Sunday, January 26, 2020

Analysis of Windows Operating System and Microsoft

Analysis of Windows Operating System and Microsoft What is Windows? Windows is a personal computer operating system from Microsoft that, together with some commonly used business applications such as Microsoft PowerPoint, Word and Excel, has become a de facto standard for individual users in most corporations as well as in most homes. It provides a graphical user interface (GUI), virtual memory management, multitasking, and support for many peripheral devices. According to OneStat.com, as of August, 2006, Windows as a whole dominates the personal computer world, running on about 97% of the operating system market share, with XP accounting for about 87% of that. In comparison Mac OS has about 2% and Linux (with all distributions) about .36% The reason why this is so is mainly because Windows is much more user friendly and everything comes pre-packaged so user just have to run the application and follow instructions for it to install. There are many versions of Windows Operating System available namely: Windows 286 Windows 386 Windows 3.0 and 3.11 Windows 95 Windows 98 Windows NT Windows 2000 Windows CE for use in small mobile computers Windows Me Windows XP Windows Vista Windows 7 Among all those versions, Windows XP is the most popular one and it is used by 61.9 percent of Internet users, according to data from Net Applications, followed by Windows 7 which has 14.46 percent of users and Vista -14.34 percent. A Brief Story On Windows Windows mainly concentrated on providing an operating system which was user-friendly, stable and less prone to crashes when they were implementing earlier versions. Now, even though XP is generally referred to being stable and efficient compared to other copies of Windows, it is still critised for being overly susceptible to security risks. Therefore the successor of XP- Vista, released in January of 2007 was designed in such a way so as it provides more security. The transition time between Vista and XP is the longest one between versions of windows. Vulnerabilities Of Windows What is vulnerability? â€Å"It is a weakness that makes a threat possible. â€Å" These vulnerabilities are used by attackers who exploits them to convey multiple attack, including enticing the users to open harmful and malicious media or to visit website which has a lot of viruses. These can have a lot of consequences. In the worst case, a hacker or attacker can get full access to the computer. Fortunately, windows provide a lot of solution to these vulnerabilities. The user just has to install the appropriate Microsoft patches or they are sometimes installed automatically with the help of Windows Update. Window Update Vulnerabilities can be compared to holes. They are like holes in the system. Windows periodically releases security patches mostly as Window Updates to fix those defects. There exists different level of security known as the â€Å"security level system† in Windows which describes the different levels of security holes: A critical security hole is â€Å"a vulnerability whose exploitation could allow the propagation of an Internet worm without user action.† An important hole is â€Å" A vulnerability whoses exploitation could result in compromise of the confidentiality, integrity, or availability of users data, or of the integrity or availability of processing recources.† A moderate security rating signifies that â€Å"Exploitability could result is mitigated to a significant degree by factors such as default configuration, auditing or difficulty of exploitation. And a low hole is â€Å"A vulnerability whose exploitation is extremely difficult or whose impact is minimal.† Source: Windows XP all-in-one desk reference for dummies Below is a list of Vulnerabilities in Windows MS10-033: Two Media Decompression Code Execution Vulnerabilities Description: It involves vulnerabilities in Media Decompression. â€Å"Windows ships with various components that help it process and play media files, such as videos. According to Microsoft, these media handling components suffer from two unspecified code execution vulnerabilities, involving the way they handle compressed data within specially crafted media. â€Å" Potential effect on system: An attacker can exploit these vulnerabilities by encouraging user to open specially crafted media file, download and install harmful software, by luring them to a website containing such media or by receiving specially crafted streaming content from a web site or any application that delivers Web content. In doing so, an attacker can exploit these vulnerabilities to gain the same user rights as the local user. If this happens, then the attacker will gain the complete control of that PC. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Microsoft rating: Critical. Solution: MS10-033. Since media files are most often the common targets of exploitation by attackers due to the increased potential for circulation via social group and the fact that it has been publicly been disclosed, it is estimated that the possibility that malware authors will look to exploit these types of vulnerabilities are high and hence, update must be installed. Targeted Software: Windows 2000 Service Pack 4 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 Itanium based Systems No Pack Service Pack 2 Windows XP Service Pack 2 and 3 Professional x64 Edition Service Pack 2 Windows Server 2008 No Service Pack Service Pack 2 Windows Server 2008 x64 Edition No Service Pack Service Pack 2 Windows Server 2008 for Itanium Based Systems No Pack Service Pack 2 Windows Vista Service Pack 1 2 Windows Vista x64 Edition Service Pack 1 2 MS10-034: Cumulative ActiveX Kill Bit Update Description:â€Å"ActiveX controls are small programs or animations that are downloaded or embedded in web pages which will typically enhance functionality and user experience. Many web design and development tools have built ActiveX support into their products, allowing developers to both create and make use of ActiveX controls in their programs. There are more than 1,000 existing ActiveX controls available for use today.† Source: http://msisac.cisecurity.org/advisories/2010/2010-043.cfm Potential effect on system: There are several Microsoft and third party ActiveX controls which particularly suffer from various security vulnerabilities, found by Microsoft and other external researchers. This vulnerability allows remote code execution if a user views malicious website that has an ActiveX control with Internet Explorer. An attacker could exploit any ActiveX controls to execute code on the users computer, with that users privileges. If user has administrative privileges, the attacker will gain full access to the users pc. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Microsoft rating: Critical. Solution: MS10-008 This updates protects the pc by activating the Kill bit for every vulnerable ActiveX controls, they are this disabled in Windows. Microsoft Internet Explorer provides security feature which will prevent an ActiveX control from being downloaded without the users permission. Targeted Software: Windows 2000 Service Pack 4 Windows XP Service Pack 2 Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Windows Vista Windows Server 2008 Windows 7 or 32-bit Systems Windows 7 for x64-based Systems Windows Server 2008 R2 for x64-based Systems** Windows Server 2008 R2 for Itanium-based Systems MS10-032: Three Privilege Elevation Vulnerabilities in the Kernel-mode Driver (Win32k.sys) Description:†The kernel is the core component of any computer operating system. In Windows, access to the kernel is provided via the Windows kernel-mode device driver (Win32k.sys). Win32k.sys suffers from three elevation of privilege (EoP) vulnerabilities†.