, students see an explanation of the fixmbr command, which has an optional parameter to specify the device. In Step 7, students see an explanation of the fixboot command. 3

4 Project 2-5 This project enables students to access the Red Hat Linux rescue mode. In Step 2, students should report seeing the boot: prompt. In Step 3, a minimal operating system is loaded from CD-ROM. In Step 6, there is an option to mount the file systems as read-only, which is accomplished by using the tab key to select the Read-Only option. In Step 8, to make the system run in the root environment, students learn that they can enter the command: chroot /mnt/sysimag Project 2-6 In this project, students learn how to configure macro security in Microsoft Word XP. In conjunction with this project, consider holding a class discussion about different ways to educate users about employing security options that come with software. In Step 5, high security means that macros are used only for digitally signed documents. In medium security, macros are disabled by default, but the user can select to disable macros for documents they believe to be from a trusted source. In low security, macros are enabled. Project 2-7. This project enables students use the Automatic Updates Setup Wizard in Windows Server In Step 5, the options students should report seeing are: Every day Every Sunday Every Monday Every Tuesday Every Wednesday Every Thursday Every Friday Every Saturday Also, students should note that to configure updates to go automatically every Wednesday at 9 p.m. they would set the day of the week parameter to Every Wednesday and then set the time parameter to 9 p.m. Project 2-8 In this project students learn how to use the Red Hat Network Alert Notification Tool. In Step 2, students should record the number of updates available to be installed. In Step 7, students should notice and record the amount of disk space required for the packages, which is shown near the bottom of the window. 4

5 Project 2-9 This project enables students to learn how to use the Software Update tool in Mac OS X. In Step 3, the options are: Daily Weekly Monthly In Step 4, students should report the number of updates already installed. In Step 6, students should note if any of the updates relate to security. Often they will see security updates, but not always. Project 2-10 This project gives students an opportunity to boot into the Safe Mode in Windows 2000, Windows XP Professional, or Windows Server In Step 4, students should report seeing the files that are loaded as the system boots up. In Step 6, the desktop appears with a black background, no wallpaper, and large print. Project 2-11 In this project, students boot using the Mac OS X verbose mode. If they have trouble booting into this mode, make sure that they are holding down the Command and v keys as soon as the system starts until they begin to see text on the screen. In Step 2, students should see a black screen and lines of text showing what is being loaded as the system boots. Project 2-12 Students use this project to learn how to configure driver signing in Windows 2000, Windows XP Professional, or Windows Server In Step 3, the options students see in Windows XP Professional and Windows Server 2003 (the same options appear in Windows 2000, but the wording of the explanations for each is slightly different) are: Ignore - Install the software anyway and don t ask for my approval Warn - Prompt me each time to choose an action Block - Never install unsigned driver software. 5

6 Solutions to the Case Project Assignments Nishida and McCormick is a large law firm that has hired you, through Aspen IT Services, to help with security and to train their new server and network administrator Jim Vialpondo. The former network administrator left suddenly and Jim, who was the PC support consultant has been promoted to this position. The main office houses 92 users and has two Red Hat Linux 9.0 servers, one Windows Server 2003 file and print server, a Windows 2000 server used for a Web site, and one NetWare 6.0 server. The firm has a satellite office 128 miles away from the main office that has 62 users on a Red Hat Linux 9.0 server. The attorneys and support staff and both locations primarily use Windows XP Professional, but there are also 12 Mac OS X users. Case Project 2-1: Training the New Server and Network Administrator The Computing Services Department director asks you to train the new server and network administrator about malicious software by discussing the ways in which the following can spread in both workstation and server systems: Viruses Worms Trojan horses Create a short study paper that the server and network administrator can use as a reference. Some typical ways in which a virus or other malicious software can spread include: Boot or partition sector which infects the boot or partition sector of a system, which is at the beginning of a disk. Sometimes this type of infection continues to spread by infecting floppy disks that are then taken to other computers. File infector which appends to program files, including system files. Macro infects macro files, which are instruction set files often used with word processors, spreadsheets, and other software. A macro in a template can be infected and continue infecting all systems using that template or a document using the template. Multipartite infects systems through a combination of ways, such as by using a file infector and a macro. Worms may spread using a buffer overflow or by being sent as an attachment. Trojan horses spread as attachments or when users want to share via floppy disk Trojan horse programs that appear to be harmless. It is wise to caution users not to run programs that are not from a trusted source. 6

