Experiment No 13
Experiment No 13
Experiment No 13
Browser tips (security, multiple logged user login access, refresh, popup
etc.
User account
· There are a lot of uses of the word “user” and “account” in this book,
and particularly in this chapter. Here’s a summary of the uses of those
terms:
· An Administrator account
· Go to Start > Settings > Update & security > Recovery and click
Restart now below Advanced start-up.
· Go to Start > Settings > Update & security > Recovery and click Get
started below Reset this PC.
· On the next screen, click Keep my files and follow the on-screen
instructions to reset Windows 10. You’ll see a list of apps that will be
removed and be asked to confirm your choice before going any further.
· Using Windows Update is the safest way to get driver updates because
the packages available through this channel have been verified and
signed by Microsoft.
· Open Settings.
· The only caveat using this process is that it can take a long time until
manufacturers make available a new update using this channel unless
it's Microsoft hardware.
· You can also update a particular driver for a device, such as a printer,
Wi-Fi adapter, sound card, monitor, and component using Device
Manager.
· Downloading drivers from Microsoft
· Open Start.
· Search for Device Manager, click the top result to open the
experience.
· Expand the category with the hardware you want to update.
· 7 Browse and select the main folder with the content you have
extracted earlier.
· 8 Click OK.
· After completing the steps, the newer version of the driver will install
on your computer for the device to address issues, introduce new
functionalities, or add support for your version of Windows 10.
· Usually, you would use this method when updating drivers for older
hardware or printers.
· Component Services
· Computer Management
· Disk Cleanup
· Event Viewer
· iSCSI Initiator
· Performance Monitor
· Print Management
· Resource Monitor
· Services
· System Configuration
· System Information
· Task Scheduler
· Shut Down: This is the power-off state most of us are familiar with.
When you shut down your PC, all your open programs close and the PC
shuts down your operating system. A PC that’s shut down uses almost
no power. However, when you want to use your PC again, you’ll have to
turn it on and go through the typical boot-up process, waiting for your
hardware to initialize and startup programs to load. Depending on your
system, this can take anywhere from a few seconds to a few minutes.
· Sleep: In sleep mode, the PC enters a low-power state. The PC’s state
is kept in memory, but other parts of the PC are shut down and won’t
use any power. When you turn on the PC, it snaps back to life quickly—
you won’t have to wait for it to boot up. Everything will be right where
you left of, including running apps and open documents.
· Hybrid: Hybrid mode is really intended for desktop PCs and should be
disabled by default for most laptops. Still, you might come across the
option at some point. Hybrid is like a combination of sleep and
hibernate. Like hibernate, it saves your memory state to hard disk. Like
sleep, it also keeps a trickle of power going to memory so that you can
wake the computer almost instantly. The idea is that you can essentially
put your PC into a sleep mode, but still be protected in case your PC
loses power while sleeping.
· The reason laptops don’t bother with hybrid mode is really just
because they have a battery. If you put your computer to sleep and the
battery becomes critically low, the PC will automatically go into
hibernate mode to save your state.
· Once you’ve made your choice, you can control what happens when
you press the power button on your computer or close the lid on your
laptop.
· In the “Power Options” window, click the “Choose what power buttons
do” link on the left-hand side.
· In the “System Settings” window, you can choose what pressing the
power button, sleep button, or closing the lid does. And you can set
those options differently for when the PC is plugged in or running on
battery.
· You also can modify your computer’s power-saving options to control
what it does automatically when you’ve left it idle.
· http:// In short, http means the hypertext transfer protocol and the file
is a web page and every time you don’t needed to type the http, it is
automatically inserted by the browser.
· Internet Explorer:
· Mozilla Firefox:
· Google Chrome:
· Many computer users are not aware of the click on the web links.
· Browser Cookies:
· A cookie is used to identify a website user. A cookie is a small piece of
text sent to a browser by a website accessed through the browser. It
contains information about that visit like remembering the website
visited preferred language and other settings. The browser stores this
data and uses it in accessing the features of the website or the next
time the same site is visited to make the access more personalized. If a
website uses cookies for authentication, then an attacker may be able
to obtain unauthorized access to that site by obtaining the cookie.
· Pop-ups:
Not all pop-ups are bad some web sites use pop-up windows for
particular tasks. You might have to view the window in order to
complete that task.
· Scripts:
The same script can be used for inclusion of malicious code which takes
control of the web browser there in by allowing to access the files of the
system. It may cause damage to the system by accessing the
vulnerabilities in the browser.
· Plug-ins:
· Plug ins is the in-built applications for use in the web browser and
Netscape web browser had developed the NPAPI standard for
developing plug-ins. Later this standard is used by many web browsers.
Plug-ins are same to ActiveX controls but cannot be executed outside of
a web browser. Adobe Flash is an example of an application that is
available as a plug-in inside the web browser.
· Security zone
.Security zone also contains other features like adding address of web
sites under restricted sites this feature is available in Internet explorer
and block the untrusted sites or attack sites this feature is available in
Firefox, these vary with different web browser.
· Trusted site
· Cookies
Disable entirely, or only enable if you visit a trusted site that requires
them
· Pop-up windows
· JavaScript
Block from running automatically, or have the browser ask you each
time a website wants to use the camera / microphone
· Plugins / add-ons
Block from running automatically, or have the browser ask you each
time a website wants to install or run a plugin/add-on
· Tips :
· Always use the secured web browser to avoid the risks .Using secure
browser we can gain access the information and resources that are
available on the Internet and can have safe browsing over Internet.
· Install a personal firewall along with anti-virus software with the latest
virus signatures that can detect malware such as key loggers.
· Turn off all JavaScript or ActiveX support in your web browser before
you visit any unknown websites.
· Most vendors give you the option to download their browsers directly
from their websites. Make sure to verify the authenticity of the site
before downloading any files.