Lab 5 Operating Systems - Common First Year

Lab 5 Operating Systems - Common First Year

<p> CFY-Operating Systems Lab 9 Firewalls, anti-virus software.</p><p>Topics</p><p>Firewall:  What is a firewall?  Adding exceptions to Firewall. o An exception in your firewall allows network traffic access to your computer for the particular exception  Demo of firewall using Remote Desktop Software o RDS is used to remotely control to another computer from your computer o Need to set up your computer (local) to remotely connect o Need to set remote computer (host) to accept connection  Network profile settings: Domain, Private and Public  Firewall log file and interpreting it  Customizing Incoming & Outgoing connections</p><p>Windows Firewall</p><p>Youtube video on Firewalls: http://www.youtube.com/watch?v=vlnBdgIVgNA This video is 15 minutes long so we recommend you watch it on your own time.</p><p>Theory 1 : Research what is meant by a firewall.</p><p>Write down a brief description in your own words.</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Use your VMWare account to carry out this lab sheet.</p><p>Task 1: Turn on the firewall in Windows 7, if it’s not already on. How did you do this?</p><p>……………………………………………………………………………………………………………</p><p>Refer to: http://windows.microsoft.com/is-IS/windows7/Turn-Windows-Firewall-on-or-off Lab 9: Firewalls, AntiVirus etc.. Page 1 of 15 CFY-Operating Systems</p><p>You can have different security settings for your computer at home/work (private) versus public. Public would be using your computer when on a train or in a cafe or hotel.</p><p>Allow Programs communicate through the Firewall</p><p>Task 2: What is the exceptions list of a firewall used for? How do you use it?</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>…………………………………………………………………………………………………………… Ref: http://www.sevenforums.com/tutorials/542-windows-firewall-add-remove-exception.html</p><p>Task 3: Add Windows Media Player to the exception list. How did you do this?</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Lab 9: Firewalls, AntiVirus etc.. Page 2 of 15 CFY-Operating Systems What are the risks of allowing a program to communicate? Hint:Click on the hyperlink that can be found in the Task 2 screenshot.</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Now, remove Windows Media Player from the exception list. </p><p>Task 4: Add a program when it is not on the list of “Allowed Programs and Features”</p><p>This time we shall add a program whereby it is NOT on the list of “Allowed Programs and Features”. Click on the “Allow another program” button (See screenshot in TASK2).</p><p>(Use Windows Media Player again for demo purposes). Find the path to the application. How did you find this? </p><p>……………………………………………………………………………………………… For Windows Media Player it is: C:\Program Files\Windows Media Player\wmplayer.exe (see below)</p><p>Use this path to add an exception to the firewall. How did you do this?</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Lab 9: Firewalls, AntiVirus etc.. Page 3 of 15 CFY-Operating Systems Remote Desktop Software</p><p>Task 5: What is the Remote Desktop Software used for? </p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Task 6: In order to let someone connect to your machine, you will need to put a password on your login account. Goto Control panel/ User accounts/ Select your account called ? ...... </p><p>Set the password of this account to ; itcarlow</p><p>Task 7: Now you can proceed. In order to let users connect to your machine, you must first enable the Remote Desktop Connection. How do you do this?</p><p>Ref: http://www.howtogeek.com/howto/windows-vista/turn-on-remote-desktop-in-windows-vista/</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Note: when you have enabled this, examine the firewall exception list again. An extra exception has been checked. What is this exception ? ……………………………………………</p><p>Task 8: Next, you are going to attempt to connect to the Virtual machine of the student beside you using remote desktop. </p><p>To connect, you will require their IP address, Username (labuser) & Password (itcarlow). Now run the RDS program by clicking The Start button, then All Programs, then Accessories and then Remote Desktop Connection OR Windows key + r (to run a program) followed by mstsc.exe (and press enter).</p><p>What do you see when the connection is complete.</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Lab 9: Firewalls, AntiVirus etc.. Page 4 of 15 CFY-Operating Systems</p><p>Task 9: Remove the exception in your firewall that allows for the remote desktop connection to take place and ask for another student to connect to your computer using the Remote Desktop Software. What do you expect to happen?