Project 20-1
Using two computers, networked together, do the following to practice sharing and securing folders using Windows XP:
1. Create a user account on Computer 1 named User 1. In the My Documents
folder for that account, create a folder named Folder1.
2. On Computer 2, create a user account named User2. Try to access Folder1 on Computer 1. What is the result? What must you do so that the folder can
access?
I could not access the folder. I had to turn off the firewall and put the
folder in the share folder. I mapped the drive to the Shared Documents folder
and opened it.
3. Now make the folder private so that others cannot see or access it on
the network. Describe how you did that.
Selected the folder, right clicked on it, chose properties, chose sharing tab
and clicked the box Make this folder private in the first section called Local
sharing and security.
Project 20-2
A free trial of AVG Anti-Virus software is available on the AVG site at avg.com. Do the following to download, install, and run the software:
1. Download the free trial version of AVG Anti-Virus software from the
avg.com site and install the software.
2. Perform a complete scan of the system. Were any suspicious programs
found?
Nothing was found.
3. Update the software with the latest virus signatures.
Done.
4. Set the AV software to scan the system daily.
Done.
5. set the software to scan incoming email.
It was set by installing AVG using the custom install.
Using two computers, networked together, do the following to practice sharing and securing folders using Windows XP:
1. Create a user account on Computer 1 named User 1. In the My Documents
folder for that account, create a folder named Folder1.
2. On Computer 2, create a user account named User2. Try to access Folder1 on Computer 1. What is the result? What must you do so that the folder can
access?
I could not access the folder. I had to turn off the firewall and put the
folder in the share folder. I mapped the drive to the Shared Documents folder
and opened it.
3. Now make the folder private so that others cannot see or access it on
the network. Describe how you did that.
Selected the folder, right clicked on it, chose properties, chose sharing tab
and clicked the box Make this folder private in the first section called Local
sharing and security.
Project 20-2
A free trial of AVG Anti-Virus software is available on the AVG site at avg.com. Do the following to download, install, and run the software:
1. Download the free trial version of AVG Anti-Virus software from the
avg.com site and install the software.
2. Perform a complete scan of the system. Were any suspicious programs
found?
Nothing was found.
3. Update the software with the latest virus signatures.
Done.
4. Set the AV software to scan the system daily.
Done.
5. set the software to scan incoming email.
It was set by installing AVG using the custom install.
Project 20-3
Boot to the Windows desktop and then use Task Manger to get a list of all the running process on your machine. Get a print screen of this list. Make a written list of each process running and write a one-sentence explanation of the process. Note that you most likely will need to use the Internet to research some of these processes. Next, boot the system into Safe Mode and use Task Manger to list running processes. Which process that was loaded normally is not loaded when the system is running in Safe Mode?
See pictures.
Project 20-4
autoruns by TechNet and Sysinternals (technet.microsoft.com) is similar to, but gives more information than does MSconfig. Download Autoruns and run it on your PC. How many registry keys does Autoruns list that contain startup items on your PC? Use Msconfig to get a similar list. Compare the list of startup items to that generated by Msconfig. Describe any differences between the two lists.
Could not find autoruns online and msconfig have been cleaned out.
Project 20-5
Some source of information about viruses on the Web is F-Secure Corp. Go to the Web site f-secure.com, for information about viruses. Information about viruses from this Web site, with these characteristics:
*One virus that destroys data on a hard drive
*One harmless virus that only displays garbage on the screen
*One virus that hides in a boot sector
The site also lists information about the most recent viruses. Search the Web
site at f-secure.com, list three recent viruses, and describe their
payloads.
Symbian malware
nation-state sponsored cyber attacks
Zeus
Trojan
Android - Steware.A and DroidRooter.F, as well as spyware, such as
Adboo.A
Macs - variants of Flashback
Boot to the Windows desktop and then use Task Manger to get a list of all the running process on your machine. Get a print screen of this list. Make a written list of each process running and write a one-sentence explanation of the process. Note that you most likely will need to use the Internet to research some of these processes. Next, boot the system into Safe Mode and use Task Manger to list running processes. Which process that was loaded normally is not loaded when the system is running in Safe Mode?
See pictures.
Project 20-4
autoruns by TechNet and Sysinternals (technet.microsoft.com) is similar to, but gives more information than does MSconfig. Download Autoruns and run it on your PC. How many registry keys does Autoruns list that contain startup items on your PC? Use Msconfig to get a similar list. Compare the list of startup items to that generated by Msconfig. Describe any differences between the two lists.
Could not find autoruns online and msconfig have been cleaned out.
Project 20-5
Some source of information about viruses on the Web is F-Secure Corp. Go to the Web site f-secure.com, for information about viruses. Information about viruses from this Web site, with these characteristics:
*One virus that destroys data on a hard drive
*One harmless virus that only displays garbage on the screen
*One virus that hides in a boot sector
The site also lists information about the most recent viruses. Search the Web
site at f-secure.com, list three recent viruses, and describe their
payloads.
Symbian malware
nation-state sponsored cyber attacks
Zeus
Trojan
Android - Steware.A and DroidRooter.F, as well as spyware, such as
Adboo.A
Macs - variants of Flashback