Top Banner

of 51

Introduction to Microsoft Windows Vista

Apr 09, 2018

Download

Documents

srini_ece07
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/8/2019 Introduction to Microsoft Windows Vista

    1/51

    Introduction to Microsoft Windows Vista1. Windows Aero Interface

    2. Using Windows Vista3. Sharing Files in Windows Vista4. Networking and Windows Vista5. New Security Features in Vista6. Internet Explorer 7 and Other Browsers

  • 8/8/2019 Introduction to Microsoft Windows Vista

    2/51

    Section 1: Windows Vista EssentialsWith Windows Vista comes a classy new look, a multitude of new tools, and an interface similarenough to previous Windows operating systems to make it fairly simple to get accustomed to using.

    Windows Vista also offers a horde of new security features, a new Graphical User Interface (GUI)

    look and feel, and many support tools to aid professionals in their day to day tasks.

    The graphical changes within the upscale version of the operating system make the system seem far

    advanced from its predecessor. The addition of window animations, glass translucent windows, 3D

    flipping between windows, live thumbnails of each window on the desktop and much more make

    Windows Vista pop with style.

    At first glance, we recognize the graphical

    change in Windows Vista, but there is more to

    be found once we start exploring. We may

    notice the Start menus new non-expanding

    program guide or the new security measures

    like the User Account Control window warning

    of possible changes that can harm or change

    the system settings.

    Others may notice the Parental controls that

    give much needed support for parents trying to

    keep up with their childrens amount of time

    spent online, with games, or doing their

    homework. Windows Vista also introduces

    users to Gadgets, simple add-ons to what Windows calls the Sidebar of the Desktop. These gadgets

    can offer information regarding everything from weather to stock performance.

    Windows Vista EditionsUltimate The Ultimate package offers the AERO graphical interface, improved

    security features, more options for networking, advancements for games and

    mobility, exclusive download applications, and the new Media

    Center features.

    Home Premium The Home Premium package is the selection for

    most home and mobile users of the operating system, offering

    advancements in security, networking, and productivity.

    Home Basic the Home Basic package is for those who only

    need to browse the internet or check emails. The trimmed down

    version makes it easy to set up and maintain a basic machine.

    This version does not come with the AERO GUI. This version should only be used

    for those performing basic system tasks.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    3/51

    Business the Business package is designed to meet the needs of small

    businesses. The features of this package include advancements in networking,

    allowing more flexibility for office professionals wishing to use the VPN services, to

    map network drives, or to monitor employees computer usage.

    Enterprise the Enterprise edition offers multiple licenses for large

    companies. This version has all the features of business and adds

    features large organizations are expected to like. If a company has

    many computers to upgrade, then this version is the best solution.

    Installing Windows VistaThe installation of Windows Vista is greatly improved from its predecessors. The installation

    questions are streamlined at the opening of the process, rather than having to enter certain

    information at one point and waiting twenty minutes to completely answer all the questions. Everyinstallation question can now be answered and then system is installed. The entire installation

    process is quite simple, allowing less advanced users to navigate the process. We provide screen

    shots of the installation process later.

    Things you must have ready before installing1. Windows Vista Install Disk

    2. A DVD drive Windows Vista comes on DVD in retail packages (CD versions are available from

    Microsoft).

    3. Product Key: this is usually on the computer workstation itself or on the back of the Windows Vista

    booklet.

    4. The type of installation you purchased (If the product key is not known).5. What type of installation you wish to do: upgrade an existing OS or a clean installation.

    NOTE: The latter option will remove all existing information on the drive regardless of its contents.

    6. The user name and password you wish to setup on the new installation.

    7. Other basic questions about time, language, and Windows Update settings.

    With the information above, a user can effectively install a clean version of Windows on a system.

    New features such as BitLocker are available on the Premium and Enterprise versions of Windows

    Vista. BitLocker is a whole disk drive encryption tool and should only be used by power users and

    system administrations. To use Bitlocker, a user should be sure to have two partitions created on the

    hard drive. For more information on Bitlocker, review Section 6 of this tutorial.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    4/51

    During installation, you will be required to provide your product key. The product key determines the

    version of Windows to be installed the Windows Vista installation DVDs contain multiple versions

    of Vista. The product key determines which version gets installed.

    It is now a little more difficult to install the upgrade version of Windows. First, the installation can only

    be performed if the previous Windows operating system exists on the hard drive. This makes it

    difficult to perform a clean install with the upgrade version at a later date, especially if the reason for

    the re-install is due to hard drive failu

    re.

    For those with Windows XP installed on the hard drive, the installation process remains similar to

    that of a clean installation. The Windows installation guides a user through the process at startup.

    You will find the installation time is a great improvement over a standard Windows XP installation.

    You should be aware of hardware requirements for the specific version of Windows Vista you are

    installing. If you currently have an operating system installed, Microsoft provides a free tool to

    determine if you system may have any compatibility issues. The full Windows Vista AERO

    experience requires significant amount of system memory and a higher end video card.

    Overall the process of installing Windows Vista is far easier than Windows XP or any other

    predecessor. It asks the questions upfront and does away with having to return to the computer to

    move it along to the next step every ten minutes. It streamlines the whole installation.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    5/51

    Upgrading to Windows Vista

  • 8/8/2019 Introduction to Microsoft Windows Vista

    6/51

    See how your computerperforms under Windows Vista afterInstallIncluded with Vista is a new tool to determine your Windows Experience Index. Your system

    hardware is analyzed and assigned a rating. The computer rating falls between a range from 1 5.9,

    where 5.9 is the best possible score for you hardware. The overall score for your computer is thelowest score for any piece of hardware.

    The following computer hardware is rated:

    1. Processor

    2. Memory (RAM)

    3. Graphics

    4. Gaming Graphics

    5. Primary Hard Disk

    To find your systems Windows Experience Index Score

    1. Click on the Start Menu

    2. Select Control Panel

    3. Select the System and Maintenance link from the top

    4. Clickon the Windows Experience Index link

    In the future, software and games will have a Windows Experience Index rating. This score is

    valuable to most users to understand before purchasing software. It can help you to know the limits

    of your system before plunking down dollars for software that might not perform well on your

    configuration.Exercise: Locate the Windows Experience Index score for your system.

