Trojans, Malware, and Cryptology Attacks

Part 1: Hacking Windows and Linux

Respond to the following:

  1. How can you distinguish between different operation systems by examining a listing of host services? 200 words minimum.
  2. Why are most networks, even small office/home office (SOHO) networks, considered mixed networks in terms of operating systems? Give some common examples of devices in a typical home that might be running Linux or a derivative of it. 300 words minimum. 
  3. How are UNIX/Linux and the Apple OS X related? 200 words minimum. 

Part 2: Windows 2000™ and Firewall Issues

Respond to the following:

  1. When Windows first released Windows 2000, a default install resulted in IIS being installed and running. Why do you think Microsoft was criticized for this? 200 words minimum.
  2. What are some of the problems that might result from only deploying a firewall at the perimeter of an organization? Do most Linux distros come with a firewall? If so, explain it. What are some of the features of Microsoft’s “Internet Connection Firewall”? 300 words minimum.
Tags: No tags