Activity 5.8
1.)
Disadvantages
A key lock can easily be picked or duplicate keys can be made
Access codes can be observed and passed on
Swipe cards can be copied
Advantages
A key lock can have a special key that is nearly imposable to copied
You have hundreds of different combinations to choose from.
You can only get in with the correct card and they can be programmed to do anything
2.)
A bank door
3.)
Backups, generators, maintenance, basically every thing
Wednesday, 16 September 2009
Klez virus report 5.7
Klez virus report 5.7
http://www.symantec.com/security_response/writeup.jsp?docid=2002-041714-3225-99
1.)
It has been reported that W32.Klez.H@mm may arrive in the following email message that claims to be a Symantec virus removal tool. This message is not from Symantec. Symantec neither sends unsolicited email nor distributes virus removal tools in this manner.
Attempts to disable on-access virus scanners and some previously distributed worms (such as W32.Nimda and Code Red), by stopping any active processes. The worm removes the start up registry keys, which antivirus products use. It also copy’s it self to network drives with a random double file extension.
2.)
Code Red
2001
In July, the Code Red worm infects thousands of Windows NT/2000 servers, causing $2 billion in damages (estimated)
It defaced the infected site by adding this line of text to the screen
HELLO! Welcome to http://www.worm.com! Hacked By Chinese!
3.)
http://www.symantec.com/security_response/writeup.jsp?docid=2002-041714-3225-99
1.)
It has been reported that W32.Klez.H@mm may arrive in the following email message that claims to be a Symantec virus removal tool. This message is not from Symantec. Symantec neither sends unsolicited email nor distributes virus removal tools in this manner.
Attempts to disable on-access virus scanners and some previously distributed worms (such as W32.Nimda and Code Red), by stopping any active processes. The worm removes the start up registry keys, which antivirus products use. It also copy’s it self to network drives with a random double file extension.
2.)
Code Red
2001
In July, the Code Red worm infects thousands of Windows NT/2000 servers, causing $2 billion in damages (estimated)
It defaced the infected site by adding this line of text to the screen
HELLO! Welcome to http://www.worm.com! Hacked By Chinese!
3.)
Tuesday, 15 September 2009
Home work
Technology that estate agents use
3.) What tech they use
1.) A computer in the office so they can do work
2.) A laptop so they can look at things/show customers whilst away from the Office
3.) GPS so they can find the properties
4.) A server so they can link all pc’s and share files
5.) Mobile broadband so they can use internet any ware
6.) A camera to take pictures
4.) What they might consider
I think that they have all the stuff they need and I wouldn’t want to add any thing.
3.) What tech they use
1.) A computer in the office so they can do work
2.) A laptop so they can look at things/show customers whilst away from the Office
3.) GPS so they can find the properties
4.) A server so they can link all pc’s and share files
5.) Mobile broadband so they can use internet any ware
6.) A camera to take pictures
4.) What they might consider
I think that they have all the stuff they need and I wouldn’t want to add any thing.
Wednesday, 9 September 2009
unit5 modual 5.3
1.) Business relevant technology
It has a define purpose, such as networking computers together so they can sheer folders on there hard drives allowing team working.
2.) Estate agency network
So they can show there current updated property details to the customers from other agency computers in the building.
3.) ADSL DSL(ADSL- asymmetrical digital subscriber line DSL- digital subscriber line)
People say that it’s the same because it’s like the dsl but tweaked so that it is more efficient.
It has a define purpose, such as networking computers together so they can sheer folders on there hard drives allowing team working.
2.) Estate agency network
So they can show there current updated property details to the customers from other agency computers in the building.
3.) ADSL DSL(ADSL- asymmetrical digital subscriber line DSL- digital subscriber line)
People say that it’s the same because it’s like the dsl but tweaked so that it is more efficient.
unit 5 module 5.1
1.) The components used in a network
· A Computer of some sort
· That computer needs a NIC (network interface card)
· Rj-45 cable
· A network switch or hub (switches are better)
· Fiberoptic
· Server
· Print server
· Nas (network area storage)
2.) What these items do
Computer
Well pretty self explanatory you need this in the first place.
NIC (network interface card)
This is what the rj-45 cable plugs in to a computer
Rj-45 cable
This carries all the data between the network, pc, servers, Ect.
A network switch or hub (switches are better)
This puts more than one Rj cable in to one so there is less cables
Fiberoptic
This is a very fast data transfer cable used to transfer lots of data with only a small amount of cabling
Print server
This manages the things you print .it also links all the printers together so its easier to find the one you are looking for.
Nas (network area storage)
This is a file server it can store all the network files on it.
3.) Why hubs are better than switches
Well switches are more efficient and send the items to there destination, where as hubs send the item to all the network pcs and wait for one to say that it will take it.
· A Computer of some sort
· That computer needs a NIC (network interface card)
· Rj-45 cable
· A network switch or hub (switches are better)
· Fiberoptic
· Server
· Print server
· Nas (network area storage)
2.) What these items do
Computer
Well pretty self explanatory you need this in the first place.
NIC (network interface card)
This is what the rj-45 cable plugs in to a computer
Rj-45 cable
This carries all the data between the network, pc, servers, Ect.
A network switch or hub (switches are better)
This puts more than one Rj cable in to one so there is less cables
Fiberoptic
This is a very fast data transfer cable used to transfer lots of data with only a small amount of cabling
Print server
This manages the things you print .it also links all the printers together so its easier to find the one you are looking for.
Nas (network area storage)
This is a file server it can store all the network files on it.
3.) Why hubs are better than switches
Well switches are more efficient and send the items to there destination, where as hubs send the item to all the network pcs and wait for one to say that it will take it.
Subscribe to:
Posts (Atom)