40
OPERATING SYSTEM UPGRADE BY JACLYN BARNSLEY

FinalProject IT 505-JaclynBarnsley

Embed Size (px)

Citation preview

OPERATING SYSTEM UPGRADEBY JACLYN BARNSLEY

ORDER OF OPERATIONS

• Set-up countdown announcement by group for the whole company

• Upgrading network to a ring topology, with fiber-optic cables, and new

switches and routers and a back-up server for reliability and continued

efficiency

• Use database ‘Upgrade Report’ to implement operating system upgrades on

listed dates

• Install Bitdefender as recommended in ‘Information Assurance’ presentation

• Block third party cookies on all upgraded computers (see tutorial)

• Set company’s website as the homepage on all web browsers (see tutorial)

Running head: PROGRAMMING REPORT 1

1

Programming Report 2016

By Jaclyn Barnsley

Running head: PROGRAMMING REPORT 2

Programming Report 2016

In order to announce the upcoming operating system upgrade to each group of

employees in an efficient and time sensitive manner JavaScript source code will be utilized to

facilitate a digital announcement on each employee’s computer. There are five basic

components of the JavaScript coding language that are the constructs of JavaScript source code.

Those five components are syntax, variables, control structures, data structures and tools. These

five basic components are put together by the programmer to compose the code that is the list

of instructions for the computer to follow. This report will give detailed information into the

syntax, variables, control structures, data structures and tools that compose JavaScript code,

while also detailing the changes made to the JavaScript code that will announce this company’s

operating system upgrade that is coming up next month.

Syntax

JavaScript programs are composed of a list of instructions that tell the computer what to

do with the images and words that are on our screens. The list of instructions are composed of

statements or lines of data that are composed of variables, operators, expressions and keywords

and sometimes comments (JavaScript Statements, 2016). These JavaScript statements are

separated by semicolons (JavaScript Statements, 2016). The order in which these instructions

come together is called syntax. This is exhibited in Figure 1in lines 7-14 of the given code, all

of these are executable JavaScript statements that when executed in order present how many

days are left until the upgrade for that particular group. Syntax is important to consider when

combining data types (JavaScript Syntax, 2016).

Variables

JavaScript values are either literals or variables (JavaScript Syntax, 2016). Literals are

fixed values. Rules for JavaScript literals are: numbers are written with or without decimal

Running head: PROGRAMMING REPORT 3

points, and strings are text written within double or single quotes (JavaScript Syntax, 2016).

For example, in Figure 2 a literal number would be the number 24 in line 8 (which represents

the hours in a day), and a string would be “June 6, 2016” on line 6 of the code. Variables are

used to store data values. The term ‘var’ is used to declare a variable and an equal sign (=) is

used to assign a given data value to variables (JavaScript Syntax, 2016). For example in the

code provided on line 6 in Figure 2 the variable ‘today’ is declared as a variable and given the

identifier ‘today’ by the simple statement: var today; and then, to determine the value of

‘today’, the statement would read: var today = new Date(“June 6, 2016”); this tells the

computer that the variable ‘today’ has the value of June 6, 2016. This facilitates the functions

that come later in the code, because every time the computer sees ‘today’ it knows it stands for

‘June 6, 2016’.

Data Structures. JavaScript pre-defined primitive data types are: number, string,

Boolean, undefined and null. These can combine to make the composite data types object,

arrays and functions. JavaScript operators tell the computer how it is to use the given data

types. In JavaScript the equal sign is an “assignment operator,” and is used to assign data values

to variables (JavaScript Syntax, 2016). In line 11 of Figure 2 the division operator is used

between two string data types to calculate days left until the upgrade the expression reads as

such: var day = timeLeft / msPerDay;. The use of operators enables the calculation of the given

data types to provide the needed value of how many days it will be until the upgrade will take

place.

Control Structures. “The control structures within JavaScript allow the program flow to

change within a unit of code or function. These statements can determine whether or not given

statements are executed, as well as repeated execution of a block of code (Sheppy, 2016).”

Often control structures are written within an expression such as line 5 in Figure 2 says <script

Running head: PROGRAMMING REPORT 4

type= “text/javascript”>. This expression controls how the computer deciphers the script type.

JavaScript expressions are a combination of values, variables, and operators that then compute

to a value (JavaScript Syntax, 2016). The computation of an expression is called an evaluation.