† The flaws are caused due to the way windows kernel-mode driver, improperly allocate memory when copying data from user mode frees objects that are no longer in use manage kernel-mode driver objects validate input passed from user mode. â€Å" Potential effect on system: â€Å"By running a specially crafted program on one of your Windows computers, an attacker can leverage any of these flaws to gain complete control of that system, regardless of his original user privileges. However, the attacker needs to have local access to one of your computers in order to run a malicious program. So these vulnerabilities primarily pose an internal risk.† Microsoft rating: Important. Solution: MS10-032 MS10-041: .NET Framework Data Tampering Vulnerability Description: â€Å"The .NET Framework is software framework used by developers to create new Windows and web applications. Among other things, the .NET framework includes capabilities to handle cryptographically signed XML content, to ensure unauthorized attackers cant alter XML messages being sent to your application. Unfortunately, the .NET framework doesnt implement XML signature checking properly. As a result, attackers could potentially send maliciously altered XML messages to applications youve created with the .NET framework† Potential Effect on system: The impact of this vulnerability differs greatly depending on the application youve designed, and what type of data you passed in your XML. If user havent been exposed to any web applications that rely on signed XML, then the flaw doesnt affect him at all. Microsoft rating: Important. Targeted Software: Microsoft .NET Framework 1.1 Service Pack 1 Microsoft .NET Framework 1.0 Service Pack 3 Microsoft .NET Framework 2.0 Service Pack 1 2 Microsoft .NET Framework 3.5 Microsoft .NET Framework 3.5 Service Pack 1 Microsoft .NET Framework 3.5.1 MS10-037: OpenType Compact Font Format (CFF) Driver Privilege Elevation Vulnerability Description: This vulnerability mainly occur when a driver that helps to display the OpenType CFF font, does not validate certain data passed from user space to kernel space. Moreover the driver can grant complete control of the affected system to any user who is logged in and is executing code. Potential effect on system: â€Å"By running a specially crafted program on one of your Windows computers, an attacker can exploit this flaw to gain complete control of that system, regardless of the attackers original user privileges. However, the attacker needs to have local access to one of your computers in order to run his malicious program. So this vulnerability primarily poses an internal risk.† Microsoft rating: Critical. Solution: MS10-037 Targeted Software: Microsoft Windows 2000 Service Pack 4 Windows XP Service Pack 2 3 Windows XP Professional x64 Edition Service Pck 2 Windows Server 2003 Service Pack 2 x64 Edition Service Pack 2 Windows Server 2003 for Itanium-based Systems Service Pack 2 Windows Vista Service Pack 1 2 Windows Vista x64 Edition Service Pack 1 and 2 Windows Server 2008 for 32-bit Systems No Service Pack and Service Pack 2 Windows Server 2008 for x64-based Systems No Service Pack and Service Pack 2 Windows Server 2008 for Itanium-based Systems No Service Pack and Service Pack 2 R2 for x64-based Systems Windows 7 for 32-bit Systems x64-based Systems These are a few examples of vulnerabilities that Windows Operating Systems mainly face. This list keeps on increasing with time, and fortunately Microsoft provides update so as to overcome these problems. Source: http://www.newagedev.net/2010/06/five-vulnerabilities-in-windows-and-its-components-two-critical/ http://www.sophos.com/ Threats Attacks There are many types of threats and attacks that Windows has to face. Also the fact that Windows operating system are most common among computer users, they are thus the more targeted by attackers. Threat V/S Attack What is a threat? â€Å"A potential occurrence malicious or otherwise that may harm an asset† What is an attack? â€Å"An action taken to harm an asset† From the two definitions above, we can say that a threat is more the possibility of doing harm to the Windows system, while attack is mainly the action taken to violate security settings. Types of Threats Attacks Below is a list of threats and attacks that are most common which can affect your Window Operating Systems. Types Of Threats Description Countermeasures Spoofing It mainly deals entering a system by stealing the identity of an authorised user. Example: Using the password and username of a person to enter his account and make changes without his permission. Do not keep password at the reach of other person. (for example in a plain text) Use spyware such as Spybot SD â€Å"Protect authentication cookies with Secure Sockets Layer (SSL).† â€Å"Do not pass credentials in plaintext over the wire.† Use strong and long password which is not easy to guess. Repudiation It involves the denial of participation in a communication which has occurred or denying that information has been received. Make use of digital signatures. Create secure audit trails. Tampering with data It mainly involves changing data manually to generate unexpected result. Example: Changing data on a web site. â€Å"Use data hashing and signing. Use digital signatures. Use strong authorization. Use tamper-resistant protocols across communication links. Secure communication links with protocols that provide message integrity.† Denial of service Prevent legitimate user from accessing a network or compuer by saturating it with requests. â€Å"Use resource and bandwidth throttling techniques. Validate and filter input.† Use software available on the net such as Radwares APSolute OS Information Disclosure It mainly involves making confidential information accessible to public or a group of unauthorised person. Encrypt file where information is stored. Keep back-up in secure places and use strong authorisations. Use passwords to be able to gain access to these information Use secure network when sending information. Malware (malicious Programs) It consists of any program that is installed either with or without permission of user, and whose aim is to cause harm to users pc by either gaining partial or full access to the system. Its impact can vary from slight as changing a folders name to full control of your machine without the ability for the user to easily find out. Types of Malicious Programs: computer viruses worms Trojan horses spyware Harmful adware scareware, crimeware, Most rootkits, and other malicious and unwanted software or program. Computer Viruses They are programs designed to cause harm to our computer system or the applications on the software. They are often attached to files which appear to be harmless to the operating system, but as soon as it is installed, the computer will operate different. There are viruses which even manage to close your computer without your permission. Types of Computer Viruses: * Boot sector computer viruses These types of viruses mainly affect the boot sector of the computer which is mainly in the bootable disk or in particular location in user computer hard drive. The boot sector viruses mainly affected the windows 2000 and examples of such viruses are: Disk Killer and Michelangelo. * Email viruses Emails viruses are transmitted through email as it name suggest. Normally they can be found as attachment and as soon as they are opened the computer gets the virus. Some may even replicate by themselves by forwarding themselves to all the e-mail addresses in the users address book. This type of virus is spread very quickly. Even though most of the mail system provides users with scan, a precaution one can take is opening mail from known-people only. * Companion viruses Companion viruses mainly affect a computers MS-DOS system. They create dangerous program that appears to be like the other normal files that are found on the computer. When a wrong command is enter into the prompt of the computer, it may end up executing the virus instead of the program that initially wanted to run. Fortunately, Windows like XP prevent such viruses from installing into computer as they do not require to use the