StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Automatically Start Services. Tracing A Vishing Voip Phone Number - Essay Example

Cite this document
Summary
The majority of windows programs are designed to start automatically when Microsoft operating system boots. In fact, software developers and manufacturers frequently place their programs to start in the background while starting Windows application…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Automatically Start Services. Tracing A Vishing Voip Phone Number
Read Text Preview

Extract of sample "Automatically Start Services. Tracing A Vishing Voip Phone Number"

?Week4 DQ4 By Id # DQ1: automatically start services Discuss the programs/processes/services that start automatically when Microsoft Windows starts (you may check the Microsoft sysinternals autoruns tool for some help also http://www.microsoft.com/technet/sysinternals/default.mspx). The majority of windows programs are designed to start automatically when Microsoft operating system boots. In fact, software developers and manufacturers frequently place their programs to start in the background while starting Windows application. However, these applications are embedded in a way where we are not able to see them operational, consequently they will open right away when system users click their icons. Additionally, that is supportive for applications that we utilize frequently, however for it is not useful for the applications that we hardly ever or never utilize (Microsoft Corporation1, 2012; Microsoft2, 2012). In addition, when we start our Windows system, shortcuts to applications contained in our start-up program folder are opened automatically. In this scenario, the majority of installed applications include a shortcut to this applications folder as an element of their installation procedure. For instance, if we have a Microsoft Office application installed on our system, there is a chance that we will discover a shortcut to the Office toolbar that is stored in this folder. Additionally, a number of system and application programs load instantly are externally helpful, in view of the fact that the majority of them placed in the start-up applications folder are more ambiguous and almost certainly not of much use on a daily basis (Microsoft Corporation1, 2012; Microsoft2, 2012). Moreover, during the process of system booting, the SCM initiates the entire auto start system services as well as the other supportive disk check up, devices check-up, and memory scans services on which they depend. For instance, if an auto-start system service relies on a demand system start service, the demand-start service is as well initiated automatically. In this scenario, after a successful system start, the system saves a replica of the applications, programs and services in a database that is acknowledged as the last known good (LKG) configuration. The system is able to restore this replica of the database if transformations are formulated to the active database cause the windows system fails to reboot (Microsoft3, 2012; Microsoft2, 2012). Furthermore, a windows operating system contains a self test program that is used to provide the power to make sure that the volume as well as present levels are correct prior to the power good indication is transmitted to the processor. When this primary stage is finished, the microprocessor will then start processing and initiates the BIOS to carry out a series of activities. In addition, after this kind of checkups control is sent to partition loader code that checks the partition table in order to recognize the primary, extended and active partition. After this operating system loader file NTLDR switches the system processor from real system working mode to 32bit protected system working mode where we have memory paging enabled (Adroit Data Recovery Centre Pte Ltd, 2010). DQ2: VoIP tracing Discuss how can you trace a vishing VoIP phone number The capability to imitate or mask a wide variety of caller IDs is mainly significant to phishers. Actually, by making changes to caller IDs and data, they can be able to support their social engineering story and make it harder to track and find out the major source of a vishing attack. In this scenario, a VoIP (Voice over IP-telephony) service that supports Internet phones to make use of local dialling code (POP) or point of presence exit points (for example a phone number inside the similar regional calling code can be able to likewise augment the accomplishment of a VoIP security based attack (Ollmann, 2007; Reardon, 2009). In addition, by simply increasing this capability to put an Internet call from somewhere in the world; the phisher is able to as well carry out what could be known as live attacks. Basically, in a live VoIP vishing attack, the phisher starts the fake call to the possible victim, who then meets an automatic voice system that gives confidence him to provide personal information. Hence, in case of a successful VoIP vishing attack, the phisher will either mimic a famous national entity (a big national bank or retail business chain) or a local business or make use of a suitable caller ID (Ollmann, 2007; Reardon, 2009). Moreover, a wide variety of vulnerabilities in such kind of communications system occurs where old technologies meet latest technologies. Hence, it is assessed that a synchronized effort through conventional phone businesses as well as new VoIP businesses can help stop a wide variety of security attacks. Fundamentally, carriers are able to confirm as well as authenticate that people making calls are who they declare they are, that should reduce a great deal of effort against the law activity that is performed through spoofing caller ID numbers (Reardon, 2009; Ollmann, 2007). Furthermore, carriers could as well develop and incorporate their ideas and terms of technology usage that would forbid clients from making use of spoofed IDs to assigned fake acts. In case if they are caught performing this kind of acts they could have their service finished. In this scenario, a large number of corporations are presenting blacklist software that block particular IDs, however it is difficult to implement as numbers are frequently altered. For instance, Google will present a characteristic in its Google Voice product that will permit phone calls to be checked and filtered similar email consequently that users are able to block such kind of fake phone calls or transmit some calls from particular phone numbers to a "spam" folder. Furthermore caller ID spoof supplier similar to SpoofCard, that deals with the huge majority of spoofed numbers in the marketplace are able to work with service suppliers and law enforcement to flag doubtful Spoofers (Reardon, 2009; Ollmann, 2007). References Adroit Data Recovery Centre Pte Ltd, 2010. Windows Boot-up Process. [Online] Available at: http://www.adrc.com/ckr/windows_bootup_process.html [Accessed 22 September 2012]. Microsoft Corporation1, 2012. Optimize Windows 7 for better performance. [Online] Available at: http://windows.microsoft.com/is-IS/windows7/Optimize-Windows-7-for-better-performance [Accessed 22 September 2012]. Microsoft2, 2012. Take control of your Windows start-up. [Online] Available at: http://support.microsoft.com/kb/835638 [Accessed 23 September 2012]. Microsoft3, 2012. Learn how to develop for Windows desktop. [Online] Available at: http://msdn.microsoft.com/en-us/library/windows/desktop/ms6819a57(v=vs.85).aspx [Accessed 24 September 2012]. Ollmann, G., 2007. The Vishing Guide. [Online] Available at: http://www.windowsecurity.com/whitepapers/Vishing-Guide.html [Accessed 22 September 2012]. Reardon, M., 2009. Protect yourself from vishing attacks. [Online] Available at: http://www.zdnet.com/news/protect-yourself-from-vishing-attacks/303175 [Accessed 23 September 2012]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Automatically Start Services. Tracing A Vishing Voip Phone Number Essay”, n.d.)
Automatically Start Services. Tracing A Vishing Voip Phone Number Essay. Retrieved from https://studentshare.org/information-technology/1457621-week4dq4
(Automatically Start Services. Tracing A Vishing Voip Phone Number Essay)
Automatically Start Services. Tracing A Vishing Voip Phone Number Essay. https://studentshare.org/information-technology/1457621-week4dq4.
“Automatically Start Services. Tracing A Vishing Voip Phone Number Essay”, n.d. https://studentshare.org/information-technology/1457621-week4dq4.
  • Cited: 0 times