Line 9 of the code that is provided in the included screenshots in Figures 2-7 contains the

expression: UpgradeDay.getTime( ) - today.getTime( )); this expression evaluates to the time

left until upgrade day or more specifically it evaluates to ‘var timeLeft’. Expressions can

contain both numbers and strings and in this case the expression on line 9 is evaluating the

value of the difference of two strings, this value represents a calculable number of days.

Without control structures and carefully constructed expressions the script couldn’t be

translated by the computer and the script could not be executed.

Tools. JavaScript keywords are tools used to identify the action that needs to be

performed (JavaScript Syntax, 2016). In JavaScript the word var is a keyword that declares

something to be a variable. In Figures 1-7 you can see the keyword var used at the beginning of

lines 7 through 12 of the given code. There are many more keywords that are not included in

these screenshots such as ‘break’, ‘function’, and ‘continue’ to name just a few. They all

determine a specific JavaScript action that is to be taken (JavaScript Statements, 2016).

Conclusion

Syntax, variables, data structures, control structures and tools are five components of

JavaScript code that combine to allow the computer to calculate the code to show how many

days are left until the company will upgrade their computers. Updating the given code will

enable us to announce the operating system upgrade to all of our employees in an orderly and

efficient manner.

Running head: PROGRAMMING REPORT 5

References

JavaScript Syntax. (2016). Retrieved from: http://www.w3schools.com/js/js_syntax.asp

JavaScript Statements. (2016). Retrieved from: http://www.w3schools.com/js/js_statements.asp

Sheppy, S. (2016). Retrieved from: https://en.wikibooks.org/wiki/JavaScript/Control_structures

Running head: PROGRAMMING REPORT 6

Figures

Figure 1. This is the original JavaScript code before modifications.

Running head: PROGRAMMING REPORT 7

Figure 2. In the variable (today) on line 6 of the code the date string was modified to read “June

6, 2016” as this was the date that the script was written and the variable UpgradeDay (on line 7)

was changed to “July 11, 2016” as this was the initial upgrade day for Group 1. These dates can

be modified to reflect future dates as needed.

Running head: PROGRAMMING REPORT 8

Figure 3. JavaScript adds the data values for the variables ‘UpgradeDay’ and ‘today’ to the

empty parenthesis on line 9 and evaluates the expression to compute how many days are left

until the upgrade. The ‘Web View’ at the bottom of the screen is the announcement for Group 1.

Running head: PROGRAMMING REPORT 9

Figure 4. In this screenshot the data was modified by adding 2 days to the Initial Upgrade Date

(UpgradeDay) in line 7, changing the date from “July 11, 2016” to “July 13, 2016”. The ‘Web

View’ on the bottom of the screen shows Group 2’s updated notification for their designated

upgrade day.

Running head: PROGRAMMING REPORT 10

Figure 5. In this screenshot the data was modified by adding 5 days to the Initial Upgrade Date

(UpgradeDay) in line 7, changing the date from “July 11, 2016” to “July 16, 2016”. The ‘Web

View’ on the bottom of the screen shows Group 3’s updated notification.

Running head: PROGRAMMING REPORT 11

Figure 6. In this screenshot the data was modified by adding 8 days to the Initial Upgrade Date

(UpgradeDay) in line 7, changing the date from “July 11, 2016” to “July 19, 2016”. The ‘Web

View’ on the bottom of the screen shows Group 3’s updated notification.

Running head: PROGRAMMING REPORT 12

Figure 7. In this screenshot the data was modified by adding 10 days to the Initial Upgrade

Date (UpgradeDay) in line 7, changing the date from “July 11, 2016” to “July 21, 2016”. The

‘Web View’ on the bottom of the screen shows Group 3’s updated notification.

Running head: NETWORK REPORT 2016 1

Company Network Report 2016

By Jaclyn N. Barnsley

NETWORK REPORT 2016 2

Company Network Report 2016

As this company has grown and evolved, it seems to have outgrown its existing network

and a network upgrade is recommended to enable optimal performance of the local area network

(LAN). To help ensure a smooth transition, a careful look at both the current networks

components and the new network requirements is necessary. This report will help to determine

what new equipment and configurations are necessary to ensure that the new network fully

supports both the current and future needs of this company.

