Comptia A+ 1001 (Core 1), Comptia A+ 1002 (Core 2)

Ace your homework & exams now with Quizwiz!

Retrieving Email on Mobile devices (Post Office Protocol 3 (POP3))

-Most commonly used protocol -Used for downloading mail to local mail client -Downloads and (optionally) deletes from server -Downloading and deleting from server makes sense if only 1 device is used -Configuration information needed is name of POP3 Server and Username+Password *Network ports* -Defined by your mail provider -POP3 : TCP/110 -SSL (Secure Socket Layer) settings - POP3S : TCP/995

Serial Attached SCSI (SAS)

-Move from Parallel to Serial -Increased throughput -Point-to-Point connection (no more daisy chains) -No termination required (bus has 2 devices on it) -Same control and management as SCSI protocol, but on a high speed serial connection

Compliance (Documentation Best Practices)

-Must meet the standards of laws, policies, and regulations -A healthy catalog of rules • Across many aspects of business and life • Many are industry-specific or situational -Penalties can be imposed on organizations that dont follow these laws, such as: • Fines • Loss of employment • Incarceration -Scope of regulations • Some regulations can be specific to a region or a country • Some regulations can be worldwide • Understand the exact scope of the regulations and how they apply to your organization

CMOS Battery

-Not needed for today's flash-based storage -Maintains old BIOS configs -May only be used to maintain Date/Time -Bad battery will require a BIOS config or Date/Time config on ever boot -Can reset BIOS config by removing the battery on older systems (including passwords for supervisor access) -Newer mobo's have a jumper

Managing SOHO QoS (Quality of Service)

-Not supported by all routers -Prioritize as needed -Voice is high, WoW is low (or vice versa) -High-end SOHO routers allow you to prioritize applications, ports, or MAC addresses -Be careful when making changes to QoS (you could accidentally cause applications to slow down)

IPv4 Socket

- Server IP address, protocol, server application port number. -Client IP address, protocol, client port number.

USB 2.0

-480 megabits per second -5 meters

PCIe v2.x

-500 MB/s of throughput per lane in each direction

Off-Site Email Applications

-A challenge to maintain -Need to purchase your own servers and storage -A support team will need to be trained to manage the servers -Ongoing backup and maintenance required

User Datagram Protocol (UDP)

-A connection-less protocol -No formal process when starting or ending the connection -Unreliable for of delivery -No error recovery -No reordering of data or retransmissions -No Flow Control -Sender determines amount of data transmitted -No ACK needed

Virtualization characteristics

-A native OS -Performs native OS processes -Identical to using a non-virtual system

SNMP v3

-A secure standard -Message integrity -Authentication method -Encryption

Zero Insertion Force (ZIF) socket

-A socket full of holes that matches the CPU -Contains a small lever that helps install the CPU without any pressure

SO-DIMM (small outline DIMM)

-About half the width of DIMM -Available in DDR2, DDR3, DDR4 SDRAM -Used in Laptop and Mobile devices

Domain Services

-Active Directory Domain Services • Large database of your network • Contains info. on users, computers, and the systems they connect to. -Distributed architecture • Many servers • Not suitable for home use -Everything documented/managed in one place • User accounts, servers, volumes, printers -Many different uses such as authentication • Can be managed from a centralized location

Motherboard PATA Interface

-Actually has 39 pins (1 pin removed to plug cable one particular way)

Private Cloud Deployment Model

-All hardware is self own -Your own virtualized local data center -All cloud-based services will be virtualized in an environment control by you

Wireless encryption (Securing SOHO Network)

-All wireless computers are radio transmitters and receivers • Anyone can listen in -Solution: Encrypt the data • Everyone gets the password -Only people with the password can transmit and listen • WPA2 encryption

Rainbow tables

-An optimized, pre-built set of hashes • Doesn't need to contain every hash • The calculations have already been done -Remarkable speed increase • Especially with longer password lengths -Need different tables for different hashing methods • Windows passwords are stored differently than MySQL passwords • Different applications store passwords in different ways -Rainbow tables won't work with salted hashes • A salted hash adds an additional random value to the original hash

Computer Speakers

-Analog output devices -Connected via TRS (Tip/Ring/Sleeve) jacks -option available to connect via speaker output or audio adapter

Repair application (Troubleshooting Solutions)

-Application issues • Problems with the application files or its configurations -Each application might have its own repair process • To fix missing files • To replace corrupted files • Can fix application shortcuts • Can repair registry entries • Or just update or reconfigure drivers -Not all applications have a repair option

How Port numbers are used by TCP/UDP

-Can be any number between 0 and 65,535 -Most servers (services) use non-ephemeral (not- temporary) port numbers -Some servers (services) might use a port outside of the non-ephemeral range to indicate where the data needs to be delivered. (perfectly fine) -They are used for communication, not security -Service port numbers need to be "well known" -TCP port numbers are not the same as UDP port numbers (TCP 80 will not communicate with UDP 80)

SOHO End-User Device Configuration

-Can be configured automatically -Auto speed and Duplex -DHCP Addressing -IP Address, Subnet Mask, Default Gateway, DNS Servers are all populated on the devices based on the router configurations

The Run line

-Can start an application as a command • Instead of the graphical interface -Can use the run/search or command prompt • Options can be specified as part of the command

Driver Installation

-Check web for latest version -Uninstall existing drivers through Windows Device Manager -Mfr. provide their own driver installation software -Check device manager to confirm device status

Wireless security modes

-Configure the authentication on your wireless access point / wireless router -Open System wireless configuration • No authentication password is required Home wireless configuration: -WPA2-Personal / WPA2-PSK • WPA2 with a pre-shared key • Everyone uses the same 256-bit key Business/Company wireless configuration: -WPA2-Enterprise / WPA2-802.1X • Authenticates users individually with an authentication server (i.e., RADIUS, TACACS+) • It adds additional factors such as disable/enabling user accounts or not having to manage other WiFi passphrases

Trust/untrusted software sources (Logical Security)

-Consider the source • May not have access to the source code • Even then, may not have the time to audit (do you trust the person providing the software?) -Trusted sources • Internal applications (In-House developers) • Well-known publishers • Digitally-signed applications -Untrusted sources • Applications from third-party sites • Links from an email • Pop-up/drive-by downloads when visiting a website

Alternating Current (AC; ∿)

-Constantly reversing direction as it flows through electrical lines -Efficiently distributes electricity over long distances -Frequency of cycle is important: •In US/Canada it is common to see 110-120 volts of AC (VAC) with a frequency of change at 60 hertz (Hz) •In Europe it is common to see 220-240 VAC with a frequency of change at 50 hertz (Hz)

Data types that are synced on Mobile devices

-Contacts -Applications -Email -Pictures, Music, Video -Calendar -Bookmarks -Documents -Location Data -Social Media Data -eBooks -Passwords -All the above are shared on different mobile devices

Batch files (Scripting)

-Contains a ".bat" file extension • Scripting for Windows at the command line • Legacy goes back to DOS and OS/2

Portable LCD (Liquid Crystal Display)

-Contains a backlight that shines through liquid crystals and color filters and other components to show you an image --Advantages -Lightweight -Relatively lower power and inexpensive --Disadvantages -Black levels are a challenge -Requires a separate backlight (Flourescent, LED, etc...) -Difficult to replace

Example of how Internet Protocol (IP)

-Contains an Ethernet header, payload, trailer (in that order) -Inside Ethernet payload contains an IP header and its own IP payload -Inside IP payload contains TCP header and its own TCP payload -Inside of the TCP payload is the application information

Small Office/Home Office (SOHO)

-Contains multi-function devices (printer, scanner, fax, Network connectivity, phone line connection, and prints from the web) -Small number of employees

General tab

-Controls the startup process • Normal, Diagnostic, Selective -Normal startup • Nothing to see here, go about your business -Diagnostic startup • Similar to Safe Mode, but not quite the same -Selective startup • You decide what to load

Unintended Bluetooth pairing (Troubleshooting Mobile Device Security)

-Do not connect with a device that isn't yours • This isn't a good idea -Remove the Bluetooth device • You will need to re-pair to access again -Disable Bluetooth radio to prevent any data is being sent • No Bluetooth communication at all -Run an anti-malware scan if possible • Make sure there are no malicious apps

Land Grid Array (LGA)

-Does not contain any pins -CPU is completely flat -All pins are located on the motherboard CPU socket -Possible damage to the CPU socket if objects are dropped onto it (pins can bend)

Be on time and avoid distractions (Professionalism)

-Don't allow interruptions • No personal calls, no texting, no Twitter • Don't talk to co-workers -Apologize for delays and unintended distractions -Create an environment for conversation -In person • Be open and inviting • Candy bowl can be magical -On the phone • Quiet background, clear audio • Stay off the speakerphone

Vendor-specific limitations

-End-of-life • Different companies set their own EOL policies -Software Updates • iOS, Android, and Windows 10 check and prompt for updates • Chrome OS will update automatically -Compatibility between OS's • Some movies and music can be shared -Almost no direct application compatibility • Fortunately, many apps have been built to run on different OS's • Some data files can be moved across systems • Web-based apps have potential

Wired connections

-Ethernet cable • Direct connection -Fastest connection is the default determined by Windows • Ethernet, Wireless, WWAN -Alternate configurations when DHCP isn't available in Windows • Located in "Local Area Connection Properties" window > TCP/IPv4 Properties > Alternate Configuration tab

Solid State Hybrid-Drive (SSHD)

-Flash memory and hard drive storage -Contains spinning components from a hard drive and components from SSD -Data is cached to the SSD and then written to the hard drive

Managing Group Policy

-Group Policy • Manage computers in an Active Directory Domain • Group Policy is usually updated at login -gpupdate • Forces a Group Policy update • gpupdate /target:{computer|user} /force • gpupdate /target:professor /force -gpresult • Verify policy settings for a computer or user • gpresult /r -- generic command • gpresult /user sgc/professor /v -- a more specific comand for gpresult

System requirements for application installs

-Hard Drive space • Initial installation space required • Space required for application use • Some applications use a LOT of drive space after installation -RAM • This would be above and beyond the OS requirements • Very dependent on the application • Consider all of the other running applications -OS compatibility • Operating system (Windows, Mac OS, Linux) • Version of the OS

App issues (Troubleshooting Mobile Apps)

-If apps are not loading or performance is slow -Restart the phone - Hold power button, power off -Stop the app and restart • In iPhone: Double-tap home button, slide app up • In Android: Settings/Apps, select app, Force stop -Also update the app - Get the latest version

M.2 B key

-If the drive is connecting to a device that supports a B key, then it will use 2 lanes of the PCI Express bus (PCIe x2 at a maximum)

Non-responsive touchscreen (Troubleshooting Mobile Apps)

-If touchscreen completely black or touchscreen not responding to input • Buttons and screen presses do not register -Restart the Apple iOS device • Hold power button, slide to power off, press power button (soft reset) • Hold down power button and Home button for 10 seconds (hard reset) -Restart the Android device • Remove battery, put back in, power on • Hold down power and volume down until restart • Some phones have different key combinations • Some phones DO NOT HAVE a key-based reset

Wireless/Cellular Data Network

-Internet connectivity is available on your phone -This connection/service is provided by mobile carrier service

Laptop LCD (Liquid Crystal Display)

-Light and High-Resolution -Very fragile (a good case is needed to protect) -Resolutions are fixed (cannot buy a larger screen or change resolutions inside the laptop) -changes to native resolution with look blurry and not crisp -Use native resolution to have best possible viewing on the screen

Limited connectivity (Troubleshooting Windows)

-Limited or no connectivity: The connection has limited or no connectivity. You might be unable to access the Internet or some network resources. The connection is limited -Check Local issues • Wireless signal might be weak or might be a disconnected cable • Check IP address configuration • Reboot -External issues • Wireless router rebooted/turned off • Ping your default gateway and external IP

Network adapter properties

-Link speed and duplex • Auto negotiation doesn't always negotiate • Both sides must match -Wake on LAN • Computer sleeps until needed • Useful for late-night software updates

ls (Linux Command)

-Lists directory contents • Similar to the dir command in Windows -Lists files, directories • May support color coding; Blue is a directory, red is an archive file, etc. -For long output, pipe through more: • > ls -l | more (use q or Ctrl-c to exit)

Internal operating procedures (Documentation Best Practices)

-Many Organizations have different business objectives • Different processes and procedures -Different operational procedures • Different requirements for downtime notifications • Different way of handling facilities issues -Software upgrades • Different ways of testing new version of software • Different ways of rolling out software with change control -Documentation is the key • Everyone can review and understand the policies with centralized documentation

Component Services

-Microsoft COM+ • Component Object Model -Distributed applications • Designed for the enterprise -Manage COM+ apps • Device COM+ Management • Event Viewer • Services -Located in Control Panel under Administrative Tools

WiFi Antennas

-The wires wrap around the laptop screen at the highest point -Contains a main, aux, and bluetooth connection

TCP and UDP

-Transported inside of IP (encapsulated by the IP Protocol) -Two ways to move data (different features for different applications) -Referred to OSI Layer 4 (Transport Layer) -Multiplexing allows you to use many different applications at the same time

Non-ephemeral ports

-Permanent port numbers -Ports 0 through 1,023 -Usually on a server or service

Spoofing

-Pretends to be something you aren't • A Fake web server or a fake DNS server, etc. -Email address spoofing • The sending address of an email isn't really the sender -Caller ID spoofing • The incoming call information is completely fake -Man-in-the-middle attacks • The person in the middle of the conversation pretends to be both endpoints

DVD-R/RW (DVD Read and ReWritable)

-Single Layer writable

Removing Dubris for Thermal Printers

-Small amount of paper or dust -Contains no toner -Blow it out with compressed air (outdoor) -Wipe with a damp cloth (indoor) -Avoid using vacuum cleaner (unless if its designed for computers)

Micro SD card

-Smaller than Mini-SD Card

Mini-SD Card

-Smaller than SD Card

Micro-ATX form factor

-Smaller than Standard ATX -Limited expansion slots -Backward compatibility (similar mounting points and power)

Print Head Cleaning

-Some printers have an automatic daily cleaning process -cleaning process can be started manually (takes a few minutes) -some components can be removed to be cleaned manually -The clogged component requires cleaning

CPU Cache

-Super fast memory -Holds data, instructions, and/or results -Temporary holding space for the transactions going thru the processor

Don't minimize problems (Professionalism)

-Technical issues can be traumatic • Often when money and/or jobs on the line -Even the smallest problems can seem huge • Especially when things aren't working -Be part technician, part counselor • Computers don't have problems • People have problems

Difficult situations (Professionalism)

-Technical problems can be stressful -Don't argue or be defensive • Don't dismiss • Don't contradict -Diffuse a difficult situation with listening and questions • Relationship-building • User might just want to vent (just listen) -Communicate • Even if there's no update -Never take the situation to social media

Telnet (Remote Access Technologies)

-Telnet - Telecommunication Network - tcp/23 -Login to devices remotely • Console access -Unencrypted communication • Not the best choice for production systems

Unmanaged Switches

-Very few configuration options (Plug & Play) -No VLANs (fixed configuration) -Very little integration with other devices -No management protocols -Low price point (simple is less expensive)

VPN Concentrator (Logical Security)

-Virtual Private Network • can encrypt (private) data traversing a public network -Concentrator (a hardware device) • designed to Encrypt/decrypt access from any device at a remote location -Many deployment options • Specialized cryptographic hardware • Software-based options available -Used with 3rd party client software or sometimes built into the OS

vi (Linux Command)

-Visual mode editor • Full screen editing with copy, paste, and more -vi FILE • "> vi script.sh" starts the editor for the file script.sh -To insert text • Enter "i" and then <text> • Exit insert mode with Esc -Save (write) the file and quit vi • ":wq" command

SOHO IP Adressing

-WAN Interface is assigned through DHCP from ISP -May require authentication -LAN Interface assign internal IP and subnet mask -Provides IP's through DHCP -DNS IP(s) are obtained by the WAN DHCP

WPA2 and CCMP

-WPA2 certification began in 2004 • AES (Advanced Encryption Standard) replaced RC4 • CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) replaced TKIP -CCMP block cipher mode • Uses AES for data confidentiality • 128-bit key and a 128-bit block size • Requires additional computing resources -CCMP security services • Data confidentiality (AES), includes authentication, and access control

Ransomware

-Where the bad guys want your money • They'll take (lock) your computer in the meantime -May be a fake ransom such as: • your computer is locked "by the police" -The ransom may be avoided by a security professional who may be able to remove these kinds of malware

Users Tab

-Who is connected? What are they doing? -Provides a User list Windows 7 which allows you to: • Disconnect • Logoff • Send message -In Windows 8/8.1/10, Users tab provides: • Separate processes for each user • Performance statistics for each user

RJ45 printer connector (wired device sharing)

-allows you to connect the printer to the wired network

Motherboard Jumpers

-contains jumpers for pwr, hdd, etc... -connects from pc case to the motherboard -allows connection to interfaces at the front of the case, such as Power LED, HDD LED, Reset SW, etc..

File management

-dir • Lists files and directories in cmd prompt -cd • Change working directory in cmd prompt • Include the backslash (\) to specify volume or folder name -.. • Two dots/periods in cmd prompt (e.g. cd..) takes you back up one folder level

+12V

-provides power to large components such as PCIe adapters, hard drive motors, cooling fans, most modern components

+5V

-provides power to some mobo components -Many components have shifted to +3.3V

Blu-ray disc

-25 GB for single-layer -50 GB for dual-layer

RJ11 Connector

-6 position, 2 conductor connectors (6P2C) -6 wires available, only 2 are used -used for modems or telephones -Interchangeable with RJ14

SATA Revision 3.0

-6.0 Gbit/s -Max cable size : 1 meter

Burners

-A device that is used to read and create make CD and DVDs -Information is written to the CD/DVD by darkening the photosensitive dye

Parity Memory

-Additional parity bit -Can't correct an error -Wont always detect an error

Laptop Trackpoint

-Another method to move the cursor -Requires a push to move the cursor

Time Machine backups (Mac OS Tools)

-Automatically does backups and easy to use • Familiar Finder UI -Dates along the right side to locate the correct date • Files in the middle -Mac OS takes snapshots if the Time Machine storage isn't available • You can restore from the snapshot

Windows BitLocker disk encryption

-BIOS integrated with TPM

Windows Firewall configuration

-Can block all incoming connections • Ignores your exception list • Useful when you security is needed -Modify notification - App blocking

Level 1 Cache (L1 cache)

-Closest to the processor -Provides the first storage of data (first check)

Mouse

-Connected via USB or an adapter for PS/2 -Few moving parts -Needs the right surface -Glass may cause problem

Laptop System Boards

-Different models have different sizes -All proprietary (built to fit that laptop model) -Replacement isn't easy -Any issues with a specific component on the mobo will require the whole component to be replaced

2. Quarantine infected systems (Removing Malware)

-Disconnect from the network • Keep it contained -Isolate/remove all removable media • Everything should be contained -Prevent the spread • Don't transfer files, don't try to backup • That ship has sailed

DVD-R DL, DVD+R DL

-Dual Layer writable

Format command

-Formats a disk for use with Windows • format c: • BE CAREFUL - YOU CAN LOSE DATA

International Mobile Subscriber Line (IMSI)

-Identifies the user of a mobile network -Associated to the user (not the mobile device) -Can be provisioned to the sim card -Sim cards can be swapped to different phones and still maintain access to the wireless provider

Short battery life (Troubleshooting Mobile Apps)

-If you get bad reception tends to decrease battery life • Device is always searching for signal • Acts as airplane mode on the ground -Disable unnecessary features • 802.11 wireless, Bluetooth, GPS -Check application battery usage • iPhone: Settings/General/Usage • Android: Settings/Battery -Might be an aging battery - There's only so many recharges

How TCP/UDP is delivered

-Internet Protocol sends data from one IP address to another IP address -Data arrives at the IP address which contains the port number that indicates where the data is headed.

24-pin Motherboard power

-Main mobo power -Provides +3.3V, ±5V, and ±12V -Can still connect to a 20pin mobo connector (some cables are 20-pin + 4-pin)

Disk Management

-Manages disk or volumes in windows • Individual computers and file servers -Computer Management is located in Control Panel under Administrative Tools then Storage and Disk Management -WARNING- Data can be erased and unrecoverable

Category 5e (enhanced)

-Max Supported Ethernet Standard - 100BASE-TX, 1000BASE-T -Max Supported Distance - 100 meters

OLED (Organic Light Emitting Diode) on Laptops

-Organic compound that emits light when receiving an electric current -Thinner and lighter -Flexible and mobile (no glass needed) -No backlight (organic compound provides the light) -Good representation of the color black -Not ready for laptops -Organic materials decay over time -Decayed images can remain on the screen -More costly and power hungry than an LCD

BIOS built-in diagnostics

-Part of the BIOS (always available) -Runs from BIOS menu (no additional media or software required) -Focused on hardware checks -Does not touch the OS -Can gather statistics (CPU/Memory information)

Bluetooth (Mobile Device Connectivity)

-Personal Area Network (PAN) -Short range (about 10 meters) -Can connect different devices (mouse, keyboards, headsets, speakers) -Needs to be pair (connections are remembered)

Magnetic / Chip Reader

-Point of sale terminal -Uses integrated circuit (insert card into reader) -Strip reader (swipe card) -connected via USB if associated to POS terminal

Quick format vs. full format

-Quick format • Creates a new file table • Looks like data is erased, but it's not • No additional checks -Quick format in Windows 7, 8/8.1, and 10 • Use diskpart for a full format within windows 7, 8/8.1/10 -Full format • Writes zeros to the whole disk • Your data is unrecoverable • Checks the disk for bad sectors which is time consuming

Impact Printer Ribbon Replacement

-Self-contained -One long circle (rotates many times in its lifetime) -Replace when ink becomes too light -Designed to be modular (replaceable in less than 1 min.) -Printer specific

Mini-ITX form factor

-Smaller than MicroATX -A series of low-power mb's -Screw compatible with ATX and MicroATX -Single use computing (i.e., streaming media)

Fan Specifications

-Standard Sizes (80mm, 120mm, 200mm) -Different speeds (Variable Speeds) -Different noise levels (not all fans sound the same)

Syncing Android Mobile devices

-Syncs online with Google -Can use 3rd party apps like doubleTwist to transfer movies and music to and from the android device

Apple Filing Protocol (AFP)

-TCP 548 -File services in MacOS -Work with SLP (service location protocol) -Full feature file management (copy, move, delete, rename files, etc.)

Windows 7 Home Premium

-The consumer edition; contains: • DVD playback • Windows Aero • Internet Connection Sharing • IIS Web Server -Does not support enterprise technologies • Cannot join a domain • No BitLocker support • No EFS (Encrypting File System) support -x86 version supports 4gb RAM -x64 version supports 16gb RAM and 2 processors

Disk maintenance (Linux tools)

-Linux doesn't require a lot of maintenance • You probably already know this -Clean up log space • All logs are stored in /var/log -File system check • Done automatically every X number of reboots • to Force file system check after reboot, add a file to the root : sudo touch /forcefsck

Laptop GPS

-Listens to GPS signals on the wireless antennas -Enabling/Disabling airplane mode would also enable/disable the GPS functionality

services.msc

-Located in Control Panel under Administrative Tools as Services • Can also open through the cmd line or Run cmd -Useful when troubleshooting the startup process -Control background applications -Services can reveal dependencies between applications

Laptop Touchpad

-Located underneath the keyboard -Contains left and right buttons similar to a mouse -Requires a finger slide to move the cursor

Replacing toner cartridge

-Look for messages (low doesnt mean empty) -Toner can contain the OPC (Organic PhotoConductor) drum; It is sensitive to light, keep in the bag -Power off printer (safety first) -Remove packing strips

Disk formatting

-Low-level formatting • Done at the factory • Not performed by the user -Standard formatting / Quick format • Sets up the file system, installs a boot sector • Clears the master file table but not the data • Can be recovered with the right software -Standard formatting / Regular format • Overwrites every sector with zeros • Available in Windows Vista and later • Can't recover the data

Sync Center

-Make files available, even when you're not online • Automatically syncs when back online • Contains built-in sync conflict management -Not available in Home editions • Needs offline file functionality • Only available in Pro and higher -Mark files "Always available offline" to use this capability

Local government regulations (Safety Procedures)

-Make sure you are compliant with health and safety laws • These vary widely depending on your location • Keep the workplace hazard-free -Building codes is an example • Need to make sure you are compliant with fire prevention • Need to make sure you are compliant with electrical codes -Follow the environmental regulations to dispose of high-tech waste safely

Password complexity and length

-Make your password strong • No single words • No obvious passwords (What's the name of your dog?) • Mix upper and lower case • Use special characters (don't replace a "o" with a "0", a "t" with a "7") -A strong password is at least 8 characters • Consider a phrase or set of words -Set password expiration, requires change • System will remember its password history which will require a unique password(s)

mkdir

-Makes a directory • Create a folder for file storage -mkdir DIRECTORY • To create a directory called "notes", you use the command "> mkdir notes"

Disk Utility (Mac OS Tools)

-Manages disks and images • Used to resolve issues -File system utilities • Verify and repair file systems • Modify partition details • Erase disks -Can Manage RAID arrays • Restore a disk image to a volume -Create, convert, and restore images • Manage the image structure

802.11 a/b/g/n/ac printer connectivity (Wireless Device Sharing)

-Many devices using an access point -known as infrastructure mode

Pin Grid Array (PGA)

-Many pins that are underneath the CPU -CPU socket matches the pins on the CPU -Plugs into a ZIF socket -Possible damage to the CPU if not inserted correctly

Laptop Touchscreen

-Merges a laptop and tablet input -No keyboard required (but still available) -Many options for input (choose either)

Security considerations (Remote Access Technologies)

-Microsoft Remote Desktop • An open port tcp/3389 is a big tell • Brute force attack is common -Third-party remote desktops • Often secured with just a username and password • There's a LOT of username/password re-use -Once you're in, you're in • The desktop is all yours • Easy to jump to other systems • Personal information, bank details can be obtained • Make purchases from the user's browser

mstsc.exe

-Microsoft Terminal Services Client • Remote Desktop Connection • Can also open through the cmd line or Run cmd -Access a desktop on another computer • Or connect to a Terminal Server -Common for management on servers without a keyboard or monitor connected to them • "Headless" servers - Located under C:\Windows\System32 • Can also open through the cmd line or Run cmd

Windows on a mobile device

-Microsoft Windows 10 • Fully-featured tablets -Many different manufacturers • Touchscreen computer • Keyboards • Pen stylus -Windows Mobile • No longer in active development • No support after December 2019

App log errors (Troubleshooting Mobile Apps)

-Most log information is hidden • You'll need developer tools to view it -Contains a wealth of information • If you can decipher it • This might take a bit of research -To view these logs • For iOS, you can use Xcode • For Android, you can use Logcat

Display Devices

-Most popular output device -Many different connections (different standards through the years) -Different sizes and resolutions

Defragmentation (Troubleshooting Solutions)

-Moves file fragments so they are contiguous • So they can share a common border • Improves read and write time • Only applicable to spinning hard drives -Graphical version located in the drive properties • Type "defrag" at the command line to show options -Already added to the weekly schedule • Control Panel / Administrative Tools / Task Scheduler

Step 5 : Transferring

-Moves the toner from the photosensitive drum to the paper

Hub

-Multi-port repeater -Traffic going into one port is repeated to every other port -Everything is half-duplex (2 devices cannot communicate at the same time) -Becomes less efficient more devices begin to communicate -Only operates in 10 megabit/sec or 100 megabit/sec -This technology is difficult to find

Smart cards (Logical Security)

-Must have physical card to provide digital access • A digital certificate -Can contain multiple factors • A card with PIN or fingerprint

Directory permissions (Logical Security)

-NTFS permissions • Much more granular than FAT • Owner of a file can lock down access • Prevents accidental modification or deletion • Some information shouldn't be seen -User permissions • Everyone isn't an Administrator • Can assign proper rights and permissions • This may be an involved audits ran by security administrators

DRAM (Dynamic Random Access Memory)

-Needs constant refreshing (data disappears if its not refreshed) -Random Access (can access any storage location directly)(unlike magnetic tape were you cannot)

netstat

-Network statistics • Utility available on many different operating systems -netstat -a • Shows all active connections -netstat -b • Shows binaries (Windows) that may be sending/receiving information • Requires elevation -netstat -n • Does not resolve DNS names

Backout plan (Change Management)

-Never believe the change will work perfectly and nothing will ever go bad • Prepare for the worse -Always have a way to revert your changes • Prepare for the worst, hope for the best -This isn't as easy as it sounds • Some changes are difficult to revert • Always have a backup plan AND always have backups

802.11 Ad hoc mode printer connectivity (Wireless Device Sharing)

-No access point is used -direct link between wireless devices -Additional config. settings will need to be turned on to use without an access point

UTP (Unshielded Twisted Pair)

-No additional shielding -The most common twisted pair cabling

Thermal Printer Heating Element

-No moving print head -Only parts are heated during printing -Paper is covered by the full length of the component

Virtual Printers

-No physical output -Output is digital -No hardware required (no printer, ink, toner, paper) -Useful for sending electronically (email, save to hard drive, or send through the network)

Internal Cloud (shared resources)

-No resources are shared -Need to build your own cloud (need to purchase hardware and networking structure) -Upfront costs -No ongoing costs once purchased (except cooling and power)

Hard Disk Drive (HDD)

-Non-volatile magnetic storage -Rapidly rotating platters -Random-Access (retrieves data from any part of drive at anytime) -Moving parts (spinning platters, moving actuator arm) -Mechanical components limit access speed -Mechanical components can also break

Solid State Drive (SSD)

-Non-volatile memory -No Moving parts (very fast) -Fast performance -No spinning drive relays -Size for both desktop and laptops - 2.5'' -SATA interface

Wireless Access Point (WAP)

-Not a wireless router -A bridge connection device -Extends the wired network onto the wireless network -Makes forwarding decisions based on MAC address

Surge suppressor (Environmental Impacts)

-Not all power is "clean" • Self-inflicted power spikes and noise • Storms, power grid changes -Spikes are diverted to ground -Noise filters remove line noise • Decibel (Db) levels at a specified frequency • Higher Db is better

Surge suppressor (Disaster Recovery)

-Not all power is "clean" from the main power • Self-inflicted power spikes and noise • Storms, power grid changes -Diverts spikes to the ground -Contains noise filters to remove line noise • Decibel (Db) levels at a specified frequency • Higher Db is better

Flavors of traceroute

-Not all traceroutes are the same • Minor differences in the transmitted payload -Windows commonly sends ICMP echo requests • Receives ICMP time exceeded messages • And an ICMP echo reply from the final/destination device • Unfortunately, outgoing ICMP is commonly filtered -Some operating systems allow you to specify the protocol used • Linux, Unix, Mac OS, etc. -IOS devices send UDP datagrams over port 33434 • The port number can be changed with extended options

Privileges

-Not all users can run all commands • Some tasks are for the administrator only -Standard privileges • Run applications as normal user • This works fine for many commands -Administrative/elevated privileges • You must be a member of the Administrators group • Right-click Command Prompt, choose "Run as Administrator" • OR by searching for cmd.exe, then pressing "Ctrl+Shift+Enter" to run as Administrator

Image recovery (Linux tools)

-Not as many options as Windows • But still some good ones available -dd is built-in to Linux • Can convert and copy a file • Can backup and restore a partition • Very powerful -Other 3rd-party utilities can image drives • GNU Parted and Clonezilla are two examples

Impact Printer Paper Replacement

-Not easy as a laser printer -Paper must be feed with a tractor feed -forms must be positioned perfectly (text needs to fit predefined space); Run test sheets to align -Paper is continuously fed (one long sheet of paper) -Must flow freely (make sure nothing is in the way)

ODBC Data Sources

-ODBC - Open Database Connectivity -Application independence • Database and OS doesn't matter -Configure in Control Panel / Administrative Tools • Users probably won't need this -Located in Control Panel under Administrative Tools

Setting expectations (Communication)

-Offer different options • Repair • Replace • Let the user make the decision -Document everything • Leave no room for questions • Useful when different scenarios are expected -Keep everyone informed • Even if the status is unchanged -Follow up afterwards • Verify satisfaction

Hyper-Threading Technology (HTT)

-One CPU acts like two -Does not work as fast as two (15% to 30% performance improvement) -OS must support it (Windows XP and later) -any modern OS

Virtualization

-One computer, many OS's (Mac OS X, Win 7, Linux Ubuntu, all at the same time) -Each VM has its own set of resources (its own CPU, RAM, Storage, network, etc...) working independently of each other -Host-based virtualization runs one OS as your normal desktop and running other OS on top of that desktop -Enterprise-Level virtualization is common to run one server with many VM's running inside of it -Been around since 1967 (IBM Mainframe Virtualization)

RADIUS (Remote Authentication Dial-in User Service)

-One of the more common AAA (Authenticaion, Authorization, Accounting) protocols • Supported on a wide variety of platforms and devices • Not just for dial-in -Centralizes authentication for users on a single server • Routers, switches, firewalls communicate and authenticate to the AAA server using the Radius protocol • Server authentication • Remote VPN access • Commonly seen on 802.1X network access -RADIUS services available on almost any server operating system

Sound Applet

-Output options • Multiple sound devices may be available -Set input/output levels for speakers and microphone

Augmented Reality (AR)

-Overlays a virtual augmentation with the physical world -The computer provides the additional detail -Can be used in the Medical field, Travel, Gaming.

