Jumanne, 11 Novemba 2014

tvw

by on 06:17

Naketa Cornegay
Caty Murray������������
Michael Shiroya

TROJANS, VIRUSES, AND WORMS

Trojans, Viruses, and Worms are all damaging to your computer system. If you do not know any basic knowledge on these three things, it can be harmful. If you do not know how to protect your computer these things can be harmful also. So to give you some more information, we will be talking about Trojans, viruses, and worms in our paper.
Trojan Horses are files that claim to be harmless but, in fact, are nasty. You may think it is safe, but hidden inside is usually something harmful, probably a worm or a virus. The bait of Trojans is that you may download a file or an email attachment, believing that it is harmless, but once you run the file, the worm or virus then infects your computer. An important distinction between Trojan horse programs and true viruses is that they do not replicate themselves. An example of a Trojan is the PWSteal.Trojan.
����������� Worms, unlike Trojans, are programs that duplicate themselves from system to system without the use of a host file. An important difference between worms and viruses is that viruses require the spreading of an infected host file. Furthermore, worms and viruses use the host file differently. A worm will release a file that already has the �worm� macro within the document. The entire file will them travel in the network from computer to computer. Bearing this in mind, the file itself should therefore be considered the worm. Worms generally come through email attachments; however computers can also get infected if they accept a Trojan file which has a worm as the payload.If one was to receive a worm program via email, and run it, the program will send the worm file to everyone on the person�s address book. The person who receives the file will fall into the same situation and so the cycle of infection and multiplication continues.
����������� A virus is a program that alters the way a computer operates, without the consent or knowledge of the user. Viruses are spread through executable files we get from. Viruses are often disguised under Trojans, which are carriers of the virus. For a program to be classified as a virus it must execute itself, replicate itself, and often place their own code in the path of execution of another program. For example, it may replace other executable files with a copy of the virus infected file, damage the computer by damaging programs, deleting files, or reformat the hard disk. Some viruses are not programmed to do any damage, but simply to replicate themselves and show their presence by presenting text, video, and audio messages; and in the process they take up memory that would have otherwise been used by legitimate programs. Consequently, they often result in erratic behavior and in system crashes. Moreover, many viruses are bug-ridden, and these bugs may also cause system crashes and loss of valuable data.
����������� There are five types of viruses: file infector, boot sector, master boot record, multi-partite, and macro viruses. File infector viruses infect program files. They infect executable code, for instance .com and .exe files. They can infect other files when an infected program is run from a floppy disk, hard drive, or from a network. These viruses reside in memory so that once the memory is infected; all other non infected executable files that run become infected. Examples of file infector viruses include Jerusalem and Cascade.
����������� Boot sector viruses infect the boot record on floppy disks and hard disks. Boot sector viruses attach themselves to the system area of a disk and activate when the user attempts to open from the infected disk; usually all that is required to become infected is to attempt to start up your computer with an infected floppy disk. Like file infector viruses, boot sector viruses are also memory resident that is, the virus remains in memory. Therefore all files that are not writing protected will become infected once the floppy disk is accessed. Examples of boot sector viruses include Michelangelo and Stoned.
����������� Master boot record viruses are also memory resident viruses and infect disks in the same way as boot sector viruses. The distinction between these two virus types lies in is location of the viral code. Master boot record infectors save copy of the master boot record in a different location. Windows NT computers that become infected by either boot sector viruses or master boot sector viruses will not boot. This is due to the difference in how the operating system accesses its boot information, as compared to Windows 95/98. If your Windows NT system is formatted with FAT partitions you can usually remove the virus by booting to DOS and using antivirus software. If the boot partition is NTFS, the system must be recovered by using the three Windows NT Setup disks. Examples of master boot record infectors include AntiExe, and Unashamed.
����������� Multi-partite viruses are also known as poly-partite viruses and they infect both boot records and program files. They are difficult to repair. If the boot area is cleaned, but the files are not cleaned, the boot area will be re-infected with the virus. This will also be the case for cleaning infected files. If the virus is not removed from the boot area, any files were cleaned will be re-infected. Examples of poly-partite viruses include Anthrax and Tequilla.
����������� Macro viruses infect data files. They are the most common of all the virus types. Macro virus can be programmed such that they not only infect data files, but can also possibly infect other files as well. All of these viruses use another program�s internal programming language, created to allow users to mechanize certain tasks within that program. These viruses can be created relatively easily and hence they are many of them circulation around today. Examples of macro viruses include W97M.Melissa and W97M. Groov.
����������� There are many ways to protect your computer. Some ways are as follows: Do not accept files from anyone you do not know; do not run or even peek at files you receive through email from people you don�t know. Purchase a good, recent anti-virus software program. Encourage your acquaintances, business associates and other people you regularly exchange emails with to send messages as rich "text format" files instead of Word documents. In this way the document�s appearance will be preserved without concealing malicious code. Be wary of friends who pass along funny video clips via e-mail; neither of you know the origin of this software and whether it is bug free. Be careful about disks from other computers. Since not everybody uses anti-virus software programs, before using a disk, one should run a virus scan on it. Set up a regular time to update the virus scans and follow up on those times. You should backup important files regularly. Avoid pornography sites, game sites, and web sites that offer free screen savers or share-ware, they are often key breeding grounds of Trojan horses.
����������� In conclusion, viruses, Trojans, and worms can be damaging to your computer. If you follow safe and precise steps you can prevent your computer from getting infected. Also just having basic knowledge of these things could help out also.

