Abstract

The performance of our computer is vital in fulfilling the task of the user. The paper presents a solution for maintaining the performance of the computer specifically computers with Windows operating systems. In this article, the fundamental difference and problem of the Windows operating system are defined which roots in the architectural design of using single configuration storage. The security hole of windows authentication, the exploitation of Microsoft EFS, and the acquisition of password hashes from Microsoft SAM are also discussed. Various existing utility software is evaluated to investigate if they meet the user define criteria. This paper also proposes a user-level implementation of the AES 256 encryption algorithm for securing user files and a Network Blocking algorithm based on ARP Spoofing techniques that provide a user-level network monitoring capability. The proposed application is called “Giddy-ION Reloaded” which consists of four main modules; machine information acquisition and monitoring, machine optimization, machine cleaning, and tools module that is divided into submodule; encryption and decryption, network monitoring, desktop management, network optimization/ control, and task automation. The testing was conducted with the participants coming from a computer college, continuing education trainer/faculty, and various IT experts. The response from these groups was statistically treated and analyzed, where the Giddy ION rank top and shows promising results. The study is limited to windows machines with 64-bit support architecture. The developed application is ready for implementation and deployment as evidenced by its high overall performance rating as evaluated by the participants against the ISO 25010 standards.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.