Thursday, October 13, 2011

How To Format Windows XP Using A Windows XP Disc

Tugasan 5

Tugasan TTM 309

Tugasan 4

Present about operating system protection and security. Explain and recognize security policy and mechanism, authentic basic also protection concept and access control.
      definition of policy in system security is “what is allowed and what is not allowed“. And the respective mechanisms enforces policies. There are three goals of security: to prevent attackers from violating security policies, to detect attackers who are violating security policies, and to recover which stops the violation and repairs damage. The last one also includes the ability to function after being attacked.

     There are three types of mechanisms. Secure, Precise, and Broad states. In a secure state mechanism, we allow the reachable states to be within a subset of reachable state. Therefore we provide extra security in this mechanism. In a precise state, we allow reachable states to go to all the secured states. That is to say that a user is allowed to go to all secured state and the number of reachable and secured state is the same, in other words, precise. In a broad state, we allow the user to go to an unsecured state and then a set of secured state. This is the most vulnerable mechanism.

     In order to ponder on these issues we take a lot of things into consideration. We should determine the cost benefit of if it is cheaper to recover or to prevent. We should also do a risk-analysisWe should also keep the law and customs in mind, we should know if certain security measures are within the law or not, or would people even use these security measures.

Recognize security policy and mechanism.

·         In computer science, protection mechanisms are built into a computer architecture to support the enforcement of security policies. A simple definition of a security policy is "to set who may use what information in a computer system.
·    mechanism for controlling the access of programs, processes, or users the resources defined by the computer system. the protentation mechanism ensures the enforcement of a certain policy.

 Elaborate authentic basic

Password
·         A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access.

Artifact

·         In natural science and signal processing, an artifact is any error in the perception or representation of any visual or aural information introduced by the involved equipment or technique(s).
·      In computer science, digital artifacts are anomalies introduced into digital signals as a result of digital processing.
·      In microscopy, artifacts are sometimes introduced during the processing of samples into slide form. See Artifact (microscopy)

Biometric

·         Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.

Elaborate protection concept and access control

·         For your PC security suite is now available a variety of programs that promise more often than full protection from malware, with acontrol virus and malware, but also with some research andcomplex in real time. 
·     Major challenge for all manufacturers areoffering solutions that are effective yet easy to use, and if you do not require excessive resources to the system.
·     At the time all the leading manufacturers of security software suite that provides a guide as well as the traditional functions of malwaredetection and protect your PC also features accessories forprotection of data and optimization of the operating system. 
·     The concept of security was also extended to the area where this malware is not in the strict sense. But, in a sense, a proper backup data fall within the concept of security.





Tugasan TTM 309

Tugasan 2

INPUT & OUTPUT MANAGEMENT

• Managing input & output in Windows XP involves many operating system componets.
• User-mode processes interact with an enviroment subsystem and not directly with kernel-mode componets.
• The enviroment subsystem pass input & output request to the input & output manager,which interacts with devices drivers to handle such request.
• Sereval device drivers,organized into a driver stack,cooperate to fulfill an input & output request.
• The plug and play manager dynamicaly recognizes when new devices are added to the system and allocates and deallocates resources,such as input & output ports or DMA channels, to them.
• The power manger administers the operating system’s power mangement policy.
• The power policy detemines whether to power down devices to conserve energy or keep them fully powered for high responsiveness.
 Elaborate the concept of buffering 

• Buffer overflow weakness is one of the many disadvantages of this type of security computer
• Buffer overflow attacks occur when the excessive Attacker provide input on the plan on the run
• Buffee overflow results from the weakness of the programming language c, c + +, fortran, and assembly, which does not automatically check the limit input when the program is executed
• The program is so complex, sehinnga programmers themselves do not know the weaknesses of the program
• Relies on external data to control the program
• Buffer is provided at the memory allocation, such as arrays or pointers in C. in the language C and C + +, there is no automatic restrictions on buffernya, where users can write through the input buffer. For example:

int main () {
int buffer [10];
buffer [20] = 10;
}

• Program in C above is a valid program, and each compiler to compile without error
• A process is a program in execution.

Recognize spooling technique

• In computer science, spooling refers to a process of transferring data by placing it in a temporary working area where another program may access it for processing at a later point in time.
• The normal English verb "spool" can refer to the action of a storage device that incorporates a physical spool or reel, such as a tape drive.
• Spooling refers to copying files in parallel with other work.
• The most common use is in reading files used by a job into or writing them from a buffer on a magnetic tape or a disk.
• Spooling is useful because devices access data at different rates. The buffer provides a waiting station where data can rest while the slower device catches up.
• This temporary working area would normally be a file or storage device.
• The most common spooling application is print spooling: documents formatted for printing are stored onto a buffer (usually an area on a disk) by a fast processor and retrieved and printed by a relatively slower printer at its own rate.
• Spooler or print management software may allow priorities to be assigned to jobs, notify users when they have printed, distribute jobs among several printers, allow stationery to be changed or select it automatically, generate banner pages to identify and separate print jobs, etc.