by on 06:12
Malware:
Malicious Software
10/21/2010 Malware 1
Viruses, Worms, Trojans, Rootkits
• Malware can be classified into several categories, depending
on propagation and concealment
• Propagation
– Virus: human-assisted propagation (e.g., open email attachment)
– Worm: automatic propagation without human assistance
• Concealment
– Rootkit: modifies operating system to hide its existence
– Trojan: provides desirable functionality but hides malicious operation
• Various types of payloads, ranging from annoyance to crime
10/21/2010 Malware 2
Insider Attacks
• An insider attack is a security breach that is
caused or facilitated by someone who is a part
of the very organization that controls or builds
the asset that should be protected.
• In the case of malware, an insider attack refers
to a security hole that is created in a software
system by one of its programmers.
10/21/2010 Malware 3
Backdoors
• A backdoor, which is also sometimes called a
trapdoor, is a hidden feature or command in a
program that allows a user to perform actions he
or she would not normally be allowed to do.
• When used in a normal way, this program
performs completely as expected and advertised.
• But if the hidden feature is activated, the program
does something unexpected, often in violation of
security policies, such as performing a privilege
escalation.
• Benign example: Easter Eggs in DVDs and software
10/21/2010 Malware 4
Logic Bombs
• A logic bomb is a program that performs a malicious action as
a result of a certain logic condition.
• The classic example of a logic bomb is a programmer coding
up the software for the payroll system who puts in code that
makes the program crash should it ever process two
consecutive payrolls without paying him.
• Another classic example combines a logic bomb with a
backdoor, where a programmer puts in a logic bomb that will
crash the program on a certain date.
10/21/2010 Malware 5
The Omega Engineering Logic Bomb
• An example of a logic bomb that was actually
triggered and caused damage is one that
programmer Tim Lloyd was convicted of using
on his former employer, Omega Engineering
Corporation. On July 31, 1996, a logic bomb
was triggered on the server for Omega
Engineering’s manufacturing operations,
which ultimately cost the company millions of
dollars in damages and led to it laying off
many of its employees.
10/21/2010 Malware 6
The Omega Bomb Code
• The Logic Behind the Omega Engineering Time Bomb included the
following strings:
• 7/30/96
– Event that triggered the bomb
• F:
– Focused attention to volume F, which had critical files
• F:\LOGIN\LOGIN 12345
– Login a fictitious user, 12345 (the back door)
• CD \PUBLIC
– Moves to the public folder of programs
• FIX.EXE /Y F:\*.*
– Run a program, called FIX, which actually deletes everything
• PURGE F:\/ALL
– Prevent recovery of the deleted files
10/21/2010 Malware 7
Defenses against Insider Attacks
• Avoid single points of failure.
• Use code walk-throughs.
• Use archiving and reporting tools.
• Limit authority and permissions.
• Physically secure critical systems.
• Monitor employee behavior.
• Control software installations.
10/21/2010 Malware 8
Computer Viruses
• A computer virus is computer code that can
replicate itself by modifying other files or
programs to insert code that is capable of further
replication.
• This self-replication property is what
distinguishes computer viruses from other kinds
of malware, such as logic bombs.
• Another distinguishing property of a virus is that
replication requires some type of user assistance,
such as clicking on an email attachment or
sharing a USB drive.
10/21/2010 Malware 9
Biological Analogy
• Computer viruses share some properties with
Biological viruses
10/21/2010 Malware 10
Attack Penetration
Replication and assembly
Release
Early History
1972 sci-fi novel “When HARLIE Was One” features a
program called VIRUS that reproduces itself
First academic use of term virus by PhD student Fred
Cohen in 1984, who credits advisor Len Adleman with
coining it
In 1982, high-school student Rich Skrenta wrote first
virus released in the wild: Elk Cloner, a boot sector
virus
(c)Brain, by Basit and Amjood Farooq Alvi in 1986,
credited with being the first virus to infect PCs
10/21/2010 Malware 11
Virus Phases
• Dormant phase. During this phase, the virus just exists—
the virus is laying low and avoiding detection.
• Propagation phase. During this phase, the virus is
replicating itself, infecting new files on new systems.
• Triggering phase. In this phase, some logical condition
causes the virus to move from a dormant or propagation
phase to perform its intended action.
• Action phase. In this phase, the virus performs the
malicious action that it was designed to perform, called
payload.
– This action could include something seemingly innocent, like
displaying a silly picture on a computer’s screen, or something
quite malicious, such as deleting all essential files on the hard
drive.
10/21/2010 Malware 12
Infection Types
• Overwriting
– Destroys original code
• Pre-pending
– Keeps original code, possibly
compressed
• Infection of libraries
– Allows virus to be memory
resident
– E.g., kernel32.dll
• Macro viruses
– Infects MS Office documents
– Often installs in main
document template
10/21/2010 Malware 13
virus
compressed
original code
Degrees of Complication
• Viruses have various degrees of complication in how
they can insert themselves in computer code.
10/21/2010 Malware 14
Concealment
• Encrypted virus
– Decryption engine + encrypted body
– Randomly generate encryption key
– Detection looks for decryption engine
• Polymorphic virus
– Encrypted virus with random variations of the decryption engine (e.g.,
padding code)
– Detection using CPU emulator
• Metamorphic virus
– Different virus bodies
– Approaches include code permutation and instruction replacement
– Challenging to detect
10/21/2010 Malware 15
Computer Worms
• A computer worm is a malware program that spreads
copies of itself without the need to inject itself in other
programs, and usually without human interaction.
• Thus, computer worms are technically not computer
viruses (since they don’t infect other programs), but
some people nevertheless confuse the terms, since
both spread by self-replication.
• In most cases, a computer worm will carry a malicious
payload, such as deleting files or installing a backdoor.
10/21/2010 Malware 16
Early History
First worms built in the labs of John Shock and Jon
Hepps at Xerox PARC in the early 80s
CHRISTMA EXEC written in REXX, released in
December 1987, and targeting IBM VM/CMS
systems was the first worm to use e-mail service
The first internet worm was the Morris Worm,
written by Cornell student Robert Tappan Morris
and released on November 2, 1988
10/21/2010 Malware 17
a
th
Worm Development
• Identify vulnerability still
unpatched
• Write code for
– Exploit of vulnerability
– Generation of target list
• Random hosts on the internet
• Hosts on LAN
• Divide-and-conquer
– Installation and execution of
payload
– Querying/reporting if a host is
infected
• Initial deployment on a private
network
• Worm template
– Generate target list
– For each host on target
list
• Check if infected
• Check if vulnerable
• Infect
• Recur
10/21/2010 Malware 18
Worm Propagation
• Worms propagate by finding and infecting vulnerable hosts.
– They need a way to tell if a host is vulnerable
– They need a way to tell if a host is already infected.
10/21/2010 Malware 19
initial infection
Propagation: Theory
Classic epidemic model
– N: total number of vulnerable
hosts
– I(t): number of infected hosts
at time t
– S(t): number of susceptible
hosts at time t
– I(t) + S(t) N
– : infection rate
Differential equation for I(t):
dI dt I(t) S(t)
More accurate models adjust
propagation rate over time
10/21/2010 Malware 20
Source:
Cliff C. Zou,WeiboGong, Don Towsley,
and LixinGao. The Monitoring and Early
Detection of Internet Worms, IEEE/ACM
Transactions on Networking, 2005.
Propagation: Practice
• Cumulative total of unique IP addresses infected by the first
outbreak of Code-RedI v2 on July 19-20, 2001
10/21/2010 Malware 21
Source:
David Moore, Colleen
Shannon, and Jeffery
Brown. Code-Red: a
case study on the spread
and victims of an Internet
worm, CAIDA, 2002
Trojan Horses
• A Trojan horse (or Trojan) is a malware program that
appears to perform some useful task, but which also
does something with negative consequences (e.g.,
launches a keylogger).
• Trojan horses can be installed as part of the payload of
other malware but are often installed by a user or
administrator, either deliberately or accidentally.
10/21/2010 Malware 22
Current Trends
• Trojans currently have largest infection potential
– Often exploit browser vulnerabilities
– Typically used to download other malware in multi-stage attacks
10/21/2010 Malware 23
Source:
Symantec Internet
Security Threat
Report, April 2009
Rootkits
• A rootkit modifies the operating system to hide its
existence
– E.g., modifies file system exploration utilities
– Hard to detect using software that relies on the OS itself
• RootkitRevealer
– By Bryce Cogswell and Mark Russinovich (Sysinternals)
– Two scans of file system
– High-level scan using the Windows API
– Raw scan using disk access methods
– Discrepancy reveals presence of rootkit
– Could be defeated by rootkit that intercepts and modifies
results of raw scan operations
10/21/2010 Malware 24
Malware Zombies
• Malware can turn a computer in to a zombie, which is
a machine that is controlled externally to perform
malicious attacks, usually as a part of a botnet.
10/21/2010 25
BotnetController (Attacker)
Victim
Botnet:
Attack Commands
Attack Actions
ontroller
Financial Impact
Malware often affects a large user
population
Significant financial impact, though
estimates vary widely, up to $100B
per year (mi2g)
Examples
LoveBug (2000) caused $8.75B in
damages and shut down the
British parliament
In 2004, 8% of emails infected by
W32/MyDoom.A at its peak
In February 2006, the Russian
Stock Exchange was taken down by
a virus.
10/21/2010 Malware 26
Economics of Malware
• New malware threats
have grown from 20K to
1.7M in the period 2002-
2008
• Most of the growth has
been from 2006 to 2008
• Number of new threats
per year appears to be
growing an exponential
rate.
10/21/2010 Malware 27
Source:
Symantec Internet
Security Threat
Report, April 2009
Professional Malware
• Growth in professional cybercrime
and online fraud has led to demand
for professionally developed
malware
• New malware is often a customdesigned
variations of known
exploits, so the malware designer
can sell different “products” to
his/her customers.
• Like every product, professional
malware is subject to the laws of
supply and demand.
– Recent studies put the price of a
software keystroke logger at $23 and
a botnet use at $225.
10/21/2010 Malware 28
Image by User:SilverStar from http://commons.wikimedia.org/wiki/File:Supply-demand-equilibrium.svg
used by permission under the CreativeCommons Attribution ShareAlike 3.0 License
Adware
10/21/2010 Malware 29
Adware software payload
Adware engine infects
a user’s computer
Computer user
Adware agent
Adware engine requests
advertisements
from adware agent
Advertisers
Advertisers contract with
adware agent for content
Adware agent delivers
ad content to user
Spyware
10/21/2010 Malware 30
Spyware software payload
1. Spyware engine infects
a user’s computer.
Computer user
Spyware data collection agent
2. Spyware process collects
keystrokes, passwords,
and screen captures.
3. Spyware process
periodically sends
collected data to
spyware data collection
agent.
p
Signatures: A Malware Countermeasure
• Scan compare the analyzed object with a database of
signatures
• A signature is a virus fingerprint
– E.g.,a string with a sequence of instructions specific for
each virus
– Different from a digital signature
• A file is infected if there is a signature inside its code
– Fast pattern matching techniques to search for signatures
• All the signatures together create the malware
database that usually is proprietary
10/21/2010 Malware 31
Signatures Database
• Common Malware
Enumeration (CME)
– aims to provide
unique, common
identifiers to new virus
threats
– Hosted by MITRE
– http://cme.mitre.org/d
ata/list.html

