Chapter 19 Projects
19-1
Search through your spam and junk mail for an email you think might
be a hoax. (Please don't click any links or open any attachments as you search.) Using the Web sites listed earlier in the chapter for debunking virus hoaxes, search for information about this potential hoax. You might need to enter the subject line in the email message into a search box on the Web site.
I didn't have any hoax email in my spam or junk email folders.
19-1
Search through your spam and junk mail for an email you think might
be a hoax. (Please don't click any links or open any attachments as you search.) Using the Web sites listed earlier in the chapter for debunking virus hoaxes, search for information about this potential hoax. You might need to enter the subject line in the email message into a search box on the Web site.
I didn't have any hoax email in my spam or junk email folders.
19-2
Go to the Mozilla Web site mozilla.org and download and install Firefox. Use it to browse the Web. How does it compare to Internet Explorer? What do you kike better about it? What do you not like as well? When might you recommend to someone that they use Firefox rather than Internet Explorer? Also, download the FoxFilter plug-in from mozilla.org and install it. What are the differences between FoxFilter and the IE content filter?
Firefox does the same job as IE for browsing the internet. I like IE better as more websites use IE and I don't have issues. I would recommend someone to
use IE when IE was not working or as an alternative instead of IE. FoxFilter was not available. See picture.
Go to the Mozilla Web site mozilla.org and download and install Firefox. Use it to browse the Web. How does it compare to Internet Explorer? What do you kike better about it? What do you not like as well? When might you recommend to someone that they use Firefox rather than Internet Explorer? Also, download the FoxFilter plug-in from mozilla.org and install it. What are the differences between FoxFilter and the IE content filter?
Firefox does the same job as IE for browsing the internet. I like IE better as more websites use IE and I don't have issues. I would recommend someone to
use IE when IE was not working or as an alternative instead of IE. FoxFilter was not available. See picture.
19-3
Port scanning software can be used to find out how vulnerable a computer is with open ports. This project will require the use of two computers on the same network to practice using port scanning software. Do the following:
1. Download and install Advanced Port Scanner by Famatech at radmin.com on Computer 1.
2. On Computer 2, make sure that Windows Firewall is turned on and that the
Block all incoming connections box is checked. Also, disable any third-party
personal firewalls.
3. On Computer 1, start Advanced Port Scanner and make sure that the range of IP addresses includes the IP address of Computer 2. Then scan.
Scanned 67 ports and 3 ports were open.
4. Browse the list and find Computer 2. List the number and purpose of all
open ports found on your Computer 2.
See picture.
5. On Computer 2, turn Windows firewall off.
6. On Computer 1, rescan and list the number and purpose of each port now
open on Computer 2.
Scanned 67 ports and 3 ports were open.
If Computer 2 has another personal firewall installed, turn on that firewall.
On Computer 1, rescan and list the number and purpose of each port now open on Computer 2 when the personal firewall is running.
Project 19-4
Do the following to experiment with managing user accounts:
1. Using Windows Vista, create a Standard user account and log on using that
account. Can you view the contents of the Documents folder for an account with Administrator privileges?
I did not have permission. See picture.
2. Using the Standard account, try to install a program. What message do you
receive?
I installed Malwarebytes and did not receive any message.
3. What happens if you try to create a new account while logged on under the
standard account?
I could create another user account.
Port scanning software can be used to find out how vulnerable a computer is with open ports. This project will require the use of two computers on the same network to practice using port scanning software. Do the following:
1. Download and install Advanced Port Scanner by Famatech at radmin.com on Computer 1.
2. On Computer 2, make sure that Windows Firewall is turned on and that the
Block all incoming connections box is checked. Also, disable any third-party
personal firewalls.
3. On Computer 1, start Advanced Port Scanner and make sure that the range of IP addresses includes the IP address of Computer 2. Then scan.
Scanned 67 ports and 3 ports were open.
4. Browse the list and find Computer 2. List the number and purpose of all
open ports found on your Computer 2.
See picture.
5. On Computer 2, turn Windows firewall off.
6. On Computer 1, rescan and list the number and purpose of each port now
open on Computer 2.
Scanned 67 ports and 3 ports were open.
If Computer 2 has another personal firewall installed, turn on that firewall.
On Computer 1, rescan and list the number and purpose of each port now open on Computer 2 when the personal firewall is running.
Project 19-4
Do the following to experiment with managing user accounts:
1. Using Windows Vista, create a Standard user account and log on using that
account. Can you view the contents of the Documents folder for an account with Administrator privileges?
I did not have permission. See picture.
2. Using the Standard account, try to install a program. What message do you
receive?
I installed Malwarebytes and did not receive any message.
3. What happens if you try to create a new account while logged on under the
standard account?
I could create another user account.
19-5
MS offers a password checker for users to know the strength of their
passwords. To use the utility, go to the MS Web site at microsoft.com and search for "Password Checker". Use this free MS utility to verify that a password you
have made up is a strong password. Based on the measure of the strength of
several of you passwords, what do you think the password checker is looking
for?
See picture. My password is strong. MS is looking for how difficult it is for
hacker/hacker software to figure out your password.
MS offers a password checker for users to know the strength of their
passwords. To use the utility, go to the MS Web site at microsoft.com and search for "Password Checker". Use this free MS utility to verify that a password you
have made up is a strong password. Based on the measure of the strength of
several of you passwords, what do you think the password checker is looking
for?
See picture. My password is strong. MS is looking for how difficult it is for
hacker/hacker software to figure out your password.