Free Essay

Uefi

In:

Submitted By pearlpang
Words 1677
Pages 7
Assignment Title: Paper #1
Forensic Analysis of UEFI

by
Pui Yee (Pearl) Pang
Pearl.pang.py@gmail.com

By submitting this assignment I acknowledge that I have read and agree to abide by the Champlain College Academic Honesty Policy. I declare that all work within this assignment is my own or appropriately attributed. I accept that failure to follow the academic honesty policy may result in a failure grade, or expulsion from Champlain College.

Date Due: _11/4/2015___
Date Submitted:_11/4/2015__
Abstract
The Unified Extensible Firmware Interface (UEFI) Specification is an interface between the operating system (OS) and the platform firmware and is managed through the UEFI forum, a collection of chipset, hardware, system, firmware, and operating system vendors. One of many benefits of using UEFI is that it provides a more secure environment during the boot process by adding several security mechanisms such as secure boot, and update. With the added secure boot feature, the correct bootloader certification is needed and database key authentication is also required before the booting process. As a result, rootkit or other malware program have a hard time hijacking the boot process and concealing itself from the operating system. This paper will focus on the analysis of UEFI's secure boot feature and its implications and challenges for digital investigators conducting computer forensic investigation. Keywords: UEFI secure boot, boot firmware, malware, rootkit.

Introduction To meet the demands of and preference for faster and more powerful computer most users want, hard disk drive manufacturers produce disks in excess of 2 TB. Moreover, most personal computers using the legacy Basic Input / Output System (BIOS) with master boot record (MBR) only allows a maximum disk size of approximately 2.2 TB and a maximum of four primary partitions to be run (UEFI Forum, 2010). The introduction of Unified Extensible Firmware Interface (UEFI), solves the existing booting and partitioning limitations in the legacy BIOS. The 64-bit UEFI firmware allows applications in the pre-boot execution environment to use 64-bit addressing to obtain direct access to all of the machine’s memory (Simpson, 2014). UEFI also works with a new partitioning scheme called Globally Unique Identification (GUID) Partition Tables (GPT), a more flexible partitioning scheme allowing more and larger partitions instead of just four primary partitions per disk up to 2 TB in BIOS (UEFI Forum, 2010; Smith, 2012). UEFI's main role in the boot process includes 1) Execute small core block of firmware that executes first and is capable of verifying the integrity of other firmware components. 2) Initialize and test low-level hardware. 3) Load and execute additional firmware modules. 4) Select boot device, call bootloader and pass control to OS kernel. 5) Develop extensions drivers and applications (Bashun, Sergeev, Minchenkov & Yakovlev, 2013). The interface defined by the EFI specification includes data tables that contain platform information, and boot and runtime services that are available to the OS loader and the Operating System (OS). UEFI firmware provides several technical advantages over a traditional BIOS, such as flexible pre-OS environment, boot and runtime services, CPU-independent architecture, and CPU-independent drivers which include powerful security mechanisms, such as secure boot, and update, etc. (Microsoft, 2009).
Secure boot service feature analysis The secure boot defines how platform firmware manages security certificates, validation of firmware, and a definition of the interface/protocol between firmware and the operating system (Microsoft). This protocol is intended to provide access for generic authentication information associated with specific device paths by preventing the loading of drivers or OS loaders that are not signed with an acceptable digital signature. The authentication information is configurable using the defined interfaces. Successive configuration of the authentication information will overwrite the previously configured information. Once overwritten, the previous authentication information will not be retrievable (UEFI Forum, 2015).
Recent modification The first version of UEFI 2.0 was released on January 31, 2006. Version 2.1 of the UEFI specification was released on January 23, 2007. It added cryptography, network authentication and the User Interface Architecture (Human Interface Infrastructure in UEFI). The secure boot feature was not added until the UEFI version 2.2 was released on November 2, 2010. The UEFI technology is keep updating and the most current UEFI version 2.5 was released on April 2015.