Digital Immune
System (DIS)
– Create automatically
new signatures
10/21/2010 Malware 32
White/Black Listing
• Maintain database of cryptographic hashes for
– Operating system files
– Popular applications
– Known infected files
• Compute hash of each file
• Look up into database
• Needs to protect the integrity of the database
10/21/2010 Malware 33
Heuristic Analysis
• Useful to identify new and “zero day” malware
• Code analysis
– Based on the instructions, the antivirus can determine
whether or not the program is malicious, i.e., program
contains instruction to delete system files,
• Execution emulation
– Run code in isolated emulation environment
– Monitor actions that target file takes
– If the actions are harmful, mark as virus
• Heuristic methods can trigger false alarms
10/21/2010 Malware 34
Shield vs. On-demand
• Shield
– Background process
(service/daemon)
– Scans each time a file is
touched (open, copy,
execute, etc.)
10/21/2010 Malware 35
On-demand
• Scan on explicit user
request or according to
regular schedule
• On a suspicious file,
directory, drive, etc.
Performance test of scan techniques
o Comparative: check the number of already known viruses that are
found and the time to perform the scan
o Retrospective: test the proactive detection of the scanner for unknown
viruses, to verify which vendor uses better heuristics
Anti-viruses are ranked using both parameters:
http://www.av-comparatives.org/
Online vs Offline Anti Virus Software
Online
• Free browser plug-in
• Authentication through third
party certificate (i.e. VeriSign)
• No shielding
• Software and signatures update
at each scan
• Poorly configurable
• Scan needs internet connection
• Report collected by the company
that offers the service
Offline
• Paid annual subscription
• Installed on the OS
• Software distributed securely by
the vendor online or a retailer
• System shielding
• Scheduled software and
signatures updates
• Easily configurable
• Scan without internet connection
• Report collected locally and may
be sent to vendor
10/21/2010 Malware 36
Quarantine
• A suspicious file can be isolated in a folder called quarantine:
– E.g,. if the result of the heuristic analysis is positive and you are
waiting for db signatures update
• The suspicious file is not deleted but made harmless: the user can
decide when to remove it or eventually restore for a false positive
– Interacting with a file in quarantine it is possible only through the
antivirus program
• The file in quarantine is harmless because it is encrypted
• Usually the quarantine technique is proprietary and the details are
kept secret
10/21/2010 Malware 37
Static vs. Dynamic Analysis
Static Analysis
• Checks the code without trying to
execute it
• Quick scan in white list
• Filtering: scan with different antivirus
and check if they return same result
with different name
• Weeding: remove the correct part of
files as junk to better identify the
virus
• Code analysis: check binary code to
understand if it is an executable, e.g.,
PE
• Disassembling: check if the byte code
shows something unusual
Dynamic Analysis
• Check the execution of codes inside a
virtual sandbox
• Monitor
– File changes
– Registry changes
– Processes and threads
– Networks ports
10/21/2010 Malware 38
Virus Detection is Undecidable
• Theoretical result by Fred
Cohen (1987)
• Virus abstractly modeled
as program that
eventually executes infect
• Code for infect may be
generated at runtime
• Proof by contradiction
similar to that of the
halting problem
• Suppose program
isVirus(P) determines
whether program P is a
virus
• Define new program Q
as follows:
if (not isVirus(Q))
infect
stop
• Running isVirus on Q
achieves a contradiction
10/21/2010 Malware 39
Other Undecidable Detection Problems
• Detection of a virus
– by its appearance
– by its behavior
• Detection of an evolution of a known virus
• Detection of a triggering mechanism
– by its appearance
– by its behavior
• Detection of a virus detector
– by its appearance
– by its behavior
• Detection of an evolution of
– a known virus
– a known triggering mechanism
– a virus detector
10/21/2010 Malware 40
Resources
• Computer Emergency Response Team
– Research center funded by the US federal government
– Vulnerabilities database
• Symantec
– Reports on malware trends
– Database of malware
• Art of Computer Virus Research and Defense by Peter Szor
10/21/2010 Malware 41

