• Title/Summary/Keyword: Windows System

Search Result 1,449, Processing Time 0.026 seconds

System Design and Implementation for Security Policy Management of Windows Based PC and Weakness Inspection (Windows 기반의 PC 보안 정책 관리 및 취약성 점검을 위한 시스템 설계 및 구현)

  • Park, Byung-Yeon;Yang, Jong-Won;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.23-30
    • /
    • 2008
  • Attempt to protect personal computer from hacking, virus, worm, and the troy wooden horse is progressed variously. Nevertheless, it is very difficult fer public users to understand configurations to enhance security stability in windows based personal computer, and many security problem is due to there lack of recognize about information accessability, various kind of configuration, these necessity, and efficiency. Accordingly, it is demandded to develop an efficient system to protect networks and personal computer with automated method. In this paper, we derive problems of personal computer by analyzing various vulnerableness and policy on security, through which we design and implement the system to solve various windows system problem conveniently.

Study on Energy Performance And Economic Evaluation of Windows System with Built-in Type Blinds (블라인드 내장형 창호시스템의 에너지 성능 및 경제성 평가에 관한 연구)

  • Joe, Won-Hwa;Lim, Nam-Gi
    • Journal of the Korea Institute of Building Construction
    • /
    • v.10 no.2
    • /
    • pp.97-104
    • /
    • 2010
  • This study evaluated the energy efficiency of a windows system using built-in blinds, with regard to their insulation performance and their blocking of solar radiation. The study took advantage of the "Physibel Voltra" program as a physical simulation of heat transfer. To simulate the "Physibel Voltra" program, I practiced a mock-up test to determine heating quality and translation condition. I analyzed the propensity to annual energy consumption, the annual quantity of heat transfer, and the annual cooling and heating cost through a computer simulation for one general household in an apartment building. In the test, it was found that compared to a general windows system, a windows system with built-in blinds reduced the annual heat transfer by 10% in cooling states and by 11% in heating states when the blind was up. When the blind was down, the windows system with built-in blinds reduced the annual heat transfer by 25% in cooling states and 30% in heating states. When a windows system with built-in blinds is compared with a general windows system, the quantity of cooling and heating loads is reduced by 283.3kw in cooling states and 76.3kw in heating states. This leads to a reduction in the required cooling and heating energy of 359.6kw per house. It is thus judged that the use of a windows system with built-in blinds is advantageous in terms of reducing greenhouse gas emissions, because the annual TOE (tons of oil equivalent) per house is reduced by 0.078TOE, while $tCO_2$ is reduced by $0.16tCO_2$. In addition, compared with a general windows system, the cost of cooling and heating loads in the system reduces the annual cooling cost by 100,000won, and the annual heating cost by 50,000won. Ultimately, this means that cooling and heating loads are cut by 150,000won per year.

Analysis of Windows Vista Security System for Forensic Examination (포렌식 조사를 위한 윈도우 비스타 보안 체계 분석)

  • Hwang, Seong-Ho;Nam, Hyun-Woo;Park, Neung-Soo;Jo, Su-Hyung;Hong, Do-Won
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.141-148
    • /
    • 2008
  • Windows Vista published by Microsoft provides more powerful security mechanisms than previous Windows operating systems. In the forensics point of view, new security mechanisms make it more difficult to get data related to the criminals in a storage device. In this paper, we analyze BitLocker introduced as an new security mechanism in Windows Vista. Also, compared to the previous Windows operating systems, the changes and security issues of UAC and EFS in Windows Vista are discussed in the forensics point of view. Futhermore, we discuss other characteristics of Windows Vista useful for forensic examinations.

Construction of Highly Integrated PC Cluster based on Windows XP (높은 집적도를 가지는 Windows XP PC 클러스터 구축)

  • Lee S.-K.;Shin J.-R.;Choi J.-Y.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2005.04a
    • /
    • pp.41-46
    • /
    • 2005
  • A new PC cluster was designed and constructed based on Windows XP Operating system. Primary target of the present design was the high node density per rack by using the general PC parts those are cost-effective and readily available in the market. Other major design points were system cooling and the convenient maintenance using standard PC parts. Presently 24 nodes per rack seems to be optimum considering the specification of the network switching device, system cooling and power supply, but 40 nodes can be accommodated within a single rack at maximum. Windows XP was selected as a high-performance computing environment considering the cost and the convenience in acquisition, maintenance and education. Both fast-Ethernet and Gigabit Ethernet network connection were tested and compared with previous data, especially for Linux doter using Myrinet. The result shows that there is no significant difference between the operating systems and the Fast-Ethernet and/or Gigabit Ethernet are good solution for the high-performance PC cluster considering the cost and performance.

