Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Experiment No 13

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

EXPERIMENT NO-13

AIM-User account and customization


Repair /Restore windows

Installing Hardware Drivers

Administrative tools, services, security and maintenance, remote access


etc.

Sleeping/Hibernating Instead of Shutting Down and many more.

Browser tips (security, multiple logged user login access, refresh, popup
etc.

User account

- Press WIN logo +R type CONTROL PANEL in Control panel Window


Select User Account

-Now Open manage Another account

Open CMD as Administrator now

· Add new User To Computer with Password.


· Understand user accounts and permissions

· Windows 10 requires at least one user account. You specify that


account when you’re completing the installation processes, or the first
time the computer starts after Windows 10 has been installed.
Windows 10 designates this first account as an administrator account
so that the account can be used to manage the computer. It isn’t
possible to sign on to the computer without a user account.

· There are a lot of uses of the word “user” and “account” in this book,
and particularly in this chapter. Here’s a summary of the uses of those
terms:

· A user is the person who is using the computer.

· A user account is an account that a person uses to sign in to a


computer.

· Each user account is either:

· A Microsoft account, which is any email address that has been


registered with the Microsoft account service

· A local account that exists only on a single computer and is not


associated with a specific email address

· You can use your Microsoft account to sign in to multiple computers,


websites, and services by using the same email address and password.
Signing in with your Microsoft account credentials allows you to share
settings and files among all your devices. Any device you sign in to with
this account can have access to the same settings and information.
Signing in with a local account places limits on the applications you can
purchase or download from the Store, and might limit your access to
OneDrive. Because almost any email account can also be set up to be a
Microsoft account, it’s a good idea to take advantage of the extra
benefits that allows.

· Every user account is also classified as either:

· An Administrator account

· A Standard User account

For Customize setting:-press windows logo and start typing UAC


· Repair /Restore windows

· If System Restore doesn't work Some serious Windows problems


can prevent you from rewinding to a Restore Point with System
Restore, but all is not lost. All you need to do is start Windows 10 in Safe
Mode. This barebones Windows mode only runs the essential parts of
Windows, which means any problematic apps, drivers or settings will be
disabled. System Restore will then usually be successful.

· 1. Open Advanced start-up

· Go to Start > Settings > Update & security > Recovery and click
Restart now below Advanced start-up.

· 2. Start System Restore in Safe Mode

· Windows will then restart and display a Choose an option menu.


Select Troubleshoot > Advanced options > System Restore and use
System Restore in the usual way.

· Recovering from more serious problems


· System Restore won’t always rescue your PC from very serious
problems, but Windows 10 still has extra trick up its sleeve. It can
restore Windows to a factory fresh state without affecting your
documents, although everything else (including apps) are removed.
Even so, you should make sure you have a back up of your important
files before using this option, just in case.

· Open Reset this PC

· Go to Start > Settings > Update & security > Recovery and click Get
started below Reset this PC.

· Reset Windows 10, but save your files

· On the next screen, click Keep my files and follow the on-screen
instructions to reset Windows 10. You’ll see a list of apps that will be
removed and be asked to confirm your choice before going any further.

· Reset this PC from Safe Mode

· As with System Restore, serious Windows 10 problems can prevent


Reset this PC from working, but you can also run it from Safe Mode to
bypass these. Follow Step 1 under If System Restore won’t work
above, but instead choose Troubleshoot > Reset this PC > Keep my
files under Step 2.

· Installing Hardware Drivers

· Using Windows Update is the safest way to get driver updates because
the packages available through this channel have been verified and
signed by Microsoft.

· To download and install drivers updates automatically, do the


following:

· Open Settings.

· Click on Update & Security.

· Click on Windows Update.

· Click the Check for updates button.

· If the hardware manufacturer publishes its updates through the


Windows Update service, and a new version becomes available, it'll
download and install automatically on your computer.

· The only caveat using this process is that it can take a long time until
manufacturers make available a new update using this channel unless
it's Microsoft hardware.

· How to update drivers using Device Manager

· You can also update a particular driver for a device, such as a printer,
Wi-Fi adapter, sound card, monitor, and component using Device
Manager.
· Downloading drivers from Microsoft

· To update a device driver using Device Manager, do the following:

· Open Start.

· Search for Device Manager, click the top result to open the
experience.
· Expand the category with the hardware you want to update.

· Right-click the device, and select Update Driver.

· Click the Search automatically for updated driver software option.


· Once you've completed the steps, if there's a newer version of the
driver available will download and install automatically. (This process is
similar to using Windows Update.)

· 6 Click the Browse button.

· 7 Browse and select the main folder with the content you have
extracted earlier.

· 8 Click OK.

· 9 Check the Include subfolders to allow the wizard to find the


correct .inf file with the instructions to update the driver.
· Click the Next button.

· After completing the steps, the newer version of the driver will install
on your computer for the device to address issues, introduce new
functionalities, or add support for your version of Windows 10.

· Usually, you would use this method when updating drivers for older
hardware or printers.