Integrated GPU (Graphics Processing Unit)

-Part of the video adapter, mobo or CPU (built into CPU) -This is good for basic computing -Separate video card is needed if gaming, editing video, rendering graphics.

BIOS password / User password

-Password is needed to start the OS -System/OS wont load

Mobile Device Credit Card Readers

-Phone or Tablet becomes a point of sale terminal -Connection is made through audio/mic TRRS jack, lightning connector, or Bluetooth -Great for small and mobile businesses -Uses the internet connection for approval (immediate feedback) -Has additional features such as emailing receipts or signing with your finger

Laptop Wireless Control

-Physical switch or FN Key to enable or disable connectivity -May be a switch that turns off 802.11, Bluetooth and cellular -May have the ability to specify which connection to disable/enable

Laptop Frames

-Plastic -lightweight and mobile, but durable and difficult to break -inexpensive but cost-effective -Metal -More durable than plastic -Can be more difficult to replace

Riser Card

-Plugs in vertically in the motherboard -cards are plug in vertically to the motherboard -one example where the card is used is in data center servers

Policies and best practices (Privacy, Licensing, and Policies)

-Policies • These are general IT guidelines • Determines how technology should be used • Provides processes for handling important technology decisions -Security best practices • Some security techniques are accepted standards within the industry • Covers both processes and technologies • For example: You need a firewall. Use WPA2. Use strong passwords • Create steps to follow if there's a breach

WARNING (Safety Procedures)

-Power is dangerous -Remove all power sources before working -Never touch ANYTHING if you aren't sure -Replace entire power supply units • Never repair internal components -The devices contain a high voltage • Power supplies, displays, laser printers, etc...

PoE Switches

-Power over Ethernet -Commonly marked on the device

Power over Ethernet (PoE)

-Power provided on an ethernet cable -One wire for both network and electricity -Used for IP Phones, Wireless Access Points -Useful in difficult-to-power areas -Power can be provided at the switch -Built-in power provide at the switch (Endspans) -In-line power injector provides the power (Midspans)

Safe Mode -Win 7 and 8/8.1 (Troubleshooting Solutions)

-Press F8 on boot • Advanced Boot Options -Safe Mode • Only the necessary drivers to get started -Safe Mode with Networking • Includes drivers for network connectivity -Safe Mode with Command Prompt • No Windows Explorer - quick and dirty -Enable low-resolution (VGA Mode) • Recover from bad video driver installations

Port security (Logical Security)

-Prevents unauthorized users from connecting to a switch interface • Alert or disable the port -prevents access based on the source MAC address • Even if its forwarded from elsewhere -Each port has its own config • Unique rules for every interface

Quality of Service (QoS)

-Prioritize network traffic • Applications, VoIP, and Video -Infrastructure must support QoS • Differentiated Services Code Points (DSCP) field in the IP header • IPv4 - Type of Service (ToS) field • IPv6 - Traffic Class octet -Manage through Local Computer Policy or Group policy (C:\Windows\System32 > gpedit.msc) OR run > gpedit.msc • Located under Computer Configuration / Windows Settings / Policy-based QoS

Windows 7 Minimum Hardware Requirements (x64)

-Processor/CPU - 1 GHz processor -Memory - 2 GB RAM -Free disk space - 20 GB -Video - DirectX 9 graphics device with WDDM* 1.0 or higher driver *Windows Display Driver Model -Win7 64-bit

Rebuild Windows profiles (Troubleshooting Solutions)

-Profiles can become corrupted • The User Profile Service failed the logon. User Profile cannot be loaded. • User documents may be "missing" (temp. profile) -If a profile doesn't exist, it's recreated • We're going to delete the profile and force the rebuilding process -It's not as easy as copying a file • Create registry backups in case modifications are made

Virus types

-Program viruses • It's part of the application -Boot sector viruses • Exists in the boot sector • Virus is executed when the OS starts up • No OS is needed -Script viruses • e.g. Java Script • Operating system and browser-based -Macro viruses • Common in Microsoft Office

Windows (Defender) Firewall Applet

-Protect from attacks • Scans for malicious software • Helps prevent access to resources on the local pc -Integrated into the operating system - Located in Control Panel under Windows (Defender) Firewall

Unable to decrypt email (Troubleshooting Mobile Apps)

-Protects your email with encrypted communication channels -This is built-in to corporate email systems • Microsoft Outlook • Each user has a private key on their mobile device • You can't decrypt without the key -System administrators will use Mobile Device Manager (MDM) to install individual private keys on every mobile device

Authenticator apps (Mobile Devices)

-Pseudo-random token generators • A useful authentication factor -Use to carry around physical token devices -You're carrying your phone around • And it's pretty powerful which can have the app installed • Don't need to carry around physical hardware

Case Fans

-Pulls cool air through the front -Warm air exits through the back -Good cable management for good air flow -Different sizes, styles, and volume levels

BIOS Component Information

-RAM (view and configure memory settings) -Hard drive / SSD (drive settings, Boot order) -Optical drive (allows you to enable/disable) -CPU information (type and settings)

Before Upgrading BIOS...

-Read the documentation (release notes) -Some updates are bland -Others are full of new features -Check OS prerequisites -Locate a reliable power source (laptop connected to AC power)

Disposal procedures (Environmental Impacts)

-Read your Material Safety Data Sheets (MSDS) to know how/where to dispose of computer equipment • Mandated by United States Department of Labor and/or Occupational Safety and Health Administration (OSHA) • http://www.osha.gov, Index page -This provides information for all hazardous chemicals • Batteries, display devices / CRTs, chemical solvents and cans, toner and ink cartridges -Sometimes abbreviated as Safety Data Sheet (SDS) • Might have a different name depending on what country you are in

CD-ROM (compact disc read-only memory)

-Read-only compact storage disc for audio or video data -CD-ROMs are read by using CD-ROM drives and optical drives with backward compatibility, such as DVD and Blu-ray Disc drives. -700 Megabytes (MB) capacity

Processor Speed

-Real Speed: CPU clock (MHz or GHz) -Actual Speed is a combo of different factors such as clock speed, CPU Architecture, bus speed, bus width, L1 cache size, L2 cache size, operations system capabilities -Use a benchmark that works for you

Unauthorized location tracking (Troubleshooting Mobile Device Security)

-Real-time tracking information and historical tracking details • This should be as protected as your other data -If any suspicion an app is tracking your location, run an anti-malware scan • Malicious apps can capture many data points -Check apps with an offline app scanner • Get some insight into what's running -Perform a factory reset if tracking is occurring • Restore from a known-good backup

Repeater

-Receives a signal, regenerates, and resends -No forwarding decisions to make -Common use to extend the length of a network such as fiber or copper network -Can convert from one network media to another -Can extend wireless network reach

Windows 7 history

-Released October 22, 2009 • Mainstream support ended January 13, 2015 • Extended support until January 14, 2020 -Very similar to Windows Vista • Maintained the look and feel of Vista • Used the same hardware and software • Increased performance over Windows Vista -Updated features • Libraries • HomeGroup • Pinned taskbar

rm (Linux Command)

-Remove files or directories • Deletes the files -Does not remove directories by default • Directories must be empty to be removed or must be removed with -r option

PCI Express (PCIe)

-Replaced PCI, PCI-X and AGP -Communicates serially (Unidirectonal serial "lanes") -Slower devices does not slow down everyone (lanes are not shared) -Size of different lanes: one, two, four, eight, sixteen, or thirty-two full-duplex serial lanes -x1, x2, x4, x8, x16, x32 ("x" is pronounced "by")

Virtual Reality (VR)

-Replaces reality with a computer generated version -Input from the real world interacts with the virtual world -Can be used in different application such as : gaming, industrial design, art, enhanced video and image viewing

Desktop security

-Require a screensaver password • Integrated with login credentials • Can be administratively enforced • Automatically locks after a timeout -Disable autorun • autorun.inf in Vista (No Autorun available in Windows 7, 8/8.1, or 10) • Disabled through the registry -Consider changing AutoPlay • Get the latest security patches (updates to autorun.inf and AutoPlay)

Gaming PC

-Requires SSD's -High-end video/specialized GPU -High definition sound card -High-end cooling

Syncing Mobile devices to the Desktop

-Requires an application that will use the OS and disk space -The backup application might require minimal memory usage, but will require much storage space (to store backups, video pictures) -Might be gigabytes in size

Virtualization Workstation

-Requires max RAM (every OS needs its own memory) -Max CPU cores (constant processing, CPU needs to be efficient, most virtualization apps can use multiple cores)

Volume sizes

-Resize a volume • Right-click the volume for options • Can shrink or extend -Can split the hard drive space into 2 volumes • e.g. 120GB into 2 60GB volumes • Can Shrink a volume • Can format unallocated space -Can also create mirrored volumes -Configuration done in Disk Management

Display Applet

-Resolution options • Important for LCD monitor native resolutions -Can configure the color depth and refresh rate • Located in Control Panel > Display > Adjust Resolution > Advanced Settings > Adapter "list all modes" -In Windows 10, it is located in Settings > System > then choose the Display option • Different settings available

External Cloud (shared resources)

-Resources are shared with a public cloud -No hardware purchase -No upfront costs -There is a cost to use the cloud

Screen locks (Mobile Devices)

-Restrict access to the device •By Fingerprint through the built-in fingerprint reader •With Face Unlock through Face recognition •A swipe by choosing a pattern •With a passcode by choosing a PIN or adding complexity -After many failed attempts: • iOS will erase everything after 10 failed attempts • Android will lock the device and require a Google login

Email Configurations for Mobile Devices

-Retrieving email (uses either POP3 or IMAP protocol) -Sending email (SMTP protocol) -Corporate email (microsoft exchange) -Different process for sending and receiving emails -Integrated Providers (iCloud, Google, Exchange Online, Yahoo) -Additional steps required to configure accounts

Slow profile loads (Troubleshooting Windows)

-Roaming user profile • Your desktop follows you to any computer • Changes are synchronized -Network latency to the domain controller • Slows login script transfers • Slow to apply computer and user policies • May require many hundreds (or thousands) of LDAP queries -Client workstation picks a remote domain controller instead of local DC • Problems with local infrastructure

Virus alerts and hoaxes (Troubleshooting Security Issues)

-Rogue antivirus • May include recognizable logos and language -They may require money to "unlock" your PC • Or to "subscribe" to their service -Often requires a specific anti-malware removal utility or technique • Very difficult to remove once the virus is embedded into the system

SOHO Routing and Switching

-Routes to the outside world through DSL/WAN Port -One VLAN (LAN 1, LAN 2, LAN 3, etc..) -Routes and switches by default (not much to configure)

Windows 10 processor requirements

-Same requirements as Windows 8/8.1 -PAE (Physical Address Extension) • 32-bit processors can use more than 4 GB of physical memory -NX (NX Processor Bit) • Protects against malicious software -SSE2 (Streaming SIMD Extensions 2) • A standard processor instruction set • Used by third-party applications and drivers

sfc (System File Checker) command

-Scans the integrity of all protected system files • sfc /scannow

JavaScript (Scripting)

-Scripting inside of your browser • Contains a ".js" file extension -Adds interactivity to HTML and CSS • Used on almost every web site -JavaScript is not Java • Different developers and origins • Very different use and implementation

Shell script (Scripting)

-Scripting the Unix/Linux shell • Automate and extend the command line -Starts with a shebang or a hash-bang #! • Often has a ".sh" file extension

Guards and access lists (Physical Security)

-Security guard • Physical protection • Validates identification of existing employees • Provides guest access -ID badge • Picture, name, other details • Must be worn at all times -Access list • Physical list of names • Enforced by security guard

Laptop Speakers

-Self-contained into the laptop -Not the highest quality (very small) -Often stereo (L/R) -Larger laptop may include a subwoofer

Sending Email on Mobile devices (Simple Mail Transfer Protocol (SMTP))

-Send mail from a device to a mail server (or between mail servers) -Must be sent from a local or trusted device -Authentication usually required (may be the same or different credentials than the incoming mail) *Port Numbers* -SMTP (no authentication) : TCP/25 -SMTP with authentication : TCP/587

DVI-D Single Link

-Sends digital signals -Single link; 3.7 Gbps (HDTV at 60 fps)

Processor cores

-Separate CPU's -Can be dual, Quad, Octa, Multi or more -Each has its own cache and a shared cache

Multi-mode fiber

-Short-range communication -Up to 2 km for 100 Mbit/s -550 meters for 10 Gbit/s -Inexpensive light source (i.e. LED)

Single Data Rate (SDR)

-Single clock cycle pulls 1 bit of data

Double Data Rate (DDR)

-Single clock cycle pulls 2 bits of data

Laptop Memory

-Small Outline Dual In-line Memory Module (SO-DIMM) -Micro-Dual In-line Memory Module (Micro-DIMM) -Almost exclusively used in laptops and mobile devices -Also available in SFF desktops

Signature Pad

-Small digitizer with stylus -Connected via USB -Driver may be required

M.2 Interface

-Smaller storage device -As fast (or faster than SATA) -No SATA data or power cables -Interface is directly on the motherboard -Direct access to PCI Express bus -4 GByte/Second throughput or faster -Different types of interface (B key, M key, or B and M key) -Some drives will support both

Domain Name System (DNS)

-TCP & UDP 53 -Converts names to IP addresses -These resources are very critical in which there is usually multiple servers in production in case one goes offline

Post Office Protocol version 3 (POP3)

-TCP 110 -Receives emails from an email server (authenticate and transfer) -Basic mail transfer functionality

NetBIOS Session Service (nbsession)

-TCP 139 -connection-oriented version of nbdatagram

Secure Shell (SSH)

-TCP 22 -Encrypted communication link -Looks and acts the same as Telnet

Cable locks (Physical Security)

-Temporary security • Connect your hardware to something solid -Cable works almost anywhere • Useful when mobile -Most devices have a standard connector • contains a reinforced notch -Not designed for long-term protection • Those cables are pretty thin and can be cut

AMD (Advanced Micro Devices)

-Tends to be less expensive -CPU is geared towards value

Intel

-Tends to be more expensive -CPU is geared toward performance -Has a large portfolio of laptop options

USB-C

-The newest, and most versatile, type of USB connector. -24-pin double sided USB Connector (used for both hosts and devices)

Ampere (amp, A)

-The rate of electron flow past a point in one second -e.g. diameter of the hose

Security considerations

-There's a reason we are careful when installing applications • Applications have the same rights and permissions as the user • An unknown application can cause significant issues -Impact to device with unknown application • Application upgrade stops working • Slowdowns • Deleted files -Impact to network with unknown application • Access to internal services • Rights and permissions to file shares

Scheduled backups for Mac OS

-Time Machine - Included with Mac OS X -Hourly backups for the past 24 hours -Daily backups are done for the past month -Weekly backups - All previous months -Starts deleting oldest information when disk is full

Standard Thick Client

-Traditional computer -Desktop Applications (Executable programs running in local memory and using local CPU) -Meets recommended requirements for running the OS (CPU, Total RAM, disk space) -Local resources (OS, Drivers, Apps) -Ongoing support (security patches, OS updates, App. updates) -Device is added to microsoft domain -authentication needed to gain access

Magnetic Disk

-Traditional spinning drive platters -Larger capacity available in this format -Inexpensive compared to SSD

Optical Fiber Communication

-Transmission by light -No RF signal (difficult to monitor or tap) -Signal slow to degrade (can transmit over long distances) -Immune to radio interference

NetBIOS Datagram Service (nbdatagram)

-UDP 138 -connection-less version of nbsession

Simple Network Management Protocol (SNMP)

-UDP 161 (queries devices) -UDP 162 (traps/alarms) -Used to gather statistics from network devices

Dynamic Host Configuration Protocol (DHCP)

-UDP 67 & 68 -automated configuration of IP address, subnet mask, and other options -IP addresses are assigned in real-time from a pool -Each system is given a lease and must renew at set intervals -Addresses can be assigned by MAC addresses in the server (reservations) -Quickly manage addresses from one location

UPS (Environmental Impacts)

-Uninterruptible Power Supply • Provides backup power • Protects against blackouts, brownouts, surges -UPS types • Standby UPS (switches to battery when power is out) • Line-interactive UPS (provides battery power when power dips below required levels) • On-line UPS (Always on, no switching between power and batteries) -Also contain additional features • Auto shutdown, battery capacity, outlets, phone line suppression

Email filtering (Logical Security)

-Unsolicited email • Stop it at the gateway before it reaches the user • Can be On-site or cloud-based -Scan and block malicious software • can identify executables or known vulnerabilities • Phishing attempts • Other unwanted content

Upgrading to Windows 10

-Upgrade from the Windows 10 installation media • Downloadable versions are available from Microsoft • Includes a media creation tool -You cannot upgrade x86 to x64 OR x64 to x86 • Applies to all Windows versions • You'll have to migrate instead

Bridge

-Used to connect Hub networks in early networking -A switch with 2 to 4 ports -Makes forwarding decisions in software -Can connect different physical networks (different topologies) and network size limitations/collisions. -Distributes traffic based on MAC address -An example of a modern bridge is a wireless access point (bridges wired ethernet to wireless)

Local users and groups

-Users • Administrator - the Windows super-user • Guest -Limited access • Most users are "Regular" Users -Groups • Administrators, Users, Backup Operators, Power Users, etc. • Users can be added to groups • Permissions are easier to manager by groups instead of individual user access.

Virtual Desktop Infrastructure (VDI)

-Users connect to a pre-built desktop -Access from almost any OS (Windows, MacOS, Linux, iOS, Chromebook, Web Browser) -All communication in the desktop stays local to the virtual desktop -No sensitive info. sent from the local device

Syncing iOS Mobile devices

-Uses Apple iTunes -Creates full backups on the computer

Synchronization connections for iOS Devices

-Uses a USB standard Type A plug if connecting to a computer -USB - Proprietary (30-pin or 8-pin Lightning) -USB-C -802.11 wireless -Mobile network

Windows 10 Education and Enterprise

-Very similar features in both • Minor features differences • Both are managed by using Windows Volume licensing -Granular User Experience (UX) control • an administrator can define the user environment • Useful for kiosk and workstation customization -Supports: • Hyper-V • Bitlocker • Can join a domain • AppLocker (an administrator can control what applications can run) • BranchCache (remote site file caching) -Max x86 RAM 4 GB -Max x64 RAM 2048 GB (2 TB)

Notepad

-View and edit text files • You'll use a lot of text files -Included with almost any version of Windows

Explorer

-Windows Explorer / File Explorer (Windows 10) • File management -View, copy, launch files from File Explorer • Granular control -Easy access to network resources • Browse and view

Organizing network devices

-Windows HomeGroup • Can share files, photos, video, etc. between all devices • Works on a single private network only -Windows Workgroups • Logical groups of network devices • Each device is a standalone system, everyone is a peer • Single subnet -Windows Domain • Business network • Centralized authentication and device access • Supports thousands of devices across many networks

RAID (Redundant Array of Independent Disks)

-a method of storing data on two or more hard drives that work together -Different types of levels -Some redundant, some not

Software as a Service (SaaS)

-also referred to as On-Demand software -No local installation -Application and data is maintained by 3rd party provider -Cloud-based provider is responsible for maintenance, security, and everything else associated with the application - No development work required, just log in and it is available -Common implementation is Google Mail

TIA/EIA 568A

-green-white, green -orange-white, blue -blue-white, orange -brown-white, brown

PCI 32-bit slots

-smaller slots

Loopback address

127.0.0.1

shutdown /a

cancels the pc shutdown from the cmd prompt

Upgrading from Windows 7

• Keeps Windows settings, personal files, and applications • Must upgrade to a similar Edition

USB 1.1 Low Speed

-1.5 megabits per second -3 meters

PCI Express x12 Lane

-12 lanes (12 lanes in one direction, another 12 lanes in the opposite direction)

USB 1.1 Full Speed

-12 megabits per second -5 meters

SATA Revision 3.2

-16 Gbit/s -Max cable size : 1 meter

Thunderbolt v2

-20 Gbit/s aggregated channels -Mini DisplayPort connector

Hard drive security

-2019 study from Blancco and Ontrack on 159 storage drives from eBay •66 drives had data, 25 drives with Personal Identifiable Information •Some contained personal documents, video from a hospital monitoring system and more -Use 3rd party utilities if doing a regular format is not an option -File level overwriting •Sdelete - Windows Sysinternals -Whole drive wipe secure data removal • DBAN - Darik's Boot and Nuke -Physical drive destruction • One-off or industrial removal and destroy

USB-C Connections

-24-pin double sided USB connector -Used for both hosts and devices -Acts as a USB 3.1 connection or 2.0 connection -Can also act as an analog audio option with an adapter (headset support through a 3.5mm jack)

PCIe v1.x

-250 MB/s of throughput per lane in each direction

SATA Revision 2.0

-3.0 Gbit/s -Max cable size : 1 meter

Operating system technologies

-32-bit vs. 64-bit • Processor specific -32-bit processors can store 2³² = 4,294,967,296 values -64-bit processors can store 2⁶⁴ = 18,446,744,073,709,551,616 values • 4 GB vs. 17 billion GB • The OS has a maximum supported value -Hardware drivers are also specific to the installed OS version (32-bit or 64-bit) • 32-bit (x86), 64-bit (x64) -32-bit OS cannot run 64-bit apps • But 64-bit OS can run 32-bit apps -Location of programs in a Windows 64-bit OS • 32-bit apps: \Program Files (x86) • 64-bit apps: \Program Files

Molex connector

-4-pin peripheral power connector -Created by Molex Connecter Company -AMP MATE-N-LOK -Provides +12v and +5V -Power for many devices in the computer case (Storage, Optical drives, Fans, Other peripherals)

DVD-ROM (digital versatile disc read-only memory)

-4.7 gigabytes (GB) for single-layer -8.5 gigabytes (GB) for dual-layer

Thunderbolt v3

-40 Gbit/s aggregated channels -USB-C connector

RJ14 Connector

-6 Position, 4 conductor connectors (6P4C) -6 wires available, only 4 are used -Used for dual-line use for 2 telephones -Interchangeable with RJ11

64-Bit PCI Parallel Bus

-64 bits sent at the same time -wider bus

RJ48C Connector

-8 position, 4 conductor connector (8P4C) -8 wires availabe, only 4 are used -Similar to RJ45 -Used with T1 or WAN data lines

RJ45 Connector

-8 position, 8 conductor connector (8P8C) -8 wires available, All 8 are used -Associated with wired-ethernet connection -Similar in shape to an RJ48C

Laptop Wireless Cards

-802.11 Wireless connection -WWAN - Cellular based wireless connection -WPAN - Bluetooth wireless network -Comes in Mini-PCI or Mini-PCIe cards -Make sure the antennas are plugged in

BD-RE (Blu-ray disc Recordable Erasable)

-A Blu-ray disc that can be rewritten to multiple times.

CD-RW (Compact Disc-ReWritable)

-A CD that can be written to multiple times

Transmission Control Protocol (TCP)

-A connection-oriented protocol -There is a formal process when starting and ending the connection -A reliable form of delivery -Can recover from errors and can re-transmit the data -Can manage out-of-order message or retransmissions -There is Flow Control where the receiver can manage how much data is sent (slow or speed things up) -Station A ACKnowledges received data (ACK) from Station B -Data is resent if Station A does not receive an ACK from Station B

Non-Metered Cloud Services

-A flat costs over certain amount of time -A flat fee to upload and download files

eMMC (embedded MMC)

-A form of embedded flash memory widely seen in mobile devices.

Laptop Rotating/Removable Screens

-A laptop keyboard and tablet screen combined (can be twisted around with keyboard facing us) -Can be used for presentations -May include a stylus for input -Can be detached from keyboard and use the stylus for input

Hybrid Cloud Deployment Model

-A mix of public and private -Part of the cloud-based services running in a private data center; other aspects of the service running in a public provided cloud

xD-Picture Card

-A type of memory card, typically used with digital cameras

Step 4 : Developing

-Adds toner to the charged areas that have been neutralized on the imaging drum -Toner has a negative charge associated to it, so it wont stick to the negatively charged areas from Step 2.

Password expiration and recovery

-All passwords should expire • Change every 30 days, 60 days, 90 days -Critical systems might change more frequently • Every 15 days or every week -The recovery (password reset) process should not be trivial! • Some organizations have a very formal process

DSL modem

-Also known as ADSL (Asymmetric Digital Subscriber Line) -uses telephone lines for connectivity -It is Asymmetric due to download speed being faster than upload speed -~10,000 foot limitation from the central office (CO) -52 Mbit/s downstream ; 16Mbit/s upstream are common -Possible faster speeds if closer to the CO

Safety Tips

-Always disconnect from a power source when working on a device -Never connect your body to any part of an electrical system

BIOS Important Tips

-Always have a backup of the config -Do not make changes unless you are certain of a setting -Upgrade for a specific reason -Always have a backup of the config (Important!)

Backup / restore

-Always have a backup to recover from a malware infection • This is the best insurance policy ever -Image backup built into Windows • In Windows 8/10 it's called Backup and Restore (Windows 7) • In Windows 7 it's called Backup and Restore -This is the only way to be 100% sure that malware has been removed • Seriously. Cleaning isn't 100%.

