User:Epsilonbeta
901 Studies Section 1 - Hardware
- BIOS and UEFI**
BIOS- Basic Input / Output System -The software (firmware) used to start your computer
-BIOS chip is on motherboard -Initial hardware check (ram, cpu,) POST -After BIOS, computer looks for boot devices -Settings are saved in nonvolatile memory (ROM chip)
Legacy BIOS - Limited hardware support, over 25 years old UEFI BIOS -Unified Extensible Firmware Interface
-Implemented by manufacturers -Boot from large GPT disks (<2.2TB) -Pre-boot has it’s own OS -Able to connect remotely
BIOS Configuration RAM - View and configure memory settings Hard drive/ SSD - view and enable/disable Optical drive - view and enable/disable CPU- Adjust settings Hardware diagnostics - Build in BIOS Firmware - Do not upgrade unless current firmware is having issues
BIOS Security BIOS password / User password - System/OS will not start w/o password Supervisor Password - Restricts BIOS changes w/o password Full Disk encryption- Encrypts everything, even the OS. (bitlocker) TPM ( Trusted Platform Module) -Build in or added to mobo -used by Full disk encryption LOJACK for laptops - Built into the BIOS -Automatically installs to hdd
-phone home function sends location info
Secure Boot -Compares digital signatures to OS you are running
Installing BIOS Upgrades
Upgrading Firmware - Upgrade done to nonvolatile memory - Reliable power source for no interruptions - Improves performance/ fixes bugs -Only upgrade if necessary (having problems)
- Modern upgrades run from .exe files Identifying BIOS Version -start up screen
-msinfo32 (windows)
- Motherboards**
Form factors
ATX - Advanced technology Extended
-20 or 24 pin power connector -May see an addition 4 or 8 pin connector
Micro ATX - Smaller ATX motherboard
-backwards compatible -similar power connectors to ATX -Will mount in an ATX case
ITX -Series of smaller motherboards -screws compatible with atx and micro atx
Computer Power
Pc power connectors - 20 and 24 pin main power -provides 3.3V, 5V, and 12V -20 pin for original ATX, 24 pin added for PCIe -24 pin will fit 20 pin mobo SATA Power - 15 pin power connector, 3.3V (rare), 5V and 12V
Molex - provides 12V and 5V…….4 pins
4 pin ATX - 12V (ATXV12, P4, or cpu label) 8 pin EPS - 12V connector, provides 12V to multiple CPUs PCIe 8 pin & 12 pin- additional power for PCIe adapters
Expansion Slots and Bus Speeds
Bus width - How much traffic can pass (throughput)
Clock Speed -measures in Hertz (1 MHz = megahertz = 1 million cycles/second……...1Ghz= 1000MHz)
PCI - Peripheral Component Interconnect
-32 and 64 bit bus length -32 bit= 32 lines of communication 64 bit = 64 lines of communication -parallel bus = all bit are transferred at once -32 bit slots are shorter
PCI-x -PCI extended
-more throughput, designed for servers -parallel communication
PCIe -PCI express
-replaced PCI, PCIx, and AGP -communicates serially, faster than parallel -x1, x2, x4, x8,x16, and x32….full duplex
Mini PCI and PCIe mini -made for laptops
-wifi cards
RAM Slots
DIMM -Dual Inline Memory Module
-one single chip set -electrical contacts different on each side -64 bit dad width -Double Data Rate(DDR) SDRAM- 184 pins -DDR3 and DDR3 SDRAM- 240 pins
SO-DIMM - Small outline Dual Inline Memory Module
-used in laptops -DDR & DDR2 -200 pins - DDR3 204 pins
Micro DIMM - very small, used in small laptops
-DDR -172 pins -DDR2 & DDR3 - 214 pins
CPU Sockets LGA Socket- Land grid array- pins on mobo instead of chip
Chipsets
Northbridge - Connects the CPU to the memory and high speed graphics
Card (PCIe or AGP)
Southbridge - Connects the PIC interface slots, USB, ethernet, IDE, BIOS,
Onboard graphics -Serial I/O- serial port, parallel port, floppy disk, keyboard, Mouse
Modern CPU’s - Most have multiple cores, memory controllers, and GPUs
Integrated
Motherboard jumpers and connectors
