Chapter 3 - Operating System Installation. This section provides the initial installation procedures for the Windows 2. On This Page. Preparing for Installation. Windows 2. 00. 0 Installation Process. Choosing Good Passwords. Windows 2. 00. 0 Service Pack Considerations. Preparing for Installation.
During Installation, the Setup program will ask for information on how to install and configure Windows 2. Hardware components include: Motherboard, network adapters, video card, sound card, CD- ROM drives, etc. The Windows 2. 00. Hardware Compatibility List (HCL) can be found at: http: //www. The minimum disk space recommended for installation of Windows 2.
GB). A commonly held misconception is that it is easier to recover a system that is running with a FAT partition. FAT only makes you less secure, it does not ease recovery. For server installations, considerations may include Active Directory, DNS, WINS, or DHCP. Windows 2. 00. 0 Installation Process.
Installation Methods. Windows 2. 00. 0 can be installed as either an upgrade to an existing Windows operating system or as a new operating system installation. It will not be discussed further. CD- ROMOver- the- network . To ensure that the machine is not compromised during setup, however, it is highly recommended that it be disconnected from the network until setup is complete and the most recent service pack is installed.
Boot devices are listed in order in your computer's BIOS (basic input/output system), for example CD/DVD, USB, and then hard drive. Your computer BIOS is a little program installed in a microchip on your motherboard, and it performs the initial startup before. Install one operating system to one hard drive shut down the computer then do the same thing for the other operating system that's what works for me and you don't need any other software because windows vista has a built in boot manager that will launch. How many Operating Systems allowed in a single computer .
Start Setup from a bootable CD- ROM as follows: Insert the CD- ROM in the drive. Restart the computer and wait for Setup to display a dialog box. On many computers you will be required to press any key during the boot process to boot from a CD- ROM. Follow the Setup instructions on the screen. In the remainder of this chapter, we will point out the most secure way of installing the system. This is not intended as a complete walk- through of the setup process.
2 operating systems on one computer TM tmags asked on March 5, 2010 I upgraded from Vista to Windows 7. When I restarted my computer I got a message to choose an operating system to start: Windows 7 or Vista.
One is for the operating system itself, which I'd format as Ext4. Give it at least 10 GB of space, and set the mount point as /. You'll want to create the second partition for what's called swap space. Hello youtube its pspslimhacks Today im going to show you on how to have/install dual (multiple) Operating Systems in one hard drive. Things to remember: -40gb in the new partition -Same 'Bit' (32bit or 64bit) Steps: 1. Right click computer and choose Manage 3. Under storage to go Disk Management 4. How to Install dual operating systems like Linux, XP, OSX etc Installing two operating systems and then dual boot your machine. How To: Triple boot three operating systems on one computer How To: Find an operating system's original install : .
Configuring Disk Partitions. During the initial text- mode setup of the system, setup will ask where to install Windows 2.
You can install more than one operating system on your computer and choose which operating system you want to use every time you start your computer. This is often called a dual-boot or multiple-boot configuration. Windows XP supports multiple booting with MS-DOS, Windows 3.1, Windows 95, Windows. Http:// this video shows you how to install more than one windows os in your computer. How to dual boot Windows XP and Windows 7 operating systems - Duration: 3:40. HowtoSupport 22,697 views 3:40 How to get Multiple 4:20.
If you have a need to run multiple operating systems on one computer or test software products you’re interested in trying. This also allows you to install many other operating systems as well. Here are some that are supported by VMware Workstation: and.
Figure 1 shows the dialog presented. If there are multiple partitions or multiple hard disks they will be identified in the display. For workstations, we recommend using all space on a disk for the installation partition. For servers, we recommend using about 4 GB of space on one disk for the operating system.
The remaining space in the system should be reserved for data files, services, utilities and so on. We highly discourage storage of user data files on the boot partition on servers, while on workstations this is acceptable practice which makes it easier for users to locate their data. Figure 1: Select a disk partition. The next step after creating the partition is to format it.
For all systems where security is a requirement all partitions must be NTFS formatted. Only on systems using NTFS can any reasonable security be presumed. Assign an Administrator account password. The Computer Name and Administrator Password dialog box shown in Figure 2 provides a means of setting the password for the default Administrator account.
The default configuration of Windows 2. Professional is acceptable, but Windows 2.
Server needs to be modified during installation. Several components should not be selected as they decrease the security of the system.
These include the Simple TCP/IP Services, and the SNMP protocol. For server installations, Indexing Service, Internet Information Service (IIS), and Script Debugger are selected for installation by default in the Windows 2. Components dialog box. On non- web servers IIS and the Script Debugger should be deselected. On systems that do not need file indexing for searching files, the Indexing Service should be deselected, as shown in Figure 3. Note that systems running Microsoft Exchange 2.
IIS installed. However, security configuration of Exchange 2. Please refer to the Security Operations Guide for Exchange 2. Server for more information on Exchange 2. Server: (http: //www.
Note that due to the prevalence of worms exploiting unsecured systems on most networks, it is highly recommended that system running IIS are installed on an isolated network segment, or with no network cable attached, until Service Pack 3 or higher is installed. Figure 3: Selecting Windows 2. Components. Convert a Windows 2.
Server to a Domain Controller. To build a domain controller, you must first install one of the Windows 2. Server family of products, and then promote the system to a domain controller. This can be done using the DCPromo.