MS-Dos command prompt. Worms Worms have the characteristic of self-replicating itself and they are thus spread very quickly. They exploit vulnerability on operating system and provide a gateway for other malware such as Trojan horse. An example of a worm which caused a lot of harm to mainly Window Operating system is: the ILOVEYOU virus. According to an article on WordPressTidBits For the Rest Of Us(WPTidBits), the ILOVEYOU worm (a.k.a. VBS/Loveletter and Love Bug worm), is a computer worm written in VBScript and it is considered by many as the most damaging worm ever. It started in the Philippines on May 4, 2000, and spread across the world in one day (traveling from Hong-Kong to Europe to the United States), infecting 10 percent of all computers connected to the Internet and causing about $5.5 billion in damage. Most of the â€Å"damage† was the labor of getting rid of the virus. The worm arrived in e-mail boxes with the simple subject of â€Å"ILOVEYOU† and an attachment â€Å"LOVE-LETTER-FOR-YOU.TXT.vbs†. The Pentagon, CIA, and the British Parliament had to shut down their e-mail systems to get rid of the worm, as did most large corporations. The worm overwrote important files, as well as music, multimedia and more, with a copy of itself. It also sent the worm to everyone on a users contact list. This particular worm only affected computers running the Microsoft Windows operating system. While any computer accessing e-mail could receive an â€Å"ILOVEYOU† e-mail, only Microsoft Windows systems would be infected. The worm propagates by sending out copies of itself to all entries in the Microsoft Outlook address book. It also has an additional component, in which it will download and execute an infected program called variously â€Å"WIN-BUGSFIX.EXE† or â€Å"Microsoftv25.exe†. This is a password-stealing program which will e-mail cached passwords. Trojan horse It is a malware which is difficult to detect, since it masquerades itself into files which appear to be normal. It can be on the computer without doing anything, and finally one day it can be the reason why your operating system has crashed. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. Spyware Spyware normally a tool used by companies to record web surfing habits Spyware is also known as the Advertising Supported software. They normally do not do any harm to the operating system as such, but they transmit personal identifiable information from a computer to some place in the internet without the permission of the user. Harmful adware â€Å"Adwareis the common name used to describe software that is given to the user with advertisements embedded in the application† They usually run advertisement or downloads posters without the permission of the user which often cause problem. Scareware Scareware are usually software used for marketing but which has unethical marketing tactics. For example, software which scans the computer and informs user that his computer is infected, and the later will have to download the following antivirus to be able to remove them. Hence, as its name says â€Å"scare† ware is a software designed to scare people by providing them with inexact information so as to promote a particular software/applications. Crimeware Crimeware consists of an application or a program which helps people to perform illegal activities. For example, software to hack windows live messenger password. They normally steal personal information about user of an account. Rootkit â€Å"It enables an attacker to have root access to the computer, which means it runs at the lowest level of the machine. A rootkit typically intercepts common API calls. For example, it can intercept requests to a file manager such as Explorer and cause it to keep certain files hidden from display, even reporting false file counts and sizes to the user. Rootkits came from the UNIX world and started out as a set of altered utilities such as the Is command, which is used to list file names in the directory (folder).† Source: http://www.pcmag.com/encyclopedia_term/0,2542,t=root+kiti=55733,00.asp Rootkits are normally inserted by the intruder so that he can again have access to it a later stage. Rather than just being a piece of code, it is a system of many linked programs designed to take control of a machine at the administrator level, and remain hidden to the systems users or legitimate administrators. The purpose of rootkits include collecting information about computers (including other computers on a network) and their users (such as passwords and financial information), causing such computers to malfunction and creating or relaying spam. Prevention against Malware Antivirus Antivirus should be installed to prevent malware from gaining access to the computer. Anti-spyware It helps user to identify and remove spyware from Operating system. Moreover it defends users computer from them Anti-adware It scans the computer and removes adware. Moreover it can also detect other miscellaneous codes which the antivirus has not detected. Firewall It is a set of device or devices that can be used to monitor both incoming malware from network or on users pc when he enters an external disk. Window Update Allow windows to update automatically, since it provides users computer with required patches to fight against new type of malware. Making Windows more secure 1. Virtualisation This method mainly involves using another computer in your computer. What is meant by that is software like Adware, allow you to install windows and use it. Thus you can connect to any device or any site and if the pc crash, there will still be your main Operating system running. 2. User Account Control It is a method which is mainly applicable for users of Vista and Windows 7 only. It an effective measure that Microsoft has made to ensure that user does not perform any action which can turn out to be harmful for the system. Also, user is being asked for permission whenever a program is installed. If a virus tries to run without the knowledge of the user or his permission, UAC will pop up with the usual continue or cancel message giving him one last chance to stop that particular infection. UAC can be adjusted in the Control Panel under User Accounts. 3. Browser Internet Explorer is not a safe browser. (Not including IE9) and they are the most targeted browser. Firefox, Chrome and Safari have support for extensions, and the options available for each browser Internet Explorer can be used however any version below 7 does not meet the required security level. When using it make sure that the â€Å"InPrivate and SmartScreen filters are active†. Also, make sure that the activeX and file being downloaded are safe. 4. Safe Internet Practices Internet contains many viruses and one will never know when they might hit. Below is a guideline for a few good practices to follow when using the internet: If its questionable in real life, its probably the same online. Downloading illegal torrents, visiting sites, and looking for bomb-making information is an easy way to ask for a virus infection. Know what is being clicking on. Avoid pop up messages, congratulations message etc.. Maintain computer by updating anti-virus. If not maintained, the system becomes slow and vulnerable. Monitor all activity on computer. If the computer is being used by other user, ensure that they too is using the computer correctly. Reach out and ask questions. Its ok not to know if a certain website is safe or if an email is a scam. Ask more knowledgeable people or research the subject to find out if it is or not. OpenDNS OpenDNS -redirects requests through a third party server which is managed and updated to optimize speed and security. Using the OpenDNS server can keep user from visiting known malicious sites or keep malicious scripts from running. This is especially useful for multi-user environments because user can create an account and manage in more detail what sites the computers are allowed to visit (parental controls).