Jumpers - Enable or disable certain mobo features
-could be used to reset BIOS
- Interfaces**
USB 1.1 - 1.5 Mb/s - 12 Mb/s
-5 meters max USB 2.0 - 480 Mb/s -5 meters max
USB 3.0 - 5Gb/s
-3 meters max
Firewire - apple trademark, IEEE 1394
-daisy chain up to 63 devices -4.5 meters (15 ft) distance limit per link -Firewire 400 - 100, 200, & 400 Mb/s, half duplex -Firewire 800 - 800 Mb/s full duplex, support up to 100M
Sata - power - 15 pins, data - 7 pins
1.0 - 1.5 Gb/s, 1 meter
2.0 - 3Gb/s - 1 meter 3.0 - 6Gb/s - 1 meter eSata- matches sata version, 2 meters
VGA - Video Graphics Array -Blue DB-15 connector, 5-10 meters max, analog signal only HDMI- High Definition Multimedia Interface -all digital, 20 meters before signal loss -19 pin type A connector -Type C connector for mini hdmi (cameras)
BNC - Bayonet Neill, Concelman, high end video Mini-DIN - S video, 2 channel analog DVI - Digital Video Interface
-DVI-A: analog -DVI-D: Digital -DVI-I: integrated (digital and analog)
Audio Ports - Analog TRS plugs (Tip, Ring, Sleeve)
-¼” = 6.5mm ⅛” = 3.5mm -Digital optical fiber, 10m max
RJ11- Registered Jack #11 (telephone)
-6P2C (6 positions, 2 wires used)
RJ45 - Registered Jack #45 (ethernet)
- 8P8C
Thunderbolt - Data and power on same cable, daisy chain up to 6 devices
-V1: 10Gb/s per channel, 20Gb/s total -v2: 20Gb/s -v3: 40Gb/s -Copper max: 3 meters -Optical Max: 60 meters
MIDI - Musical Instrument Digital Interface
- Wireless Interfaces & Speeds**
Infrared - 4Mb/s Line of sight, 1 Meter max -laptops, phone, camera NFC - Near field communication
-106 kb/s, 212 kb/s, 424 kb/s, range of 10 cm or less -mobile devices, payment devices
Bluetooth - Class 1 - industrial, 100m range
- Class 2 - mobile devices, 10m range - Class 3 - Short range use, 1 m range - Version 1.2 - 1Mb/s -Version 2.0 + EDR (Enhanced Data Rate) - 3 Mb/s -Version 3.0 + High speed - 24 Mb/s -Version 4.0 - low power spec- 24 Mb/s
802.11 Networking
802.11a
5 Ghz
54Mb/s
120 meters
802.11b
2.4 Ghz
11 Mb/s
140 meters
802.11g
2.4 Ghz
54 Mb/s
140 meters
802.11n
2.4 Ghz or 5Ghz
600 Mb/s
(4 channels 150Mb/s)
250 meters
802.11ac
5 Ghz
693 Gb/s (8 channels 866.7 Mb/s)
250 meters
Frequency = number of cycles/ second (hertz)
- RAM**
RAM - Random Access memory ROM - Read only memory, does not change (BIOS) PROM - Programmable read only memory , written once EPROM - Erasable PROM, write/erase/write again EEPROM - Electrically Erasable PROM (Flash memory, SSD) SRAM - Static RAM
-very fast and expensive, very large -used often in CPU caches (L1, L2, L3)
DRAM - Dynamic RAM
-needs constant refreshing or memory disappears - can be stored anywhere and accessed directly
SDR SDRAM -Single data rate Synchronous DRAM
-synchronized with clock cycles (very slow) -168 pins
DDR - Double data rate, twice as fast as SDR
-184 pins
DDR2 - Twice as fast as DDR
-240 pins
DDR3 - Twice as fast as DDR2
-240 pins
All 3 DDRs not backwards compatible, notches are off
Understanding PC Memory
Parity Memory - Adds additional parity bit, will not always detect error -Will not fix error ECC Memory - Error correcting code memory -Detects and fixes errors, not used by all systems -Even parity, parity bit makes an even number
Registered Memory -Used on servers, buffer zone Multi-channel Memory -installed in pairs or trios for max throughput
-combinations should match
Buffered Memory - Used to place less electrical load on the memory
Controller
- Storage Devices**
Optical storage - Small bumps are written to disc with laser
CR-ROM - 700 MB capacity DVD-ROM - Single layer- 4.7 GB -Dual layer - 8.5 gb Blu-ray -Single layer -25GB -Dual layer - 50GB HDD - slower speeds, mechanical, can break, moving parts
SSD - no moving parts, very quick SSHD - Has spinning drive and SSD flash memory. Faster but less $$
Hot swappable - Remove or add without powering off machine