Tethering (Mobile Device Connectivity)

-Anchored to your mobile device -Connection can be made to the laptop via USB or Bluetooth -Creates a single connection -May require additional services from phone provider

Anti-virus and Anti-malware (Mobile Devices)

-Apple iOS • Closed environment, tightly regulated OS • Malware has to find a vulnerability -Android • More open, apps can be installed from anywhere • Easier for malware to find its way in -Apps on mobile devices run in a "sandbox" • You can control what data an app can view

Apple iOS history

-Apple iPhone and Apple iPad OS • Based on Unix • Closed-source - No access to source code • Exclusive only to Apple products -iOS Apps • Apps are developed with iOS SDK on Mac OS X • Apps must be approved by Apple before release • Apps are available to users in the Apple App Store

Lighting Connector

-Apple proprietary -8-pin digital signals -Used for iPhones, iPads, iPod devices --Advantages over Micro-USB -Higher power output for phones and tablets -Can be inserted either way -Simpler design, more durable

Lightning Cable

-Apple proprietary -8-pin digital signals (iPhone, iPad, iPod devices) -Some advantages over Micro-USB --Higher power output for phones and tablets --Can be inserted either way --Simpler design, a bit more durable than traditional USB cable

Knowledge base and articles (Documentation Best Practices)

-Available from external sources • Manufacturer knowledge base (e.g. Microsoft, Cisco, etc...) • Internet communities such as forums -Internal documentation • Institutional knowledge • Usually part of help desk software -Helps find the solution quickly • Contains a searchable archive • It can automatically search with keywords placed in the helpdesk ticket

LED-backlit LCD display

-Backlight is LEDs instead of florescent -LED's are either placed around the edge of the screen OR in an array (matrix) behind the screen -The latest laptops are LED-backlit -Uses same DC voltage (no voltage conversion is needed) -If display stops working, look closely (use a flashlight) to still see information on the screen -Inverter or whole display will need to be replaced

UEFI BIOS (Unified Exentensible Firmware Interface)

-Based on Intel's EFI (Extensible Firmware Interface) -A defined standard (implemented by mobo Mfr.'s) -Designed to replace legacy BIOS -Provides support for modern hardware -Graphical front-end -Also options for text based front end

File systems

-Before data can be written to the partition, it must be formatted -Operating systems expect data to be written in a particular format • FAT32 and NTFS is popular -Many operating systems can read (and perhaps write) multiple file system types • FAT, FAT32, NTFS, exFAT, etc.

Local Security Policy

-Big companies have big security policies • Managed through Active Directory Group Policies • Affects many computers at once -Stand-alone computers aren't managed through AD • Local policies are managed by Local Security Policy -Not available in Home editions • Available in Pro, Ultimate, & Enterprise editions -Local Security Policy is located at: • C:\Windows\system32 and click on secpol.msc • Click on Start and search for secpol.msc or local security policy • cmd prompt and type in secpol.msc

Choosing a Power Supply

-Bigger isn't necessarily better (More expensive doesn't make your computer faster) -Physical size is relatively standard (older systems may have proprietary sizes) -Calculate the watts required for all components (CPU, Storage devices, Video adapter) -Video cards are usually the largest power draw -50% capacity is a good rule of thumb

Biometrics (Physical Security)

-Biometric authentication • Fingerprint, iris, voiceprint -Usually stores a mathematical representation of your biometric • Your actual fingerprint isn't usually saved -Difficult to change • You can change your password • You can't change your fingerprint -Used in very specific situations • Not foolproof

Switches

-Bridging done in hardware -Application-specific integrated circuit (ASIC) -Forwards traffic based on data link address -Contains many ports and features -The core of an enterprise network -May provide Power over Ethernet (POE) -Can include routing functionality (Multilayer or Layer 3)

Cable Modems

-Broadband (transmission across multiple frequencies) -Sends data on the cable network using DOCSIS (Data Over Cable Service Interface Specification) -High-speed networking -4 Mbits/s through 250 Mbits/s are common -Gigabit speeds are possible -Supports multiple services such as data, voice, video

Image recovery (Mac OS Tools)

-Build a disk image in Disk Utility • Creates an Apple Disk Image (.dmg) file -Mount on any Mac OS X system • Appears as a normal file system • Copy files from the image -Use the restore feature in Disk utility • Restore a disk image to a volume

Windows 7 Starter

-Built for netbooks -No DVD playback or Windows Media Center -No Windows Aero -No Internet Connection Sharing (ICS) -No IIS Web Server -Does not support enterprise technologies • Cannot join a domain • No BitLocker support • No EFS (Encrypting File System) support -Only available as x86, maximum of 2 GB of RAM -Not supported in x64 bit version

LoJack for Laptops

-Built into the BIOS -Software installed into the OS -Reinstalls itself if removed or new storage drive installed -"Phone home" function provides location information -Theft mode remotely locks the laptop and/or delete files and can force a startup password

BranchCache

-Caching for branch offices • Without additional hardware or external services -Conserves bandwidth over slower links • Seamless to the end-user • Same protocols • Same network connection • Same authentication methods -Activates when round-trip latency exceeds 80 milliseconds

Folder Options / File Explorer Options Applet

-Can Manage Windows Explorer • Many options -General Tab • Can change how folders open in each Window • How folders expand • Can set privacy settings -View Tab • Advanced settings for files and folders (can view hidden files, can hide extensions, etc..) -Search Tab • Can configure how the search Index is used when searching for files • Search Options when searching for files • Options when searching non-indexed areas

Creating a firewall exception

-Can allow an app or feature through Windows Firewall • The more secure exception -Can allow or disallow via the Port number • Block or allow - Very broad -Can create predefined exceptions • List of common exceptions -Custom rule can be combined to create a detailed rule • Every firewall option -To view/create custom rules, click on "advance settings" under Windows Firewall

Laptop Volume Settings

-Can be a standalone key to higher or lower sounds -Can be a FN key to higher or lower sounds -Often includes a mute option for both standalone or the FN key -Laptop can also have both option to higher and lower sound with standalone key and FN key

Phone / Tablet

-Can be managed centrally through Mobile Device Management (MDM) -Touchscreen configuration (lock codes or biometric access) -Application installs (set by policy and requirement) -Sync and backup can be cloud-based -Wireless enabled (can include VPN connectivity)

Mobile Device Game Pads

-Can connect to a mobile phone or tablet over bluetooth connectivity -Gives the gaming console feel on a mobile phone or tablet

Full device encryption (Mobile Devices)

-Can encrypt all device data • Phone keeps the key -In iOS 8 and later • Personal data is encrypted with your passcode -In Android - Full device encryption can be turned on

Malware network symptoms (Troubleshooting Security Issues)

-Can slow performance or cause lock-ups • Malware isn't the best written code -Can cause Internet connectivity issues • Malware likes to control everything • You go where it wants you to go • You can't protect yourself if you can't download anti-malware software -Can also keep OS updates from installing • Malware keeps you vulnerable • Some malware uses multiple communication paths -Reload or clean to remove malware • Either use a malware cleaner or recover from known good backup

Patch Panels

-Combination of punch-down blocks and RJ-45 connectors -Cable runs from desks are made once -Permanently punched down panel -Connection from panel to switch can be easily changed -No special tools to create new connections -Can use existing cables

Laser Printer

-Combines a laser, high voltage, charged ions, powdered ink, heat and paper -Very high quality output -Very fast printing -Complex (many moving parts) -Requires on-printer memory -Messy on the inside if toner cartridge leaks

System updates (Linux)

-Command line tools • Depending on linux distro, either "apt-get" or "yum" will be used -Graphical update managers • Software updater -Patch management • Updates can be scheduled -Software center is used to install applications • The Linux "App Store"

BNC connector (Bayonet Neill-Concelman)

-Common type of coaxial connector typically DS3 WAN links -Plugs in and twists to lock (not easy to disconnect) -Rigid and bulky (difficult to work with)

SOHO Wireless Channels and Encryption

-Configure with highest encryption possible -WPA2-AES (available on most modern routers) -Choose WPA2 over WPA -WEP (older encryption) is not an appropiate option -Check all access points to make sure all are using the highest encryption -Use an open frequency (some access points will automatically find good frequencies)

Keyboard

-Connected via USB or an adapter for PS/2 -Additional features may require additional drivers/software

Barcode/QR code reader

-Connected with serial, USB, or 802.11 WiFi -Camera phone can also act as a reader

Syncing Mobile devices to the automobile

-Connection is done either through bluetooth or wired cable (extends the phone functionality into the vehicle) -Can display maps, control phone calls, play music from the mobile device -Can use iOS carplay for apple devices or Android auto for android devices -Syncs contact info., music, and other details -Phone information is shared in real-time -This could be a security issue in a rental car or shared car since information is transferred into the car

IoT (Internet of Things) configurations

-Consists of home automation -mostly wireless -Security can be an issue -Devices such as thermostats, light switches, security cameras, door locks, voice-enabled smart speakers / digital assistants -No special port-mapping/NAT configurations required (almost all devices communication outbound)

Digital Projectors

-Contains Metal-Halide lamps -Very bright (very hot) light -Brightness measured in lumens -Relatively expensive -Always let bulbs cool (fan will keep running) -Keep it plugged in

Laptop Function Keys

-Contains an FN key -Allows secondary functions of the keyboard -Can allow to toggle between LCD/external monitor/both

Product Release Instructions (PRI) Updates

-Contains specific radio settings such as ID numbers, Network codes, Country codes, etc., so the phone knows how to use the wireless network -Can be updated Over-The-Air

Wireless connections

-Contains the Network name • such as the SSID (Service Set Identification) -Security type • Encryption method -Encryption type • TKIP or AES -Security key • WPA2-Personal - a Pre-shared key method (password) • WPA2-Enterprise - a 802.1X authentication method (username and password)

DB-9 serial cable connector

-D-subminiature or D-sub -Different sizes, A through E -Sends serial data over an RS-232 connection -Built for modem or management port communication (Commonly used as a console port or management port on these devices)

The WPS hack (Securing SOHO Network)

-December 2011 - WPS has a design flaw • It was built wrong from the beginning -PIN is an eight-digit number • Really seven digits and a checksum • Seven digits, 10,000,000 possible combinations -The WPS process validates each half of the PIN • First half, 4 digits. Second half, 3 digits. • First half, 10,000 possibilities. • Second half, 1,000 possibilities -It takes about four hours to go through all of them if no lockout process was implemented • Most devices now include a lockout function in newer devices • Most people disable WPS completely

Environment variables (Scripting)

-Describes the environment the operating system is working under • Scripts use these to make decisions -Common environment variables • Location of the Windows installation • The search path • The name of the computer • The drive letter and path of the user's home directory

NAT (Network Address Translation)

-Designed for IP address conservation. It enables private IP networks that use unregistered IP addresses to connect to the Internet. NAT operates on a router, usually connecting two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses, before packets are forwarded to another network. As part of this capability, NAT can be configured to advertise only one address for the entire network to the outside world. This provides additional security by effectively hiding the entire internal network behind that address. NAT offers the dual functions of security and address conservation and is typically implemented in remote-access environments.

Windows 10 Home

-Designed for home user, retail customer -Integrates with Microsoft account • Microsoft OneDrive can be used to backup your files -Windows Defender is included • Anti-virus and anti-malware software -Cortana is included • Allows you to talk to your OS -Does not support: • Hyper-V • Bitlocker • Cannot join the domain • AppLocker • BranchCache -Max x86 RAM 4 GB -Max x64 RAM 128 GB

On-board fans

-Designed to cool and entire adapter card -Can be bulky (may take additional adapter card space) -Usually seen on high-end graphics cards

PATA Cabling (40 Wire)

-Device 0 (master) is closer to the PATA interface -Device 1 (slave) is further away from the PATA interface -Only supports 2 drives -Additional drives requires another PATA interface

PATA Cabling (80 Wire)

-Device 0 (master) is further away from the PATA interface -Device 1 (slave) is closer to the PATA interface -Only supports 2 drives -Additional drives requires another PATA interface -Most recent, added in newer versions of PATA for higher throughput -Additional wires are used for grounding to reduce crosstalk

The password file

-Different across operating systems • All contain different hash methods • One-way cryptographic process e.g. Jumper Bay: 1001::42e2f19c31c9ff73cb97eb1b26c10f54::: Carter: 1007::cf4eb977a6859c76efd21f5094ecf77d::: Jackson: 1008::e1f757d9cdc06690509e04b5446317d2::: O'Neill: 1009::78a8c423faedd2f002c6aef69a0ac1af::: Teal 'c: 1010::bf84666c81974686e50d300bc36aea01:::

Baseband Radio Processor (Mobile Device Connectivity)

-Different from WiFi, Bluetooth, NFC radios -Design to communicate with providers of cellular networks -Contains its own firmware and memory (quite proprietary) -We cannot see this part of the phone operating when making phone calls -Uses a real-time OS which allows the phone to set a priority to communicate over that cellular network -Firmware can be updated Over-The-Air (OTA) and it is invisible to the end user

Laser Printer Calibration

-Different toner cartridges print with different densities (some dark, some light) -Density can be adjusted to make it look perfect -Can be automated or manually (check documentation)

Power Supply Output Voltages

-Different voltages for different components -Voltages are references are positive or negative voltage -Voltage is a difference in potential -Electrical ground is a common measuring point (depends where you measure from)

dxdiag.exe

-DirectX Diagnostic Tool • Manage your DirectX installation • It is an application programming interface used by developers to create applications that requires multimedia or graphics within Windows -Multimedia API Overview for: • System • Display (3D graphics) • Audio • Input options -Also makes a very nice generic diagnostic tool when having issues with graphics or sound • Not just for testing DirectX - Located under C:\Windows\System32 • Can also open through the cmd line or Run cmd

Bonjour (Sharing from an OS)

-Discover apple devices on the LAN -Part of MacOS -Can be added to windows (itunes, etc..)

Incident response: Documentation (Privacy, Licensing, and Policies)

-Documentation must be available • No questions -Gather as much information as possible • Written notes • Taking pictures • Screenshots -Documentation always changes • Constant updating • Have a process in place • Use the wiki model

Laptop Port Replicator

-Does have similar interfaces compared to a docking station -Smaller in size compared to a docking station -Do not have an expansion card option

Multi-channel Memory

-Dual-channel, triple-channel, quad-channel -Should always match (exact matches are best) -Memory modules slots are often colored differently -Maximizes throughput

Printer Configuration Settings

-Duplex; printing on both sides (not all MFP's can do this) -Collate ; Printing multiple copies in order (useful for many copies of large documents) -Non-collated prints as page 1,1,1,1,2,2,2,2,3,3,3,3 -Collated prints as page 1,2,3,4,1,2,3,4,1,2,3,4 -Orientations ; portrait or landscape -Quality ; Resolution can be changed; can print in color or grayscale; ability to print in color saving mode.

Micro-USB and Mini-USB Connections

-EU standardized on Micro-B USB Plug (now common worldwide) -Older devices may use Mini-B USB Plug (larger than Micro-B)

Guest Operating System Security

-Each vm is self-contained OS and needs same controls and security as a physical OS -Use traditional security controls - Host-based firewall, anti-virus, anti-spyware -Watch out for rogue VM's -Downloaded 3rd party self-contained VM's can be dangerous -Make sure you are running trusted VM's on your system

Tools tab

-Easy access to popular administrative tools • UAC settings, System Information, Computer Management, etc. -Faster than searching through menus or typing • A static (but comprehensive) list

Change board and approvals (Change Management)

-Either "Go or no go" • Lots of discussion takes place -All important parts of the organization are represented • Potential changes can affect the entire company -Some changes have priority • The change board makes the schedule • Some changes happen quickly • Some take time -This is the last step • The actual work comes next

Voltage (Volt, V)

-Electrical "pressure" pushing the electrons -e.g. how open the faucet is

DIMM (dual inline memory module)

-Electrical contacts are different on each side -64 bit data width -Found in Desktop computers -Available in DDR2, DDR3, DDR4 SDRAM

Direct Current (DC; ⎓)

-Electrical current moves in one direction with a constant voltage

Microsoft Exchange on Mobile devices

-Enterprise email (not a service at home) -Integrates email, contacts, calendars, reminders -Integrates with mobile device database such as contacts, calendars, etc. -Configuration options needed are email address, server, domain, username, password. -Contains integrated message encryption with S/MIME (Secure/Multipurpose Internet Mail Extensions) -Can both encrypt and digital sign sent and received messages from MS Exchange.

Mantraps (Physical Security)

-Entry for one at a time and in controlled groups • Manage control through an area -All doors are normally unlocked • Opening one door causes others to lock -All doors normally locked • Unlocking one door prevents others from being unlocked -One door is open / the other is locked • When one is open, the other cannot be unlocked

Local government regulations (Environmental Impacts)

-Environmental regulations requirements • May have very specific controls -The obvious requirements • Hazardous waste • Batteries • Computer components -The not-as-obvious requirements • Paper disposal

Full Disk Encryption (FDE)

-Everything is encrypted (not just individual files) -Whole OS is encrypted

Mounting drives

-Extend available storage space • Mount a separate storage device as a folder -Mount in an empty folder • Instant storage space • Seamless to the user -Configuration done in Disk Management: • Right click on the new drive • Change drive letter and paths • Select "mount" option and browse to the location

RAID 1 (Mirroring)

-File blocks are duplicated between physical drives -High disk space utilization (every file is duplicated; required disk space is doubled) -High redundancy (drive failure does not affect data availability) -Minimum of 2 drives

Spotlight (Mac OS Features)

-Find files, apps, images, etc. • Similar to Windows search -Magnifying glass in upper right • Or press Command-Space -Type anything in - See what you find -Define search categories in System Preferences / Spotlight • Enable/disable categories • Can change the order of categories • Can enable/disable categories

Check Disk (chkdsk) command

-Fixes logical file system errors on the disk • chkdsk /f -Locates bad sectors and recovers readable information • chkdsk /r • Implies /f -If volume is locked, run during startup

Local user permissions for application installs

-Folder/file access will be required • Installation programs will be copying a lot of files -The user needs permission to write application files to the storage drive • This may not be the default in an office -May need to run as Administrator • Some applications will install additional drivers or services • Be careful when allowing this level of access!

GPT partition style

-GPT (GUID Partition Table) • Globally Unique Identifier • The latest partition format standard -Requires a UEFI BIOS • Can have up to 128 primary partitions • No need for extended partitions or logical drives

Internet Options Applet

-General Tab • Basic display • Shows options for browser such as home page, how the browser starts up, and change the display of the tabs -Security Tab • Contains zones where security levels are set (Internet, Local Intranet, Trusted Sites, Restricted Sites) • Different security levels for each zone (Between High and Low) -Privacy Tab • Can control settings for cookies, pop-up blocker, InPrivate browsing -Content Tab • Can view information on encryption and identification certificates • Can view auto-complete information -Connections Tab • Can configure VPN, proxy settings, and LAN settings -Programs Tab • Can manage how the browser opens links • Can set default browser • Manage add-ons, plugins, etc. -Advanced Tab • Detailed configuration options for the browser • Can reset all settings back to default

Python (Scripting)

-General-purpose scripting language • Contains a ".py" file extension -Popular in many technologies • Broad appeal and support in many operating systems

Thermal Paper Replacement

-Get the exact kind and size for your thermal printer (impossible to substitute) -Paper is inexpensive (right specifications is needed) -To small or large paper can cause paper jams -Replacement process is easy (open cover, remove roll, insert new roll, and press a feed button to confirm paper is being fed)

Chrome OS history

-Google's operating system • Based on the Linux kernel -Centers around Chrome web browser • Most apps are web-based -Many different manufacturers - Relatively less expensive -Relies on the cloud - requires connectivity to the Internet

Expansion Cards

-Graphics (Video) cards -Audio cards -Network cards (multiport ethernet for servers) -USB cards -Storage cards (SSD) -eSATA cards

Reboot (Troubleshooting Solutions)

-Have you tried turning it off and on again? • There's a reason it works -If a bug is in your router software • Reboot the router to return to a known good state -If an application is using too many resources • Stops the app -a memory leak slowly consumes all available RAM • Clears the RAM and starts again

Thunderbolt Connection

-High Speed Serial Connection -Data and power on the same cable -Based on Mini DisplayPort -Max 3 meters (Copper) -60 meter Optical -Daisy Chain up to 6 devices

M.2 M key

-If the drive is connecting to a device that supports a M key, then it will use 4 lanes of the PCI Express bus (PCIe x4 at a maximum)

Global Positioning System (GPS)

-In Car navigation system -Requires view of the sky to receive signals from satellites -Periodic updates needed either Over the air or through a memory card

Platform as a Service (PaaS)

-In charge of building your own application -Do not need to worry about servers, software, or data center -All applications are in the cloud (no control of the people managing the applications or hardware) -Only responsible for the development process of the application -Develop the app from what is available on the platform -Example is SalesForce.com

Is it legal to dive in a dumpster?

-In the United States, it's legal • Unless there's a local restriction -If it's in the trash, it's open season • Nobody owns it -If dumpsters are on private property or show "No Trespassing" signs then it may be restricted • You can't break the law to get to the rubbish -If you have questions? Talk to a legal professional.

Upgrade methods

-In-place upgrade • Upgrades the existing OS • Keeps all applications, documentations, and settings • Start the setup from inside the existing OS -Clean install • Wipes everything and reload • Backup your files • Start the setup by booting from the installation media

Overclocking

-Increase the clock speed past the rated value -Requires more power, creates more heat -System become unstable at some point -Base clock (BCLK) needs to be changed -requires unlocked CPU -Run stress test to confirm stability -This will void warranty -Can break other components other than your CPU

Browser redirection (Troubleshooting Security Issues)

-Instead of your Google result, your browser goes somewhere else • This should not ever happen -Malware is the most common cause • This makes money for the bad guys -Use an anti-malware/anti-virus cleaner • This is not the best option -OR Restore from a good known backup • The only way to guarantee removal

DVI-I Dual Link

-Integrated connector -Sends both analog and digital signals on the same connector -Dual link ; 7.4 Gbps (HDTV at 85 fps)

DVI-I Single Link

-Integrated connector -Sends both analog and digital signals on the same connector -Single link; 3.7 Gbps (HDTV at 60 fps)

iCloud (Mac OS Features)

-Integrates Apple technologies - Mac OS, iOS -Share across systems • Calendars, photos, documents, contacts, etc. -Can backup iOS devices to never lose data again -Store files in an iCloud drive • Similar to Google Drive, Dropbox • Integrated into the operating systems

Backup testing (Disaster Recovery)

-It's not enough to perform the backup • You have to be able to restore -Disaster recovery testing • Simulate a disaster situation • Restore from a backup -Confirm the restoration • Test the restored application and data by the end-users to make sure the everything is working as expected -Perform periodic audits • To make sure the backups are working properly and the data is stored as expected.

Controlling ESD (Managing Electrostatic Discharge)

-Keeping humidity over 60% helps control ESD • Won't prevent all possible ESD • Keeping an air conditioned room at 60% humidity isn't very practical and uncomfortable to work in -Use your hand to self-ground • Touch the exposed metal chassis before touching a component • Always unplug the power connection • Do not connect yourself to an electrical ground! -Try not to touch components directly • Card edges only • Do not touch any components of the card

Windows Update

-Keeps your OS up to date - Security patches, bug fixes -Can be configured to be installed automatically - Updates are always installed -Can be configured to download but wait for install - You control the time -Can be configured to check but not to download • Saves bandwidth -Can be configured to never check - Don't do this -Windows 10 has the option to schedule a restart after updates are completed.

Standard ATX

-Large form factor (ATX Form Factor) -Advanced Technology Extended -Power : Either 20 or 24 pins withn an additional 4/8 pin connector

Windows 7 Minimum Hardware Requirements (x86)

Processor/CPU - 1 GHz processor Memory - 1 GB RAM Free disk space - 16 GB Video - DirectX 9 graphics device with WDDM* 1.0 or higher driver *Windows Display Driver Model -Win7 32-bit

Windows 8/8.1 Minimum Hardware Requirements (x86)

Processor/CPU - 1 GHz processor with support for PAE, NX, and SSE2 Memory - 1 GB RAM Free disk space - 16 GB Video - Microsoft DirectX 9 graphics device with WDDM* driver *Windows Display Driver Model -Win8/8.1 32-bit

Windows 10 Minimum Hardware Requirements (x64)

Processor/CPU - 1 GHz processor with support for PAE, NX, and SSE2 Memory - 2 GB RAM Free disk space - 20 GB Video - Microsoft DirectX 9 graphics device with WDDM* driver *Windows Display Driver Model -Win10 64-bit

PCI 133 MB/s Throughput

Throughput for a bus running a 32-bit card at a 33MHz clock rate

copy /y

copy command that suppresses the prompt to confirm if you want to overwrite an existing destination file

copy /v

copy command that verifies that new files are written correctly

tasklist

displays a list of currently running processes from the cmd prompt

chkdsk /f

fixes logical file system errors on the disk from the cmd prompt

format c:

formats a disk for use with Windows from the cmd prompt; Potentially data loss if it has any

chkdsk /r

locates bad sectors and recovers readable information from the cmd prompt; also implies /f

shutdown /r

shuts down and restarts a pc from the cmd prompt

shutdown /s /t nn

waits seconds before shutting down pc from the cmd prompt

xcopy command

• Copies files and directory trees • xcopy /s Documents m:\backups -- Copies directories and subdirectories except empty ones in the documents folders to drive "M:\backups" folder

Upgrading from Windows 8.1

• Keeps Windows settings, personal files, and applications • Must upgrade to a similar Edition • You cannot upgrade directly from Windows 8 to Windows 10

cp (Linux Command)

• Used to make a copy a file • Duplicate files or directories • cp SOURCE DEST • to create a copy of first.txt and name it second.txt, you use the command "> cp first.txt second.txt"

Upgrade Windows 7 Enterprise to Windows 10

Can upgrade to: • Windows 10 Enterprise Cannot upgrade to (requires clean installation): • Windows 10 Home • Windows 10 Pro

32-bit PCI Parallel Bus

-32 bits sent at the same time

Windows 7 Editions

- Windows 7 Starter - Windows 7 Home Basic - Windows 7 Home Premium - Windows 7 Ultimate - Windows 7 Professional - Windows 7 Enterprise

Virtualization requirements

-CPU Processor Support (Intel VT or AMD-V) -Memory (above and beyond Host OS requirements) -Disk Space (each guest OS will have its own image) -Network (Configurable on each guest OS such as a standalone, provide NAT, Bridged, etc.) -More advanced virtualization systems allow you to create virtual switches to have separate VLAN's configured for the different VM's on the desktop

TPM (Trusted Platform Module)

-Can be added to many motherboards -Built-in to some systems -Adds advanced cryptographic functions -Integrates with BIOS

Laptop Smart Card Reader

-Can be integrated (built into the laptop) -Can be external (connected via USB)

Scheduled backups (Linux)

-Can be scheduled by either command line and/or graphical interface • a number of these utilities are built into the distributions -tar (commonly used) • Stands for "Tape Archive" • Easy to script into a backup schedule from cmd line • Can backup or restore from tar utility -rsync • Stands for "Remote Sync" • Sync files between storage devices • Instant synchronization or scheduled

Networking Tab

-Can view network performance • Separate tab in Windows 7 • Integrated into the Performance tab in Windows 8/8.1/10 -View utilization, link speeds, and interface connection state

Domains

-Central database • Active Directory Domain Services • Designed for the enterprise -User accounts are managed centrally • Devices are added to the domain -Manage all devices and users • Deploy software • Manage the operating system -Managed in Control Panel / System

Managed Switches

-Contains VLAN support -Interconnect with other switches via 802.1Q -Can prioritize certain type of traffic -Redundancy support (Spanning Tree Protocol (STP)) -External management can be done using SNMP -Can configure port mirroring to capture packets

Laptop Media Options

-Control audio and video from the keyboard (no mouse clicking) -You can play, stop, rewind, fast forward, Mute, Volume -No FN keys needed

Cloud Storage (Disaster Recovery)

-Data is available anywhere, anytime, on any device • If you have a network, you have your data -Advantages over local backups • No tape drives to manage • No offsite storage processing -Disadvantages over local backups • Data is not under your direct control • Strong encryption mechanisms are critical

Laptop CPU

-Designed for mobility -Uses less power and creates less heat -Integrates features such as memory controller and video controller to save space -Not very upgradeable -Replaceable but not upgradeable -Often slower than desktops -Size and heat are disadvantages

Certificate of destruction

-Destruction is often done by a 3rd party • 3rd parties usually have the drills and degaussers to perform the work -Need confirmation that your data is destroyed • Service should include a certificate (If not, request one) -A paper trail of broken data will be needed for future auditing purposes • You know exactly what happened

Error Correcting Code (ECC) Memory

-Detects errors -Corrects on the fly -Ideal for servers

Scope the change (Change Management)

-Determine the effect of the change • May be limited to a single server • Or an entire site -A single change can be far reaching • Changes at the switch which can affect multiple applications • Internet connectivity changes • Changes in remote site access • Changes in external customer access -How long will this change last? • Will it have no impact • Or hours of downtime

Patch and update management

-Keep the OS and applications updated • Security and stability improvements -Built-in to the operating system for standalone systems (home systems) • Updates are deployed as available • Deployment may be managed internally by the organization -Many applications include their own updater • Check for updates when starting -Always stay up to date • Security vulnerabilities are exploited quickly

Prepare the boot drive

-Know your drive • Is there data on the drive? • Has the drive been formatted? • What partitions are on the drive? -Backup any old data - You may need that back someday -Most partitioning and formatting can be completed during the installation • Clear the drive and start fresh

Print Management

-Located in Control Panel under Administrative Tools -Can manage printers • Share printers from one central console -Add and manage printer drivers • Central management of 32-bit and 64-bit drivers

Laptop Video Card

-Often built into the processor -Sometimes part of the system board -Not upgradeable in smaller laptops -Can be upgradeable in larger laptops that require high-end capabilities in a mobile platform

Laptop Keyboard Backlight

-On option on many laptops -Allows you to view keys in dark lit areas -Secondary functions can be intensity (brighness), duration (length of time), or just disable completely

Virtual Application Streaming

-On-Demand applications -No need to install the app locally (globally distributed) -Components are downloaded as needed; it will not download a component if its not needed -Data is stored securely in the cloud -Easy to update from one centralized location; If some data is cached, the app with only update the changes.

Airplane Mode (Mobile Device Connectivity)

-One button to turn off all radios (cellular, WiFi, Bluetooth, NFC, etc.) -Individual features can be re-enabled without enabling cellular features (useful when WiFi is available)

Near Field Communication (NFC) Connections

-Sends small amounts of data wirelessly over a limited area -Built into your phone -used in payment systems, transportation, in-person information exchange -Acts as an Access token, Identity "card" -Contains encryption support for safe data transfers

Service Location Protocol (SLP)

-TCP & UDP 427 -Populates the list of available devices

File Transfer Protocol (FTP)

-TCP 20 (active mode data) -TCP 21 (control) -Transfers files between systems -Authenticates with a username and password -Some systems use a generic/anonymous login -Provides full feature functionality (you can list, add, delete, rename, etc.)

Telecommunication Network (Telnet)

-TCP 23 -Used when older equipment does not support SSH -Login to device remotely -Console access -In-the-clear communication (no encryption) -Not the best choice for production systems

Lightweight Directory Access Protocol (LDAP)

-TCP 389 -Associated with corporate networks -Store and retrieve in a network directory (commonly used in Microsoft Active Directory) -

Hypertext Transfer Protocol Secure (HTTPS)

-TCP 443 -Communication in the browser and by other applications -Web Server Communication with encryption -Encrypted version -Supported by nearly all web servers and clients

Account lockout and disablement (Documentation Best Practices)

-Too many bad passwords will cause a lockout • This should be normal for most users • This can cause big issues for service accounts (you do not want this) -Disable accounts for users who leave the organization • Part of the normal change process • You don't want to delete accounts • At least not initially

Step 6 : Fusing

-Uses heat and pressure to melt the toner to the paper permanently -Reason why the paper is warm

Inkjet (ink-dispersion) printers

Pros: -Inexpensive technology compared to laser printers -Quiet when printing -Can print in high-resolution; Can print in color for nice looking documents or photographs Cons: -Ink is expensive (proprietary) -Ink eventually fades -printer clogs easily

ctrl + shift + enter

To run as admin, search for the application and enter this key command

Regulatory (Documentation Best Practices)

Types of regulating bodies: -Sarbanes-Oxley Act (SOX) • The Public Company Accounting Reform and Investor Protection Act of 2002 -The Health Insurance Portability and Accountability Act (HIPAA) • Extensive healthcare standards for storage, use, and transmission of health care information -The Gramm-Leach-Bliley Act of 1999 (GLBA) • Disclosure of privacy information from financial institutions

Laptop Screen Orientation

-Can rotate the screen -Useful on rotating tablets/laptops -Landscape or Potrait mode -Can enable with a FN key or a Hotkey (depends on manufacturers)

International Mobile Station Equipment Identity (IMEI)

-Identifies a physical mobile device -Every phone has a different number -The wireless carrier can use this number to allow or disallow access based on this number -Verify if the phone is unlocked so that it can be used with that wireless carrier

Surge suppressor specs (Environmental Impacts)

-Joule ratings • Surge absorption • 200=good, 400=better • Look for over 600 joules of protection -Surge amp ratings • Higher is better -UL 1449 voltage let-through ratings • Ratings at 500, 400, and 330 volts • Lower is better

Printer Sharing from an OS

-Network connected -common on windows devices -requires the IP address of the printer -Commonly uses TCP 139, TCP 445, UDP 137, and UDP 138

ink cartridge

-Places a drop of ink onto the page as needed -4 different colors -Cyan, Magenta, Yellow, Key (black) = CYMK

Hard Disk Drive Speeds

-Rotational Speed (RPM) 5,400 ; Avg. rotational speed 5.55 ms -Rotational Speed (RPM) 7,200 ; Avg. rotational speed 4.16 ms -Rotational Speed (RPM) 10,000 ; Avg. rotational speed 3 ms -Rotational Speed (RPM) 15,000 ; Avg. rotational speed 2 ms

Routers

-Routes traffic between IP Subnets -Makes forward decisions based on IP address -Inside of switches called "Layer 3 Switches" -Often connects diverse network types (Can connect a Serial WAN Link, a Ethernet copper connection and an Ethernet Fiber connection on same device)

BIOS (Basic Input/Output System)

-Software/Firmware to start the computer -Also known as system BIOS or ROM BIOS -Initializes CPU and Memory -Start the POST process

Thunderbolt v1

-Two channels -10 Gbit/s per channel -20 Gbit/s total throughput -Mini DisplayPort connector

USB Type B Printer Connector (wired device sharing)

-USB Type B Printer Connector -Printer common connector -This connector connects to the printer -USB Type A connects to the computer

taskkill /PID #### /T

kills the Process ID by number and any child processes which were started by it from the cmd prompt

taskkill

to terminate a tasks by process id (PID) or image name from the cmd prompt

Programs and Features Applet

• Shows Installed applications • Can Uninstall applications, view size and version -Can also enable/dislable Windows features that were/were not installed by default

PCIe v3.x

- ~1 GB/s of throughput per lane in each direction

PCIe V4.x

- ~2 GB/s of throughput per lane in each direction

PCIe V5.x (expected in 2019)

- ~4 GB/s of throughput per lane in each direction

Host-based firewalls (Logical Security)

-"Personal" firewalls • Software-based -Included in many operating systems • 3rd-party solutions also available -Stops unauthorized network access • "Stateful" firewall • Can allow or deny traffic by application through the network interface -Windows Firewall • Can filter traffic by allowing/denying through the port number and/or application

3D Printers

-"Prints" in three dimensions -Create an item based on an electronic model -Additive manufacturing (start with nothing and melt some filament layer by layer to create an object) -No machining process required -Rapid prototyping (design and create, make changes as needed; relatively quickly and inexpensively) -Designs can be deployed anywhere in the world or in space on the International Space Station

PCI 266 MB/s Throughput

--Bus version running at: -32-bit card running at 66 MHz (clock rate) or -64-bit card running at 33 MHz (clock rate)

Laptop AC power adapters

-Converts AC to DC -Can be either auto-switching or fixed input -Input voltage can be 110 volts or 220 volts -Replacement needs to be compatible with your system

Maintain positive attitude (Professionalism)

-Always have a positive tone of voice • Partner with your customer • Project confidence -Problems can't always be fixed • Do your best • Provide helpful options -Your attitude has a direct impact on the overall customer experience

Level 3 Cache (L3 cache)

-Could be shared memory across all cores

Laptop Optical Drives

-Becoming too large for portable devices -Difficult to find -It is often removable and replaced with another component -when available, it can read and write (CD-RW/CD-ROM and DVD-RW/DVD-ROM)

UEFI Advantages

-Boot from large (>2.2 TB) that were formatted with GUID partition table (GPT) disks -Can support (boot) from FAT and removable media -Includes a pre-boot environment (not an OS) -Has its own drivers, shell, applications -Can browse the internet, backup a storage drive -Remote diagnostics

SSHD (Solid State Hybrid Drive)

-Both a spinning drive and SSD -SSD caches the slower spinning hard drive data -Increases speed without cost of a SSD-only system -Looks like a normal hard drive or SSD (same form factor and interfaces)

Network setup

- Located in Control Panel under "Network and Sharing Center" • can set up a new connection or network -Step-by-step wizard - Confirmation during the process • Many different connections such as Direct, VPN, dial-up, etc.

Laptop Screen Brightness

-Can control the backlight -Can increase/decrease brightness -More light requires more power (shorter battery life) -Less light requires less power (longer battery life)

HomeGroup

-Can easily share information • Available in Windows 7 / Windows 8/8.1 • HomeGroup support was removed from Windows 10 • Documents, pictures, music, video -A network for the home • Must be set to "Home" in Windows -Enable HomeGroup - A single password for everyone

Wireless Networks (Mobile Device Connectivity)

-Can enable or disable cellular, WiFi, and Bluetooth independently -Can enable/disable in iOS in the settings or from the Control Center -Can enable/disable in Android under settings/Wireless & network settings

BIOS settings network settings

-Can enable/disable network adapters • On and off - Not much nuance • Might show up as "integrated devices" > "Onboard LAN controller"

Application Streaming (Mobile phones/Tablets)

-Can run an app (or a portion of an app) in real-time -Apps or components can be used without installing physically on device -Can be cached locally for later use -Common to see with Online Ads that allow you to use the app as if it was installed

Feed Rollers

-Commonly used by inkjet and laser printers to pull paper -Need to be clean, not worn to pull paper properly

User authentication

-Authentication • Prove you are the valid account holder • Username / Password • Perhaps additional credentials are required -Single sign-on (SSO) • Built into the Windows Domain • Provide credentials one time (No additional pop-ups or interruptions) • Managed through Kerberos

PCI Express x1 Lane

-1 lane (1 lane in one direction and another 1 lane in the opposite direction)

Task Manager

- Provides Real-time system statistics • CPU, memory, disk access, etc. -Starting the Task Manager: • Ctrl-Alt-Del, select Task manager • Right mouse click the taskbar and select Task Manager • Ctrl-Shift-Esc -Enhancements since Windows 7 • More information and features

Windows 8/8.1 Editions

- Windows 8/8.1 (Core) - Windows 8/8.1 Pro - Windows 8/8.1 Enterprise

Intel Virtualization Technology (VT)

-Intel's version of virtualization

20-pin Motherboard connector

-Original ATX standard -24 pin connector was added for PCI Express power

Application Installation methods

-Local installation • Downloadable executable • CD-ROM / DVD-ROM, Optical media -USB • Very compatible with most devices • Supports large installation programs -Network-based installation • The default in most organizations • Applications are staged and deployed from a central server • Can be centrally managed

5. Schedule scans and run updates (Removing Malware)

-Built into the antivirus software • Automated signature updates and scans -If Anti-Malware software does not have a way to automatically update, use Task scheduler • Run any task including signature updates -Check Windows operating system updates • Make sure its enabled and working

Computer Microphone

-Built-in (laptop) or external -Analog connectivity - TRS (Tip/Ring/Sleeve) Jack -Digital connectivity - USB

Avoid interrupting (Communication)

-But I know the answer! Why do we interrupt? • We want to solve problems quickly • We want to show how smart we are • Can be considered rude -Actively listen, take notes • Build a relationship with the customer (they'll need help again someday) • Don't miss a key piece of information • Especially useful over the phone when you are not able to physical see the user -This skill takes time to perfect • The better you are, the more time you'll save later

On-Demand Self-Service

-Can add a new virtual server, network, application when needed -No need to purchase a new server or install it into the rack -Instant resource provisioning provided by the cloud-based services

Measured Services

-Costs and utilization are very closely tracked -Resource planning and granular charge-backs -Can measure in and outs of bandwidth -Can measure the storage that is being used -Can measure how many people are using that application -Billing can be done with these metrics

VGA (Video Graphics Array)

-DB-15 connector (accurately called DE-15) -Blue color -Analog signal (no digital option) -Image degrades after 5 to 10 meters

USB flash drive

-Flash memory -EEPROM (electrically erasable programmable read-only memory) -Limited number of writes - can still read data -Not designed for archival storage -Very small, Easy to lose or damage -Always have a backup

Protection from airborne particles (Environmental Impacts)

-Enclosures • Protect computers on a manufacturing floor • Protect from dust, oil, smoke -Air filters and masks to protect yourself • Protect against airborne particles • Dust in computer cases, laser printer toner

SSH (Secure Shell) (Remote Access Technologies)

-Encrypted console communication - tcp/22 • Exactly like telnet -Looks and acts the same as Telnet - tcp/23

BitLocker (Windows Security Settings)

-Encrypts an entire volume • Not just a single file • Protects all of your data, including the OS -What If the laptop is lost? • Doesn't matter without the password -Data is always protected • Even if the physical drive is moved to another computer -BitLocker To Go • Encrypts removable USB flash drives

EFS (Encrypting File System)

-Encrypts at the file system level on NTFS -Supported operating systems • 7 Professional, Enterprise and Ultimate • 8 and 8.1 Pro and Enterprise • 10 Pro, Enterprise, and Education -Uses password and username to encrypt the key • Administrative resets will cause EFS files to be inaccessible

BitLocker

-Full Disk Encryption • The operating system and all files -A TPM is recommended on the motherboard • Trusted Platform Module • Use a flash drive or password if there's no TPM -Runs Seamlessly • Works in the background • You never know it's there • Used for laptops or mobile devices

Data encryption

-Full-disk encryption • Encrypts the entire drive -File system encryption (EFS) • Individual files and folders -Encrypt removable media • Protect those USB flash drives -Key backups are critical • You always need to have a copy • This may be integrated into Active Directory • You'll want to keep the key handy

Gaming Input

-Game pad and Joystick -USB connected -Used exclusively for games

Cleaning The Heating Element

-Gets dirty over time -Use IPA (Isopropyl alcohol) -Get a cleaning pen/swab and clean gently -Check manufacturers recommendations -Can also use a cleaning card to clean the component and the paper path

Google Android history

-Google Android • Open Handset Alliance • Open-source OS, based on Linux • Supported on many different manufacturer's devices -Android Apps • Apps are developed on Windows, Mac OS X, and Linux with the Android SDK • Apps are available from Google Play • Apps are also available from third-party sites (i.e., Amazon Appstore)

Commercial Email Providers for Mobile Devices

-Google email allows you to split inbox into multiple tabs. -Can configure using IMAP4 and POP3 -Exchange Online (Hosted email) -Supports IMAP4 and POP3 -iCould Mail (Apple Mail) -IMAP4 support only -Yahoo Mail -Supports IMAP4 and POP3

Mobile Device Headsets

-Hands-free audio -Earphones and microphone --Wired connections -Connects to 3.5mm TRRS connector -Tip-Ring-Ring-Sleeve -Also referred to as analog audio jack -iPhone can use lightning port --Wireless connections -Connects using bluetooth

Microsoft Windows history

-Has a major market presence -Has many different versions • Windows 10, Windows Server 2016 -Advantages • Large industry support • Broad selections of OS options • Wide variety of software support -Disadvantages • Large install base provides a big target for security exploitation • Large hardware support can create challenging integration exercises

PHI - Protected Health Information (Privacy, Licensing, and Policies)

-Health information associated with an individual • Personal records showing health status, health care records, payments for health care, and much more -Data between healthcare providers must maintain similar security requirements -HIPAA regulations • Health Insurance Portability and Accountability Act of 1996

Disk status

-Healthy • The volume is working normally -Healthy (At Risk) • The volume has experienced I/O errors • Drive may be failing -Initializing • Normal startup message for a new drive -Failed • Cannot be started automatically • The disk is damaged, or the file system is corrupted -Failed redundancy • A drive has failed in a RAID 1 or RAID 5 array -Resynching • Mirrored (RAID 1) volume is synching data between the drives -Regenerating • RAID 5 volume is recreating the data based on the parity data

Bluetooth Connections

-High speed communication over short distances -also referred as PAN (Personal Area Network) --Connects to our mobile devices -Smartphones -Tethering -Headsets and headphones -Health monitors -Automobile and phone integration -Smartwatches -External speakers

CCFL (Cold Cathode Fluorescent Lamp)

-Higher voltage and power needed -Uses a power inverter for DC to AC -Added thickness to the display -No longer a common backlight -Used in older laptops -If display stops working, look closely (use a flashlight) to still see information on the screen -Inverter or whole display will need to be replaced

NTFS and CDFS

-NTFS - NT File System • Extensive improvements over FAT32 • Can set quotas, file compression, encryption • Contains symbolic links, large file support, security, recoverability -CDFS - Compact Disk File System • ISO 9660 standard • All operating systems can read the CD

Application Streaming (Laptops/Desktops)

-No apps are deployed to the local machine -No complex deployment process -Apps are only streamed if they are used -New apps are added to the cloud offering as they are available and also updated -Quickly manage and make changes instantly

Fanless/Passive Cooling

-No fans or noise (silent operation) -Specialized functions (TV set top box, video servers, media server) -Functions are very controlled (carefully tested) -Low-power computer (heat sinks)

Cloud-Based Email Hosting

-No need to purchase servers or maintain the software -Flat cost per user per month -Personal email service has no costs involved -Looks and feels the same for the user -common services is MS Office 365 or Google Mail

Synchronizing Data on Mobile Devices

-Not restricted to one device (many different devices) -Access anything from anywhere (complete mobility) -Many different types of data is synced (email, calendar, apps, etc.) -All devices must be synced (invisible to the end-user) -The client and server must authenticate with each other (mutual authentication)

Licenses (Privacy, Licensing, and Policies)

-Personal license • Designed for the home user • Usually associated with a single device • Or small group of devices owned by the same person • Perpetual (one time) purchase -Enterprise license • Per-seat purchase or a site license • The software may be installed everywhere • Requires annual renewal

Spear phishing

-Phishing with inside information • Targets a more specific group (e.g. AP dept.) • Makes the attack more believable • Spear phishing the CEO is "whaling" -April 2011 - Epsilon was targeted • Less than 3,000 email addresses attacked • 100% of emails targeted operations staff • This attack downloaded anti-virus disabler, keylogger, and remote admin tool for those users who clicked on the link -April 2011 - Oak Ridge National Laboratory • Email was received from the "Human Resources Department" • 530 employees were targeted, 57 people clicked, 2 were infected • This attack downloaded data and infected servers with malware from users who clicked on the link

Tethering Connections

-Physically connect a device to your phone -Can use the internet/data connection -Computer uses USB to connect -Can access the internet from almost anywhere (may require service or configuration from wireless carrier)

Pickup Rollers

-Picks up paper, single page at a time -Picks up the top sheet of the feeder -possibly problems if its not picking up any paper or multiple sheets -Should be periodically cleaned or replaced

SCSI Advantages

-Pre-dates USB -Could connect many devices on a single bus -8 devices on a narrow bus -16 devices on a wide bus -No much configuration needed (just assign ID # to a device), SCSI will then handle the rest -SCSI is still used in data centers such as VM's or drive arrays

Step 2 : Charging

-Prepares the drum with a negative electrostatic charge (negative ions) -Older printers charge with a corona wire, newer printers with a primary charging roller -Entire photosensitive drum will have negative sets of ions associated with the entire printing area

Printer shares

-Similar to sharing a folder • But it's a printer instead • Can be shared through the "Sharing" tab under the printers properties -Can add a printer through Windows Explorer through "Devices and Printers"

Hypervisor Security

-VM escaping is malware recognizing it's on a virtual machine, compromised the hypervisor and jump from one guest OS to another -Malware on one customer's server can gather info. from another since many hosted services are virtual environments -A sweet spot for the bad guys (No significant vulnerabilities yet)

Third-party tools (Remote Access Technologies)

-VNC (Virtual Network Computing) • Uses the Remote Frame Buffer (RFB) protocol • Clients for many operating systems • Many are open source -Commercial solutions available • Such as TeamViewer, LogMeIn, etc. -Allows for screen sharing • Controls the desktop • Can file share • Or transfer files between devices

Scripting basics(Scripting)

-Variables • Can associate a name with an area of memory -Variable "x=1" • x=1. y=x+7. Therefore, y=8. • Variable "pi" can hold the value of "3.14" • pi=3.14 • Variable "greeting" can hold text values "Hello and welcome." • greeting="Hello and welcome."

Scripting data types (Scripting)

-Variables are associated with the data type depending on the information that is being stored -String data types • Variable "name" can store the string/text information "Professor Messer" • name="Professor Messer" -Integer data types • Contains whole numbers (not fractions or decimals) • 42 can be stored as an integer data type with the variable x • x=42 • Can perform mathematical calculations that can be used in the script -Floating point data types • Contains numbers with decimal points • The variable pi is a floating point data type that contains the number 3.14

Scheduled disk maintenance (Linux)

-Very little disk maintenance required • As long as there is space and resources -can perform file system check • File systems can't be mounted • Done automatically every X number of reboots • If system does not reboot often, force after reboot by adding a file to the root : sudo touch /forcefsck -Clean up log space commonly kept in /var/log

cd (Linux Command)

-used to change current directory • Nearly identical to Windows command line • Uses forward slashes instead of backward -cd <directory> • To change directories to the "/var/log" directory, you enter "> cd /var/log" at the cmd prompt

Virtual Private Network (VPN) - (Mobile Device Connectivity)

-Integrated into the phone OS (No additional software required) -Can use 3rd party party software -Can create a secure channel between the phone and another device -May require additional setup (detailed configuration settings)

Windows 8/8.1 processor requirements

-PAE (Physical Address Extension) • 32-bit processors can use more than 4 GB of physical memory -NX (NX Processor Bit) • Allows CPU to protect against malicious software from running -SSE2 (Streaming SIMD Extensions 2) • A standard processor instruction set • Used by third-party applications and drivers

Airprint (Sharing from an OS)

-Printing from an iOS device directly to a compatible printer

Color and B&W Printers

-Produces paper documents or photos

3. Disable System Restore (Removing Malware)

-Restore points make it easy to rewind • Malware infects restore points -Disable System Protection to delete all previous restore points • No reason to save an infected config -Delete all restore points • Remove all infection locations

BIOS Supervisor Password

-Restricts BIOS changes -Required to make changes to any BIOS configs

Task Scheduler

-Schedules an application or batch file to run • Plan ahead -Includes predefined schedules - Click and go -Organized - Managed through folders -Located in Control Panel under Administrative Tools

Screen sharing (Linux tools)

-Screen access to remote devices • Manage from your desk -Many options available - Like most of Linux -May be included with your distribution • Such as UltraVNC or Remmina

Level 2 Cache (L2 cache)

-Secondary level/storage of cache memory

ch modes (Linux Command)

# Permission r w x 7 Read, Write, Execute r w x 6 Read, Write r w 5 Read, Execute r - x 4 Read only r - - 3 Write, Execute - w x 2 Write only - w - 1 Execute only - - x 0 none - - -

Step 3 : Exposing

-Writes the image with the laser -Laser neutralizes every negative charge where the image will go

Windows 10 Minimum Hardware Requirements (x86)

Processor/CPU - 1 GHz processor with support for PAE, NX, and SSE2 Memory - 1 GB RAM Free disk space - 16 GB Video - Microsoft DirectX 9 graphics device with WDDM* driver *Windows Display Driver Model -Win10 32-bit

Preventing static discharge (Managing Electrostatic Discharge)

-An Anti-static strap • This connects your wrist to a metal part of the computer -An Anti-static pad • A workspace for the computer -An Anti-static mat • A grounded mat for standing or sitting -An Anti-static bag • Allows you to safely move or ship components

Small Office/Home Office (SOTO) Router

-An all-in-one device -It is a modem, router, switch, wireless AP, firewall, etc...

DVI (Digital Visual Interface)

-An interface used with displays. -It includes DVI-A for analog displays, DVI-D for digital, and DVI-I integrated for both analog and digital. -Single link; 3.7 Gbps (HDTV at 60 fps) -Dual link ; 7.4 Gbps (HDTV at 85 fps)

BD-R (Blu-ray Disc-Recordable)

-An optical Blu-ray disc that can be written to once.

Run as administrator

-Administrators have special rights and permissions • Editing system files, installing services -Uses the rights and permissions of the administrator • You don't get these by default, even if you're in the Administrators group -To Run as Administrator: • Right-click the application • Run as administrator (Or Ctrl-Shift-Enter)

Patching/OS updates (Mobile Devices)

-All devices need updates - Even mobile devices -Device patches •Security updates need to be up-to-date to close any vulnerabilities -Operating system updates •Can contain new features or fix any bugs -Don't get behind! •Updates are done automatically to avoid security problems

Replacing Laptop Storage

-All internal (either open a small cover OR remove the whole cover to locate the hard drive) -Can be very modular once the drive is located (remove a few screws and the drive slides out)

SSD (Solid-State Drive)

-All memory, no moving parts -Silent, fast access time, less latency -Better performance

Resource Pooling

-All of the computing power in one place -One large resource instead of many small resources -Small servers can be virtualized in the larger server

Disabling unnecessary accounts

-All operating systems include other accounts • guest, root, mail, etc. -Not all accounts are necessary • Disable/remove the unnecessary • Disable the guest account -Disable any interactive logins • Not all accounts need to login -Change the default usernames / passwords • User:admin Password:admin • Helps with brute-force attacks

Processes Tab

-Can view all running processes • Interactive and system tray apps • View services and processes from other accounts -Manage the view • Can move columns, add metrics -Later versions combine all apps, processes, and services into a single tab • Easy to view and sort

ps (Linux Command)

-Can view the current processes • And the process ID (PID) • Similar to the Windows Task Manager -View current user processes • "ps" command -View all processes • "ps -e | more" command

Laptop Webcam

-Captures video with built-in camera and microphone -Usually includes both audio and video -Requires specialized drivers and software

Why do you need an OS?

-Controls the interaction between the components • Such as the memory, hard drives, keyboard, CPU -A common platform for applications -A way for humans to interact with the machine • Contains a "user interface" (either by command line or GUI) • Hardware can't do everything! It needs software to tell it what to do

Content filtering (Securing SOHO Network)

-Controls traffic based on data within the content • Data in the packets -Corporate can control outbound and inbound data that contains sensitive materials -Controls inappropriate content • Not safe for work, parental controls -Can protect against evil • Anti-virus, anti-malware

Copy command

-Copy files from one location to another • copy (/v, /y) -copy /v • Verifies that new files are written correctly -copy /y • Suppresses prompting to confirm you want to overwrite an existing destination file

Community Cloud Deployment Model

-Cost associated with the cloud is shared -Many orgs. create a larger cloud and share those resources within the members of the community

Upgrade Windows 8.1 Enterprise to Windows 10

Can upgrade to: • Windows 10 Enterprise Cannot upgrade to (requires clean installation): • Windows 10 Home • Windows 10 Pro

Upgrade Windows 7 Home Basic to Windows 10

Can upgrade to: • Windows 10 Home • Windows 10 Pro Cannot upgrade to (requires clean installation): • Windows 10 Enterprise

Upgrade Windows 7 Home Premium to Windows 10

Can upgrade to: • Windows 10 Home • Windows 10 Pro Cannot upgrade to (requires clean installation): • Windows 10 Enterprise

Upgrade Windows 7 Starter to Windows 10

Can upgrade to: • Windows 10 Home • Windows 10 Pro Cannot upgrade to (requires clean installation): • Windows 10 Enterprise

Overheating (Troubleshooting Mobile Apps)

-Phone will automatically shut down to avoid damage caused by overheating -Heat comes from charging/discharging the battery, CPU usage, display light • All of them create heat -Check app usage - Some apps can use a lot of CPU -Avoid direct sunlight - Quickly overheats

Physical security (Securing SOHO Network)

-Physical access • A relatively easy hack • Highly secure data centers -Door access • Lock and key • Electronic keyless -Biometric • Eyeballs and fingers -Must be a well documented process that can be applied to any SOHO locations

Trusted vs. untrusted sources (Mobile Devices)

-Once malware is on a phone, it has a huge amount of access • In Android OS, Don't install APK files from an untrusted source -iOS • All apps are curated by Apple -Android • Apps can be downloaded from Google Play or sideloaded (3rd party) • 3rd party installs are where problems can occur

Duplexing

-Printing on both sides of the paper. -Included on some printers -additional hardware flips the page to print on the other side.

Power options Applet

• Power plans • Power usage can be customized -Sleep (standby) Option • Open apps are stored in memory • Save power, startup quickly • Switches to hibernate if power is low -Hibernate Option • Open docs and apps are saved to disk, allows system to shutdown completely • Common on laptops

ping

• Test reachability of a device • Can determine round-trip time • Uses Internet Control Message Protocol (ICMP) -One of your primary troubleshooting tools • Can you reach the host? -Written by Mike Muuss in 1983 • Named similar to the sound made by sonar • Not an acronym for Packet INternet Groper

Double Data Rate 2 (DDR2) SDRAM

-Twice as fast as DDR (Faster speeds) -Not backwards compatible with DDR slots

Thermal Printer Feed Assembly

-Pull paper through the paper -small paper path -Roller is easily replaced

Ephemeral ports

-Temporary port numbers -Ports 1,024 through 65,535 -Determined in real-time by the client

Disabling ports (Securing SOHO Network)

-disable physical ports • Conference rooms or break rooms -Administratively disable unused ports which would prevent someone going into a wiring closet and connecting to the network • More to maintain, but more secure -Network Access Control (NAC) • 802.1X controls • You can't communicate unless you are authenticated

pwd vs. passwd (Linux Command)

-pwd • Print Working Directory • Displays the current working directory path • Useful when changing directories often -passwd • Change a user account password • Yours or another • "passwd" to change your own password • "passwd [username]" to change password for a specific user

Conventional PCI (Peripheral Component Interconnect)

-referred to as PCI bus -Parallel communication -32-bit and 64-bit bus width

NFC (Near Field Communication) / Tap-to-Pay device

-~10 centimeter wireless range -Built into many phones -Many terminals accept this payment method -Identify key/door key (can be used to unlocked a door)

Windows 8/8.1 Minimum Hardware Requirements (x64)

Processor/CPU - 1 GHz processor with support for PAE, NX, and SSE2 Memory - 2 GB RAM Free disk space - 20 GB Video - Microsoft DirectX 9 graphics device with WDDM* driver *Windows Display Driver Model -Win8/8.1 64-bit

Example of a script (Scripting)

#!/bin/sh // Add the first input string INPUT_STRING=hello // Keep looping if the string isn't equal to bye while [ "$INPUT_STRING" != "bye" ] do echo "Please type something in (bye to quit)" read INPUT_STRING echo "You typed: $INPUT_STRING" done

Services tab

- Can enable and disable Windows services • Determine what starts during boot -Easier to manage than the Services applet • Click/unclick -Useful for trial and error • It may take many reboots to find your problem

Dim display (Troubleshooting Mobile Apps)

- If difficult to see the screen, even in low light -Check the brightness setting located at: • iOS: Settings / Display and brightness • Android: Settings / Display / Brightness level -If issue is not fixed, then replace the bad display - most likely a backlight issue

Laptop LCD Switch

-"Refrigerator door" effect means which screen will be used depending whether the laptop screen is open or closed -Can be a physical switch on older systems -Internal magnetic switch on newer systems -Can cause the system to go into suspend mode, functionality can be set in BIOS or a utility to either stay on or to turn off

SATA Revision 1.0

-1.5 Gbit/s -Max cable size : 1 meter

Carriage and Belt

-Holds the ink cartridges in place -May include its own print head -Moves the ink cartridges over the paper

Software firewalls

-Monitors the local computer • Alert on unknown or unauthorized network communication -Prevents malware communication • Downloads after infection • Botnet communication -Use Windows Firewall • At a minimum -Runs by default • Constantly monitoring any network connection

Retrieving Email on Mobile devices (Internet Message Access Protocol (IMAP4))

-More flexible protocol -Access mail on a central server -Mail is usually stored on the server -Supports folders and server-side searching -Configuration information needed is the name of the IMAP server and Username+Password *Network Ports* -Defined by your mail provider -IMAP : TCP/143 -SSL (Secure Socket Layer) settings - IMAPS : TCP/993

Frozen system (Troubleshooting Mobile Apps)

-Nothing works - No screen or button response -Perform a Soft reset - Hold power down and turn off -Perform a Hard reset • In iOS: Hold power and home button for 10 seconds • In Android: Combinations of power, home, and volume -Ongoing problems may require a factory reset

6. Enable System Protection (Removing Malware)

-Now that you're clean • Put things as they were • Turn on System Protection -Create a restore point manually • Start populating again

Testing the printer (Troubleshooting Windows)

-Print or scan a test page • Built into Windows printer properties • Not the application -Use diagnostic tools • Can be web-based utilities (Built into the printer) • Can be Vendor specific (Download from the web site) • Or Generic (Available in LiveCD form)

Print to Image

-Print to a graphics image (for later image editing or sharing) -Output is a picture and can be viewed with any program that understands that format -Not integrated into the OS (a feature of the application) -3rd party software print drivers are available (application may export graphics formats natively/within the software)

Cloud Printing (device sharing)

-Print to the cloud -Useful for mobile devices -Cloud sends to your printer -Cloud options available from google, brother, hp, etc...

Step 1 : Processing

-Printer is not moving -Build the entire page in memory -Needs to print entire page with one single pass -Cannot print half the page, process more info. and then print the other half

Laptop Microphone

-Built-in to the laptop -Useful for video conferencing calls -Not good for non-casual use (not high quality) -Analog or USB options can help gaming or creating content

Network shares

-Can make a folder available across the network • "Share" with others, view in Windows Explorer -Assign (map) a drive letter to a share • can set to reconnect automatically -Shares ending with a dollar sign ($) are "hidden" • Not a security feature -Located in Control Panel / Administrative Tools / Computer Management to view shared folders

Mobile Device Management (MDM) (Logical Security)

-Can manage company-owned and user-owned devices • User owned devices are referred to BYOD (Bring Your Own Device) -Centralized management of the mobile devices • Specialized functionality -Can set policies on apps, data, camera, etc. • Controls the remote device • Can control the entire device or a "partition" when managing company data and personal data -Manage access control • Forces screen locks and PINs on these single user devices

Terminal (Linux tools)

-Command line access to the operating system • Common to manage in Linux -OS maintenance • Can run scripts and manage files • Can configure OS and application settings

Terminal (Mac OS Tools)

-Command line access to the operating system • Manage the OS without a graphical interface -OS access • Run scripts, manage files • Configure OS and application settings

Windows PowerShell (Scripting)

-Command line for system administrators • Conains a ".ps1" file extension • Included with Windows 8/8.1 and 10 -Extends command-line functions • Uses and referred to as cmdlets (command-lets) • Can run as powerShell scripts and functions or standalone executables -System administrators can use Windows PowerShell to automate and integrate the OS and workstations into an AD infrastructure

Preferred Roaming List (PRL) Updates

-Common to CDMA networks (i.e., Sprint, Verizon) -Allows your phone to connect to the right tower -Can be updated Over-The-Air

Mobile Device Synchronizing to the Cloud

-Completely hands-off -No physical cables, no local files -May be integrated into your Exchange or Gmail -Sync can be done through the service provider and or WiFi -Apple iOS syncs to the iCloud -Complete backup and recovery -Android syncs to the google account

Privacy filters (Physical Security)

-Control your input • Be aware of your surroundings -Use privacy filters to lower the viewable screen -Keep your monitor out of sight • Away from windows and hallways

Boot tab

-Controls the boot location • Multiple locations and operating systems -Advanced options • Number of processors, maximum memory, etc. -Boot options • Safe boot, remove the GUI, create a boot log file, base video, OS boot information (shows drivers as they load), set timeout for booting

Types of door access controls (Physical Security)

-Conventional method • Lock and key -Deadbolt method • Physical bolt -Electronic method • Keyless, RFID badge -Token-based method • Magnetic swipe card or key fob -Biometric method • Hand, fingers or retina -Multi-factor method • Smart card and PIN

Liquid Cooling

-Coolant is circulated through a computer -Used in cars and mainframe computers -High-End systems -Gaming/Graphics processing -Used for Overclocking -CPU heatsink is different -Contains radiator and a fan

Avoid being judgmental (Professionalism)

-Cultural sensitivity at work • Use appropriate professional titles -You're the teacher • Not the warden • Leave insults on the playground -Make people smarter by spending extra time with teaching the user • They'll be better technologists -You're going to make some BIG mistakes • Remember them so that they happen again

DVI-A to VGA connector

-DVI-A includes analog signals -Backward compatible with VGA -Only 640 x 480 is officially supported -Adapter only needed when analog to analog -VGA to DVI digital requires a converter

DVI to HDMI cable/adapter

-DVI-D and HDMI are electrically compatible -HDMI is backward-compatible with DVI-D -No signal conversion required -No loss of video quality

SNMP v2

-Data type enhancements -Bulk transfers -Still in-the-clear (no encryption)

Network topology diagrams (Documentation Best Practices)

-Describes the network layout • May be a logical diagram • Can include physical rack locations

Roll back (Troubleshooting Solutions)

-Restore points • Rewind to an earlier point in time • Time travel without erasing your work -Application updates • Restore point is created automatically during application installations -Device Drivers • These can break Windows • You can roll back from the Windows start menu (F8)

Mobile device disposal (Safety Procedures)

-Wipe your data, if possible • This isn't always an option due to a broken screen -Manufacturer or phone service provider may have a recycling program or an upgrade program -Dispose at a local hazardous waste facility • Do not throw in the trash

SOHO NIC configuration

-Wired NIC -Not many options -Ports are configured for auto speed and duplex -Speed: 10/100/1000 -Duplex can be half or full -Wireless NIC -Enable/disable adapter -Select an SSID -enter password to gain access

WWAN connections

-Wireless Wide Area Network • Built-in mobile technology -Hardware adapter is installed on computer • Antenna connections -Can be USB connected or 802.11 wireless • Tether • Hotspot -Might require third-party software • Each provider is different

Graphics Workstation

-Works with software that allows Computer Aided Design (CAD) / Computer Aided Manufacturing (CAM) -Requires SSD (High speed storage) -High-end video (complex graphics) -Maximum RAM

Gestures (Mac OS Features)

-You can do more than just point and click • Extend the capabilities of your trackpad -Use one, two, three fingers • Swipe, pinch, click -Customization • Can enable/disable preferences under System Preferences > Trackpad

Laptop Touchpad On/Off Setting

-You can enable or disable this function with a FN key -Turning this option off avoids inadvertent mouse clicks and movements

Anti-virus and anti-malware

-You need both -Real-time options • Not just an on-demand scan -Modern anti-malware recognizes malicious activity • Doesn't require a specific set of signatures

Shoulder surfing

-You probably have access to important information that many people want to see • Causes curiosity, industrial espionage, competitive advantage -Surprisingly easy to do • At Airports / Flights • With hallway-facing monitors • Coffee shops -Surfing from afar • by using Binoculars / Telescopes • Easy in the big city -Webcam monitoring

Impact Printer Print Head Replacement

-directly hits ribbon and paper (Takes a lot of abuse) -Need to replace when pins stop working -Gets very hot -Look for a release lever or bar to take out component (Designed to be modular) -Can also replace ribbon for best effect

Upgrade Windows 8.1 Core to Windows 10

Can upgrade to: • Windows 10 Home • Windows 10 Pro Cannot upgrade to (requires clean installation): • Windows 10 Enterprise

Upgrade Windows 7 Ultimate to Windows 10

Can upgrade to: • Windows 10 Pro Cannot upgrade to (requires clean installation): • Windows 10 Home • Windows 10 Enterprise

Upgrade Windows 7 Professional to Windows 10

Can upgrade to: • Windows 10 Pro • Windows 10 Enterprise Cannot upgrade to (requires clean installation): • Windows 10 Home

Upgrade Windows 8.1 Professional to Windows 10

Can upgrade to: • Windows 10 Pro • Windows 10 Enterprise Cannot upgrade to (requires clean installation): • Windows 10 Home

Windows 7 Professional

Supports the following: • DVD playback • Windows Aero • Internet Connection Sharing • IIS Web Server -Supports all enterprise technologies: • Can join a domain • EFS (Encrypting File System) • Supports Remote Desktop Host -Missing enterprise technologies • BitLocker is NOT supported -x86 version supports 4gb RAM -x64 version supports 192gb RAM

cd/

Takes you back to the root of the cmd prompt

Least privilege (Logical Security)

-Rights and permissions should be set to the bare minimum • You only get exactly what's needed to complete your objective -All user accounts must be limited • Applications should run with minimal privileges -Don't allow users to run with administrative privileges • Limit the scope of malicious behavior

Mobile Device Protective Covers

-Screen protector to avoid scratches (may be difficult to install) --Device protectors -Wraps the entire device -Waterproofing options are available -Can create problems for docking stations and wireless chargers

DVI-D Dual Link

-Sends digital signals -Dual link ; 7.4 Gbps (HDTV at 85 fps)

The disk partition

-Separates the physical drive into logical pieces • Useful to keep data separated • Multiple partitions are not always necessary -Useful for maintaining separate operating systems • Windows, Linux, etc. -Formatted partitions are called volumes • Microsoft's nomenclature • Volume and Partition mean the same thing

SATA

-Serial Advanced Technology Attachment; interface that uses serial signals to transfer data, instructions, and information. -Power connector (15 pins)(A) -Data connector (7 pins)(B)

RS-232 (Recommended Standard 232)

-Serial communications standard -The USB of its time -Used to connect modems, printers, mice, networking, or devices. -Commonly used as a configuration port on a switch, firewall, router (serial console interface) -25 pin version is referred to as DB-25 -9 pin version is a modern version. It is referred to as DB-9 or DE-9 (same connection)

KVM (Keyboard, Video, and Mouse) switch

-Use many computers with a single keyboard, video display, and mouse

DisplayPort

-VESA standard -Royalty-free standard -Data is sent in packetized form (like ethernet and pci express) -Compatible with HDMI and DVI

Smart Card Reader

-Built-in or external (USB connectivity) -reads cards with embedded circuitry

Double Data Rate 4 (DDR4) SDRAM

-Max 64GB per DIMM -Faster Frequencies -Not backwards compatible with DDR3, DDR2, DDR

BIOS Secret Buttons

-Launches BIOS at system startup: Del, F1, F2, Ctrl-S, Ctrl-Alt-S

Single-mode Fiber

-Long-range communication -Over 80 km without additional processing -Expensive light source (laser beams)

USB 3.2

-New SuperSpeed+ modes over USB-C -10 Gbit/sec and 20 Gbit/sec

Step 7 : Cleaning

-Removes the excess toner from the photosensitive drum

Laptop DC Jack

-Specific to the power supply type

Laptop Storage

-Contains smaller hard drives compared to desktops -2.5in and 1.8in form factors

All-In-One (AIO)

-Multifunction (printer, scanner, copier, fax)

DVI-A (Analog)

-Sends analog signals

Even Parity Bit

-The number of bits in the sequence that add up to an even number.

PCI 533 MB/s Throughput

-Throughput of a bus running a 64-bit card at 66 MHz clock rate

Power Supply

A component that provides power to a computer

Internal USB Connector

-allows connectivity to computer case USB interfaces -located on the motherboard

Scanner

-connected via USB or 802.11 WiFi -Different form factors (AIO or Flatbed) -May include Automatic Document Feeder (ADF) -Scan scan large amount of papers with ADF

MBR partition style

• MBR (Master Boot Record) • The old standby, with all of the old limitations -Primary partition • Bootable partitions • Maximum of four primary partitions per hard disk • One of the primary partitions can be marked as Active -Extended partition • Used for extending the maximum number of partitions • One extended partition per hard disk (optional) • Contains additional logical partitions • Logical partitions inside an extended partition are not bootable

DiskPart command

• Manage disk configurations • "diskpart" - start the DiskPart command interpreter at the cmd prompt

dism (Deployment Image Servicing and Management tool)

• Manages Windows Imaging Format (WIM) files -You can make changes to your image with DISM • Get information about an image • Update applications • Manage drivers • Manage updates • Mount an image -All command-line based • Many different options • Easy to automate

Workgroups

• Non-centralized • Small departments • Each computer maintains its own user information • Managed in Control Panel / System

Shielded Twisted Pair (STP)

-Additional shielding protects against interference -Shield each pair and/or the overall cable -Also contains a grounding wire / requires the cable to be grounded

AMD Virtualization (AMD-V)

-AMD's version of virtualization

Smart Card

-Card with embedded circuitry -Used in payment cards, identification cards -Useful form of authentication (username, password, physical card)

USB to Ethernet

-Some laptops don't have an Ethernet connection -Convert USB to Ethernet

USB 3.0

-SuperSpeed -5 gigabits per second -3 meters

SNMP v1

-The original -Structured tables -In-the-clear (no encryption)

Laptop Keyboard

-Used on laptop computers -More compact -10-key touch available in larger laptops

SDRAM (Synchronous DRAM)

-Synchronous with common system clock -Queues up one process while waiting for another

Windows 8/8.1 Core

-A basic version for the home user • available in x86 and x64 versions -Integrates a microsoft account into the OS • Ability to log into your computer and all of your services -Includes Windows Defender • An integrated anti-virus and anti-malware -Supports the following: • Windows Media Player -Does not support: • Cannot join a domain • EFS (Encrypting File System) • Bitlocker • AppLocker • BranchCache -x86 version supports 4gb RAM -x64 version supports 128gb RAM

Non-compliant systems

-A constant challenge to stay in compliance when systems are deployed • There are always changes and updates -Standard operating environments (SOE) • A set of tested and approved hardware/software systems • Often a standard operating system image -Operating system and application updates • Must have patches to be in compliance • OS updates, anti-virus signatures • Needs to be checked and verified before access is given

Metered Cloud Services

-A cost for almost anything -upload a file, download a file, store a file on that cloud service have costs associated to it -A way to look at costs associated with using that app in the cloud

Software-based RAID

-A feature of the OS -Does not required special hardware -Lower performance than hardware-based

Hardware-based RAID

-A feature of the hard drive controller -Configured outside of the OS (usually invisible to the OS) -Higher performance, designed for speeds

Slow data speeds (Troubleshooting Mobile Device Security)

-A malicious application can cause the data network to go slow • Causes unusual network activity • Unintended WiFi connections • Data transmissions can go over the limit -Check your network connection • Run a WiFi analyzer • Make sure you are on a trusted WiFi network -Check network speed with a 3rd party app • Run a speed check / cell tower analyzer -Examine running apps for unusual activity • Such as large file transfers or constant network activity

Crypto-malware

-A new generation of ransomware • Your data is unavailable until you pay for the decryption key -Malware encrypts your data files • Pictures, documents, music, movies, etc. • Malware cannot be simply removed • Your OS remains available • They want you running, but not working • All personal data has been encrypted by the bad guys -You must pay the bad guys to obtain the decryption key • This encryption is powerful and cannot be brute forced • Ransom is charged through an untraceable payment system • An unfortunate use of public-key cryptography -Make sure you have an offline backup of your files in case you are infected

Computer Management

-A pre-built Microsoft Management Console • A predefined mix of plugins • Control Panel / Administrative Tools - To create your own Microsoft Management Console, you can do the following: • Go to "C:\Windows\System32" and click on "mmc.exe" • Click on Start and search for mmc.exe • cmd prompt and type in mmc.exe • You can add or remove snap-ins as needed -A handy starting point • Events • User accounts • Storage management • Services • And more!

Inventory management (Documentation Best Practices)

-A record of every asset • Routers, switches, cables, fiber modules, etc. -Required for financial records, audits, depreciation • information such as make/model, configuration, purchase date, etc. -Tag the asset once added to the database • Barcode, RFID, visible tracking number • Tagging an asset can help track the device no matter where it happens to go

Duplexing Assembly

-A two step process to print on both sides -a mechanism to flip the page automatically -Can be built-in to the printer or added as an add-on.

Secure Digital (SD) card

-A type of memory card used in digital cameras, tablets, cell phones, MP3 players, digital camcorders, and other portable devices. -The three standards used by SD card -regular SD - Up to 2GB using FAT 12 and 16 file systems -SD High Capacity or SDHC - over 2GB to 32GB using FAT32 file system -SD eXtended Capacity or SDXC - over 32GB-2TB using exFAT file system

HomeGroup Applet

-A way to easily share information • Windows 7 / Windows 8 • No HomeGroup options on Windows 10 • Documents, pictures, music, video -A network for the home • Must be set to "Home" in Windows -Enable HomeGroup • A single password is created for everyone to use

Ethernet over Power (EoP)

-Also called Power-Line Communication (PLC) -Operates at 500 Mbps -Uses existing electrical system of the building -One adapter connects to the power outlet and close to the router/modem. Other adapter connects close to the PC that needs network connectivity -Works similarly to DSL technology (electricity and data are carried at different frequencies) -No software/hardware configuration needed -Plug and Play

Storage spaces

-A windows feature -Storage primarily designed for data centers, cloud infrastructures to easily add storage space • Multiple tiers of available spaces • Different types of administrative control that can be assigned to those spaces -Storage pool • A group of storage drives • Can combine different storage devices into a single pool • Easy to add or remove space in the pool -Storage space • Virtual disks are allocated from available space in the pool • Can specify if its a standalone, mirrored, or striped virtual disk • Includes options for mirroring and parity • Hot spare available as a replacement drive

Cannot broadcast to monitor (Troubleshooting Mobile Apps)

-Ability to broadcast to a TV • Apple TV, Xbox, Playstation, Chromecast, etc. -Check the app requirements • Every broadcast device is different -All devices must be on the same wireless network • Can't mix your private and guest network -Signal strength is important • Between the phone and television • Between the television and the Internet

SOHO Access Point Settings

-Ability to enable/disable frequencies (2.4 GHz and/or 5 GHz) -Configure SSID (each frequency is different) -Choose the type of security mode -WPA2 (preferable) -Configure a pre-shared key -Configure enterprise mode (Username and password required) -Configure the bandwidth channel(s) for this connectivity

Mapping drives

-Access a share • This PC / Map network drive -Local drive letter and share name • May require additional authentication -Or use the command line: • e.g. "net use x: \\sg-server\mission-reports"

Network Attached Storage (NAS)

-Accessible from anywhere -Central location for media storage -Central location for file storage -Gigabit NIC -RAID Array -High-capacity hard drives

hot-swappable drive

-Add or remove drives while the system is running -Connection is "hot" -USB is an example -FireWire is also an example -SATA, eSATA - Part of the standard -Combine with RAID for 100% uptime

Shared files and folders

-Administrative shares • These shares are created automatically by the OS during installation process • Most of these shares are hidden from view (i.e., C$) • Local shares are created by users • Any share with a $ sign at the end of it is automatically hidden by the OS -System files and folders • C$ - \ • ADMIN$ - \Windows • PRINT$ - Printers folder -To view the shares available on the system: • Go to Computer Management > Shared Folders > Share • Or go to the cmd prompt and type in "net share"

apt-get (Linux Command)

-Advanced Packaging Tool • Handles the management of application packages • Applications and utilities -Install, update, remove software • "> sudo apt-get install wireshark" shows the command installing wireshark

InkJet Printer Calibration

-Aligns the nozzles to the paper -Lines should be crisp and color shouldn't overlap -Menu options are available on the printer itself (does not need to be connected to a system) -Minor adjustments can be made

Default usernames and passwords (Securing SOHO Network)

-All access points have default usernames and passwords • Change yours ASAP! -The right credentials provide full control • Administrator access -Very easy to find the defaults for your WAP or router • http://www.routerpasswords.com

HDMI (High-Definition Multimedia Interface)

-All digital connection (no analog) -Sends both audio and video -20 meter distance before losing too much signal -19-pin (type A) connector

miniHDMI

-All digital connection (no analog) -Sends both audio and video -20 meter distance before losing too much signal -19-pin (type A) connector -Type C connector -Designed for smaller devices

Wireless encryption

-All wireless computers are radio transmitters and receivers • Anyone can listen in -Solution: Encrypt the data • Everyone gets the password (shared password) • Or they get their own password -Only people with the password can transmit and listen • WPA and WPA2 are two common forms of wireless encryption

Windows Firewall with Advanced Security

-Allows for a more detailed control of inbound/outbound traffic -Can configure: • Inbound rules • Outbound rules • Connection security rules -Can also configure granular rules to specify: • Program • Port number • Predefined services • Custom Variables -Custom variables can include options for the rule such as: • Program • Protocol/Port • Scope • Action • Profile

SOHO UPnP (Universal Plug and Play)

-Allows network devices to automatically configure and find other network devices -Zero Configuration -Applications on the internal network can open inbound ports using UPnP -No approval needed -Used for many peer-to-peer (P2P) applications -Best practice would be to disable UPnP -Only enable if the application requires it (and maybe not even then)

Scripting and automation (Scripting)

-Allows you to automate tasks • You don't have to be there • Solve problems in your sleep • Monitor and resolve problems before they happen -The need for speed • The script is as fast as the computer • No typing or delays • No human error -Automate mundane tasks • You can do something more productive with your time

Laptop Docking Station

-Allows you to use an external kebyoard and mouse -You can extend existing laptop interfaces that are always plugged in (printers, monitors) -Expansion cards can also be connected to this device (if available) -Helps avoid cabling issues when connecting to other devices

Driver/firmware updates for Mac OS

-Almost invisible in Mac OS X • Designed to be that way -Can get hardware Information by looking in the hardware section in System Information • Detailed hardware list broken down by category -View/Read only mode • No changes can be made to the settings • This is by design

Anti-virus and anti-malware (Logical Security)

-Anti-malware software runs on the computer • Each device manages its own protection -Updates must be completed on all devices • This becomes a scaling issue -Large organizations need enterprise management • Track updates, push updates, confirm updates, manage engine updates -Mobile devices adds to the challenge • Need additional management

PII - Personally identifiable information (Privacy, Licensing, and Policies)

-Any data that can identify an individual • Part of a company privacy policy - How will PII be handled? -Not everyone realizes the importance of this data • It becomes a "normal" part of the day • It can be easy to forget its importance -Example of a breach - July 2015 • U.S. Office of Personnel Management (OPM) • Personal identifiable information was compromised • Compromised information contained Personnel file information; name, SSN, date of birth, job assignments, etc. • Approximately 21.5 million people were affected

Critical application backups (Disaster Recovery)

-Application software • Might be a simple backup • Or often distributed across multiple servers -Application data • Store in a single databases • Or data is stored throughout the application servers -Location of data • Might be stored locally and/or cloud-based -All of these are needed when doing a restore • They all work together

Account recovery options (Disaster Recovery)

-Apps won't work if users can't login • Your Windows Domain will most likely be the foundation of your recovery efforts -Consider other authentication requirements • Multi-factor authentication validation • Additional authentication databases such as RADIUS or TACACS -Another good reason for centralized administration • No local accounts

Clarify customer statements (Communication)

-Ask pertinent questions • Drill-down into the details • Avoid an argument • Avoid being judgmental -Repeat your understanding of the problem back to the customer • Did you understand the customer correctly? • Repeating information might allow for other details to arise -Keep an open mind • Ask clarifying questions, even if the issue seems obvious • Never make assumptions

Effective social engineering

-Attacks are constantly changing • You never know what they'll use next -Attacks may involve a single person or multiple people • May involve one organization or multiple organizations • There are ties that may connect many organizations -May be in person or electronic: • Phone calls from aggressive "customers" • Emails for funeral notifications of a friend or associate

Social engineering principles

-Authority • The social engineer is in charge • Social engineer might say they are calling from the help desk/office of the CEO/police -Intimidation • There will be bad things if you don't help • Social engineer might save "If you don't help me, the payroll checks won't be processed" -Consensus / Social proof • Convince based on what's normally expected • Social engineer might say "Your co-worker Jill did this for me last week" -Scarcity • The situation will not be this way for long • Social engineer might say "the changes need to be made before the time expires" -Urgency • Works alongside scarcity • Social engineer wants you to act quickly without thinking or verify the information -Familiarity / Liking • Someone you know, we have common friends • Social engineer might say "i'm a friend of yours or a friend of a friend" -Trust • Someone who is safe • Social engineer might say "I'm from IT, and I'm here to help"

SOHO Configuring NAT

-Automatic for SOHO devices -also known as Source NAT (Also called PAT - Port Address Translation) -All internal devices are translated to a single external address

Network locations in Windows 7

-Automatically sets security levels • You don't even have to remember to set the level -Home • The network is trusted -Work • You can see other devices, but can't join a HomeGroup -Public (most restrictive) • Airport, coffee shop • You are invisible

Windows 8/8.1 Enterprise

-Available to "Software Assurance" customers • Large volume licenses -Supports enterprise features such as: • Joining a windows domain • AppLocker • Windows To Go • DirectAccess • BranchCache • EFS (Encrypting File System) • Bitlocker -x86 version supports 4gb RAM -x64 version supports 512gb RAM

Public Cloud Deployment Model

-Available to everyone over the internet -Example is Amazon Web Services or Microsoft Azure

Avoid jargon (Communication)

-Avoid abbreviations and TLAs • Three Letter Acronyms -Avoid acronyms and slang • Be the translator for others -Communicate in terms that everyone can understand • Normal conversation puts everyone at ease • Decisions are based on what you say -Abbreviations, acronyms, and slang are the easiest problems to avoid

Services

-Background process • No user interaction • File indexing, anti-virus, network browsing, etc. -Useful when troubleshooting the startup process • Many services startup automatically -Command-line control • Can start/stop services with the net start/net stop command -Services is located in Control Panel under Administrative Tools • Type in "services.msc" through search or cmd prompt

Thin Client

-Basic Application Usage (applications run on a remote server) -Very little configuration (all work done on server) -Referred to as Virtual Desktop Infrastructure (VDI) -Local devices is a keyboard, mouse, and screen -Meets minimum requirements for running OS (no huge memory or CPU needs) -Network Connectivity is a must -Inexpensive to buy (easy to replace) -No local permissions required

Handling toxic waste (Safety Procedures)

-Batteries from Uninterruptible Power Supplies • Needs to be disposed of at your local hazardous waste facility -CRTs • Cathode ray tubes - there's a few of those left • Glass contains lead • Dispose at your local hazardous waste facility -Toner Cartridges • Can be recycled and reused • Many printer manufacturers provide a return box • Some office supply companies will provide a discount for each cartridge

Browser security alerts (Troubleshooting Security Issues)

-Be aware of security alerts and invalid certificates • Something isn't quite right • Should raise your interest -Look at the certificate details • Click the lock icon for more information • May be expired or the wrong domain name • The certificate may not be properly signed (untrusted certificate authority)

SOHO Port Forwarding

-Can be used to allow 24x7 access to services hosted internally (such as web servers, gaming server, security system, etc) -External IP/Port number maps to an Internal IP/Port -Does not need to be the same port number -Also called Destination NAT or Static NAT -Destination address is translated from a public IP to a private IP -Does not expire or timeout

Example of how TCP/IP works

-Can be viewed as a series of moving trucks -A truck can be used to efficiently move large amounts of data -The network topology is the road (ethernet, DSL, Cable System) -The truck is the TCP/IP -The boxes being carried by the truck are either TCP or UDP data -Inside the boxes are more things such as application information

Performance Monitor

-Can gather long-term statistics • Located in the Control Panel under Administrative Tools -Provides OS metrics - Disk, memory, CPU, etc. -Can set an alert and automated actions - can monitor and act •Counters are added to monitor metrics -Can store statistics to analyze any long-term trends -Built-in reports allows you to create detailed reports from the data -To bring up Performance Monitor: • Go to "C:\Windows\system32" and click on perfmon.msc • Click on Start and search for perfmon.msc • cmd prompt and type in perfmon.msc

Mobile Device Memory

-Can increase storage capacity of smartphone or tablet -Common on Android devices -Not available on iOS devices

Mission Control and Spaces (Mac OS Features)

-Can quickly view everything that's running • Spread out the desktop into a viewable area • Swipe upwards with three fingers or Control-Up arrow -Spaces • Multiple desktops • Add Spaces inside of Mission Control

Malware OS symptoms (Troubleshooting Security Issues)

-Can renamed or delete system files -Files disappear or are deleted • Or even encrypted -Can cause file permissions to change • Protections are modified -Access denied • Malware locks itself away • It doesn't leave easily -Use a malware cleaner or restore from known good backup • Some malware is exceptionally difficult to remove

Rapid Elasticity

-Can scale up or scale down application resources as needed -Done behind the scenes; Invisible to end-users -It is seamless to everyone

RDP (Remote Desktop Protocol) (Remote Access Technologies)

-Can share a desktop from a remote location over tcp/3389 -Remote Desktop Services available on many Windows versions -Can connect to an entire desktop or just an application -Clients for Windows, MacOS, Linux, Unix, iPhone, and others

VPN connections

-Can use the built-in VPN client • Included with Windows -Can Integrate a smart card • Multi-factor authentication • Something you know (password) • Something you have (smartcard) • Something you are (fingerprint reader) -Connect from the network status icon once the VPN connection is created • Will need to click and provide credentials

PCI 32-bit expansion card

-Card slot provides power at 3.3V or 5V -device can use either available power -Card should be able to slide in without much force. -confirm notches are lined up to the PCI slot

Event Viewer

-Central event consolidation • What happened? -Broken down into different categories • Application • Security • Setup • System -Then each one is broken down into a different priority such as: • Information • Warning • Error • Critical • Successful Audit • Failure Audit -Can obtain detailed information when troubleshooting an application or OS

Active Directory (Logical Security)

-Centralized management • Windows Domain Services • Limit and control access -Run login scripts • Can map network drives • Can update security software signatures • Can update application software -Run Group Policy/Updates • Set specific pre-define policies • Set the password complexity • Contain login restrictions -Separated Organizational Units (OU's) • Active Directory can be structured to real world departments • Can be based on the company (locations, departments) -Can set a Home Folder • Assign a network share as the user's home • e.g. \\server1\users\professormesser -Can set group policy to assign Folder redirection • Instead of a local folder, redirect to the server • Store the Documents folder on \\server1 • Access files from anywhere

Wireless LAN Controllers

-Centralized management of WAPs -Its management functions allows you to deploy new access points -Monitor performance and security -Configure and deploy changes to all sites -Report on access point use -Usually a proprietary system (wireless controller is paired with the access points) -Can also be cloud-based (manage the console from anywhere)

Credential Manager Applet

-Centralized management of web and Windows credentials • Each site can have a different username and password -Can add additional Windows credentials • Such as Certificates

System updates / App store in Mac OS

-Centralized updates - For both OS and apps in one utility -App Store application - The "Updates" option -Automatic updates • Can also be set to manual install -Patch management - Install and view previous updates

Password best practices

-Change any default usernames/passwords • All new devices have defaults • There are many web sites that document these -BIOS/UEFI passwords • Supervisor/Administrator password: Prevent BIOS changes • User password: Prevent booting -Requiring passwords • Always require passwords • No blank passwords or automated logins

Change management

-Change control • A formal process for managing change such as application upgrades, security patches, updates to a switch configuration, etc... • This is to avoid downtime, confusion, and/or mistakes -Nothing changes without the process • Determine the scope of the change • Analyze the risk associated with the change • Create a plan • Get end-user approval • Present the proposal to the change control board • Have a backout plan (plan b) if the change doesn't work • Document the changes

Incident response: Chain of custody (Privacy, Licensing, and Policies)

-Control evidence • Maintain integrity -Everyone who contacts the evidence • Avoid tampering • Use hashes -Label and catalog everything • Seal, store, and protect • User digital signatures to avoid tampering

chmod (Linux Command)

-Change mode of a file system object • r=read, w=write, x=execute • Can also use octal notation • Set for the file owner (u), the group(g), others(o), or all(a) -chmod mode FILE • > chmod 744 script.sh • The above chmod gives the following permissions "User:rwx", "Group:r--", "Others:r--" -chmod 744 first.txt • User gets read, write execute • Group gets read only • Other gets read only -chmod a-w first.txt • All users, no writing to first.txt • Sets all users permissions with the no writing to text file "first.txt" -chmod u+x script.sh • The owner of script.sh can execute the file • Sets the owner with execute permission to the "script.sh" file

chown (Linux Command)

-Changes file owner and group • Modifies file settings -sudo chown [OWNER:GROUP] file • "> sudo chown professor script.sh" changes the owner of the file "script.sh" to "professor"

Proxy settings

-Changes the traffic flow • An Internet go-between -Located in Control Panel > Internet Properties • Can define addresses and exceptions • Proxies won't work for everything

Before the installation

-Check minimum OS requirements • Memory, disk space, etc. • And the recommended requirements -Run a hardware compatibility check • Runs when you perform an upgrade • Run manually from the Windows setup screen • Windows 10 Upgrade Checker -Plan for installation questions • Drive/partition configuration, license keys, etc. -Application compatibility - Check with the app developer

Dust and debris (Environmental Impacts)

-Cleaning outside of device (computer/printer) • Use neutral detergents • No ammonia-based cleaning liquids • Avoid isopropyl alcohol -Vacuum • Use a "computer" vacuum (maintain ventilation) -Use a compressed air pump (environmental friendly) • Try not to use compressed air in a can

Licensing / EULA (Privacy, Licensing, and Policies)

-Closed source / Commercial • Source code is private • End user gets compiled executable -Free and Open Source (FOSS) • Source code is freely available • End user can compile their own executable -End User Licensing Agreement • Determines how the software can be used -Digital Rights Management (DRM) • Used to manage the use of software

Printers

-Color and B&W -All-In-One (AIO) -Connectivity via USB, Ethernet, 802.11 Wifi, or Bluetooth/Infrared

Transfer Belt and Roller

-Color laser printers have 4 different colors that they use (cyan, yellow, magenta, black) -Four separate cartridges -color is transferred from all cartridges to a single belt and then to a single transfer roller

Headset

-Combines headphones and microphones (one unit) -Desk and mobile use -Connected via USB, TRS Plug, Wireless/Bluetooth -Allows you to be handsfree while on the phone or communicate to others while gaming

Print to File

-Commonly done when working at home or away from the office -Located in the print dialog window -Prints to the work printer driver (saves it as a file) -File will be in an output format specific to that printer (wont open in another program) -Must use command line to copy the file to the printer (i.e. copy filename LPT1:)

Parallel Printer connector (wired device sharing)

-Commonly referred to DB-25 -Available in legacy systems -Centronics interface on the printer -DB-25 interface on the computer

F-Connector

-Commonly used for cable tv or cable modems -Threaded connection -RG-6 or RG-59 cable

Windows 7 Ultimate

-Complete functionality -Supports the following: • DVD playback • Windows Aero • Internet Connection Sharing • IIS Web Server -Supports all enterprise technologies: • Can join a domain • Bitlocker support • EFS (Encrypting File System) -Same features as Windows 7 Enterprise • But for the home user -x86 version supports 4gb RAM -x64 version supports 192gb RAM

Computer Power Supply

-Computer uses DC voltage -Most power sources provide AC voltage -Converts 115V AC or 220V AC to 3.3V DC, 5.5V DC, or 12V DC -You'll know when this isn't working

Maintain confidentiality (Professionalism)

-Concerns regarding privacy • You'll have access to sensitive information • Both professional and private • Whether on the computer, desktop, printer, mobile phone, desk -You have professional responsibilities • IT professionals have access to a lot of corporate data • Must maintain confidentiality -Be respectful of personal information • Treat people as you would want to be treated

Port security example (Logical Security)

-Configure a maximum number of source MAC addresses on an interface • You decide how many is too many • You can also configure specific MAC addresses -The switch monitors the number of unique MAC addresses • Maintains a list of every source MAC address -Once you exceed the maximum, port security activates • Default is to disable the interface

Locator applications and remote wipe (Mobile Devices)

-Contains built-in GPS • And location "helpers" • 802.11 can be used to triangulate location -Can assist with finding phone on a map -Have control from afar • Can make a sound • Can display a message -Can send command to wipe everything if you are not able to gain access to the phone • This is done to protect your data

SOHO Whitelist/Blacklist

-Content filtering, IP address ranges (Or a combination) -Whitelisting -Nothing will pass through the firewall unless it is approved -Very restrictive -Blacklisting -Nothing on the "bad list" is allowed -All traffic is allowed except those on the "bad list" -Specific URLS -Domains -IP addresses

How Windows gets an IP address

-DHCP (Dynamic Host Configuration Protocol) • Automatic IP addressing • This is the default -APIPA (Automatic Private IP Addressing) • There's no static address or DHCP server • Communicates locally (link-local address) • Assigns IP range of 169.254.1.0 to 169.254.254.255 • No Internet connectivity -Static address • Assigns all IP address parameters manually • Specific details will need to known

IP addressing (Securing SOHO Network)

-DHCP (automatic) IP addressing vs. manual IP addressing -IP addresses are easy to see in a unencrypted network -If the encryption is broken, the IP addresses will be obvious -Configuring a static IP address is not a security technique • Security through obscurity

Locking cabinets (Physical Security)

-Data center hardware is often managed by different groups • Responsibility lies with the owner -Racks can be installed together • placed Side-to-side -Enclosed cabinets with locks • Ventilation on front, back, top, and bottom

BitLocker and EFS

-Data confidentiality is the most important asset • Important information needs to be encrypted -Encrypting File System (EFS) protects individual files and folders • Built-in to the NTFS file system -BitLocker • Full Disk Encryption (FDE) • Everything on the drive is encrypted • Even the operating system -Home and business use • Especially on mobile devices

Risk analysis (Change Management)

-Determine the risk value of a change • i.e., high, medium, low -The risks can be minor or far-reaching • The "fix" didn't actually fix anything • The fix ends up breaking something else • Operating system failure • Data corruption -What's the risk with NOT making the change? • Are systems are open to security vulnerabilities? • Will applications become unavailable? • Or unexpected downtime to other services

tracert

-Determines the route a packet takes to a destination • Maps the entire path -Takes advantage of ICMP Time to Live Exceeded message • The time in TTL refers to hops, not seconds or minutes • TTL=1 is the first router, TTL=2 is the second router, etc. -Not all devices will reply with ICMP Time Exceeded • Some firewalls filter ICMP • ICMP is low-priority for many devices

VR headset

-Determines what you see -Motion tracking (X, Y, and Z axis) -Interacts with virtual environment -Used in gaming, education, art, travel applications

Users and Groups

-Different levels of user accounts are built into the Windows OS -Users • Administrator (The Windows super-user) • Guest (Limited access) (Disabled by default) • Standard Users (majority of users who will be logging into Windows) -Windows OS also contains different groups • Administrator, Power Users, Users, etc... • Adding a Standard User into the Power Users Group will not give that much more control than a regular user

Remote Backup (Mobile Devices)

-Difficult to backup something that's always moving • Do a backup to the cloud -Constant backup - No manual process -You can backup without wires by using the existing network • Either through the service provider or through 802.11 network -Can restore with one click on the new phone • Restores everything • Authenticate and wait

Scheduled disk maintenance in Mac OS

-Disk Utility - Disk maintenance •Rarely needed - No ongoing maintenance • Use as needed -Other Functions: • First Aid • Partition a new drive • Erase a drive • Restore a drive • Unmount a drive -Use the "First Aid" function if having disk problems • Similar to Windows Check Disk • Will examine the drive • Checks all permissions are set properly

defrag.exe

-Disk defragmentation • Moves file fragments so they are contiguous (so that they can be stored next to each other) • Improves read and write time on spinning hard drives -Not necessary for solid state drives • Windows won't defrag an SSD • Option will not be available -Graphical version in the drive properties -Requires elevated permissions at the command line to run • defrag <volume> • defrag C: - Located under C:\Windows\System32 • Can also run through the cmd line or run cmd • Graphical version in the drive properties

Heat Sink

-Dissipate heat through thermal conduction (copper or aluminum alloy) -Fins/Grid increase the surface area (heat is then transferred to the air) -Thermal paste creates a good contact between heat sink and chip. -VERY hot. Don't touch. -May find a fan on top of the heat sink in order to dissipate heat even faster.

Windows post-installation

-Does it work? • If it doesn't boot, there are bigger problems • Some testing is useful for unknown hardware configurations -Additional installations include: • Service packs • Security patches • Security applications • Driver updates • Application updates

Thermal Printer

-Does not have ink or toner -Contains special type of paper -Paper is heated when passing through the printer, the heated spots are then turned black -Common use for receipts -Very quiet (almost silent) -Paper is very sensitive to heat (turns the paper black) or light/clear tape (page will fade over time) -Not used to archive important docs due to sensitivity

Signal drop / weak signal (Troubleshooting Mobile Device Security)

-Drops and weak signals prevent traffic flow • Location is everything -Make sure you're connecting to a trusted WiFi network • Use a VPN if you are not • Never trust a public WiFi Hotspot • Tether with your own device (Hotspot) -Run a speed test if you are unsure you have good connection • Run a cell tower analyzer and test

Boot Camp (Mac OS Features)

-Dual-boot into Windows on Mac hardware -Requires Apple device drivers • Run Windows on Apple's Intel CPU architecture -Everything is managed through the Boot Camp Assistant • Builds a Boot Camp partition • Installs Windows OS and drivers

Bluetooth Pairing Process (Mobile Device Connectivity)

-Enable BT on both devices -Set devices in discoverable mode (may require key sequence on BT device) -Select discovered device (many may appear) -Enter or confirm PIN (numbers should be the same) -Pin may not be required -Test connectivity once paired

GDPR - General Data Protection Regulation (Privacy, Licensing, and Policies)

-European Union regulation • Data protection and privacy for individuals in the EU • Protects name, address, photo, email address, bank details, posts on social networking websites, medical information, a computer's IP address, etc. -Controls export of personal data by the user • Users can decide where their data goes -Gives individuals control of their personal data • A right to be forgotten (User can have all information deleted) -Located on the site's privacy policy • Shows all details of the privacy rights for a user

SOHO Firewall and DMZ Ports

-Every SOHO router is also a firewall -No external devices can directly access the internal network -This normally cannot be disabled -Demilitarized Zone ports can be configured to allow unrestricted access (almost always a bad idea) -need to consider creating more specific port forwarding rules OR dont allow any access

Network Interface Card (NIC)

-Every device on the network has one whether its wired or wireless that allows connectivity to the network (such as computers, servers, printers, routers, switches, phones, tablets, cameras, etc.) -Specific to the network type such as wired or wireless -Often built-in to the mobo -Many options such as single port, multi-port, copper, fiber, WAN, etc.

Devices and Printers Applet

-Everything on the network • Desktops, laptops, printers, multimedia devices, storage -Quick and easy access • Much less complex than Device Manager • Can right mouse click and view Properties and make device configurations

Explicit and inherited permissions

-Explicit permissions • Sets default permissions for a share • Setting manual permissions makes it explicit -Inherited permissions • Propagated from the parent object to the child object • Set a permission once so that it applies to everything underneath -Explicit permissions take precedence over inherited permissions • Even inherits deny permissions • Parent object can have deny permissions but can set allow permissions to a child object of the parent object (Explicit permissions)

Installing applications

-Extend the functionality of your operating system • Specialized applications extend system functionality such as word processing, spreadsheets, graphics capabilities, etc... -Available everywhere • Find the application you need • Install on your operating system -Not every computer can run every application • Some simple checks can help manage your desktop

Expansion Card installation

-Extends functionality of the computer -Simple to install (Install the hardware then install the software or vice versa) -Check mobo documentation (make sure it supports the type and size of card) -Check adapter card documentation for hardware and software requirements

Secure DNS services

-External/Hosted DNS service • Provides additional security services -Real-time domain blocking • Sites containing malware are not resolvable -Blocks harmful websites • Phishing sites, parked domains -Runs on a secure platform •Avoids poisoning attacks to the DNS cache

Safe Mode - Windows 10 (Troubleshooting Solutions)

-F8 probably won't work • Windows Fast Startup in Windows 8/8.1 and 10 prevents a complete shutdown -From the Windows desktop • Hold down shift when clicking Restart • Or choose Settings > Update & Security > Recovery > Advanced startup > Restart now • This configuration can also be enabled in System Configuration (msconfig) -If you dont have access to the desktop, Interrupt normal boot three times so the system can present the boot option screen

Dock (Mac OS Features)

-Fast access to apps • Quickly launch programs -View running applications • Dot underneath the icon -Keep folders in the dock • Easy access to files -Move to different sides of the screen • Auto-hide or always display

NTFS vs. Share permissions

-File access is controlled by either NTFS permissions or Share permissions -NTFS permissions apply from local and network connections -Share permissions only apply to connections over the network • A "network share" -The most restrictive setting wins • Deny access beats allow access -NTFS permissions are inherited from the parent object • Will keep the same permissions if the data is moved within the same volume • If data is moved to a different volume, then the permissions will be associated with where its placed in that volume.

RAID 0 (Striping)

-File blocks are split between physical drives -High performance (data written quickly) -Zero redundancy (drive failure breaks the array) -Minimum of 2 drives

RAID 5 (Striping with Parity)

-File blocks are striped along with a parity block -Efficient use of disk space (files aren't duplicated but space is still used for parity) -High redundancy (data available after drive failure; parity calculation may affect performance) -Minimum of 3 drives

Firewalls

-Filters traffic by TCP/UDP port number (OSI Layer 4 filtering) -Some can filter based on the application -Can encrypt traffic in/out of the network (protect traffic between sites) -Can proxy traffic (common security technique) -Can be used as a Layer 3 device (routers) -Usually sits on the ingress/egress of the network to do routing or NAT'ing

Network-based firewalls (Logical Security)

-Filters traffic by port number • HTTP is 80, SSH is 22 • Next-generation firewalls can identify the application -Can encrypt traffic into/out of the network • Protect your traffic between sites using a VPN tunnel -Can proxy traffic • A common security technique -Most firewalls can be configured as layer 3 devices (routers) • Usually sits on the ingress/egress of the network

Denial of service

-Forces a service to fail • Caused by overloading the service -Takes advantage of a design failure or vulnerability • Keep your systems patched! -Causes a system to be unavailable • An attack to give a competitive advantage -Can create a smokescreen for some other exploit • A precursor to a DNS spoofing attack -Doesn't have to be complicated • Simply turning off the power can be considered a denial of service

Linux History

-Free Unix-compatible software system • Unix-like, but not Unix -Many (many) different distributions • Such as Ubuntu, Debian, Red Hat / Fedora -Advantages • Cost. Free! • Works on wide variety of hardware • Has a Passionate and active user community -Disadvantages • Limited driver support, especially with laptops • Limited support options

Man-in-the-middle (MITM) attack

-How can a bad guy watch without you knowing? • This is a Man-in-the-middle attack -This attack is designed to get the attacker between the user and the other device • It redirects your traffic • Then passes it on to the destination • You never know your traffic was redirected -A common way to perform a MITM attack is through ARP poisoning • ARP has no security

TCP/IP host addresses

-IP Address - Unique identifier • Subnet mask - Identifies the subnet • Gateway - The route off the subnet to the rest of the world -DNS - Domain Name Services • Converts domain names to IP addresses -DHCP - Dynamic Host Configuration Protocol • Automates the IP address configuration • Addresses can be dynamic or static -Loopback address - 127.0.0.1 - It's always there!

User authentication (Logical Security)

-Identifier • Something unique • In Windows, every account has a Security Identifier (SID) -Credentials • This information is used to authenticate the user on their system • A password, smart card, PIN code, etc. -A profile is associated to the user once logged in • Stores information about the user • Contains name, contact information, group memberships, etc.

Pop-ups (Troubleshooting Security Issues)

-If Pop-ups appear in your browser • It may look like a legitimate application • Might be a malware infection -Update your browser • Use the latest version • Check pop-up block feature -Scan for malware • Consider a cleaning (Not a guarantee) • Rebuild from scratch or known good backup to guarantee removal

Starting the system (Troubleshooting Windows)

-If a device is not starting • Check Device Manager and Event Viewer • Often a bad driver • Remove or replace driver -If "One or more services failed to start" • Could be a bad/incorrect driver, bad hardware • Try starting the service manually in services.msc • Check account permissions • Confirm/Check service dependencies • Windows service; check system files • Application service; reinstall the application

Application crashes (Troubleshooting Windows)

-If application stops working • May provide an error message • May just disappear -Check the Event Log • Often includes useful reconnaissance -Check the Reliability Monitor • A history of application problems • Checks for resolutions -Reinstall the application • If reinstalling does not work, contact application support

Application crashes (Troubleshooting Security Issues)

-If application stops working • May provide an error message • May just disappear -Check the Event Log • Often includes useful reconnaissance -Check the Reliability Monitor • Application might have a history of problems • Check for resolutions -Reinstall the application • OR contact application support if problem persists

Slow boot (Troubleshooting Windows)

-If boot process hangs or takes longer than normal • No activity, no drive lights -Manage the startup apps • Control what loads during the boot process -Check Task Manager • under Startup tab • Startup impact, Right-click / Disable -Or Disable everything • And load them back one at a time

Wireless connectivity (Troubleshooting Mobile Apps)

-If getting Intermittent connectivity • Move closer to access point • Try a different access point -If not getting any wireless connectivity • Check/Enable WiFi on the system • Check security key configuration • Hard reset can restart wireless subsystem -IF no Bluetooth connectivity • Check/Enable Bluetooth • Check/Pair Bluetooth components • Hard reset to restart Bluetooth subsystem

Startup Repair (Troubleshooting Windows)

-If missing NTLDR • The main Windows boot loader is missing • Run Startup Repair or replace manually and reboot • Disconnect removable media -If missing operating system • Boot Configuration Data (BCD) may be incorrect • Run Startup Repair or manually configure BCD store -If booting into Safe Mode • Windows is not starting normally • Run Startup Repair

No sound from speakers (Troubleshooting Mobile Apps)

-If no sound from a particular app • Check volume settings - Both app and phone settings • Possible bad software > delete and reload • Try headphones to test if its the device speakers or there is no audio at all -Sound starts but then stops • Might have dueling apps / keep on app in foreground -No speaker sound from any app (no alarm, no music, no audio) • Load latest software device software • Or perform factory reset

System lock up (Troubleshooting Security Issues)

-If system completely stops • Check Caps Lock and Num Lock indicator lights for a status to verify if the system is responding -May still be able to terminate bad apps once you are logged in • In Windows and Linux Task Manager (Ctrl-Alt-Del / Task Manager) • In Mac OS X Force Quit (Command-Option-Esc) -Check system logs when restarting • May have some clues about what's happening -May be a security issue • Perform a virus/malware scan -Perform a hardware diagnostic • System issues can be a factor

Inaccurate touch screen response (Troubleshooting Mobile Apps)

-If the screen responds incorrectly or is unresponsive -Close some apps - Low memory can cause resource contention -Restart the device • Perform a soft reset, unless a hard reset is required -May require a hardware fix • Replace the digitizer / reseat cables

Leaked information (Troubleshooting Mobile Device Security)

-If unauthorized access was made to your device such as: • Unauthorized account access • Unauthorized root access • Leaked personal files and data -Determine cause of data breach • Find the source of the leak • Perform an app scan, run anti-malware scan -Perform a factory reset and clean install if the breach was done on the actual device • This is obviously a huge issue -Breach might've been done where the device stores it data (cloud). Check online data sources such as: • Apple iTunes/iCloud/Apple Configurator • Google Sync • Microsoft OneDrive -CHANGE PASSWORDS

Apple Mac OS history

-Mac OS • Desktop OS running on Apple hardware -Advantages • Easy to use • Extremely compatible • Relatively fewer security concerns -Disadvantages • Requires Apple hardware • Less industry support than the PC platform • Higher initial hardware cost

Incident response: First response (Privacy, Licensing, and Policies)

-If you are the first to Identify the issue • You might have log information • You might've seen the incident in person • You might have monitoring data -Report the incident to the proper channels • Don't delay -Collect and protect information relating to an event • Many different data sources and protection mechanisms

Boot errors (Troubleshooting Windows)

-If you can't find operating system • Bootup shows the OS is missing -Or a Boot loader is replaced or changed • Due to multiple OSes installed -Check your boot drives • BIOS might be configured to boot from a DVD-rom or USB drive • Remove any media such as USB drives or check the DVD-Drive -Startup Repair utility included in Windows • Checks every step along the boot process • Identifies problems and corrects them -May need to perform manual configuration to modify the Windows Boot Configuration Database (BCD) from the command prompt • Formerly boot.ini • Recovery Console: "bootrec /rebuildbcd" will look for installed versions of windows. Gives the option to add to its list if any are found.

Black screen (Troubleshooting Windows)

-If you get no login dialog or no desktop • issue might be driver corruption or corruption with OS system files -If changes were recently made to video settings or new video drivers were installed • Start in VGA mode for lower resolution • Press F8 for startup options -If you believe the issue is related to the OS system files • Run SFC - System File Checker • Runs from recovery console • If SFC finds any invalid files, it will replace that file and boot the system with the recovered files -If the problem is related to a video driver • Update driver in Safe Mode or VGA Mode • Download from known good source -Repair/Refresh or recover from good known backup

Backup strategies (Disaster Recovery)

-Image level backup • Incorporates everything in a server or device and creates a single image from all of that data • Can use a bare metal (server with no OS) and apply this image backup • Consists of volume snapshots or hypervisor snapshots (VM) of the operating system • Can recover the entire system at once • Image level backup allows you to make an exact duplicate of the server -File level backup • Only copies important files • Copies individual files to a backup • May not necessarily store all system files • May need to rebuild the OS and then perform a file restore

Firewall settings (Securing SOHO Network)

-Inbound traffic • Extensive filtering and firewall rules • Allow only required traffic • Configure port forwarding to map TCP/UDP ports to a device • Consider building a DMZ -Outbound traffic • Blacklist - Allow all traffic, stop only unwanted traffic • Whitelist - Block all traffic, only allow certain traffic types

Infrared (IR) Connections

-Included in many smartphones, tablets, and smartwatches -Not really used for file transfers and printer -Found mostly on android devices -Mostly controls entertainment centers (almost exclusively)

POST (Power-On Self-Test)

-Initiated by BIOS at boot-up -Looks for CPU and Memory -Checks to see if there is a display connected and keyboard -If all passes, it then begins to look for a boot loader (to start the OS)

Kill tasks (Troubleshooting Solutions)

-Instead of rebooting, find the problem • And kill it -Done in Task Manager under the Processes tab -Sort by resource - CPU, memory, disk, network -Right-click to end task • Trial and error

Touchpad

-Integrated into keyboard -Connected via USB or Bluetooth for external connectivity -May be standalone device -Replaces a mouse

Print head

-Integrated into the ink cartridges on consumer printers -A new one comes with the cartridge when it is swapped out -Does not come integrated with the ink cartridges with larger commercial printers -Can be swapped out individually

Windows (Defender) Firewall

-Integrated into the operating system -Located in Control Panel / Windows Firewall In Windows 7 & 8 -Located in Control Panel / Windows Defender Firewall in Windows 10 -Windows Firewall with Advanced Security • Click "Advanced settings" -Fundamental firewall rules (basic functionality) • Allows apps to send/receive traffic • Based on applications • No detailed control -No scope can be set • All traffic applies (inbound/outbound) -No connection security rules • Can't encrypt with IPsec tunnels

Screen sharing (Mac OS Tools)

-Integrated into the operating system • Can also be viewed with VNC (Virtual Network Computing) -Available devices appear in the Finder • Or access by IP address or name

Memory diagnostics

-Is your memory working? • I don't remember -May be launch automatically • Or launched manually - Will run multiple passes • Will Try to find the bad chip/module -Located in Control Panel under Administrative Tools

Temporal Key Integrity Protocol (TKIP)

-It mixed the keys • It combined the secret root key with the Initialization Vector (IV) -Provided a sequence counter • Prevents traffic from replaying in the wireless network -Implemented a 64-bit Message Integrity Check • To protect against wireless data tampering as it went across the wireless network -TKIP also had it's own set of vulnerabilities • Was removed from the 802.11-standard in 2012

Disable startup services / apps (Troubleshooting Solutions)

-It's difficult to tell what application might be a problem child • Since much of the underlying OS operations are hidden from view -Trial and error method • Disable all startup apps and services • Or disable one at a time • This might take quite a few restarts -Manage startup processes in Windows 7, 8 or 10 • Located in Task Manager or in Control Panel > Administrative Tools > Services

4a. Remediate: Update anti-virus (Removing Malware)

-Keep signatures and engine updated • The engine - the guts of the machine • Signature updates - constantly updated -Automatic vs. manual • Manual updates are almost pointless since it updates automatically -Your malware may prevent the update process • Download from another computer and copy onto a removable drive to install into infected pc

Windows at work

-Large-scale support • Thousands of devices supported by IT -Security concerns • Mobile devices with important data that needs to stay safe • Local file shares -Wide varieties of purposes such as the Accounting Dept. working on a spreadsheet • Or Marketing Dept. having the need to play videos -Geographical sprawl - Not all systems are in the same building • Need a way to managed cache data between the sites slow WAN connections

Distributed Denial of Service (DDoS)

-Launches an army of computers to bring down a service • Uses all the bandwidth or resources - causes a traffic spike -This is why the bad guys have botnets • Thousands or millions of computers at your command • At its peak, Zeus botnet infected over 3.6 million PCs • Attacks are coordinated -The attackers are zombies • Many people have no idea they are participating in a botnet • Users might not know they are running malware on their computer

Storage types

-Layered on top of the partition and file system • A Windows thing -Basic disk storage • Available in DOS and Windows versions • Primary/extended partitions, logical drives • Basic disk partitions can't span separate physical disks -Dynamic disk storage • Available in all modern Windows versions • Span multiple disks to create a large volume • Split data across physical disks (striping) • Duplicate data across physical disks (mirroring) • Not all Windows versions support all capabilities

Bluetooth printer connectivity (Wireless Device Sharing)

-Limited range for connectivity -can print directly to a printer from a mobile device

Applications Tab

-Lists user-interactive applications in use • Apps on the desktop -Administratively control apps • End task, start new task -Combined with the Processes tab in Windows 8/8.1/10

Laptop Batteries

-Lithium Ion (Li-ion) -Common in consumer electronics -No "memory effect" (does not need to be discharged completely) -Charging diminishes the capacity (will not fully charge after time) -Comes in different form factors for each laptop

Other considerations

-Load alternate third party drivers when necessary • Disk controller drivers, etc. -Workgroup vs. Domain setup • Home vs. business -Time/date/region/language settings • Where are you? -Driver installation, software and windows updates • Load video drivers, install apps, update the OS -Factory recovery partition • This can help you later

User Accounts Applet

-Local user accounts • Located in Control Panel under "User Accounts" • Domains accounts are stored elsewhere -Creating local account requires account name and type • Can change password • Can change picture • Can associate a certificate information for a particular user

Deleting Windows profiles (Troubleshooting Solutions)

-Login to the computer with Domain Administrator rights -Rename the \Users\name folder such as user.old • This will save important files -Backup the user's registry • HKLM\SOFTWARE\Microsoft\Windows NT\ CurrentVersion\ProfileList • Right-click and Export • Delete the registry entry - (You have a backup) • Restart the computer

Reconstructing Windows profiles (Troubleshooting Solutions)

-Login to the computer with the user account • The profile will be rebuilt with no files • This will recreate the \Users\name folder -Once the account is created, log out of the user account and login as Domain Administrator • Copy over any important files from the old profile such as documents located under "Desktop" or "My Documents" -Do not copy the entire profile • Corrupted files might exist in the old profile -Logout as Domain Administrator, Log back in with the user account

Slow system performance (Troubleshooting Windows)

-Look in Task Manager • Check for high CPU utilization and I/O • Check Processes Tab for memory usage • Check Performance Tab for spikes -If you think issues may be related to applications and software • Run Windows Updates • To get the latest patches and drivers • To update software and applications -Check Disk space • Check for available hard drive space and defrag (if needed) -Laptops may be using power-saving mode • This throttles the CPU which can cause slowness -Perform Anti-virus and anti-malware • Scan for possible bad guys

nslookup

-Lookup information from DNS servers • Canonical names, IP addresses, cache timers, etc. -Lookup names and IP addresses • Many different options

Scripting characteristic (Scripting)

-Loops • Perform a process over and over • Loop a certain number of times • Loop until something happens -Comments • Annotate the code as its being created • Allows for others to understand what it does

Clearing Jams

-Lots of turns and twists -Remove paper tray and check for loose paper -Remove paper from the path (firm pressure when removing paper so it doesnt rip) -Open the cover to check for any loose paper

Anti-virus/Anti-malware updates for Mac OS

-Mac OS does not include anti-virus • Or anti-malware -Many 3rd-party options are available • From the usual companies • Can be installed into Mac OS -An emerging threat • Still doesn't approach Windows • It's all about the number of desktops -Automate your signature updates • Make sure all new updates are installed to be secured from threats every hour/day

Document changes (Change Management)

-Make sure everyone knows a change has been made • Everyone needs to know -Help desk documentation that needs to be updated such as: • Version numbers, network diagram, new server names -Track changes over time • Cross-reference against help desk tickets -Track before and after statistics • Has it been better or worse?

