Introduction to Microsoft Windows Vista
-
Upload
sriniece07 -
Category
Documents
-
view
221 -
download
0
Transcript of Introduction to Microsoft Windows Vista
-
8/8/2019 Introduction to Microsoft Windows Vista
1/51
Introduction to Microsoft Windows Vista1. Windows Aero Interface
2. Using Windows Vista3. Sharing Files in Windows Vista4. Networking and Windows Vista5. New Security Features in Vista6. Internet Explorer 7 and Other Browsers
-
8/8/2019 Introduction to Microsoft Windows Vista
2/51
Section 1: Windows Vista EssentialsWith Windows Vista comes a classy new look, a multitude of new tools, and an interface similarenough to previous Windows operating systems to make it fairly simple to get accustomed to using.
Windows Vista also offers a horde of new security features, a new Graphical User Interface (GUI)
look and feel, and many support tools to aid professionals in their day to day tasks.
The graphical changes within the upscale version of the operating system make the system seem far
advanced from its predecessor. The addition of window animations, glass translucent windows, 3D
flipping between windows, live thumbnails of each window on the desktop and much more make
Windows Vista pop with style.
At first glance, we recognize the graphical
change in Windows Vista, but there is more to
be found once we start exploring. We may
notice the Start menus new non-expanding
program guide or the new security measures
like the User Account Control window warning
of possible changes that can harm or change
the system settings.
Others may notice the Parental controls that
give much needed support for parents trying to
keep up with their childrens amount of time
spent online, with games, or doing their
homework. Windows Vista also introduces
users to Gadgets, simple add-ons to what Windows calls the Sidebar of the Desktop. These gadgets
can offer information regarding everything from weather to stock performance.
Windows Vista EditionsUltimate The Ultimate package offers the AERO graphical interface, improved
security features, more options for networking, advancements for games and
mobility, exclusive download applications, and the new Media
Center features.
Home Premium The Home Premium package is the selection for
most home and mobile users of the operating system, offering
advancements in security, networking, and productivity.
Home Basic the Home Basic package is for those who only
need to browse the internet or check emails. The trimmed down
version makes it easy to set up and maintain a basic machine.
This version does not come with the AERO GUI. This version should only be used
for those performing basic system tasks.
-
8/8/2019 Introduction to Microsoft Windows Vista
3/51
Business the Business package is designed to meet the needs of small
businesses. The features of this package include advancements in networking,
allowing more flexibility for office professionals wishing to use the VPN services, to
map network drives, or to monitor employees computer usage.
Enterprise the Enterprise edition offers multiple licenses for large
companies. This version has all the features of business and adds
features large organizations are expected to like. If a company has
many computers to upgrade, then this version is the best solution.
Installing Windows VistaThe installation of Windows Vista is greatly improved from its predecessors. The installation
questions are streamlined at the opening of the process, rather than having to enter certain
information at one point and waiting twenty minutes to completely answer all the questions. Everyinstallation question can now be answered and then system is installed. The entire installation
process is quite simple, allowing less advanced users to navigate the process. We provide screen
shots of the installation process later.
Things you must have ready before installing1. Windows Vista Install Disk
2. A DVD drive Windows Vista comes on DVD in retail packages (CD versions are available from
Microsoft).
3. Product Key: this is usually on the computer workstation itself or on the back of the Windows Vista
booklet.
4. The type of installation you purchased (If the product key is not known).5. What type of installation you wish to do: upgrade an existing OS or a clean installation.
NOTE: The latter option will remove all existing information on the drive regardless of its contents.
6. The user name and password you wish to setup on the new installation.
7. Other basic questions about time, language, and Windows Update settings.
With the information above, a user can effectively install a clean version of Windows on a system.
New features such as BitLocker are available on the Premium and Enterprise versions of Windows
Vista. BitLocker is a whole disk drive encryption tool and should only be used by power users and
system administrations. To use Bitlocker, a user should be sure to have two partitions created on the
hard drive. For more information on Bitlocker, review Section 6 of this tutorial.
-
8/8/2019 Introduction to Microsoft Windows Vista
4/51
During installation, you will be required to provide your product key. The product key determines the
version of Windows to be installed the Windows Vista installation DVDs contain multiple versions
of Vista. The product key determines which version gets installed.
It is now a little more difficult to install the upgrade version of Windows. First, the installation can only
be performed if the previous Windows operating system exists on the hard drive. This makes it
difficult to perform a clean install with the upgrade version at a later date, especially if the reason for
the re-install is due to hard drive failu
re.
For those with Windows XP installed on the hard drive, the installation process remains similar to
that of a clean installation. The Windows installation guides a user through the process at startup.
You will find the installation time is a great improvement over a standard Windows XP installation.
You should be aware of hardware requirements for the specific version of Windows Vista you are
installing. If you currently have an operating system installed, Microsoft provides a free tool to
determine if you system may have any compatibility issues. The full Windows Vista AERO
experience requires significant amount of system memory and a higher end video card.
Overall the process of installing Windows Vista is far easier than Windows XP or any other
predecessor. It asks the questions upfront and does away with having to return to the computer to
move it along to the next step every ten minutes. It streamlines the whole installation.
-
8/8/2019 Introduction to Microsoft Windows Vista
5/51
Upgrading to Windows Vista
-
8/8/2019 Introduction to Microsoft Windows Vista
6/51
See how your computerperforms under Windows Vista afterInstallIncluded with Vista is a new tool to determine your Windows Experience Index. Your system
hardware is analyzed and assigned a rating. The computer rating falls between a range from 1 5.9,
where 5.9 is the best possible score for you hardware. The overall score for your computer is thelowest score for any piece of hardware.
The following computer hardware is rated:
1. Processor
2. Memory (RAM)
3. Graphics
4. Gaming Graphics
5. Primary Hard Disk
To find your systems Windows Experience Index Score
1. Click on the Start Menu
2. Select Control Panel
3. Select the System and Maintenance link from the top
4. Clickon the Windows Experience Index link
In the future, software and games will have a Windows Experience Index rating. This score is
valuable to most users to understand before purchasing software. It can help you to know the limits
of your system before plunking down dollars for software that might not perform well on your
configuration.Exercise: Locate the Windows Experience Index score for your system.
