Anda di halaman 1dari 29

c 

  
     

1. E-mail the computer users.
2. Empty the Recycle Bin.
3. Delete .tmp files.
4. Check browser history and cache files.
5. Clean out Windows temporary Internet files
6. Confirm that backups are being done (Laptop Users).
7. Update drivers as needed.
8. Check the operating system and applications.
9. Remove unlicensed software.
10. Check the connections.

c 
   
  
iÊ G  
 
iÊ Gile and print sharing.
iÊ ÿccount administration for users.
iÊ ^ecurity.
iÊ Backing up data
iÊ G    
iÊ ^tandalone software

iÊ the „  attribute in XML


iÊ a standalone expansion pack for games
iÊ game not bundled with console
iÊ a standalone installment in serial fiction is one that is unrelated or unnecessary
to appreciate the main storyline
iÊ a standalone protein domain in molecular biology is a protein domain that
exists as a single domain and as such is believed to perform a single function
iÊ a standalone cupcake mold in baking does not need a pan to hold itself up

Ê
Ê

c 


     Ê
It is a method of storing and organizing arbitrary collections of data, in a form
that is human-readable. ÿ file system organizes data into an easy-to-
manipulate database of human-readable names for the data, usually with a
human-readable hierarchical organization of the data, for the storage,
organization, manipulation, and retrieval by the computer's operating system.
Each discrete collection of data in a file system is referred to as a computer file.

   

The hard disk is of course a medium for storing information. Hard disks grow in size
every year, and as they get larger, using them in an efficient way becomes more
difficult. The à „„  is the general name given to the logical structures and
software routines used to control the access to the storage on a hard disk system.
Different operating systems use different ways of organizing and controlling access to
data on the hard disk, and this choice is basically independent of the specific hardware
being used. The information in this section in fact straddles the fine line between
hardware and software, a line which gets more and more blurry every year

!    


 
  
  
  

There are a number of protocols used in computing. The most
Popular ones being the following:

Ê
Ê

Ê
Ê
Ê
Telnet (Telnet Remote Protocol)
^^H (^ecure ^hell Remote Protocol)
IP (Internet Protocol)
UDP (User Datagram Protocol)
TCP (Transmission Control Protocol)
DHCP (Dynamic Host Configuration Protocol)
HTTP (Hypertext Transfer Protocol)
GTP (Gile Transfer Protocol)
POP3 (Post Office Protocol 3)
^MTP (^imple Mail Transfer Protocol)
IMÿP (Internet Message ÿccess Protocol)

iÊ G  - Gile Transfer Protocol allows file transfer between two computers with
login required.
iÊ G  - Trivial Gile Transfer Protocol allows file transfer between two
computers with no login required. It is limited, and is intended for diskless
stations.
iÊ G - Network Gile ^ystem is a protocol that allows UNIX and Linux systems
remotely mount each other's file systems.
iÊ   - ^imple Network Management Protocol is used to manage all types of
network elements based on various data sent and received.
iÊ   - ^imple Mail Transfer Protocol is used to transport mail. ^imple Mail
Transport Protocol is used on the internet; it is not a transport layer protocol but
is an application layer protocol.
iÊ M  - Hypertext Transfer Protocol is used to transport HTML pages from
web servers to web browsers. The protocol used to communicate between web
servers and web browser software clients.
iÊ  - ÿ reliable connection oriented protocol used to control the management
of application level services between computers. It is used for transport by
some applications.
iÊ ¢ - ÿn unreliable connection less protocol used to control the management
of application level services between computers. It is used for transport by
some applications which must provide their own reliability.
iÊ   - ^imple Network Management Protocol is used to manage all types of
network elements based on various data sent and received.
iÊ = - Internet control message protocol provides management and error
reporting to help manage the process of sending data between computers.
(Management). This protocol is used to report connection status back to
computers that are trying to connect other computers.
!  !


   
 
    




The proper use of safety signs is a compulsory requirement for all businesses,
commercial organizations and public access buildings. Legislation is in place to
enforce the proper use of these signs. The enforcement of this legislation is within
the remit of The Health and ^afety Executive (The H^E).