- USB, firewire, SATA, eSATA
USB Flash Drives - EEPROM - electrically erasable programmable ROM
Nonvolatile- loss of power does not erase data Limited number of writes, easy to damage
Tape drives - magnetic tape, sequential storage, cheaper, long term storage
RAID
RAID 0 - Striping- data files split between 2 or more drives
High performance, no redundancy,one bad drive= data loss
RAID 1 - Mirroring - exact duplicate of data across 2 or more drives
redundancy , not speed
RAID 5 - Striping w/ parity - files are striped, requires at least 3 drives
High redundancy, efficient use of disk space Parity calculation may affect performance
RAID 1+0 - stripe of mirrors,speed of striping but redundancy of mirroring, Need at least 4 drives
- Display Devices**
LCD displays- Liquid Crystal Display
-Light shines through liquid crystals
TN- Twisted Nematic- Most common/ low power, fast response (gaming) IPS - In plate switching , excellent resolution, more expensive that TN CCFL - Cold cathode fluorescent Lamp- high V, thicker, converts power Plasma - tiny cells with noble gas and mercury Digital Projectors - LCD common, metal-halide lamp OLED - Organic LEDs, thinner and lighter, no backlight, short life
Display specs - Refresh rates- number of times a screen is redrawn
-measures in hertz (Hz) Resolution- number of pixels (W x H) -standard 4:3 (1600 x 1200) -wide screen 16:10 -hd 16:9
- Printers**
Laser Printers- uses lasers, high voltage, high quality, very fast
Imaging drum- painted with a laser -picks up toner and transfers to paper Fuser Assembly - melts plastic toner permanently to paper Colors - cyan, yellow, magenta, black Four separate toner cartridges Pickup rollers - one page at a time, periodically needs cleaned Separation pads - pulls just top sheet of paper Duplexing Assembly - prints to both sides of paper
PROCESS: 1.) Processing, ready to print full page at one time 2.) Charging, wire set negative charge to photosensitive drum
3.)Exposing, laser writes image to photosensitive drum 4.)Developing, toner applied to drum 5.) Transferring, toner placed on paper from drum 6.) Fusing, heat and pressure to make toner permanent 7.) cleaning, toner off of drum
INKJET PRINTERS - Inexpensive, quiet, high resolution, expensive ink
-Ink cartridges places drops of ink on pages - Colors CYMK, cyan, magenta, yellow, key (black) Printhead- integrated into the cartridges, some not Feed rollers - feeds paper, some duplex Cartridge and belt- moves cartridges over paper Calibration- aligns nozzles to paper
Thermal Printers- receipt printers -white paper turns black when heated, very quiet -paper sensitive to light and heat -heating element heats up parts of paper form characters
-paper covered with chemicals that changes color w/ heat
Impact Printers - Dot Matrix- printhead has pins that press against paper & mark
-good for carbon copies, multiple copies -low cost, noisy, poor graphics, mostly for numbers & letters -paper is pulled through with holes on each side of it
Print head - moves back and forth, ribbon in between head & paper Ribbon - made of fabric, easy to replace
Virtual Printers -no physical output, sending info to a digital file Print to file - basically saving to file -can only be read by certain program Print PDF -portable document format,cross platform compatibility Print to XPS - XML paper specification, - similar to PDF, but included in windows Print to image - letter imaging or sharing, not integrated in OS
PRINTER MAINTENANCE
LASER PRINTERS- kits that include new rollers, fuser units, etc. -check page count to determine maintenance need -do calibration -clean dust from toner Thermal Printers- clean heating element with alcohol -remove tiny bits of paper -print head pops out with lever Inkjet Printers - print heads need cleaned, can be done automatically or manual
