Free Essay

Faults Within Windows

In: Computers and Technology

Submitted By d3bodagr3at
Words 984
Pages 4
Faults within Windows OS
POS355
August 24, 2015
Dr. Boyd

Faults within Windows OS
The security within an operating system is vital to the overall operation of your operating system, and in this case even more important to Windows OS because of how it is used across various platforms. The security within Windows is provided to protect your operating system from any unwanted visitors whether it be accidental or not (Stallings, 2015), but not all security is perfect. Sometimes security contains flaws and some flaws are bigger than others and some flaws can destroy your system from the inside out. These faults can be patched and some are so minute that they can be resolved with something as little as switching the settings. Switching the settings sounds like something that would never be a fault, but what happens when the fault that was created was man made. The fault that lies within Windows was a nuisance but the real issued lied with how many users decided to handle that nuisance.
There are three different types of hackers trying to gain access to your system. These three hackers are called the Masquerader, the Misfeasor and the clandestine user. A Masquerader is someone who is not authorized but gains access and infiltrates your systems access controls to exploit your account ("Windows 7 Known Security Flaws", 2009). A Misfeasor is a person who has been granted access to data and resources but misuses and takes advantage of the information he has received ("Windows 7 Known Security Flaws", 2009). A clandestine user seizes control of a system and uses the control to gain access to controls ("Windows 7 Known Security Flaws", 2009). These intruders are the reason computers need security. These users create malware to steal information from you. This is made possible when your computer lacks the security needed to ensure you are notified of any outside interference. Some of these issues are created by the user and some are a computer related problem, but within Windows 7 the user creates the problem.
One of the biggest flaws within the Windows 7 system was its security pop ups. This may sound like a very small problem because it is, but what happens as a result of this fault could make the problem a very huge problem. The end users had endless pop ups that were meant to be designed to help but ultimately did more harm than good. This fault was created as a form of protection but became more of a nuisance. The security system within Windows 7 was created to inform users of someone trying to gain unauthorized access to your system, but it managed to inform users of everything no matter the severity of the issue ("Windows 7 Known Security Flaws", 2009)..
This created a spiral effect and made it impossible to determine if the threat was real or not. The notification occurred when you downloaded a new program that needed connection and when you actually had an intruder. This would leave users baffled and not knowing what was real and what was fake. This resulted in many users switching the settings from high notification security to medium notification security. The problem that occurred after switching your settings allowed malicious software bugs to go about their business within your operating system. The good thing is all the notifications are gone, but the bad thing is you just made the problem worse and allowed entrance to your operating system because it was impossible to detect when your computer was being compromised. The malicious bit of code operating within the medium setting could be used to turn off the user warning all together and allow a piece of software to gain administrative rights without any type of system notification. Windows then created a new operating system called Windows Vista that allowed the user to completely remove any and all security notifications like that was the best answer to their problem.
The true solution to this problem was very easy and for the sake of your information was the smartest route. Keep your security settings on high or do a regular check up on your computer to ensure that your system has not been compromised. A lot of this issue was man made because people were tired of being bombarded with excessive notifications, but the solution to their problem was simple. If the user reframes from using ill-advised sites and are doing a periodic virus scan medium settings are fine. Most security systems are not meant to take on the duty of being your only form of security, the security system is provided to help the user with things that may be out of his control. At no point should a user rely solely on the use of an operating systems security, but in the situation they do there are plenty of resources available to research and weigh their pros and cons.
Security faults exist and some are user encouraged. These faults are created because users believe the little adjustments they make to comfort them mean nothing. In reality these little minor issues sometimes become issues that are bigger and that’s when making sure you are notified if your compromised plays a huge role. Windows fault that is more of nuisance then a permanent problem, but the incorrect adjustments made within the settings create a landslide of a ripple effect with catastrophic results. Enjoy Windows OS for what it is and monitor it like the information you have on your computer is valuable. You never know when someone is aiming for your computer, so if you’re going to change settings always ensure that your consistently scan for viruses.

References
Windows 7 Known Security Flaws. (2009). Retrieved from http://www.aspfree.com/c/a/Windows-Security/Windows-7-Known-Security-Flaws/
Stallings, W. (2015). Operating Systems: Internals and Design Principles (8th ed.). Prentice Hall. (Stallings, 2015)…...