7 Case Project 2-2: A Malicious Macro The administrative assistant to one of the managing partners has brought in a Word XP macro containing a virus. The macro spread from his home computer to a document on a floppy disk that he was working on at home and then used at work. What steps should be taken to keep the virus in the macro from spreading to other areas of the network? Several steps can be taken to prevent the spread of a macro containing a virus. First, the original user should not share this document with anyone else or let anyone else open it. Nor should the user open the document, until it is cleaned and verified by a scanner. Also, it is important that the document not be placed on a server or shared drive. If necessary, the administrative assistant s computer might be disconnected from the network, until it is checked. Another step is to destroy the floppy disk containing the document. A malicious software scanner should be used to find and clean the macro virus from the system of the original user. This should also be done on the user s home computer. Additionally, the use of macros should be disabled in Word XP or set to high on all computers in the firm and on the administrative assistant s home computer. Further, the firm should establish clear policies about taking files home and bringing them back to work. If users need to work at home, the firm might purchase scanning software for those users. Case Project 2-3: Security Policy Recommendations One of your assignments from Nishida and McCormick is to work with the new server and network administrator to develop recommendations for a security policy to address the threat of malicious software. Create a list of general recommendations that you can use in your first planning meeting with the new administrator. The general recommendations should parallel those in the text, which are: Train users in security techniques. Train users about how malicious software works. Use a malicious software scanner on floppy disks, CD-Rs, and CD-RWs before using them on another computer. Control the types of media, files, and software brought in from outside the organization. Limit the types of software that users can install themselves. Create one or more quarantined areas for files from unknown sources. Control what files are allowed to be downloaded from off-site locations and if files must be downloaded, put them in a quarantined location until they are scanned. Scan incoming and attachments. Discard attachments from unknown or untrusted sources. 7

8 Case Project 2-4: Updating Operating Systems Your audit of security reveals that the law firm has been updating the NetWare and Windows servers on a regular basis, as well as the Windows XP Professional systems, but they have not installed any new patches on the Red Hat Linux server or on the Mac OS X desktop computers. Create a document for the new administrator that briefly outlines the steps for performing updates on the Red Hat Linux and Mac OS X computers. The steps for updating Red Hat Linux 9.0 using the Hat Network Alert Notification Tool are generally as follows: 1. On the Panel near the clock, click the exclamation point icon in the red circle or the two arrows icon in the green circle. 2. Select the Available Updates tab and note the updates that need to be made. 3. Click the Launch up2date button. 4. Click Forward after the Red Hat Update Agent window starts. 5. Use the default channel selection and click Forward. 6. Click Forward in the Packages Flagged to be Skipped box. 7. Click the Select all Packages box. Make sure you have enough disk space for the update. 8. Click Forward. 9. Click Forward when you see the message, "All Finished. Click Forward to continue." 10. Click Forward. 11. Click Finished. 12. Click Close. To obtain and install updates in Mac OS X using the Software Update tool: 1. Click the System Preferences icon in the Dock or click the Go menu, click Applications, and double-click System Preferences. 2. Click Software Update and make sure that the Update Software tab is selected. 3. Ensure that Automatically check for updates when you have a network connection is checked. Change the schedule for updates, if desired. 4. Click the Installed Updates tab, if you want to view updates that have already been made. 5. Click the Update Software tab. 6. Click the Check Now button to access the Apple web site and check for updates. 7. Click the Install button. 8. Enter your account name and password and press Return. The download and installation may take several minutes. When it is finished you will see the message: Status finished. 9. Restart the system, if requested. 8