Application to OS
The traditional BIOS will boot any software. Normally, BIOS boots from the boot loader. The BIOS does not know the difference between malware and a trusted bootloader, so BIOS will allow either the malware or bootloader to boot. As a result, it is easy and convenient for malware, such as a rootkit, to replace the bootloader. The rootkit could load the normal operating system with no indication that anything was wrong, staying completely invisible and undetectable to the OS. Rootkit detection is difficult because a rootkit may be able to subvert the software that is intended to find it. Detection methods include using an alternative and trusted operating system, behavioral-based methods, signature scanning, difference scanning, and memory dump analysis. Removal can be complicated or practically impossible, especially in cases where the rootkit resides in the kernel (UEFI Forum, 2015). Secure boot is a feature of UEFI 2.2 requiring the operating system that is attempting to load to have a valid certificate (UEFI Forum, 2010). The secure boot feature is to sign executables using a public key cryptography scheme, called Trusted Platform Module (TPM). The public part of a Platform Key (PK) can be stored in the firmware for use as a root key. Additional Key Exchange Keys (KEK) can also have their public portion stored in the firmware called the signature database (db). That database contains public keys that can be used to verify different components that might be used by UEFI as well as bootloaders, and operating systems that get loaded from external sources, such as a USB drive or network. The signature database is meant to contain the current list of authorized and forbidden keys as determined by the UEFI organization (Edge, 2011). When secure boot is enabled, it is initially placed in "setup" mode, which allows a PK to be written to the firmware. Once the key is written, secure boot enters "User" mode, where only drivers and loaders signed with the PK can be loaded by the firmware. Additional KEK can be added to a database stored in memory to allow other certificates to be used, but they must still have a connection to the private portion of the PK secure boot. Ultimately, the PK is required to authenticate the ownership during the booting stage, while KEK are required to authenticate other components, such as OS (Edge, 2011). Unlike BIOS, UEFI will check the bootloader certificates before launching it and to ensure it is signed properly. If a rootkit or another malware program does replace the bootloader, UEFI won’t allow it to boot. UEFI prevents malware from hijacking the boot process and concealing itself from the operating system (UEFI Forum, 2015).
Relevant forensic implications Computer forensic examiners are told to image a subject's computer by pulling the plug, and removing the hard drive, or conducting a live imaging at the crime scene. Currently, one option for acquiring an image of a computer drive includes booting the subject machine into a controlled boot environment using software such as Raptor, or Windows FE (SWGDE). However, UEFI implementation creates one or more challenges to the forensic imaging and analysis process for digital examiners because of the following reasons (SWGDE):
1) UEFI restrict booting from media not native to the subject machine, thereby preventing the use of forensic boot environments.
2) Full disk encryption in conjunction with a TPM, which binds the hard drive to the computer in which it is installed. If UEFI boot restrictions limit the digital forensic examiner to conducting live acquisition, the following methods should be used:
Physical acquisition. Remove the hard drive and image it externally.
Logical acquisition. Image the media while the OS is running.
Compatible environment acquisition. Boot to a UEFI compatible boot environment and extract data from there.
Conclusion
The added secure boot functionality created by UEFI provides a more secure environment than the traditional BIOS to computer by avoiding a rootkit or other malwares to be easily installed by attackers, who ultimately want to gain unauthorized administrator access to the system. However, it also creates complications for digital examiners because added authorization and certification are needed, and UEFI restricts booting from media not native to the subject machine.