Saturday, January 18, 2020

B&Q Case Study Essay

As data and information are readily available, and information communication technology (ICT) has highly advanced, organizations such as B&Q need to understand how knowledge creation can assist to improve internal and external processes and also encourage innovation. In task one, the aim is to differentiate between possession of knowledge and practice of knowledge and examine which epistemology B&Q uses throughout their supply chain. B&Q uses possession knowledge whereby it provides all their vendors with a code of conduct guidelines which they need to follow through. Knowledge is defined as â€Å"awareness, consciousness, or familiarity gained by experience or learning† (knowledge, n. d) which are the ways people in a social situations would understand and make sense of where they are and what they are doing. When knowledge is conducted and embraced in an organization, it will result to a group of people who develop shared beliefs, behaviours and routines that shape organization capabilities. Experts such as Polanyi (1966), Nonaka (1994) and Cook and Brown (1999) divide knowledge into two categories called tacit knowledge and explicit knowledge. Tacit knowledge is associated with the skills or know-how that people developed through their own experience in specific contexts. Whereas explicit knowledge is something that has been codified, written down or spelled out and is communicable across context. 1. 2 Possession and practice From the word possession itself, one can understand that it is about the knowledge that people have in their mind (Cook and Brown, 1999). Blackler (1995), and Cook and Brown (1999) refer possesion of knowledge as â€Å"knowledge† and practice of knowledge as â€Å"knowing†. Knowledge is a mental or cognitive capacity which is hierarchical in nature and comprises of data, information etc. moreover, possession of knowledge is a personal property where people render meaning from subjective experiences, perceptions and previous understanding. As human minds are individually unique, hence different people may perceive and intepret the same information or data differently. Meanwhile, practice of knowledge sees knowledge as something that it developed through social interaction such as project work, group assignment or group discussion. When people practice knowledge, they convert tacit knowledge into explicit knowledge, thus transferring knowledge from one person to another. This is done through sharing stories, experiences or creating norms to a group of people hence enabling the experience of an individual to be related to a wider community. 3. 3 B&Q case B&Q plc works with many vendors such as Kingfisher Asia (KAL) who supply products to B&Q. Hence to manage their vendors and ensure processes and procedures are followed, B&Q come up with code of conduct (B&Q Operational Standards for Supply Chains) for all their vendors. The code of conduct is based on the international labour and envirnmental standards set by the International Labour Organisation (ILO) Conventions which factories and worksites of all vendors throughout the world need to comply to. In summary, vendors need to let B&Q have full visibility of the enitre supply chain and fulfill and obey the code of conduct criteria at all facilities. Any failure to meet the nine Critical Failure Points (CFPs) will result in B&Q not buying or purchasing their products. Through this code of conduct, we can deduce that B&Q adopts a possession of knowledge rather than practice of knowledge. B&Q receives knowledge about labour and environmental guidelines from ILO conventions and uses the basic context to write down or capture in an information technology (IT) system which is then made available as an organizational resource – B&Q Operational Standards for Supply Chains. This is in contrast of having a group discussion with the vendors and seeking their opinions and views on how to create a better working environment for the workers (practice of knowledge). For example, Baer (1987) and Abbott (1988) explained that in order to defend their position, occupational groups such as doctors would write down or ‘black box’ their skills and knowledge which is then used by others as guidelines or instructions to follow. B&Q is following the same concept as they wish to guard their position as a responsible organization or employer where the rights of all workers throughout the world are respected and protected. Thus, this results to an encoded knowledge (Blackler, 1995) for the vendors as information is transmited through the code of conduct.

Friday, January 10, 2020

Reclamation Of Thermal Energy In Coventry Sewage Environmental Sciences Essay

Due to the increasing energy monetary values and worsening energy resources it becomes more and more of import to utilize alternate energy supplying solutions. Harmonizing to the Kyoto protocol and the clime alteration conference in Copenhagen that at the minute discuss the most of import industry states associating to the environment and economic system about the inquiries: How to cut down the green gas emanations and how to cut down the ingestion of stoping fossil energy beginnings? The most of the states have the sentiment that the current major portion of our energy usage beginnings is limited and that we have to alter our blowing devour behavior. A batch of politicians and scientists think that our following power beginning solution is in renewable energy like air current, H2O flow and H2O degree energy, solar, bio fuel and geothermic energy. At the minute planetary ingestion of renewable energy is about 14 % . The biggest portion of the renewable energy ingestion is bio fuel of 13,6 % Erneuerbare Energien-politik Bernd Hirschl, 2007, Page 422 The Technology to utilize air current, H2O, Sun and geothermic energy is really expensive and it is non really profitable, because the monetary value of the dodo fuel, although it is steadily turning, is still excessively low to utilize the alternate energy. But the authoritiess know that the world will perfectly trust on the renewable energy in the hereafter. Hence they support with investings and subsidies the renewable engineering developments and undertakings. Germany for illustration spends one million millions for subsidies for solar energy workss. Harmonizing to Dr. Klaus Peter Krause â€Å" it was a entombment of one million millions and it causes a gold-rush temper since 2004. This must be stopped † . Many people have similar sentiment. ( Die Freie Welt, Solarstrom das Milliardengrab, 23.04.10 ) At the minute 9 different European states under it Great Britain and Germany are be aftering a 30 billion e uro undertaking. This undertaking includes the usage of different types of renewable energy. The web is supposed to link air current turbines in Scotland, solar panels in Germany and beckon power workss in Belgium and Denmark. ( Klima Wandel, Sonne, Wind und Wellen Nordsee ALSs Kraftwerk, 07.01.10 ) Due to the immense outgos for the renewable energies and the for good looking critic from scientists and media it is of import to happen out whether the behavior of our politicians is justifiable. The renewable energy is of import for our hereafter but the renewable energy is really expensive. For that ground we have to see, what sort of renewable energy we have to put to. The media and politicians are speaking about different types of renewable energy, but there is one promising sort of energy usage cipher is speaking about. Harmonizing to DWA-Regelwerk Merkblatt DWA-M 114 Energie gold Abwasser – Warme und Lageenergie, Juni 2009 the heat