Thursday, 13 September 2012

Your role as a user

 Your role as a user


Guard against malicious code in email
Don’t open attachments unless you are sure they are safe
Don’t trust who email is from
Updated and enabled virus signatures
Guard against malicious code from web browsing


Obey Strong Authentication Policy
Don’t run network services  unless they demand Kerberos authentication
Treat your kerberos password as a sacred object
Promptly report potential computer security incidents
Follow FCIRT instructions during incidents


  • Data backup
  • Incidental use
  • Privacy
  • Offensive material
  • Licensing

Strong Authentication | Critical Systems | Critical Vulnerabilities and Vulnerability Scanning | FCIRT

 Strong Authentication


  • Avoid disclosure of passwords on the network
  • No network services (logon or read/write ftp) visible on the general internet can be offered with out requiring Kerberos authentication (unless a formal exemption is applied for and granted)
  • Kerberos provides a single sign in, minimizing use of multiple passwords for different systems
  • Lab systems are constantly scanned for violations of this policy

Critical Systems


  • Defined as “critical to the mission of the Laboratory”, i.e. disruption may have major impact on Laboratory operations;
  • Most things do not fall in this category; 
  • Special (more stringent) rules & procedures apply;
  • Including periodic reviews;
  • You’ll know if you’re in this category;

Critical Vulnerabilities and Vulnerability Scanning


  1. Certain security vulnerabilities are declared critical when they are (or are about to) being actively exploited and represent a clear and present danger
  2. Upon notification of a critical vulnerability, systems must be patched by a given date or they will be blocked from network access

FCIRT (Fermi Computer Security Incident Response Team) 


  • Security experts drawn form throughout the lab
  • Investigate (“triage”) initial reports;
  • Coordinate investigation overall;
  • Work with local system managers;
  • Call in technical experts;
  • May take control of affected systems;
  • Maintain confidentiality;

Incoming Search Tearms


Strong Authentication
Critical Systems
Critical Vulnerabilities and Vulnerability Scanning
FCIRT

Integrated Security Management | Integrated Security Management system | Integrated Security Management software | Integrated Security Management program | Integrated Security Management solution | Integrated Security Management groub

 
 
  •  Computer Security is not an add-on or something external, it is part and parcel of everything you do with computers (analogy with ES&H)
     
  • Not “one-size-fits-all”, but appropriate for the needs and vulnerabilities of each system
     
  • In most cases, it is simply common sense + a little information and care
     
  • Each Division/Section or large experiment has a GCSC (General Computer Security Coordinator)   


Incoming Search Tearms


Integrated Security Management
Integrated Security Management system
Integrated Security Management software
Integrated Security Management program
Integrated Security Management solution
Integrated Security Management groub

Installing drive jumpers | Installing Driver | how to install drive


IDE connectors are often keyed, as to prevent inserting them backwards. It does not take much force to bypass this and possibly ruin your motherboard. Look carefully at the drive and the cable connection before you try to connect them. You should see a "missing" pin on the drive, and a corresponding blocked socket on the connector. If you break a pin on the drive, you will probably have a worthless drive.

Most parallel IDE cables have a colored stripe down one side. That colored stripe signifies "pin 1" - and usually will line up next to the Molex power connection on your drive. Use this rule of thumb if your connectors are not keyed.

How a drive is physically installed will depend on the case.
A Serial ATA connector
Floppy Disk Drive Cable
Most new drives are SATA (Serial ATA) which use simple, small cables for a data connection. The ends of the cables are L shaped, just look carefully at the cable ends and the connector on the drive and match them up. Only one drive can be connected to each SATA port on the motherboard. Some SATA drives have two different power ports - make sure you connect ONLY ONE of these ports to the power supply, connecting both can damage the drive.

Older drives have PATA (Parallel ATA) connections which use a flat ribbon (IDE) cable for data connection. When using an IDE cable, plug the two connectors that are closer together into the 2 drives, and the third to the controller or motherboard. The connector furthest from the board should be attached to the drive set as Master. Make sure the drive that you will install your OS on is the primary master. This is the master drive on the Primary IDE bus which is usually the IDE 40 pin port on the motherboard labelled “Primary” or “IDE 1”..

Incoming Search Tearms

Installing drive jumpers
Installing Driver
how to install drive

Why Computer Security | what is computer security | definition of computer security | computer security | pc security | security | Fermilab Strategy | Integrated Security Management


Fermilab Strategy:

  • Integrated Computer Security
  • Defense in Depth
  • Your role and responsibilities as a user
  • Other Computing Policy Issues
  • Data backup
  • Incidental use
  • Privacy
  • Offensive material
  • Licensing

The Internet is a dangerous place

We are constantly being scanned for weak or vulnerable systems; new unpatched systems will be exploited within minutes.