CHECK THESE SAMPLES OF Automatically Start Services. Tracing A Vishing Voip Phone Number

Password Cracking Systems

Moreover, through these techniques, the person who has to be authenticated verifies that he or she recognizes or possesses a number of confidential data and information.... However there is a large number of technology based applications those are breaking and disturbing such security settings.... However, growing security limitations make it very difficult to crack cryptography (or at any rate super-polynomially), dwarfing a number of advantages quickly hardware can present invaders....
20 Pages (5000 words) Research Paper

Essentials of Customer Service Improvement for Leisure Customers

The purpose of this paper “Essentials of Customer Service Improvement for Leisure Customers” is to investigate the essentials of the customers' service for the leisure customers within international hotels with the help of which the customers can get good services, provide suggestion.... Good customer service has effects on the hotel business; we do not need the help/services of mathematician to judge the impact of good service on the hotel business....
39 Pages (9750 words) Dissertation

Strategic Capabilities of UAE Police to Combat Card Fraud

The proposed research will examine one of a number of growing crimes that is perpetrated over the Internet via the World Wide Web (WWW).... It does not contain any material which has been accepted for another degree in any university and to the best of my knowledge and belief, contains no material previously published, written, or produced by… The study is an investigation of the status of credit card fraud as it is perpetrated in the United Arab Emirates....
80 Pages (20000 words) Essay

Credit Card Fraud Issue

The proposed research will examine one of a number of growing crimes that is perpetrated over the Internet via the World Wide Web (WWW).... I declare that this dissertation is the result of my own research.... It does not contain any material which has been accepted for… her degree in any university and to the best of my knowledge and belief, contains no material previously published, written, or produced by another person, except where due reference is made in the text. The study is an investigation of credit card fraud countermeasures as it The various types of credit card fraud and the manner by which they are carried out are related, including the surrounding circumstances that enable or disable the commission of the crime....
80 Pages (20000 words) Essay

E Commerce Digital Markets and Digital Goods

Hundreds and millions of customers today rely on the internet, either to purchase something or to collect information about various products and services they require.... The author of the present research paper "E-Commerce Digital Markets and Digital Goods" explains that rampant growth of technology has changed all conventional types of business models beyond our highest expectations, providing us with most feasible means of communication and accessibility....
26 Pages (6500 words) Research Paper

The Triple Play Bundling TV, Internet, and Phone Services

This package includes the availability of Cable TV, fast Internet, and phone line through the use of just one cable.... (2001, 90) found that 'New emerging IP services based on differentiated services and the IP security architecture offer the level of communication support that corporate Internet applications need nowadays; however, these services add an additional degree of complexity to IP networks which will require sophisticated management support; the management of enhanced IP services for their customers is thus an emerging important task....
23 Pages (5750 words) Term Paper

Motivation for Building a Business Logic Layer Using PL/SQL

… Motivation for Building a Business Logic Layer Using PL/SQLBuilding a business logic layer using PL/SQL is very important and every organization or business should be motivated by the benefits of doing so since they outdo the cost of implementing Motivation for Building a Business Logic Layer Using PL/SQLBuilding a business logic layer using PL/SQL is very important and every organization or business should be motivated by the benefits of doing so since they outdo the cost of implementing business logic layer using PL/SQL....
19 Pages (4750 words) Thesis

How Technology Impacts Our Everyday Life

… The paper "How Technology Impacts on Our Everyday Life" is a perfect example of a term paper on information technology.... The use of technology is rapidly growing in contemporary society, with every indication that soon or later it will dominate every aspect of society.... Technology is around all the time; the recent rampant use of cell phones, computers, and television can tell it all....
27 Pages (6750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us