energy in German sewerages has the possible to provide 10 % heat energy to the German lodgings. Every twenty-four hours a batch of waste H2O flows through the sewerage system. The liquid waste gets filtered in the sewerage elucidation works and runs to the terminal of the receiver. This H2O is polluted and hence chiefly considered as waste without any economic value. However the wastewater of private family, agricultural and industrial companies does non merely reassign waste. During this transportation procedure heat is besides generated. Hence the streamlined H2O has a higher temperature than for illustration imbibing H2O. So it should be considered to utilize the energetic warming potency of the sewerage for providing heat to the local family. Effluent is accordingly a possible resource for a thermic advantage. The renewal of the energy occurs with a recuperator. It consists of a liquid medium which removes the energy to a heat pump. The heat pump converts the low temperature of a immense sum of liquid to a higher temperature of a smaller sum. So with that status the het H2O can be used for warming the houses and tap H2O. The engineering of repossessing thermic energy in canalisation is proved. There are already some workss in operation since many old ages in Switzerland and Germany. But similar workss in Great Britain could n't be found. The heat money changer produces energy, saves primary energy resources and reduces CO2 emanation. So should this engineering besides be used in Great Britain?Purposes and AimsThe purpose of this undertaking is to happen out: Is it sensible to construct heat renewal workss compared with another types of renewable energies in Great Britain? In the 2nd chapter the Energy political relations in Great Britain will be discussed to clear up the necessity of renewable energies. In the beginning of this chapter it will be indicated to the energy jobs and what aim the authorities of this state is traveling for. In the following measure the political agreements will be mentioned and how the state has developed to make the energy purposes. Afterwards the energy production and in gestion of Great Britain will be described to understand the energy state of affairs and the demand for a alteration in the consumer behavior of this state. In the 3rd chapter the engineering of a heat renewal works in sewerages will be explained. The purpose of this chapter is understand how such a works can be used and what topographic points are more appropriate to put in it. Furthermore this chapter will specify which proficient and practical attempts are necessary, which costs are required to construct such a installation, how much energy such a system can bring forth and how much money can be saved. For the possible estimations of the works must be considered the proficient demands of the sewerage system and heat money changer every bit good as the demands of client and supplier. Besides the sewerage system provider has to be researched, which uses the system as drainage. Main responsible company for the canalisation system in West Midlands is Severn Trend Limited. Even though it is proved that such a works can bring forth energy, there are many things to discourse about the efficiency of that engineering. There are a batch of different engineerings to utilize clean and renewable energy e.g. air current, solar, tidal, hydro, bio fuel power a.s.o. So in the 4th portion it has to be discussed which renewable energy is more profitable? The heat power of sewerage systems engineering is really new and there are non really much informations about the profitableness. After comparing all the bing workss in the sewerages the current efficiency and the possible capacity in the hereafter of all renewable engineerings, and after comparing of the profitableness and sustainability of the bing and planned renewable energy installations, we can presume the necessity of utilizing the waste H2O energy. Even if such engineering exists in Germany and Switzerland, it does n't intend that it is sensible to construct it in Great Britain. So in the 5th portion it has to be compared the attitude to the energy policy, ingestion and energy necessity of these states. Most states recognise the exigency to help the renewable energy. Hence the authoritiess try to subsidise the advancement of modern developments. So this work will depict the current subsidies policy in Germany and Great Britain and discourse whether it is sensible to back up the heat pump engineering of sewerages in UK. ( Andre Suck, Erneuerbare Energien und Wettbewerb in der Elektrizitatswirtschaft, staatliche Regulierungen im Vergleich zwischen Deutschland und Gro?britannien, 2008 ) . Furthermore it has to be compared whether the difference of energy monetary values or the energy ingestion for the heat energy of Germany and UK can be a ground non to utilize the heat energy in Great Britain. The following chapter will demo the practical usage of a heat renewal works within a British metropolis Coventry. It will demo some countries of the sewerage system and depict why they are appropriate for a works. In that portion all the information of the work has to be used to happen a proper topographic point and what sort of advantages the peculiar pipes have. The purpose of this chapter is to demo that it is possible to construct that works in Coventry and so in many other metropoliss. The last chapter is a decision whether the engineering is appropriate to utilize it in Great Britain under the comprehension of the mentioned positions: Energy policy of Great Britain, Energy production and ingestion, technological demands and energetic end product of the energy renewal installation and the practical usage in the bing sewerage system.Energy political relations in Great BritainProblems:Dependence: Although Europe and Great Britain is economically and politically really strong power, the state is still really dependent on the resources of other states. Harmonizing to Bundesanstalt fur Geowissenschaften und Rohstoffe and US Department of Energy Great Britain has about no available oil militias within inland. Global scarceness of Resources: Another job is the energy supply in the hereafter. The chart diagram of Ochsner in the Book Geothermal Heat pump shows that the chief natural energy beginnings will be over in the following two centuries. So there must be found other types of power for the following coevalss. Sustainability means the development possibilities should be constricted neither in the present nor in the hereafter. An of import factor for the sustainable handling with the resorts is the proficient advancement. The development of advanced energy usage engineering increases the energy efficiency, extends the usage period of limited beginnings and reduces the environmental pollution. ( Sustainable energy, taking among options, Jefferson W. Tester 2005 )Environment:The firing procedure of gas coal and oil releases different sort of toxic gas in the ambiance. ( e. g. C dioxide, methane, chloroflourocarbons, Ground level ozone and upper atmospheric H2O vapour and azotic oxide ) . These gases cause the nursery consequence and clime alteration. ( Ochsner in the Book Geothermal Heat pump 2007 ) United Nation surveies ( Intergovernmental Panel on Climate Change study February 2007 ) claim that the environmental pollution will do an mean temperature addition in the following 100 old ages f rom 1,5-6A °C. This clime alteration can be a dramatic danger for the whole human sort. Additionally accidents and edifice effects much pollution during the extraction and transit of the stuff.Purpose:Energy