    What is Aero?

  • 8/8/2019 Introduction to Microsoft Windows Vista

    7/51

    The AERO interface, which stands for Authentic, Energetic, Reflective, and Open, gives users a

    crisp new graphical user interface in Windows Vista. The AERO interface only operates on the

    upscale versions of Windows Vista, including Home Premium, Business, Ultimate, and Enterprise

    editions. The benefits of having AERO on your system are mostly aesthetic, but can greatly enhance

    your production through quick and easy access to open documents.

    The translucent windows are the most notable addition to Windows and only available with the Aero

    interface. The windows become translucent allowing users to view the open windows behind them.

    The new interface gives the feeling of being more open and productive. The opacity of the windows

    can be adjusted along with the base color of the window, giving each user a more comfortable

    environment from which to work.

    The Windows Flip and Flip 3D options are only available under the AERO interface and allow for

    easier access to open information on your desktop. To see these functions in action, click the ALT +

    Tab key combination to shuffle through the Live thumbnails of your open applications. Those familiar

    with ALT + Tab in previous versions of Windows quickly realize the usefulness of the transparency

    and Live thumbnail features, allowing users to efficiently find any open window.

    Figure 1 Windows Flip (ALT + Tab)

    In addition to the Windows Flip, Windows Vista allows users to go through open windows in a 3D

    mode. The 3D flip mode activates using the Windows key + Tab. Give it a try.

    Figure 2 Windows Flip 3D (Win button + Tab)

  • 8/8/2019 Introduction to Microsoft Windows Vista

    8/51

    Configuring the User Interface

    The Windows Aero interface can be customized to suit each users specific needs. This

    configuration is similar to the ability to change themes in Microsoft Windows XP. Changing the colorsallows the user to become more comfortable with the OS dont just let the drab defaults dictate

    how you look at Vista change the colors to something you like!

    Lets start by changing the color of the interface from the default glass to a custom color.

    1. Right click the desktop and select Personalize.

    2. Select the top item, Window Color and

    Appearance.

    3. Choose a pre-determined color from the array ofcolors, or you can even create your own mixture

    by selecting the Show Color Mixer link. I put together a nice forest green for my window, as seen in

    Figure 3.

    4. Click OK and you have a new custom colored window.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    9/51

    Figure3 Window Color and Appearance Manager

    From the Personalize management screen you can customize other interface items for your new

    Windows Vista Desktop, from setting a photo of your family as the Desktop background to changing

    the opacity of the windows.Change Desktop Background from Default

    1. Right click the Desktop and select Personalize.

    2. From the Personalize management screen, select Desktop Background.

    3. Choose a pre installed picture from Microsoft or use the drop down menu to navigate to your

    personal pictures on your desktop.

    4. Choose how you want the picture to be presented: Stretched, Tiled, orCentered. Stretched

    expands the image to the entire size of the monitor screen (and in the process may expand one side

    more than another), Tiled repeats the photo horizontally and vertically, and Centered centers the

    photo on the desktop.5. Click OK.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    10/51

    Configuring Accessibility FeaturesWindows Vista offers many improvements to the accessibility features, including Speech recognition

    software built into the operating system. Accessibility features arent just for those with disabilities

    you could find options in this Control Panel which will help lessen the strain on your eyes, improve

    your productivity, or make the computer work better fo

    r your kids.

    Lets explore configuring the new features and adjusting the settings for specific disabilities.Ease of Access

    The Ease of Access Center allows users to customize the accessibility features of the operating

    system from one management screen. Available options inside the Ease of Access Center include

    magnifying on-screen text, a narrator who reads open documents, an on-screen keyboard, and the

    new speech recognition software.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    11/51

    Magnify text, the cursor, and icons

    Lets assume we need to increase the size of on-screen objects for a visually impaired user. The

    options available under the Ease of Access Center make improving user performance and

    productivity easily available.

    Use the computer without a displayFor those who are blind, the computer can narrative on-screen activities, including any systemmessages and on-screen text. Select the Use the computer without a display for those who are

    blind.Make the computer easier to see

    For anyone with difficulty seeing on-screen items, the computers usability increases drastically while

    using these settings. The High Contrastcolor scheme allows users to quickly switch to a black with

    white text version of the document, website, or screen they are viewing. The quick key for this

  • 8/8/2019 Introduction to Microsoft Windows Vista

    12/51

    feature is ALT + left SHIFT + PRINT SCREEN. The narrator can also be turned on or off from this

    menu, giving the visually an aural guide to on-screen contents.

    Figure 4 Ease of Access Menu Item

    The magnifier available under this selection makes parts of the

    screen larger. This can be turned on and off using the menu inthis section. The Magnifier management screen gives the user

    the option of enhancing the screen size by 2x to 16x the normal

    screen. The Magnifier can be docked at the top, left, right, or

    bottom of the screen.

    How to Turn on Magnifier1. Click the Start Menu.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    13/51

    2. Select Accessories from the Program List.

    3. Select Ease of Access Folder.

    4. Select Magnifier.

    5. Selectthe Scale factorfrom the menu, as shown in Figure 5.

    6. Select the Dock position from the menu, as shown in Figure 5.

    7. Exit the menu when you wish to suspend use of the

    magnifier.

    Figure 6 Windows Magnifier

    Under the Ease of Access Control Panel, users can also make the computer respond to other input

    devices other than a keyboard and mouse, such as a microphone. The Speech Recognition softwareallows users who experience difficulty with a keyboard to speak commands rather than to type or

    click them.

    A user with a handicap may desire a large mouse cursor or on-screen keyboard, which allows them

    to type using larger block letters. These additions make the system easier to use for those with

    disabilities. All-in-all, the Ease of Access makes Windows Vista one of the more accessible

    computers on the market, and a great improvement over previous iterations.

    Parental Controls

    The new parental controls in Windows Vista allow parents to monitor their childrens activities online

    as well as set time limits for their use. In order to set-up the Parental Controls, the user must be the

    administrator. Lets look at all we can do with the new Parental Controls.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    14/51

  • 8/8/2019 Introduction to Microsoft Windows Vista

    15/51

    This web filter can limit the sites to which the child has access, as well as limit downloads and the

    like. Lets take a look at its interface.

    You can manually administer which sites they are not allowed to view by selecting the Edit the Allow

    and block list link. You can specifically only allow them to view certain websites inside this list. The

    Parental Controls also allow you to choose which level of security they can see. The medium level is

    described as any unrated content and web content in the context of pornography, drugs, hate

    speech, and weapons. It is important to know that these controls may not block all content, but

    should be a good guide for your child online. The parent can also block file downloads, thus

    eliminating the possibility that your child might accidentally download spyware or malware to the

    computer.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    16/51

    Time Limits

    To set a time limit for the computer use, a parent can simply block sets of hours for the week. If a

    parent did not want their child online while they were still at work they could simply drag the cursor

    over the time period and that time would be blocked. Whenever the box appears as blue it is blocked

    and Vista will not allow them to log onto the computer.

    Games

    The robust parental controls can filter out certain type of games. They can eliminate anything under

    a specific rating, according to content, or disallow games all together. This would help many parents

    to enforce disciplinary actions, but can easily be changed in the future.Lets take a look at the game control features.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    17/51

    By selecting No to the question of Can My Kid play games? effectively stops any games from

    running on the system. To get more advanced settings, open the Set game ratings.

    As you can see, there are plenty of options for filtering games on your childs computer. You simply

    select the appropriate ratings for your child or go back to the previous screen and only allow certain

    games.

    Select the Block or Allow specific games link. Every game that has been installed on the system

    appears in this list. As a default, these games look to the rating system to determine whether or not

    they can be run. If you wish to manually change this, then you can d

    o so from this menu.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    18/51

    Allow and Block Specific Programs

    A parent can also block or allow certain programs installed on the system. The menu for this option

    gives control to users who select which programs to allow and which to block. These selections be

    changed and administered at any time, but only by the administrator of the computer. The

  • 8/8/2019 Introduction to Microsoft Windows Vista

    19/51

    administrator selects the program checkbox next to each installed software item.

    Activity Report

    The Activity Report gives detailed usage descriptions to the administrator, which cannot be altered

    by the user. The activity report gives a months worth of web traffic, hours played on games, which

    software was used, and much more. Lets take a look at a sample report.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    20/51

    A list of top ten sites visited, top ten sites blocked, web overrides, file downloads, blocked

    downloads, system logins, applications run, games played, email, and instant messaging appearright on the front of the report. By selecting the folder tree options on the left hand side, a parent can

    drill down into the usage statistics to see specific items.

    Overall the Parental controls can assist parents with administering a computer that opens a whole

    world up to an impressionable child. The much needed assistance with web browsing, software

    usage, and downloads should assist most guardians with keeping their Windows Vista install clean,

    their children safe, and their peace of mind intact.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    21/51

    The New Start MenuThe Start Menu has a similar look and feel to the XP Start Menu, but does have several great

    improvements to enhance the user experience. For instance, Windows now has a Search feature

    located under the Start Menu, where you can locate any file by entering a single keyword or a stringof words. This built-in search feature can assist with finding a picture, system file, document, or any

    other file on the computer. Windows indexes the computer and searches this index for any related

    terms, partial words, and more. In addition to the search feature, the Start Menu also handles

    expanding selections inside the same area, rather than expanding out across the desktop like the

    Programs folder would do in XP. There are also quick links to the Computer, Network, and more.

    Using Windows ExplorerThe Windows Explorer can be found by clicking the Computerlink on the Start Menu. This brings up

    a window that explores the contents of the computer. The folders are shown on the left hand side,

    and the main window holds the drives for use. In the upscale versions of the operating system, there

  • 8/8/2019 Introduction to Microsoft Windows Vista

    22/51

    is a Recovery Drive which enables Windows to backup system settings to a separate partition on the

    hard disk.

    The folder tree on the left hand side allows users to flip through all the folders on the computer. The

    search feature is also available on the upper right hand side of the window, allowing for quick access

    to find files. The new Windows Explorer adds the option to Add or Remove Programs, review

    System Properties, and change views of the window.

    Personal files are found under the User name. Lets locate the Documents folder which holds many

    key documents for users.

    1. Select the arrow next to the user name under the file folder list.

    2. Select the arrow next to the Documents folder.

    3. Click on the Documents folderto see the files and folders in the preview pane.

    Exercise: Change the default view of the Windows Explorer to show extra large icons, using the

    Views button in the toolbar.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    23/51

  • 8/8/2019 Introduction to Microsoft Windows Vista

    24/51

    3. Enter a Disk Title for the volume.

    4. Select eitherLive File System, which allows you to remove, to add, and to change existing files

    on the disk orMastered, which requires you to write the files once to the disk and then close the

    write functionality for that disk.

    5. Choose Next.

    6. Format the disk in the drive.

    7. The files automatically write to the disk.

    8. Remove the disk and label it.

    9. Finished!

    Exercise: Create a backup disk of your important files.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    25/51

    Windows Control PanelThe Control Panel has a new look and feel to it which can be switched to classic view for those whoare more comfortable with that style. The majority of the computer system functionality can be

    accessed from the Control Panel. It enables users to administer user accounts, security settings,

    system maintenance, network and the internet, hardware and software, programs, and the Ease of

    Access settings.

    System andMaintenanceThe System and Maintenance options allow users to create a backup schedule, view the System

    settings, including RAM and Processor speeds, control Windows Update, adjust the Power Options,

    configure the Index Options for the system search functionality, review Problem Reports and

    Solutions, evaluate system performance, administer device settings, and run Administrative tools.

    The administration and adjustments to these features allow users to create an up to date operating

    system and to remove, add, and adjust any performance features.User Accounts and Family Safety

    The Parental Controls are housed under this heading, along with User account access controls.