Fermilab is an attractive target

  • High network bandwidth is useful for attackers who take over lab computers
     
  • Publicity value of compromising a .gov site
     
  • Attackers may not realize we have no information useful to them

We need to protect

  • Our data
  • Our ability to use our computers (denial of service attacks)
  • Our reputation with DOE, Congress and the general public

Major sources of danger

  • Running malicious code on your machine due to system or application vulnerabilities or improper user actions
    Carrying infected machines (laptops) in from off site

Integrated Security Management

Defense in Depth

  • Perimeter Controls and auto blocking
  • Mail gateway virus scanning
  • Strong Authentication (Kerberos)
  • Critical System plans
  • Critical vulnerabilities
  • Prompt response to computer security incidents (FCIRT)
  • Intelligent and informed user community

Incoming Search Tearms


Why Computer Security
what is computer security
definition of computer security
computer security
PC security
security
Fermi lab Strategy
Integrated Security Management

Friday, 7 September 2012

CPU | assembling cpu


Installing the CPU, and the CPU’s heat-sink and fan, are by far the most difficult steps you’ll have to complete during your build. Here, more than anywhere else, it will pay to read the instructions carefully, look at the parts, study the diagrams that came with your CPU and/or third party cooling solution, and make sure you thoroughly understand what you are going to do before you try to do it. During the process, if anything does not seem to fit or make sense, put the parts down and look things over carefully before you proceed. Some operations, especially installing the heat-sink/fan combination, can require pretty firm pressure, so don’t be afraid to push a little harder if you’re sure everything is set up correctly.
The details of the installation process differ in slight but important ways for each manufacturer’s processors, and even within a manufacturer's product line. Therefore, for these details, you should rely on the instructions that are provided with the CPU.
If you buy a third party cooling solution for your CPU make sure you get one that is compatible with the CPU you have. Most brands come with multiple mounting brackets that will suit many different chipsets, but it is best to check for compatibility just in case.

If using thermal paste, apply it only to the CPU die (the square piece of silicon in the middle of the CPU) and do so sparingly -- most modern CPUs take no more than a dab of thermal paste the size of a grain of rice. Some people do like to wipe some onto the heat-sink's surface and then wipe it smoothly off so that bits of it may get into tiny holes for better heat transfer.
One option you may consider, before installing the heat-sink, is to "lap" the heat-sink, which means to smooth out the bottom surface. To do this, you will need a very flat surface; a piece of thick window glass will work. Fasten your sandpaper on the flat surface, invert the heat-sink on the sandpaper and sand in small circles, applying minimum pressure. If you get it right, you should have a surface which feels completely smooth to the touch with a mirror finish. Some companies producing heat-sinks lap the surface themselves, so if the surface already looks like a perfect mirror, leave it alone. A lapped heat-sink is more effective as it will have better surface contact with the chip.

Tighten the cooler using only the specified holding devices - if you did everything right, they will fit. If they do not fit, check your setup - most likely something is wrong. After mounting the cooler, connect any power cables for the fan that is attached to the cooler.

Incoming Search Tearms


cpu
Assembling cpu
How to assemble cpu

Motherboard | PC Motherboard | Computer Motherboard | Motherboard of computer | Motherboard of pc | Assembling the Motherboard

If you have trouble lining up the screw holes, double check that you have the standoffs in the proper holes on the tray. With lower quality cases there are sometimes alignment problems and you may have to forgo one or two screws.
ASRock K7VT4A Pro Mainboard Labeled English.svg

Remove the I/O Shield from the back of the case where the ports on the back of the motherboard will fit, and put in the I/O Shield that came with your motherboard. There may be small metal tabs on the inside of this face plate, if so you may have to adjust them to accommodate the ports on the back of the motherboard.

Some case styles make it difficult to install the motherboard or the CPU with the power supply installed. If the power supply is in your way, take it out and set it aside (we'll put it back in later).

Now locate the screw holes on your motherboard and find the corresponding holes on the motherboard plate (or tray) in the case. Put a standoff in each of these holes on the tray and position the motherboard so that you can see the holes in the top of the standoffs through the screw holes in the motherboard.