The content of health and safety signs is split into the following categories.
Ê

iÊ    " 


ÿ predominantly red and white safety sign which denotes that a certain behavior or
activity is prohibited. ³No smoking´ and ³No access´ are common examples.

iÊ c#!
ÿ warning triangle which is yellow with a black border signifies all potential
hazards. ^igns can be generic and just state ³Danger´ or can be more specific, such
as ³Caution slippery surface´ or ³Danger High Voltage´. The symbol within the
triangle varies according to the hazard. ÿn exclamation mark denotes a general
hazard, whereas a lightning strike denotes an electrical hazard.

iÊ !$ 
ÿ blue and white sign denotes that a certain action must be taken. By far the most
common use is to signify that certain types of protective equipment must be worn
or used. ³Hard Hats´, ³^afety Gootwear´, ³Hi-visibility clothing´ and ³Eye
protection´ are essential in nearly all areas of industry and construction.
iÊ j %&  
ÿ red and white sign is used to denote all fire equipment such as extinguishers,
alarm call points, and fire hoses. Extinguisher signs are further coded to denote the
type and its proper use. Gor example, CO2 (black) signifies safe for use on
electrical fires but should not be used in a confined space.

iÊ r   


ÿ green and white sign that denotes safe conditions. These are predominantly used
to inform people of escape routes and escape procedures. The normal style is
wording such as ³Gire Exit´ or ³Exit´ along with a running man symbol and a
directional arrow. Other common uses are for ³ÿssembly point´ and ³Push Bar to
Open´.

ÿll of these signs are usually available in a choice of materials. ^elf adhesive
vinyls, rigid plastic, debone and aluminum is the most usual materials. ^elf
adhesive vinyl is for internal use, and should only be applied to smooth flat
surfaces. Rigid plastic can be used externally but is predominantly for internal use.
These can be fixed using appropriate double sided tape or can be pre-drilled for
screw fixing. Debone and aluminum is more suitable for external use and has the
appropriate fire ratings for signage in high risk areas, such as chemical or gas
cylinder stores. Gor buildings without emergency lighting, the use of photo
luminous signs is essential particularly for Gire Exit and Gire Equipment signage.
This too is available in all of the above materials but as only suitable for interior
use, most commonly in ^elf ÿdhesive Vinyl and Rigid Plastic.

iÊ The size of the signage required is determined by the viewing distance of the
sign. Gor example, as a rough guide, signs visible up to 10 meters away should
be 300mm x 100mm, up to 20 meters, 600mm x 200mm and up to 40m,
1200mm x 400mm.
iÊ There are many British ^tandards governing the design of signs, but with
particular reference to ³Gire exit´ and ³Gire equipment´ signs, B^5499 or
92/58/EEC should be used.
iÊ ^ign buyers should also be aware of their responsibilities under the Disability
Discrimination ÿct (DDÿ) where it may be appropriate to provide signs in
³Tactile´ or ³Braille´ formats.
iÊ In short, signs are an essential part of every business and advice should be
sought when determining what is needed in terms of content, size and material.

!c 
    
 



  
 

 
You can use a wireless network (WLÿN) to share Internet access, files, printers, game
consoles, and other devices among all the computers in your home. ÿfter you¶ve
completed the initial wireless router setup and added your computers and devices to
the network, you can use your home network to surf the web or to play online
games²whether you're sitting in your living room or relaxing in your backyard.
It's easier than ever to set up a wireless network, especially now that Internet access
and routers (like Linksys wireless routers and D-link wireless routers) have become
widely available.
What you·ll need to set up your wireless network
iÊ ÿ       !
The Windows 7 operating system fully supports wireless networking. Gor Windows
Vista users, we recommend installing Windows Vista ^ervice Pack 2before setting
up your wireless network. Gor Windows XP users, we recommend
installing Windows XP ^ervice Pack 3. Use Windows Update to check whether you
need the service pack and to install it. Click the  button, click ÿ,
click  ¢ , and then click  ! . ÿlthough the service
packs for Windows Vista and Windows XP are not required for wireless
networking, they can make things much easier and can help protect you against
hackers, worms, and other Internet intruders.
iÊ ÿ broadband (D^L or cable) Internet connection to set up a wireless network, you
need a broadband or high-speed Internet connection (not a dial-up connection)
provided by an Internet service provider (I^P), usually for a monthly fee. Two
common broadband technologies are Digital ^ubscriber Line (D^L) and cable
technology. These require a D^L modem or a cable modem (often provided by your
I^P). ÿfter you have an I^P and a modem, you're ready to connect to the Internet.

^et up a new connection to the Internet:


÷Ê Windows 7 and Windows Vista
÷Ê Windows XP
Ê
iÊ ÿ wireless router, a DSL modem, or a cable modem with built-in wireless networking
support Ê
The router converts the signals coming across your Internet connection into a
wireless broadcast, sort of like a cordless phone base station. Newer D^L and cable
modems come with integrated wireless networking capability and are called  

 
„. If the modem router you received or purchased from your I^P already has
wireless capability built in, you do not need to purchase a separate wireless router.
Just follow the instructions provided by your I^P for activating your wireless
connection.

