You are on page 1of 3

Stephanie Adelmann

November 3, 2014
NT1110
Lab 5.1

Understanding BIOS POST, and Security Basics


Task 1: Understanding BIOS and POST
A computer uses AMI BIOS and when it boots up there is a sequence of 6 beeps.
The beeps indicate a Gate A20 Keyboard Controller Failure error. This error happens
when the keyboard IC controller has failed, which is preventing Gate A20 from switching
the processor into protected mode. This is usually caused by a bad keyboard or the
chip on your motherboard that controls your keyboard is not working. Try replacing the
keyboard.
A computer uses Phoenix Bios and when it boots up there is a sequence of beep
pause - beep beep beep pause - beep beep beep beep pause - beep beep beep
which is a 1-3-4-3 beep code. The beeps indicate a Test 512K Base Memory error.
This error happens when a failure was encountered either initializing or testing the first
1MB of system memory. Probably has a bad chip or possible failure is related to the
motherboard or a system device. Replacing the RAM is the usual recommendation.

Task 2: Basic Security


Hardware Firewalls
Hardware firewalls are used to protect an entire network. It stops malicious
software, viruses, and worms from infecting a single computer.

Stephanie Adelmann
November 3, 2014
NT1110
Lab 5.1

Hardware firewalls are actually referred to as routers. A computer connected to a


router has an address given to it by the router, while the router uses its own, single IP
address. So it is more difficult to target any specific computer behind a router than one
on direct connection. Basic routers only block certain computer ports and address while
the more expensive routers are designed to have specific features to prevent malicious
users from mounting an attack.
A disadvantage of the hardware firewall is it can spread viruses and malicious
software more easily to other computers on the network. If a connected computer has a
virus it will pass the virus to the other connected computer when information is
transferred. The router doesnt check the contents of the data and assumes that the
data being transferred is safe.
Hardware firewalls are a very effective security system by themselves but work
best in combination with other security methods. They are effective and easy to use.
Examples of hardware firewalls are Linksys and Cisco.

Software Firewalls
Software firewalls protect a single computer. Its the first and most important line
of defense against hackers, email spam, spyware, viruses, and other types of malicious
software.

Stephanie Adelmann
November 3, 2014
NT1110
Lab 5.1

They work by monitoring all open ports on a computer, checking all the
information that is received on them, and notifying the user of any activities trying to
access the computer. So if an application is using a specified port, the software firewall
will check the contents coming in on that port and pass it through if acceptable. If the
application is not acceptable then the software firewall will block all incoming/outgoing
information and notify the user that the program is trying to access the internet. This
allows the user to determine if the application is safe to have access to the internet.
Software firewalls are created with different levels of security. Computers come
with the most basic firewall built into the operating system to provide entry level firewall
protection until the user activates the security solutions like Norton or McAfee security
solutions. The more advanced software firewall will ask permission from the computer
user before any communication is approved, inside or outside the computer.
A disadvantage can be that since they are installed on an existing operation
system, they can easily be affected by the same viruses and malicious attacks as their
host machine. This increases the chance that the firewall can be disabled if attacked.
The software firewall is ideal for personal or home use, cheaper, and easy to
configure or reconfigure. Examples of a software firewall are Zone labs.
No combination of hardware or software firewalls can ever completely protect a
computer from viruses and malware, but the combination of them can make up for each
others weaknesses and provide the best all round protection. Updating your firewall is
essential to maintaining optimal protection.
3

You might also like