Preview

Unit 2 Assignment 2: Microsoft Environment Analysis

Satisfactory Essays
Open Document
Open Document
552 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Assignment 2: Microsoft Environment Analysis
Unit 2 Assignment 2: Microsoft Environment Analysis

1/5/2014

5 vulnerabilities for this workgroup LAN based on the Microsoft Security Advisories numbers.
2755801, 2719662, 2854544, 2846338, 2847140.
2846338 involve privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority.
Three vulnerabilities and Solutions related to client configurations.
Advisory Number: 2719662
Microsoft is announcing the availability of an automated Microsoft Fix it solution that disables Windows Sidebar and Gadgets on supported editions of Windows Vista and Windows 7. Disabling Windows Sidebar and Gadgets can help protect customers from potential attacks that leverage Gadgets to execute arbitrary code. Customers should consider the following ways that an attacker could leverage Gadgets to execute arbitrary code: Microsoft is aware that some legitimate Gadgets running in Windows Sidebar could contain vulnerabilities. An attacker who successfully exploited a Gadget vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could create a malicious Gadget and then trick a user into installing the malicious Gadget. Once installed, the malicious Gadget could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. In addition, Gadgets can access your computer's files, show you objectionable content, or change their behavior at any time. Gadgets could also potentially harm your computer. Recommendation: Customers who are concerned about vulnerable or malicious Gadgets should apply the automated Microsoft Fix it solution as soon as possible.
Advisory Number: 2854544
Microsoft is announcing the availability of an update as

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8 Assignment 1

    • 1415 Words
    • 6 Pages

    This project used an Atmega644 microcontroller clocked at 20MHz in each of the two functional modules for processing. Memory storage is provided by a standard Secure Digital (SD) card. Xbee modules provide bidirectional wireless communication and we use the TLV5616 DAC chip for generating analog audio. The LM358 dual op amp provides active filtering to the output of the DAC. Music files can be added to the SD card using any computer with a multimedia card reader. Once the base station detects an SD card inserted into the holder, it awaits data requests from the portable module. The portable module requests data when required and feeds these values into the DAC. The DAC output is low-pass filtered by the op amp, which also buffers the DAC output before it reaches the audio output…

    • 1415 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    a. The time in hours, minutes, and seconds is to be passed to a function named totsec().…

    • 720 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 3 Assignment 1

    • 6320 Words
    • 26 Pages

    “A bus network topology is a network architecture in which a set of clients are connected via a shared communications line/cables” (Abu, 2013). There are several common instances of the bus architecture, including one in the motherboard of most computers. Bus networks may be the simplest way to connect multiple clients even though many may have problems. When two clients want to transmit at the same time on the same bus, this may cause some problems. Thus systems use bus networks normally some may have scheme for collision handling or collision avoidance for communication on the bus. Though this may be quite often in using Carrier Sense Multiple Access or the presence of a bus master’s who controls access to the shared bus resource.…

    • 6320 Words
    • 26 Pages
    Powerful Essays
  • Satisfactory Essays

    Answer: 2846338 involves privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Windows of Vulnerability is defined as the ability to attack something that is at risk. Hackers search and pride themselves on finding vulnerabilities or creating their own within a system. A few examples of vulnerabilities that will be covered in this paper are CodeRed, Spida, Slammer, Lovesan, and Sasser.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 3299 Words
    • 14 Pages

    Magnifier will allocate a section of your screen (by default at the top) where it will display a magnified version of what is under your mouse. It is also possible to configure it to follow the keyboard focus instead of the mouse position.…

    • 3299 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    NTFS is the newer filing system from Windows only Windows 2000 and higher use NTFS and FAT32. Which file system is intended primarily for use in large USB flash drives? I think it would be NTSF it a little more better an newer when it comes to the new OS out there like windows 8/7/ and maybe Vista XP just in case you have application that might run better on vista and XP. Plus since USB didn’t come out until Windows 98 well that when I first saw a USB port…

    • 462 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When addressing system performance, a key element that is often overlooked is Disk Fragmentation. Even on a brand new system with plenty of RAM and processing speed, the performance of the hard disk may be a bottleneck causing issues. It takes time to load large data files into memory - issues become particularly noticeable when dealing with movies, video clips, database files or image files which may easily be several gigabytes in size. On a freshly formatted disk, these files load fairly quickly. Over time, however you may start to notice performance issues - caused by disk fragmentation.…

    • 356 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    IT205 Week 4 Assignment

    • 641 Words
    • 2 Pages

    The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work.…

    • 641 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Assignment 1

    • 2136 Words
    • 9 Pages

    Sorting, Filtering, and Paging with the Entity Framework in an ASP.NET MVC Application ................... 55…

    • 2136 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT302 assignment 5

    • 356 Words
    • 2 Pages

    d. If you want vsftpd to run in standalone mode, what do you need to set in vsftpd.conf?…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    Vulnerability MS08-067 is an exposure in Server Service that could allow remote code execution in an affected system. The operating systems affected are Microsoft Windows 2000, Windows XP, and Windows Server 2003.…

    • 454 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Solution: This security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.…

    • 272 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lesson 9

    • 673 Words
    • 3 Pages

    ___c____ 3. This Default Security Level in Software Restriction Policies will disallow any executable that requires administrative rights to run.…

    • 673 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    A. Tom has just created a new consulting company and hired five consulting rookies. Given that a rookie needs to be trained for an average of eight months before she becomes experienced, how many of the five rookies will become experienced consultants after 12 months? In your assignment solutions document, please include the model diagram, documented equations, and a graph of model behavior.…

    • 509 Words
    • 2 Pages
    Satisfactory Essays

Related Topics