If you do need to purchase a


„„
 
, be sure that you buy a
„„
 

and not a
„„ „„  . The Linksys router is a popular router for wireless
networks because it¶s simple to set up. There are many routers to choose from, for
example:
Linksys wireless D-Link wireless Cisco wireless ÿ^U^ wireless
routers routers routers routers

iÊ While you're looking for a wireless router or other wireless equipment in stores or
on the Internet, you might notice that you can choose equipment that supports four
different wireless networking technologies: 802.11a, 802.11b, 802.11g, and
802.11n. We recommend 802.11g (
„„) or 802.11n (
„„) because
they offer excellent performance and are compatible with almost everything.

NOTE: If you do not want to buy a wireless router or if you want to connect
computers or devices temporarily for a specific purpose, like sharing devices or
games, you can set up a temporary wireless network without a router. This is called
an   
.

^et up an ad hoc network:


÷Ê Windows 7
÷Ê Windows Vista
÷Ê Windows XP

iÊ ÿ computer with built-in wireless networking support or a wireless network adapterÊ


If you have a newer computer, you may already have built-in wireless capabilities.
If this is the case, you don¶t need a wireless network adapter. Here¶s how to check
whether your computer has wireless support installed Ê
Ê
Ê
Ê
Windows 7 and Windows Vista
Ê

Windows XP

Ê
If your desktop or laptop computer does not have built-in wireless support, you need
to purchase a network adapter to wirelessly connect your computer to your wireless
router. If you need an adapter for a desktop computer, buy a U^B wireless network
adapter. If you have a laptop, buy a PC card-based network adapter. Make sure that
you have one adapter for every computer on your network.

iÊ ÿ copy of your router setup instructionsÊ


Before you begin setting up your wireless network, it¶s a good idea to make sure
that you have the copy of the setup instructions provided by the router manufacturer
or your I^P. If you do not have a copy, visit the manufacturer¶s website for get
instructions on how to set up your router. ÿll routers vary, and you may need to
consult the instructions to set up your wireless network using your specific router.
Ê
@ Connect to the Internet
Make sure that your Internet connection and your D^L or cable modem are working.
Your wireless network depends on this connection.
Ê
c Connect your wireless router
These are the steps for connecting a stand-alone wireless router to your D^L modem
or cable modem. If you have a modem router, follow your I^P¶s instructions for
connecting your network.
^ince you'll be temporarily disconnected from the Internet, print these instructions
before you go any further.
Girst, locate your cable modem or D^L modem and unplug it to turn it off.
Next, connect your wireless router to your modem. Your modem should stay
connected directly to the Internet. Later, after you've hooked everything up, your
computer will wirelessly connect to your router, and the router will send
communications through your modem to the Internet.

Ê
ÊÊ 
Ê 
 ÊÊ 
Ê   Ê

iÊ =       w Unplug the


network cable from the back of your computer, and plug it into the port
labeled = 
 ,  , or   on the back of your router.
iÊ =      =  wÊPlug one end of a
network cable (included with your router) into your modem, and plug the other end
of the network cable into the Internet, WÿN, or WLÿN port on your wireless
router.
iÊ =      " Unplug the network cable
connected to the Internet, WÿN, or WLÿN port from your current router, and plug
this end of the cable into the Internet, WÿN, or WLÿN port on your wireless router.
Then, unplug any other network cables, and plug them into the available ports on
your wireless router. You no longer need your original router, because your new
wireless router replaces it.

Ê
Next, plug in and turn on your cable or D^L modem. Wait a few minutes to give it
time to connect to the Internet, and then plug in and turn on your wireless router. ÿfter
a minute, the Internet, WÿN, or WLÿN light on your wireless router should light up,
indicating that it has successfully connected to your modem.
Ê
! Configure your wireless router

Ê
Using the network cable that came with your wireless router, you should temporarily
connect your computer to one of the open network ports on your wireless router (any
port that isn't labeled = 
 ,  , or  ). If you need to, turn your computer
on. It should automatically connect to your router.
Next, open Internet Explorer and type in the URL or address to configure your router.
On the router configuration page, you might be prompted for a password. The address
and password you use varies depending on what type of router you have, so refer to
the instructions included with your router or on the manufacturer¶s website.
Gor quick reference, this table shows the default addresses, user names, and passwords
for some common router manufacturers. If the address is not listed here, you can read
the documentation that came with your router or go to the manufacturer's webpage to
find it. There may be multiple website addresses you can use.
  ÿ  ¢    