9 Case Project 2-5: Protecting the Windows XP Professional Systems Your security audit also shows that Windows XP Professional users are not backing up important system files through creating periodic ASR sets. Create a how to document for the users explaining the importance of an ASR set and how to create this system backup. Users will need a blank floppy disk and a CD-R, CD-RW, or tape for the backup. With these available, the following steps outline how to create an ASR set: 1. Click Start, point to Accessories, point to System Tools, and click Backup. 2. When the Backup or Restore Wizard starts, click the Advanced Mode link. 3. Click the Automated System Recovery Wizard button. 4. Click Next when the Automated System Recovery Preparation Wizard starts. 5. Change the path for the default file name to the CD-R or tape drive you are using. Insert the CD- R, CD-RW, or tape. 6. Click Next. 7. Click Finish to write the backup files to the CD-R, CD-RW, or tape. 8. Notice the Automated System Recovery information box and then the Backup Progress dialog box as the files are being copied. 9. When requested, insert a blank formatted floppy disk and click OK. 10. Remove the floppy disk and CD-R, CD-RW, or tape, and click OK. 11. Close the Backup Progress dialog box and the Backup Utility window. 9

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. User Guide This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. Copyright 2002-2016 Max Secure Software. All rights reserved. Contents 2 Contents Introduction... 3 System

More information

Chapter 12: Advanced Operating Systems

Chapter 12: Advanced Operating Systems : Advanced Operating Systems IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents,

More information

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES CERT-In Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES Department of Information Technology Ministry of Communications and Information Technology Government of India Anti Virus

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

Solar Eclipse Scheduler. Release 9.0

Solar Eclipse Scheduler. Release 9.0 Solar Eclipse Scheduler Release 9.0 Disclaimer This document is for informational purposes only and is subject to change without notice. This document and its contents, including the viewpoints, dates

More information

Magic Card Professional

Magic Card Professional Magic Card Professional User Manual Table of Contents System Requirements... 2 1. Installation... 3 2. Magic Card Settings... 5 2.1 Set Protection... 6 2.2 Set Parameters... 8 2.3 Password... 10 2.4 CMOS

More information

Configuring Windows Security Features

Configuring Windows Security Features 04_0789737213_ch03.qxd 10/26/07 3:31 PM Page 77 3 CHAPTER THREE Configuring Windows Security Features This chapter covers the following objectives: Configure and troubleshoot User Account Control. Configure

More information

CCH ProSystem fx Engagement. Installation Guide

CCH ProSystem fx Engagement. Installation Guide CCH ProSystem fx Engagement Installation Guide 2018 2018 CCH Incorporated and its affiliates and licensors. All rights reserved. Material in this publication may not be reproduced or transmitted, in any

More information

LexisNexis PCLaw Installation & Upgrade Guide

LexisNexis PCLaw Installation & Upgrade Guide LexisNexis PCLaw Version 16 2017 LexisNexis All rights reserved. Copyright 2017 LexisNexis. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic

More information

How to install the software of ZNS8022

How to install the software of ZNS8022 How to install the software of ZNS8022 1. Please connect ZNS8022 to your PC after finished assembly. 2. Insert Installation CD to your CD-ROM drive and initiate the auto-run program. The wizard will run

More information

Chapter 8 Operating Systems and Utility Programs أ.أمل زهران

Chapter 8 Operating Systems and Utility Programs أ.أمل زهران Chapter 8 Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone

More information

Full System Restore Manually Windows 7 No Disk

Full System Restore Manually Windows 7 No Disk Full System Restore Manually Windows 7 No Disk Found Time to Complete: 20-30 Minutes. Video (English Only) - How to use System Restore within Windows 7 with a small amount of hard disk space reserved for

More information

ForeScout Extended Module for Symantec Endpoint Protection

ForeScout Extended Module for Symantec Endpoint Protection ForeScout Extended Module for Symantec Endpoint Protection Version 1.0.0 Table of Contents About the Symantec Endpoint Protection Integration... 4 Use Cases... 4 Additional Symantec Endpoint Protection

More information

Comodo Antivirus Software Version 2.2

Comodo Antivirus Software Version 2.2 Comodo Antivirus Software Version 2.2 User Guide Guide Version 2.2.082318 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

Full User Manual and Quick Start Guide

Full User Manual and Quick Start Guide Full User Manual and Quick Start Guide 2 W hile every precaution has been taken in the preparation of this manual, we assume no responsibility for errors or omissions. Neither, is any liability assumed

More information

Full System Restore Manually Run Command Prompt Windows Xp

Full System Restore Manually Run Command Prompt Windows Xp Full System Restore Manually Run Command Prompt Windows Xp Dell support article tagged with: System restore, windows, XP, WinXP, Safe Mode, Command Prompt. This is an article from the official Dell Support