Reference
Bashun, V., Sergeev, A., Minchenkov, V. & Yakovlev, A. (November, 2013). 2013 14th Conference of Open Innovations Association Finnish-Ruissian University Cooperation in Telecommunications (FRUCT). pp.16-24. doi:10.1109/FRUCT.2013.6737940.
How to Geek (HTG). How Window 8's Secure Boot Feature Works & What It Means for Linux. Retrieved from http://www.howtogeek.com/116569/htg-explains-how-windows-8s-secure-boot-feature-works-what-it-means-for-linux/
Microsoft. (2009). UEFI and Windows. Retrieved from https://technet.microsoft.com/en-us/library/hh824898.aspx
Microsoft. (2015). Protecting the pre-OS environment with UEFI. Retrieved from http://blogs.msdn.com/b/b8/archive/2011/09/22/protecting-the-pre-os-environment-with-uefi.aspx
Scientific Working Group on Digital Evidence (SWGDE). (February, 2014). SWGDE UEFI and its Effect on Digital Forensics Imaging. Retrieved from https://www.swgde.org/documents/Current%20Documents/2014-02-06%20SWGDE%20UEFI%20Effect%20on%20Digital%20Imaging%20V1
Simpson, G. (January, 2014). UEFI Momentum – The AMD perspective. AMD.
Smith, R. (July, 2012). Make the most of large drives with GPT and Linux. IBM. Retrieved from http://www.ibm.com/developerworks/library/l-gpt/l-gpt-pdf.pdf
UEFI Forum (2010). FAQ: Drive Partition Limits. Retrieved from http://www.uefi.org/sites/default/files/resources/UEFI_Drive_Partition_Limits_Fact_Sheet.pdf
UEFI Forum. (November, 2010). Unified Extensible Firmware Interface Specification. Version 2.2.D Retrieved from http://www.uefi.org/sites/default/files/resources/UEFI_Spec_2_2_D.pdf
UEFI Forum. (April, 2015). Unified Extensible Firmware Interface Specification. Version 2.5. Retrieved from http://www.uefi.org/sites/default/files/resources/UEFI%202_5.pdf

Similar Documents

Free Essay

Uefi Shell Specification

...UEFI Shell Specification September 25, 2008 Revision 2.0 The material contained herein is not a license, either expressly or impliedly, to any intellectual property owned or controlled by any of the authors or developers of this material or to any contribution thereto. The material contained herein is provided on an "AS IS" basis and, to the maximum extent permitted by applicable law, this information is provided AS IS AND WITH ALL FAULTS, and the authors and developers of this material hereby disclaim all other warranties and conditions, either express, implied or statutory, including, but not limited to, any (if any) implied warranties, duties or conditions of merchantability, of fitness for a particular purpose, of accuracy or completeness of responses, of results, of workmanlike effort, of lack of viruses and of lack of negligence, all with regard to this material and any contribution thereto. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." The Unified EFI Forum, Inc. reserves any features or instructions so marked for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. ALSO, THERE IS NO WARRANTY OR CONDITION OF TITLE, QUIET ENJOYMENT, QUIET POSSESSION, CORRESPONDENCE TO DESCRIPTION OR NON-INFRINGEMENT WITH REGARD TO THE SPECIFICATION AND ANY CONTRIBUTION THERETO. IN NO EVENT WILL ANY AUTHOR OR DEVELOPER OF THIS...

Words: 35960 - Pages: 144

Free Essay

Nt1110 Unit 7 Research Paper 1 Uefi Bios.Docx

...Unit 7 Research Paper 1: UEFI BIOS 1. UEFI BIOS - is a specification that defines a software interface between the operating system(s) and the platform's firmware. In the mid 90s Intel was creating a new processor architecture that was 64-bit, but wasn't backwards-compatible with the old x86. This architecture was the Itanium 64. Because the IA-64 only supports 64-bit instructions, the PC BIOS couldn't be used, therefore Intel developed the EFI specification. Later on this specification was managed (and still is) by the UEFI board, an association of several companies such as AMD, Microsoft, Intel, Apple and so on. History - UEFI is actually an extension of the original Extensible Firmware Interface developed by Intel. They developed this new hardware and software interface system when they launched the ill-fated Itanium or IA64 server processor lineup. Because of its advanced architecture and the limitations of the existing BIOS systems, they wanted to develop a new method for handing off the hardware to the operating system that would allow for greater flexibility. Because the Itanium wasn't a huge success, the EFI standards also languished for many years. In 2005, the Unified EFI Forum was established between a number of major corporations that would expand upon the original specifications developed by Intel to produce a new standard for updating the hardware and software interface. This includes companies such as AMD, Apple, Dell, HP, IBM, Intel, Lenovo and Microsoft...

