It Support Engineering
It Support Engineering
TRAINING WORK
SUBMITTED BY:
ANKUR SHARMA
UNDER THE GUIDANCE OF
Er. MAISH PANDEY
(MENTOR-HCL, IT- DEPARTMENT)
SEMESTER: - 7TH
2010-2011
HCL,NOIDA
CERTIFICATE
This is to certify that the Project entitled
“COMPUTER ENGINEERING”
Was carried out by
(ENTERIN ,HCL)
BACHELOR OF TECHNOLOGY
(SESSION 2010-2011)
ACKNOWLEDGEMENT
ANKUR SHARMA
Roll No. 0729110007
Branch- CSE.
DIT SCHOOL OF ENGINEERING
Session-2010-2011
(UPTU, LUCHNOW)
PREFACE
Software has become the key element in the evolution of
computer based systems and products. Over the past four
decades, software has evolved from the specialized problem
solving and information analysis tool to an industry itself. The
software development process involves the scales and experience
of the people involved.
TABLE OF CONTENT
Acknowledgement
Declaration
Preface
PART 1. INTRODUCTION
a. Company’s Introduction
b. History Of Computers And Computing In India
i. Early Computation
ii. Navigation And Astronomy
iii. Weather Prediction
iv. Symbolic Computations
c. HCL Technologies
d. HCL Info Systems Ltd
e. External Links
f. It Mission
i. The Itd Caters To All Business Functions
g. Training Program
h. It Support Engineer
i. Flow Chart
i. As An Academic Discipline
PART 2. CORE KNOWLEDGE AREAS
a. Algorithms
i. Algorithms Includes
ii. Flow Chart
b. Organization
c. Artificial Intelligence
i. Artificial Intelligence Includes:
d. Automation
i. Automation Parts
e. Operating Systems
i. Operating Systems Includes
f. Computer Networking
i. Computer Networking Parts
g. Software Engineering
h. Programming Fundamentals
i. Programming Fundamentals Parts
ii. Outsourcing Technical Support
iii. Multi-Tiered Technical Support
Level 1(L1)
Level 2(L2)
1. Level 3(L3)
Level 4(L4)
FUNCTIONS
i. Organizations
i. Desk Side Team
ii. Network Team
iii. Server Team
iv. Other Teams
PART 3. REMOTE DESKTOP SERVICES
a. Architecture
b. Terminal Server
i. Terminal Service Gateway
c. Remote Desktop Connection
i. Remote Applications
d. Information Sharing & Security
i. Basic Principles
Integrity
Authenticity
Availability
Non-Repudiation
Risk Management
PART 4. CRYPTOGRAPHY
a. Defense In Depth
b. Remedy User
WINDOWS
Windows Nt
d. Windows 2000
e. Abuse & Regulations
6. Modifications To Ip Addressing
7. Ip Address Translation
8. Tools
9. .Pst Files
h. Overview
i. Support
j. Size And Formats
a. Standards Evolution
b. Cabling
c. Technical Aspects
d. Lan Messenger
e. User Messenger
f. Protocol
g. Containing Username &Password
h. Unlock & Reset The User Password
i. Administrators And Administrative Rights
PART 7. OPERTAING SYSTEM IN USE
a. Windows
b. Unix, Linux, Bsd, Solaris, And Mac Os X
PART 8. CONCLUSION
PART 9. BIBLIOGRAPHY
INTRODUCTION
COMPANY’S INTRODUCTION
HCL is a leading global Technology and IT Enterprise.The
HCL Enterprise comprises two companies listed in India,
HCL Technologies and HCL Info systems.
The HCL Enterprise is
an electronics, computing and information
technology company. Based in Noida, India, the company
comprises two publicly listed companies, HCL
Technologies and HCL Infosystems.
HCL was founded in 1976 by Shiv Nadar, Arjun
Malhotra, Subhash Arora, Ajai Chowdhry, DS Puri,
& Yogesh Vaidya. HCL was focused on addressing the IT
hardware market in India for the first two decades of its
existence with some sporadic activity in the global
market.