it

by on 06:06

What is Malware?


Malware is a type of software designed to take over and/or damage your computer's operating system. Once installed, it is often very difficult to remove, and depending on the severity of the program installed, its handiwork can range in degree from the slightly annoying (such as unwanted pop-up ads), to irreparable damage requiring the reformatting of the hard drive.
The most common types of malware include:
  • Virus - A parasitic program written intentionally to enter a computer without the users permission or knowledge. The word parasite is used because a virus attaches to files or boot sectors and replicates itself, thus continuing to spread. Though some virus's do little but replicate, others can cause serious damage or effect program and system performance.
  • Worms - Similar to viruses but are stand-alone software and thus do not require host files (or other types of host code) to spread themselves. They do modify their host operating system, however, at least to the extent that they are started as part of the boot process.
  • Wabbit - Self-replicating malware. Unlike viruses, they do not infect host programs but repeatedly replicates itself on a local computer
  • Trojan - Harmful software that is disguised as legitimate software.
  • Backdoor - Software that allows access to the computer system bypassing the normal authentication procedures
  • Spyware - Software that collects and sends information (such as browsing patterns in the more benign cases or credit card numbers in more malicious cases) about users or, more precisely, the results of their computer activity
  • Key Logger - Software that copies a computer user's keystrokes to a file, which it may send to a hacker at a later time.
  • Root kit - Software inserted onto a computer's system after an attacker has gained control of the system.
  • Exploit - Software that attacks a particular operating system or application security vulnerability.
  • Browser Hijacker - A program designed to alter a computer user's browser settings (bookmarks, homepage, etc.). They can also produce pop-up ads and, in the worst case, redirect your browser to undesirable websites.
How does Malware Spread? Virtually all malware cannot spread unless you open or run an infected program. More often than not, victims of malware will have unwittingly brought the infection on themselves, as malware is designed to take advantage of the carelessness or laxness of those who don't take enough steps to secure their computers against attacks.
Opening and running unknown e-mail or Instant Messaging (IM) attachments is the most common way to become infected.
Other common methods of spreading malware are:
  • Downloading infected files using Peer-to-Peer file sharing programs (e.g. Kazaa).
  • Downloading infected files from the web.
  • Putting an infected computer disk (floppy, CD, USB Memory stick, or DVD) into your computer.
  • Clicking on a web site dialog box.
  • Connecting an unsecure computer to the network.