Words: 321 - Pages: 2

Free Essay

Yeah

...H61M-VGS R2.0 / H61M-VS R2.0 User Manual Version 1.0 Published September 2011 Copyright©2011 ASRock INC. All rights reserved. 1 Copyright Notice: No part of this manual may be reproduced, transcribed, transmitted, or translated in any language, in any form or by any means, except duplication of documentation by the purchaser for backup purpose, without written consent of ASRock Inc. Products and corporate names appearing in this manual may or may not be registered trademarks or copyrights of their respective companies, and are used only for identification or explanation and to the owners’ benefit, without intent to infringe. Disclaimer: Specifications and information contained in this manual are furnished for informational use only and subject to change without notice, and should not be constructed as a commitment by ASRock. ASRock assumes no responsibility for any errors or omissions that may appear in this manual. With respect to the contents of this manual, ASRock does not provide warranty of any kind, either expressed or implied, including but not limited to the implied warranties or conditions of merchantability or fitness for a particular purpose. In no event shall ASRock, its directors, officers, employees, or agents be liable for any indirect, special, incidental, or consequential damages (including damages for loss of profits, loss of business, loss of data, interruption of business and the like), even if ASRock has been advised of the possibility of such damages...

Words: 10792 - Pages: 44

Free Essay

Tecnology

...cellular network that is provide though a mobile operator allowing access to the public telephone network. The new modern telephone supports a side variety of other services such as text messaging MMS, email, internet access, short range wireless communications infrared, Bluetooth, and various other applications. Two engineers with Intel’s Software and Solutions Group describe the benefits of the UEFI pre boo software t mobile and embedded devices. The Unified Extensible Firmware Interface specifications are meant to facilitate emerging technologies, services, security mechanisms, and user experiences that come into play prior to loading the device’s OS. It was designed to allow for cross functionality between devices, software, and systems, unified Extensible Firmware Interface specifications encourage innovation, and helping to drive the evolution of the next generation technologies, such as the expansion of embedded and non pc systems. The UEFI provides a plurality of services, including console, storage, and networking services. Hosted and implemented by the UEFI Forum, this technology enables firmware innovation by promoting a standardized, extensible, and interoperable firmware interface that extends far beyond the PC and into the future of computing and the realm of embedded systems. Systems were analog or simple state, machine based platforms using SSI, MSI, or PLDS. The microprocessor ushered in a wave of continual evolution, demonstrated by the embedded...

Words: 602 - Pages: 3

Premium Essay

P1 Unit 18 Essay

...require a constant source of power to preserve information. The chip therefore is non-volatile. It is used to store ‘firmware’ also known as the start-up instructions. Unlike other flash-based memory, ROM doesn’t erase information when the power is turned off, causing it to be favoured by many computers companies, as it is seen as more reliable. BIOS/UEFI: These are both classed as firmware (permanent software programmed into a read-only memory) however, UEFI is now primarily used in modern computer and devices. This is due to BIOS (Basic Input-Output Software) being outdated due to it having serious limitations such as: it can only boot drives less than 2.1TB. This is a major inconvenience as 3TB drives are now very common. This in normally caused because of how the BIOS’s Master Boot Record system works. Whereas, any drive 9.4 zettabytes or lower can be booted via the modern, and highly improved UEFI (Unified Extensible Firmware Interface). UEFI can run in 32-bit or 64-bit mode, compared to BIOS’s 16-bit mode. This provides more addressable address space than BIOS which means boot processes are carried out faster. Therefore, UEFI is used much more due to its less time consuming processes. SATA/IDE/Master and Slave Drive: SATA (Serial Advanced Technology Attachment) and IDE (Integrated Drive Electronics) are different types of interfaces to connect storage devices to a computer’s system bus, such as a hard drive. SATA has many advantages compared to IDE, for instance: Inexpensive...