Now is the time to make sure the ports on the motherboard are mating with the back plate  you just installed, and make any necessary adjustments. The small metal tabs are intended to make contact with the metal parts of the connections on the back of the motherboard and ground them, but you may have to bend these tabs a bit to get the ports all properly mounted, this is where those needle-nose pliers may come in handy.
Incoming Search Tearms

Motherboard
PC Motherboard
Computer Motherboard
Motherboard of computer
Motherboard of pc
Assembling the Motherboard

Computer Tricks | Computer Shortcut Key | PC Tips | computer tricks | computer shortcut key | pc tips | computer tips

PC Tips

Short cut keys are an easy way to complete tasks on a computer.


Short Cut Keys

Ctrl + C = Copy
Ctrl + V = Paste
Ctrl + X = Cut
Ctrl + B = Bold
Ctrl + U = Underline
Ctrl + I = Italics
Ctrl + N = New Window

Incoming Search Tearms

Computer Tricks
Computer Shortcut Key
PC Tips
computer tricks
computer shortcut key
PC tips
computer tips

Assembling the Hardware | assembling a computer | assembling a cpu | assembling a pc | assembling a personal computer | assembling | steps in Assembling the Hardware | steps in assembling a computer | steps in assembling a cpu | steps in assembling a pc | steps in assembling a personal computer | steps in assembling


Choose the right combination of hardware

E.g.
  • Home use and web surfing,
  • LAN card or modem is needed,
  • No need to install sophisticated hardware.

Cost considerations

  • Never go for CPU with the highest speed,
  • Choose a hard disk with appropriate capacity,
  • Consider reputation and warranty.

Precautions in computer assembling

  • Discharge oneself before handling hardware.
  • Hold the main board and expansion cards by edges.
  • Return the main board and peripherals to anti-static bags.
  • Disconnect the power before working on the system.
Step 1: Installing the Power Supply

Step 2: Configuring the Main Board jumper
  • CPU System Bus Frequency
  • CPU Clock Ratio
  • CPU Core Voltage

Step 3: Inserting CPU into the main board

  • The socket, heat sink and fan support base are mounted onto the main board
  • Heat sink and fan: prevent overheating
Step 4: Inserting the RAM

Step 5: Mounting the main board into the computer case

Step 6: Main board signal connections

Step 7: Connecting the Power Supply to the Main Board
    
Step 8: Installing the expansion cards
  • Install the video adapter first
  • AGP card goes into the AGP slot
Installing IDE devices
  • IDE drives: hard disk, CD-ROM's and DVD-ROM's
  • Set the jumpers on the drives before mounting
  • Two IDES channels on the main board
  • Each channel can attach to two devices
Step 9: System check
  • Connect the power cable
  • Switch on the computer
  • Check the message on screen
  • Set up BIOS and install OS if the system works fine

Incoming Search Tearms

Assembling the Hardware
assembling a computer
assembling a cpuassembling a PC
assembling a personal computer
assembling
steps in Assembling the Hardware
steps in assembling a computer
steps in assembling a CPU
steps in assembling a PC
steps in assembling a personal computer
steps in assembling

Monday, 3 September 2012

Internet Using How to Safe | Safety for internet | How to safe internet


Internet Using How to Safe

 

  • Don't save your login information. Always log out of Web sites by clicking "log out" on the site. It's not enough to simply close the browser window or type in another address.
    Many programs (especially instant messenger programs) include automatic login features that will save your user name and password. Disable this option so no one can log in as you.
  • Don't leave the computer unattended with sensitive information on the screen. If you have to leave the public computer, log out of all programs and close all windows that might display sensitive information.
  • Erase your tracks. Web browsers such as Internet Explorer keep a record of your passwords and every page you visit, even after you’ve closed them and logged out.


Incoming Search Tearm


Internet Using How to Safe
Safety for internet
How to safe internet

Computer Safety | Computer Safety Tips | how to computer safety | PC safety tips

 How to Safety Your Computer


  •  Download Panda Anti virus Kill all Viruses & Spy wares with the latest Panda Anti virus software's.
  •  Firewalls are necessary even if you have a dial-up Internet connection - it takes only minutes for a a non-firewall ed computer to be infected. Free zone alarm Firewall
  • Using the Windows Firewall
  •  Secure your browser. If you use Internet Explorer, you will be able to take advantage of the security zones settings to ensure optimum browsing safety. Not only will you enjoy safer browsing, you'll be able to eliminate unwanted pop-ups as well.

 

 

Incoming Search Tearms


Computer Safety
Computer Safety Tips
how to computer safety
PC safety tips