scholarly journals Mechanisms to counter Vulnerabilities and Threats of the Windows Family of Operating systems

Author(s):  
Vaisualua Posese-Okesene

This paper reviews writings already done and published on the topic. The Operating systems covered are Windows Vista, Windows XP, Windows 7 Professional and Windows 8. The categories of Vulnerabilities and Threats are discussed with mechanisms implemented and solutions known.

2020 ◽  
Author(s):  
Vaisualua Posese-Okesene

This paper reviews writings already done and published on the topic. The Operating systems covered are Windows Vista, Windows XP, Windows 7 Professional and Windows 8. The categories of Vulnerabilities and Threats are discussed with mechanisms implemented and solutions known.


2016 ◽  
Vol 8 (3) ◽  
pp. 273-277
Author(s):  
Linas Juozas Jočys

ICMPv6 is the newest version of internet control message protocol, whose main purpose is to send error message indicating packet processing failure. It is know that ICMPv6 is technologically vulnerable. One of those vulnerabilities is the ICMPv6 RA flooding vulnerability, which can lead to systems in Local Area Network slow down or full stop. This paper will discuss Windows (XP, 7, 8.1) and Linux Ubuntu 14 operating systems resistance to RA flooding attack research and countermeasures to minimize this vulnerability. ICMPv6 yra naujausios versijos interneto kontrolės žinučių protokolas, kurio pagrindinis tikslas pranešti apie paketų apdorojimo klaidas IPv6 tinklo mazgams. Analizuojant ICMPv6 protokolą nustatyta, jog šis protokolas yra technologiškai pažeidžiamas. Vienas iš pažeidžiamumų yra ICMPv6 maršrutizatoriaus skelbimo žinučių (RA) atsisakymo aptarnauti pažeidžiamumas, kuris leidžia sulėtinti arba visiškai sutrikdyti operacinių sistemų darbą kompiuteriuose, esančiuose vietiniame tinkle. Straipsnyje aprašomas Windows (XP, 7, 8.1) ir Linux Ubuntu tipų operacinių sistemų atsparumo ICMPv6 protokolo RA žinučių atsisakymo aptarnauti atakai tyrimas. Tyrimo metu nustatytas pasirinktų operacinių sistemų atsparumas RA žinučių atsisakymo aptarnauti atakai, esant skirtingiems techninės įrangos resursams. Straipsnyje taip pat pateiktos prevencinės priemonės ICMPv6 RA žinučių atsisakymo aptarnauti pažeidžiamumui šalinti arba minimizuoti.


Author(s):  
David A. Lee ◽  
Norman Walsh

The efficiency and performance of individual XML operations such as parsing, processing (XSLT, XQuery) and serialization, and the merits of different in-memory document representations, have been widely discussed. However, real world uses cases often involve many operations orchestrated using a scripting environment. The performance of the scripting environment can often overshadow any performance gains in individual operations. In an exploration of real world scripting, we compare performance of several scripting languages and techniques on a set of typical XML operations such as generation of a table of contents and conditionally accessing non-XML files identified in XML documents. Based on performance results, we suggest best practices for scripting XML processes. Scripting languages compared include DOS Shell (CMD.EXE), Linux Shell (bash), XMLSH, and XProc (calabash). These are run (where possible) on multiple operating systems: Windows XP, Linux, and Mac/OS.


2019 ◽  
Vol 36 (1) ◽  
Author(s):  
Urbano B. Patayon ◽  
Nerico L. Mingoc

As usability testing becomes more popular and widely recognized, operating systems’ users are still relying on reviews that are based on the price, standard feature and satisfaction survey as to which product will be patronized. Measuring usability requires assessment on three product attributes or factors namely: effectiveness, efficiency, and user satisfaction. There are thirty-seven (37) respondents used in the study. Each respondent is required to perform the given task in each version of the Windows operating system. Time to complete the task and behavioral manifestations were recorded. Based on the data gathered and analyzed, results show that Windows 10 has the most number of the task with the highest completion rate in comparison with two operating systems in the study. Regarding efficiency, Windows 8 has the highest average task completion time. As to user satisfaction, the majority of the respondents were frustrated in the different task under Windows 8 while most of them are delighted in the tasks under Windows 7. Regarding engagement and boredom, the result reveals that users are engaged at the same time felt bored on tasks under Windows 10.


2017 ◽  
Author(s):  
Rebin B. Khoshnaw ◽  
Dana F. Doghramach ◽  
Mazin S. Al-Hakeem

Author(s):  
Georgiy Aleksandrovich Popov

The article deals with a two-channel queuing system with a Poisson incoming call flow, in which the application processing time on each of the devices is different. Such models are used, in particular, when describing the operation of the system for selecting service requests in a number of operating systems. A complex system characteristic was introduced at the time of service endings on at least one of the devices, including the queue length, the remaining service time on the occupied device, and the time since the beginning of the current period of employment. This characteristic determines the state of the system at any time. Recurrence relations are obtained that connect this characteristic with its marginal values when there is no queue in the system. The method of introducing additional events was chosen as one of the main methods for analyzing the model. The relationships presented in this article can be used for analysis of the average characteristics of this system, as well as in the process of its simulation. Summarizing the results of work on multichannel systems with an arbitrary number of servicing devices will significantly reduce the time required for simulating complex systems described by sets of multichannel queuing systems.


Sign in / Sign up

Export Citation Format

Share Document