What is Aero?
-
8/8/2019 Introduction to Microsoft Windows Vista
7/51
The AERO interface, which stands for Authentic, Energetic, Reflective, and Open, gives users a
crisp new graphical user interface in Windows Vista. The AERO interface only operates on the
upscale versions of Windows Vista, including Home Premium, Business, Ultimate, and Enterprise
editions. The benefits of having AERO on your system are mostly aesthetic, but can greatly enhance
your production through quick and easy access to open documents.
The translucent windows are the most notable addition to Windows and only available with the Aero
interface. The windows become translucent allowing users to view the open windows behind them.
The new interface gives the feeling of being more open and productive. The opacity of the windows
can be adjusted along with the base color of the window, giving each user a more comfortable
environment from which to work.
The Windows Flip and Flip 3D options are only available under the AERO interface and allow for
easier access to open information on your desktop. To see these functions in action, click the ALT +
Tab key combination to shuffle through the Live thumbnails of your open applications. Those familiar
with ALT + Tab in previous versions of Windows quickly realize the usefulness of the transparency
and Live thumbnail features, allowing users to efficiently find any open window.
Figure 1 Windows Flip (ALT + Tab)
In addition to the Windows Flip, Windows Vista allows users to go through open windows in a 3D
mode. The 3D flip mode activates using the Windows key + Tab. Give it a try.
Figure 2 Windows Flip 3D (Win button + Tab)
-
8/8/2019 Introduction to Microsoft Windows Vista
8/51
Configuring the User Interface
The Windows Aero interface can be customized to suit each users specific needs. This
configuration is similar to the ability to change themes in Microsoft Windows XP. Changing the colorsallows the user to become more comfortable with the OS dont just let the drab defaults dictate
how you look at Vista change the colors to something you like!
Lets start by changing the color of the interface from the default glass to a custom color.
1. Right click the desktop and select Personalize.
2. Select the top item, Window Color and
Appearance.
3. Choose a pre-determined color from the array ofcolors, or you can even create your own mixture
by selecting the Show Color Mixer link. I put together a nice forest green for my window, as seen in
Figure 3.
4. Click OK and you have a new custom colored window.
-
8/8/2019 Introduction to Microsoft Windows Vista
9/51
Figure3 Window Color and Appearance Manager
From the Personalize management screen you can customize other interface items for your new
Windows Vista Desktop, from setting a photo of your family as the Desktop background to changing
the opacity of the windows.Change Desktop Background from Default
1. Right click the Desktop and select Personalize.
2. From the Personalize management screen, select Desktop Background.
3. Choose a pre installed picture from Microsoft or use the drop down menu to navigate to your
personal pictures on your desktop.
4. Choose how you want the picture to be presented: Stretched, Tiled, orCentered. Stretched
expands the image to the entire size of the monitor screen (and in the process may expand one side
more than another), Tiled repeats the photo horizontally and vertically, and Centered centers the
photo on the desktop.5. Click OK.
-
8/8/2019 Introduction to Microsoft Windows Vista
10/51
Configuring Accessibility FeaturesWindows Vista offers many improvements to the accessibility features, including Speech recognition
software built into the operating system. Accessibility features arent just for those with disabilities
you could find options in this Control Panel which will help lessen the strain on your eyes, improve
your productivity, or make the computer work better fo
r your kids.
Lets explore configuring the new features and adjusting the settings for specific disabilities.Ease of Access
The Ease of Access Center allows users to customize the accessibility features of the operating
system from one management screen. Available options inside the Ease of Access Center include
magnifying on-screen text, a narrator who reads open documents, an on-screen keyboard, and the
new speech recognition software.
-
8/8/2019 Introduction to Microsoft Windows Vista
11/51
Magnify text, the cursor, and icons
Lets assume we need to increase the size of on-screen objects for a visually impaired user. The
options available under the Ease of Access Center make improving user performance and
productivity easily available.
Use the computer without a displayFor those who are blind, the computer can narrative on-screen activities, including any systemmessages and on-screen text. Select the Use the computer without a display for those who are
blind.Make the computer easier to see
For anyone with difficulty seeing on-screen items, the computers usability increases drastically while
using these settings. The High Contrastcolor scheme allows users to quickly switch to a black with
white text version of the document, website, or screen they are viewing. The quick key for this
-
8/8/2019 Introduction to Microsoft Windows Vista
12/51
feature is ALT + left SHIFT + PRINT SCREEN. The narrator can also be turned on or off from this
menu, giving the visually an aural guide to on-screen contents.
Figure 4 Ease of Access Menu Item
The magnifier available under this selection makes parts of the
screen larger. This can be turned on and off using the menu inthis section. The Magnifier management screen gives the user
the option of enhancing the screen size by 2x to 16x the normal
screen. The Magnifier can be docked at the top, left, right, or
bottom of the screen.
How to Turn on Magnifier1. Click the Start Menu.
-
8/8/2019 Introduction to Microsoft Windows Vista
13/51
2. Select Accessories from the Program List.
3. Select Ease of Access Folder.
4. Select Magnifier.
5. Selectthe Scale factorfrom the menu, as shown in Figure 5.
6. Select the Dock position from the menu, as shown in Figure 5.
7. Exit the menu when you wish to suspend use of the
magnifier.
Figure 6 Windows Magnifier
Under the Ease of Access Control Panel, users can also make the computer respond to other input
devices other than a keyboard and mouse, such as a microphone. The Speech Recognition softwareallows users who experience difficulty with a keyboard to speak commands rather than to type or
click them.
A user with a handicap may desire a large mouse cursor or on-screen keyboard, which allows them
to type using larger block letters. These additions make the system easier to use for those with
disabilities. All-in-all, the Ease of Access makes Windows Vista one of the more accessible
computers on the market, and a great improvement over previous iterations.
Parental Controls
The new parental controls in Windows Vista allow parents to monitor their childrens activities online
as well as set time limits for their use. In order to set-up the Parental Controls, the user must be the
administrator. Lets look at all we can do with the new Parental Controls.
-
8/8/2019 Introduction to Microsoft Windows Vista
14/51
-
8/8/2019 Introduction to Microsoft Windows Vista
15/51
This web filter can limit the sites to which the child has access, as well as limit downloads and the
like. Lets take a look at its interface.
You can manually administer which sites they are not allowed to view by selecting the Edit the Allow
and block list link. You can specifically only allow them to view certain websites inside this list. The
Parental Controls also allow you to choose which level of security they can see. The medium level is
described as any unrated content and web content in the context of pornography, drugs, hate
speech, and weapons. It is important to know that these controls may not block all content, but
should be a good guide for your child online. The parent can also block file downloads, thus
eliminating the possibility that your child might accidentally download spyware or malware to the
computer.
-
8/8/2019 Introduction to Microsoft Windows Vista
16/51
Time Limits
To set a time limit for the computer use, a parent can simply block sets of hours for the week. If a
parent did not want their child online while they were still at work they could simply drag the cursor
over the time period and that time would be blocked. Whenever the box appears as blue it is blocked
and Vista will not allow them to log onto the computer.
Games
The robust parental controls can filter out certain type of games. They can eliminate anything under
a specific rating, according to content, or disallow games all together. This would help many parents
to enforce disciplinary actions, but can easily be changed in the future.Lets take a look at the game control features.
-
8/8/2019 Introduction to Microsoft Windows Vista
17/51
By selecting No to the question of Can My Kid play games? effectively stops any games from
running on the system. To get more advanced settings, open the Set game ratings.
As you can see, there are plenty of options for filtering games on your childs computer. You simply
select the appropriate ratings for your child or go back to the previous screen and only allow certain
games.
Select the Block or Allow specific games link. Every game that has been installed on the system
appears in this list. As a default, these games look to the rating system to determine whether or not
they can be run. If you wish to manually change this, then you can d
o so from this menu.
-
8/8/2019 Introduction to Microsoft Windows Vista
18/51
Allow and Block Specific Programs
A parent can also block or allow certain programs installed on the system. The menu for this option
gives control to users who select which programs to allow and which to block. These selections be
changed and administered at any time, but only by the administrator of the computer. The
-
8/8/2019 Introduction to Microsoft Windows Vista
19/51
administrator selects the program checkbox next to each installed software item.
Activity Report
The Activity Report gives detailed usage descriptions to the administrator, which cannot be altered
by the user. The activity report gives a months worth of web traffic, hours played on games, which
software was used, and much more. Lets take a look at a sample report.
-
8/8/2019 Introduction to Microsoft Windows Vista
20/51
A list of top ten sites visited, top ten sites blocked, web overrides, file downloads, blocked
downloads, system logins, applications run, games played, email, and instant messaging appearright on the front of the report. By selecting the folder tree options on the left hand side, a parent can
drill down into the usage statistics to see specific items.
Overall the Parental controls can assist parents with administering a computer that opens a whole
world up to an impressionable child. The much needed assistance with web browsing, software
usage, and downloads should assist most guardians with keeping their Windows Vista install clean,
their children safe, and their peace of mind intact.
-
8/8/2019 Introduction to Microsoft Windows Vista
21/51
The New Start MenuThe Start Menu has a similar look and feel to the XP Start Menu, but does have several great
improvements to enhance the user experience. For instance, Windows now has a Search feature
located under the Start Menu, where you can locate any file by entering a single keyword or a stringof words. This built-in search feature can assist with finding a picture, system file, document, or any
other file on the computer. Windows indexes the computer and searches this index for any related
terms, partial words, and more. In addition to the search feature, the Start Menu also handles
expanding selections inside the same area, rather than expanding out across the desktop like the
Programs folder would do in XP. There are also quick links to the Computer, Network, and more.
Using Windows ExplorerThe Windows Explorer can be found by clicking the Computerlink on the Start Menu. This brings up
a window that explores the contents of the computer. The folders are shown on the left hand side,
and the main window holds the drives for use. In the upscale versions of the operating system, there
-
8/8/2019 Introduction to Microsoft Windows Vista
22/51
is a Recovery Drive which enables Windows to backup system settings to a separate partition on the
hard disk.
The folder tree on the left hand side allows users to flip through all the folders on the computer. The
search feature is also available on the upper right hand side of the window, allowing for quick access
to find files. The new Windows Explorer adds the option to Add or Remove Programs, review
System Properties, and change views of the window.
Personal files are found under the User name. Lets locate the Documents folder which holds many
key documents for users.
1. Select the arrow next to the user name under the file folder list.
2. Select the arrow next to the Documents folder.
3. Click on the Documents folderto see the files and folders in the preview pane.
Exercise: Change the default view of the Windows Explorer to show extra large icons, using the
Views button in the toolbar.
-
8/8/2019 Introduction to Microsoft Windows Vista
23/51
-
8/8/2019 Introduction to Microsoft Windows Vista
24/51
3. Enter a Disk Title for the volume.
4. Select eitherLive File System, which allows you to remove, to add, and to change existing files
on the disk orMastered, which requires you to write the files once to the disk and then close the
write functionality for that disk.
5. Choose Next.
6. Format the disk in the drive.
7. The files automatically write to the disk.
8. Remove the disk and label it.
9. Finished!
Exercise: Create a backup disk of your important files.
-
8/8/2019 Introduction to Microsoft Windows Vista
25/51
Windows Control PanelThe Control Panel has a new look and feel to it which can be switched to classic view for those whoare more comfortable with that style. The majority of the computer system functionality can be
accessed from the Control Panel. It enables users to administer user accounts, security settings,
system maintenance, network and the internet, hardware and software, programs, and the Ease of
Access settings.
System andMaintenanceThe System and Maintenance options allow users to create a backup schedule, view the System
settings, including RAM and Processor speeds, control Windows Update, adjust the Power Options,
configure the Index Options for the system search functionality, review Problem Reports and
Solutions, evaluate system performance, administer device settings, and run Administrative tools.
The administration and adjustments to these features allow users to create an up to date operating
system and to remove, add, and adjust any performance features.User Accounts and Family Safety
The Parental Controls are housed under this heading, along with User account access controls.
Another new feature to Windows Vista is the Windows CardSpace, which allows users to create
custom information cards, like a business card. The cards are intended to be used instead of loginsand passwords to specific sites. These sites ask if the user wishes to exchange cards and cannot
take a card without the user approval.
Exercise: Create a personal CardSpace c
ard. Use the User Accounts and Family Safety heading under the Control Panel to get started.
1. Select the User Accounts and Family Safety link.
-
8/8/2019 Introduction to Microsoft Windows Vista
26/51
2. Select Windows CardSpace from the menu.
3. Choose Add a Card.
4. Choose to Create a Personal Card.
5. Edit the fields to include your personal information.
Security
Under the Security option, many elements reside that secure the connection to the Internet, provide
spyware protection, virus protection, firewall access, and user account creation. We go into more
details on configuring your security features in Section 5.
-
8/8/2019 Introduction to Microsoft Windows Vista
27/51
Appearance and Personalization
As we discussed in Section 2: Customizing yourExperience, Windows Vista allows for many
elements of the look and feel to change for individual user preference. It can be as trimmed down
graphically as you like, or as flashy as you desire.
Network and Internet
We explore networking in Windows Vista in Section 6: Networking and Internet.
Clock Language and Region
The options to modify system time, set the region, and language for the operating system reside
under this control panel applet.
Hardware and Sound
The peripherals attached to the computer, sideshow, keyboard, mouse, pen tool, and many other
hardware features can be accessed through this option in the Control Panel. If you have a sound
card, then the options for that card will appear under this header.
Ease of Access
As discussed in Section 2, the customization for disabilities is available with this tool. A user can
magnify or narrate text, and customize their contrast settings for easier access.Programs
The installed programs for the computer appear under this header. The list populates with available
programs and allows users to install, remove, or modify existing installed programs. Windows also
offers downloaded software through their Marketplace.
Installing Applications
The process of installing applications has been streamlined in Windows Vista. The software can
either be installed from disk or by downloading the software directly from Microsofts Marketplace.
Software installed must be installed by the administrator, unless other users have installation rights
on the computer.
Windows Vista protects users from installing malicious software by prompting users that they will beinstalling software from an outside source. The User Access Control (UAC) darkens the screen and
asks if the user wishes to continue on with the operation. It is a small mindless step, but can keep
you from doing damage to your system.
Installing Software from the Internet
Software typically comes on CDs or DVDs, but often programs are available for download online. In
order to install these programs, click the link on the website to download the executable file. A
window appears which prompts users to open or run the file once it has been downloaded to a
temporary folder. Choose the run option to begin installing the desired software. The user may be
prompted to enter the administrator password once the installation is ready to begin. Enter the
password and follow the installation guide, placing your program in its desired folder and customize
it as you see fit. When downloading software from websites, be sure you trust the publisher, as
many sites offer downloads of software that are actually spyware or malware. It is also important to
check compatibility with Windows Vista, as many older software versions will not work on Windows
Vista.
NOTE: If you want to download software, but install it later, simply choose to save the executable file
to a folder on your system. When you are ready to install the software, find the file in Windows
Explorer, double click it, and follow the installation prompts.
-
8/8/2019 Introduction to Microsoft Windows Vista
28/51
-
8/8/2019 Introduction to Microsoft Windows Vista
29/51
The Sharing and Discovery menu enables printer, file, media, password, and public folder sharing. If
the feature has a lit green light and labeled on, then those features are working. To see the
consequences of turning on and off each feature select the down arrow to view more about the
settings.
Network Discovery
Turning this feature to On, enables the automatic detection of Workgroup computers on a network.
Windows Vista automatically connects to these computers, allowing them to see the Vista machine
and to interact.
File Sharing
By turning on this feature, users on the network can access files and printers current shared.
Public Folder Sharing
Turning this feature on allows users on a network to access publicly shared folders. The settings can
be adjusted so only those with user account access can share files.Printer Sharing
Turning this feature on enables users to have access to printers attached to this computer.
Password Protected Sharing
This option allows for only users with accounts to access the shared files and printers.
How to Share a Folder
-
8/8/2019 Introduction to Microsoft Windows Vista
30/51
There are many reasons why you may wish to share certain folders across your home network. For
instance, the folder may hold your important documents that you wish to access from both your
desktop and your laptop. Rather than keep the files on two separate drives, accessing the files and
modifying them over the network makes changes and updates that much simpler.
The files you share with someone on the network or locally can be altered if you give the new user
access to do so. However, you can limit the remote users access to only read the file and not have
permission to write to the file. This is accomplished through the Share functionality.
1. Open the Windows Explorer(Start menu, then Computer).
2. Find the folder you wish to share using the folder tree on the left.
3. Click the folder.
4. In the preview pane on the right, select the folder with a single click.
5. Select Share from the toolbar on the top.
6. Choose the users who you wish to access this folder. If you want it accessible to anyone on theNetwork, then you must change the Network settings.
7. Select the type of Permissions for the added user: Reader, Contributor, or Co-Owner.
8. Click Share and wait for the sharing process to complete.
9. All the files are shared! Other local users or network users can now access these files.
NOTE: to undo file sharing, reverse the process, starting with selecting the folder and click on Share.
-
8/8/2019 Introduction to Microsoft Windows Vista
31/51
Managing File SecurityIn the Sharing and Discovery area, files and folders can be shared in many different ways. The waywe setup file sharing can increase or decrease our computers security. For instance, if we share a
folder and allow anyone on the network to access those files, with read, write, and execute ability, it
opens the computer up to attack, albeit only across the network. The majority of files to be shared
should be placed into the Public Shared folders. These folders can be found using the Windows
Explorer.
If, however, you have a specific folder you wish to share with other users on the network, then you
may wish to enable the file sharing as previewed in Section 4: How to Share a Folder. Using a single
folder also enables you to select users from the dropdown menu when setting up the share
properties. The Public folders are accessible by anyone on the network, not just the users you
specify. Of course convenience is also a factor. If you share large videos, pictures, or documents
across the network, then you may not want to copy them to the Shared folders first, but rather share
their existing folder on the network.
The Sharing folders give users the simplicity of one central location for all shared files. If you dont
share files across the network very often, then using the Shared folders makes it easy and simple.
File Permissions
File permissions are rules setup for specific files and folders as they relate to the users accessing
the system, either across the network or locally. These rules can be modified for a more effective
secure connection. For instance, you may wish to share you documents with your housemate, but
not wish for them to modify, remove, or add to the document folder. In this case, simple user
permission modifications can limit the users access to only Read the file, but not write or execute.
Different File Permissions Explained
Full Control Grants users access to modify, create, and run programs inside the folder. Anything
that can be done as the owner of the folder can be done when a user has Full Control permissions.
Modify the modify permissions allows users to change existing files within a folder, but they are
limited in that they cannot create new files.
Read and Execute the read and execute permissions allows a user to execute programs inside a
folder.
Read allows users to open and read files in a folder, but they cannot make changes to those
files.
Write Users can create new files and folders and make changes to existing files and folders.
EXERCISE: Make a folder available to a user, but limit that user to Read capabilities only.
1. Open the Windows Explorerand find the folder you wish to modify.
2. Right click the folder and select Properties.
3. Select the Security tab from the Properties dialog box.
4. Highlight the useryou wish to limit in the list (single mouse click over the username).
5. Select the Advanced tab under Permissions for that user (lower right).
-
8/8/2019 Introduction to Microsoft Windows Vista
32/51
6. Choose the Userandselect Edit.
7. Make the only option toallow Read, all others will be Deny.
Sharing Printers and Other ResourcesMany computer users need to share their computers printer across a network. Windows Vista
makes it simple to enable printer sharing.
1. Open Control Panel, under the Start Menu.2. Click the Network and Internet option.
3. Click the Network and Sharing Center.
4. Turn on Printer Sharing.
5. Click Apply. (You may be prompted for an administrator password.)
NOTE: Select the button next to Password protected sharing. If the sharing requires users to
have a user account and password, then anyone wishing to use the printer on the network will
require these credentials.
Sharing an Internet ConnectionMany users use a router to share their Internet connection with other computers on the network.
However, at times an ad-hoc connection can share the computers Internet connection with another
computer directly linked via a USB cable or Ethernet line. Lets take a look at how to enable Internet
connection sharing.
The host computer shares its connection with other satellite computers. On the host computer, open
Network Connections located in the Control Panel.
-
8/8/2019 Introduction to Microsoft Windows Vista
33/51
1. Open Network Connections.
2. Right click the connection you wish to share, i.e. the Ethernet connection.
3. Click the Sharing tab and select Allowother network users to connect through this
computers Internet connection.
Effectively this enables other users to access the internet through your host computers connection.
Internet Connection Sharing must be enabled for this to work properly. Also in order for sharing to be
possible, this must all be done on the host computer, in other words the computer that connects
directly to the broadband connection. Any device can use the shared internet connection, including
an Xbox game console or laptop computer.
Networking and Windows VistaAs we briefly discussed earlier, the network interface for Windows Vista seamlessly integrates into
many different types of connections. Regardless of how the Vista machine connects to the internet,the setup is quite simple. For instance, if the Vista machine connects to a router or hub, then the
network should appear automatically if theNetwork Discoveryfeature is turned to On. Lets check to
ensure that is the case.
1. Open the Control Panel.
2. Select the Network and Sharing Center.
3. Check to ensure the green lightis on for Network Discovery.
4. If it is not, turn on Network Discovery.
5. Enter the administrator password or click Continue if you are logged in as administrator.
The computer should automatically connect to any Network with the same workgroup name, but can
also connect if the workgroup name is different. If an established network is in place at home, then
the computer should use the same Workgroup name.
How to Change the Workgroup NameThe default Workgroup name for new installations is WORKGROUP. If for instance, the home
network has a Workgroup name of SALLYSNETWORK, then we will want to change the Vista
machines workgroup name to that.
1. Open the Control Panel.
-
8/8/2019 Introduction to Microsoft Windows Vista
34/51
2. Select the Network and Sharing Center.
3. Select the next to Network Discovery.
4. Select Change Settings next to Workgroup.
5. Click continue if logged in as administrator, or enter the administrator password.
6. Click the Change button, where it says To rename this computer or change its domain or
workgroup, click Change.
7. Change the Workgroup name at the bottom of the screen.
-
8/8/2019 Introduction to Microsoft Windows Vista
35/51
8. Click OK.
The Workgroup name has successfully been changed. Once this is done, the Network discovery
should automatically detect any shared folders and printers on the Network.
Lets check to make sure we can see other folders and printers available on the Network.
1. Double click the Network Icon on the Desktop.
2. The available devices on the network should be accessible from this menu.
3. Double click any device to see the shared folders on that system.
-
8/8/2019 Introduction to Microsoft Windows Vista
36/51
Wireless NetworkingThere are many improvements in Windows Vista with Wireless networking. For instance, the dialogand configuration of the Wireless Network settings make it easier for users to setup and administer
their wireless connections. Microsoft has also added support for non-broadcasting wireless
networks, enabling users the ability to make these types of wireless networks the default connection.
Of course, to connect to a wireless network the laptop or desktop must have integrated wireless or a
wireless network adapter card. If you experience problems viewing networks, ensure that the
wireless card has installed properly and that the drivers are up to date.
The majority of users connect to a wireless connection by using the Connect to a Networkdialog box.
This dialog can be accessed from the Start Menu and Connect To option.
1. Open the Start Menu.
2. Select Connect To.
3. The screen prompts users to Select a Network to Connect to.
4. Select the desired Wireless Network and click Connect.
UnderShow, the following options are available.
All Wireless, dial-up, and VPN connections.
Wireless Only wireless connections.
Dial-up and VPN Only dial-up and VPN connections.