On termination of the joint venture with HP in 1996, HCL
became an enterprise which comprises HCL Technologies
(to address the global IT services market) and HCL Info
systems (to address the Indian and APAC IT hardware
market). HCL has since then operated as a holding
company.
HISTORY OF COMPUTERS AND
COMPUTING IN INDIA
The history of computing is longer than the history of
computing hardware and modern computing
technology and includes the history of methods intended
for pen and paper or for chalk and slate, with or without
the aid of tables. The timeline of computing presents a
summary list of major developments in computing by
date.
• EARLY COMPUTATION
The earliest known tool for use in computation was
the abacus, and it was thought to have been
invented in Babylon circa 2400 BC. Its original style
of usage was by lines drawn in sand with pebbles.
Abaci, of a more modern design, are still used as
calculation tools today. This was the first known
computer and most advanced system of calculation
known to date - preceding Greek methods by 2,000
years.
None of the early computational devices were
really computers in the modern sense, and it took
considerable advancement in mathematics and
theory before the first modern computers could be
designed.
• SYMBOLIC COMPUTATIONS
By the late 1960s, computer systems could perform
symbolic algebraic manipulations well enough to
pass college-level calculus courses.
HCL TECHNOLOGIES
HCL Technologies is a global IT Services company
headquartered in Noida, a suburb of Delhi, India led by Mr
Vineet Nayar, HCL Technologies, along with its
subsidiaries, had consolidated revenues of US$ 5 billion,
as of 2010, and employed more than 60,000 workers.
HCL offers IT solutions, remote infrastructure
management, Engineering and R&D Services. The
company provides services across many industries.
EXTERNAL LINKS
As one of the biggest company in India HCL is having
external links working as nodes of the company. Some
are listed below
HCL Enterprise
HCL Technologies
HCL Info systems
HCL BPO
HCL Peripherals
HCL Infinet
HCL Axon
HCL Security
HCL ISD
IT MISSION
"Stimulate the value chain for business excellence by
providing innovative information systems using
appropriate IT."
IT mission emphasizes the need for innovative and
appropriate IT systems to drive business excellence.
Appropriate IT systems refer to making optimum and
not excessive use of technology. And most
importantly, IT has to permeate the entire value chain
including our vendors and dealers.
AS AN ACADEMIC DISCIPLINE
• The first accredited computer engineering degree
program in the United States was established at Case
Western Reserve University in 1971. As of
October 2004, there were 170 ABET-accredited
computer engineering programs in the US.
• Due to increasing job requirements for engineers,
who can design and manage all forms of computer
systems used in industry, some tertiary institutions
around the world offer a bachelor's degree generally
called computer engineering.
• Both computer engineering and electronic
engineering programs include analog and digital
circuit design in their curricula. As with
most engineering disciplines, having a sound
knowledge of mathematics and sciences is necessary
for computer engineers.
• In many institutions, computer engineering students
are allowed to choose areas of in-depth study in their
junior and senior year, because the full breadth of
knowledge used in the design and application of
computers is beyond the scope of an undergraduate
degree.
• Algorithms
• Computer architecture and organization
• artificial intelligence
• automation
• Operating systems
• Micro-process or interfacing and programming
• Computer networking
• Software engineering
• Programming fundamentals
ALGORITHMS
• ALGORITHMS INCLUDES:
o Etymology
o Formalization
o Termination
o Expressing algorithms
o Computer algorithms
o Implementation
o Algorithmic analysis
o Formal versus empirical
o Classification:
o By implementation
o By design paradigm
o By field of study
FLOW CHART
ARTIFICIAL INTELLIGENCE
1) Problems
o 1.1 Deduction,
reasoning, problem solving
o 1.2 Knowledge
representation
o 1.3 Planning
o 1.4 Learning
o 1.5 Natural language
processing
o 1.6 Motion and
manipulation
o 1.7 Perception
o 1.8 Social intelligence
o 1.9 Creativity
o 1.10 General
intelligence
2) Approaches
o 2.1 Cybernetics and
brain simulation
o 2.2 Symbolic
o 2.3 Sub-symbolic
o 2.4 Statistical
o 2.5 Integrating the
approaches
3) Tools
Automation includes:
• Impact
• Concerns about unemployment
• Dependence on social factors
• Reliability and precision
• Health and environment
• Convertibility and turn-around time
• Automation tools
AUTOMATION
OPERATING SYSTEMS
• Computer networking is
the engineering discipline concerned
with the communication between computer
systems or devices.