Section 2 - Networking
CABLES AND CONNECTORS
ST connectors - straight tip connector
SC connectors - subscriber, square, standard connector LC connector - Lucent, local, little connector
RJ 11 - 6 position, 2 conductor (6P2C) -telephone connector RJ45 - 8P8C, modular T568A and T568B need to be the same termination on both sides RJ48C - 8P4C, T1, WAN, data lines BNC connectors - coaxial cable connector, rigid and hard to work with -DS3 WAN links F connector - used on coax
NETWORK CABLING Fiber optic - uses light instead of RF -hard to monitor or tap, no interference Multimode Fiber - short range, up to 2Km -inexpensive light source (LED) Singlemode Fiber- long range, up to 100Km w/o processing -expensive light source (laser beam) Twisted Pair copper cabling - two wires with equal and opposite signals -pairs w/ different twist rates -twists help with interference UTP- unshielded twisted pair, most common STP- shielded twisted pair, protects from interference, needs grounding Plenum rated cable - special cable jacket to minimize smoke during fire Coax- two or more forms share a common axis RG6 - used for tv RG59 - used as a patch cable (not for long distance)
Calculating Signal Loss -distance = signal loss -attenuation = loss of intensity of signal -decibel (1/10 of a bell) - signal strength ratio measurement
CABLE CATEGORY
ETHERNET STANDARD
MAX DISTANCE
CAT3
10BASE-T
100 METERS
CAT5
100BASE-TX
1000BASE-T
100 METERS
CAT5e
100BASE-TX
1000BASE-T
100 METERS
CAT6
10GBASE-T
37-55 METERS
CAT6A
10GBASE-T
100 METERS
CAT7 SHIELDED
10GBASE-T
100 METERS
- TCP/IP**
IPv4 and IPv6
IPv4 -32 bit address, 4 octets, with 8 bits each, max decimal value is 255 IPv6 -128 bit address, first 64 network prefix, last 64 host address, hexadecimal IPv6 Link local address - required on every IPv6 interface
IPv6 Compression - remove leading 0’s and 2 or more groups of 0’s
2000:0bb0:0000:0000:0000:0000:00a0:0002 2000:bb0::a0:2 RFC1918 addresses - private addresses
10.0.0.0 - 10.255.255.255 255.0.0.0 Host Size = 24 bits 172.16.0.0 - 172.31.255.255 255.240.0.0 Host size = 20 bits 192.168.0.0 - 192.168.255.255 255.255.0.0 Host size = 16 bits
Automatic Private IP Addressing (APIPA)- used if DHCP not working -assigned by a workstation server -Range: 169.254.0.1 - 169.254.255.254 -first and last 256 addresses reserved -usable range: 169.254.1.0 - 169.254.254.255 -auto assigned: ARP to confirm address not in use
TCP/IP addressing
IP address- every device needs a unique IP Subnet mask - used by local workstation to determine what subnet it is on Default Gateway - allows you to communicate outside local network DNS - translates domain names to ip addresses - many DNS servers -13 root server clusters -hundreds of generic top level domains (.com, .net, .org, .edu) -over 275 country code top level domains (.us, .ca, .uk) -IPs of DNS servers provided by admins - two addresses for redundancy DHCP - auto assigns IPs, configures IP, subnet mask, default gateway -separate from DNS -IPs used to be static Classless Subnetting -
CIDR - Classless Inter-Domain Routing (slash as end of IP)
Decimal
CIDR
255.0.0.0
/8
255.255.0.0
/16
255.255.255.0
/24
PORTS AND PROTOCOLS
Common TCP/UDP Ports
Protocol
Port
Name
Description
FTP
TCP/20, TCP/21
File Transfer Protocol
send/receive files between systems
SSH
TCP/22
Secure Shell
Encrypted console access
Telnet
TCP/23
Telecommunications network
Insecure console access
SMTP
TCP/25
Simple mail transfer protocol
Transfer email between mail servers
DNS
UDP/53 TCP/53
Domain Name Service
Convert domain names and IP addresses
HTTP
TCP/80
Hypertext Transfer Protocol
Web server communication
POP3
TCP/110
Post office protocol V3
Receive email into an email client
IMAP4
TCP/143
Internet message access protocol V4
A newer email client protocol
HTTPS
TCP/443