The computer network that has been set up for this company is a client/server based local

area network setup in bus topology. The computers on the top of the diagram shown in figure 1

are connected to an Ethernet cable that serves as the backbone to the network and creates the

connections between the client computers and the host server, router and printers. As represented

in the diagram in figure 1, each department has one connection to the network for all three client

computers. To explain the connection further, when all of the employees in department 1 want to

access the internet all of their computers send their signals through the same Ethernet cable

backbone and then accesses the internet through the only available router and firewall. This is the

same scenario for all three departments. This same Ethernet cable backbone accesses the printers

and the host server for all three departments in the diagram in figure 1. This single connection for

multiple clients can make it difficult to troubleshoot problems that could be happening on only

one client device. The bus LAN topology is efficient for small networks of computers and is an

effective way to connect a small network in a linear fashion. However, with each new computer

added, the network efficiency is degraded and if the main cable is damaged the network could

fail. Network failures can cost this company significant losses in productivity and income. In the

diagram provided (see Figure 1) there are three departments with three client computers in each

NETWORK REPORT 2016 3

department, this is a rather small LAN for the 20 computers that we now have operating on this

network. This network report pinpoints the critical components that are missing from our

company’s Ethernet LAN that could threaten the reliability and the security of our computer

network, and potentially lead to a network failure, losses in employee productivity and a possible

security breach.

Reconfiguring the Network Topology

When considering what critical components needed to be added to this company’s LAN.

The network topology was my first consideration. For greater reliability, efficiancy and

scalability of the network I would recommend reconfiguring the network in a way that would

support signal redundancy. With network topology such as a ring network if one part of the

network fails the signal can be sent back around the ring in the opposite direction which means

that recovery speeds are very fast and the effects of the failure are limited to the one client

connected to the failed cable (Barstz, 2013). “Another group of elementary network topologies

includes star topologies. This network structure is an important building block of the existing

computer- communication systems, especially when considering the relatively small-sized

customers’ subnetworks. It usually consists of a gateway (the central vertex of a star) and several

client devices. Hence, it provides a convenient way of setting up a local network. On the other

hand, the lack of redundant connections (e.g., additional edges creating a cycle) makes it prone

to network failures occurring in the physical layer. To improve network dependability in the case

of a failure of a single gateway, network operators usually rely on a double-star topology with

two gateways.” (Kamisinski et al, pp 23-24) The ring topology is more reliable and more readily

allows the addition of more computers which would be beneficial to the company if we were to

bring in any new employees in the future. Costs and benefits should be considered before

NETWORK REPORT 2016 4

choosing either topology. To ensure the continued reliability of the LAN upgrades to the

topology do need to be made.

Enhanced Cabling

My second consideration when reviewing the network was enhancing the Ethernet

cabling itself. As our company has grown the cabling has not been upgraded to accommodate

more data traffic. Replacing the older unshielded twisted-pair cables with fiber-optic cables

would ensure greater speeds and reliability of the network signal. Fiber-optic cables are not

susceptible to electromagnetic interference (EMI) and can transmit data faster and farther than

copper wire. Depending on the type of fiber-optics, distance limitations can be several miles

(Reid & Lorenz, 2008).

Switches. Another critical component that is currently not available on our LAN is a

network switch. “Most business networks today use switches to connect computers, printers and

servers within a building or campus. A switch serves as a controller, enabling networked devices

to talk to each other efficiently. Through information sharing and resource allocation, switches

save businesses money and increase employee productivity (Deidricks, 2014).” A managed

network switch can be configured to offer greater flexibility and capacity than an unmanaged

switch. You can monitor and adjust a managed switch locally or remotely, to give you greater

network control. Although both a hub and a switch can provide connectivity at the access layer

of a network, switches should be chosen for connecting devices to a LAN. Switches generally

are more expensive than hubs, but the enhanced performance makes them cost-effective. “A

managed device can be monitored for performance and security and typically provides

enhancements to the monitoring and security features. For example, with a managed switch,

ports can be turned on or off as required to control access. In addition, administrators can control

NETWORK REPORT 2016 5

which computers or devices are allowed to connect to a port (Reid & Lorenz, 2008, p. 64).” It is

recommended to create redundant connections with more than one switch in case of failure there

will always be a backup. It is critical to add this component to ensure reliability and efficiency of

the network as a whole.