Similar Documents

Premium Essay

Unix vs Windows Critique

...Disadvantages of UNIX® or Linux® Versus Microsoft® Windows Server® Virtual Company: Riordan Kenneth Fleming, Eddy Garcia, H. RaShonda Harris, Lupita Sebastian and John Ward University of Phoenix – POS 420 Introduction to UNIX September 19, 2012 Introduction History Riordan Manufacturing is a global plastics manufacturer who employs over 500 people with projected annual earnings of $46 million. Riordan's major clientele include automotive parts manufacturers, aircraft manufacturers, the Department of Defense, beverage makers and bottlers, and appliance manufacturers (Apollo Group, Inc., 2005). With manufacturing plants in Albany, Georgia, Pontiac, Michigan, and Hangzhou, China, Riordan’s e-business plays a vital role in continued growth. Riordan’s Internet site states, “Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. Purpose The purpose of this paper is to discuss the differences between UNIX/Linux versus Microsoft Windows. Our paper will discuss facts that cover security, administrative, networking, performance, programmability. Security Technical One of the key differences between the Unix approach to system security and the MS Windows approach is that significant security characteristics of Unix systems are a consequence of good architectural design. Modularity within the system is another example of architectural security in UNIX, but lacking in MS Windows. These differences in the design and relative......

Words: 2022 - Pages: 9

Free Essay

Fault Torroance

...代表後面那個input發生stuck-at-0,而且前面的input無stuck-at-1。 機率為 0.25(P0*(1-P1)) c. (1,0)->0 機率同b d. (1,1)->0 代表兩者皆stuck-at-0,機率為 0.25(P0^2) 總體機率為四者相加,整理後得機率為 0.25 (P1^2 + P0^2 – 2P1P0 + 2P1 + 2P0) 4. a. Fault- is a physical defect, imperfection or flaw within the hardware or software component. Error- is the manifestation of a fault. Specifically, it is a deviation from accuracy or correctness. Failure- is the deviation from expected actions or services. Fault -> Error -> Failure It is failure that really annoying users. b. permanent fault是永久錯誤,一但出現就不會因重複而消失。例如RAM燒壞,重開機是沒用的。 intermittent fault 是偶發性錯誤,有時正常有時會發生錯誤。例如接觸不良。 transient fault 是暫態錯誤,不需理會就會回復穩定與正常狀態,是相對短暫的錯誤。例如剛按下電風扇時轉速過慢。 c. Reliability is the probability to get the right outcome, availability is the probability the service/function can be accessed, and performability is the probability the service do the right thing due to the user’s thought. d. True. Maybe the mistake is as follow: number >> 3 //shall be 2, the programmer mistype it. And the number is 110011002 originally, it should be 000110012 but the outcome is 001100112, three bits are wrong. 5. a. Stuck-at fault model can’t model bridging fault cause when the fault happened, it might not stuck at some fix value. Instead, it might float or follow the value of another line. b. It can work because we can add some checkpoint and error-correcting circuit. For example, add redundancy circuit......

Words: 423 - Pages: 2

Free Essay

Fault Tolerance Disaster Recovery

...Fault Tolerance Disaster Recovery Kevin Bowman POS/421 Jeffery Comrie University of Phoenix April 15, 2013 In the world of Information Systems and network administration, there comes a time when system administrators and developers have to take into consideration the possibility of critical system failure which could lead to complete data loss. When it comes to technology and equipment the question is never if it fails rather when it fails. “Regardless of how bulletproof the design is, how fault-tolerant the system, or how well trained the operators and technicians, system failures are still possible.”(Witt, 2009) In the event the system does fail either by, disk failures, administrative errors, natural disasters, or unauthorized changes to data, a recovery plan must be in place to minimize downtime. In the scenario as described for Kudler Fine Foods, there would be a backup drive at each location, where daily backups of data will take place and those backups will be stored on a tape drive that way information is not lost at any time and stored offsite. The files would be stored off site in the event there is a natural disaster or fire or some other catastrophic event to take place that actually destroys the servers and hard drives, the tape drives being stored offsite preserves the data once a new server is in place. Data redundancy is a key aspect to recovering from such system failures. In the case of restoring Active Directory Directory Services in the......

Words: 486 - Pages: 2

Free Essay

Windows

...to test because an isolated lab environment usually can emulate many of the factors that can affect the performance of a directory service. | | Definition FALSE | | | Term Active Directory was first introduced in which operating system? | | Definition Windows 2000 Server | | | Term Where do users log in when joining an Active Directory domain? | | Definition domain | | | Term There are two basic classes of objects in an Active Directory domain. Which of the following is an object? | | Definition Leaf | | | Term Which of the following is a main group type found in Active Directory? | | Definition security | | | Term Which group is used most often when designing an Active Directory infrastructure? | | Definition Security | | | Term Which group is used for nonsecurity-related functions, such as sending email messages to a collection of users? | | Definition distribution | | | Term DNS naming limitations call for a maximum of how many characters per domain name? | | Definition 63 | | | Term What type of compatibility are functional levels designed to provide in Active Directory installations running domain controllers with various versions of the Windows Server operating system? | | Definition backward | | | Term What is the name of the communications protocol called for by the original X.500 standard? | | Definition Directory Access Protocol | | | Term The Read-Only Domain Controller (RODC)......