Jumamosi, 13 Septemba 2014

Ijumaa, 5 Septemba 2014

DEFINITION,EFFECTS,PREVENTION OF CORRUPTION

by on 03:53

 EFFECTS OF CORRUPTION 

  Corruption is most commonly defined as the misuse or the abuse of public office for
private gain

The effect of corruption has many dimensions related to political, economic, social and environmental effects.  In political sphere, corruption impedes democracy and the rule of law. In a democratic system, public institutions and offices may lose their legitimacy when they misuse their power for private interest. Corruption may also result in negative

Jumatano, 3 Septemba 2014

WALLPAPERS

by on 06:10

   WAPO POA SANA

cheki jamaa walivyo kimbiza

 




















Jumanne, 2 Septemba 2014

COMMANDS

by on 19:43

An A-Z Index of the Windows CMD command line

   ADDUSERS Add or list users to/from a CSV file
   ADmodcmd Active Directory Bulk Modify
   ARP      Address Resolution Protocol
   ASSOC    Change file extension associations•
   ASSOCIAT One step file association
   AT       Schedule a command to run at a specific time
   ATTRIB   Change file attributes
b
   BCDBOOT  Create or repair a system partition
   BCDEDIT  Manage Boot Configuration Data
   BITSADMIN Background Intelligent Transfer Service
   BOOTCFG  Edit Windows boot settings
   BROWSTAT Get domain, browser and PDC info
c
   CACLS    Change file permissions
   CALL     Call one batch program from another•
   CERTREQ  Request certificate from a certification authority
   CERTUTIL Utility for certification authority (CA) files and services
   CD       Change Directory - move to a specific Folder•
   CHANGE   Change Terminal Server Session properties
   CHKDSK   Check Disk - check and repair disk problems
   CHKNTFS  Check the NTFS file system
   CHOICE   Accept keyboard input to a batch file
   CIPHER   Encrypt or Decrypt files/folders
   CleanMgr Automated cleanup of Temp files, recycle bin
   CLIP     Copy STDIN to the Windows clipboard
   CLS      Clear the screen•
   CMD      Start a new CMD shell
   CMDKEY   Manage stored usernames/passwords
   COLOR    Change colors of the CMD window•
   COMP     Compare the contents of two files or sets of files
   COMPACT  Compress files or folders on an NTFS partition
   COMPRESS Compress one or more files
   CONVERT  Convert a FAT drive to NTFS
   COPY     Copy one or more files to another location•
   CSCcmd   Client-side caching (Offline Files)
   CSVDE    Import or Export Active Directory data 
d
   DATE     Display or set the date•
   DEFRAG   Defragment hard drive
   DEL      Delete one or more files•
   DELPROF  Delete user profiles
   DELTREE  Delete a folder and all subfolders
   DevCon   Device Manager Command Line Utility 
   DIR      Display a list of files and folders•
   DIRQUOTA File Server Resource Manager Disk quotas
   DIRUSE   Display disk usage
   DISKPART Disk Administration
   DISKSHADOW Volume Shadow Copy Service
   DISKUSE  Show the space used in folders
   DOSKEY   Edit command line, recall commands, and create macros
   DriverQuery Display installed device drivers
   DSACLs   Active Directory ACLs
   DSAdd    Add items to active directory (user group computer) 
   DSGet    View items in active directory (user group computer)
   DSQuery  Search for items in active directory (user group computer)
   DSMod    Modify items in active directory (user group computer)
   DSMove   Move an Active directory Object
   DSRM     Remove items from Active Directory
e
   ECHO     Display message on screen•
   ENDLOCAL End localisation of environment changes in a batch file•
   ERASE    Delete one or more files•
   EVENTCREATE Add a message to the Windows event log
   EXIT     Quit the current script/routine and set an errorlevel•
   EXPAND   Uncompress CAB files
   EXTRACT  Uncompress CAB files
f
   FC       Compare two files
   FIND     Search for a text string in a file
   FINDSTR  Search for strings in files
   FOR /F   Loop command: against a set of files•
   FOR /F   Loop command: against the results of another command•
   FOR      Loop command: all options Files, Directory, List•
   FORFILES Batch process multiple files
   FORMAT   Format a disk
   FREEDISK Check free disk space
   FSUTIL   File and Volume utilities
   FTP      File Transfer Protocol
   FTYPE    File extension file type associations•
g
   GETMAC   Display the Media Access Control (MAC) address
   GOTO     Direct a batch program to jump to a labelled line•
   GPRESULT Display Resultant Set of Policy information
   GPUPDATE Update Group Policy settings
h
   HELP     Online Help
   HOSTNAME Display the host name of the computer
i
   iCACLS   Change file and folder permissions
   IF       Conditionally perform a command•
   IFMEMBER Is the current user a member of a group
   IPCONFIG Configure IP
   INUSE    Replace files that are in use by the OS
l
   LABEL    Edit a disk label
   LOGMAN   Manage Performance Monitor logs
   LOGOFF   Log a user off
   LOGTIME  Log the date and time in a file
m
   MAKECAB  Create .CAB files
   MAPISEND Send email from the command line
   MBSAcli  Baseline Security Analyzer
   MEM      Display memory usage
   MD       Create new folders•
   MKLINK   Create a symbolic link (linkd) •
   MODE     Configure a system device COM/LPT/CON
   MORE     Display output, one screen at a time
   MOUNTVOL Manage a volume mount point
   MOVE     Move files from one folder to another•
   MOVEUSER Move a user from one domain to another
   MSG      Send a message
   MSIEXEC  Microsoft Windows Installer
   MSINFO32 System Information
   MSTSC    Terminal Server Connection (Remote Desktop Protocol)
n
   NET      Manage network resources
   NETDOM   Domain Manager
   NETSH    Configure Network Interfaces, Windows Firewall & Remote access
   NBTSTAT  Display networking statistics (NetBIOS over TCP/IP)
   NETSTAT  Display networking statistics (TCP/IP)
   NOW      Display the current Date and Time 
   NSLOOKUP Name server lookup
   NTBACKUP Backup folders to tape
   NTDSUtil Active Directory Domain Services management
   NTRIGHTS Edit user account rights
o
   OPENFILES Query or display open files
p
   PATH     Display or set a search path for executable files•
   PATHPING Trace route plus network latency and packet loss
   PAUSE    Suspend processing of a batch file and display a message•
   PERMS    Show permissions for a user
   PERFMON  Performance Monitor
   PING     Test a network connection
   POPD     Return to a previous directory saved by PUSHD•
   PORTQRY  Display the status of ports and services
   POWERCFG Configure power settings
   PRINT    Print a text file
   PRINTBRM Print queue Backup/Recovery
   PRNCNFG  Configure or rename a printer
   PRNMNGR  Add, delete, list printers and printer connections
   PROMPT   Change the command prompt•
   PsExec     Execute process remotely
   PsFile     Show files opened remotely
   PsGetSid   Display the SID of a computer or a user
   PsInfo     List information about a system
   PsKill     Kill processes by name or process ID
   PsList     List detailed information about processes
   PsLoggedOn Who's logged on (locally or via resource sharing)
   PsLogList  Event log records
   PsPasswd   Change account password
   PsPing     Measure network performance
   PsService  View and control services
   PsShutdown Shutdown or reboot a computer
   PsSuspend  Suspend processes
   PUSHD    Save and then change the current directory•
q
   QGREP    Search file(s) for lines that match a given pattern
   Query Process / QPROCESS  Display processes
   Query Session / QWinsta   Display all sessions (TS/Remote Desktop)
   Query TermServer /QAppSrv List all servers (TS/Remote Desktop)
   Query User    / QUSER     Display user sessions (TS/Remote Desktop)
r
   RASDIAL  Manage RAS connections
   RASPHONE Manage RAS connections
   RECOVER  Recover a damaged file from a defective disk
   REG      Registry: Read, Set, Export, Delete keys and values
   REGEDIT  Import or export registry settings
   REGSVR32 Register or unregister a DLL
   REGINI   Change Registry Permissions
   REM      Record comments (remarks) in a batch file•
   REN      Rename a file or files•
   REPLACE  Replace or update one file with another
   Reset Session  Delete a Remote Desktop Session
   RD       Delete folder(s)•
   RMTSHARE Share a folder or a printer
   ROBOCOPY Robust File and Folder Copy
   ROUTE    Manipulate network routing tables
   RUN      Start | RUN commands
   RUNAS    Execute a program under a different user account
   RUNDLL32 Run a DLL command (add/remove print connections)