Words: 781 - Pages: 4

Free Essay

Cs250

...User Guide Lenovo UEFI Diagnostics for Think and Idea Version 02.04.01 Revision History Revision 1 2 3 4 Date July 15, 2011 July 29, 2011 October 20, 2011 December 7, 2011 Description of changes Initial Version Updated to Sprint 5 Updated to Sprit 9 Updated with information about pop-up displayed after some failure is detected at Storage Device Test Document for Gold Version Document for version 2.00.00 PCI Express images added for version 2.00.00 Updated for release 02.00.01 Updated for release 02.00.02 Updated for release 02.01.01 Updated for release 02.01.01 Updated for release 5 6 7 8 9 10 11 12 January 6, 2012 July 25, 2012 August 3, 2012 August 16, 2012 September 21, 2012 April 05, 2013 April 30, 2013 April 7, 2014 1. 2. 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 2.10 2.11 2.12 2.13 2.14 2.15 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Summary Objective ............................................................................................................................................. 6 Executing and testing .......................................................................................................................... 6 Installation .................................................................................................................................. 6 Executing ...................................................................................... Error! Bookmark not defined. Interface ..........................................................

Words: 11995 - Pages: 48

Free Essay

Term Paper

...Disable UEFI and Enable Legacy Boot unlike past PCS, which would let you access the BIOS at startup, you'll need to first enable Advanced Startup Mode. STEP 1 Open Settings by going to the Charms Bar and clicking on the Gear icon. STEP 2 Go to "Change PC Settings" at the bottom right corner of the screen, below the icons. On the left, scroll down and select "General Settings." On the right, scroll down through the settings options to find "Advanced Options." STEP 3 This will close out of the standard Metro interface and open up a blue screen with several tiles. Select "UEFI Firmware Settings"—you may need to first select "Tools and Settings" and then "Advance Options"—and then follow the prompt to restart and change settings. STEP 4 Upon rebooting, the system should produce a startup menu. Select "BIOS setup." Under the "System Configuration" tab, find "Boot Options." (In some instances, Boot Options will instead be found under the "Security" tab.) STEP5 Once into the Boot Options menu, you will first find "Secure Boot" and disable it. Still in the Boot Options menu, find "Legacy Boot" and change it to enabled. You will now be able to boot into your ASD. Depending upon whether you will be installing it from a disc or a USB key, you will want to change the Legacy Boot Order so that either the optical drive or USB device take priority. Finally, exit the BIOS, saving changes. Note: For simplicity purposes choose optical drive as option 1, then USB device as option 2 STEP...

Words: 295 - Pages: 2

Free Essay

Msi Corporate Stable Model

...Graphical User Interface World’s first PCI-E Gen 3 Support OC Genie II – Accelerated Performance 4x DIMM DDR3 1066/1333/1600MHz Support (up to 32GB Max) 1x PCI-E x16 (Gen3), 1x PCI-E x16 (Gen2), 2x PCI-E x1 2x SATA III, 4x SATA II, 4x USB 3.0, 10x USB 2.0, Gbt LAN, RAID, 7.1 HD Audio H61M-P31/W8 INTEL H61 CHIPSET (G3 STEPPING) Supports Intel 2nd and 3rd Generation Core i3/i5/i7/Pentium/Celeron LGA1155 processors / H61 Express Chipset Intel HD Graphics Outputs (DVI/D-Sub) for digital signage w/ DirectX 11 ClickBIOS Concept – Next-generation UEFI support World’s first PCI-E Gen 3 Support 2x DIMM DDR3 1066/1333MHz Support (up to 16GB Max) 1x PCI-E x16 (Gen3), 1x PCI-E x1 4x SATA II, 10x USB 2.0, Gbt LAN, HD Audio A55M-P33 AMD HUDSON D2 CHIPSET Supports AMD A8/A6/A4/E2 FM1 socket processors / Hudson D2 Chipset AMD Dual Graphics Technology support for digital signage w/ DirectX 11 ClickBIOS Concept – Next-generation UEFI support 2x DIMM DDR3 1066/1333/1600MHz Support (up to 16GB Max) 1x PCI-E x16 , 1x PCI-E x1, 1x PCI 6x SATA II, 12x USB 2.0, Gbt LAN, RAID, HD Audio MSI Computer Corp. 901 Canada Court, City of Industry, CA 91748 us.msi.com MSI CORPORATE STABLE MODEL 1 YEAR SUPPLY GUARANTEED + ADVANCED RMA SERVICE MSI Corporate Stable Models are automatically covered upon purchase....