is necessary for everybody in normal class of life and for the growing of the economic system in a state. Energy ingestion has to cover with two challenges in the hereafter. Manage the clime alteration by diminishing the C dioxide end product within inland and abroad and guarantee clean, save and inexpensive energy and go independent of the imported energy. ( HM energy, Meeting the energy challenge, a white paper on energy 2007 )Arrengements:The purpose of our energy politic is the security of supply, efficiency and environmental friendliness. The Oil crisis showed that safeguarding of the energy providers is the most of import purpose. A supply warrant can be increased within a variegation of energy resorts and so a variegation of energy provider. The importance of renewable energy beginnings increases because planetary energy demands rise, handiness of fossil fuel, crude oil and gas is limited. Consequently in the long term it is required to replace limited for renewable power. Environmental protection has two demands. First to cut down the scratch of environmental stuff like wood, crude oil, fuel and secondly to cut down fouling emanation like CO2, which occurs by coevals of energy. ( Weltvertragliche Energiesicherheitspolitik, Josef Braml 2008 ) The clime alteration act 2008 has the mark to cut down the emanation of nursery gases of 80 % until 2050 compared with the twelvemonth of 1990. The short term aim of the CCA 2008 is to cut down the CO2 emanation of 26 % until the twelvemonth 2026. In the EU ‘s Renewable Energy Target and the alteration of the Emissions Trading System: Follow-up study is written, that EU has the mark to utilize 20 % renewable energy of the full ingestion in the twelvemonth 2020. Harmonizing to Lord Hunt Commissions suggestion to make 15 % is realistic. The country of West Midlands and of class the industry metropolis Coventry has the duty to do a part to that duty.Development:Department of Business Enterprise and Regulatory Reform wrote in the â€Å" UK Energy in Brief July 2007 † , that from 1980 boulder clay 2004 UK imports of rough oil and crude oil are used to be smaller than the exports. But since 2004 in Great Britain the imports exceeds the exports. So Great Britain becomes more an d more dependent by merchandises from other states. United Nation Framework Convention on Climate Change found out that Britain reduced the emanations the greenhouse-gas emanations between 1990 boulder clay 2007 by about model 18 % . Compared with other states has Great Britain besides Russia and Germany the best betterments worldwide.SummeryTo sum up the energy and environmental political demands, the security of energy supply is an of import factor now and in the hereafter. It is necessary to pursuit variegation scheme refering energy medium and provider. Especially renewable engineering is really good to conserve the energy resources and to cut down the emanations. That engineering can besides avoid large energy monetary value fluctuation in the hereafter.Energy Production and ConsumptionEnergy is in different signifiers in the nature available. It is non possible to utilize all energy signifiers straight. It is a procedure required to reassign the primary energy ( e.g. rough oil, coal, natural gas, U and regenerative energy beginn ings ) in ingestion energy ( e.g. warming, electricity, fuel oil ) . The transmutation and transit causes a batch of energy loss. After the ingestion all the private families loose the energy through the heat dissipation to the exterior, inefficient burning and dissipation of waste H2O. Harmonizing to Elissa Minosi ( Klimapolitische Richtlinien der EU und nationale Umsetzung in Deutschland und Gro?britanien 2009 ) energy production in United Kingdom diminutions and the energy ingestion slopes. Great Britain still depends to 98,7 % on non-renewable energy beginnings of primary energy ingestion. Other energy bearer like biofuels, wind hydro etc. bring forth merely 1.3 % . The statistics show that UK attempts to utilize different sort of renewable energy beginnings but it does n't utilize the heat energy of sewerages.Sketch:The current state of affairs shows that Great Britain has n't reached the energetic marks. Refering to the energy policy purpose to unsure the energy supply and to utilize different primary energy signifiers, we have to acknowledge that UK still depends largely on limited beginnings. The portion of renewable energy is undistinguished. Harmonizing to United Nations Framework Convention on Climate Change Britain improved the nursery gas emanations really good. So they will likely make the aim to cut down the emanations of 26 % until the twelvemonth 2026. But there is still really much to make to cut down the emanations of 80 % till the twelvemonth 2050. All in all there is still need for action and the energy supply has n't changed since the oil crisis for 30 old ages. The energy demands are increasing. The inland energy production go es down. So UK is even more dependent on imports. In the current treatment one suggestion can be found. Is it possible to utilize the heat energy in the sewerage system? Appraisal of blowing Energy in the Sewage System In the beginning we try to happen how much energy use British people for waste H2O and we perchance can utilize. Office of national statics says that about 48,5 1000000s of metric tons of oil equivalent are used for British families in one twelvemonth. The undermentioned graph shows that 11 % of lodging energy is used for hot H2O like shower, dish lavation and bath, what goes about by 100 % to the sewerage system. 48,5mill ten 0.11 = 5.3 factory. So it is estimated that 5.3 factory dozenss of oil are traveling into the British canalisations. In Coventry live about 300 thousand people and in Great Britain live 61 million people. So Coventry wastes about up to 26 000 dozenss of oil for the canalisations.Basic rules of Heat Energy ReclamationDifferent types of utilizing sewerage energyThere are three different types of utilizing the heat energy of waste H2O. In the edifice In the sewerage system before the intervention works In or after the intervention works In the undermentioned strategy advantages and disadvantages of different types of workss are listed. A renewal works in the intervention installation but before the elucidation is a intercrossed installation. The in-house heat renewal is non a portion of the sewerage system, so it is non in this work included. Basically the heat renewal is merely sensible if there is a large sum of waste H2O or high temperatures available. Buildings with immense H2O ingestion for illustration indoor swimming pools, secondary schools and industrial constitutions are appropriate for that usage. In the edifice Advantages comparative high waste H2O temperature really short heat transit distance energy provider is energy consumer independent managing from sewerage system no influence of the rainfall Disadvantages low H2O flow large timed fluctuation riotous content in the waste H2O small works with high attempts In the sewerage system Advantages immense waste H2O sum short and medium heat conveyance distances Disadvantages supervision of the works alteration of waste H2O and pipes conditions In or after the intervention works Advantages no influence to the H2O elucidation immense and changeless H2O sum, so the biggest possible energy supply waste H2O is purified chilling of the H2O, so no influence of the receiver Disadvantages intervention workss are really frequently far from the lodgings, so there is a long heat transportation distance dependence of the sewerage intervention works runing