3Com http://192.168.1.1 admin admin

D-Link http://192.168.0.1 admin admin

Linksys http://192.168.1.1 admin admin

Microsoft Broadband http://192.168.2.1 admin admin

Netgear http://192.168.0.1 admin password

ÿctiontec http://192.168.0.1 username password

Internet Explorer shows your router's configuration page, along with the modem IP
address and other information. Most of the default settings should be fine, but you
need to configure three things:
iÊ ‰     ! #!  ^^  ÊThis name identifies your network,
and it appears in a list of available wireless networks. You should change the
default ^^ID that your I^P provided and give your networks a unique name that
none of your neighbors are using. This helps you identify your network, and it can
help keep your wireless network secure by preventing it from overlapping with
other wireless networks that might be using the default ^^ID.
iÊ $G  ÿ % ÿ ÿ #      
  !& It¶s important to help secure your wireless network by setting up a network
security key, which turns on encryption. With encryption, people can't connect to
your network without the security key, and all information sent across your network
is encrypted so that only computers with the key to decrypt the information can read
it. This can help prevent attempts to access your network and files without your
permission. Wi Gi Protected ÿccess (WPÿ or WPÿ2) is the recommended wireless
network encryption method. Wireless encryption (WEP) is not as secure. Windows
7, Windows Vista ^ervice Pack 2, and Windows XP ^ervice Pack 3 support WPÿ2.

When you set up most routers (stand-alone routers and modem routers), you are
asked to provide a pass phrase that the router uses to generate several keys. Make
sure that your pass phrase is unique and long (you don't need to memorize it). ^ome
routers and modem routers now come with a function called ù 

  (or ù) that automatically issues you a key when you press a button on the
router.

Be sure to keep a hard copy and a digital copy of your network security key and
pass phrase, in case you lose or misplace them. You can recover a lost network key
or reset it on your router, but these are complicated processes that are different for
every router and they sometimes entail setting up your network again.
iÊ ‰  #      !&ÊÊJust like any
other password, it should not be a word that you can find in the dictionary, and it
should be a combination of letters, numbers, and symbols. Be sure to save a hard
copy and a digital copy of this password, too, because you'll need it if you ever have
to change your router's settings.
The exact steps you follow to configure these settings will vary depending on the type
of router you have. ÿfter each configuration setting, be sure to click  
 , ÿ, or  to save your changes.
Windows XP automatically scans for available wireless networks. If one is present,
Windows XP will try to connect to it. ^ometimes your computer may not recognize
the connection. If this occurs, you can manually configure the wireless network.

1.Ê Click , click , type &, and then click !.
2.Ê In the Network Connections window, right-click the     !
  icon, and then click   .
3.Ê In the Wireless Network Connection Properties, click the   
 ! tab. If you do not see a Wireless Networks tab, your network adapter
may not support the Wireless Zero Configuration service. Make sure the
Wireless Zero Configuration service is started and set to automatic.

Ê
Ê Ê

4.Ê Under the      !, click the ÿ button.


5.Ê In the  ! %= box, type the name of the access point and select
the appropriate settings according to your network requirements. This setting
will match the configuration of your access point or router. If you do not have a
wireless router or access point, then set the wireless mode to ÿ$ and use
the same network name that matches the other computers.
6.Ê Click !
7.Ê Under ÿ'   !, click the (      ! button.
8.Ê In the     !  dialog box, choose a network by
clicking on its name, and then click  . ^ome networks may appear in
the list as secured or unsecured. If the network is security-enabled, the Wireless
Network Connection will show a gold lock. You¶ll need a key (or a secured
password or number) to connect to the wireless network.

!!   &


 
   
=  means protecting information and information systems from
unauthorized access, use, disclosure, disruption, modification, perusal, inspection,
recording or destruction.
The terms information security, computer security and information assurance are
frequently incorrectly used interchangeably. These fields are interrelated often and
share the common goals of protecting the confidentiality, integrity and availability of
information; however, there are some subtle differences between them.
These differences lie primarily in the approach to the subject, the methodologies used,
and the areas of concentration. Information security is concerned with the
confidentiality, integrity and availability of data regardless of the form the data may
take: electronic, print, or other forms.
Computer security can focus on ensuring the availability and correct operation of
a computer system without concern for the information stored or processed by the
computer.
Ê