Words: 1908 - Pages: 8

Free Essay

Fault Essay

...Fault is defined in terms of responsibility and culpability or blame for something wrong. Responsibility is defined in terms of ability to take rational decisions and rational is defined in terms of reasonableness. Fault is generally an essential requirement of liability in the law of tort. Liability in negligence requires proof of a breach of duty. A breach of duty arises when the defendant fails to act or not act as “the reasonable man” would have. In Bolton v Stone the defendants acted as a reasonable man would have, by taking action in creating a higher fence around the cricket ground to minimise the risk of people outside the ground being injured by the cricket balls. However, in Paris v Stephney borough council, the court held that in light of potential serious consequences posed by welding to an employee with only one eye, the employer should have taken reasonable action in providing safety goggles. Liability under the occupiers liability act 1957 also required proof of fault. Fault is also relevant to the general defence of a contributory negligence under the law reform act 1945. S.1(1) damages are reduced according to the claimants responsibility for the damage. In Froom v Butcher, the claimant’s damages were reduced by 25% due to his failure to wear a seatbelt. There are however areas of tort in which there is no need to provide fault. For example, nuisance is a strict liability tort. The defendant cannot claim as a defence that he took reasonable care to avoid......

Words: 926 - Pages: 4

Premium Essay

Within

...Within-Establishment Wage Inequality and Satisfaction Many authors have analyzed about the determinants of individuals subjective assessment of the utility which gained from their work of environment. Income comparison is important in determining workers job pay satisfaction. The job satisfaction is not only determined by wages only but also by relatives wages. There are two main reason, the first one is the workers preferences may depend directly on their salary relative to their own reference groups. So, the workers derive the well being from their social status and this model will come out a negative relation between well being and the inequality. Secondly indicates the workers may use others wages to help in their own future wage. The more workers earn, then the workers will more happy or satisfaction to their wages. So this model predict workers may appreciate inequality if the signals future potential career improvement. Model the individual utility from pay as a function of a workers own wage and the earnings of all other workers within same establishment, using employee data, and assume incomplete information about others wages and control establishment unobserved heterogeneity. The positive relationship exist between well being and inequality. Review the literature of the models of relative concerns where it will vary positively with the absolute wage level and negatively with the number of hours worked by neoclassical. Next will using......

Words: 333 - Pages: 2

Free Essay

Windows

...INTRUCCIONES: En esta versión de Windows. No debería más que necesitar el serial si haces los pasos correctamente. Sin embargo se agrega el generador de seriales que debes correr en caso de que necesites generar más seriales. 1.- Lo primero que debes saber es que no puedes utilizar estas aplicaciones de adobe si estas conectado al internet. Cosa que resulta bastante fastidioso si es tu máquina de trabajo principal. Así que debemos aislar el ADOBE del internet virtualmente. Para ello vamos a modificar el archivo HOST del sistema, el cual resuelve las direcciones IP hacia el internet. - Abrimos el Notepad, nos vamos al menú y buscamos la opción “Abrir”. - Copia y pega esta dirección dentro del campo de dirección de archivo dependiendo de tu Windows: Windows 95/98/Me c:\windows\hosts Windows NT/2000/XP Pro c:\winnt\system32\drivers\etc\hosts Windows XP c:\windows\system32\drivers\etc\hosts Windows Vista c:\windows\system32\drivers\etc\hosts (Para editar el host en vista debes abrir el Notepad con privilegios de administrador. Para hacer eso debes presionar el botón derecho sobre el Notepad y seleccionar abrir como administrador). Si no tienes el sistema instalado......

Words: 457 - Pages: 2

Free Essay

Window

...would you approach your classmate about your |I would gently point out the areas that need to be sourced. This way you are | |concerns? |not accusing them of plagiarism, but still letting them know that they need | | |to credit their sources | |What advice could you offer? |Follow the rules and make time to do your work don’t wait last minutes to get| | |your work done. Whenever you consult a source, you should make sure you | | |understand the context, both of the ideas within a source and of the source | | |itself. You should also be careful to consider the context in which a source | | |was written. | |Which tools would you recommend to help that |While it's easy enough to keep a stack of books or journal articles on your | |classmate avoid plagiarism? |desk where you can easily refer back to them, it's just as important to keep | | |track of electronic sources. When you save a PDF of a journal article, make | | ......