    Another new feature to Windows Vista is the Windows CardSpace, which allows users to create

    custom information cards, like a business card. The cards are intended to be used instead of loginsand passwords to specific sites. These sites ask if the user wishes to exchange cards and cannot

    take a card without the user approval.

    Exercise: Create a personal CardSpace c

    ard. Use the User Accounts and Family Safety heading under the Control Panel to get started.

    1. Select the User Accounts and Family Safety link.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    26/51

    2. Select Windows CardSpace from the menu.

    3. Choose Add a Card.

    4. Choose to Create a Personal Card.

    5. Edit the fields to include your personal information.

    Security

    Under the Security option, many elements reside that secure the connection to the Internet, provide

    spyware protection, virus protection, firewall access, and user account creation. We go into more

    details on configuring your security features in Section 5.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    27/51

    Appearance and Personalization

    As we discussed in Section 2: Customizing yourExperience, Windows Vista allows for many

    elements of the look and feel to change for individual user preference. It can be as trimmed down

    graphically as you like, or as flashy as you desire.

    Network and Internet

    We explore networking in Windows Vista in Section 6: Networking and Internet.

    Clock Language and Region

    The options to modify system time, set the region, and language for the operating system reside

    under this control panel applet.

    Hardware and Sound

    The peripherals attached to the computer, sideshow, keyboard, mouse, pen tool, and many other

    hardware features can be accessed through this option in the Control Panel. If you have a sound

    card, then the options for that card will appear under this header.

    Ease of Access

    As discussed in Section 2, the customization for disabilities is available with this tool. A user can

    magnify or narrate text, and customize their contrast settings for easier access.Programs

    The installed programs for the computer appear under this header. The list populates with available

    programs and allows users to install, remove, or modify existing installed programs. Windows also

    offers downloaded software through their Marketplace.

    Installing Applications

    The process of installing applications has been streamlined in Windows Vista. The software can

    either be installed from disk or by downloading the software directly from Microsofts Marketplace.

    Software installed must be installed by the administrator, unless other users have installation rights

    on the computer.

    Windows Vista protects users from installing malicious software by prompting users that they will beinstalling software from an outside source. The User Access Control (UAC) darkens the screen and

    asks if the user wishes to continue on with the operation. It is a small mindless step, but can keep

    you from doing damage to your system.

    Installing Software from the Internet

    Software typically comes on CDs or DVDs, but often programs are available for download online. In

    order to install these programs, click the link on the website to download the executable file. A

    window appears which prompts users to open or run the file once it has been downloaded to a

    temporary folder. Choose the run option to begin installing the desired software. The user may be

    prompted to enter the administrator password once the installation is ready to begin. Enter the

    password and follow the installation guide, placing your program in its desired folder and customize

    it as you see fit. When downloading software from websites, be sure you trust the publisher, as

    many sites offer downloads of software that are actually spyware or malware. It is also important to

    check compatibility with Windows Vista, as many older software versions will not work on Windows

    Vista.

    NOTE: If you want to download software, but install it later, simply choose to save the executable file

    to a folder on your system. When you are ready to install the software, find the file in Windows

    Explorer, double click it, and follow the installation prompts.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    28/51

  • 8/8/2019 Introduction to Microsoft Windows Vista

    29/51

    The Sharing and Discovery menu enables printer, file, media, password, and public folder sharing. If

    the feature has a lit green light and labeled on, then those features are working. To see the

    consequences of turning on and off each feature select the down arrow to view more about the

    settings.

    Network Discovery

    Turning this feature to On, enables the automatic detection of Workgroup computers on a network.

    Windows Vista automatically connects to these computers, allowing them to see the Vista machine

    and to interact.

    File Sharing

    By turning on this feature, users on the network can access files and printers current shared.

    Public Folder Sharing

    Turning this feature on allows users on a network to access publicly shared folders. The settings can

    be adjusted so only those with user account access can share files.Printer Sharing

    Turning this feature on enables users to have access to printers attached to this computer.

    Password Protected Sharing

    This option allows for only users with accounts to access the shared files and printers.

    How to Share a Folder

  • 8/8/2019 Introduction to Microsoft Windows Vista

    30/51

    There are many reasons why you may wish to share certain folders across your home network. For

    instance, the folder may hold your important documents that you wish to access from both your

    desktop and your laptop. Rather than keep the files on two separate drives, accessing the files and

    modifying them over the network makes changes and updates that much simpler.

    The files you share with someone on the network or locally can be altered if you give the new user

    access to do so. However, you can limit the remote users access to only read the file and not have

    permission to write to the file. This is accomplished through the Share functionality.

    1. Open the Windows Explorer(Start menu, then Computer).

    2. Find the folder you wish to share using the folder tree on the left.

    3. Click the folder.

    4. In the preview pane on the right, select the folder with a single click.

    5. Select Share from the toolbar on the top.

    6. Choose the users who you wish to access this folder. If you want it accessible to anyone on theNetwork, then you must change the Network settings.

    7. Select the type of Permissions for the added user: Reader, Contributor, or Co-Owner.

    8. Click Share and wait for the sharing process to complete.

    9. All the files are shared! Other local users or network users can now access these files.

    NOTE: to undo file sharing, reverse the process, starting with selecting the folder and click on Share.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    31/51

    Managing File SecurityIn the Sharing and Discovery area, files and folders can be shared in many different ways. The waywe setup file sharing can increase or decrease our computers security. For instance, if we share a

    folder and allow anyone on the network to access those files, with read, write, and execute ability, it

    opens the computer up to attack, albeit only across the network. The majority of files to be shared

    should be placed into the Public Shared folders. These folders can be found using the Windows

    Explorer.

    If, however, you have a specific folder you wish to share with other users on the network, then you

    may wish to enable the file sharing as previewed in Section 4: How to Share a Folder. Using a single

    folder also enables you to select users from the dropdown menu when setting up the share

    properties. The Public folders are accessible by anyone on the network, not just the users you

    specify. Of course convenience is also a factor. If you share large videos, pictures, or documents

    across the network, then you may not want to copy them to the Shared folders first, but rather share

    their existing folder on the network.