s
   SC       Service Control
   SCHTASKS Schedule a command to run at a specific time
   SET      Display, set, or remove session environment variables•
   SETLOCAL Control the visibility of environment variables•
   SETX     Set environment variables
   SFC      System File Checker 
   SHARE    List or edit a file share or print share
   ShellRunAs Run a command under a different user account
   SHIFT    Shift the position of batch file parameters•
   SHORTCUT Create a windows shortcut (.LNK file)
   SHUTDOWN Shutdown the computer
   SLEEP    Wait for x seconds
   SLMGR    Software Licensing Management (Vista/2008)
   SORT     Sort input
   START    Start a program, command or batch file•
   SUBINACL Edit file and folder Permissions, Ownership and Domain
   SUBST    Associate a path with a drive letter
   SYSMON   Monitor and log system activity to the Windows event log
   SYSTEMINFO List system configuration
t
   TAKEOWN  Take ownership of a file
   TASKLIST List running applications and services
   TASKKILL End a running process
   TELNET   Communicate with another host using the TELNET protocol
   TIME     Display or set the system time•
   TIMEOUT  Delay processing of a batch file
   TITLE    Set the window title for a CMD.EXE session•
   TLIST    Task list with full path
   TOUCH    Change file timestamps    
   TRACERT  Trace route to a remote host
   TREE     Graphical display of folder structure
   TSDISCON Disconnect a Remote Desktop Session
   TSKILL   End a running process
   TSSHUTDN Remotely shut down or reboot a terminal server
   TYPE     Display the contents of a text file•
   TypePerf Write performance data to a log file
v
   VER      Display version information•
   VERIFY   Verify that files have been saved•
   VOL      Display a disk label•
w
   WAITFOR  Wait for or send a signal
   WEVTUTIL Clear event logs, enable/disable/query logs
   WHERE    Locate and display files in a directory tree
   WHOAMI   Output the current UserName and domain
   WINDIFF  Compare the contents of two files or sets of files
   WINRM    Windows Remote Management
   WINRS    Windows Remote Shell
   WMIC     WMI Commands
   WUAUCLT  Windows Update
x
   XCACLS   Change file and folder permissions
   XCOPY    Copy files and folders
   ::       Comment / Remark•
Commands marked • are Internal commands only available within the CMD shell.
All other commands (not marked with •) are external commands.
External commands may be used under the CMD shell, PowerShell, or directly from START-RUN.


Alhamisi, 28 Agosti 2014

bios

by on 06:17
The BIOS program on the BIOS chip reads information from the CMOS chip when the computer is starting up, during the boot up process. You may notice on the initial start up screen, called the POST screen, an option is available to enter the BIOS or CMOS setup. When you enter this setup area, you are entering the CMOS setup, not the BIOS setup. The BIOS chip and program cannot be updated directly by a user. The only way to update the BIOS is using a BIOS flash program called a BIOS update, which updates the BIOS to a different version. These updates usually are provided by either the motherboard manufacturer or the computer manufacturer.

Jumatano, 20 Agosti 2014

Jumapili, 17 Agosti 2014

motherbord

by on 11:46
er

ATX motherboard - labeled
An ATX computer motherboard with labeled parts.

ATX motherboard legend
1.  Processor socket
2.  Chipset
3.  RAM slots
4.  AGP graphic card slot
5.  PCI slots
6.  CNR modem slot
7.  Audio chip
8.  I/O chip
9.  BIOS
10. ATX power connector
11. Floppy drive connector
12. ATA connectors
13. Connectors for buttons,
    indicator lights etc.
The external ports (connections) are along the top edge (right hand side). A face-on view is shown below.

Form Factor (e.g. ATX , micro ATX)

ATX (Advanced Technology Extended) is a full size board measuring 12" wide by 9.6" deep. ATX has 6-pin mini keyboard connector. Also, it has double row single power supply connector providing +/-5V, +/-12V, and +3.3V.
MicroATX is a small motherboard size of 9.6" x 9.6". Compared to full size ATX, microATX have smaller number of  I/O slots. For example, full ATX can have 5 PCI slots, whereas MicroATX can have up to 3/4 PCI stots only. The chief advantages over ATX is reduced size, and power requirements.