• A computer network is any set of computers or
devices connected to each other with the ability to
exchange data.
• The three types of networks are: the Internet,
the intranet, and the extranet. Examples of different
network methods are:
• Networking methods
• Local area network (LAN)
• Wide area network (WAN)
• Wireless networks (WLAN, WWAN)
• Network topology
SOFTWARE ENGINEERING
PROGRAMMING FUNDAMENTALS
• Quality requirements
• Algorithmic complexity
• Methodologies
• Measuring language usage
• Debugging
• Programming languages
• Programmers
Level 1(L1)
Level 2(L2)
• This is a more in-depth technical support level than
Tier I containing experienced and more
knowledgeable personnel on a particular product or
service.
• It is synonymous with level 2 support, support line 2,
administrative level support, and various other
headings denoting advanced
technical troubleshooting and analysis methods.
• Technicians in this realm of knowledge are
responsible for assisting Tier I personnel solve basic
technical problems and for investigating elevated
issues by confirming the validity of the problem and
seeking for known solutions related to these more
complex issues.
• However, prior to the troubleshooting process, it is
important that the technician review the work order
to see what has already been accomplished by the
Tier I technician and how long the technician has
been working with the particular customer.
Level 3(L3)
ORGANIZATIONS
Network team
• The network team is responsible for the network
software, hardware and infrastructure such
as servers, switches, backup systems and firewalls.
They are responsible for the network services such
as email, file, and security.
• The help desk will assign the network team issues
that are in their field of responsibility.
Server team
• The server team is responsible for most, if not all, of
the servers within the organization.
• This includes, but is not limited to, Active Directory,
Network Shares, Network Resources, Email accounts,
and all aspects of server software.
Other teams
• Some companies have a telecom team that is
responsible for the phone infrastructure such
as PBX, voicemail, VOIP, telephone
sets, modems and fax machines. They are
responsible for configuring and moving telephone
numbers, voicemail setup and configuration and are
assigned these types of issues from the help desk.
• Companies with custom application software may
also have an applications team, who are responsible
for development of any in-house software.
• The Applications team may be assigned problems
such as software bugs from the help desk.
• Requests for new features or capabilities to in-house
software that come through the help desk are also
assigned to applications groups.
• Not all of the help desk staff and supporting IT staff
are in the same location. With remote access
applications, technicians are able to solve many help
desk issues from another location or their home
office.
• There is a need for on-site support to physically work
on some help desk issues; however, help desks are
able to be more flexible with their remote support.
They can also audit workstations.
REMOTE DESKTOP SERVICES
ARCHITECTURE
Confidentiality
Confidentiality is the term used to prevent the disclosure
of information to unauthorized individuals or systems.
For example, a credit card transaction on the Internet
requires the credit card number to be transmitted from
the buyer to the merchant and from the merchant to
a transaction processing network.
The system attempts to enforce confidentiality by
encrypting the card number during transmission, by
limiting the places where it might appear (in databases,
log files, backups, printed receipts, and so on), and by
restricting access to the places where it is stored.
Integrity
• In information security, integrity means that data
cannot be modified without authorization. This is not
the same thing as referential integrity in databases.
• Integrity is violated when an employee accidentally
or with malicious intent deletes important data files,
when a computer virus infects a computer, when an
employee is able to modify his own salary in a payroll
database, when an unauthorized user vandalizes a
web site, when someone is able to cast a very large
number of votes in an online poll, and so on.
• There are many ways in which integrity could be
violated without malicious intent. In the simplest
case, a user on a system could mis-type someone's
address.
• On a larger scale, if an automated process is not
written and tested correctly, bulk updates to a
database could alter data in an incorrect way,
leaving the integrity of the data compromised.