  • PDF

A Model for Illegal File Access Tracking Using Windows Logs and Elastic Stack

  • Kim, Jisun;Jo, Eulhan;Lee, Sungwon;Cho, Taenam
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.772-786
    • /
    • 2021
  • The process of tracking suspicious behavior manually on a system and gathering evidence are labor-intensive, variable, and experience-dependent. The system logs are the most important sources for evidences in this process. However, in the Microsoft Windows operating system, the action events are irregular and the log structure is difficult to audit. In this paper, we propose a model that overcomes these problems and efficiently analyzes Microsoft Windows logs. The proposed model extracts lists of both common and key events from the Microsoft Windows logs to determine detailed actions. In addition, we show an approach based on the proposed model applied to track illegal file access. The proposed approach employs three-step tracking templates using Elastic Stack as well as key-event, common-event lists and identify event lists, which enables visualization of the data for analysis. Using the three-step model, analysts can adjust the depth of their analysis.

Development of Multiple-Windows Manager using virtual Screen (가상 화면을 이용한 다중 윈도우즈 매니저 개발)

  • Won, Hui-Chul;Choi, Jae-Kyung;Kim, Soon-Cheol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.5
    • /
    • pp.53-59
    • /
    • 2009
  • In this paper, we describe the problems which can happen during multi-tasking process in the Windows operating system (OS) environment. To cope with the problems, multiple-windows manager program is proposed in this paper. If we use the proposed multiple-windows manager program with three virtual screen, we can obtain the effect like using four Windows OS and thus we can improve the tardy speed and the high complexity for multi-tasking process.

EDMS의 Windows 탐색기 상에서의 구현방안 연구

  • Jang, Man-Cheol;Bang, Gyeong-Sik;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.744-746
    • /
    • 2015
  • EDMS(Enterprise Document Management System) is generally as an office business management solutions in the form of an application running in a Web browser environment, has been utilized as an Electronic Document Management System. This system, users access the browser has led to inconvenience not easy. For for ease of use this, how to implement a system that can be used to operate the EDMS on the screen of the Windows Explorer, in this study, are presented.

  • PDF

Intrusion Detection System for Home Windows based Computers

  • Zuzcak, Matej;Sochor, Tomas;Zenka, Milan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4706-4726
    • /
    • 2019
  • The paper is devoted to the detailed description of the distributed system for gathering data from Windows-based workstations and servers. The research presented in the beginning demonstrates that neither a solution for gathering data on attacks against Windows based PCs is available at present nor other security tools and supplementary programs can be combined in order to achieve the required attack data gathering from Windows computers. The design of the newly proposed system named Colander is presented, too. It is based on a client-server architecture while taking much inspiration from previous attempts for designing systems with similar purpose, as well as from IDS systems like Snort. Colander emphasizes its ease of use and minimum demand for system resources. Although the resource usage is usually low, it still requires further optimization, as is noted in the performance testing. Colander's ability to detect threats has been tested by real malware, and it has undergone a pilot field application. Future prospects and development are also proposed.

Parallel Computing Environment based on Windows Operating System (Windows 운영체제 기반의 병렬 계산 환경)

  • Choe, Jeong Yeol;Sin, Jae Ryeol;Kim, Myeong Ho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.31 no.4
    • /
    • pp.16-25
    • /
    • 2003
  • A parallel computing environment based on Windows operating system was constructed and a performance test was mode in comparison with Linux based systems. The Windows 2000 cluster was composed with servers and clients connected by Fast-ethernet, within which two sub-clusters may operates together or separately. Compaq Visual Fortran complier and two MPI libraries, MPICH.NT.1.2.2 and NT-MPICHNT.1.2 were installed as computing tools. Parallel computing performance tests were carried out using two-dimensional preconditioned Navier-Stokes code to examine the dependency on the number of processors, problem size and MPI libraries, those were compared with results from Linux clusters. Results shows that a cluster based on the user-friendly Windows operating system is also useful for the parallel computing and has good performance comparable to the previous Linux clusters.

Windows placement system development for efficient use monitor (효율적인 모니터 사용을 위한 화면 배치 시스템 구현 -와이드 모니터 사용자를 위한 화면 구성 시스템 SquareSpace-)

  • Cho, Yun-Jeong;An, Dong-Un
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.428-431
    • /
    • 2009
  • Recently, uses of a large, wide screen monitors are general, so people that efficiently use work area of monitor is encreasing. Use pattern of monitor is being changed just using one window to many windows at a time. In this paper, I will explain develop windows placement system for efficient use monitor. It is different from other general utility about windows placement system because users can easily change windows placement to use preview window. The future, a large, wide screen monitors to keep pace with the demand to take advantage of the window to satisfy the needs of the user to manually adjust the window to the inconvenience that will be resolved.

  • PDF