Words: 355 - Pages: 2

Premium Essay

The Fault

...John Green The Fault in Our Stars BACKGROUND INFO BACKGROUND AUTHOR BIO Full Name: John Michael Green Date of Birth: August 24th, 1977 Place of Birth: Indianapolis, Indiana Brief Life Story: John Green was born in Indianapolis, Indiana. Immediately after his birth, Green’s parents moved to Orlando, Florida. During his youth, he attended Lake Highland Preparatory School, a boarding school near Birmingham, Alabama. Later, he attended Kenyon College where he graduated in 2000 with a double major in English and Religious Studies. After graduating from Kenyon, Green worked in a children’s hospital while he enrolled in divinity school with the intention of becoming an Episcopal Priest. He never attended divinity school, however, because his experience working in the hospital with children suffering from life-threatening illnesses inspired him to become a writer. He lived in Chicago for several years, writing book reviews, writing for radio, and working in publishing. During this time he wrote his first novel, Looking for Alaska (2005) to immediate, and increasing, success. He followed that first novel with An Abundance of Katherines (2006), Paper Towns (2008), and The Fault in Our Stars (2012), which reached #1 on the New York Times bestseller list for children. Green currently lives in Indianapolis with his wife and two kids, where he continues to write, produce videos, and speak publicly about an array of topics. chronicle his artistic journey in making the film adaption of his......

Words: 40116 - Pages: 161

Free Essay

At Fault

...Professor Marc McGrath American Literature 221 31 August 2014 "At Fault" by Kate Chopin is a great American novel and wonderful piece of American Literature, the novel takes place after the civil war and is set in the state of Louisiana. Like most would think, back in those days there were a lot of plantations and farming was big back then. Like in the novel, there is a plantation and there were some four thousands acres it rested on. There are many great characters in the novel by Kate Chopin, Thérèse Lafirme, owner of the Place-du-Bois plantation, David Hosmer, manager of the sawmill on the Place-du-Bois plantation, Fanny Larimore, Lorenzo Worthington, and Jack Dawson, just to name a few. With so many characters in the novel it wasn't easy to chose just one that truly had that uniquely American character. The character I did end up choosing from the novel by Kate Chopin in "At Fault" was the character of Thérèse Lafirme, owner of the Place-du-Bois plantation. If you begin to just read the very first paragraph from the novel, you see that Thérèse Lafirme has suffered a tragic event, the loss of her husband, Jérôme Lafirme, and the passing of him left her in possession and charge of the large plantation. Not the death of her husband but the fact that her and her husband and had such a large plantation was the American dream back then, and this showed that she was American. Even though Thérèse Lafirme was a Creole lady which meant she was in this case a woman that......

Words: 1103 - Pages: 5

Premium Essay

Windows Net

...Windows .NET Windows .NET Server is the newest network operating system offered by Microsoft. There are many new features that will allow for more productivity, compatibility, and efficiency. This new product from Microsoft boasts thousands of small improvements. Microsoft also claims that Windows. NET Server can function up to 50 percent faster than Windows 2000 server on the same hardware. What can Windows Server do for businesses network environments? Four different versions of the operating system are going to be made available. These include Windows .NET Web Server, Windows .NET Server, Windows .NET Enterprise Server, and Windows .NET Datacenter Server. The new features are limitless and could bring new respect to Microsoft’s attempt at creating a very stable network operating system. The four different versions of Windows .NET server that will be debuting are Windows .NET Web Server, Windows .NET Server, Windows .NET Enterprise Server, and Windows .NET Datacenter Server. They all offer new features that are ideal for setting up a smooth running network. The Windows 2000 family cannot compare to the new .NET family. Windows .NET Web Server is a completely new version never offered by Microsoft before. (“FAQ”, 2002) Windows .NET Server is a new version of Windows 2000 Server that will be used for services such as being a file server, or a print server. Windows .NET Enterprise Server is an upgraded version of Windows 2000 Advanced Server. Its purpose is to be a high-end......

