Q&A : Review –The Windows Basics -Part 1


Greetings!!

Its mandatory to have an awarness about windows features while we deal with repackaging of applications.Hope this section will help you to review windows basics.

1.What is EFS
The EFS component permits encryption of folders and files. When a folder or file is encrypted, an encryption certificate and a private key are generated that are used later to perform the decryption. EFS is a particularly valuable feature for mobile systems where confidential data may be at risk should the computer be lost or stolen. EFS can be used whether the computer operates as a stand-alone system or participates on a network as a member of an Active Directory domain.
2.What is PKI
Public Key Infrastructure (PKI)
Public key cryptography is an important security mechanism for protecting Internet, intranet, and e-commerce data. PKI provides an integrated set of tools and services for support of public key-based applications.

3.What is Kerberos
Kerberos is the default network authentication program for computers running in Windows platform.
4.What is Smart Card?
Smart cards are credit card-sized electronic cards that can provide tamper-resistant, highly portable storage for digital identification and credentials.
5.What is VPN?
Virtual Private Networks (VPNs)
VPNs allow Windows clients to use the Internet to create secure paths or pipelines over the Internet to their corporate local area networks (LANs).
VPN technology is especially useful in mobile computer applications because it enables users to dial into most local Internet Service Providers (ISPs) and set up a secure VPN session with their corporate LAN over the Internet.
This can significantly reduce long-distance dial-up charges. Windows 2000 supports key VPN tunneling protocols including the Point-to-Point Tunneling Protocol (PPTP), Layer Two Tunneling Protocol (L2TP), and Internet Protocol Security (IPSec).
6.What is Group Policy
Group Policy is a Windows Server utility that enables system administrators to customize and define rules for many aspects of a client computer user’s environment. By defining security settings, software installation options, desktop settings, and other resources, system administrators can create standard system configurations for specialized groupings of users and computers. Benefits for client systems include time and cost savings associated with system uniformity and automated software installation and updates.
7.What is Intellimirror
IntelliMirror management technologies are a collection of features on a Windows server that permits Windows clients to mirror user data, transparently install or repair application programs, and store customized OS settings on Windows servers. IntelliMirror has the following main features.
.User Data Management
.User settings management
.Software installation and maintenance
8.What is MMC
Microsoft Management Console (MMC)
Designed for system managers running Windows clients, MMC is an extensible console framework that provides a common environment for specialized management applications called snap-ins . Snap-ins are ActiveX® controls that provide system management functions or behaviors that system and network administrators can combine to create many types of administration tools. As the primary management host for Windows, MMC provides a single interface for many client and server management tools.
9.What is Synchronization Manager
The Synchronization Manager lets users synchronize various resources. From the Items to Synchronize window, users can set the Synchronization Manager to automatically synchronize files, folders, e-mail, and off-line Web pages every time they log on or off of the network. Synchronization Manager synchronizes only the resources that have changed or have been updated since the last synchronization process.
10.What is WFP
Windows File Protection (WFP)
The WFP feature (also available in Windows Me as System File Protection [SFP]), safeguards against core-system file corruption during application program installations. It prevents the replacement, corruption, or deletion of protected system files by verifying the source and version of a system file before it is installed. Digital signature technology is also used to verify the correct version of the file(s) to be installed.
11.What is Driver Signing and Authentication
Driver authentication is an integrated process in Windows. All device drivers are required to pass rigorous tests for stability before they can be issued a signature. Users can specify strict validation policies to prevent the installation of unsigned drivers or drivers whose validity cannot be authenticated.
12.What is the use of Multiple User Profiles?
Windows supports multiple user profiles on the same machine. This feature protects one user’s data from being viewed by an unauthorized user. In a work environment, administrators can configure computers such that users have their own protected sets of data, application programs, and preferences.
13. What is AutoComplete and AutoCorrect features of IE?
These features help to reduce the need to repeatedly enter information into the browser.
14.what is Internet Connection Sharing (ICS)
This feature allows multiple PCs in home networks or small office networks to share a single dial-up or broadband connection to the Internet. A single Windows 2000 Professional client connected to the Internet can provide Internet connectivity for up to 10 additional Transmission Control Protocol/Internet Protocol (TCP/IP) clients, regardless of the operating system they are running.
15.What is the use of specifying different proxy configuration information in IE?
This is useful for mobile users who, while traveling, must connect to multiple remote networks with varying proxy configurations.
16.What is the difference of Standby mode and Hibernate mode
· Stanby mode – In standby mode, the computer is put into a low-power state. Devices such as the monitor and hard disks are switched off, consuming less power. When the computer is returned to full operation, the desktop is restored to its previous state. Standby mode is particularly useful for conserving battery power in portable computers. However, because standby mode does not save the desktop state to disk, a power failure while on standby can result in the loss of unsaved information.
· Hibernate mode – Hibernate mode saves everything that is in system memory to disk, then switches off the monitor and hard-disk drive and shuts the computer down. On restart, the system is restored to its previous state. An enhanced version of the ACPI power management utility that also supports fast boot capabilities is available in Windows Me. Both Windows 2000 Professional and Windows Me also support the earlier Advanced Power Management (APM) initiative.
Both are the feature of Advanced Configuration and Power Interface (ACPI) power management functionality.
17.What is Hot Docking and Undocking Services
This feature enables users to dock and undock portable computers without rebooting or changing the computer’s hardware configuration. When docking, new hardware is automatically detected and installed.
This feature also allows open application programs and documents to continue to run even as the computer is moved from one location to another.
18.What is Fast Boot
Windows Me is the first Windows operating system to implement fast-boot capability. The goal of Fast Boot is to make the Windows desktop available to the user as quickly as possible. With the implementation of fast-boot-optimized PC hardware, boot times of less than 30 seconds can be achieved.
19.What is WIA feature of Windows?
The WIA feature includes a new wizard that automatically recognizes many popular scanners and cameras. When a WIA-compatible camera or scanner is connected to the computer’s Universal Serial Bus (USB), the wizard installs it as a browsable external device. Windows users can access these devices and view or download their contents without the need for additional software.
20.What is SFP
System File Protection(SFP)
This feature protects critical system files from being overwritten accidentally or through unauthorized access. If a critical system file is overwritten or corrupted during application program installation, Windows restores the file-protecting system stability while allowing the application to install without error.

[To be continued..]

Advertisements

4 Responses to “Q&A : Review –The Windows Basics -Part 1”


  1. 1 Forge Of Empires Cheats May 12, 2013 at 5:39 am

    Hello, I check your new stuff like every week. Your story-telling style is
    witty, keep up the good work!

  2. 2 Maude May 29, 2013 at 5:23 pm

    I really love your blog.. Excellent colors & theme. Did you develop this site yourself?
    Please reply back as I’m attempting to create my own website and would love to know where you got this from or what the theme is called. Thanks!

  3. 3 rambunctiousjai96.soulcast.com July 16, 2013 at 2:47 pm

    Hi to every body, it’s my first go to see of this weblog; this webpage contains amazing and really fine material designed for readers.

  4. 4 uxapuvirepis.vacau.com July 30, 2013 at 11:00 am

    I was suggested this website by my cousin. I am not sure whether this post is written by him as nobody else know such detailed about
    my problem. You are wonderful! Thanks!


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s





%d bloggers like this: