Giddy Ion Reloaded: Desktop Manager, Optimizer with Multi Utility Tool
Jaymar C. Recolizado1, Marifel Grace C. Kummer2

1Mr. Jaymar C*. Recolizado Master of Science in Information Technology at Cagayan State University Caritan Campus Caritan Tuguegarao, Cagayan Philippines.
2Dr. Marifel Grace Capili-Kummer, Bachelor of Science Computer and Information Technology at Saint Paul University, U.S.

Manuscript received on January 11, 2021. | Revised Manuscript received on January 15, 2021. | Manuscript published on January 30, 2021. | PP: 154-158 | Volume-9 Issue-5, January 2021. | Retrieval Number: 100.1/ijrte.E5238019521 | DOI: 10.35940/ijrte.E5238.019521
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The performance of our computer is vital in fulfilling the task of the user. The paper presents a solution for maintaining the performance of the computer specifically computers with Windows operating systems. In this article, the fundamental difference and problem of the Windows operating system are defined which roots in the architectural design of using single configuration storage. The security hole of windows authentication, the exploitation of Microsoft EFS, and the acquisition of password hashes from Microsoft SAM are also discussed. Various existing utility software is evaluated to investigate if they meet the user define criteria. This paper also proposes a user-level implementation of the AES 256 encryption algorithm for securing user files and a Network Blocking algorithm based on ARP Spoofing techniques that provide a user-level network monitoring capability. The proposed application is called “Giddy-ION Reloaded” which consists of four main modules; machine information acquisition and monitoring, machine optimization, machine cleaning, and tools module that is divided into submodule; encryption and decryption, network monitoring, desktop management, network optimization/ control, and task automation. The testing was conducted with the participants coming from a computer college, continuing education trainer/faculty, and various IT experts. The response from these groups was statistically treated and analyzed, where the Giddy ION rank top and shows promising results. The study is limited to windows machines with 64-bit support architecture. The developed application is ready for implementation and deployment as evidenced by its high overall performance rating as evaluated by the participants against the ISO 25010 standards. 
Keywords: About four key words or phrases in alphabetical order, separated by commas.