Components 

  • Integrated I/Os (e.g. sound, video, USB, serial, IEEE 1394 / firewire, parallel, NIC, modem)
  • Memory slots (e.g. RIMM, DIMM)
  • Processor sockets
  • External cache memory
  • Bus architecture
  • Bus slots (e.g. PCI, AGP, PCIe, AMR, CNR)
  • EIDE / PATA, SATA
  • SCSI Technology
A typical ATX PC motherboard with constituent components is given below:
pc-motherboard
 
The important constituent components of an ATX Motherboard are given below:
1. Mouse & keyboard
2. USB
3. Parallel port
4. CPU Chip
5. RAM slots
6. Floppy controller
7. IDE controller
8. PCI slot
9. ISA slot
10. CMOS Battery
11. AGP slot
12. CPU slot
13. Power supply plug in

1. Mouse & keyboard:  Keyboard Connectors are two types basically. All PCs have a Key board port connected directly to the motherboard. The oldest, but still quite common type, is a special DIN, and most PCs until recently retained this style connector. The AT-style keyboard connector is quickly disappearing, being replaced by the smaller mini DIN PS/2-style keyboard connector.

                    You can use an AT-style keyboard with a PS/2-style socket (or the other way around) by using a converter. Although the AT connector is unique in PCs, the PS/2-style mini-DIN is also used in more modern PCs for the mouse. Fortunately , most PCs that use the mini-DIN for both the keyboard and mouse clearly mark each mini-DIN socket as to its correct use. Some keyboards have a USB connection, but these are fairly rare compared to the PS/2 connection keyboards.

2. USB (Universal serial bus): 
 USB is the General-purpose connection for PC. You can find USB versions of many different devices, such as mice, keyboards, scanners, cameras, and even printers. a USB connector's distinctive rectangular shape makes it easily recognizable. 
USB has a number of features that makes it particularly popular on PCs. First, USB devices are hot swappable. You can insert or remove them without restarting your system.
3. Parallel port: Most printers use a special connector called a parallel port. Parallel port carry data on more than one wire, as opposed to the serial port, which uses only one wire. Parallel ports use a 25-pin female DB connector. Parallel ports are directly supported by the motherboard through a direct connection or through a dangle.
4. CPU Chip : The central processing unit, also called the microprocessor performs all the calculations that take place inside a pc. CPUs come in Variety of shapes and sizes.
    Modern CPUs generate a lot of heat and thus require a cooling fan or heat sink. The cooling device (such as a cooling fan) is removable, although some CPU manufactures sell the CPU with a fan permanently attached.
5. RAM slots: Random-Access Memory (RAM) stores programs and data currently being used by the CPU. RAM is measured in units called bytes. RAM has been packaged in many different ways. The most current package is called a 168-pin DIMM (Dual Inline Memory module).   
6. Floppy controller: The floppy drive connects to the computer via a 34-pin ribbon cable, which in turn connects to the motherboard. A floppy controller is one that is used to control the floppy drive.
7. IDE controller: Industry standards define two common types of hard drives: EIDE and SCSI.  Majority of the PCs use EIDE drives. SCSI drives show up in high end PCs such as network servers or graphical workstations. The EIDE drive connects to the hard drive via a 2-inch-wide, 40-pin ribbon cable, which in turn connects to the motherboard. IDE controller is responsible for controlling the hard drive.
8. PCI slot:  Intel introduced the Peripheral component interconnect bus protocol.  The PCI bus is used to connect I/O devices (such as NIC or RAID controllers) to the main logic of the computer. PCI bus has replaced the ISA bus.
9. ISA slot:  (Industry Standard Architecture) It is the standard architecture of the Expansion bus. Motherboard may contain some slots to connect ISA compatible cards.
10. CMOS Battery: To provide CMOS with the power when the computer is turned off all motherboards comes with a battery. These batteries mount on the motherboard in one of three ways: the obsolete external battery, the most common onboard battery, and built-in battery.

11. AGP slot:  If you have a modern motherboard, you will almost certainly notice a single connector that looks like a PCI slot, but is slightly shorter and usually brown. You also probably have a video card inserted into this slot. This is an Advanced Graphics Port (AGP) slot

12. CPU slot: To install the CPU, just slide it straight down into the slot. Special notches in the slot make it impossible to install them incorrectly. So remember if it does not go easily, it is probably not correct. Be sure to plug in the CPU fan's power.

13. Power supply plug in: 
The Power supply, as its name implies, provides the necessary electrical power to make the pc operate. the power supply takes standard 110-V AC power and converts into  +/-12-Volt, +/-5-Volt, and 3.3-Volt DC power.
The power supply connector has 20-pins, and the connector can go in only one direction.
  Male ATX Power Connector on Motherboard
IDE (Integrated Drive Electronics), also known as ATA or PATA (renamed Parallel ATA, to differentiate from Serial ATA or SATA)  is used with IBM compatible hard drives. IDE and its successor, Enhanced IDE (EIDE), are the commonly used with most Pentium computers..

Figure: A 40-pin IDE cable connector
Enhanced IDE (EIDE) is the enhanced version of IDE technology, and supports faster access to the hard disks.
Small Computer Systems Interface (SCSI): SCSI  is commonly used with server grade machines. IDE supports only two drives (one master drive and one slave drive) per channel, whereas SCSI can support 8 or more hard drives. There are different versions of SCSI available today. Different versions of SCSI include the following:
  1.  SCSI-1
  2.  SCSI-2
  3.  SCSI-3
  4.  Ultra-2
  5.  Ultra-3
  6.  Ultra-320
  7.  Ultra-640
  8.  iSCSI
  9.  Serial SCSI
The various SCSI bus standards primarily differ in the following:
  • Maximum throughput (MB/sec)
  • Maximum cable length, and
  • Maximum number of devices that could be connected.
For example, SCSI-I has a throughput of 5MB/sec, where as SCSI-3 can go up to 40MB/sec.

Serial ATA (SATA):

Serial ATA (SATA) is a next generation technology based on ATA, and for transfer of data to and from a hard disk. Earlier, ATA was used to mean parallel transfer of bits between the motherboard and the hard drive. However, with the advent of SATA, traditional ATA was named as PATA (Parallel ATA).  IDE/EIDE is usually associated with PATA.