• Information security professionals are tasked with
finding ways to implement controls that prevent
errors of integrity.
Availability
• For any information system to serve its purpose, the
information must be available when it is needed.
• This means that the computing systems used to
store and process the information, the security
controls used to protect it, and the communication
channels used to access it must be functioning
correctly.
Authenticity
• In computing, e-Business and information security it
is necessary to ensure that the data, transactions,
communications or documents (electronic or
physical) are genuine.
• It is also important for authenticity to validate that
both parties involved are who they claim they are.
Non-repudiation
• In law, non-repudiation implies one's intention to
fulfill their obligations to a contract. It also implies
that one party of a transaction cannot deny having
received a transaction nor can the other party deny
having sent a transaction.
• Electronic commerce uses technology such as digital
signatures and encryption to establish authenticity
and non-repudiation.
Risk management
• Risk management is the process of identifying
vulnerabilities and threats to the information
resources used by an organization in achieving
business objectives, and deciding what
countermeasures, if any, to take in reducing risk to
an acceptable level, based on the value of the
information resource to the organization."
• There are two things in this definition that may need
some clarification.
• First, the process of risk management is an ongoing
iterative process. It must be repeated indefinitely.
The business environment is constantly changing
and new threats and vulnerability emerge every day.
• Second, the choice of countermeasures(controls)
used to manage risks must strike a balance between
productivity, cost, effectiveness of the
countermeasure, and the value of the informational
asset being protected.
o security policy,
o organization of information security,
o asset management,
o human resources security,
o physical and environmental security,
o communications and operations management,
o access control,
o information systems acquisition, development and
maintenance,
o information security incident management,
o business continuity management, and
CRYPTOGRAPHY
Remedy user
Login-remedy user
Remedy ticket
Closing of remedy ticket
Domain
• A domain name is an identification label that
defines a realm of administrative autonomy,
authority, or control on the Internet, based on
the Domain Name System(DNS).
• Domain names are used in various networking
contexts and application-specific naming and
addressing purposes.
• They are organized in subordinate levels
(subdomains) of the DNS root domain, which is
nameless.
• The first-level set of domain names are the top-level
domains (TLDs), including the generic top-level
domains (gTLDs), such as the prominent
domains com, net and org, and the country code top-
leve domains (ccTLDs).
• Below these top-level domains in the DNS hierarchy
are the second-level and third-level domain names
that are typically open for reservation by end-users
that wish to connect local area networks to the
Internet, run web sites, or create other publicly
accessible Internet resources.
• The registration of these domain names is usually
administered by domain name registrars who sell
their services to the public.
• Domain names are also used as simple identification
labels to indicate ownership or control of a resource.
Such examples are the realm identifiers used in
theSession Initiation Protocol (SIP),
the DomainKeys used to verify DNS domains in e-
mail systems, and in many other Uniform Resource
Identifiers (URIs).
Windows 2000
Internet protocol
• An Internet Protocol (IP) address is a numerical
label that is assigned to devices participating in
a computer network that uses the Internet
Protocol for communication between its nodes.
• An IP address serves two principal functions: host or
network interface identification and
location addressing. Its role has been characterized
as follows: "A name indicates what we seek. An
address indicates where it is. A route indicates how
to get there.
• The designers of TCP/IP defined an IP address as
a 32-bit number and this system, known as Internet
Protocol Version 4 or IPv4, is still in use today.
• However, due to the enormous growth of
the Internet and the predicted depletion of available
addresses, a new addressing system (IPv6), using
128 bits for the address, was developed in 1995 and
standardized by RFC 2460 in 1998.
• Although IP addresses are stored as binary numbers,
they are usually displayed in human-
readable notations, such as 208.77.188.166
(for IPv4), and 2001:db8:0:1234:0:567:1:1 (for IPv6).
• The Internet Protocol is used
to route data packets between networks; IP
addresses specify the locations of the source and
destination nodes in the topology of the routing
system. For this purpose, some of the bits in an IP
address are used to designate a subnetwork
• The number of these bits is indicated in CIDR
notation, appended to the IP address;
e.g., 208.77.188.166/24.