Router. “Switches and routers are the building blocks for all business communications,

from data to voice and video to wireless access. They can improve profitability by enabling your

company to increase productivity, trim business expenses, and improve security and customer

service. Switches create a network. Routers connect networks. A router links computers to the

Internet, so users can share the connection. A router acts as a dispatcher, choosing the best path

for information to travel so it's received quickly (Deidricks, 2014).” Once the switch has been

purchased it is important to select an upgraded router that can handle 20 client devices at once.

This small network was initially built using a low-end integrated router to connect wired users.

This type of device is designed to support small networks, usually consisting of a few wired

hosts. As we have outgrown the capabilities of our existing network devices, we must upgrade to

more-capable devices (Reid & Lorenz, 2008). Including a new router that can easily handle

increased use of the internet, and greater network traffic. An option that I would recommend

would be an Integrated Service Router or ISR. “An ISR was designed with multiple services to

accommodate the demands of small to medium-sized businesses and branch offices of large

organizations. An ISR is designed for ease of use. It can quickly and easily enable end-to-end

protection for users, applications, network endpoints, and wireless LANs (Reid & Lorenz, 2008,

p 65).”

Server. To create a fully reliable computer network we will need something to backup the

current server in case of failure. A server is what serves information to the other computers. If

NETWORK REPORT 2016 6

our single server crashes or malfunctions with no backup that information will be inaccessible. A

single WINS server can adequately service 10,000 clients which is enough for a small network.

To provide additional fault tolerance, you should configure a second computer running

Windows 2000 and use it as a secondary (or backup) WINS server for clients (How many servers

to use, 2016).

Conclusion. Upon further inspection of our company’s Ethernet LAN it is recommended

to upgrade the network to better handle the upcoming operating system upgrade as well as to

increase the efficiency, reliability and scalability of the current network. Upgrading to a ring

topology, with fiber-optic cables, and new switches and routers and a back-up server would

increase the speed of production and ease of access to the network as a whole. This increase in

productivity could have a tremendously positive impact on the profits of this company both now

and in the future.

NETWORK REPORT 2016 7

References

Barstz, D. (2013). Redundancy puts backbone into the ring topology. Schneider Electric Blogs

Retrieved from: http://blog.schneider-electric.com/machine-and-process-

management/2013/10/02/redundancy-puts-backbone-ring-topology/

Diedricks, I. (2014). Understanding the different types of Ethernet switches. Cisco blogs: Small

business. Retrieved from: http://blogs.cisco.com/smallbusiness/understanding-the-

different-types-of-ethernet-switches

How many servers to use. (2016). Retrieved from: https://technet.microsoft.com/en-

us/library/cc959251.aspx.

Kamisinski, A. Cholda, P. & Jajszczyk, A. (2015). Assessing the structural complexity of

computer and communication networks. ACM Computing Surveys Vol 47, 4, Article 66,

36 pages. DOI: http://dx.doi.org/10.1145/2755621

Reid, A. & Lorenz, J. (2008). Chapter 3: Planning a network upgrade. Working at a Small-to-

Medium Business or ISP, CCNA Discovery Learning Guide,1/e (pp. 49-72). Indianapolis,

IN. Cisco Press. Retrieved from: http://catalogue.pearsoned.co.uk/samplechapter/

1587132109.pdf

What is a network switch? Retrieved from: http://www.cisco.com/cisco/web/solutions/

small_business/resource

NETWORK REPORT 2016 8

Figures

Figure 1. Our Company’s Network Diagram

1 Database Report

Database Report By Jaclyn Barnsley

1 Changing the ‘UpgradeDate’ Field’s Data type

1.a: After accessing the employee database tables, I first double-clicked on the ‘Upgrade

Information’ table on the left side of the screen.

2 Database Report

1.b: The ‘Upgrade Information’ table contains a list of computer ID’s (number data type) that is

matched with the computer’s upgrade group (short text data type), as well as each computer’s

current operating system (short text data type) and what operating system they will be upgrading

to (short text data type). When first accessing this table the ‘Upgrade Date’ field was an empty

text field. I selected the ‘UpgradeDate’ column and went up to the ‘Fields’ Tab at the top of the

screen and changed the ‘Data Type’ to ‘Date/Time’ then proceeded to add all the corresponding

upgrade dates in accordance with the group number that was listed. The results are shown below.

3 Database Report

2 The Other Tables and Their Data fields

2.a: Then I proceeded to open all of the other tables to view their contents. The ‘Computer

Information’ Table contained (from left to right) Computer ID (number data type), Location

(short text data type), Employee ID (number data type), Advanced Software Packet (yes/no data

type). This table is shown below.