Hypertext transfer protocol secure
Web server communication with encryption
RDP
TCP/3389
Remote desktop protocol
Graphical display of remote access
NETBIOS
UDP/137
NetBIOS name service
Register, remove, and find windows services by name
NETBIOS
UDP/138
NetBIOS datagram service
Windows connectionless data transfer
NETBIOS
UDP/139
NetBIOS session service
Windows connection oriented data transfer
SLP
UDP/427 TCP/427
Service Location Protocol
Find MAC OS services by name
SMB
TCP/445
Server message block
Windows file transfers and printer sharing
AFP
TCP/548
Apple filing protocol
MAC OS File transfer
LDAP
TCP/389 UDP/389
Directory service protocol
Windows active directory
TCP - Transmission Control Protocol- connection oriented, reliable delivery, station
Responds back acknowledging receipt of data -can manage out of order messages
UDP - User Datagram Protocol - connectionless, no formal setup, data just sent
-unreliable, no acknowledgement of receipt -no reorder of data, received ad is
4 things needed to communicate: server IP and port number
Client ip and port number
Example: 192.168.1.1/ 62315 ------> 182.168.1.2/ 22
Non-ephemeral ports - permanent port numbers, usually on a server
Ephemeral port - temporary port numbers, client side
Port numbers tcp/udp - range from 0 - 65,536 0-1024 are well known ports (servers)
- Wireless Networking**
Wireless Standards
Wireless networks - IEEE 802.11 Popular standards- a,b,g,n,ac
STANDARD FREQUENCY
(GHz)
STREAMS
MAX THROUGHPUT PER STREAM
TOTAL MAX THROUGHPUT
NOTES
802.11a
5
1
54MB/s
54MB/s
Smaller range than b because high frequency (5GHz) is absorbed rather than bouncing like 2.4 GHz
802.11b
2.4
1
11MB/s
11MB/s
Better ranger than a, more frequency conflicts (microwaves)
802.11g
2.4
1
54MB/s
54MB/s
Backwards compatible with b, same frequency conflicts as b
802.11n
5 &2.4
4
150MB/s
600MB/s
Multiple inputs, multiple outputs (MIMO)
802.11ac
5
8
866.7MB/s
6934 MB/s
WIRELESS ENCRYPTION
WEP - Wired equivalent privacy,64 bit or 128 bit key size -very vulnerable, capture enough packets and you can get key
WPA - Wifi protected access, larger encryption hash -RC4 with TKIP (temporary key integrity protocol) -every packets gets a unique encrypted key WPA2- uses AES (advanced encryption standard) -CCMP replaces TKIP WPA2 Enterprise - everyone has their own key
CONFIGURING SOHO WIRELESS ROUTER
Wireless channels and encryption - WPA2 over WPA, never use WEP -not all devices compatible with WPA2, may need upgrade -use an open frequency, some APs do automatically (interference) Configuring NAT - Automatic on SOHO routers, internal IPs translate to ext. IP
Port forwarding - 24/7 access to an internal hosted service (plex, web servers) -external ip/ port maps to internal ip/port, - also called destination NAT or static NAT, does not expire Port Triggering - like port forwarding, but only under certain circumstances
-opens for game, closes when game is turned off -only one person can trigger at a time
IP addressing - most use DHCP, IPs are easy to see on open network
Firewall and DMZ ports - every SOHO router is a firewall
-no external devices can directly access network
-DMZ ports can allow unrestricted access ( bad idea)
Managing QOS - change priority of traffic (VOIP high, gaming low)
-prioritize apps, could slow down apps
Firmware updates - doesn't happen often, do not do unless router is not
Working right, have backup of old firmware UPnP - devices find other devices automatically, auto port forwarding - no approval needed, security risk, can make changes to firewall
INTERNET CONNECTION TYPES
Cable Modem - data over cable, multiple services DOCSIS- data over cable service interface specification, DOCSIS- international telecommunications standard that permits the addition of high-bandwidth data transfer to an existing cable TV (CATV) system.