Memory Slots/Modules:


Memory modules are printed circuit cards made up of memory chips, and a few other passive components. Normally, memory modules are the those that get installed on the motherboard's memory slots, and you don't handle individual memory chips. The following are the prominently used memory modules (also called memory cards):
  • Dual In-line Memory Modules (DIMM)
  • Rambus In-line Memory Modules (RIMM)
  • DDR
  • DDR II

Dual In-Line Memory Modules (DIMM):

DIMMs are very similar to SIMMs. The major difference is that a DIMM has two different signal pins on each side of the module as shown in the figure. One big advantage of DIMM is that only one module can be inserted into the motherboard, whereas you need two SIMMs (paired) when working with 64-bit microprocessors like Pentium II and above. Since SIMM provides only 32-bit bus, you need to use 2-SIMMs paired together with any modern 64-bit processor.
Typical DIMM package (using DDRAM):
Memory size: 256MB
Pins:168 pin

Rambus In-Line Memory Module (RIMM):

Rambus inline memory modules (RIMMs) use Rambus Dyamic RAM (RDRAM) chips.
A RIMM package using RDRAM

Double Data Rate:

DDR modules are also called DIMMs (Dual-In-Line-Memory Module). A typical DDR module (DIMM) is shown above. The DIMM package using DDR is twice as fast as the one using SDRAM.
Memory Size: 2X512MB
Memory Speed: 400MHzPC3200
Memory Type: Dual Channel DDR
Pins: 184

Micro Processors, and Socket Types:

Micro processor, also called CPU (Central Processing Unit), is a major component of a micro computer. We discuss various CPUs starting from Pentium IV, and onwards.
  • Socket 478
  • Socket A
  • Slot A
  • Slot 2

Socket 478:

Socket 478 is a PGA socket used by Intel Pentium 4 microprocessor family (not all P IV family processors support Socket 478)..
Socket type: Socket 478 (mPGA478B)
Front Bus Frequencies: 400 MHz - 800 MHz (100 MHz - 200 MHz QDR)
Socket size: 1.38" x 1.38" (3.5 x 3.5 cm)
Number of contacts: 478

Compatible package types:

478-pin micro FC-PGA
478-pin micro FC-PGA2

Compatible processors:

Processors Intel Pentium 4 (1.4 - 3.4 GHz)
Intel Celeron (1.7 - 3.2 GHz)
Celeron D (to 3.2 GHz)
Intel Pentium 4 Extreme Edition (3.2, 3.4 GHz)
This socket has currently been replaced with socket 775.

Socket A (Socket 462):

Socket A (also called Socket 462) is a PGA socket compatible with AMD K7 family of processors.
Socket A Processor for Socket A
Bus Frequencies: 100 MHz, 133 MHz, 166 MHz and 200 MHz
Number of contact pins: 462 pin holes

Compatible Processors include the following:

AMD Athlon (650 MHz - 1400 MHz)
AMD Athlon XP (1500+ - 3300+)
AMD Duron (600 MHz - 1800 MHz)
AMD Sempron (2000+ - 3300+)
AMD Athlon MP (1000 MHz - 3000+)

Compatible package types:

462-pin ceramic Pin Grid Array (PGA) package, 462-pin organic PGA.

Slot A:

Slot A is used by AMD's Athlon family of processors. It has 242 contacts, physically similar to that of Intel's Slot 1. But Slot A is electrically different from that of Slot 1.

Slot 2:

Slot 2 is a 330 contact version of Slot 1. Intel's Xeon processor uses Slot 2. The Slot 2 cartridge may house as many as four processors and an L2 cache.

BIOS / CMOS / Firmware

BIOS stands for Basic Input/Output System. It contains basic instructions to interact with various hardware modules such as Motherboard controllers or that of interface cards. BIOS is the software that is run by a computer when first powered on.
A computer motherboard inevitably contains a BIOS chip in the form of an onboard PROM, EPROM or flash memory.  When the computer is powered on, it performs diagnostic tests on the computer hardware devices such as hard drive, FDD, and memory. It searches for other BIOS's on the plug-in boards, and takes care of them. It then loads the operating system and passes control to OS. The BIOS accepts requests from the drivers as well as the applications as shown in the figure below.
BIOS is also known as PC firmware because it is an integral part of the motherboard.
Firmware on adapter cards: A computer can contain several BIOS firmware chips. The motherboard BIOS is normally used to access basic hardware components such as the keyboard, floppy drives, and hard disk controllers. Adapter cards such as SCSI, RAID, and video boards may include their own BIOS software.
Firmware generally available in different forms:
1. EPROM (Erasable Programmable ROM), for updating a BIOS firm using EPROM, you may need to get a new chip from the manufacturer.
2. EEPROM (Electrically Erasable Programmable ROM), you can update a BIOS firmware using EEPROM using "boot to floppy", and running the Firmware update program.
3. Flash ROM - faster at rewriting the chip
A typical BIOS chip used on motherboards is shown in the figure below. Though it is a square-type PLCC package, BIOS chips come in different forms. Figure 2 shows the BIOS after insertion into the socket.:
BIOS chip BIOS chip after insertion into a socket.

Chipsets

A chipset forms an integral part of any Computer motherboard. Chipsets provide the interfaces between all of the PC's subsystems. PC chipsets, usually mean anywhere between one to four chips that include built-in controllers for almost all common peripherals.  The Northbridge/Southbridge chipset architecture has been widely used in personal PCs. The Northbridge part handles high-speed channels like memory access, while Southbridge manages lower-speed devices such as IO cards, mouse, keyboard, etc.

Riser card 

A Riser card  connects directly into the computer motherboard and provides the ability for additional expansion cards to be added to the computer.

Daughter board

A daughter board connects to the Motherboard directly, and provides additional functionality. Hence the name daughter board. The added functionality may be something like networking, modem, etc.
VIA VB8003 2
Computer Motherboard Parts

Theme Support