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth

More information

Full System Restore Manually Running Command Prompt Windows Xp

Full System Restore Manually Running Command Prompt Windows Xp Full System Restore Manually Running Command Prompt Windows Xp If you can't boot into Windows XP to run chkdsk, download Easy Recovery To run CHKDSK from within Windows XP, but without Command Prompt,

More information

Chapter 8 Operating Systems and Utility Programs

Chapter 8 Operating Systems and Utility Programs Chapter 8 Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone

More information

Installing McAfee VirusScan For Windows 95/98 Kyler Kwock, Wilbur Wong Revised by Therese Nakadomari

Installing McAfee VirusScan For Windows 95/98 Kyler Kwock, Wilbur Wong Revised by Therese Nakadomari WIN9X009 March 2000 Installing McAfee VirusScan For Windows 95/98 Kyler Kwock, Wilbur Wong Revised by Therese Nakadomari Overview 1 Product Overview 1 System Requirements 2 Download Instructions 2 Installation

More information

Software Conversion Guide

Software Conversion Guide Eagle SSE Software Conversion Guide Release 17 (Server Level 29) EL2157 This manual contains reference information about software products from Activant Solutions Inc. The software described in this manual

More information

Comodo Client - Security for Linux Software Version 2.2

Comodo Client - Security for Linux Software Version 2.2 Comodo Client - Security for Linux Software Version 2.2 User Guide Guide Version 2.2.091818 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Client

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

The Lock XP installation White Paper # 09995

The Lock XP installation White Paper # 09995 The Lock XP installation White Paper # 09995 Installing The Lock XP for a single Home computer, with multiple users. The operating system used for this demonstration is Windows XP Professional, but any

More information

User Guide. Version R95. English

User Guide. Version R95. English Cloud Backup User Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

McAfee Internet Security Suite Quick-Start Guide

McAfee Internet Security Suite Quick-Start Guide Enjoy a Worry Free Online Experience McAfee Internet Security Suite protects your PC, identity and online experience. It also includes PC and network tools, plus McAfee SiteAdvisor for safe surfing. Internet

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2008 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

(Self-Study) Identify How to Back Up and Restore NetWare Systems

(Self-Study) Identify How to Back Up and Restore NetWare Systems SECTION 18 (Self-Study) Identify How to Back Up and Restore NetWare Systems The following objective will be tested: Develop a Network Backup Strategy In this section you learn how you can back up and restore

More information

Kaseya 2. User Guide. for VSA 6.0

Kaseya 2. User Guide. for VSA 6.0 Kaseya 2 Patch Management User Guide for VSA 6.0 July 19, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Perform Manual System Restore Xp Safe Mode Command Prompt

Perform Manual System Restore Xp Safe Mode Command Prompt Perform Manual System Restore Xp Safe Mode Command Prompt Dell support article tagged with: System restore, windows, XP, WinXP, Safe Mode, Command Prompt. This is This article provides information on the

More information

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.

More information

Version 11. NOVASTOR CORPORATION NovaBACKUP

Version 11. NOVASTOR CORPORATION NovaBACKUP NOVASTOR CORPORATION NovaBACKUP Version 11 2009 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email

More information

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems 5.0 Introduction 1. What controls almost all functions on a computer? The operating system 5.1 Explain the purpose of an operating system 2.

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

SIMATIC. Process Control System PCS 7 V7.0 SP1 Security Information Note: Setting up antivirus software. Preface. Using virus scanners 2

SIMATIC. Process Control System PCS 7 V7.0 SP1 Security Information Note: Setting up antivirus software. Preface. Using virus scanners 2 SIMATIC Process Control System PCS 7 V7.0 SP1 SIMATIC Process Control System PCS 7 V7.0 SP1 Security Information Note: Setting up antivirus software Security Information Note Preface 1 Using virus scanners

More information

Installation guide. OS/2 single user

Installation guide. OS/2 single user Installation guide OS/2 single user Document date: February 2007 Sophos Anti-Virus installation guide Contents About this guide 3 1 Installing Sophos Anti-Virus 4 2 Using Sophos Anti-Virus via the GUI

More information

Zillya Internet Security User Guide

Zillya Internet Security User Guide Zillya Internet Security User Guide Content Download Zillya Internet Security... 4 Installation Zillya Internet Security... 4 System Status... 7 System Scanning... 9 When Zillya Internet Security finds