DSL- ADSL- Asymmetric Digital Subscriber Line 1.5 mb/s -uses phone lines, download faster than upload (asymmetric) VDSL- Very-high-bit-rate DSL, faster than ADSL 7 mb/s Dial up - voice telephone lines, 56k modems, slow throughput, analog lines Fiber- high speed, voice and data over line -hundreds of HD channels -1Gb/s internet, 1TB cloud, 2TB DVR Satellite - 2GHz range, high cost, 15mb/s download, 2mb/s upload -sensitive to weather, high latency
ISDN - Integrated Services Digital Network
- Used on legacy telephone systems
Cellular Networks - separates land into cells, antenna covers cell with certain
Frequencies -Tethering turns your phone into a router
LOS - line of sight, visual path between 2 antennas, high frequencies Common in metropolitan areas WI-MAX- Worldwide interoperability for microwave access
NETWORK TYPES
LAN - Local area network, could be one building or a group of buildings Usually high speed, ethernet or 802.11 (wireless) WAN - wide area network, larger than LAN Communicating across country or world, usually slower than LAN Different types of connections (point to point, satellite) MAN- Metropolitan Area Network, larger than LAN, smaller than WAN Usually in city, common to see owned by government PAN - Personal area network, bluetooth, IR, NFC
NETWORKING DEVICES
HUB - called a multiport repeater, traffic repeated from one port to all ports
10 megabit, 100 megabit, hard to find today
Switches- Bridging done in application specific integrated circuits (ASIC)
-forwards traffic based on destination address -core of enterprise networks -multi-layer switches- switching and routing capabilities(layer 2&3)
Routers - Routes traffic between IP subnets
-forwarding decisions based on IP addresses -Routers inside of switches sometimes called “layer 3 switch” -can connect different types of networks (LAN, WAN, copper, fiber
WAP- wireless access point, acts as a bridge, extends the wired network onto
The wireless network. Forwards based on mac address
Modem - modulator/demodulator, converts analog to digital, uses phone lines
Firewalls - integrated into wireless routers or on a standalone device -can proxy traffic -can filter traffic based on TCP/UDP port number -can be a router -can filter based on data in packets -some have VPN capabilities Patch Panels - combo of punch down blocks and RJ45 connectors, permanent Copper Line Drivers or extender - extends range of copper or copper ethernet PLC - power line communication, ethernet over powerline 500MB/s PoE- with switch - endspan, injector - midspan Modes - Mode A- power on data pairs Mode B- power on spare pins
Networking Tools
Cable Crimpers - pinches connector to wire, metal prongs pushed in insulation -exact modular connector for type of wire Multimeters- read voltage, ohms, current Toner probe - finds other end of wire -tone generator- puts an analog sound on the wire - Inductive probe- does not need to touch wire
-hear sound through a small speaker Cable testers - continuity checks, identifies missing pins or crossed wires -not used to test frequencies Lookback Plugs - used for testing physical ports -serial, RS232, network connections -not used for crossover cables
Punchdown Tools - punch a wire into a wiring block
-tedious, trims wire during punch
Wireless Analysis - easy to monitor, identifies errors and interference -purpose built hardware or mobile device add on
Section 3 Mobile Devices
Laptop Hardware
Expansion Options- Express cards - 34mm and 54mm -USB2: 48-Mb/s -USB3: 5 Gb/s -PCIe: 2.5 Gb/s SO-DIMM - small outline dual inline memory module 64mm x 32mm DDR & DDR2 - 200 pin DDR3 - 204 pin USB Flash Drive - EEPROM - Electrically erasable programmable ROM -limited number of writes -non volatile Thunderbolt - same as mini display port, provides high speed data
Replacing a desktop with a laptop
Laptop keyboard have less keys than desktop keyboards
Storage - SSD - 2.5” and 1.8” SSHD - flash memory and spinning disks Laptop and mobile memory - SO-DIMM and Micro DIMM Smartcard readers - integrated or USB Optical Disks - becoming rarer Wifi Cards - PCIe and mini PCI
Screens - LCD - fixed resolution, very fragile -power adapter converts AC to DC Batteries - Lithium ION or Li-ion, charging diminishes battery Laptop frames - heavy duty plastic or metal Motherboards - built to fit certain model, not easy to replace CPU - designed for mobility -integrated features (memory controller, video) -not very upgradeable
Laptop Displays
LCD - liquid crystal display, light shines through liquid crystals -requires backlight, inverter converts DC to AC -image but no light may be bad inverter TN - Twisted Nematic LCD, fast response for gaming, low power IPS - excellent resolution, more expensive Fluorescent backlight - higher voltage, added thickness LED backlight - LEDs around edge of screen OLED - organic LED, no backlight, degrades overtime , expensive WIFI antennas - wires wrap around outside of LED display -main and auxiliary wire Webcam - audio and video,
LAPTOP Features
Function Key - Fn + key, some toggle
-Examples: volume, screen brightness, airplane mode, enable or Disable touchpad, screen orientation, gps, media options Docking Stations - slide in and connect to mouse and keyboard
Mobile Devices