companyFunctionality of a thermic energy utilizing worksA recuperator will be installed in the sewerage channel that. Liquid medium circulates in the heat money changer and takes out a portion of the energy of the waste H2O. The het medium will be transported to the heat pump. The heat pump warms with this energy H2O to a higher temperature, what can be used for heating the lodgings or tape H2O. The cooled liquid goes back to the sewerage channel and the rhythm begins once more. The power energy is important lower than the end product of the pump. This system can be besides used for chilling of edifices. But it is non the chief mark of this work. Components: Heat money changer: Heat money changer is the beginning of the energy usage rhythm. The end product W ( kilowatt ) of the HE is dependent from the surface of the money changer A ( mA? ) , the in-between temperature difference between the money changer stuff and the waste H2O I†T ( K ) and the heat exchange coefficient k. The heat exchange coefficient depends on the opposition, what the heat exchange applies to the flow. So it depends on the money changer type and flow conditions of the medium. Mathematical equation: W=k*A*I†T The affectivity of the money changer can be besides influenced by the fouling factor degree Fahrenheit ( W/ ( mA?*K ) ) . This factor has to be considered, because an organic coat can happen over the clip, which can cut down the affectivity up to 50 % . So it might be required to clean the money changer. Additionally the flow rate or the incline influences the end product of the HE, because large flow rate has a little contact clip between the medium. ( Fouling in heat exchange equipment, Suitor and Pitchard, 1984 ) ( Warmetauscher, Podhorsky Miroslav, 1999 ) Heat Pump: A heat pump consists fundamentally of an evaporator, compressor, capacitor and enlargement valve. The medium with a low furuncle point will be heated in the vaporization measure and the liquid becomes a gas. Hence the medium in the evaporator is in a low force per unit area and the temperature exterior is higher than indoors. The temperature difference causes a heat transportation and the medium evaporates. At the 2nd measure the gas will be sucked and compressed. Compaction increases the temperature to a higher point. The heat pump needs normally electrical runing power, which of class must be lower than the usage energy. In the 3rd measure the medium goes to the capacitor where the medium is circulated with the warming medium. The temperature of the warming medium is lower, so the gas gets cold and liquid once more. The energy in the evaporator plus the captive electric energy from the compressor gets released in to the colder heat H2O. So the energy goes to a intent like room warm ing or tab H2O. And after the condensation the medium has to go through the enlargement valve, the temperature and imperativeness gets same before the evaporator and the rhythm begins once more. There are two different ways to utilize the heat pump in a sewerage system. Monovalent usage means merely the works serve the energy to the lodgings. This is normally used in the geothermic energy, because the temperature of the energy beginning is changeless over the twelvemonth. Bivalent usage means the installation supplies most of the energy but in the coldest yearss added oil or gas warmer supports the heating. This type should be used in sewerages because the temperature fluctuates over the twelvemonth. ( Regenerative Energietechnik, Viktor Vesselak, Thomas Schabbach, 2009 ) Heat conductivities: Heat conductivities connect heat money changer with the heat pump. The conductivities have to be every bit short as possible to maintain the cost force per unit area and heat loss down. Heat pump is a devise, which transfers the heat from low temperature medium with added runing power to a medium with higher temperature. Hence an efficient usage of a heat pump is dependent of the heat pump temperature. Waste H2O has normally a changeless minimal temperature degree over the twelvemonth. Therefore it is a sensible possibility to see about the heat renewal. The waste H2O has besides in the winter, when is the highest heat demand, compared with land H2O or lakes comparatively high temperatures. There are two grounds for the high temperatures in the sewerages. First ground is our H2O we use in the edifices ( e.g. shower, cookery, wash, dish H2O, tab H2O, blushing H2O ) has really high temperature and full waste H2O goes to the sewerages. The waste H2O can be cooled down by the temperature of the sewerage system pipes and the rainwater, which flows into the system. Therefore pipes with pure waste H2O from the edifices are more appropriate for the renewal. In the winter the air temperature can be below 0A °C but merely the melted snow above 0A °C can get into sewerage pipes. Therefore the assorted sewerage H2O ( waste H2O and surface H2O ) has even in the winter really adaptable temperatures. There is a 2nd ground for the high temperatures besides the warm waste H2O. The sewerage pipes are largely built under Earth ‘s surface. In the winter temperature under the surface is higher than the temperature of the air. The temperature under the deepness of 2 metres varies e ven in the winter between 7A °C and 13A °C. For that ground the Earth surface works like heat insularity for the waste H2O. hypertext transfer protocol: //www.bergsicherung-gera.de The sewerage channel transports heat energy and is accordingly an interesting beginning for the energy supply. But the effluent intervention works operators have a demand non to fall below 10A °C and the waste H2O must non chill down more than 0.5 Kelvin. No job will happen, if these two conditions are satisfied. Normally the temperature is even in the winter between 10-15A °C A? ( Schriftenreihe aus dem Institut fur Rohrleitungsbau Oldenburg, Rohrleitungen-Unternehmen im Aufbruch, Band 12 ) The undermentioned image shows a surface of a manhole screen, what the most people have already seen, but seldom person give attending to that fact. The heat energy of the sewerage warms the manhole screen and the snow is melted. I means that the temperature in the channel is at least 0A °CExisting workss in SwitzerlandIn the following chapter some different workss in Switzerland will be introduced to turn out the functionality and profitableness of heat usage works. It seems that Ryser Ingenieure AG is a Swiss cutting-edge company in that concern. Existing workss in Switzerland: Existing workss in Germany Binningen: Since 2001 supplies the Warmeversorgung Binningen AG 61 Buildings with 300 flats with differen use e.g. School, City Council and private lodgings with about 4.800 kW power. Stallion costs for the heat renewal works are 700.000 a‚ ¬ . The chief heat supply comes from the Heat pump with usage of the local sewerage pipe, with the distance of 70 m heat pump from the pipe and two heat power Stationss of BHKW. For peak tonss in really cold yearss or in the instance of a interruption down there are common gas and oil warming boiler available. Vgl. Dietler, M. EBM, 2004 The most of import informations overview: Apartment measure: 300 Energy production: 2.400 MW h/a Power end product heat pump: 380 kilowatt Length: 140 m Width: 0,80 m Area: 110 mA? Power end product heat money changer: 260 kilowatt Heat pump runing factor: 3,2 Specific end product of the heat money changer: 2.4 kW/mA? Sewage type: assorted waste and surface H2O: Flow rate: 200 l/s Cooling in the canal: 0.3 CA ° Ryser Ingenieure AG Heat money changer: The heat money changer consists of about 50 interrelated elements 3 x 0.8 