Giddy Ion Reloaded: Desktop Manager, Optimizer with Multi Utility Tool
Authors/Creators
- 1. Recolizado Master of Science in Information Technology at Cagayan State University Caritan Campus Caritan Tuguegarao, Cagayan Philippines
- 2. Bachelor of Science Computer and Information Technology at Saint Paul University,
Contributors
Contact person:
- 1. Recolizado Master of Science in Information Technology at Cagayan State University Caritan Campus Caritan Tuguegarao, Cagayan Philippines
Description
Abstract: The performance of our computer is vital in fulfilling the task of the user. The paper presents a solution for maintaining the performance of the computer specifically computers with Windows operating systems. In this article, the fundamental difference and problem of the Windows operating system are defined which roots in the architectural design of using single configuration storage. The security hole of windows authentication, the exploitation of Microsoft EFS, and the acquisition of password hashes from Microsoft SAM are also discussed. Various existing utility software is evaluated to investigate if they meet the user define criteria. This paper also proposes a user-level implementation of the AES 256 encryption algorithm for securing user files and a Network Blocking algorithm based on ARP Spoofing techniques that provide a user-level network monitoring capability. The proposed application is called “Giddy-ION Reloaded” which consists of four main modules; machine information acquisition and monitoring, machine optimization, machine cleaning, and tools module that is divided into submodule; encryption and decryption, network monitoring, desktop management, network optimization/ control, and task automation. The testing was conducted with the participants coming from a computer college, continuing education trainer/faculty, and various IT experts. The response from these groups was statistically treated and analyzed, where the Giddy ION rank top and shows promising results. The study is limited to windows machines with 64-bit support architecture. The developed application is ready for implementation and deployment as evidenced by its high overall performance rating as evaluated by the participants against the ISO 25010 standards.
Notes
Files
E5238019521.pdf
Files
(426.8 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:c9449bf9a1611d30ad6bfaa57c1cc614
|
426.8 kB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 2277-3878 (ISSN)
References
- Abdelaziz, T. M., Bani, W., & Elammari, M. (2015) Applying the ISO Standard in Assessing the Quality of Software Systems
- Abdul Wahid, M., Ali, A., Esparham, B., & Marwan, M. (2018). A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention Ebook.. Retrieved 20 May 2020, from https://symbiosisonlinepublishing.com/computer-science-technology/ computerscience-information-technology32.pdf.
- Estdale, John and Elli Georgiadou. (2018). Applying the ISO/IEC 25010 Quality Models to Software Product. Retrieved from https://www.researchgate.net/publication/326896024_Applying_the_ ISOIEC_25010_Quality_Models_to_Software_Product_25th_Europe an_Conference_EuroSPI_2018_Bilbao_Spain_September_5-7_2018 _Proceedings
- Garcia, Gabriel et. al. (2015). DiabeSys. Retrieved on from https://www.dlsu.edu.ph/wp-content/uploads/pdf/conferences/researc h-congress-proceedings/2015/FNH/018FNH_Tangkeko_MS.pdf
- Georgiadou, E. (2018). ISO/IEC 25010 Quality Models to Software Product:. Retrieved 9 October 2019, from https://www.researchgate.net/publication/326896024_Applying_the_ ISOIEC_25010_Quality_Models_to_Software_Product_25th_Europe an_Conference_EuroSPI_2018_Bilbao_Spain_September_5-7_2018 _Proceedings
- Joshua, Y., & Jiamin, S. (2015). Introduction to Information and System Security. Retrieved from https://www.comp.nus.edu.sg/~hugh/CS2107/Projects/Projects-CS21 07-14-15-IV.pdf#page=5
- Katuwal, A. (2019). The Innovators Toolkits: World Best Innovation labs From A to Z. Retrieved 9 January 2020, from https://medium.com/@ashishlkatuwal/the-innovators-toolkits-worldbest-innovation-labs-from-a-to-z-aa820da22f85
- Koo, J., Ahn, S., Lim, Y., & Mun, Y. (2010). Evaluation of Network Blocking AlgorithmBased on ARP Spoofing and Its Application Ebook. (pp. 2-5). Seoul. Retrieved from https://link.springer.com/chapter/10.1007/11424826_91
- Lin, J. (2011). Various Approaches for Systems Analysis and Design. Missouri: University of Missouri, St. Louis.
- Makaha, R. (2015). INTRO TO COMPUTERS Ebook. (18th ed., pp. 1-7). Retrieved from https://www.academia.edu/33227144/INTRO_TO_COMPUTERS_1 8.pdf
- Makaha, R. (2015). INTRO TO COMPUTERS Ebook. (18th ed., pp. 1-7). Retrieved from https://www.academia.edu/33227144/INTRO_TO_COMPUTERS_1 8.pdf
- Molnar, D. (2014). 10 Reasons Your Computer May Be Slowing Down. In Dave's Computers. 2014.
- Phiri, M., & Mfupa, P. (2016). Network Monitoring System.
- Rushkoff, D. (2015). Edge.org. Retrieved 2 October 2019, from https://www.edge.org/responses/how-is-the-internet-changing-the-wa y-you-think
Subjects
- ISSN: 2277-3878 (Online)
- https://portal.issn.org/resource/ISSN/2277-3878
- Retrieval Number: 100.1/ijrte.E5238019521
- https://www.ijrte.org/portfolio-item/E5238019521/
- Journal Website: www.ijrte.org
- https://www.ijrte.org/
- Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
- https://www.blueeyesintelligence.org/