Tablets - 7” or longer Smartphones - 3.5” - 5.5” Phablet - 5.5” to 7” E-readers - books plus music and other media Smart Camera - face recognition and other features Mobile Device Communication NFC - Near field communication - send small amounts of data over limited area, built into phone, payment systems, transportation
Access tokens, identity cards, short range w/ encryption
Proprietary Mobile Interfaces - early phones have power cable and a
separate cable for data
-EU set a standard on USB
- micro USB standard, common worldwide
-other devices use micro usb
-Apple has lightning cable -higher power output
-inserted either way -more durable Bluetooth - Personal Area Network (PAN) IR - used to control other IR devices (phone for tv remote) Hotspot/tethering - phone acts as 802.11 WAP
Mobile Device Accessories
Headsets - wired used TRRS connector (Tip Ring Ring Sleeve) -Wireless used bluetooth TRRC - allows to have a microphone Speakers - wires or bluetooth External Game Pads - game controllers for mobile Docking Stations - no wires, charge and sync CC readers - phone becomes Point of Sale terminal -uses internet link for approvals -email receipt, sign w/ finger SD/MicroSD
SECTION 4: HARDWARE & NETWORK TROUBLESHOOTING
Troubleshooting Common Hardware Problems
Unexpected Shutdowns - could be heat related -check temps, heatsink, fans Overheating - heat from CPUs, video cards, dust - clean dust, check fans, airflow, heatsink, Failing Hardware - run hardware diagnostics Lockups - computer freezes up -check for activity ( HDD light, status light) -ctrl + alt + del -update drivers -low resources such as ram or storage Hardware Diagnostics POST - power on self test -tests major components, beep codes for failures -every manufacturer has unique beep codes Blank screen - bad video, listen for beeps, BIOS issue Continuous Reboots - how far is the boot going Bad driver configuration - Boot, F8, last known good configuration No power - check power source -no POST could be bad motherboard -check power supply output Loud noises - Rattling: Loose components Scrapping: HDD issue Clicking: Check fans Popping or smoke : check capacitors Intermittent Device Failure - ban install, reseat, could be bad hardware Indicator lights - POST codes on mobo, power, link light, speed light, HDD Smoke and burning smell - electrical issue, remove power BSOD - windows crash, windows stop error, check event log Spinning Ball of death - apple issue, bug or hardware issue
Hardware Troubleshooting Tools DMM - check voltage, continuity Power supply tester - plugs in power supply, LCD shows voltage Loopback Plugs - useful for testing physical plug, serial/RS232 ( 9 or 25 pin) Port card/USB - detailed diagnostics during POST, LED numbers and letters External PCI/ PCIe/ parallel Storage Device Troubleshooting
Read/write failures Slow performance - constant LED activity Loud clicking noise - mechanical issue Troubleshooting - backup, check cables, check for heat, check PSU, diagnostic Boot failure - drive not recognized, beeps, error messages NO OS - HDD seen but windows not seen, check boot order RAID not found - missing or faulty raid connector, check raid software Crash screens - may indicate bad HDD S.M.A.R.T. - Self monitoring, Analysis & Reporting Technology
Monitors how drive is operating Uses 3rd party utilities, finds warning signs
HDD Troubleshooting Tools
Physical Tools - screw drivers and external disc enclosures CHKDSK / f - finds errors and repairs them CHKDSK / r - locates bad sectors and recovers, also does /f If volume is in use, run at startup (/r and /f)
Format - windows command, adds a file system a partition
-also removes all file entries
File recovery software - recovers files if not overwritten Defragmentation - moves files fragments so they are contiguous
-not necessary for SSD, DEFRAG on cmd
Troubleshooting Boot Process PC only knows the basics: keyboard, mouse, RAM, etc. Bootstrap Loader - In BIOS, loads program that loads the OS 2nd stage Boot loader - winload, GRUB, legacy...gets the OS Started Master Boot Record (MBR) - first sector of the HDD -usually only 512 bytes -contains table of primary partitions -contains disk signature and directions to starting OS -UEFI does not use MBR, EFI System Partition (ESP)
Windows Command Prompt - boot from install disc to access CLI - very powerful, last resort -complete control, modify OS files -enable/ disable service or device startup -repair system boot sector or MBR BOOTREC command BootREC / scanOS - identifies windows OS BootREC / fixboot - writes a new boot sector BootREC / rebuildBCD - creates new boot config Data store DISKPART - manage partitions
Troubleshooting Display Issues No video connection - first check everything is connected -no video after windows boot, use VGA mode (F8) Image Quality Issue - check cables and pins, and interfaces Distorted - check OS refresh rate and resolution -disable hardware acceleration
Oversized Images - resolution too low, lower = larger Image Sticking - problem with LCDs, white screen to refresh Pixel Issues - stuck pixels= always bright
-dead pixels = always black
Artifacts -unusual graphics, check adapters and drivers Motion trails - disable advanced video features BSOD and overheating - video drivers
-monitor internal temp.