    The Sharing folders give users the simplicity of one central location for all shared files. If you dont

    share files across the network very often, then using the Shared folders makes it easy and simple.

    File Permissions

    File permissions are rules setup for specific files and folders as they relate to the users accessing

    the system, either across the network or locally. These rules can be modified for a more effective

    secure connection. For instance, you may wish to share you documents with your housemate, but

    not wish for them to modify, remove, or add to the document folder. In this case, simple user

    permission modifications can limit the users access to only Read the file, but not write or execute.

    Different File Permissions Explained

    Full Control Grants users access to modify, create, and run programs inside the folder. Anything

    that can be done as the owner of the folder can be done when a user has Full Control permissions.

    Modify the modify permissions allows users to change existing files within a folder, but they are

    limited in that they cannot create new files.

    Read and Execute the read and execute permissions allows a user to execute programs inside a

    folder.

    Read allows users to open and read files in a folder, but they cannot make changes to those

    files.

    Write Users can create new files and folders and make changes to existing files and folders.

    EXERCISE: Make a folder available to a user, but limit that user to Read capabilities only.

    1. Open the Windows Explorerand find the folder you wish to modify.

    2. Right click the folder and select Properties.

    3. Select the Security tab from the Properties dialog box.

    4. Highlight the useryou wish to limit in the list (single mouse click over the username).

    5. Select the Advanced tab under Permissions for that user (lower right).

  • 8/8/2019 Introduction to Microsoft Windows Vista

    32/51

    6. Choose the Userandselect Edit.

    7. Make the only option toallow Read, all others will be Deny.

    Sharing Printers and Other ResourcesMany computer users need to share their computers printer across a network. Windows Vista

    makes it simple to enable printer sharing.

    1. Open Control Panel, under the Start Menu.2. Click the Network and Internet option.

    3. Click the Network and Sharing Center.

    4. Turn on Printer Sharing.

    5. Click Apply. (You may be prompted for an administrator password.)

    NOTE: Select the button next to Password protected sharing. If the sharing requires users to

    have a user account and password, then anyone wishing to use the printer on the network will

    require these credentials.

    Sharing an Internet ConnectionMany users use a router to share their Internet connection with other computers on the network.

    However, at times an ad-hoc connection can share the computers Internet connection with another

    computer directly linked via a USB cable or Ethernet line. Lets take a look at how to enable Internet

    connection sharing.

    The host computer shares its connection with other satellite computers. On the host computer, open

    Network Connections located in the Control Panel.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    33/51

    1. Open Network Connections.

    2. Right click the connection you wish to share, i.e. the Ethernet connection.

    3. Click the Sharing tab and select Allowother network users to connect through this

    computers Internet connection.

    Effectively this enables other users to access the internet through your host computers connection.

    Internet Connection Sharing must be enabled for this to work properly. Also in order for sharing to be

    possible, this must all be done on the host computer, in other words the computer that connects

    directly to the broadband connection. Any device can use the shared internet connection, including

    an Xbox game console or laptop computer.

    Networking and Windows VistaAs we briefly discussed earlier, the network interface for Windows Vista seamlessly integrates into

    many different types of connections. Regardless of how the Vista machine connects to the internet,the setup is quite simple. For instance, if the Vista machine connects to a router or hub, then the

    network should appear automatically if theNetwork Discoveryfeature is turned to On. Lets check to

    ensure that is the case.

    1. Open the Control Panel.

    2. Select the Network and Sharing Center.

    3. Check to ensure the green lightis on for Network Discovery.

    4. If it is not, turn on Network Discovery.

    5. Enter the administrator password or click Continue if you are logged in as administrator.

    The computer should automatically connect to any Network with the same workgroup name, but can

    also connect if the workgroup name is different. If an established network is in place at home, then

    the computer should use the same Workgroup name.

    How to Change the Workgroup NameThe default Workgroup name for new installations is WORKGROUP. If for instance, the home

    network has a Workgroup name of SALLYSNETWORK, then we will want to change the Vista

    machines workgroup name to that.

    1. Open the Control Panel.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    34/51

    2. Select the Network and Sharing Center.

    3. Select the next to Network Discovery.

    4. Select Change Settings next to Workgroup.

    5. Click continue if logged in as administrator, or enter the administrator password.

    6. Click the Change button, where it says To rename this computer or change its domain or

    workgroup, click Change.

    7. Change the Workgroup name at the bottom of the screen.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    35/51

    8. Click OK.

    The Workgroup name has successfully been changed. Once this is done, the Network discovery

    should automatically detect any shared folders and printers on the Network.

    Lets check to make sure we can see other folders and printers available on the Network.

    1. Double click the Network Icon on the Desktop.

    2. The available devices on the network should be accessible from this menu.

    3. Double click any device to see the shared folders on that system.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    36/51

    Wireless NetworkingThere are many improvements in Windows Vista with Wireless networking. For instance, the dialogand configuration of the Wireless Network settings make it easier for users to setup and administer

    their wireless connections. Microsoft has also added support for non-broadcasting wireless

    networks, enabling users the ability to make these types of wireless networks the default connection.

    Of course, to connect to a wireless network the laptop or desktop must have integrated wireless or a

    wireless network adapter card. If you experience problems viewing networks, ensure that the

    wireless card has installed properly and that the drivers are up to date.

    The majority of users connect to a wireless connection by using the Connect to a Networkdialog box.

    This dialog can be accessed from the Start Menu and Connect To option.

    1. Open the Start Menu.

    2. Select Connect To.

    3. The screen prompts users to Select a Network to Connect to.

    4. Select the desired Wireless Network and click Connect.

    UnderShow, the following options are available.

    All Wireless, dial-up, and VPN connections.

    Wireless Only wireless connections.

    Dial-up and VPN Only dial-up and VPN connections.

    Vista also allows for Manual connection to a Network. To access this feature, click Connect

    Tounder the Start Menu.