Virus

-Malware that can reproduce itself with your assistance • It needs you to execute a program -Reproduces through file systems or the network • Just running a program can spread a virus -May or may not cause problems • Some viruses are invisible, some are annoying -Anti-virus is very common • Thousands of new viruses every week • Make sure your anti-virus software is updated

Worms

-Malware that self-replicates • Doesn't need you to do anything • Uses the network as a transmission medium • Self-propagates and spreads quickly -Worms are pretty bad things • Can take over many systems very quickly -Firewalls and IDS/IPS can mitigate many worm infestations • Doesn't help much once the worm gets inside • Make sure to keep anti-malware updated

Spyware

-Malware that spies on you • Presents you with advertising • Waits for you to log into a bank account (identity theft) • Captures credit card numbers (affiliate fraud) -Can trick you into installing • Peer to peer software, fake security software -Browser monitoring • Captures surfing habits -Keyloggers • Captures every keystroke (such as username and password) and sends it back to the mothership/creator

Policies and procedures (Mobile Devices)

-Manage company-owned and user-owned mobile devices • BYOD - Bring Your Own Device where you can use your personal device for work -Centralized management of the mobile devices • Specialized functionality/Mobile Device Manager (MDM) -MDM can set policies on apps, data, camera, etc. • Control the remote device • The entire device or a "partition" -Can manage access control • Force screen locks and PINs on these single user devices

TaskList and TaskKill command

-Manage tasks from the command line • No Task Manager required! -tasklist • Displays a list of currently running processes • Local or remote machine -taskkill • Terminate tasks by process id (PID) or image name • TASKKILL /IM notepad.exe - kills the notepad.exe process by image name • TASKKILL /PID 1234 /T - kills the process identifier (PID) by number

System Configuration (msconfig)

-Manages boot processes • Windows startup applications • Windows services -There are 5 tabs in system configuration • General • Boot • Services • Startup • Tools • Located in Control Panel under Administrative Tools • OR type "msconfig.exe" in cmd prompt or in search bar

Startup tab

-Manages which programs start with a Windows login • Easily toggle on and off -Multiple reboots needed before locating the troublesome application during troubleshooting (You'll find it) -This feature has moved to the Task Manager in Windows 8/8.1/10

Zero-day attacks

-Many OS's or applications have vulnerabilities • They just haven't discovered them yet -Someone is working hard to find the next big vulnerability • The good guys share these with the developer -Bad guys keep these yet-to-be-discovered holes to themselves • They want to use these vulnerabilities for personal gain or to sell -Zero-day • The vulnerability has not been detected or published • Zero-day exploits are increasingly common -Known vulnerabilities can be found at Common Vulnerabilities and Exposures (CVE) • http://cve.mitre.org/

Driver/firmware updates (Linux)

-Many drivers are in the kernel • Updated when the kernel updates -Additional drivers are managed with software updates or at the command line • Update those yourself

System / application log errors (Troubleshooting Security Issues)

-Many errors go undetected • The details are in the log (Event Viewer) -It may take some work to find them • Filter and research -Find security issues • Improper logins • Unexpected application use • Failed login attempts

Data Loss Prevention (DLP) (Logical Security)

-Many organizations deal with sensitive information such as Social Security numbers, credit card numbers, medical records • Security admin wants to limit the type of information is transferred across the network. -Stop the data before the bad guys get it • common to use this software and hardware to monitor what traffic is being transferred across the network and why type of info. is attached inside any emails. • Protects against this type of data "leakage" -So many sources, so many destinations • Often requires multiple solutions in different places

Zero-day vulnerabilities

-March 2017 • CVE-2017-0199 - Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API • The vulnerability would take effect by a user opening a Microsoft Office or WordPad file • SophosLabs documented these attacks since November 2016 (patch was released March 2017) -May 2019 • CVE-2019-0863 - Windows Error Reporting Service • Elevation of privilege vulnerability • Windows Error Reporting interacting with files allowed a standard user with administrator rights and permissions • Access was elevated on compromised systems • Regular accounts were able to run with admin access • Vulnerability has been around for at least 10 yrs. (discovered in the wild) • Considered a Zero-Day Attack

Category 5 cable (Cat 5)

-Max Supported Ethernet Standard - 100BASE-TX, 1000BASE-T -Max Supported Distance - 100 meters

Category 3 cable (Cat 3)

-Max Supported Ethernet Standard - 10BASE-T -Max Supported Distance - 100 meters

Category 6A (augmented)

-Max Supported Ethernet Standard - 10GBASE-T -Max Supported Distance - 100 meters

Category 6 cable (Cat 6)

-Max Supported Ethernet Standard - 10GBASE-T -Max Supported Distance - 37 to 55 meters

Backups (Linux tools)

-May be built-in to the Linux distribution • Check with the documentation to see which options are available -Graphical interface • Can backup and restore • Can schedule a backup -Command-line options - rsync • A common utility used to sync files between devices -There are many different options • That's the beauty (and challenge) of Linux

Watt (W)

-Measurement of real power use -volts * amps = watts -e.g. 120V * 0.5A = 60W

MAC address filtering (Securing SOHO Network)

-Media Access Control • The "hardware" address -Can limit access through the physical hardware address • Keeps the neighbors out of the network • Additional administration with visitors -Easy to find working MAC addresses through wireless LAN analysis • MAC addresses can be spoofed by free open-source software -An example of Security through obscurity

MAC filtering (Logical Security)

-Media Access Control • The "hardware" address -Limit access through the physical hardware address • Keeps the neighbors out • Additional administration with visitors -Easy to find MAC addresses through wireless LAN analysis • MAC addresses can be spoofed with open-source software -Refer to as Security through Osbcurity • If the security method is known, it can easily be circumvented

mmc.exe

-Microsoft Management Console • Can build your own management framework • Choose from list of available "snap-ins" -Framework used for many built-in management tools - Located under C:\Windows\System32 • Can also open through the cmd line or Run cmd

Print to XPS (XML Paper Specification)

-Microsoft virtual output type -Similar use case to Adobe PDF -Available all the way back to Windows XP -Included in Windows -viewable with any system that has an XPS reader

4b. Remediate: Scan and remove (Removing Malware)

-Microsoft, Symantec, McAfee • The big anti-virus apps -Malwarebytes Anti-Malware • Malware-specific -Stand-alone removal apps • Check with your anti-virus company -There's really no way to know if it's really gone • End result may be to delete and rebuild to guarantee 100% removal

Imaging Drum

-Middle man between the laser and printed image on the page -Image is drawn onto a photosensitive drum ("painted" with a laser) -Picks up toner and transfers it to paper -Can be separate or combined with toner cartridge

Mobile Device Speakers

-Mobile audio (battery powered) -Can connect with a bluetooth connection -More of a stereo sound

Firewalls (Mobile Devices)

-Mobile phones don't include a firewall • Most activity is outbound, not inbound -Some mobile firewall apps are available • Mostly for Android • None seem to be widely used -Enterprise environments can control mobile apps • Firewalls can allow or disallow access

Dialup connections

-Modem connection • Standard phone lines -Configuration will require: • Authentication • Phone number -Can connect/disconnect from network status icon

Multi-factor authentication (Logical Security)

-More than one factor of authentication • Something you are (biometric = fingerprint) • Something you have (smartcard or mobile phone) • Something you know (password) • Somewhere you are (GPS check) • Something you do (signature) -Can be expensive when implementing • assigning separate hardware tokens that generates a random number -Inexpensive methods include: • Free smartphone applications • Software-based token generator

VM Network requirements

-Most client-side vm managers have their own virtual (internal) networks -Shared Network Address - the VM shares the same IP address as the physical host; The VM uses a private IP address internally, Which NAT is able to convert to the physical host IP. Allows communication between internal IP (VM) to the external IP (physical host) -Bridged Network Address allows the VM to have its own IP and be on the physical network. Either through DHCP or Static. -Private Address does not allow the VM to communicate outside of virtual network. Only communicates to other VM's that are on that private network.

Equipment grounding (Safety Procedures)

-Most computer products connect to ground • Divert any electrical faults away from people -This also applies to equipment racks in the data center • Large ground wire -Don't remove the ground connection • It's there to protect you -NEVER connect yourself to an electrical ground • This is not a way to prevent ESD • Never connect yourself to any source with voltage on it

ipconfig

-Most of your troubleshooting starts with your IP address • Ping your local router/gateway -Determine TCP/IP and network adapter information • And some additional IP details such as IP address, subnet mask, default gateway -View additional configuration details with typing "ipconfig /all" • Shows details for DNS servers, DHCP server, etc

SmartPhone

-Most popular mobile device -Can make calls, text, emails, instant message -Can take pictures, see movies, hear music -From ~3.5in to 6in diagonally -Can view maps and travel information -Can support specialized, productivity, gaming apps.

CPU Sockets

-Motherboards are matched with CPU's -CPUs have specific socket requirements -Usually the largest thing on the board -Usually central to everything -Not easily upgradable (and often not an option)

mv (Linux Command)

-Move a file • used to rename a file -mv SOURCE DEST • to rename first.txt to second.txt, you use the command "> mv first.txt second.txt"

Biometric authentication (Mobile Devices)

-Multi-factor authentication • Combining different methods of authentication • Can use a passcode, password, or swipe pattern • Also use a fingerprint, face, or iris -A phone is always with you • And you're a good source of data -We're just figuring this out (Its not perfect) • Biometrics have a long way to go for security • Always use as many factors as necessary

A backup for the DHCP server

-Multiple DHCP servers should be configured for redundancy • So that one is always be one available -If a DHCP server isn't available, Windows uses the Alternate Configuration (Only if DHCP is not available) • The default is APIPA addressing -You can also configure a static IP address

End-user acceptance (Change Management)

-Nothing will happen without a sign-off • The end users of the application / network need to be aware of a change, possible downtime, and timeframe -One of your jobs is to make them successful • They ultimately decide if a change is worth it to them -Ideally, this is a formality • Of course, they have been involved throughout the entire process • There's constant communication before and after

1. Identifying malware symptoms (Removing Malware)

-Odd error messages may appear • Application failures • Security alerts -May cause system performance issues • Slow boot-up • Slow applications -Research the malware • Research the messages to now what you're dealing with • Research any fake applications that appear

Update network settings (Troubleshooting Solutions)

-One configuration mismatch can cause significant network slowdowns • Know the speed and duplex configuration between the device and the connected switch • make sure they match on both -Most auto negotiations work fine • Device and Switch will choose the best setting for speed and duplex and confirm they match on both sides • Does not work 100% of the time due to certain chipsets or network configurations -Driver properties may not show the negotiated value of auto negotiation • For that info, look in network details at the command line or filter through the Event Viewer -Device should match the switch • Both sides should be identical • Any mismatches will cause errors or slowdowns across the network

Emulation characteristics

-One device running processes designed for a completely different architecture -A device pretending to be another -Original code is still being used from that original system -Code is used to interpret to run on the current hardware -Commonly slower than running natively -Not easy to do

FAT (File Allocation Table)

-One of the first PC-based file systems (circa 1980) -FAT32 - File Allocation Table • Larger (2 terabyte) volume sizes • Maximum file size of 4 gigabytes • Most common file type -exFAT - Extended File Allocation Table • Microsoft flash drive file system • Files can be larger than 4 gigabytes

Communication skills (Communication)

-One of the most useful skills for the troubleshooter -One of the most difficult skills to master -A skilled communicator is incredibly marketable

7. Educate the end user (Removing Malware)

-One on one personal training -Place posters and signs in high visibility -Physical message board postings -Login messages as a quick reminder (switch often) -On the Intranet page that explains more about malware and what should be done if you suspect you are infected with malware

End user education

-One on one with end users • Personal training -Posters and signs as reminders • High visibility -Message board posting • The real kind -Login messages • These become invisible -Intranet page resources • Always available to the user

Protecting against non-compliant systems

-Operating system control to make sure they stay in compliance • Apply policies that will prevent non-compliant software -Monitor the network for application traffic • Next-generation firewalls with application visibility -Perform periodic scans and compliance checks • Login systems can scan for non-compliance • Requires correction before the system is given access • If the scan shows the system is not in compliance, a message can be shown to guide the user on bringing them back into compliance

Rootkits

-Originally a Unix technique • The "root" in rootkit -Modifies core system files • Becomes part of the kernel -Can be invisible to the operating system • Won't see it in Task Manager -Also invisible to traditional anti-virus utilities • If you can't see it, you can't stop it

Thermal Paper

-Paper covered with a chemical -Changes color when heated -Common in receipt printers or credit card terminals (used in quiet ares) -Make sure paper is specific for the printer model that is being used (looks like normal paper)

The PATA standard

-Parallel AT Attachment, Parallel ATA, ATA -Originally called Integrated Driver Electronics (IDE) -2nd Gen. called EIDE (Enhanced IDE) -Promised faster speeds (from 16 MB/s through 133 MB/s) -Additional devices were able to connect (cd-rom drives) -Now called PATA

Secure Boot

-Part of the UEFI specification -Digitally sign known-good software -Cryptographically secure -Software won't run without the proper signature -Support in many different OS's (Windows and Linux)

Keychain (Mac OS Features)

-Password management • Passwords, notes, certificates, etc. -Integrated into the OS - Keychain Access -Passwords and Secure Notes are encrypted with 3DES • Login password is the key

Password policy (Documentation Best Practices)

-Passwords should be complex, and all passwords should expire • Change every 30 days, 60 days, 90 days -Critical systems might change more frequently • Every 15 days or every week -The recovery process should not be trivial! • Some organizations may have a very formal process

PCI DSS (Privacy, Licensing, and Policies)

-Payment Card Industry Data Security Standard (PCI DSS) • A standard for protecting credit cards -This standard consists of six control objectives • Build and Maintain a Secure Network and Systems • Protect Cardholder Data • Maintain a Vulnerability Management Program • Implement Strong Access Control Measures • Regularly Monitor and Test Networks • Maintain an Information Security Policy

Dictionary attacks

-People use common words as passwords • You can find them in the dictionary -If you're using brute force, you should start with the easy ones • common passwords such as 123456, password, ninja, football -Many common word-lists available on the 'net • Some are customized by language or line of work -This will catch the low-hanging fruit • You'll need some smarter attacks for the smarter people

USB locks (Physical Security)

-Prevent access to a USB port • Physically place a lock inside of the USB interface -A secondary security option is disabling the interface in BIOS and/or operating system • Not truly inaccessible, there's always a way around security controls -Relatively simple locks • Defense in depth

Integrated print server (device sharing)

-Print directly to the printer -Jobs are queued on the printer -Jobs are managed on the printer -Web based front end (access through the browser) or through Client software

Network locations in Windows 8/8.1/10

-Private • Sharing and connect to devices -Public • No sharing or connectivity -Network and Internet Status • can change connection properties

Anti-virus/Anti-malware updates (Linux)

-Relatively few viruses and malware for Linux • Still important to keep updated -ClamAV • Open source antivirus engine -Same best practice as any other OS • Always update signature database • Always provide on-demand scanning

Windows 10 history

-Released on July 29, 2015 • Windows 9 was skipped -A single platform that works on desktops, laptops, tablets, phones, all-in-one devices -Upgrades were free for the first year • From Windows 7 and Windows 8.1 -Microsoft calls Windows 10 a "service" • Periodic updates to the OS • Instead of completely new versions

Software tokens (Logical Security)

-Relies on pseudo-random number generator • Can't guess it • Changes constantly -Can save money • Can be a free smartphone app with no cost associated • No separate hardware needed to assign and/or lose

Remote access

-Remote Assistance • Commonly seen in Home editions • One-time remote access • Single-use password • Chat, diagnostics, NAT traversal -Remote Desktop Connection • Non-Home editions • Ongoing access • Local authentication options • May require port forwarding

Personal safety (Safety Procedures)

-Remove any jewelry and/or name badge neck straps that can cause you to get stuck • Or use breakaway straps -Lifting technique • Lift with your legs, keep your back straight • Don't carry overweight items/devices • Equipment can be available that can help you to lift -Electrical fire safety • Don't use water or foam • Use carbon dioxide, FM-200, or other dry chemicals • Always remove from the power source -Cable management • Avoid trip hazards • Use cable ties or velcro -Safety goggles • Useful when working with chemicals • Useful for printer repair, toner, batteries -Air filter mask • Computer could be dusty • Useful when working with printer toner

Botnets

-Robot networks • Skynet is self-aware -Once your machine is infected, it becomes a bot • You may not even know -How does it get on your computer? • Trojan Horse (I just saw a funny video of you! Click here.) or you run a program or click an ad you THOUGHT was legit, but... • OS or application vulnerability -A day in the life of a bot • Sits around. Checks in with the mothership. Waits for instructions from a 3rd party

Virtualization Support

-Run other OS's within a single hardware platform -Multiple OS's share physical hardware components -Limited in software -Added to the processor -Hardware is faster and easier to manage -Intel Virtualization Technology (VT) -AMD Virtualization (AMD-V)

Laptop Physical Locks

-Security cable attached to the laptop -Contains metal-reinforced locking slots where you can insert the lock -Other end contains a loop that would gos around a solid object -Prevents laptop theft

Incident response: Documentation (Documentation Best Practices)

-Security policy • An ongoing challenge • Covers every aspect of IT security for the company -Documentation must be available for everyone • Any employee can access that information • Commonly posted on the intranet -Documentation always changes • Constant updating • A process needs to be in place • Use the wiki model so that changes can be made quickly and seen by everyone in the organization

SSID management (Securing SOHO Network)

-Service Set Identifier • Name of the wireless network • Common SSID's : LINKSYS, DEFAULT, NETGEAR -You have the option to change the SSID to something not-so obvious -You can also disable SSID broadcast • SSID is easily determined through wireless network analysis • Security through obscurity

Restart services (Troubleshooting Solutions)

-Services • Applications that run in the background • No user interaction -Similar issues as a normal process • Resource utilization • Memory leaks • Crashes -View status in Task Manager • Under Services tab • You can right-click to start, stop, or restart • You can open service to get more info

Network and Sharing Center Applet

-Shows all network adapters • Wired, wireless, etc. -All network configs • Shows the HomeGroup option (n/a in Windows 10) • Can change Adapter settings • Can change network addressing

shutdown (Linux Command)

-Shuts the system down • Safely turn off the computer in software • Similar to the Windows shutdown command -sudo shutdown 2 • Shuts down and turns off the computer in two minutes -sudo shutdown -r 2 • Shuts down and reboots in two minutes • Important when you're not on site • "Ctrl-C" or "shutdown -c" to cancel shutdown process

The SCSI Standard

-Small Computer Systems Interface -Designed to connect many different kinds of devices into the standard format (hard drives, optical drivers, scanners, etc.) on the same SCSI bus -Up to 16 devices in a SCSI chain -Many different formats (Fast SCSI, Ultra SCSI, Ultra Wide SCSI, Ultra2 SCSI, Ultra3 SCSI, Ultra-320 SCSI, Ultra-640 SCSI, iSCSI (SCSI over IP)) -Parallel and Serial versions of SCSI available

SOHO firewalls (Securing SOHO Network)

-Small office / home office appliances • Generally has reduced throughput requirements -Usually includes multiple functions • Wireless access point, router, firewall, content filter -May not provide advanced capabilities • Dynamic routing • Remote support -Always install the latest software • Update and upgrade the firmware for the firewalls, routers, switches, etc.

Wearable Technology

-Smart Watch (extension of your phone) -Fitness monitor (tracks heart rate, steps, sleep patterns, and more)

Tokens and cards (Physical Security)

-Smart card • Integrates with devices • May require a PIN -USB token • Certificate is on the USB device -Hardware or software tokens • Generates pseudo-random authentication codes -Your phone • SMS a code to your phone

Certificate-based authentication (Logical Security)

-Smart card • Private key is on the card -PIV (Personal Identity Verification) card • US Federal Government smart card • Picture and identification information -CAC (Common Access Card) • US Department of Defense smart card • Picture and identification -IEEE 802.1X • Gain access to the network using a certificate • Stored on the device or separate physical device (e.g. USB key)

Phishing

-Social engineering with a touch of spoofing • Often delivered by spam, IM, etc. • Very remarkable when well done -Don't be fooled • Check the URL -Usually there's something not quite right • Mistakes with spelling, fonts, or graphics -Vishing (Voice Phishing) which is done over the phone • Callers might say they are from the IRS and they need money • They dont ask for cash, they ask for gift cards • Fake security checks or bank updates

Windows 7 Enterprise

-Sold only with volume licenses • Designed for very large organizations -Multilingual User Interface packages -Supports the following: • DVD playback • Windows Aero • Internet Connection Sharing • IIS Web Server -Supports all enterprise technologies: • Can join a domain • Bitlocker support • EFS (Encrypting File System) -x86 version supports 4gb RAM -x64 version supports 192gb RAM

su / sudo (Linux Command)

-Some command require elevated rights • There are some things normal users can't do -su command • Become super user (similar to administrator account in windows) • Or change to a different user • By not entering a user after the "su" command, it assumes that you want to be in the shell as the root user • You continue to be that user until you exit -sudo command • Execute a single command as the super user • Or as a different user ID • Only that command executes as the super user • Once command is done executing, it returns to the normal user

4c. Remediate: Scan and remove (Removing Malware)

-Some malware may prevent you from booting up into the normal desktop -Boot into Safe mode • Load the bare minimum operating system • Just enough to get the OS running • Can also prevent the bad stuff from running -Another option is Pre-installation environment (WinPE) • Recovery Console, bootable CD/DVDs/USBs • Build your own from the Windows Assessment and Deployment Kit (ADK) -Removing the malware infection may require the repair of boot records and sectors within WinPE

Troubleshooting Applet

-Some problems can be easily fixed • Have you tried turning it off and on again? -Automate some of the most common fixes • Troubleshooting option are categorized -May require elevated account access to enable/disable hardware and features

Infrastructure as a Service (IaaS)

-Sometimes referred to Hardware as a Service (HaaS) -Cloud model that provides all hardware to run applications -You are responsible for installing the applications and perhaps the OS -You are in charge of managing the software and data -You are responsible for the security and maintenance of all that information -Common implementation is Web Hosting Provider

Email security (Troubleshooting Security Issues)

-Spam • Any unsolicited email messages • Advertisements • Phishing attacks • Spread viruses via attachments within the email • Spam filters can be helpful to filter out unwanted emails -If the email is hijacked • Infected computers can become email spammers • You'll receive odd replies from other users • You'll receive bounced messages from unknown email addresses -Scan for malware to see if malware can be identified

Audio/Video Editing Workstation

-Specialized audio and video card (high quality audio and powerful video) -Large fast hard drive (Constant disk writes - SSD) -Dual monitors (edit in one monitor, view output in the other)

E-Readers

-Specialized device to read books -Can play some music and apps -Uses a technology called Electronic paper -Uses a black and white screen which performs well in direct light -Exceptionally long battery life (battery is used when changing pages) -WiFi and cellular network access

Print to PDF (Portable Document Format)

-Specific format created by Adobe -One-way path from application to PDF -Cross-platform compatibility -Proprietary Adobe format (many readers available in any OS) -Many browsers have a built in viewer to read the document

Room control (Environmental Impacts)

-Specific temperature level • Devices need constant cooling (So do humans) -Humidity level • High humidity promotes condensation • Low humidity promotes static discharges • 50% is a good number but might be difficult to maintain -Proper ventilation is needed • Computers generate heat • Don't put everything in a closet • Need a method to get hot air out and cool air in

Printer Drivers

-Specific to a printer model (Get this EXACTLY right) -Get the correct OS drivers (win7, win8/8.1, win10) -Get the right version, 32 bit OR 64 bit OS -You can't mix and match

Tablets

-Usually runs iOS or Android OS -Larger than ~7in diagonally -Designed for touch input (virtual input, drawing interfaces) -Can support wide range of applications (gaming, specialized productivity/utility apps) -Can take pictures or watch movies

Bluescreens and spontaneous shutdowns (Troubleshooting Windows)

-Startup and shutdown BSOD • Possible bad hardware, bad drivers, or bad application -If problem is related to a recent change •You can use Last Known Good, System Restore, or Rollback Driver • Try Safe mode -Re-seat or remove any hardware changes or if the pc was recently moved • May be a possible loose connections -If issue may be related to hardware • Run hardware diagnostics • Provided by the manufacturer • BIOS may have hardware diagnostics

What is electrostatic discharge? (Managing Electrostatic Discharge)

-Static electricity • Its electricity that doesn't move -Static electricity isn't harmful to computers • It's the discharge that gets them -ESD can be very damaging to computer components • Silicon is very sensitive to high voltages -If you've ever felt static discharge when touching a doorknob is around ~3,500 volts • Damage to an electronic component is only 100 volts or less

Force Quit (Mac OS Tools)

-Stop an application from executing • Some applications are badly written -Command-Option-Esc • Lists the application to quit • Select the application to "Force Quit" -Another way to "Force Quit" is to hold the option key when right-clicking the app icon in the dock • Continue holding the "Option" key to view the "Force Quit" option. Letting go of the "Option" key changes it to only "Quit"

External Storage Device

-Storage outside the computer -Removable -Very portable -Easy to move large files -examples USB flash drive, SSD or Hard Drive -connectivity methods USB, Thunderbolt, eSATA, etc... -Can be a security concern

Cloud-Based File Storage Services

-Store files in the cloud -Access, share, and edit from anywhere -Easy to collaborate (one place for all files) -Synchronization app allows files to store in a folder on your local drive, the app then syncs to the cloud -Common providers are Dropbox, Google Drive, MS OneDrive, Box

Nonvolatile BIOS memory

-Store the BIOS configuration (your settings) -Complementary metal-oxide semiconductor (CMOS)- -A type of memory -May be backed up with a battery -Usually flash memory theses days (easily stored and accessed)

Optical/DVD Drive

-Stores and reads data with light -Small bumps are read with a laser beam -Microscopic binary storage -Read/Write media (store backups and docs) -Read-only media (data cant be deleted; common for video distribution) -Limited storage sizes

USB 3.1

-SuperSpeed+ -Higher speed communication between Type-A and USB-C connectors -10 Gbit/sec speed (twice the rate of USB 3.0)

System Applet

-System properties • Provides Computer information • Including version and edition -Remote settings can be turned on or off for Remote Assistance and Remote Desktop -System protection • Can enable/disable System Restore • Select drives to allocate additional space for system restore -Performance settings located under Advance System Settings can be set for: • Configuring Virtual Memory • Configuring Visual Effects • Configuring Data Execution Prevention (DEP)

Internet Message Access Protocol version 4 (IMAP4)

-TCP 143 -Receives emails from an email server (authenticate and transfer) -Includes management of email inbox from multiple clients -Provides enhanced features over POP3

Simple Mail Transfer Protocol (SMTP)

-TCP 25 -Server to Server email transfer -Also used to send mail from a device to a mail server (commonly configured on mobile devices and email) -POP3 or IMAP are used when receiving emails

Remote Desktop Protocol (RDP)

-TCP 3389 -Can share a desktop from a remote location -Available on many windows versions -Can connect to an entire desktop or just an application -Many clients for Windows, MacOS, Linux, Unix, iPhone, Android, and others

Server Message Block (SMB)

-TCP 445 -Protocol used by Microsoft Windows -Used for file sharing, printer sharing -Also called Common Internet File System (CIFS) -Direct SMB communication over TCP without the NetBIOS transport -Direct over TCP (NetBIOS-less)

Hypertext Transfer Protocol (HTTP)

-TCP 80 -Communication in the browser and by other applications -Web Server Communication -In-the-clear non encrypted version -Supported by nearly all web servers and clients

IP address spoofing

-Takes someone else's IP address • Takes the IP address from the actual device to make it seem like the data is coming from the legitimate device • Pretends to be somewhere you are not -Can be for a legitimate reason • Load balancing • Load testing -For illegitimate reasons such as: • ARP poisoning • DNS amplification / DDoS -Easier to identify than MAC address spoofing • Apply rules to prevent invalid traffic, enable switch security • IP addresses are known on the network and if inbound traffic is detected from a location where that IP address should not be then you can suspect IP Spoofing is occurring.

