Preview

OSX Vs. Windows Case Study

Good Essays
Open Document
Open Document
1231 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
OSX Vs. Windows Case Study
The purpose of an MD5 checksum utility is to verify the hashes of ISO images that have been downloaded from the internet. The reason for doing such a task is you (user) to know that the downloaded image has not been tampered or changed in any way. Usually many websites that provide a software will have a hash shown for you to compare these hashes once you have downloaded the image. This leads you to know that the software is safe to install on your computer without the fear of viruses, worms, etc that can affect your computer.
On the contrary, these utilities or small programs are not usually installed on the system out of the box and are not solely to check for ISO images. There may be certain files you may want to check to make sure during
…show more content…
The user can conclude the image is safe to install on their windows machine without the fear of damaging their device. Using the windows version, I can for sure say is a little complicated compared to the OSX version.

OSX vs Windows

When comparing both of these operating systems, both of them have their pros and cons. I can say with certainly that the OSX is much easier to perform this operation. You are not required to install a separate program and can easily be used using “disk utility” or through the command line by typing “md5” with a space and the path for the file you are checking. If you wanted to use SHA1 you would use the command “shasum” followed by a space and the path for the file. However, by default both applications use MD5. Windows does not allow the user to perform checksum without downloading a separate application that can run through the command line. In command line, you would type “fciv.exe” followed by the name of the file NOT the path unless you use the command “-add” followed by the path or directory. In windows, you have to work a little more to perform this operation, but is a not a complete deal breaker.

MD5 in Incident
…show more content…
Many businesses have weak policies or procedures that cover how to respond when they are attacked, leaving them in denial when their information has been corrupted or stolen. According to an article from TechTarget says, “Incident preparation helps enterprise maintain control and efficient responses during chaotic incident response moments.” They further explain in the article the numerous steps to take in preparation from an attack. So, a good way MD5 checksum could come in handy is when you establish a baseline. In order to do this is by performing an inventory of all critical system files and obtaining their MD5 checksums. After an incident occurs, you validate the data by comparing the hash values and see if the data’s integrity is still the same. You can see why MD5 can be a good percussion to do if an attack was to

You May Also Find These Documents Helpful

  • Good Essays

    Click ‘File’. Click ‘Create checksum files’. Select the original file and click ‘Open’. Then we got a checksum file which contains the checksum in it.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Is418 Lab8

    • 309 Words
    • 2 Pages

    List and explain at least 3 switches available with the tar command that can be useful in extracting and installing a tarball…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Verify the integrity of the output of common cryptographic and hashing tools to determine whether an encrypted message is legitimate or whether it has been modified…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    4.) Windows Preinstallation Environment (also known as Windows PE and WinPE) is a lightweight version of Windows used for the deployment of PCs, workstations, and servers, or troubleshooting an operating system while it is offline.…

    • 2058 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    only operate in a Windows operating system, which is a Microsoft system. When the early…

    • 500 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    • User State Migration Tool (USMT) Microsoft Deployment Toolkit (MDT) 2010 • Superset of Windows 7 AIK for enterprise network deployments • Two types of deployments: – Lite-touch installation (LTI) – Zero-touch installation (ZTI) Enterprise Deployment Scenarios • New computer • Upgrade computer • Replace computer • Refresh computer MDT 2010 Deployment Workbench Interface • Creates task sequences • Includes answer files and additional tasks • Can perform tasks before and after Windows 7 installation Windows Deployment Services (WDS) • Included in Windows Server 2008 • Used to deploy Windows imaging files over the network • Network must support: – Dynamic Host Configuration…

    • 943 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Sysprep.exe is the main program that calls other executable files that prepare the Windows installation. Sysprep.exe is located in the %WINDIR%\system32\sysprep directory on all installations. Sysprep must always be run from the %WINDIR%\system32\sysprep directory and must run on the version of Windows with which it was installed.…

    • 2287 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    3. A typical home computer user would require RAID technology if they use their computer as a home office and have data that is invaluable or irreplaceable. The option is becoming more popular because of the speed increase, and or data reliability you achieve when you set RAID up. A typical business user would use RAID to provide data redundancy, fault tolerance, increased capacity, and increased performance. Data redundancy protects the data from hard drive failures. This benefit is good for companies or individuals that have critical or important data to protect, or just anyone that's paranoid about losing data. Fault tolerance goes hand in hand with redundancy in providing a better over-all storage system. RAID also provides increased capacity by combining multiple drives.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    MD5sum is a one-way has function that has a 128 bit has for the input. SHA1sum processes up to 512 and adds padding. Sha1sum is better because padding is added to ensure the right numbers.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    and download its to your computer which this file are safe and virus free. You can read this…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    and download its to your computer which this file are safe and virus free. You can read this…

    • 1400 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Linux Chapter 2

    • 288 Words
    • 2 Pages

    When you download the SHA1SUMS file, SHA1 is included. This file is useful in determining of the ISO image file that you downloaded was correct. When you use the utility, sha1sum generates a number based on the file. If the number matches the corresponding number in the SHA1SUMS file, the download is correct.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I confirm that the evidence within this workbook has been assessed against the assessment criteria for this unit and had judged for validity, authenticity, currency, reliability and sufficiency.…

    • 1133 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    IS4560 Hacking

    • 675 Words
    • 2 Pages

    2. Scrutinize SSL certificates signed by certificates using MD5 algorithm. Users may wish to manually analyze the properties of web site certificates that are signed by signing certificates using the MD5 algorithm. The procedures for accessing certificate details differ depending on the software in use but the signature algorithm is…

    • 675 Words
    • 2 Pages
    Good Essays
  • Good Essays

    5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why? The difference between MD5sum and SHA1sum is that MD5: 128-bit/16-byte digest. Somewhat faster than SHA and SHA: 160-bit/20-byte digest. So SHA is more secure.…

    • 392 Words
    • 2 Pages
    Good Essays