    1. Choose Set up a connection or network link at the bottom.

    2. Choose the type of connection, for a new wireless network choose Setup up a wireless router or

    access point. Click Next.

    3. Click Next again and the computer detects the hardware necessary.

    4. Once the hardware has been detected the user is prompted for the following:

    a. Network Name

    b. Security Type (drop down menu)

    c. Encryption Type

    d. Security Key/Passphrase

    e. And Save this network for me only.

    Users can also set the new connection to start a connection automatically and to connect even if the

    network is not broadcasting. The last feature is for the non-broadcasting or hidden wireless networksthat increase security and protects your bandwidth.

    The Wireless options include creating wireless profiles, so as to eliminate difficulty choosing

    connections. So if the user has the computer on a cafs wireless and then takes the laptop home,

    the wireless connection recognizes this fact and automatically selects the appropriate profiled

    connection for the user.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    37/51

    Remote Access (Remote Desktop and Remote Assistance)Remote Assistance allows users to get help with any desktop related problem without requiring a

    service call. The person should be a friend or technical support representative in other words

    someone you trust. From Windows Vista, a remote user can view the desktop and even use theirown mouse and keyboard to fix a problem. In the same way, users can connect remotely to anyone

    elses computer once they are invited.

    Remote Assistance does allow remote users to connect to your computer, with your permission.

    However, once that person is into your system they can look at files, delete files, and basically do

    damage to your computer. Be sure the person who remotely accesses your computer is someone

    you trust. At any point you can cancel the assistance and disconnect the remote user from your

    machine.Setup access for remote assistance

    1. Right click the Computer icon.

    2. Select the Remote Settings option.

    3. Choose the type of connection to allow.

    4. Select Users allows administrators to choose who can access the computer remotely. Open the

    dialog to add a user who is not an administrator.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    38/51

    5. Click OK.

    NOTE: To enable Remote Desktop at all times, users must make sure that the computer does not go

    into sleep mode. To discontinue sleep mode, adjust the Power Options under the control panel.

    Allowing Remote Assistance is performed through the same Property window as enabling Remote

    Desktop. Lets take a look at how we can invite someone to remotely access our computer.

    How to Use Remote Assistance1. Open the Start Menu and Select Help and Support.

    2. From the menu, choose Use Windows Remote Assistance to get help from

    a friend or offer help.

    3. Choose either to Invite Someone or to Offer Help in the dialog.

    4. Choose either to email them an invitation or to save the invitation as a text file, which you can later

    transmit to them via an instant messenger program.

    5. Create a password for the session. This password is not the administrator password, but a

    password given for this specific session. It will expire after the session invitation expires.

    6. Click the Next button.

    7. An email should pop up with the invitation and the file the remote user will need to open to beginthe remote use.

    8. Send the email.How to Accept an Invitation from a Friend or Colleague

    1. Open the email or invitation they sent.

    2. Double click the attached remote assistance support ticket.

    3. Enter the password provided.

    4. Begin exploring the remote desktop to fix the problem.How to use Remote Desktop

    1. Open the Start menu and select Programs.

    2. Choose Accessories and find the Remote Desktop Connection option.

    3. Enter the computer name to which to connect.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    39/51

    4. Click Connect.

    NOTE: if you experience problems connecting, use the Options tab to ensure you are configured

    properly for the connection. Also ensure that the desktop you are trying to access allows Remote

    Access.

    With any of the remote access connections, all the data that is transmitted via the internet is

    secured. There is no risk of lost or stolen information by an internet sniffing tool. However, you must

    trust the person who might connect to you machine, and try to limit the invitations to a short amount

    of time, thus eliminating any malicious actions taken on part by someone you do not fully know.

    Setting up a VPN Connection to Your OfficeThe Virtual Private Network connection enables users to connect to an office intranet in order to view

    files and to transfer data. This can be extremely useful to the traveling worker and even more useful

    inside the Windows Vista machine.How to Setup a VPN

    1. Open the Network and Sharing Center, under Control Panel.2. Select the task on the left to Set up a connection or network.

    3. Choose Connect to a Workplace.

    4. Choose either to connect via the Internet (most common) or to dial directly into the network.

    5. Enter the Internet Address, usually the domain name or IP address of the VPN.

    6. Enter the Destination Name.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    40/51

    7. Choose any of the other three options that should apply for the connection and click Next.

    8. On the following screen, type the User Name and Password, along with the Domain (not the URL,

    but the VPNs internal Domain name).

    9. Click Connect.

    The connection should be established according to the information provided. If the VPN cannot be

    created, then the user can troubleshoot and determine the errors. A system administrator may be

    needed to give crucial domain information related to the VPN connection.

    Section 6: SecurityWindows Vista has been lauded as the most secure Microsoft product to date. Some additional

    security measures include the addition of encrypted files via the BitLocker program (which

  • 8/8/2019 Introduction to Microsoft Windows Vista

    41/51

    unfortunately is only available on the Premium packages), the Windows Security Center, Windows

    Defender and Automatic Updates. All of these updates help to increase the life of the system, as well

    as protect it from outside harm. The Firewall can eliminate the threat of outside hackers intruding on

    the system and causing damage. Defender keeps Malware and Spyware from being installed on the

    system. The User Account Control notifies users of system settings and warns them before making

    changes. All in all Windows Vista takes huge strides towards securing the Operating system from

    unwanted attacks.

    User Account Control (UAC)We spoke briefly about the new User Account Control feature in Windows Vista. This feature

    secures the operating system from unwanted installation, system setting changes, and much more.

    UAC prevents a computer from unwanted changes by prompting the user for an Administrator

    password, or if the user is the administrator, to confirm their action. UAC messages show the

    possible effects of making the change the user initiates and can help those who may not understand

    the implications a change may have on other users of the computer.

