Premium Essay

NT1330 Unit 5 Essay

Submitted By
Words 1336
Pages 6
1. Deleting files accidentally
The top risk of losing data is deleting files or parts of texts without having any backups available. Updating files or deleting them are very common activities and we do them almost every day. No wonder if we accidentally delete wrong files or overwrite the parts we did not intend. Many people have told me that losing information during everyday work is so natural that they do not even perceive it as real risk any more. We often lose data simply because we do not have proper workflow procedures and backup strategies. More efficient procedures for saving our work and making backups regularly will definitely save a lot of time for us. 2. Viruses and damaging malware
There are numerous new viruses which attack computers every day. Being connected to worldwide network has many advantages; however, it opens computers to …show more content…
Average laptop does not have extra covers to protect internal parts from getting soaked. Liquids cause short circuit of important electronic components and they are really hard to recover afterwards. Hard drives are usually placed in protective case and may be still used after getting a little wet. However, harder soaking makes hard drives inaccessible, too. Sometimes the tiny details, like having sugar in coffee, may make a real difference. Do not let your life depend on such random things! Another risk of the same category is dropping computer into water. It does not really matter, whether you were careless by the pool or got hit by a disaster, like flooding or tsunami. If your computer is completely immersed into water, it is really hard to fix anything afterwards. Maybe visiting a repairman really quickly can save some parts of your otherwise useless computer. Also, if computer was not switched on at the moment of falling into water, the damage may be less

Similar Documents

Premium Essay

Nt1330 Unit 5 Essay

...to send Information and to get reply between two computers A and B. The clock setting for A is T and B sets the time to T + t/2. Due to the use of local network by other computers the procedure may subject to inaccuracy. There might be delay in processing the messages in the operating systems of A and B. For a local network, the accuracy is probably within 1 ms For a large number of computers, one computer should be nominated to act as the time server and it should carry out Cristian’s protocol with all of them. The protocol can be initiated by each in turn. Additional inaccuracies arise in the Internet because messages are delayed as they pass through switches in wider area networks. For a wide area network the accuracy is probably within 5-10 ms. 1.3 Consider the implementation strategies for massively multiplayer online games as discussed in Section 1.2.2. In particular, what advantages do you see in adopting a single server approach for representing the state of the multiplayer game? What problems can you identify and how might they be resolved? Ans: In this single server acts as centralized server. It is accessed by client programs running on consoles. Single server helps in management of virtual world and eases consistency concerns. It ensures fast response by optimizing network protocols and instant response to the incoming events. Here the load is divided and allocated to particular computers within the cluster, with highly loaded star. Incoming events are sent to the...

Words: 497 - Pages: 2

Premium Essay

Nt1330 Unit 5 Essay

...1. 1. MD5 weaknesses/Creating a rogue CA certificate è The first article mostly talks about the weakness of MD5 hashing algorithm by giving a couple of examples that why MD5 is easy to break. The first example was Microsoft’s windows update. The flame espionage malware created a counterfeit certificate based on the same MD5 hash then computers starts to download malwares instead of updates using the legitimate credential. This is how it was easy to spread over millions computers using Windows operating system. Since then Microsoft started to use SHA1 instead but this is also believed to be broken in near future. Second example was stating that there were two images with one MD5 hash. This could be done by adding near collision blocks repeatedly until the two hashes become the same. This is the main flaw of MD5 which is MD5 collision. One reason that we need to pay attention to this problem is that this could be done within ten hours using Amazon Web Service paying only $0.65 plus tax. These examples convinced people why we should not use the MD5 hash for encryption. From my own research shows that SHA 256/512 is the most popular one for encryption today. Second article is about a report from a group of security experts succeeded to create a rogue CA certificate that can be trusted from all common web browsers. This is done by using the defect of MD5 hash. They did the project to reveal the realistic security problems resulted from some certificate authority that still...

Words: 1129 - Pages: 5

Premium Essay

Fsmo Role Ayer Nate Method

...Sole's Blog SOLVE YOUR IT PROBLEMS FASTER, SAVE YOUR FEET AND GET MORE TIME ON YOUTUBE! * HOME * * ABOUT SOLE VIKTOR * * USEFULL LINKS « How to publish a website with both Anonymous and Forms Based Authentication in ISA 2006 How to configure ISA 2006 with FBA for OWA and NTLM for Outlook Anywhere and Autodiscover in Exchange 2007 » How to place FSMO and Global Catalog roles in Active Directory During installation of Active Directory on a Windows Server 2000/2003/2008 all FSMO roles will automatically be installed on the first server. But Best Practice dictates to move some of theese Flexible Single Master of Operation (FSMO) roles to seperate servers. If you only have one domain controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master...

Words: 10360 - Pages: 42