4 Database Report

2.b: Then when inspecting the ‘EmployeeInformation’ Table it was notable that the data fields

contained a mix of number data types and short text data types. The fields from left to right read

‘Employee ID’ (number data type), ‘Last Name’ (short text data type), ‘First Name’ (short text

data type), ‘Job Title’ (short text data type), ‘Office Phone’ (number data type), ‘Mobile Phone’

(short text data type). Also the ‘Employee ID’ column was not listed in the same order as the

‘ComputerInformation’ table, this would effect a query if I were to combine the tables.

5 Database Report

2.c: The fourth and final table was the ‘Job Titles’ table this table contained one column of job

titles that was created using the short text data type. The ‘Job Title’ field is highlighted in blue

below.

6 Database Report

Creating the Query

3 The design view of the completed Query

3.a: In the screen shot below the completed ‘UpgradeReport’ query is showing in design view.

Looking carefully at the screen shot, the ‘ComputerInformation’ Table is visibly linked to the

‘EmployeeInformation’ table through two different fields. At the bottom of the screen you can

see that this query is using ‘Computer ID’ data and ‘Employee ID’ data from the

‘ComputerInformation’ table. The ‘Last Name’ data and ‘First Name’ data from the ‘Employee

Information’ table and the ‘Upgrade Group’, ‘Upgrade Date’, ‘Current OS Version’, ‘Upgrade

OS Version’ data from the ‘UpgradeInformation’ table. This report will detail the steps that were

taken to combine this data into the one query, that is seen below.

7 Database Report

3.b: In order to sync up the computer ID’s with the employee ID’s, to enable listing the

employee names (short text data type) alongside the employee ID’s (number data type), I had to

first create a relationship between the ‘Computer ID’ field in the ‘ComputerInformation’ table

and the ‘Computer ID’ field in the ‘Upgrade Information’ table.

3.c: Clicking on the ‘Database Tools’ tab at the top of the screen, then clicking on relationship,

the two ‘Computer ID’ Fields were added and linked, one from the ‘ComputerInformation’ table

the other from the ‘UpgradeInformation’ table. This created the relationship link that is shown in

the screen shot below.

8 Database Report

3.d: These ‘Computer ID’ fields were exactly the same in both tables so creating the relationship

between them linked the two tables to enable the organized query that is shown below in ‘Query

1.’

9 Database Report

3.e: The next step was to sync up the Employee ID numbers from the ‘ComputerInformation’

table with the ‘Employee ID’ numbers in the ‘EmployeeInformation’ table. I also wanted to sync

the names of the employees with the ‘Employee ID’ numbers listed in order with the ‘Computer

ID’ numbers. I created a query between the ‘Employee ID’ field in ‘Query 1’ and the ‘Employee

ID’ field from ‘EmployeeInformation.’ I also included the ‘Last Name’ and ‘First Name’ field

from ‘EmployeeInformation.’ This effectively organized the employee ID’s in the order of the

computer ID’s and put the employee’s names in order as well. The design and spreadsheet view

of the ‘Query 2’ results are shown below.

Design View

10 Database Report

Spreadsheet View

11 Database Report

4 Conclusion: The Completed Upgrade Report

4.a: After creating a relationship link between the two ‘Computer ID’ fields and syncing up the

two ‘Employee ID’ Fields and the employee names through ‘Query 2’, I was able to effectively

combine three of the data tables: ‘ComputerInformation,’ ‘EmployeeInformation’ and

‘UpgradeInformation’ into one query. The ‘UpgradeReport’ query needed to be easily read and

utilized by the Help desk and creating these links between the data fields kept the combined data

organized and useful. The spreadsheet view of the completed ‘UpgradeReport’ is shown below.

INFORMATION SECURITYTHE IMPORTANCE OF INFORMATION ASSURANCE

BY JACLYN BARNSLEY

WHAT IS INFORMATION ASSURANCE?• Information assurance: is used to describe a system of

technologies that are put into place to protect the data within a

computer or a network of computers.

• Antivirus software, internet security software, Anti-Malware, Anti-

Spyware, and firewalls are all different types of technologies

that provide information assurance for personal computers and

networks.