More information

LOS ANGELES UNIFIED SCHOOL DISTRICT Office of the Chief Information Officer. DISTRIBUTION: All Schools and Offices ROUTING All Staff

LOS ANGELES UNIFIED SCHOOL DISTRICT Office of the Chief Information Officer. DISTRIBUTION: All Schools and Offices ROUTING All Staff ACTION, TO SHARE LOS ANGELES UNIFIED SCHOOL DISTRICT Office of the Chief Information Officer DISTRIBUTION: All Schools and Offices ROUTING All Staff SUBJECT: BULLETIN NO. K-23 ENTERPRISE LICENSE - NORTON

More information

Comodo Antivirus for Linux Software Version 1.0

Comodo Antivirus for Linux Software Version 1.0 Comodo Antivirus for Linux Software Version 1.0 User Guide Guide Version 1.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus for

More information

Full System Restore Manually Run Cmd Prompt

Full System Restore Manually Run Cmd Prompt Full System Restore Manually Run Cmd Prompt Xp To start System Restore from Command Prompt or Run dialog, type rstrui.exe and press Enter. Windows XP, System Restore, Restoration Complete. Click OK. This

More information

This is a GENERAL Servant Keeper Network Installation help sheet. If you need further assistance, please contact your network administrator.

This is a GENERAL Servant Keeper Network Installation help sheet. If you need further assistance, please contact your network administrator. SK Help Network Help Sheets - Workstation Installation This is a GENERAL Servant Keeper Network Installation help sheet. If you need further assistance, please contact your network administrator. Due to

More information

Uploading Files. Creating Files

Uploading Files. Creating Files Desktop/Laptop File management with Microsoft Teams (which uses a SharePoint document library) provides new options for working collaboratively. Some options will require assistance from ICT Desktop Support

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Common Preventive Maintenance Techniques for Operating Systems

Common Preventive Maintenance Techniques for Operating Systems Common Preventive Maintenance Techniques for Operating Systems OS Preventive Maintenance Plan To ensure that an OS remains fully functional, you must implement a preventive maintenance plan. A preventive

More information

SAS Installation Instructions Windows 2003, XP, 2000, NT. Workstation Installation Guidelines

SAS Installation Instructions Windows 2003, XP, 2000, NT. Workstation Installation Guidelines UCit Instructional and Research Computing, Software Distribution Office, 303B Zimmer Hall, Cincinnati, OH 45221-0088. Phone: (513) 556 9068 Email: Software@uc.edu SAS 9.1.3 Installation Instructions Windows

More information

es T tpassport Q&A * K I J G T 3 W C N K V [ $ G V V G T 5 G T X K E G =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX *VVR YYY VGUVRCUURQTV EQO

es T tpassport Q&A * K I J G T 3 W C N K V [ $ G V V G T 5 G T X K E G =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX *VVR YYY VGUVRCUURQTV EQO Testpassport Q&A Exam : 70-290 Title : Managing and Maintaining a MS Win Server 2003 Environment Version : DEMO 1 / 9 1.You are a network administrator for your company. The network consists of a single

More information

Chapter 5: Configuring ServerProtect

Chapter 5: Configuring ServerProtect Chapter 5: Configuring ServerProtect Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the types of ServerProtect tasks Describe which actions

More information

Comodo Antivirus Software Version 2.1

Comodo Antivirus Software Version 2.1 Comodo Antivirus Software Version 2.1 User Guide Guide Version 2.1.030515 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

Do A Manual System Restore From Command Prompt Xp

Do A Manual System Restore From Command Prompt Xp Do A Manual System Restore From Command Prompt Xp How to create a System Restore point in Windows Xp from cmd or windows. only bitmapped wallpaper Prohibit User from manually redirecting Profile Folders

More information

SIMATIC. Process Control System PCS 7 Symantec Endpoint Protection 11.0 Configuration. Using virus scanners 1. Configuration 2. Commissioning Manual

SIMATIC. Process Control System PCS 7 Symantec Endpoint Protection 11.0 Configuration. Using virus scanners 1. Configuration 2. Commissioning Manual SIMATIC Process Control System PCS 7 Using virus scanners 1 Configuration 2 SIMATIC Process Control System PCS 7 Symantec Endpoint Protection 11.0 Configuration Commissioning Manual 08/2009 A5E02634984-01

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

The following documents are included with your Sony VAIO computer.