· Administrative tools, services, security and maintenance, remote


access
Administrative Tools is a folder in Control Panel that contains tools for
system administrators and advanced users.
· Below tools are used for all windows version for administrative
works, services any controlling overall activity of OS.

· Component Services

· Computer Management

· Defragment and Optimize Drives

· Disk Cleanup

· Event Viewer

· iSCSI Initiator

· Local Security Policy

· ODBC Data Sources

· Performance Monitor

· Print Management

· Resource Monitor

· Services

· System Configuration

· System Information

· Task Scheduler

· Windows Firewall with Advanced Security


· Windows Memory Diagnostic
· Sleeping/Hibernating Instead of Shutting Down

· Shut Down vs. Sleep vs. Hibernate

· Shut Down: This is the power-off state most of us are familiar with.
When you shut down your PC, all your open programs close and the PC
shuts down your operating system. A PC that’s shut down uses almost
no power. However, when you want to use your PC again, you’ll have to
turn it on and go through the typical boot-up process, waiting for your
hardware to initialize and startup programs to load. Depending on your
system, this can take anywhere from a few seconds to a few minutes.

· Sleep: In sleep mode, the PC enters a low-power state. The PC’s state
is kept in memory, but other parts of the PC are shut down and won’t
use any power. When you turn on the PC, it snaps back to life quickly—
you won’t have to wait for it to boot up. Everything will be right where
you left of, including running apps and open documents.

· Hibernate: Your PC saves its current state to your hard drive,


essentially dumping the contents of its memory to a file. When you
boot up the PC, it loads the previous state from your hard drive back to
memory. This allows you to save your computer’s state, including all
your open programs and data, and come back to it later. It takes longer
to resume from hibernate than sleep, but hibernate uses much less
power than sleep. A computer that’s hibernating uses about the same
amount of power as a computer that’s shut down.

· Hybrid: Hybrid mode is really intended for desktop PCs and should be
disabled by default for most laptops. Still, you might come across the
option at some point. Hybrid is like a combination of sleep and
hibernate. Like hibernate, it saves your memory state to hard disk. Like
sleep, it also keeps a trickle of power going to memory so that you can
wake the computer almost instantly. The idea is that you can essentially
put your PC into a sleep mode, but still be protected in case your PC
loses power while sleeping.

· The reason laptops don’t bother with hybrid mode is really just
because they have a battery. If you put your computer to sleep and the
battery becomes critically low, the PC will automatically go into
hibernate mode to save your state.

· Making Your Choice

· Once you’ve made your choice, you can control what happens when
you press the power button on your computer or close the lid on your
laptop.

· In Windows 7-10, hit Windows+R to open the Run box, type


“powercfg.cpl,” and then hit Enter.

· In the “Power Options” window, click the “Choose what power buttons
do” link on the left-hand side.

· In the “System Settings” window, you can choose what pressing the
power button, sleep button, or closing the lid does. And you can set
those options differently for when the PC is plugged in or running on
battery.
· You also can modify your computer’s power-saving options to control
what it does automatically when you’ve left it idle.

· · Browser tips (security, multiple logged user login access, refresh,


popup )

· What is Web Browser ?


· Web browser is used to access the information and resources on the
World Wide Web. It is a software application used to trace and display
the web pages .The main purpose of a web browser is to bring the
information resources to the user. An information resource is identified
by a Uniform Resource Identifier/Locator (URI/URL) and may be a web
page, image, video or other piece of content. Web browsers are used
not only on the personal computers, laptops but are also used on
mobile phones to access the information.

· Uniform Resource Locator (URL)

· The URL looks like https://sites.google.com/a/gdgu.org/fb/

· http:// In short, http means the hypertext transfer protocol and the file
is a web page and every time you don’t needed to type the http, it is
automatically inserted by the browser.

· www– notation used for World Wide Web http:// www.google.com

· Some of the popular Web Browsers are :

· Internet Explorer:

It is known as Microsoft Internet Explorer in short IE. It comes pre-


installed on all Windows computers. It is one of the most popular web
browsers and latest edition of IE 11 is available on the Internet. It can
be installed with the following: windows operating system like Windows
7, Windows 8, Windows Vista and Windows Server’s.

· Mozilla Firefox:

It is a free, open source web browser developed by Mozilla Corporation.


It has been said as being stable and safer, less prone to security
breaches, viruses, and malware than Microsoft Internet Explorer. The
browser can be used in different operating systems like Windows, Linux
and Apple MAC operating system etc.

· Google Chrome:

It is a web browser designed for windows operating system. This


browser works on windows vista, windows 7 and windows 8. The
chrome can be downloaded and installed for OS X or Linux operating
system

· Why to secure your Web Browser ?

· Securing browser is the first step that need to be taken in order to


assure secure online protection. There is an increase in number of
threats taking advantage of vulnerabilities present in the web browsers
through use of malicious websites. This problem is made worse by a
number of factors, including the following:

· Many computer users are not aware of the click on the web links.

· Software and third party software packages installed combined


increases the number of vulnerabilities

· Many websites require that users enable features or install more


software, third- party software which doesn’t get security updates
putting the computer at additional risk.