• The 2016 Ponemon Institute Cost of a Data Breach Study found that “the average

consolidated total cost of a [company] data breach is $4 million. The study also reports that

the cost incurred for each lost or stolen record containing sensitive and confidential

information increased from a consolidated average of $154 to $158. In addition to cost

data, the global study puts the likelihood of a material data breach involving 10,000 lost or

stolen records in the next 24 months at 26 percent (Ponemon, 2016).”

WHAT ARE THE RISKS?• Currently there are thousands of different types of threats such as:

malware, viruses, spyware, adware, trojans, ransomware, worms,

and rootkits on the web that are ready to deceptively invade our

computers.

• A breach could cost the company quite a bit of money to recover

our losses

• In February of 2014 a self-replicating piece of malware, known as The Moon was able to

bypass authentication and exploited -execution weaknesses in Linksys/Cisco home routers,

and it affected millions around the world. This malware exploited flaws in the routers to

enable cybercrime techniques for stealing log-in information and for gaining access to other

data storage. Since it was identified, other similar home and small business router back doors

have been discovered in Netgear, Netis/Netcore and other Cisco models. Making it

essential to have an updated network router and a security suite in place to protect our

company from a data breach (Porembo, 2014).

HOW DO WE PROTECT OURSELVES?

• In addition to updating our network configuration and hardware, installing a current Small

Business Security Suite during the operating system upgrade is essential to protecting this

companies data, computers and our bottom line

• Bitdefender’s Gravity Zone Business Security is one of the best information assurance software

suite’s on the market in 2016.

• If implemented it will protect our computers, network and server against viruses, spyware,

worms, trojans, rootkits, and ransomware

• Provides an additional firewall and web protection

• Allows for the simplified and efficient management of network security

• Scalability

• Available at www.bitdefender.com/SmallBusiness

REFERENCES

• Ponemon, L. (2016). The 2016 Ponemon Institute cost of a data breach study.

Retrieved from: https://securityintelligence.com/media/2016-cost-data-

breach-study/

• Poremba,S. (2014). The top 5 information security breaches no one is talking about.

Retrieved from: http://www.forbes.com/sites/sungardas/2014/09/24/the

-top-5-information-security-breaches-no-one-is-talking-

about/#11e42bc57f99

TUTORIAL: How to Manage Cookies On Microsoft Edge:

by Jaclyn Barnsley

STEP 1: How to Block Third Party cookies in Microsoft Edge:

A. Click on the More (…) icon in the upper right hand corner of the browser

B. Then select Settings at the bottom of the drop down menu

C. Scroll down to Advanced Settings, select View Advanced Settings

D. Under Privacy and Services scroll down to Cookies

E. Choose the option you want from the drop down menu (Block all cookies blocks all

cookies that websites try to save to your computer. Block only third party cookies

blocks third party cookies, which are saved by external web services, such as ads

embedded on webpages you have navigated to.)

F. To ensure privacy during web browsing select Block Only Third Party Cookies

Blocking all cookies could stop certain websites from downloading and limit the abilities of the

web browser while allowing third party cookies would allow the collection of browsing

information for the purpose of interest-based advertising.

STEP 2: How to enable cookies (not recommended)

A. Follow steps A through E from STEP 1 above

B. Select Don’t block cookies from the drop down menu

STEP 3: How to clear cookies saved on your device:

A. Go to More (…) > Settings

B. Under Clear browsing data, select Choose what to clear,

C. Then select the Cookies and saved website data check box.

TUTORIAL: How to make our website the homepage:

By Jaclyn Barnsley

STEP 1: Create a desktop link for easy access to the browser

A. Click on the window icon in the lower left corner of the screen

B. Select All Apps

C. Scroll down to Microsoft Edge

D. Select the icon and drag it and drop it onto the desktop

E. Click on the newly created link to access the web browser

STEP 2: How to set the homepage on Microsoft Edge

Follow the below steps to set the homepage on the browser

A. Click on the More (…) icon next to the feedback icon present on top right corner of the

browser.

B. Click on Settings from the drop down menu.

C. Select A specific page or pages under open with.

D. Click on the option down to the A specific page or pages and select Custom from the

drop down menu.

E. You can Enter our web address (www.companyxyz.com) in the text box by clicking on

+ button.

F. Close the browser and open it again for the changes to take effect.

G. When finished setting the page move the icon on the desktop to the left side of the screen

in line with the other icons.