m. The elements have been installed on the floor of the egg shaped channel. The outgoing and return pipes are on the left and right side of the channel installed. Surpassing and return pipes Heat money changer elements Installation: Provisory installed channel for the installing clip Connection between the elements gets installed Heat money changer elements with surpassing and return pipes entree gets installated Vgl.EBM et Al 2002 Service: So far realized analyses result a 3.2 heat pump runing factor. ( Vgl. Dietler, M/EBM, 2002 ) The heat pump supplies in the summer the full energy for the check H2O unto 70 A °C. In the winter linked power boiler supply the check H2O and the heat pump warms the suites in the edifices, because the heat pump works more efficient for lower temperatures than the tab H2O and the temperatures in the sewerages are lower in the winter. Harmonizing to Ryser Ingenieure AG there were merely fringy upsets. It was even no diminution in the power end product, so a elucidation of the heat money changer and heat music director was n't necessary. The sewerage operator had no added attempts for the system. There is no consequence to the map on the channel. The caused temperature difference for the intervention works of 0.3A °C is undistinguished. Zwingen: Since 1999 supplies heat sewerage works 31 lodgings in Muri with energy. Stallion costs for the sewerage heat works is 108.000 a‚ ¬ and 62.000 a‚ ¬ for the heat boiler in the winter. Two heat pumps convert the waste H2O energy in the collection point in a intervention works into heat energy for edifices. A gas boiler supplies energy in the clip with the most demands. Tab H2O energy supply is decentralized in every edifice. The heat pump delivers 75 % of the full heat energy demand over the twelvemonth. The chilling waste H2O in-flow is less than 0.1 A °C The most of import informations overview in Zwingen: Apartment measure: 31 Energy production: 230 MW h/a Power end product heat pump: 64 kilowatt Length: 10 m Width: 1,06 m Area: 10.6 mA? Power end product heat money changer: 52 kilowatt Heat pump runing factor: 4.6 Specific end product of the heat money changer: 4.9 kW/mA? Sewage type: assorted waste and surface H2O: Flow rate: 130 l/s Cooling in the canal: 0.1 CA ° Heat money changer consists of 4 prefabricated elements with 2.5 m length and 1.06 m breadth, so the full length is 10 m. Operation: The pump heats the medium for the floor heating merely to 50A °C. For that ground the pump really efficient. The steps until now result that the heat pump works with the operating factor of 4.6. The applied scientists expected an operating factor of 5 but they could n't make it because of the much soil in the heat money changer. The heat pump operator has some jobs with the regularly looking soil. But the costs for that are undistinguished. It is even possible to spread out the heat money changer and accordingly the end product because of the edifice technique of several elements. Muri: Since 1994 supplies a heat sewerage works 200 flats with energy. The costs for the installation are 2.6 million euro. The competitory energy monetary value is 5.6 Ct/kWh. The costs for the full undertaking are so high, because of the large heat conductivity web and seven heat pumps. Technology: The energy will take from the purified waste H2O in a intervention works and transported through the 3.2 kilometers long hosieries in cold status to 7 different decentralized bivalent warmers. Each warmer has a heat pump to provide the chief portion of the energy supply and an oil boiler for the immense energy demands. This installation supplies the whole energy over the twelvemonth. Overview of the sewerage heat web in Muri Beginning: Ryser Ingenieure AG The most of import informations overview in Muri: Apartment measure: 200 Energy production: 1700 MW h/a Power end product heat pump: 1050 kilowatt Power end product heat money changer: 700 kilowatt Heat pump runing factor: 3.0 Operation: The medium of the heat money changer reaches 6-15 A °C. The works supplies besides in winter energy. The energy will used for heat energy. The maximal temperature of the warming medium gets from 50 to 60 A °C. The heat pumps deliver 66 % of the full warming energy needs the remainder delivers the oil boiler. The works saves 300.000 litres in one twelvemonth and about 750 dozenss CO2 emanations. The Heat money changer will be cleaned twice in one twelvemonth. One cleansing takes half of the twenty-four hours. The pollution of the heat money changer is really rare because the heat supply medium is already clarified. Summary: These illustrations proof that a elucidation works can be installed in already bing sewerage system and it can present immense energy beginnings for 100s of flats. The illustration of Muri shows that a sewerage renewal works is even with really bad conditions profitable and the energy can be transported for stat mis. All the workss have to be maintained but the costs for one or two times in a twelvemonth of the heat money changer elucidation and the chance of failure seem to be fringy. Renewable Energy The illustrations in Switzerland and Germany proof that the heat energy renewal in sewerage pipes work. At the minute there are many different tested and proofed types of renewable energy in usage. All these constitutions produce utile energy for heating and electricity. The undermentioned chapter will depict the most import renewable energy engineering. Wipkingen Basle

Thursday, January 2, 2020

Middle Class And Minority Families - 1510 Words

More middle class and minority families than ever are underwater in their mortgages, and most have zero to negative wealth after the Great Recession that followed the housing boom in 2000 (Potts 7). Even those who kept their homes watched their values drop due to declined neighborhood worth. My childhood home’s peak value was over $200,000, but my parents listed it on the market with the hope of selling for just $175,000 when they were attempting to move to lower their mortgage. There were never any foreclosures in our neighborhood, the house is in one of the best school systems in the state, and it had a fantastic location, yet the value dropped significantly further than it had in twenty years after it was built because of flood of empty†¦show more content†¦Because so many vulnerable people were harmed by manipulative actions, many were ultimately in need of financial assistance from the government; however, they were never were truly relived thanks to a new breed of law firms. Until every home loses value, buying a home will continue to be a prudent investment for those who can’t buy stocks or bonds. Purchasing my home was a major milestone in my life as well as an investment I could make for my future. Adalberto Aguirre believes that â€Å"For many Americans, homeownership is synonymous with success, independence, and the achievement of the American Dream.† Homeownership is seen as a pathway to aspects of the American dream; for instance, the ability to pay for a college education, providing start-up capital for a family business, or funding retirement plans (Aguirre 6). Owning a home, like earning a college education, is something I thought was supposed to be coveted for not only ourselves, but also for our friends and family. Helping others attain the American Dream certainly took a backseat to profits in the minds of countless mortgage brokers and lenders during the 2000 housing boom. First, everyone who has bought a house himself or herself, or has been near the process of home buying, knows that first time home buyers make mistakes. They become