• The temporary storage area to which E-mail is delivered by a Mail Transfer Agent and in which it waits to be picked up by a Mail User Agent is sometimes called a mail spool.
Tugasan 3..

Also referred to as simply a file system or file system.

• The system that an operating system or program uses to organize and keep track of files.
• For example, a hierarchical file system is one that uses directories to organize files into a tree structure.
• Although the operating system provides its own file management system, you can buy separate file management systems.
• These systems interact smoothly with the operating system but provide more features, such as improved backup procedures and stricter file protection.
File Sharing

• Sharing of files on multi-user systems is desirable
• Sharing may be done through a protection scheme
• On distributed systems, files may be shared across a network
• Network File System (NFS) is a common distributed file-sharing method

Directory Structure

• A collection of nodes containing information about all files.
• Both the directory structure and the files reside on disk.
• Backups of these two structures are kept on tapes

File Mapping

• File mapping is the association of a file's contents with a portion of the virtual address space of a process.
• The system creates a file mapping object (also known as a section object) to maintain this association.
• A file view is the portion of virtual address space that a process uses to access the file's contents.
• File mapping allows the process to use both random input and output (I/O) and sequential I/O.
• It also allows the process to work efficiently with a large data file, such as a database, without having to map the whole file into memory.
• Multiple processes can also use memory-mapped files to share data.
• Processes read from and write to the file view using pointers, just as they would with dynamically allocated memory.
• The use of file mapping improves efficiency because the file resides on disk, but the file view resides in memory.
• Processes can also manipulate the file view with the Virtual Protect function.




Tugasan TTM 309

Tugasan 1

Memory management especially the objectives and memory management concept. Elaborate on virtual memory implementation such as paging and segmentation. Explain memory relocation of paging system

Objectives Memory Management
An operating system is a program that controls the execution of application
programs and acts as an interface between the user of a computer and the
computer hardware. An operating system has three objectives as listed
below:

􀂾 Conveniency: An operating system makes a computer more
     convenient to be used.

􀂾 Efficiency: An operating system allows the computer system
    resources to be used in an efficient manner

􀂾 Ability to evolve: an operating system is constructed in such a way
    as to permit the effective development, testing and introduction of
    new system function without at the same time interfering with
    service.

Meanwhile the functions of operating system are to:

􀂾 Control the computer resources
􀂾 Program implementation
􀂾 Manage the data and information
virtual memory implementation

virtual memory is a memory management technique developed for multitasking kernels. This technique virtualizes a computer architecture's various hardware memory device (such as RAM modules and disk storage drives), allowing a program to be designed as though:
  • ·                     there is only one hardware memory device and this "virtual" device acts like a RAM module.
  • ·                     the program has, by default, sole access to this virtual RAM module as the basis        for a     contiguous working memory.
-       When the kernel detects a page fault it will generally adjust the virtual memory range of the program which triggered it, granting it access to the memory requested. This gives the kernel discretionary power over where a particular application's memory is stored, or even whether or not it has actually been allocated yet.

Segmentation
  • ·         Memory-management scheme that supports user view of memory
  • ·         A program is a collection of segments. A segment is a logical unitsuch as:
-         - main program,
-          -procedure,
-          -function,
-          -method,
-          -object,
-          -local variables, global variables,
-          -common block,
-          -stack,
-          -symbol table, arrays

PAGING
  • ·         Logical address space of a process can be noncontiguous; process is allocated physical memory whenever the latter is available
  • ·         Divide physical memory into fixed-sized blocks called frames (size is power of 2, between 512 bytes and 8,192 bytes)
  • ·         Divide logical memory into blocks of same size called pages
  • ·         Keep track of all free frames
  • ·         To run a program of size n pages, need to find n free frames and load program
  • ·         Set up a page table to translate logical to physical addresses
  • ·         Internal fragmentation


Explain memory relocation of paging system
Paging permits a program to be allocated noncontiguous blocks of memory. We divide programs into pages which are blocks of small, fixed size. We then divide the physical memory into frames which are blocks of size equal to page size. We use a page-table to map program pages to memory frames.
The page size (S) is defined by the hardware. Generally it ranges from 512 words/page to 4096 words/page.