During promotion, you will be presented with a dialog labeled Permissions (see Figure 4). On this dialog, the radio button for Pre- windows 2. When this option is selected, the Everyone group becomes a member of the Pre- Windows 2. Compatible Access group.
That latter group, in turn, has read access to all attributes of all objects in Active Directory. This presents a serious potential for security leaks. If you have a system that has already been promoted, you can verify whether this check box was selected by verifying the membership of the Pre- Windows 2. Compatible Access group. If Everyone is a member of that group, remove it, and then reboot all domain controllers.
A reboot is necessary because the access token governing this access is created at boot time. On new installations, where access by non- Windows 2. This is only the first example of an instance where we can tighten the security significantly in the absence of backward compatibility. Figure 4: Active Directory Permissions Dialog.
Choosing Good Passwords. So much of system security is dependent on choosing good passwords. This topic is covered in detail in this section. In order to understand how to select good passwords on Windows 2. Windows 2. 00. 0 Password Representations. By default, Windows 2. Rather, passwords are stored using two different password representations, commonly called .
It is computed as follows: Convert all lower case characters in the password to upper case. Pad the password with NULL characters until it is exactly 1. Split the password into two 7 character chunks. Use each chunk separately as a DES key to encrypt a specific string. Concatenate the two cipher texts into a 1. As a result of the algorithm used to generate the LMHash, the hash is very easy to crack. First, even a password longer than 8 characters can be attacked in two discrete chunks.
Second, the entire lower- case character set can be ignored. This means that most password cracking tools will start by cracking the LMHashes and then simply vary the alpha characters in the cracked password to generate the case- sensitive passwords. Note that in order to log on to a Windows 2. The NTHash. The NTHash is also known as the Unicode hash, because it supports the full Unicode character set.
The NTHash is calculated by simply taking the plaintext password and generating an MD4 hash of it. The MD4 hash is then stored. The NTHash is much more resistant to brute force attacks than the LMHash.
Brute forcing an NTHash takes several orders of magnitude longer than brute forcing the LMHash of the same password. What constitutes a good password? There are some general guidelines for what constitutes a reasonable password: Longer than 7 characters (otherwise the second half of the LMHash is an encryption using the NULL password. Contains elements from at least three of the following four character sets. Uppercase characters. Lowercase characters.
Numbers. Non- alpha numeric characters. Does not contain any part of the users name, username, or any common word. This complexity is enforced via a password filter, and can be optionally required using group policy. Additionally, an administrator can customize the complexity requirements by writing a custom password filter.
Such a filter could, for example, enforce that company names are not part of the password, or require additional complexity. For more information on how to write such a filter, refer to section on Password Filters in the Microsoft Windows Software Development Kit, at http: //msdn. Security/password. There are several steps that can be taken to make a password harder to crack. Use non- alpha numeric characters other than those from the .
Most password crackers know that the upper row characters are the most common method to add entropy to a password and therefore start cracking with those. Use ALT characters. ALT characters are those that you type by holding down the ALT key (the FN+ALT keys on a laptop) and typing a three or four digit number on the numeric keypad (the numeric overlay keypad on a laptop). Most password crackers are not capable of testing the vast majority of ALT characters. Do not allow storage of the LMHash.
There are many ways to prevent storage of the LMHash. A system wide method will be discussed later in the section . However, the creation of an LMHash can be controlled on a per- account basis by constructing the password in certain ways. First, if the password is longer than 1. LMHash. In Windows 2.
Second, if the password contains certain ALT characters, the system will also not be able to generate an LMHash. This latter point is tricky, because while some ALT characters significantly strengthen the password by removing the LMHash, others significantly weaken it since they are converted into a normal upper- case letter prior to storage. There are many characters, however, which will strengthen the password. Table 1 lists all the characters below 1. LMHash not to be generated.
Table 1 ALT characters which cause the LMHash to disappear. This could be the case, for example, in environments where the operating system is installed over the network by booting to a DOS disk.
DOS does not support the NT hash algorithm and therefore requires the LMHash to be present. DOS also does not support ALT characters in the password. While we recommend that LMHashes be disabled system wide in all environments where it is feasible, the above techniques can be used to strengthen individual passwords in all environments. We particularly recommend using ALT characters on sensitive accounts such as service accounts and administrative accounts.
How to Install Multiple Operating Systems. How would it feel if you could have more than one operating system installed on a single computer? There would be no freezing, no conflicting applications, and the system won't stop responding and fade white right in front of you. To install multiple OS, up to 8, there are third party software applications that could effectively do that. Examples of such software are z. Boot and partition magic. Any software of this sort is known as boot or partition manager.
Using a Third- party Partition Manager. Things Needed: A computer. Hard drives (If you don't want to partition your existing drive)Operating Systems.
A partition manager software (i. If your Windows OS shows only one drive then you need to partition your hard drive (that is, if you don't want to add another hard drive).
The third party software you use will have a tool to do this. Next, to actually achieve this, you need to install one Operating system on a partition (i. C: drive) and the other on the second partition (i. D: drive). After successful installation of multiple operating systems, on start- up, you would be asked which operating system to start. One thing to remember is that you must ensure that you save files and programs to the appropriate drive as files will not be accessible from one OS to another. Using more than one operating system on a computer requires dual booting. However, you can only use one operating system at a time.
If you decide to use an application that allows you to install multiple OS, please note that such applications are best for multiple versions of an operating system and not a combination of totally different makes of operating systems. For example, installing Windows XP and Windows 7 on the same pc. Before attempting to install multiple operating systems on your machine, ensure that you back up all your data.