    There are four messages that appear under the UAC.1. Windows needs your permission to continue

    2. A program needs your permission to continue

    3. An unidentified program wants access to your computer

    4. This program has been blocked

    These messages all serve the purpose of limiting the amount of damage that malicious software can

    render to an operating system. Although they may be cumbersome and distracting for more

    advanced users, for intermediate and beginners they can eliminate hours of fighting spyware or

    malicious software in the future. Be sure to read the warnings as they come up on the screen and

    only continue if you are sure of the consequences.How to Turn off the User Account Control (UAC)

    Although it is not advisable to turn off the UAC, some users may prefer to throw caution to the wind

    and leave behind the warning messages.

    1. In order to turn off the UAC, click the User Account headerunder the Control Panel.

    2. Select Turn User Account Control on or off from the menu.

    3. You may be prompted to continue if you are the administrator, or for the administrator

    password.Enter the password.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    42/51

    4. Clearthe Use User Account Control (UAC) to help protect your computercheck box to turn off the

    UAC. Turn the UAC back on by selecting the checkbox.

    5. Click OK.

    In some instances, administrators may wish to turn the UAC into Admin Approval Mode. This mode

    enables users to bypass the UAC when they are performing a function warranted by the

    Administrative team. In order to use these features, the user must be part of the Administrative

    group on the computer. Only versions of Windows Vista Ultimate and Enterprise have these options

    available.

    onfiguring Windows Firewall and DefenderThe Windows Firewall effectively blocks any unwanted network traffic on a system. It acts as a

    virtual wall between a computer and the outside world. If a progra

    m tries to access your computer from outside, a warning dialog appears that the behavior has been

    stopped. The arrested behavior can be overridden if you trust the source. Also, programs on the

    system that access the internet must pass through the firewall to retrieve updates and program

    features. In order to enable the program, the Firewall must be customized to include exceptions.

    Open the Control Panel menu and click the Allow a Program through Windows Firewall link under

    the Security header. This brings up a window that allows you to select programs that current run on

    your system to be allowed to access the internet. Just put a check next to the program name, to

    enable that program, or remove the checkmark next to the program to disallow it from accessing the

    internet.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    43/51

    Windows Defender software protects the computer from unwanted spyware and malware that has

    plagued so many computer systems in the past. Spyware often comes attached to a program that is

    downloaded from the Internet. These programs monitor personal patterns regarding sites visited and

    programs used on the computer, and then connect to a server to transmit that information to another

    user. The more vicious programs monitor a computer and steal passwords, leading to identity theft

    and financial debacles. With the Defender, these programs cannot operate and will be rendered

    harmless.

    The Security Center provides access to Defender software. Any customizations that need done can

    be performed under this menu. Remember Defender is only available to select versions of Windows,

    including Business, Ultimate, and Enterprise editions.

    1. Open Control Panel and Select Security.

    2. Choose the Defenderlink.

    3. Choose the activity you wish Defender to perform from the taskbar, including reviewing history

    of scans, perform a new scan, and advanced tools.

    4. Choose the Scan options to perform a quick scan orfull scan.

    5. Choose Tools to make changes to Windows Defenders behavior.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    44/51

    a. Choose options.

    b. Select the times at which you want to perform a scan. It is advisable to perform a scan weekly.

    c. Choose the type of scan to perform either a quick or full scan.

    NOTE: The other options include more advanced behavior options that should only be changed by

    experience users, and a few administrator options, including whether other users have access to run

    the Defender software.

    BitlockerThe Bitlocker program is a new addition to the Windows Operating system. This software is only

    available to premium version of Windows Vista, including Ultimate and Enterprise editions. The

    Bitlocker program encrypts all files on the volume to ensure no one can access the data, even if they

    pull the harddrive from the computer and attempt to infiltrate it. This ensures that a laptop stolen will

    not become a tool for an identity thief. Sensitive corporate material can be protected from possible

    threats, which means all of our data will be safe from intrusion.

    In order to use Bitlocker, the hard drive must be formatted properly. Common errors involved anincorrectly formatted drive. The drive must use two partitions, so if the drive has not been created

    this way, then Windows must be reinstalled to use Bitlocker. One drive will be used for the operating

    system while the other drive acts as the active drive to create the installation.

    To setup Bitlocker, format the drive correctly, with at least a 1.5GB partition for the active drive. If

    Windows was installed without partitions then this would require a reinstall of Windows. Be sure to

    use the NTFS file system, as Bitlocker is not compatible with FAT 32.

    A TPM may not be found on the computer, as shown in the error message ab

  • 8/8/2019 Introduction to Microsoft Windows Vista

    45/51

    ove. A TPM is a Technical Protection Measure that is found usually on the motherboard of the

    computer system. If your computer has this error, contact the manufacturer to see about installing a

    TPM.

    ection 7: Internet Explorer 7The new version of Internet Explorer features tabbed browsing, phishing protection, and a new

    toolbar. We will explore these new options and help acquaint users with the changes that have come

    aboard with Microsofts widely used browser.

    Using IE 7IE 7 has changed a lot since IE 6. The browser now has tabs where new web pages can open inside

    the same window. This cuts down on the number of open windows on the computer, and makes for

    a much easier browsing experience.

    From the graphic above, there are two visible tabs available. The active tab pulls to the front of the

    screen, showing the content from the webpage in the browser screen. To flip to the other open tab,

    simply single click the tab and the content will appear in the browser below.

    As in all version of the browser, the URL address bar remains the same. In order to visit a website,

    type in the domain name of the site (i.e. www.google.com) in the address bar and click the

    button (or hit enter).

    New tabs can be opened by clicking the small tab ( ) next to an open tab in the browser window.

    Users can also see the open websites in a tiled view all on one page. The button to the left of the

    open sites ( ) tiles all the open windows and displays them on one webpage. From that page,

    any tile can be selected to open that site. This is especially useful when many different pages are

    open.

    The toolbar has changed, moving the Favorites selections to the left side of the tabs, and all the

    other functionality to the right hand side.

    The home button appears first from the selections on the right hand side. When IE 7 opens, more

    than one tab can be programmed to open with a different website, enabling users to create a more

    custom created experience.