The following documents are included with your Sony VAIO computer. Documentation The following documents are included with your Sony VAIO computer. Printed Documentation Quick Start Guide Describes the process from unpacking to starting up your VAIO. Troubleshooting and

More information

SOFTRAID XT. User Guide. an Other World Computing brand

SOFTRAID XT. User Guide. an Other World Computing brand SOFTRAID XT User Guide an Other World Computing brand CONTENTS Introduction... 1 1.1 Minimum System Requirements 1.2 Features 1.3 About This Manual Using... 2 2.1 About Easy Setup 2.2 Using Easy Setup

More information

AntiVirus 8.5 Update 2. User Guide

AntiVirus 8.5 Update 2. User Guide AntiVirus 8.5 Update 2 User Guide Notices Version Information Ivanti Endpoint Security: AntiVirus User Guide - Ivanti Endpoint Security: AntiVirus Version 8.5 Update 2 - Published: Apr 2018 Document Number:

More information

NUIT Tech Talk: Spring Cleaning Remembering the Technology?

NUIT Tech Talk: Spring Cleaning Remembering the Technology? NUIT Tech Talk: Spring Cleaning Remembering the Technology? April 23, 2008 Alex Escalona Distributed Support Specialist Distributed Support Services Northwestern University Information Technology Spring

More information

EXTERNAL HARD DRIVE. connect. USB2.0FireWirePCMac

EXTERNAL HARD DRIVE. connect. USB2.0FireWirePCMac EXTERNAL HARD DRIVE connect welcome contents Your new Seagate external hard drive is a state-of-the-art unit: solid, safe, quiet, cool, versatile and portable, ready to go from one location to another

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Full System Restore Manually Run Command Windows 7 From Boot

Full System Restore Manually Run Command Windows 7 From Boot Full System Restore Manually Run Command Windows 7 From Boot /offbootdir - used to specify the partition that contains the system files that are Arm yourself with some patience because running this command

More information

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA A+ Certification ( ) Study Guide Table of Contents CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System

More information

User Guide. Version R95. English

User Guide. Version R95. English Software Management User Guide Version R95 English September 22, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Getting Started with the Online Backup Software... 2 Installing the Online Backup Software... 2 Configuring a Device...

More information

BACKING UP AN IMAGE OF YOUR HARD-DRIVE

BACKING UP AN IMAGE OF YOUR HARD-DRIVE BACKING UP AN IMAGE OF YOUR HARD-DRIVE Jim McKnight www.jimopi.net ImageBackup.lwp revised 1-20-2016 GENERAL IMAGE BACKUP TIPS For an overview of backing up, see my "A Stress Free PC" article at http://www.jimopi.net

More information

CorpSystem Workpaper Manager Installation Guide

CorpSystem Workpaper Manager Installation Guide CorpSystem Workpaper Manager Installation Guide August 2011 Copyright 2011 CCH INCORPORATED. A Wolters Kluwer business. All Rights Reserved. Material in this publication may not be reproduced or transmitted,

More information

Quick Heal for Novell Netware User Guide

Quick Heal for Novell Netware User Guide QUICK HEAL TECHNOLOGIES (P) LTD. Quick Heal for Novell Netware User Guide QUICK HEAL FOR NOVELL NETWARE User Guide Quick Heal Technologies (P) Ltd. 603, Mayfair Towers II, Wakdewadi, Shivajinagar, Pune-

More information

SecureAPlus User Guide. Version 3.4

SecureAPlus User Guide. Version 3.4 SecureAPlus User Guide Version 3.4 September 2015 Copyright Information Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious

More information

Finding information on your computer

Finding information on your computer Important Be sure to create recovery discs immediately after your computer is ready for use because there are no recovery discs provided with the computer. For instructions on how to create the recovery

More information

How To Remove Virus From Computer Without Using Antivirus In Windows Xp

How To Remove Virus From Computer Without Using Antivirus In Windows Xp How To Remove Virus From Computer Without Using Antivirus In Windows Xp How to remove a virus - how to clean PC and laptop of virus, spyware and other PC internet security software that includes up to