</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>What Happened?</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>An exception in your firewall allows network traffic access to your computer for the particular exception. Re-enable the exception for the Remote Desktop Connection on your computer and ask your class mate to remote desktop into your machine. Does it work?</p><p>……………………………………………………………………………………………………………</p><p>Types of Traffic Blocked</p><p>Task 10: Adding an exception to the firewall is unblocking an incoming connection. Outgoing connections can also be blocked/unblocked. Briefly describe the implications of Incoming & Outgoing connections. Examine the link: http://www.mcmcse.com/microsoft/guides/70-680/configure_windows_firewall.shtml</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Press the start button in Windows 7, then key in firewall and press enter. (You are taken to advanced firewall settings). </p><p>Lab 9: Firewalls, AntiVirus etc.. Page 5 of 15 CFY-Operating Systems</p><p>Network Profiles</p><p>Task 11: There are 3 types of Network profile settings: Domain, Private and Public What is the difference between them?</p><p>Domain Profile </p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Private Profile ……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Public Profile</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Lab 9: Firewalls, AntiVirus etc.. Page 6 of 15 CFY-Operating Systems</p><p>Task 12: You can block or allow incoming and outgoing connections to a network. Change the setting to Block all Inbound connections on the Public network ONLY?</p><p>How did you do this? </p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Firewall Log Files</p><p>Task 13: A log file can be kept for any communication through the firewall. What is the name and location of this log file? ……………………………………………………</p><p>Is it created by default? ………………………</p><p>What 2 settings can be set on the firewall?</p><p>………………………………………………………………………………………………</p><p>Is there a maximum size for this file and what is it? …………………...... Ref: http://technet.microsoft.com/en-us/library/cc947815(v=ws.10).aspx</p><p>Lab 9: Firewalls, AntiVirus etc.. Page 7 of 15 CFY-Operating Systems</p><p>Task 14: Set up your log file so that it logs if someone tries to connect to your computer and are successful. How did you do this?</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Test that this works by getting someone to connect to your computer. Then check if it is logged in the log file. Try to read the log file in Notepad. Read this http://technet.microsoft.com/en- us/library/cc753781(v=ws.10).aspx to help interpret the log file.</p><p>Reset the log file settings to what they were before, when finished.</p><p>Customizing Incoming & Outgoing connections</p><p>This Youtube has info on this topic: http://www.youtube.com/watch?v=vlnBdgIVgNA You have viewed this already so view it again, if required.</p><p>Task 15: How would you block a particular outgoing or incoming connection? </p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Have a brief look at the Remote Assistance Inbound Rules for example: </p><p>Lab 9: Firewalls, AntiVirus etc.. Page 8 of 15 CFY-Operating Systems</p><p>Task 16: Are the rules active or inactive? What network(s) are affected by the rules?</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Have a brief look at the Remote Desktop Outbound Rules for example. </p><p>Important: You are not expected to be able to setup Inbound or Outbound Rules.</p><p>Next Topics</p><p>Computer Security:  Antivirus  Internet settings. o Internet security levels, Active X controls, PopUps, Phishing</p><p>Antivirus</p><p>Task 1: Download and install the trial version of anti-virus software Avira AntiVir Personal. http://www.download.com Important: Don’t register the software</p><p>Once downloaded, start the software checking your C drive. Stop it after a minute.</p><p>How would you update the software with the latest new virus information so that it is able to detect and isolate them?</p><p>……………………………………………………………………………………………………………</p><p>There is no need to run the update.</p><p>What other software can you download on a free trial from this website? There is no need to do so.</p><p>…………………………………………………………………………………………………………… Lab 9: Firewalls, AntiVirus etc.. Page 9 of 15 CFY-Operating Systems</p><p>Question: Why is it important to force windows to show file extensions? </p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Task 2: How would you set up your OS to display file extensions when displaying file details? </p><p>……………………………………………………………………………………………………………</p><p>Internet Security Levels</p><p>Task 3: What security setting is your Internet browser set to and how could it be changed?