Words: 1026 - Pages: 5

Premium Essay

Preparing a Company-Wide Migration to Windows 8

...Assignment 1: Preparing a Company-Wide Migration to Windows 8 George Kelly Professor Raymond Schafer Administering Desktop Clients June 11, 2015 I would like to take this time to thank Chief Financial Officer and the Chief Information Officer for taking some time in their busy operation schedule to listen to my report. This report was created to address the concerns they have with the possibility of migrating from Windows 7 to the Windows 8 operating system for their company. This proposed change will affect the entire company and how it operates on a day to day basis. The Company Crescent Manufacturing is known as a luxury leader in the world of crafted home furnishings. The company is comprised of three different locations. First there is the Texas division that has 250 employees and this is structured as the corporate headquarters. Secondly, there is the location in Maryland with has 175 employees and this location is comprised of an operation component, a small IT department and the company’s human resources department. Lastly is the division that is located in Nebraska with 25 employees and this location is primarily a manufacturing plant that is staffed by production line employees, a line supervisor and a plant manager. Each of the individual location has specific needs that vary from the others and this report will cover how to handle those needs and how they will affect the company as a...

Words: 2546 - Pages: 11

Free Essay

Error Codes

...Synchronous dynamic random access memory (SDRAM) - is dynamic random access memory (DRAM) that is synchronized with the system bus. Classic DRAM has an asynchronous interface, which means that it responds as quickly as possible to changes in control inputs. SDRAM has a synchronous interface, meaning that it waits for a clock signal before responding to control inputs and is therefore synchronized with the computer's system bus. The clock is used to drive an internal finite state machine that pipelines incoming commands. The data storage area is divided into several banks, allowing the chip to work on several memory access commands at a time, interleaved among the separate banks. This allows higher data access rates than an asynchronous DRAM. Single in-line memory module random access memory(SIMMRAM) - is a module containing one or several random access memory (RAM) chips on a small circuit board with pins that connect to the computer motherboard. Dynamic random-access memory (DRAM) - is a type of random-access memory that stores each bit of data in a separate capacitorwithin an integrated circuit. The capacitor can be either charged or discharged; these two states are taken to represent the two values of a bit, conventionally called 0 and 1. Since even "nonconducting" transistors always leak a small amount, the capacitors will slowly discharge, and the information eventually fades unless the capacitor charge is refreshed periodically. Because of this refresh requirement...

Words: 1906 - Pages: 8

Premium Essay

Windows8

...Particularly  in Windows 8 your entire PC is cloud-connected. You’ll have new Mail, Calendar,Microsoft SkyDrive, Photos, People, and Messaging apps that are connected to the services you use, just by adding them to your Microsoft account. Windows 8 introduces significant changes to the operating system's platform, primarily focused towards improving its user experience on mobile devices such as tablets to rival other mobile operating systems (such as Android and iOS),taking advantage of new and emerging technologies (such as USB 3.0, UEFIfirmware, near field communications, cloud computing, and the low-power ARM architecture), new security features (such as malware filtering, built-in antivirus software, and support for secure boot, a controversial UEFI feature which requires operating systems to be digitally signed to prevent malware from infecting the boot process), along with other changes and performance improvements. Windows 8 also introduces a new shell and user interface based on Microsoft's"Metro" design language, featuring a new Start screen with a grid of dynamically updating tiles to represent applications, a new app platform with an emphasis on touchscreen input, the new Windows Store to obtain and purchase applications for the system, and the ability to synchronize programs and settings between multiple devices. Microsoft began an advertising campaign centered around Windows 8 and its Surface tablet in October 2012, starting with its first television advertisement premiering...

Words: 931 - Pages: 4

Free Essay

Win 8 Install, Boot from Usb

...Here's How: Create an ISO file from the Windows 8 DVD. This is the procedure by which you create a single file, called an ISO image, that contains all the data stored on the Windows 8 setup DVD disc. Once you have an ISO image created from your Windows 8 disc, come back here and continue on with this tutorial which will explain how to get that ISO file onto a flash drive. Note: If you already know how to create ISO files with your favorite program, often called "ripping," then do so in whatever way you're used to doing it. However, if you've never created an ISO image, or don't have a program installed right now that does it, please see the linked tutorial above for complete instructions on doing so with a free program. Download the Windows 7 USB/DVD Download Tool from Microsoft and then install it. This free program from Microsoft properly formats your flash drive and then copies the contents of the Windows 8 installation ISO file you have to that flash drive. Note: Don't worry that this program has Windows 7 in the title. This program works perfectly well with Windows 8 ISO files and can be installed in Windows 8, Windows 7, Windows Vista, or Windows XP. Start the Windows 7 USB DVD Download Tool program. You should be able to find the shortcut on the Desktop, as well as in your Start menu or on your Start screen, depending on which version of Windows you installed the program on. Click Browse on the Step...