More information

NUIT Tech Talk: Spring Cleaning Keep Your Computer in Great Shape

NUIT Tech Talk: Spring Cleaning Keep Your Computer in Great Shape NUIT Tech Talk: Spring Cleaning Keep Your Computer in Great Shape April 11, 2007 Rosa González Distributed Support Specialist Distributed Support Services Northwestern University Information Technology

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Abila MIP. Human Resource Management Installation Guide

Abila MIP. Human Resource Management Installation Guide Human Resource Management Installation Guide This is a publication of Abila, Inc. Version 2017.2 2017 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila

More information

Perform Manual System Restore Xp Recovery Console

Perform Manual System Restore Xp Recovery Console Perform Manual System Restore Xp Recovery Console chkdsk in Windows XP Recovery Console If you can't boot the operating system, you can run the tool from Command Prompt either by booting your computer.

More information

Panda Antivirus Server for Mac User Manual

Panda Antivirus Server for Mac User Manual Panda Antivirus Server for Mac User Manual !"#$%&'()*+,$-'*(& Use of this product is subject to acceptance of the Panda Security End User License Agreement enclosed. Panda Security is registered in the

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

User Manual & Quick-Start Guide

User Manual & Quick-Start Guide User Manual & Quick-Start Guide Version 2 2002-2008 Promethean Software Corporation. All rights reserved. Table of Contents Introduction... 5 Quick-Start Guide... 5 o Installing TurboLaw... 5 o Configuring

More information

Comodo Antivirus Software Version 2.0

Comodo Antivirus Software Version 2.0 Comodo Antivirus Software Version 2.0 User Guide Guide Version 2.0.010215 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

How To Remove Virus Without Antivirus In >>>CLICK HERE<<<

How To Remove Virus Without Antivirus In >>>CLICK HERE<<< How To Remove Virus Without Antivirus In Windows 7 Pdf Remove virus without antivirus, Here I have all necessary things and also I have steps to Few Effective Steps To Remove Virus Without Antivirus In

More information

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault Introduction What is Microsoft Data Protection Manager (DPM)? The Microsoft Data Protection Manager is a member of the Microsoft System Center family of management products. DPM provides continuous data

More information

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central Trend Micro Apex One as a Service / Apex One Best Practice Guide for Malware Protection 1 Best Practice Guide Apex One as a Service / Apex Central Information in this document is subject to change without

More information

JetFlash User s Manual

JetFlash User s Manual JetFlash User s Manual ( Version 1.0 ) Table of Contents INTRODUCTION...1 PACKAGE CONTENTS...1 FEATURES...1 SYSTEM REQUIREMENTS...1 DRIVER INSTALLATION...2 DRIVER INSTALLATION FOR WINDOWS 98SE...2 DRIVER

More information

PGP NetShare Quick Start Guide Version 10.2

PGP NetShare Quick Start Guide Version 10.2 PGP NetShare Quick Start Guide Version 10.2 What is PGP NetShare? The PGP NetShare product is a software tool that provides multiple ways to protect and share your data. Use PGP NetShare to: Let authorized

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

A+ Certification Guide. Chapter 15 Troubleshooting and Maintaining Windows

A+ Certification Guide. Chapter 15 Troubleshooting and Maintaining Windows A+ Certification Guide Chapter 15 Troubleshooting and Maintaining Windows Chapter 15 Objectives STOP (Blue Screen of Death) Errors: Discover what a BSOD is, typical causes, how to diagnose Boot Failures:

More information

NUIT Tech Talk: Agenda

NUIT Tech Talk: Agenda NUIT Tech Talk: May 14, 2008 Leigh Underwood NUIT Senior Consultant Agenda Tips for Staying Secure Tips for Staying Connected Forwarding E-mail Special Instructions for Graduates Where to Go for Help Keep

More information

Business Insights Dashboard

Business Insights Dashboard Business Insights Dashboard Sage 500 ERP 2000-2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks

More information

Module 15. Troubleshooting Software

Module 15. Troubleshooting Software Module 15 Troubleshooting Software Objectives 1. 4.6 Troubleshooting Software 2. 4.7 Troubleshooting Security 2 TROUBLESHOOTING SOFTWARE 3 Troubleshooting Legacy Software Installation 1. Check Microsoft

More information

Avira AntiVir Server

Avira AntiVir Server Avira AntiVir Server Support March 2010 www.avira.com Errors in design and contents cannot be excluded Avira GmbH Content 1. Setup Modes... 3 2. Configuration... 7 3. Jobs in the scheduler... 13 4. Different

More information

ViconNet Version 6 XX Installation and Upgrade Guide.