Vista also allows for Manual connection to a Network. To access this feature, click Connect
Tounder the Start Menu.
1. Choose Set up a connection or network link at the bottom.
2. Choose the type of connection, for a new wireless network choose Setup up a wireless router or
access point. Click Next.
3. Click Next again and the computer detects the hardware necessary.
4. Once the hardware has been detected the user is prompted for the following:
a. Network Name
b. Security Type (drop down menu)
c. Encryption Type
d. Security Key/Passphrase
e. And Save this network for me only.
Users can also set the new connection to start a connection automatically and to connect even if the
network is not broadcasting. The last feature is for the non-broadcasting or hidden wireless networksthat increase security and protects your bandwidth.
The Wireless options include creating wireless profiles, so as to eliminate difficulty choosing
connections. So if the user has the computer on a cafs wireless and then takes the laptop home,
the wireless connection recognizes this fact and automatically selects the appropriate profiled
connection for the user.
-
8/8/2019 Introduction to Microsoft Windows Vista
37/51
Remote Access (Remote Desktop and Remote Assistance)Remote Assistance allows users to get help with any desktop related problem without requiring a
service call. The person should be a friend or technical support representative in other words
someone you trust. From Windows Vista, a remote user can view the desktop and even use theirown mouse and keyboard to fix a problem. In the same way, users can connect remotely to anyone
elses computer once they are invited.
Remote Assistance does allow remote users to connect to your computer, with your permission.
However, once that person is into your system they can look at files, delete files, and basically do
damage to your computer. Be sure the person who remotely accesses your computer is someone
you trust. At any point you can cancel the assistance and disconnect the remote user from your
machine.Setup access for remote assistance
1. Right click the Computer icon.
2. Select the Remote Settings option.
3. Choose the type of connection to allow.
4. Select Users allows administrators to choose who can access the computer remotely. Open the
dialog to add a user who is not an administrator.
-
8/8/2019 Introduction to Microsoft Windows Vista
38/51
5. Click OK.
NOTE: To enable Remote Desktop at all times, users must make sure that the computer does not go
into sleep mode. To discontinue sleep mode, adjust the Power Options under the control panel.
Allowing Remote Assistance is performed through the same Property window as enabling Remote
Desktop. Lets take a look at how we can invite someone to remotely access our computer.
How to Use Remote Assistance1. Open the Start Menu and Select Help and Support.
2. From the menu, choose Use Windows Remote Assistance to get help from
a friend or offer help.
3. Choose either to Invite Someone or to Offer Help in the dialog.
4. Choose either to email them an invitation or to save the invitation as a text file, which you can later
transmit to them via an instant messenger program.
5. Create a password for the session. This password is not the administrator password, but a
password given for this specific session. It will expire after the session invitation expires.
6. Click the Next button.
7. An email should pop up with the invitation and the file the remote user will need to open to beginthe remote use.
8. Send the email.How to Accept an Invitation from a Friend or Colleague
1. Open the email or invitation they sent.
2. Double click the attached remote assistance support ticket.
3. Enter the password provided.
4. Begin exploring the remote desktop to fix the problem.How to use Remote Desktop
1. Open the Start menu and select Programs.
2. Choose Accessories and find the Remote Desktop Connection option.
3. Enter the computer name to which to connect.
-
8/8/2019 Introduction to Microsoft Windows Vista
39/51
4. Click Connect.
NOTE: if you experience problems connecting, use the Options tab to ensure you are configured
properly for the connection. Also ensure that the desktop you are trying to access allows Remote
Access.
With any of the remote access connections, all the data that is transmitted via the internet is
secured. There is no risk of lost or stolen information by an internet sniffing tool. However, you must
trust the person who might connect to you machine, and try to limit the invitations to a short amount
of time, thus eliminating any malicious actions taken on part by someone you do not fully know.
Setting up a VPN Connection to Your OfficeThe Virtual Private Network connection enables users to connect to an office intranet in order to view
files and to transfer data. This can be extremely useful to the traveling worker and even more useful
inside the Windows Vista machine.How to Setup a VPN
1. Open the Network and Sharing Center, under Control Panel.2. Select the task on the left to Set up a connection or network.
3. Choose Connect to a Workplace.
4. Choose either to connect via the Internet (most common) or to dial directly into the network.
5. Enter the Internet Address, usually the domain name or IP address of the VPN.
6. Enter the Destination Name.
-
8/8/2019 Introduction to Microsoft Windows Vista
40/51
7. Choose any of the other three options that should apply for the connection and click Next.
8. On the following screen, type the User Name and Password, along with the Domain (not the URL,
but the VPNs internal Domain name).
9. Click Connect.
The connection should be established according to the information provided. If the VPN cannot be
created, then the user can troubleshoot and determine the errors. A system administrator may be
needed to give crucial domain information related to the VPN connection.
Section 6: SecurityWindows Vista has been lauded as the most secure Microsoft product to date. Some additional
security measures include the addition of encrypted files via the BitLocker program (which
-
8/8/2019 Introduction to Microsoft Windows Vista
41/51
unfortunately is only available on the Premium packages), the Windows Security Center, Windows
Defender and Automatic Updates. All of these updates help to increase the life of the system, as well
as protect it from outside harm. The Firewall can eliminate the threat of outside hackers intruding on
the system and causing damage. Defender keeps Malware and Spyware from being installed on the
system. The User Account Control notifies users of system settings and warns them before making
changes. All in all Windows Vista takes huge strides towards securing the Operating system from
unwanted attacks.
User Account Control (UAC)We spoke briefly about the new User Account Control feature in Windows Vista. This feature
secures the operating system from unwanted installation, system setting changes, and much more.
UAC prevents a computer from unwanted changes by prompting the user for an Administrator
password, or if the user is the administrator, to confirm their action. UAC messages show the
possible effects of making the change the user initiates and can help those who may not understand
the implications a change may have on other users of the computer.