    Create Multiple Home Pages to Appear on Startup

    1. Open IE 7 and select the arrow next to the home tab.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    46/51

    1. Choose to Add or Change Home Page.

    2. Select Add this webpage to your home page tabs.

    3. Repeat this step to add as many homepages as you wish to your IE7 startup.

    Built in Web Search FunctionalityIE7 now has search functionality built into the browser. A user can search for any topic using this

    built in search box and ut

    ilizing their favorite search engine. The first time the browser opens, a dialog appears where the user

    can select which search engine to use. Windows Live Search is the default, but many users may

    wish to change this to google.com or ask.com, or any number of other search engines, depending

    entirely on preference.How to configure a different search engine

    1. Open IE7 and click the Arrow next to the magnifying glass.

    2. From the options, choose the new search engine from those available or select Find more

    providers to locate your desired search engine.NOTE: To make a different search engine the default, select Change Search Defaults from the menu

    and highlight the desired default then click Set Default.

    Internet OptionsThe Internet Options menu has changed a little since IE6. Browsing history can now be deleted with

    one click, which includes cookies, temporary files, history, passwords, and information from the site.

    Obviously management of tabs has been added, including the ability to add line by line the Web

    pages a user wishes to use for their homepage.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    47/51

    Exercise: Delete all Browsing history. Warning! This will cause any saved passwords and temporary

    files to be lost. Only perform this Exercise if you are fine with losing this information.Security Settings

    The Security Settings inside IE 7 configure how the browser interacts with the Internet. When the

    setting is set to High, the browser will prompt before performing many actions and does not track

    cookies. Cookies are bits of information stored on your desktop that a website uses to remember

    you. Some sites require that users have cookies enabled in order to interact with their site. The

    default setting ofMedium-High should be adequate for most users.

    To change the Security Level open Internet Options, select the Security tab, and move the slide

    bar to the desired setting.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    48/51

    Tabs

    The Tabs feature of IE7 can be altered to suit each users desired functionality. For instance, the

    browser can be set to only open the first home page on startup, rather than opening multiple tabs.

    When a user follows a link in an email, the IE7 defaults the new window to a tab, rather than a

    window of its own. This and more personalized settings can be altered under Internet Options.

    Change IE7 to open outside program link requests to a new window rather than a tab

    1. Select Tools and Internet Options inside IE7.

    2. Choose Settings under the Tabs header.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    49/51

    3. Select A new Window under Open links from other programs.

    New Security FeaturesThe security features inside IE7 help to eliminate phishing, sites with bad certificates, and offer

    provisions for pop-up blocking.Phishing Filter

    Phishing is a term used for any site that attempts to steal your personal information, usually

    information related to your personal banking or other financial information. These phishing attacks

    usually come from following a deceptive link in an email. The Phishing filter on the browser helps to

    identify these sites by warning of a possibility of phishing attack and scanning sites for proper

    identification and credentials.

    When the Phishing filter is turned on, the browser displays warning messages from websites that

    may be trying to steal your personal information under the guise of a legitimate website. Basically

    the filter notices that certificates issued from the websites server are incomplete or non-existent, in

    which case the browser disables the site and the user must input whether they want to move on to

    the site or to leave.

    The address bar of the browser turns pink when a certificate does not meet quality standards. In this

    way users are safeguarded from making costly mistakes regarding their personal information on the

    Internet. The Phishing filter also can be turned off and only used when users want to validate a sites

    authenticity.

    NOTE: Certificates act as a way to identify the validity of a site. All online stores should have a valid

    Certificate. If the site you are visiting does not have a valid Certificate, it would not be wise to

    continue with your purchase.How to Turn ON and OFF the Phishing Filter

    1. Open IE7 and select the Tools button on the far right.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    50/51

    2. Choose the Phishing Filteroption.

    3. Selectto Turn ON orOFF the Phishing filter.

    NOTE: Return to that menu in order to individually check a website for Phishing.

    Pop-UpBlockerThe pop-up blocker made its debut in IE6. With the surge of pop-up ads, this addition to the browser

    makes surfing the web less annoying. If a site has a pop-up advertisement, then IE7 will block that

    ad from opening and notify the user that a pop-up was blocked. In certain cases, the pop-up might

    not be an ad, but rather a new window opened from the site to perform a necessary operation, like

    listen to a radio station or watch a video. If this happens, pop-ups can be enabled for the singular

    site or turned off completely.How to turn off the Pop-Up Blocker

    1. Select Tools under IE7.

    2. Choose the Pop-Up Blockerselection.

    3. Select to Turn off the Pop-Up Blocker.

    How to Install otherBrowsers under Windows VistaInternet Explorer 7 comes pre-installed under Windows Vista. However, some people prefer to use

    other web browsers, such as Mozilla Firefox or Opera. To install these third party browsers, you

    need to visit their site to download their installation package and follow the install procedures. Most

    third party browsers are free to download and to install. If you are only familiar with IE, then trying

    out a new browser might be an adventure. Lets walk through the process of installing Firefox.

    1. Open IE7 and type www.getfirefox.com in the address bar at the top.

    2. Choose to download the latest install package of Firefox from the main screen.

  • 8/8/2019 Introduction to Microsoft Windows Vista

    51/51

    3. A small window pops up Select Run or Save (if you want to ins

    tall at a later time).

    4. IE7 may not recognize the publisher, choose to Run the application.

    5. The User Account Controlpops up warning that the publisher is trying to access your computer.Choose to Allow the program to access the computer.

    6. Once the install package downloads, a dialog box appears to warn the user a program is trying to

    install. Choose to Allow the program to run.

    7. Follow the Mozilla installation guide.

    8. Once the installation completes, the newly installed Firefox browser will open. It will ask if you

    wish to make it the default browser for the computer, choose to enable it as default if you wish.

    Mozilla Firefox has many similar features to IE7, so getting accustomed to it should not be too

    difficult. It utilizes tabs as well as incorporates advanced security options.

    Exercise: Download and Install Firefox or any other browser to your Windows Vista computer.

    Windows Vista has made vast improvements to user security and usability concerns. For the moreadvanced to recreational users, the operating system has met and exceeded performance

    expectations.