TACACS

-Terminal Access Controller Access-Control System • Remote authentication protocol • Created to control access to dial-up lines to ARPANET -TACACS+ • The latest version of TACACS • More authentication requests and response codes • Released as an open standard in 1993

SOHO MAC (Media Access Control) Filtering

-The "hardware" address -access can be limited through the physical hardware address -Additional administration needed -All MAC addresses are viewable by capturing packets going through the networks -MAC addresses can be easily spoofed -Not a security method

Device Manager

-The OS doesn't know how to talk directly to most hardware -Device drivers are hardware specific and operating system specific • Windows 7 device drivers may not necessarily work in Windows 10 -Technical Support FAQ starting point • "Have you updated the drivers?" -Complete control of the hardware • Can update, uninstall, or disable drivers • Can scan for hardware changes OR dive into the driver properties -Computer Management or devmgmt.msc

Device Manager Applet

-The OS doesn't know how to talk directly to most hardware • You need drivers -Manage devices • Add, remove, disable -This is the first place to go when hardware isn't working • Instant feedback

Replacing InkJet Cartridges

-Usually separate cartridges (some printers have then combined) -easily replaceable (pulls right out)

regedit.exe

-The Windows Registry • The big huge master database • Hierarchical structure • Use to configure different parts in Windows • Use to configure different applications in Windows -Used by almost everything in Windows • Kernel, Device drivers • Services • Security Account Manager (SAM) • User Interface, Applications -Backup your registry! • Also called a hive • Use "export" to backup the registry • Built into regedit - Located under C:\Windows • Can also open through the cmd line or Run cmd

Windows 10 Pro

-The business version of Windows • Contains additional management features -Remote Desktop host • Remote control each computer -Supports: • Hyper-V • Bitlocker (Full Disk Encryption (FDE)) • Can join a Windows domain (Can be managed by group policy) -Does not support: • AppLocker • BranchCache -Max x86 RAM 4 GB -Max x64 RAM 2048 GB (2 TB)

Finder (Mac OS Features)

-The central OS file manager • Compare with Windows Explorer -File management • Launch, delete, rename, etc. -Integrated access to other devices • File servers • Remote storage • Screen sharing

Active Directory (AD)

-The centralized directory database that contains user account information and security for the entire group of computers on a network. -Centralized account management

Linux commands

-The command line - Terminal, XTerm, or similar -Commands are similar in both Linux and Mac OS • Mac OS derived from BSD (Berkeley Software Distribution) Unix • This section is specific to Linux -Download a Live CD or install a virtual machine to see its functions • Many pre-made Linux distributions are available to download and install • Ubuntu can be used in a virtual machine • Use the "man" command for help • Stands for an online manual • If you would like to know more about "grep" enter "> man grep" in the cmd line to learn more about grep.

Disk partitioning

-The first step when preparing disks • May already be partitioned • Existing partitions may not always be compatible with your new operating system -An MBR-style hard disk can have up to four partitions -GUID partition tables support up to 128 partitions • Requires UEFI BIOS or BIOS-compatibility mode • BIOS-compatibility mode disables UEFI SecureBoot • You'll probably have one partition -BE CAREFUL! • Serious potential for data loss • This is not an everyday occurrence

Legacy BIOS

-The original / traditional BIOS (been around for more than 25 yrs) -Limited hardware support (No drivers for modern network, video, and storage devices) -Older OS's talked to hardware through the BIOS (instead of access hardware directly)

Brute Force attack

-The password is the key • Secret phrase • Stored hash -Brute force attacks - Online method • Keep trying the login process • Very slow process • Most accounts will lockout after a number of failed attempts • Not very successful -Brute force the hash - Offline method • Obtain the list of users and hashes • Calculate a password hash, compare it to a stored hash • Requires large computational resource requirement

Windows 8/8.1 Pro

-The professional version • Similar to Windows 7 Professional / Ultimate -Full support for BitLocker and EFS • Full-disk and file-level encryption -Can join a Windows Domain • Support for IT management • Group Policy support • Centralized management of Windows devices -Does not support AppLocker or Branchcache -x86 version supports 4gb RAM -x64 version supports 512gb RAM

Impersonation

-They pretend to be someone they are not • Halloween for the fraudsters -They use details that can be obtained from the dumpster • They can say "You can trust me, I'm with your help desk" -They attack the victim as someone with a higher rank than them • Such as "Office of the Vice President for Scamming" -They throw tons of technical details around • Such as "Catastrophic feedback due to the depolarization of the differential magnetometer" -They try to act like your buddy • How about those Cubs?

Laser Printer Maintenance Kit

-They wear out (all those moving parts; lots of heat and pressure involved) -Standard maintenance kit (replaces feed rollers, new fuser unit, etc..) -Check printers page counter to see when maintenance is required -Power down to replacements components (fuser units are hot) -Reset page counter when done

Laptop

-Thick client that is mobile -Touchpad configuration -sync and backup can be cloud-based or local drive -Wireless connectivity -Additional security (VPN connectivity or local drive encryption)

Microsoft Visual Basic Scripting Edition (Scripting)

-VBScript • Contains ".vbs" file extension -General purpose scripting in Windows • Can manage back-end web server scripting • Can run scripts on the Windows desktop • Most common types of scripting are found inside of Microsoft Office applications

Unauthorized camera / microphone use (Troubleshooting Mobile Device Security)

-Third-party apps can capture intimate information • Ethical and legal issues -If any suspicion an app is capturing this info, run an anti-malware scan • Try to identify the source of the breach -Confirm that loaded apps are legitimate • Check with a third-party scanner -Factory reset will allow you to remove malicious software • Completely reset and start from the beginning

Dumpster diving

-This is mobile garbage bin • United States term is "Dumpster" • Similar to a rubbish skip -Important information can be thrown out with the trash -Details that are gathered can be used for different attacks • Can be used to Impersonate names or use phone numbers -Timing is important • Just after end of month or end of quarter • Based on a pickup schedule

Physical destruction

-Through an industrial shredder • Heavy machinery • Complete destruction -Drill / Hammer if destroying hardware on your own • Quick and easy • All the way through the platters -Electromagnetic (degaussing) • Remove the magnetic field • Destroys the drive data and the electronics -Incineration • Hot fire

Account lockout and disablement

-Too many bad passwords will cause a lockout • This should be normal for most users • This can cause big issues for service accounts (some orgs. will disable the lockout process for service accounts. OR have a different process to change the password and keep the service account from not logging in) -Disable user accounts • Part of the normal change process • You don't want to delete accounts (at least not initially) • Deleting the account can delete important information.

System lockout (Troubleshooting Mobile Apps)

-Too many incorrect unlock attempts -In iOS: Erases the phone after 10 failed attempts • Will need to restore from itunes/icloud backup • Automatic erase can be disabled. With each failed attempt, delays start to add up (timewise) -Android: Locks or wipes the phone after failed attempts • Uses google login to unlock the phone

Plenum-rated cable

-Traditional Cable Jacket --Polyvinyl chloride (PVC) -Fire-rated cable jacket --Flourinated ethylene polymer (FEP) or low-smoke polyvinyl chloride (PVC) -Plenum-rated cable may not be as flexible (may not have same bend radius)

Identifying the current BIOS version

-Try to catch the version during system boot-up (difficult to catch) -Bring up System Information (msinfo32) -Compare the current to the existing (upgrade might not be available) -Get a copy of the current version to downgrade if needed

Update boot order (Troubleshooting Solutions)

-Trying to boot from a USB drive but it doesn't even try • Boots directly to the primary drive -Check BIOS to determine which physical device will be used during boot • And in which order -Each BIOS is a bit different • But the configuration is in there somewhere -It's an easy one to miss • Usually the first thing to check and change to modify the boot order

Hotspot Connections

-Turns the phone into a WiFi hotspot -Your own personal wireless router -Extends the cellular data network to all of the devices -Dependent on phone type and provider (may require additional charges and data costs)

Hotspot (Mobile Device Connectivity)

-Turns the phone into a WiFi router -Extra charges may apply -Other devices can connect to your phone via WiFi

Double Data Rate 3 (DDR3) SDRAM

-Twice the data rate of DDR2 -Larger chip capacities -Max 16GB per DIMM -Not backwards compatible with DDR2, DDR

Coaxial cable (coax)

-Two or more forms share a common axis -RG6 used in TV/Digital Cable (and high-speed Internet over cable) -RG59 used as patch cables (not designed for long distances)

Multiple BIOS versions

-Two separate versions (main and backup) -easily switch between them -easy to upgrade one version without corrupting the other

NetBIOS Name Service (nbname)

-UDP 137 -Use to locate a device on the network by its name

Boot methods

-USB storage • USB drive must be bootable • Computer must support booting from USB drive -CD-ROM and DVD-ROM • A common media -PXE ("Pixie") - Preboot eXecution Environment • Performs a remote network installation • Computer must support booting with PXE -NetBoot • Apple technology to boot Mac OS from the network • Similar concept to PXE boot -If you need to install many types of OS's • Considered using external media that connects via USB • Solid state drives / hard drives • Store many OS installation files -External / hot swappable drive • Some external drives can mount an ISO (DVD-ROM image) which the PC will see as a DVD-ROM drive • Can boot from USB -Installing on the Internal hard drive • Install and boot from separate drive • Create and boot from new partition

Types of installations

-Unattended installation • Answers Windows questions in a file (unattend.xml) • No installation interruptions • No user intervention -In-place upgrade • Maintain existing applications and data -Clean install • Data backup required • Wipe the slate clean and reinstall • Migration tool can help -Image • Deploy a clone on every computer • Quick installation on many computers -Repair installation • Fixes problems with the Windows OS • Does not modify user files • Re-installs the OS • Multiboot • Run two or more operating systems from a single computer -Recovery partition • Creates hidden partition with a copy of Windows installation files • Commonly used with repair installation • Installation media not needed -Refresh / restore • Windows 8/10 feature to clean things up • Requires a recovery partition • No installation media needed

-5V

-Uncommon to find this voltage on mobo -Power supply might not provide this voltage -provided power for ISA adapter cards (most cards didnt use it) -Todays mobo's dont have ISA slots

-12V

-Uncommon to find this voltage on mobo -provides power to Integrated LAN, older serial ports, some PCI cards

Mini DisplayPort

-VESA standard -Royalty-free standard -Data is sent in packetized form (like ethernet and pci express) -Compatible with HDMI and DVI -Smaller compared to DisplayPort

A "friendly" DoS

-Unintentional DoSing • It's not always a ne'er-do-well -Network DoS • Layer 2 loop without Spanning Tree Protocol -Bandwidth DoS • Downloading multi-gigabyte Linux distributions over a DSL line -The water line breaks on a higher floor which water would leak from the ceiling into the computer room • This prompts all computer equipment to be turned off and stored away as prevention from further damage

UPS (Disaster Recovery)

-Uninterruptible Power Supply • Short-term backup power • Protects you from blackouts, brownouts, surges, spikes, etc... -UPS types • Offline/Standby UPS watches the voltage from the main power. If not power, it switch from offline/standby to online. Online provides the power from the UPS • Line-interactive UPS slowly provides more power if the main power experiences a brownout. • On-line/Double-conversion UPS runs in many data centers. UPS is always running from the battery. There is no switching over if main power is lost. The Main power charges the batteries, batteries power the device. No delay with power switching. -UPS features on different models • Auto shutdown • Battery capacity • Outlets • Phone line suppression

Why upgrade?

-Upgrade vs. Install • Upgrade - Keep files in place • Install - Start over completely fresh -Upgrading allows you to maintain consistency • Upgrades save hours of time • Can keep customized configurations and multiple local user accounts on the PC • Avoids application reinstallations • Keeps user data intact • Get up and running quickly • Seamless and fast • Run from the DVD-ROM or USB flash

Command line troubleshooting

-Use "help" if you're not sure • > help dir • > help chkdsk -Also use: • [command] /? -Close the prompt with exit -Useful when additional information is needed for a certain command

Remote Disk (Mac OS Features)

-Use an optical drive from another computer • Has become more important over time • Designed for copying files or data transfer • Will not work with audio CDs or video DVDs -Set up sharing in System Preferences • Sharing options • Appears in the Finder

Mitigating man-in-the-middle

-Use encrypted protocols to mitigate MITM attacks • use HTTPS (not HTTP) if using a browser • use SSH (not telnet) if connecting to a console -Communicate over a secure channel • Client-based VPN -Use encrypted wireless networks • Avoid insecure networks such as Public WiFis or Hotel WiFi's

Closing Programs (Linux)

-Use terminal • sudo for proper permissions -killall • e.g. "sudo killall firefox" ends all firefox instances -xkill • Graphical kill -"kill <pid>" ends that specific instance by process id if you are working at the command line

Laser Printer Cleaning

-Use water, isopropyl alcohol -Don't use harsh chemicals -Outside of printer use damp cloth -Inside of printer wipe dust away -Don't use vacuum or compressed air -Wash off skin with cold water -Dirty rollers can be clean with isopropyl alcohol

Trojan horse

-Used by the Greeks to capture Troy from the Trojans • A digital wooden horse -Software that pretends to be something else • So it can conquer your computer • Doesn't really care much about replicating -Circumvents your existing security • The end-user is the one who installs the software • Anti-virus may catch it when it runs • The better trojans are built to avoid and disable the anti-virus -Once it's inside it has free reign • And it may open the gates for other programs

Standard OS features

-Used for file management • You can Add, Delete, Rename files -For application support • Manages memory or swap file (swap space or pagefile) -Input and Output support • Printers, keyboards, hard drives, USB drives -Operating system configuration and management tools

Access Control Lists (ACLs) (Logical Security)

-Used to allow or deny traffic • Also used for NAT, QoS, etc. -Defined on the ingress or egress of an interface • Often on a router or switch • Can be configured to either view Incoming or outgoing traffic or both -ACLs evaluate on certain criteria • Identify traffic based on Source IP, Destination IP, • Either on TCP port numbers, UDP port numbers, • Certain protocol, such as ICMP -Can deny or permit if the criteria is met • What happens when an ACL matches the traffic?

grep (Linux Command)

-Used to find text in a file • Search through one or many files at a time -grep PATTERN [FILE] • "> grep failed auth.log" command would match all the lines for the word "failed" within the file "auth.log" • command is case sensitive

User Authentication (Printer Data Privacy)

-User authentication -Everyone can print -you can set rights and permissions -Printing vs managing the printer

Restricting user permissions

-User permissions • Everyone isn't an Administrator • Assign proper rights and permissions • This may be an involved audit -Assign rights based on groups • More difficult to manage per-user rights • Becomes more useful as you grow -Set login time restrictions • Only login during working hours • Restrict after-hours activities

Synchronization connections for Android Devices

-Uses a USB standard Type A plug if connecting to a computer -USB Micro-B -USB-C -802.11 wireless -Mobile network

Laptop Digitizer

-Uses a pen-like device as input (Stylus input) -Useful for graphical input -Becoming more common on laptops/tablets or hybrid devices

Fuser Assembly

-Uses heat and pressure to melt plastic toner powder and bond it to the paper.

Tailgating

-Uses someone else to gain access to a building • Not by accident -Johnny Long book in "No Tech Hacking" explains how to tailgate in these environments • By blending in with clothing • A 3rd-party with a legitimate reason • Temporarily take up smoking and makes friends with people who then can be followed back into the building • Or be someone who brings boxes of doughnuts where people might help you enter even if you don't have an access card -Once inside, there's little to stop you • Most security stops at the border

Power level controls (Securing SOHO Network)

-Usually a wireless configuration • Set it as low as you can -How low is low? • This might require some additional study -Consider the receiver • High-gain antennas can hear a lot • Location, location, location

Windows Recovery Environment

-Very powerful front-end that gives you access to the OS -Also very dangerous way to start manipulating the OS • Last resort -Does give you complete control of the OS • Fix your problems before the system starts • Can remove malicious software -Requires additional information • Use, copy, rename, or replace operating system files and folders • Enable or disable services or devices at startup • Can repair the file system boot sector or the master boot record (MBR)

Webcams

-Video capture -Either external or built-in camera (laptop) -Connected via USB or 802.11 WiFi -Includes both audio and video -Specialized drivers and software required

Windows Media Center

-Video, music, and television portal • Perfect for watching at home • Can record shows from a TV tuner • Can Play music and watch DVDs -The center of your home entertainment center • Cable companies and other technologies were strong competition -Discontinued by Microsoft • Not officially available in Windows 10

Dual-Voltage input options

-Voltage varies by country -Manually switch between 110V/115 and 220V/230V -Switch is located in back of power supply -Get a meter and measure voltage -Auto-switching power supply are available -Connecting 230V power supply to 115V power source might not cause permanent damage -DO NOT PLUG a 115V power supply into a 230V power source; will cause serious damage.

Strong passwords (Logical Security)

-Weak passwords can be difficult to protect against • Interactive brute force • Hashed passwords can be brute forced offline -Passwords need to have some complexity and refreshed constantly • This reduces the chance of a brute force • Reduce the scope if a password is found -Annual password analysis from SplashData examines leaked password files. Pretty much what you'd expect on commonly used passwords: • #1: 123456 • #2: password • #3: 12345 • #4: 12345678 • #5: qwerty

Plan for change (Change Management)

-What does it take to make the change? • Provide detailed information • Describes the technical process to other technical people -Others can help identify unforeseen risk • Gives a complete picture -Scheduling the change • Time of day, day of week • Also includes completion timeframes

Acceptable use policies (AUP) (Documentation Best Practices)

-What is acceptable use of company assets? • Detailed documentation such as employee handbook • May also be documented in the employee "Rules of Behavior" -This covers many topics such as: • Company Internet usage • How telephones, computers, mobile devices, etc. are used. -Used by an organization to limit legal liability • If someone is dismissed, these are the well-documented reasons why

Performance Tab

-What's happening? • Can view CPU, memory, etc. -Statistical views • Historical, real-time -Newer versions include CPU, memory, disk, Bluetooth, and network in the Performance tab

Power drain (Troubleshooting Mobile Device Security)

-When power drains faster than normal might be a security issue • Heavy application usage • Increased network activity than normal • High resource utilization than normal • Its a Denial of Service (DoS) -Check the application before installation • Use an App scanner to verify if its legitimate (e.g. Zscaler Application Profiler) • Force stop that running app if its acting unusual -Some mobile devices allow you to run anti-malware • This checks for malicious activity -Perform a clean install if you are unsure • Perform a factory reset and reinstall the apps

Print and Scan Caching (Printer Data Privacy)

-When you click print, the local system creates a file of the output -The output file is then sent to the print server located in the printer itself, file is then placed inside the print spooler -Print spooler manages which jobs print and which order. It then prints the file. -Spool file is usually deleted when done -Some printers keep that file until space is needed. file is accessible if someone gains access to those files.

Using WPS (Securing SOHO Network)

-Wi-Fi Protected Setup • Originally called Wi-Fi Simple Config -The goal was to allow "easy" setup of a mobile device • A passphrase can be complicated to a novice -Different ways to connect • PIN configured on access point must be entered on the mobile device • Push a button on the access point • Near-field communication - Bring the mobile device close to the access point • USB method - no longer used

dd (Linux Command)

-Will convert and copy a file • Also backups and restores an entire partition • > dd if=<source file name> of=<target file name> [Options] -Creating a disk image • > dd if=/dev/sda of=/tmp/sda-image.img -Restoring from an image • > dd if=/tmp/sda-image.img of=/dev/sda

Starting the console

-Windows 7 - System Recovery Options / Command Prompt • need to boot from the installation media • Or select from F8 Advanced Boot Menu -Windows 8/8.1/10 • Troubleshoot / Advanced Options / Command Prompt • need to boot from the installation media

Windows 8 and 8.1 history

-Windows 8 • Available October 26, 2012 • New user interface - no traditional "Start" button -Windows 8.1 • Released October 17, 2013 • A free update to Windows 8 - not an upgrade -Mainstream support ended January 9, 2018 • Extended support ends January 10, 2023

Fast Startup

-Windows 8 and 10 does not shut down all the way -Starts up very quickly -Unable to open BIOS config -Disable in Control Panel > Power Options -Most mobo's have a separate process (hold F2 then press power button to enter BIOS)

msinfo32.exe

-Windows System Information • A wealth of knowledge -Shows information on Hardware Resources • Memory, DMA, IRQs, conflicts -Shows information on Components • Multimedia, display, input, network -Shows information on the Software Environment • Drivers, print jobs, running tasks - Located under C:\Windows\System32 • Can also open through the cmd line or Run cmd

Update and patch (Troubleshooting Solutions)

-Windows Update • A centralized OS and driver updates -Lots of flexibility on updating Windows • Change the active hours • Manage metered connections where it doesnt download over slow connections -Applications must be patched • Security issues don't stop at the OS • Download from the publisher or within the application

System Restore

-Windows creates frequent restore points • Goes back-in-time to correct problems • Creates restore points after a windows update or after installing new software -Start by pressing F8 - Advanced Boot Options - Repair -In Windows 7/8/8.1/10 it is located in Control Panel under Recovery -Doesn't guarantee recovery from viruses and spyware/malware • All restore points might be infected

Reimage or reload OS (Troubleshooting Solutions)

-Windows is big • And complex -You can spend time trying to find the needle • Or simply build a new haystack -Many organizations have pre-built images • Where you don't have to waste time researching issues • Much faster to re-image than trying to find the root cause of an issue • Windows 8/8.1 and 10 includes a reset option if no pre-built images are available (home computers) • Located at Settings > Update & Security > Recovery

net command

-Windows network commands -Views network resources • net view \\<servername> • net view /workgroup:<workgroupname> -Map a network share to a drive letter • net use h: \\<servername>\<sharename> -View user account information and reset passwords • net user <username> • net user <username> * /domain

Active Directory

-Windows networks can be centrally managed • Active Directory Domain Services (AD DS) -Can create and delete accounts • Add users to the domain • Remove user accounts -Can reset passwords and unlock accounts -Can disable accounts • Off-boarding or security processes

Mitigating DDoS attacks

-You may be able to filter out traffic patterns • Stopping the traffic at your firewall -Internet service provider may have anti-DDoS systems • These can help "turn down" the DDoS volume -Third-party technologies available • Such as CloudFlare, etc.

MSDS info (Environmental Impacts)

-You'll get the product name and company information -Will help you understand the composition / ingredients inside of the product -Provides a breakdown of the hazard information if it comes in contact with a human -First aid measures -Fire-fighting measures -Provides information if accidental release / leaking occurs with the product -Provides information on handling and Storage -And much more

MAC spoofing

-Your Ethernet device has a MAC address • A unique burned-in address • Most drivers allow you to change this address -Changing the MAC address can be legitimate • Internet provider expects a certain MAC address • Certain applications require a particular MAC address -If changing the MAC address for illegitimate reasons • To circumvent MAC-based ACLs • Fake-out a wireless address filter -This is very difficult to detect • How would you know it's not the original device?

Desktop styles

-Your computer has many different uses • Those change depending on where you are -Work styles • Standard desktop • Common user interface • Customization is very limited • You can work at any computer due to Active Directory -Home • Complete flexibility; No restrictions • Can change background photos, colors, UI sizing.

Enabling and disabling Windows Firewall

-Your firewall should always be enabled • Sometimes you need to troubleshoot -Can be temporarily disabled from the main screen • Turn Windows Firewall on or off • Requires elevated permissions -Different settings for each network type • Can customize Public / Private profile

Keyloggers

-Your keystrokes contain valuable information • Web site login URLs, passwords, email messages -Saves all of your input • Sends it to the bad guys -Circumvents encryption protections • Your keystrokes are in the clear -Other data logging • Clipboard logging, screen logging, instant messaging, search engine queries

Hypervisor

-a.k.a Virtual Machine Manager -Manages the virtual platform and guest OS's -The CPU can provide better virtualization performance if it is supported -In charge of hardware management (CPU, Networking, Storage, Security, etc...)

PCI 64-bit expansion card

-card slot is a bit longer -Slot provides power at 3.3V or 5V -device can use either available power -3rd notch signifying that it is a 64-bit card -Card should be able to slide in without much force. -Confirm notches are lined up

The Windows command line

-cmd • The "other" Windows • Can start utilities from the cmd line • Many options available under the hood • Faster to do tasks on the cmd line compared to GUI

RAID 1+0 - A Stripe of Mirrors (a.k.a RAID 10)

-combines striping (RAID 0) with mirroring (RAID 1) -RAID 0 stripes data across the drives, RAID 1 mirrors that data -High disk space utilization -High redundancy -Minimum of 4 drives

Other file systems

-ext3 • Third extended file system • Commonly used by the Linux OS -ext4 • Fourth extended file system • An update to ext3 • Commonly seen in Linux and Android OS -NFS • Network File System • Access files across the network as if they were local • NFS clients is available across many operating systems -HFS+ / HFS Plus • Hierarchical File System • Also called Mac OS Extended • Replaced by Apple File System (AFPS) in Mac OS High Sierra (10.13) -Swap partition • Memory management • Frees memory by moving unused pages onto disk • Copies back to RAM when needed • Usually a fast drive or SSD

Separation Pad

-helps pick up the top sheet of paper from your paper tray, not multiples sheets -Small and inexpensive, easy to clean or replace

iwconfig / ifconfig (Linux Command)

-iwconfig • Views or changes wireless network configuration • Shows essid, frequency/channel, mode, rate, etc. • Requires some knowledge of the wireless network • "iwconfig eth0 essid studio-wireless" is an example on how to change the SSID of the WiFi adapter -ifconfig • Shows or configures a network interface and IP configuration, Subnet masking, etc. • "ifconfig eth0" is the command to show network information -Slowly being replaced by ip (ip address)

PC 64-bit slots

-longer slots -extra notch

Running BIOS upgrade program

-older computers required a boot floppy or optical media -Modern upgrades run as an executable -May run from a flash drive -Most upgrade apps will check for prerequisites (dont rely on this) -Do not reboot/shutdown pc during upgrade -Requires a reboot (save your documents)

TIA/EIA 568B

-orange-white, orange -green-white, blue -blue-white, green -brown-white, brown

+3.3V

-provides power M.2 slots, RAM slots, mobo logic circuits

Robust Copy

-robocopy • A better xcopy • Has the ability to resume a file transfer if it is interrupted • Looks and acts similar to xcopy • Most syntax is the same as xcopy • Shows results, time taken, and throughput of the copy process -Included with Windows 7, 8.1, and 10

Shutdown command

-shutdown • Shutdown a computer • And optionally restart "shutdown /r" -shutdown /s /t nn • Wait nn seconds, then shutdown -shutdown /r /t nn • Shutdown and restart after nn seconds -shutdown /a • Abort the countdown!

Windows 10 Editions

Windows 10 Home Windows 10 Pro Windows 10 Education Windows 10 Enterprise

taskkill /im application

kills the process by image name from the cmd prompt

Joining a domain

• Cannot be a Windows Home edition • Needs to be Pro or better • managed in Control Panel / System • Need proper rights to add the computer to the domain

WPA (Wi-Fi Protected Access)

• Created in 2002: WPA was the replacement for serious cryptographic weaknesses in WEP (Wired Equivalent Privacy) • Don't use WEP on any wireless networks -WPA was a short-term bridge between itself and whatever would be the successor • This encryption could run on existing hardware and provide a level of security above the capabilities of WEP • WPA: RC4 with TKIP (Temporal Key Integrity Protocol) • Contained a larger Initialization Vector (IV) than WEP and added an encrypted hash • Every packet would get a unique 128-bit encryption key for security


Related study sets

A & P Study Guide Straighter line chapters 1-6

View Set

Psychology Chapter 6 - Trouble Areas

View Set

Chapter 57: Introduction to the Urinary System

View Set

Satire in The Pardoner's Tale unit 2 lesson 9

View Set

Art History 2001 Exam #2 Questions and Vocabulary- The Ohio State Univeristy

View Set

African Elephants (Oral Presentation)

View Set