Preview

Unit 2 Assignment 2: Microsoft Environment Analysis

Satisfactory Essays
Open Document
Open Document
552 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Assignment 2: Microsoft Environment Analysis
Unit 2 Assignment 2: Microsoft Environment Analysis

1/5/2014

5 vulnerabilities for this workgroup LAN based on the Microsoft Security Advisories numbers.
2755801, 2719662, 2854544, 2846338, 2847140.
2846338 involve privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority.
Three vulnerabilities and Solutions related to client configurations.
Advisory Number: 2719662
Microsoft is announcing the availability of an automated Microsoft Fix it solution that disables Windows Sidebar and Gadgets on supported editions of Windows Vista and Windows 7. Disabling Windows Sidebar and Gadgets can help protect customers from potential attacks that leverage Gadgets to execute arbitrary code. Customers should consider the following ways that an attacker could leverage Gadgets to execute arbitrary code: Microsoft is aware that some legitimate Gadgets running in Windows Sidebar could contain vulnerabilities. An attacker who successfully exploited a Gadget vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could create a malicious Gadget and then trick a user into installing the malicious Gadget. Once installed, the malicious Gadget could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. In addition, Gadgets can access your computer's files, show you objectionable content, or change their behavior at any time. Gadgets could also potentially harm your computer. Recommendation: Customers who are concerned about vulnerable or malicious Gadgets should apply the automated Microsoft Fix it solution as soon as possible.
Advisory Number: 2854544
Microsoft is announcing the availability of an update as

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8 Assignment 1

    • 1415 Words
    • 6 Pages

    This project used an Atmega644 microcontroller clocked at 20MHz in each of the two functional modules for processing. Memory storage is provided by a standard Secure Digital (SD) card. Xbee modules provide bidirectional wireless communication and we use the TLV5616 DAC chip for generating analog audio. The LM358 dual op amp provides active filtering to the output of the DAC. Music files can be added to the SD card using any computer with a multimedia card reader. Once the base station detects an SD card inserted into the holder, it awaits data requests from the portable module. The portable module requests data when required and feeds these values into the DAC. The DAC output is low-pass filtered by the op amp, which also buffers the DAC output before it reaches the audio output…

    • 1415 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    A good example of refraction of light and reflection of light is a rainbow. Sunlight enters the rain droplet at a specific angle and the rain droplet separates the white light into many different colors. This angle is a fixed measurement between your eye and the sun. What color is refracted depends upon the critical angle, which is the angle the sunlight strikes the back of the rain droplet. Red light bends the least while violet light bends the most all the other colors bend at an angle that is between the two. Each rain droplet reflects all colors at a given point and time, but only one color comes back to your eye, requiring millions of rain droplets to create a rainbow. As the rain droplets fall…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. The time in hours, minutes, and seconds is to be passed to a function named totsec().…

    • 720 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I recently had to deal with a problem with the Event Name as: BlueScreen. The Locale ID of the fault can be designated by the numerical value as: 5146. I am a touch apprehensive as to whether such a typical fault has been triggered owing to a virus attack. What should I do to eliminate the fault and ensure that the problem does not occur all over again?…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 3 Assignment 1

    • 6320 Words
    • 26 Pages

    “A bus network topology is a network architecture in which a set of clients are connected via a shared communications line/cables” (Abu, 2013). There are several common instances of the bus architecture, including one in the motherboard of most computers. Bus networks may be the simplest way to connect multiple clients even though many may have problems. When two clients want to transmit at the same time on the same bus, this may cause some problems. Thus systems use bus networks normally some may have scheme for collision handling or collision avoidance for communication on the bus. Though this may be quite often in using Carrier Sense Multiple Access or the presence of a bus master’s who controls access to the shared bus resource.…

    • 6320 Words
    • 26 Pages
    Powerful Essays
  • Satisfactory Essays

    Microsoft is announcing the availability of an automated Microsoft Fix it solution that disables Windows Sidebar and Gadgets on supported editions of Windows Vista and Windows 7. Disabling Windows Sidebar and Gadgets can help protect customers from potential attacks that leverage Gadgets to execute arbitrary code. Customers should consider the following ways that an attacker could leverage Gadgets to execute arbitrary code: Microsoft is aware that some legitimate Gadgets running in Windows Sidebar could contain vulnerabilities. An attacker who successfully exploited Gadget vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could create a malicious Gadget and then trick a user into installing the malicious Gadget. Once installed, the malicious Gadget could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. In addition, Gadgets can access your computer's files, show you objectionable content, or change their behavior at any time. Gadgets could also potentially harm your computer.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 3299 Words
    • 14 Pages

    Magnifier will allocate a section of your screen (by default at the top) where it will display a magnified version of what is under your mouse. It is also possible to configure it to follow the keyboard focus instead of the mouse position.…

    • 3299 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    NTFS is the newer filing system from Windows only Windows 2000 and higher use NTFS and FAT32. Which file system is intended primarily for use in large USB flash drives? I think it would be NTSF it a little more better an newer when it comes to the new OS out there like windows 8/7/ and maybe Vista XP just in case you have application that might run better on vista and XP. Plus since USB didn’t come out until Windows 98 well that when I first saw a USB port…

    • 462 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When addressing system performance, a key element that is often overlooked is Disk Fragmentation. Even on a brand new system with plenty of RAM and processing speed, the performance of the hard disk may be a bottleneck causing issues. It takes time to load large data files into memory - issues become particularly noticeable when dealing with movies, video clips, database files or image files which may easily be several gigabytes in size. On a freshly formatted disk, these files load fairly quickly. Over time, however you may start to notice performance issues - caused by disk fragmentation.…

    • 356 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Assignment 1

    • 2136 Words
    • 9 Pages

    Sorting, Filtering, and Paging with the Entity Framework in an ASP.NET MVC Application ................... 55…

    • 2136 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT302 assignment 5

    • 356 Words
    • 2 Pages

    d. If you want vsftpd to run in standalone mode, what do you need to set in vsftpd.conf?…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    An extra layer of authentication for the security of resources by two-step verification. The combination of any two or more veri-fication methods (password, biometrics, trusted device).…

    • 553 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    Vulnerability MS08-067 is an exposure in Server Service that could allow remote code execution in an affected system. The operating systems affected are Microsoft Windows 2000, Windows XP, and Windows Server 2003.…

    • 454 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Solution: This security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.…

    • 272 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    A. Tom has just created a new consulting company and hired five consulting rookies. Given that a rookie needs to be trained for an average of eight months before she becomes experienced, how many of the five rookies will become experienced consultants after 12 months? In your assignment solutions document, please include the model diagram, documented equations, and a graph of model behavior.…

    • 509 Words
    • 2 Pages
    Satisfactory Essays

Related Topics