There are four messages that appear under the UAC.1. Windows needs your permission to continue
2. A program needs your permission to continue
3. An unidentified program wants access to your computer
4. This program has been blocked
These messages all serve the purpose of limiting the amount of damage that malicious software can
render to an operating system. Although they may be cumbersome and distracting for more
advanced users, for intermediate and beginners they can eliminate hours of fighting spyware or
malicious software in the future. Be sure to read the warnings as they come up on the screen and
only continue if you are sure of the consequences.How to Turn off the User Account Control (UAC)
Although it is not advisable to turn off the UAC, some users may prefer to throw caution to the wind
and leave behind the warning messages.
1. In order to turn off the UAC, click the User Account headerunder the Control Panel.
2. Select Turn User Account Control on or off from the menu.
3. You may be prompted to continue if you are the administrator, or for the administrator
password.Enter the password.
-
8/8/2019 Introduction to Microsoft Windows Vista
42/51
4. Clearthe Use User Account Control (UAC) to help protect your computercheck box to turn off the
UAC. Turn the UAC back on by selecting the checkbox.
5. Click OK.
In some instances, administrators may wish to turn the UAC into Admin Approval Mode. This mode
enables users to bypass the UAC when they are performing a function warranted by the
Administrative team. In order to use these features, the user must be part of the Administrative
group on the computer. Only versions of Windows Vista Ultimate and Enterprise have these options
available.
onfiguring Windows Firewall and DefenderThe Windows Firewall effectively blocks any unwanted network traffic on a system. It acts as a
virtual wall between a computer and the outside world. If a progra
m tries to access your computer from outside, a warning dialog appears that the behavior has been
stopped. The arrested behavior can be overridden if you trust the source. Also, programs on the
system that access the internet must pass through the firewall to retrieve updates and program
features. In order to enable the program, the Firewall must be customized to include exceptions.
Open the Control Panel menu and click the Allow a Program through Windows Firewall link under
the Security header. This brings up a window that allows you to select programs that current run on
your system to be allowed to access the internet. Just put a check next to the program name, to
enable that program, or remove the checkmark next to the program to disallow it from accessing the
internet.
-
8/8/2019 Introduction to Microsoft Windows Vista
43/51
Windows Defender software protects the computer from unwanted spyware and malware that has
plagued so many computer systems in the past. Spyware often comes attached to a program that is
downloaded from the Internet. These programs monitor personal patterns regarding sites visited and
programs used on the computer, and then connect to a server to transmit that information to another
user. The more vicious programs monitor a computer and steal passwords, leading to identity theft
and financial debacles. With the Defender, these programs cannot operate and will be rendered
harmless.
The Security Center provides access to Defender software. Any customizations that need done can
be performed under this menu. Remember Defender is only available to select versions of Windows,
including Business, Ultimate, and Enterprise editions.
1. Open Control Panel and Select Security.
2. Choose the Defenderlink.
3. Choose the activity you wish Defender to perform from the taskbar, including reviewing history
of scans, perform a new scan, and advanced tools.
4. Choose the Scan options to perform a quick scan orfull scan.
5. Choose Tools to make changes to Windows Defenders behavior.
-
8/8/2019 Introduction to Microsoft Windows Vista
44/51
a. Choose options.
b. Select the times at which you want to perform a scan. It is advisable to perform a scan weekly.
c. Choose the type of scan to perform either a quick or full scan.
NOTE: The other options include more advanced behavior options that should only be changed by
experience users, and a few administrator options, including whether other users have access to run
the Defender software.
BitlockerThe Bitlocker program is a new addition to the Windows Operating system. This software is only
available to premium version of Windows Vista, including Ultimate and Enterprise editions. The
Bitlocker program encrypts all files on the volume to ensure no one can access the data, even if they
pull the harddrive from the computer and attempt to infiltrate it. This ensures that a laptop stolen will
not become a tool for an identity thief. Sensitive corporate material can be protected from possible
threats, which means all of our data will be safe from intrusion.
In order to use Bitlocker, the hard drive must be formatted properly. Common errors involved anincorrectly formatted drive. The drive must use two partitions, so if the drive has not been created
this way, then Windows must be reinstalled to use Bitlocker. One drive will be used for the operating
system while the other drive acts as the active drive to create the installation.
To setup Bitlocker, format the drive correctly, with at least a 1.5GB partition for the active drive. If
Windows was installed without partitions then this would require a reinstall of Windows. Be sure to
use the NTFS file system, as Bitlocker is not compatible with FAT 32.
A TPM may not be found on the computer, as shown in the error message ab
-
8/8/2019 Introduction to Microsoft Windows Vista
45/51
ove. A TPM is a Technical Protection Measure that is found usually on the motherboard of the
computer system. If your computer has this error, contact the manufacturer to see about installing a
TPM.
ection 7: Internet Explorer 7The new version of Internet Explorer features tabbed browsing, phishing protection, and a new
toolbar. We will explore these new options and help acquaint users with the changes that have come
aboard with Microsofts widely used browser.
Using IE 7IE 7 has changed a lot since IE 6. The browser now has tabs where new web pages can open inside
the same window. This cuts down on the number of open windows on the computer, and makes for
a much easier browsing experience.
From the graphic above, there are two visible tabs available. The active tab pulls to the front of the
screen, showing the content from the webpage in the browser screen. To flip to the other open tab,
simply single click the tab and the content will appear in the browser below.
As in all version of the browser, the URL address bar remains the same. In order to visit a website,
type in the domain name of the site (i.e. www.google.com) in the address bar and click the
button (or hit enter).
New tabs can be opened by clicking the small tab ( ) next to an open tab in the browser window.
Users can also see the open websites in a tiled view all on one page. The button to the left of the
open sites ( ) tiles all the open windows and displays them on one webpage. From that page,
any tile can be selected to open that site. This is especially useful when many different pages are
open.
The toolbar has changed, moving the Favorites selections to the left side of the tabs, and all the
other functionality to the right hand side.
The home button appears first from the selections on the right hand side. When IE 7 opens, more
than one tab can be programmed to open with a different website, enabling users to create a more
custom created experience.