ViconNet Version 6 XX Installation and Upgrade Guide. Installation and Upgrade Guide XX222-01-02 ViconNet Version 6 Vicon Industries Inc., 89 Arkay Drive, Hauppauge, New York 11788 Tel: 631-952-2288 Fax: 631-951-2288 Toll Free: 800-645-9116 24-Hour Technical

More information

Sophos Central Admin. help

Sophos Central Admin. help help Contents About Sophos Central... 1 Activate Your License...2 Endpoint Protection...3 Dashboard...3 Alerts...4 Root Cause Analysis...9 Logs & Reports... 11 People... 24 Computers...33 Computer Groups...40

More information

1. ECI Hosted Clients Installing Release 6.3 for the First Time (ECI Hosted) Upgrading to Release 6.3SP2 (ECI Hosted)

1. ECI Hosted Clients Installing Release 6.3 for the First Time (ECI Hosted) Upgrading to Release 6.3SP2 (ECI Hosted) 1. ECI Hosted Clients........................................................................................... 2 1.1 Installing Release 6.3 for the First Time (ECI Hosted)...........................................................

More information

Installing Sophos Endpoint Security and Control on a Home Computer Contents

Installing Sophos Endpoint Security and Control on a Home Computer Contents Contents Licensing... 2 Apple Mac Users.... 2 Free Tools... 2 Support... 2 Installation Instructions for Windows PC... 2 Before installing Sophos for Windows... 3 Downloading Sophos Endpoint Security and

More information

ProSystem fx Engagement

ProSystem fx Engagement ProSystem fx Engagement Guide November 2008 Copyright 2008 CCH INCORPORATED. A Wolters Kluwer Business. All Rights Reserved. Material in this publication may not be reproduced or transmitted, in any form

More information

Chapter A1: Setting up BankLink Practice, BankLink Notes and BankLink Notes Online

Chapter A1: Setting up BankLink Practice, BankLink Notes and BankLink Notes Online Chapter A1: Setting up BankLink Practice, BankLink Notes and BankLink Notes Online This chapter is aimed at BankLink Administrators This chapter covers setting up BankLink Practice and BankLink Notes Online

More information

SOFTRAID LITE XT. User Guide. an Other World Computing brand

SOFTRAID LITE XT. User Guide. an Other World Computing brand SOFTRAID LITE XT User Guide an Other World Computing brand CONTENTS Introduction... 1 1.1 Minimum System Requirements 1.2 Features 1.3 About This Manual Using... 2 2.1 About Easy Setup 2.2 Using Easy Setup

More information

Desktop & Laptop Edition

Desktop & Laptop Edition Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion

More information

Reinstalling Windows 95/98/ME/2000 Professional

Reinstalling Windows 95/98/ME/2000 Professional Reinstalling Windows 95/98/ME/2000 Professional Who needs this handout? If you have been instructed to reinstall Windows on your computer as a result of a recommendation from a computer consulting professional,

More information

Redemption Backup USER GUIDE

Redemption Backup USER GUIDE Redemption TM User Guide OnSpec Electronic, Inc. Redemption Backup USER GUIDE OnSpec Redemption User Guide Copyright 1998-2005 CompuApps, Inc. All Rights Reserved. Portions Copyright (c) 2005-2006 OnSpec

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Anti-Malware User Guide Version 1.1 July 11, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Adding Malwarebytes Anti-Malware Protection to a Computer from the Creator's Web Site

Adding Malwarebytes Anti-Malware Protection to a Computer from the Creator's Web Site Adding Malwarebytes Anti-Malware Protection to a Computer from the Creator's Web Site Malwarebytes.com Malwarebytes is the Anti-Malware Industry s leading scanner. It detects and removes malware like ads,

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 2 Contents Chapter 1: Introduction...7 1.1 System requirements...8 1.1.1 Policy Manager Server...8 1.1.2 Policy Manager Console...8

More information