· Many users do not know how to configure their web browsers


securely.

· Browser Cookies:
· A cookie is used to identify a website user. A cookie is a small piece of
text sent to a browser by a website accessed through the browser. It
contains information about that visit like remembering the website
visited preferred language and other settings. The browser stores this
data and uses it in accessing the features of the website or the next
time the same site is visited to make the access more personalized. If a
website uses cookies for authentication, then an attacker may be able
to obtain unauthorized access to that site by obtaining the cookie.

· Pop-ups:

· Pop upsare a small window pane that opens automatically on your


browser. Generally, they show advertising, which can be from
legitimate company, but also may be scams or dangerous software. It
works when certain websites are opened. Pop-up ads can be part of a
phishing scam designed to trap you into revealing your personal or
financial information as you visit web sites. Pop-ups mislead you to click
the buttons on the pop-up window. But sometimes advertisers create a
pop-up window that look similar to a close or cancel option so
whenever user choose such options the button performs an
unexpected action like opening another pop-up window, performing
unauthorized commands on your system.

Not all pop-ups are bad some web sites use pop-up windows for
particular tasks. You might have to view the window in order to
complete that task.

· Scripts:

· Scripts are used to create websites more interactive. It is most


commonly used as part of web browsers, whose implementations allow
client-side scripts to interact with the user, control the browser,
communicate asynchronously, and alter the document content that is
displayed. There are specifications in the JavaScript standard that limit
certain features such as accessing local files.

The same script can be used for inclusion of malicious code which takes
control of the web browser there in by allowing to access the files of the
system. It may cause damage to the system by accessing the
vulnerabilities in the browser.
· Plug-ins:

· Plug ins is the in-built applications for use in the web browser and
Netscape web browser had developed the NPAPI standard for
developing plug-ins. Later this standard is used by many web browsers.
Plug-ins are same to ActiveX controls but cannot be executed outside of
a web browser. Adobe Flash is an example of an application that is
available as a plug-in inside the web browser.

· How to secure your Web Browser ?

· By default web browser comes with an operating system and it is


setup with default configuration which doesn’t have all secure features
enabled in it. Not securing web browser leads to problems caused by
anything like spyware, malware, viruses, worms etc being installed in to
a computer and this may cause intruders to take control over your
computer.

· There is a raise of threat from software attacks which may take


advantage of vulnerable web browsers. Some software of a web
browser like java script, Active X etc may also be the cause for the
vulnerabilities in the computer system. So it is important to enable
security features in your web browser to minimize the risk to the
computer.

· Security zone

· Security zone in an Internet web browser lets you to secure the


browser and offer to trust the people, companies on the Internet. This
helps to decide and adds which sites to be allowed to run the
application, scripts, add-ons, install plug-in on your computer

.Security zone also contains other features like adding address of web
sites under restricted sites this feature is available in Internet explorer
and block the untrusted sites or attack sites this feature is available in
Firefox, these vary with different web browser.

· Trusted site

· Internet is a network of people, with all kinds of stuff for different


kinds of people through various websites.
Generally you don’t trust everyone around you so why to trust all the
web sites? Also why should you allow everyone to come into your
computer without your authorization? Using the feature of trusted sites
in your web browser will help you to decide whom to trust.

· Customize the security-related settings

· Most web browsers allow you to customize the security-related


settings. Though the controls differ for each particular browser, a
useful rule of thumb to follow is to set all the settings related to the
following as high as possible:

· Block reported attack / fake sites

If available, enable this feature to prevent accidental access to


malicious sites

· Cookies

Disable entirely, or only enable if you visit a trusted site that requires
them

· Pop-up windows

Block from running automatically, enable it only for trusted websites


and/or have the browser ask you each time a site wants to open a
window

· JavaScript

Block from running automatically, enable it only for trusted websites


and/or have the browser ask you each time a site wants to run a script

· Camera / microphone usage

Block from running automatically, or have the browser ask you each
time a website wants to use the camera / microphone

· Plugins / add-ons

Block from running automatically, or have the browser ask you each
time a website wants to install or run a plugin/add-on
· Tips :

· Always use the secured web browser to avoid the risks .Using secure
browser we can gain access the information and resources that are
available on the Internet and can have safe browsing over Internet.

· To avoid your PC being compromised and becoming a weapon to


attack other machines, web browser and the Internet users are advised
to: ensure that your operating system and key system components
such as the web browser is fully patched and up to date.

· Install a personal firewall along with anti-virus software with the latest
virus signatures that can detect malware such as key loggers.

· Regularly change your passwords with the combinations of letters,


numbers and special case characters in critical web applications if a
one-time password system is not supported.

· Turn off all JavaScript or ActiveX support in your web browser before
you visit any unknown websites.

· Most vendors give you the option to download their browsers directly
from their websites. Make sure to verify the authenticity of the site
before downloading any files.

· To additional minimize risk; follow the latest good security practices,


like using a personal firewall, Updating to the latest browser with
security patches installed and keeping anti-virus software up to date
with regular scanning the entire system.

You might also like