Create Multiple Home Pages to Appear on Startup
1. Open IE 7 and select the arrow next to the home tab.
-
8/8/2019 Introduction to Microsoft Windows Vista
46/51
1. Choose to Add or Change Home Page.
2. Select Add this webpage to your home page tabs.
3. Repeat this step to add as many homepages as you wish to your IE7 startup.
Built in Web Search FunctionalityIE7 now has search functionality built into the browser. A user can search for any topic using this
built in search box and ut
ilizing their favorite search engine. The first time the browser opens, a dialog appears where the user
can select which search engine to use. Windows Live Search is the default, but many users may
wish to change this to google.com or ask.com, or any number of other search engines, depending
entirely on preference.How to configure a different search engine
1. Open IE7 and click the Arrow next to the magnifying glass.
2. From the options, choose the new search engine from those available or select Find more
providers to locate your desired search engine.NOTE: To make a different search engine the default, select Change Search Defaults from the menu
and highlight the desired default then click Set Default.
Internet OptionsThe Internet Options menu has changed a little since IE6. Browsing history can now be deleted with
one click, which includes cookies, temporary files, history, passwords, and information from the site.
Obviously management of tabs has been added, including the ability to add line by line the Web
pages a user wishes to use for their homepage.
-
8/8/2019 Introduction to Microsoft Windows Vista
47/51
Exercise: Delete all Browsing history. Warning! This will cause any saved passwords and temporary
files to be lost. Only perform this Exercise if you are fine with losing this information.Security Settings
The Security Settings inside IE 7 configure how the browser interacts with the Internet. When the
setting is set to High, the browser will prompt before performing many actions and does not track
cookies. Cookies are bits of information stored on your desktop that a website uses to remember
you. Some sites require that users have cookies enabled in order to interact with their site. The
default setting ofMedium-High should be adequate for most users.
To change the Security Level open Internet Options, select the Security tab, and move the slide
bar to the desired setting.
-
8/8/2019 Introduction to Microsoft Windows Vista
48/51
Tabs
The Tabs feature of IE7 can be altered to suit each users desired functionality. For instance, the
browser can be set to only open the first home page on startup, rather than opening multiple tabs.
When a user follows a link in an email, the IE7 defaults the new window to a tab, rather than a
window of its own. This and more personalized settings can be altered under Internet Options.
Change IE7 to open outside program link requests to a new window rather than a tab
1. Select Tools and Internet Options inside IE7.
2. Choose Settings under the Tabs header.
-
8/8/2019 Introduction to Microsoft Windows Vista
49/51
3. Select A new Window under Open links from other programs.
New Security FeaturesThe security features inside IE7 help to eliminate phishing, sites with bad certificates, and offer
provisions for pop-up blocking.Phishing Filter
Phishing is a term used for any site that attempts to steal your personal information, usually
information related to your personal banking or other financial information. These phishing attacks
usually come from following a deceptive link in an email. The Phishing filter on the browser helps to
identify these sites by warning of a possibility of phishing attack and scanning sites for proper
identification and credentials.
When the Phishing filter is turned on, the browser displays warning messages from websites that
may be trying to steal your personal information under the guise of a legitimate website. Basically
the filter notices that certificates issued from the websites server are incomplete or non-existent, in
which case the browser disables the site and the user must input whether they want to move on to
the site or to leave.
The address bar of the browser turns pink when a certificate does not meet quality standards. In this
way users are safeguarded from making costly mistakes regarding their personal information on the
Internet. The Phishing filter also can be turned off and only used when users want to validate a sites
authenticity.
NOTE: Certificates act as a way to identify the validity of a site. All online stores should have a valid
Certificate. If the site you are visiting does not have a valid Certificate, it would not be wise to
continue with your purchase.How to Turn ON and OFF the Phishing Filter
1. Open IE7 and select the Tools button on the far right.
-
8/8/2019 Introduction to Microsoft Windows Vista
50/51
2. Choose the Phishing Filteroption.
3. Selectto Turn ON orOFF the Phishing filter.
NOTE: Return to that menu in order to individually check a website for Phishing.
Pop-UpBlockerThe pop-up blocker made its debut in IE6. With the surge of pop-up ads, this addition to the browser
makes surfing the web less annoying. If a site has a pop-up advertisement, then IE7 will block that
ad from opening and notify the user that a pop-up was blocked. In certain cases, the pop-up might
not be an ad, but rather a new window opened from the site to perform a necessary operation, like
listen to a radio station or watch a video. If this happens, pop-ups can be enabled for the singular
site or turned off completely.How to turn off the Pop-Up Blocker
1. Select Tools under IE7.
2. Choose the Pop-Up Blockerselection.
3. Select to Turn off the Pop-Up Blocker.
How to Install otherBrowsers under Windows VistaInternet Explorer 7 comes pre-installed under Windows Vista. However, some people prefer to use
other web browsers, such as Mozilla Firefox or Opera. To install these third party browsers, you
need to visit their site to download their installation package and follow the install procedures. Most
third party browsers are free to download and to install. If you are only familiar with IE, then trying
out a new browser might be an adventure. Lets walk through the process of installing Firefox.
1. Open IE7 and type www.getfirefox.com in the address bar at the top.
2. Choose to download the latest install package of Firefox from the main screen.
-
8/8/2019 Introduction to Microsoft Windows Vista
51/51
3. A small window pops up Select Run or Save (if you want to ins
tall at a later time).
4. IE7 may not recognize the publisher, choose to Run the application.
5. The User Account Controlpops up warning that the publisher is trying to access your computer.Choose to Allow the program to access the computer.
6. Once the install package downloads, a dialog box appears to warn the user a program is trying to
install. Choose to Allow the program to run.
7. Follow the Mozilla installation guide.
8. Once the installation completes, the newly installed Firefox browser will open. It will ask if you
wish to make it the default browser for the computer, choose to enable it as default if you wish.
Mozilla Firefox has many similar features to IE7, so getting accustomed to it should not be too
difficult. It utilizes tabs as well as incorporates advanced security options.
Exercise: Download and Install Firefox or any other browser to your Windows Vista computer.
Windows Vista has made vast improvements to user security and usability concerns. For the moreadvanced to recreational users, the operating system has met and exceeded performance
expectations.