Words: 946 - Pages: 4

Premium Essay

Computer Analysis

...Windows 7 Home Computer Analysis Instructor: Hubert Huynh Course: NT1230 March 23, 2013 Presented By: Cuneo, Thomas My personal computer is a Toshiba Satellite M984. The motherboard, for starters, is an Asus P8Z68-V, Intel based with the new UEFI Bios standard, USB 3.0 and SATA 6. The board also supports Quad-SLI and Quad-Cross fire X. I am a poor gamer so my GPU setup is a humble GeForce 670 GTX single solution. The board also supports memory up to 2200 O.C. I have 16GB of 1600 memory, Patriot Brand High End. My CPU of course is Intel stock quad processor around the 2.8 Core i5. The hard drive setup is pretty cool; Western Digital Veloci Raptor 750GB (10,000 RPM) for my main drive (Drive C) and then a 1 Terabyte Western Digital followed by yet another Segate 700 GB drive. My case has two hot swap docking bays for laptop size hard drives or SSD drives so I have two laptop style hard drives on board with about 160GB per unit. Then I have two optical drives, LG DVD-R,RW 24x. No Blue-Ray burner yet, yet! My sound card is a Creative Labs SoundBlaster X-Fatality. Powering it all is a Zantec 1100 watt Power Supply. My case of course is a full tower unit, made by Antec. There are 10 cooling fans, all red LED throughout the case, not including the cooler I have attached to the CPU which is a Zantec all copper high fin sealed cooler. The case has a top mounted hot swap docking bay but can only support either a SSD or laptop drive. The side of the case has...

Words: 701 - Pages: 3

Premium Essay

Nt1310 Unit 4 Lab 1

...After this open the boot menu to the disk and then select the UEFI. When your PC restart you can press prompted key to boot from the installation media. Press any key. Step # 3: You will see this type of loading on your laptop or pc with the rotating bar on screen. Then wait for a little time. Step # 4: Then you will see follow things on the screen, where you can slect your preferred language, time and keyboard settings. Choose your setting and go for next button. Step # 5: Then you ust click on install button to start installation of your windows 8.1. But you must wait for a little time for it to began. Step # 6: Now you just have to enter the windows 8.1 product key. But make sure you enter right product key because it...

Words: 730 - Pages: 3

Free Essay

Software Implementation Paper

...Internal Hardware upgrade to meet IT solution IFSM 310 SECTION Winston Compton 16 April 2016 Background As a Senior IT Specialist & Systems Analyst, some of my responsibilities are to interpret customer demands through provided business requirements and provide service needed with the right specifications. Also Develop design specifications for major components of an IT solution. Finally, as a senior member I need to be able to coordinate with other entities to provide individual components of IT developmental efforts. As a senior member of Upton, Martin Ulysses, & Clapper (UMUC) financial analysis firm specializing in conducting independent economics and market assessment for banks, insurance companies, mortgage lender, and government regulatory agencies, I have been tasked to refreshed 35 personal computer desktops. The Senior Manager of Revolving Debt Analysis has laid out for me the attributes for the new PCs. The new PCs will need to be able to run complex calculations based on statistical models that uses large amounts of data. Purpose of This Report The UMUC financial analysis firm is a medium sized firm utilized by many clients for market assessments, insurance queries, mortgage lenders, and other government regulatory agencies. In order to meet demands the firm is in dire need of an upgrade. The purpose of this report will identify the new components required to upgrade the 35 desktops to be able to perform the required IT solution attribute...

Words: 1552 - Pages: 7