</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Lab 9: Firewalls, AntiVirus etc.. Page 10 of 15 CFY-Operating Systems</p><p>A ctive X Controls</p><p>Theory 1: What are Active X controls? Write down a brief description in your own words in the space provided.</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Task 4: Where is the option in the Internet Explorer browser that manages ActiveX controls? Ref: http://technet.microsoft.com/en-us/library/cc817491.aspx</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>How would you set up or disable automatic prompting for ActiveX controls?</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>How would you disable the download of unsigned ActiveX controls?</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Lab 9: Firewalls, AntiVirus etc.. Page 11 of 15 CFY-Operating Systems</p><p>What is an Internet Explorer add-on? Hint: Choose Tools from the menu, Then choose Manage Add-ons. In the “Show” drop down box click All add-ons.</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>How would you disable one of the add-ons? For example how would you disable the Windows Media Player ActiveX control? Hint: Right click on the add-on to see the additional information about it.</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Related Reading: http://pcsupport.about.com/od/fixtheproblem/ht/disableie7activ.htm http://windows.microsoft.com/en-US/windows-vista/Internet-Explorer-add-ons-frequently-asked-questions</p><p>Lab 9: Firewalls, AntiVirus etc.. Page 12 of 15 CFY-Operating Systems</p><p>Popup Blocker & Phishing Filter</p><p>Theory 2: What is a popup Blocker? Write down a brief description in your own words in the space provided.</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Theory 3: What is a Phishing? And describe what a Phishing Filter does? Write down a brief description in your own words in the space provided.</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Task 5: How do you get into the popup Blocker settings? Ref: http://browsers.about.com/od/internetexplorertutorials/ss/ie8popupblocker_7.htm</p><p>Task 6: How do you turn on the Smart Screen Filter in Internet Explorer? Note: Phishing Filter has been updated and replaced by SmartScreen Filter in Internet Explorer 8.</p><p>Ref: http://support.microsoft.com/kb/930168</p><p>……………………………………………………………………………………………………………</p><p>……………………………………………………………………………………………………………</p><p>Lab 9: Firewalls, AntiVirus etc.. Page 13 of 15 CFY-Operating Systems</p><p>Questions to be done on your own time and discussed in the next lab:</p><p>1 What is a Trojan horse? How can it damage your computer? Write down a brief description in your own words in the space provided.</p><p>………………………………………………………………………………………………</p><p>………………………………………………………………………………………………</p><p>………………………………………………………………………………………………</p><p>………………………………………………………………………………………………</p><p>2 What is a Cookie? Write down a brief description in your own words in the space provided.</p><p>………………………………………………………………………………………………</p><p>………………………………………………………………………………………………</p><p>……………………………………………………………………………………………… 3 What is a Worm?</p><p>Ref: http://en.wikipedia.org/wiki/Morris_worm</p><p>Write down a brief description in your own words in the space provided.</p><p>………………………………………………………………………………………………</p><p>………………………………………………………………………………………………</p><p>………………………………………………………………………………………………</p><p>4 What is spyware? Write down a brief description in your own words in the space provided.</p><p>………………………………………………………………………………………………</p><p>………………………………………………………………………………………………</p><p>………………………………………………………………………………………………</p><p>Lab 9: Firewalls, AntiVirus etc.. Page 14 of 15 CFY-Operating Systems</p><p>Revision</p><p>Q1. Turn on the firewall. How would you set up your computer to allow another computer to connect to yours using the Skype software or Remote Assistance? How did you do this?</p><p>Q2. How would you set up Internet Explorer to enable the Pop Up Blocker.</p><p>Q3(a) You have downloaded Skype which is a software application that allows users to make voice calls over the Internet. What settings do you need to set or check for, on Windows Firewall in order for Skype to work correctly.</p><p>(b) Describe how you would set these settings.</p><p>Q4(a) Windows Firewall keeps track of communication through the firewall in a log file. What is the name of the firewall log file and where is it stored? </p><p>(b) Can this filename be changed? ……………………………</p><p>(c) What is its maximum size? When set to this size express your answer in Gigabytes and Terabytes.</p><p>Lab 9: Firewalls, AntiVirus etc.. Page 15 of 15</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    15 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us