Virtual IP address
• A virtual IP address (VIP or VIPA) is an IP
address that is not connected to a specific computer
or network interface card (NIC) on a computer.
• Incoming packets are sent to the VIP address, but
they are redirected to physical network interfaces.
• VIPs are mostly used for connection redundancy; a
VIP address may still be available if a computer or
NIC fails because an alternative computer or NIC
replies to connections.
IP versions
• Two versions of the Internet Protocol (IP) are in use:
IP Version 4 and IP Version 6. (See IP version
history for details.) Each version defines an IP
address differently.
• Because of its prevalence, the generic term IP
address typically still refers to the addresses defined
by IPv4.
IP version 4 addresses
• IPv4 uses 32-bit (4-byte) addresses, which limits
the address space to 4,294,967,296 (232) possible
unique addresses.
• IPv4 reserves some addresses for special purposes
such as private networks (~18 million addresses)
or multicast addresses (~270 million addresses).
• IPv4 addresses are usually represented in dot-
decimal notation (four numbers, each ranging from 0
to 255, separated by dots, e.g. 208.77.188.166).
• Each part represents 8 bits of the address, and is
therefore called an octet. In less common cases of
technical writing, IPv4 addresses may be presented
inhexadecimal, octal, or binary representations.
• In most representations each octet is converted
individually.
IPv4 subnetting
224-2 =
0XXXXX 0 - b.c. 7
A a 2 = 128 16,777,2
XX 127 d
14
221 =
110XXXX 192 - 28-2 =
C a.b.c d 2,097,15
X 223 254
2
No. of
Start End address
es
24-
bit
Bloc
10.255.255.25 16,777,2
k (/8 10.0.0.0
5 16
prefi
x, 1
x A)
16-
bit
Bloc
k
192.168.0 192.168.255.2
(/16 65,536
.0 55
prefi
x,
256
x C)
IP version 6 addresses
• An illustration of an IP address (version 6),
in hexadecimal and binary.
• The rapid exhaustion of IPv4 address space, despite
conservation techniques, prompted the Internet
Engineering Task Force (IETF) to explore new
technologies to expand the Internet's addressing
capability. The permanent solution was deemed to
be a redesign of the Internet Protocol itself. This next
generation of the Internet Protocol, aimed to replace
IPv4 on the Internet, was eventually named Internet
Protocol Version 6 (IPv6) in 1995 The address size
was increased from 32 to 128 bits or 16 octets,
which, even with a generous assignment of network
blocks, is deemed sufficient for the foreseeable
future.
• Mathematically, the new address space provides the
potential for a maximum of 2128, or about 3.403 ×
1038 unique addresses.
• The new design is not based on the goal to provide a
sufficient quantity of addresses alone, but rather to
allow efficient aggregation of subnet routing prefixes
to occur at routing nodes.
• As a result, routing table sizes are smaller, and the
smallest possible individual allocation is a subnet for
264 hosts, which is the square of the size of the entire
IPv4 Internet.
• At these levels, actual address utilization rates will
be small on any IPv6 network segment. The new
design also provides the opportunity to separate the
addressing infrastructure of a network segment—that
is the local administration of the segment's available
space—from the addressing prefix used to route
external traffic for a network.
• IPv6 has facilities that automatically change the
routing prefix of entire networks should the global
connectivity or the routing policy change without
requiring internal redesign or renumbering.
• The large number of IPv6 addresses allows large
blocks to be assigned for specific purposes and,
where appropriate, to be aggregated for efficient
routing. With a large address space, there is not the
need to have complex address conservation methods
as used in classless inter-domain routing (CIDR).
IP sub networks
• The technique of subnetting can operate in both IPv4
and IPv6 networks. The IP address is divided into two
parts: the network address and the host identifier.
• Thesubnet mask (in IPv4 only) or the CIDR prefix
determines how the IP address is divided into
network and host parts.
• The term subnet mask is only used within IPv4. Both
IP versions however use the Classless Inter-Domain
Routing (CIDR) concept and notation.