Words: 311 - Pages: 2

Premium Essay

Window

...THE COMMUNICATION OF WINDOW DISPLAY - H&M - UNIQLO YAN14434663 CHIH LING, YANG ABSTRACT This research presents a comparison of the window displays in two different high-street fashion retail brands. H&M is one of the best-known western fashion retailers, while UNIQLO is a fashion retail brand from Asia which has successfully accessed the western market. This research will focus on these two brands’ different visual merchandise strategies and their window layouts during different periods. The results show how these two fashion brands from different cultural backgrounds convey their message to customers. INTRODUCTION The designer creates the product, while visual merchandising gives the product new life. In the sales terminal, window displays not only deliver the brand culture to the customer, but they are also responsible for increasing sales for the company and attracting potential customers. In an aesthetic point of view on display throughout the product content, value and performance, but also presents the brand itself. The purpose of visual merchandising is to promote the store image—to let people know what the store is, where it stands on fashion trends, what one can expect from it, to whom it appeals, its price range, and the caliber of its merchandise and merchandising (Martin M. Pegler 2012, p.3). Nowadays, the high-street fashion market has become more competitive, and every fashion brand has its own brand identity, so it is important......

Words: 3973 - Pages: 16

Free Essay

Windows

...David Langham NT1110 Lab 1-1 Upgrading for the Best Windows 8 has not been good for most windows users. You as a user are to like the operating system that is setup with the computer you use the most. When choosing an upgrade to do first, think about what you can afford and what you will need the quickest. With each operating systems comes a different upgrade for each one. Windows, Linux, and MAC OX is always sending new updates just to compete with the other operating systems. When want to upgrade, you must first know what your computer is running currently. My computer is running windows 8.1, if I wanted to upgrade, I would go to windows 8.1 PRO. You should also research what specifications your computer must have to run that operating system. You may have to upgrade your RAM in order to keep the operating system running correctly. With wanting to upgrade your RAM, know what you have now. My operating system requires .10 GB of RAMS of background space. I have 4.00 GB installed on my laptop. If I wanted to upgrade my RAM, I would look for the highest amount of GB allowed in my computer. I would upgrade to 16 GB of RAM just to give me the fastest speed possible on my computer. With speed comes great power. With upgrading RAM, It would be highly suggested to upgrade the processor. Intel is one of the most command processor in the computer field. I currently am using an Intel Pentium. When wanting to installed a bigger processor to process quicker. I would like...

Words: 483 - Pages: 2

Free Essay

Windows

...Your familiar Windows, taken to the next level. Your advanced guide to Windows 8.1 For Windows 8.1 Update The familiar, made better. With the new Windows, you have everything you need to work efficiently. Your familiar desktop is better than ever with advanced functionalities, like the new customizable taskbar and streamlined file management. Internet Explorer 11 gives you instant and fluid access to the world. And best of all, you can use all these features feeling confident that your important data is secure. Whether you are collaborating on a large project, preparing for an upcoming conference, or traveling for work, you can use touch, mouse, and keyboard together—seamlessly—to accomplish your every task. With the advanced features of Windows 8.1, you can get the most out of your device. Windows works the way you want it to. Dive deeper into the desktop. From the Quick Link menu, you can accomplish traditional tasks (like signing out of the device), or you can tackle more advanced tasks in Task Manager and Control Panel. You can even access File Explorer to manage your files and folders with ease. To access the Quick Link menu: Press and hold the Start button. Right-click the Start button. Press + X. View the drivers installed on your device, update drivers, check to see if hardware is working properly, and modify hardware settings. View apps and programs currently running on your device. Adjust your device’s system and security settings, network preferences,......

Words: 2847 - Pages: 12

Free Essay

Window

...Windows Enabler Overview: Windows Enabler is a program that runs on Microsoft Windows 95/98/Me/NT4.0/2000. It allows the user to enable disabled windows and controls such as buttons and tick boxes and choose menu options that would normally be disabled. This is obviously a very dangerous practice if used recklessly but having said that, you’d be surprised at how often it comes in handy. Windows Enabler has a very simple user interface; it appears as an icon in the system tray and can be turned on and off simply by clicking on it. Windows enabler may be freely distributed as long as the entire package (or a superset) is distributed unaltered. Installing: Windows Enabler is a very simple utility and does not ship with an install program. The installation process is simple; just copy the two files (“Windows Enabler.exe” and “EnablerDLL.dll”) somewhere on your system and run “Windows Enabler.exe” to run the program. I normally place a shortcut to “Windows Enabler.exe” in my “Startup” program group so Windows Enabler is always available! Windows enabler does not make any registry entries or use any data files so uninstalling is accomplished by simply deleting its files (“Windows Enabler.exe” and “EnablerDLL.dll”). Using Windows Enabler: To run Windows Enabler execute the file “Windows Enabler.exe”; the simplest way to do this is to place a shortcut to it somewhere on your system such as the desktop, the start menu or the “Startup” program group. When Windows Enabler...

Words: 595 - Pages: 3