How I Learned to Stop Worrying and Love the EOL CD.

Slides:



Advertisements
Similar presentations
Chapter 8: Operating Systems and Utility Programs
Advertisements

Google chrome operating system
Chapter 7 Operating Systems and Utility Programs.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
NetAcumen ActiveX Download Instructions
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
An Introduction to Firewalls By: David Moss, NUIT Technology Support Services Vince Celindro, NUIT Telecommunications and Network Services Robert Vance,
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
A common error that appears on the copier’s screen is seen here when a scan to Sharpdesk is not sent to the computer successfully. This guide intends to.
How to Install Norton Internet Security 2005 Stephen Cooke Veronica McCall Carlos Portillo Vernita Rucker Howard Sanders.
Source XP vs Windows 7 XPWin 7.
MyData Tips and Tricks A Must-Read for MyData Users May 2014.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
1 ANTI VIRUS UPDATING. 2 Anti Virus Software: There are as many hackers today as there are software developers. Cyber crime has been recognized as needing.
1 Computer Security: Protect your PC and Protect Yourself.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Windows 10 Remediation 1 Upgrading to Windows 10 with Norton Installed OEM Team.
Laptop Survival and Management Help Desk Services Pat Valiquette Mark Miller Campus tools – Fall 2006.
Small Business Edition 4 C707 – Technical overview.
Changing the Way Systems are Deployed 1. 2 * Ghost since 1999 * Almost 4500 licenses * Prior to 2007 license count increase of 5% or greater a year *
®® Microsoft Windows 7 for Power Users Tutorial 8 Troubleshooting Windows 7.
York Secure Scan vs Microsoft Windows Our story and how we dealt with it.
Malware: Defenses. Kinds of malware Viruses  Macro Viruses  Memory-resident viruses  File infector viruses  Boot Viruses  Trojan Horses  Hoaxes.
Get the best performance out of your PC By Matthew Pinch.
Tutorial 11 Installing, Updating, and Configuring Software
Learning In A Techno World How Safe is Your Cyberspace?
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Introduction to Firewalls TEC 236. What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized.
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
VistA Imaging Capture via Scanning. October VistA Imaging Capture via Scanning The information in this documentation includes only new and updated.
Windows 2003 Installation/Upgrade and Update. Checking Compatibility Supported Upgrade paths Using the MS Windows Upgrade Advisor HCL (Hardware Compatibility.
C HAPTER 2 Introduction to Windows XP Professional.
Simplifying the Configuration of Student Laptops — StirlingVPNSetup Simon Booth University of Stirling Laptop Forum 27th June 2006.
ExamSoft at BU LAW Boston University School of Law Office of Systems & Technology.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
Jeny Carrasco and Jai Nayar English 393 Process Manual Assignment 12/08/04 McAfee 7.1 Process Manual.
Tour Overview Introduction Collage Basics Collage Basics (Templates and Tools) Computer Configuration Bookmark Collage Getting Started Tour Collage Terminology.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Basic Computer Maintenance Clean and Cool Deleting Temporary Files Scandisk Backup Your Data How to run scandisk? Click on Start-Programs-Accessories-
Retina Network Security Scanner
CSC190 Introduction to Computing Operating Systems and Utility Programs.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
ALSMS Upgrade Configuration Example Alcatel-Lucent Security Products Configuration Example Series.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
IT Desktop Management GoToMeeting – Online Meeting Service Organizer/Presenter Guide May 2007 Prepared by Angela Mars IT Education and Training.
Fixing Windows 10 Automatic Updates Install Problem
Windows Vista Configuration MCTS : Network Security.
For more information on Rouge, visit:
A- VAST ANTIVIRUS HELPLINE NUMBER
Pasewark & Pasewark 1 Windows Vista Lesson 1 Windows Vista Basics Microsoft Office 2007: Introductory.
Three steps to prevent Malware infection
Introducing, Installing, and Upgrading Windows 7
Canon Printer Support Ireland Toll-Free Number:
How to Fix Trojan.Poweliks Using Norton Antivirus?
Tips to Manually Uninstall Norton Antivirus 2012.
How to Solve Issue “Apple MacBook Not Accepting Password”?
Steps to Fix "TeamViewer Blocked by Norton Antivirus" Issue.
Welcome to Norton Antivirus Customer Support. Norton 24/7 Online Tech Support.
Information Security Session October 24, 2005
Bethesda Cybersecurity Club
Security through Group Policy
Presentation transcript:

How I Learned to Stop Worrying and Love the EOL CD

Why an EOL CD? Desire to clean and protect machines prior to attaching to network Blaster worm in 2003 Bandwidth-efficient way to deliver

What’s on the CD? Security Scan (Windows) Wireless Configuration (Windows / Mac) CAT Scanner (Windows) Link to Network Registration (Windows / Mac) Content broken up over four panes

Supported Configurations Windows XP Windows Vista Mac OS X 10.3+

Getting Started – Pane One Pop in the CD – Windows will autorun (emory_online_2007.exe) – Mac will mount (run Emory Online 2007 for Mac) Introduction to EOL

Security Scan Intro – Pane Two On Windows, will start: – Spybot – Symantec Anti-Virus – CCleaner – Scheduled Windows Updates – Enable Firewall

Windows Updates – Pane Two MS doesn’t allow redistribution of Windows Updates, so you can’t legally run updates off of CD Running a Custom Scan will allow you to select individual components to run

Macintosh – Pane Two Will tell user to install Norton Anti-Virus from Software Express

After Pane Two Windows will reboot and restart CD on Pane Three

Wireless Configuration – Pane Three Windows XP – Automatic Wireless Configuration tool Not usable if laptop has an OEM customized utility for wireless – Wireless Configuration Documentation Windows Vista – Wireless Configuration Documentation Mac OS X – Automatic Wireless Configuration Tool – Wireless Configuration Documentation

NetReg – Pane Four Changes browser homepage to it.emory.edu Students page Button to initiate Network Registration

Secrets of EOL Once you’ve passed a step, you can go back via the navigation buttons Upon executing the security scan, you are cookied as having been scanned and will always start at Pane Three – To clear this cookie, click on the left face of the clock tower

More Secrets of EOL If you need to skip the security scan and get directly to the Wireless Pane, you can click on the word “here” at the bottom of the Eula on Pane Two

Yet One More Secret of EOL All executables are found in the FSCOMMAND directory Patches, SAV, CCleaner, CAT, etc. are found in FSCOMMAND/Resources

Macbook Incompatibility Problems with newest Macbooks and burned CDs Alternatives will be available