• In this, the IP address is followed by a slash and the
number (in decimal) of bits used for the network
part, also called the routing prefix.
• For example, an IPv4 address and its subnet mask
may be 192.0.2.1 and 255.255.255.0, respectively.
The CIDR notation for the same IP address and
subnet is 192.0.2.1/24, because the first 24 bits of
the IP address indicate the network and subnet.
STATIC & DYNAMIC IP ADDRESSES
• When a computer is configured to use the same IP
address each time it powers up, this is known as a
static IP address.
• In contrast, in situations when the computer's IP
address is assigned automatically, it is known as a
dynamic IP address.
Method of assignment
• Static IP addresses are manually assigned to a
computer by an administrator. The exact procedure
varies according to platform. This contrasts with
dynamic IP addresses, which are assigned either by
the computer interface or host software itself, as
in Zerocon, or assigned by a server using Dynamic
Host Configuration Protocol (DHCP).
• Even though IP addresses assigned using DHCP may
stay the same for long periods of time, they can
generally change. In some cases, a network
administrator may implement dynamically assigned
static IP addresses.
• In this case, a DHCP server is used, but it is
specifically configured to always assign the same IP
address to a particular computer.
• This allows static IP addresses to be configured
centrally, without having to specifically configure
each computer on the network in a manual
procedure.
• In the absence or failure of static or stateful (DHCP)
address configurations, an operating system may
assign an IP address to a network interface using
state-less auto-configuration methods, such
as Zeroconf.
Method of Assignment
Determinantion of satic ip
Selection of static ip
Uses of dynamic addressing
Modifications to IP addressing
IP address translation
Tools
Overview
• In Microsoft Exchange Server, the messages, the
calendar, and other data items are delivered to and
stored on the server. Microsoft Outlook stores these
items in a personal-storage-table (.pst) or off-line-
storage-table (.ost) files that are located on the local
computer. Most commonly, the .pst files are used to
store archived items and the .ost files to maintain
off-line availability of the items.
• The size of these files no longer counts against the
size of the mailbox used; by moving files from a
server mailbox to .pst files, users can free storage
space on their mailservers. To use the .pst files from
another location the user needs to be able to access
the files directly over a network from his mail client.
While it is possible to open and use a .pst file from
over a network, this is unsupported.
• To reduce the size of .pst files, the user needs to
compact them Password protection can be used to
protect the content of the .pst files. However,
Microsoft admits that the password adds very little
protection, due to the existence of commonly
available tools which can remove or simply bypass
the password protection.
• The .pst file format is fundamentally insecure for
multiple reasons. First, the password (actually a
weak (without the first and last XOR) CRC-32 integer
representation of it) is simply stored in the .pst file,
and Outlook checks to make sure that it matches the
user-specified password and refuses to operate if
there is no match. But the actual data is still there
and is readable by the libpst project code.
• Second, Microsoft (MS) offers three values for the
encryption setting: none, compressible,
and high. None encryption is easy because the .pst
file contains data in plaintext, and a simple text
editor will show the contents.
Support
• The .pst file format is supported by several Microsoft
client applications, including Microsoft Exchange
Client, Windows Messaging, and Microsoft Outlook.
• The .pst file format is an open format for which
Microsoft provides free specifications and irrevocable
free patent licensing through the Open Specification
Promise
• The libpst project includes tools to convert .pst files
into open formats such as mbox and LDAP Data
Interchange Format. libpst is licensed under
the GPL and is now included in Fedora 10.
• MVCOM is a commercially licensed COM Component
that provides access to .pst files without
MAPI. PSTViewer is a commercial viewer for
accessing .pst file contents without Outlook or MAPI.
• As with any file, .pst files can become corrupted.
Prior to Outlook 2003, the default .pst file format was
ANSI and had a maximum size of 2 GB.
• If the .pst file were allowed to grow over 2 GB, the
file would become unusable. Microsoft provides
PST2GB a tool that can be used to truncate a .pst file
that has grown over 2 GB.