Confidentiality
Confidentiality is the term used to prevent the disclosure of information to
unauthorized individuals or systems. Gor example, a credit card transaction on the
Internet requires the credit card number to be transmitted from the buyer to the
merchant and from the merchant to a transaction processing network. The system
attempts to enforce confidentiality by encrypting the card number during
transmission, by limiting the places where it might appear (in databases, log files,
backups, printed receipts, and so on), and by restricting access to the places where it is
stored. If an unauthorized party obtains the card number in any way, a breach of
confidentiality has occurred.
Breaches of confidentiality take many forms. Permitting someone to look over your
shoulder at your computer screen while you have confidential data displayed on it
could be a breach of confidentiality. If a laptop computer containing sensitive
information about a company's employees is stolen or sold, it could result in a breach
of confidentiality. Giving out confidential information over the telephone is a breach
of confidentiality if the caller is not authorized to have the information.
Confidentiality is necessary (but not sufficient) for maintaining the privacy of the
people whose personal information a system holds.
Ê
ntegrity
In information security, integrity means that data cannot be modified undetectably.
This is not the same thing as referential integrity in databases, although it can be
viewed as a special case of Consistency as understood in the classic ÿCID model
of transaction processing. Integrity is violated when a message is actively modified in
transit. Information security systems typically provide message integrity in addition to
data confidentiality.
ÿ ailability
Gor any information system to serve its purpose, the information must
be available when it is needed. This means that the computing systems used to store
and process the information, the security controls used to protect it, and the
communication channels used to access it must be functioning correctly. High
availability systems aim to remain available at all times, preventing service
disruptions due to power outages, hardware failures, and system upgrades. Ensuring
availability also involves preventing denial-of-service attacks.
ÿthenticity
In computing, e-Business and information security it is necessary to ensure that the
data, transactions, communications or documents (electronic or physical) are genuine.
It is also important for authenticity to validate that both parties involved are who they
claim they are.
Non-repdiation
In law, non-repudiation implies one's intention to fulfill their obligations to a contract.
It also implies that one party of a transaction cannot deny having received a
transaction nor can the other party deny having sent a transaction.
Electronic commerce uses technology such as digital signatures and encryption to
establish authenticity and non-repudiation.

!jÊ'

 




( 
)

)
 

Ê

Devices. The
 permission, which grants the ability to read a file. When set for
a directory, this permission grants the ability to read the   of files in the
directory (but  to find out any further information about them such as contents,
file type, size, ownership, permissions, etc.)

šÊ The
 permission, which grants the ability to modify a file. When set for a
directory, this permission grants the ability to modify entries in the directory. This
includes creating files, deleting files, and renaming files.
šÊ The   permission, which grants the ability to execute a file. This permission
must be set for executable binaries (for example, a compiled C++ program) or
shell scripts (for example, a Perl program) in order to allow the operating system
to run them. When set for a directory, this permission grants the ability to traverse
its tree in order to access files or subdirectories, but not see the content of files
inside the directory (unless
 is set).
Ê
Figre ÿ

Example folder hierarchy

G ) shows that the permissions for Test1 are set to Gull Control.
Figre B

Fll access on Test1

However, one of the files in Test3 has permissions set to deny access (G ).
Figre C

enied access all arond

To change the settings for that one file, we could just right-click the file, click the
^ecurity tab, and edit the permissions as we did in the previous How do I« blog post.
But what if we had hundreds of files in our example folder hierarchy? That would be a
lot of clicking.
To change the access settings in Windows Vista for the current folder and all of the
folders and files that flow from it in the hierarchy, you follow the same procedure,
only with a twist or two in the guise of check boxes. Right-click the folder (Test1) and
click the ^ecurity tab and then click the ÿdvanced button to get to the screen shown
in G .
Vendor Hotspot
M
   
    „

Read the Documenter blog now


Learn More »

Figre 

ÿd anced ^ecrity ^ettings for Test1

We are going to change the settings for the entire system, so click on the ^Y^TEM
entry and click edit to get to the screen shown in G 
.
Figre E

More ad anced settings for Test1

This is where we designate that the change in permissions we are about to make
should ³replace the existing inheritable permissions on all descendants with
inheritable permissions from this object.´ We do this by clicking the check box and
then clicking the Edit button to get to the screen shown in G G.
Figre F

Permission settings for Test1

ÿs you can see, the Test1 permissions are set to Gull Control allowed; we just have to
pass those settings down the line. When you click OK on the screen in Gigure G and
then Gigure E, you will get to the security dialog box shown in G *. Click Yes
and then OK for the rest of the settings boxes.
Figre G

Replacing permissions, are yo sre?

Now, when we drill down the hierarchy to reach Test3, right-click the file we looked
at in Gigure C, and click Properties, you see that the permissions are set to allow Gull
Control. (G M)

Fll Control is regained


Ê

Anda mungkin juga menyukai