• Microsoft also provides scanpst.exe, that can be used
to repair other .pst file-corruption issues. In Outlook
2003 and later, .pst files are created in the Unicode
format and have a default maximum size of 20 GB.
• There are tools to convert .pst to other formats or to
upload to other online e-mails like Gmail
Technical aspects
• Switched Ethernet is the most common Data Link
Layer implementation on local area networks. At
the Network Layer, the Internet Protocol (i.e. TCP/IP)
has become the standard. Smaller LANs generally
consist of one or more switches linked to each other
—often at least one is connected to a router, cable
modem, orADSL modem for Internet access.
• Larger LANs are characterized by their use of
redundant links with switches using the spanning
tree protocol to prevent loops, their ability to
manage differing traffic types via quality of service
(QoS), and to segregate traffic with VLANs.
LAN messenger
PROTOCOL
• User Messenger uses the Microsoft Notification
Protocol(MSNP) over TCP (and optionally
over HTTP to deal with proxies) to connect to
the .NET Messenger Service—a service offered
on port 1863 of "messenger.hotmail.com."
• The current version is 18 (MSNP18), used by
Windows Live Messenger and other third-party
clients that have support for the protocol.
• The protocol is not completely secret; Microsoft
disclosed version 2 (MSNP2) to developers in 1999 in
an Internet Draft, but never released versions 8 or
higher to the public.
• The .NET Messenger Service servers currently only
accept protocol versions from 8 and higher, so the
syntax of new commands sent from versions 8 and
higher is only known by using packet
sniffers like Wireshark.
• This has been an easy task because - in comparison
to many other modern instant messaging protocols,
such as XMPP - the Microsoft Notification Protocol
does not provide any encryption and everything can
be captured easily using packet sniffers.
• The lack of proper encryption also makes
wiretapping friend lists and personal conversations a
trivial task, especially in unencrypted public Wi-Fi
networks.
CONTAINING USERNAME &PASSWORD of
user
UNLOCK & RESET THE USER PASSWORD
ADMINISTRATOR AND
ADMINISTRATIVE RIGHTS
• An administrator is a local account or a local security
group with complete and unrestricted access to
create, delete, and modify files, folders, and settings
on a particular computer.
• This is in contrast to other types of user accounts
that have been granted only specific permissions and
levels of access.
• An administrator account is used to make system
wide changes to the computer, such as:
• Creating or deleting user accounts on the computer
• Creating account passwords for other users on the
computer
• Changing others' account names, pictures,
passwords, and types
• Administrative rights are permissions granted by
administrators to users allowing them to make such
changes. Without administrative rights, you cannot
perform many such system modifications, including
installing software or changing network settings. For
more, see At IU, why do I need to know the
administrator account on my computer?
• You need to know the administrative password to
your computer; otherwise, you won't be able to
modify files and settings, install programs, or fix
problems.
Admin rights
OPERATING SYSTEM IN USE
Windows
• In Windows 7, Vista, XP, 2000, and NT, the account
named "Administrator" has all possible rights, as
does everyone in the Administrator local security
group. Normal users have some minor administrative
rights (e.g., they can modify anything in their home
directories), but rights that affect the computer as a
whole are normally withheld. (Earlier versions of
Windows had no privileged or unprivileged accounts;
any user could modify anything on the computer.)
• Computer administrators cannot change computer
administrator accounts to a less-privileged type
unless there is at least one other user with a
computer administrator account type on that
computer. This ensures that there is always at least
one user with administrative rights.
• Ideally, the computer administrator account should
be used only to:
• Install, upgrade, repair, or back up the operating
system and components
• Install service packs (SPs)
• Configure critical operating system parameters (e.g.,
password policy, access control, audit policy, kernel
mode driver configuration)
• Take ownership of files that have become
inaccessible
• Windows 7 and Vista include a feature called User
Access Control, which prompts you for your
administrator account name and password before
you perform actions requiring administrative rights
when you're logged into a less-privileged account.
User Access Control is enabled by default, and UITS
recommends that you leave it enabled.
1. www.hcl.in
2. Wikipedia
3. IT-support Engineer
4. hclinsys.in/smart-Library