Troubleshooting Networks
No network connection - check lights on physical connection -ping loopback 127.0.0.1 -ping local IP address -ping default gateway -ping devices outside local network Automatic Private IP addressing (APIPA) -link local address -communicates inside local subnet -169.254.1.0 - 169.254.254.255 -169.254.0.0/24 & 129.254.25.0/24 are reserved -automatically assigned, when DHCP unavailable -uses ARP to confirm address not in use Limited or no connectivity - check local IP, make sure APIPA not used -if DHCP is in use, do PING tests Intermittent Connectivity - check system tray, check cables and NIC -check switch or WAP IP conflicts - two devices cannot used same IP -DHCP helps, statics can cause issues -windows will identify duplicates and prevent issues -reboot or reset NIC to restart DHCP process Slow transfer Speeds - overloaded network or devices -speed and duplex must match -hardware issue or cabling, also could be malware infection Low RF wireless signal - interference with devices on same frequency -incorrect channel, usually automatic -bounce and latency -WAP location Wireless interference - fluorescent lights, microwaves, cordless phones, High power sources, multi tenant buildings SSID not found - could be too far away, closer networks could be louder -SSID could be hidden, must enter manually
Network Troubleshooting Tools
Cable tester - continuity checks, crossed wires
Loopback plug - tests physical ports, serial/RS232, RJ35, T1
-only used for diagnostics
Punchdown Tools - punches wire into block, 60 & 110 blocks
-trims wires, makes neat, must maintain twist
Toner Probe - finds where cable goes
-generator puts analog sound signal on wire
-probe does not need to touch, sound through speaker
-used on punchdown blocks
Crimpers - pinches connector onto wire
-metal prongs pushed through insulation
Wireless Locators - software or hardware
-shows network frequencies, channels, etc.
Command Line Troubleshooting
PING - tests reachability & round trip time -used ICMP, is a primary troubleshooting tool IPCONFIG - used in windows -IP info, DNS, default gateway, etc. IPCONFIG/all - much more info IFCONFIG - used in linux TRACERT - Determine route packet takes to destination
Tracert - windows traceroute - linux
-used ICMP TTL
TTL= time to live = number of hops -decreased by 1 everytime packet goes through router -not all devices will reply with ICMP -some firewalls block ICMP NETSTAT - network statistics Netstat - a = shows all active connections in & out PC Netstat - b = shows binaries Netstat - n = do not resolve names, only show IPs NBTSTAT - netbios over TCP/IP -windows utility for querying netbios over TCP/IP info Nbtstat -n = list local netbios names Nbtstat - A 192.168.1.1 = list remote netbios names And IPs
NET - windows network commands NET stop: stop a service (net stop spooler) NET start :start a service (net start spooler) NET use : map a network share to drive letter (net use h:\\<servername> / <sharename? Net view : view network resources (net view \\<servername>
NETDOM - manage AD, windows 8 and higher -join PC to domain, remove account, view domain info NSLookup - lookup info from DNS servers, windows,mac and linux
Troubleshooting Laptops
No display or dim - verify backlight, no light= replace inverters External Display - video good but bad LCD, replace LCD Flickering Video - check cables and connectors Input issues - laptop keyboards more fragile Ghost Cursor - modify configuration, update drivers Wireless troubleshooting - check antenna cables, multiple cables Power issues - battery not charging, batteries lose capacity over time No power = check outlet Master laptop reset - hold power button for 10 seconds External Monitor Issues - Fn keys to toggle LCD, CRT, both -external monitor bypassed LCD (uses hardware)
Troubleshooting Mobile Devices Unresponsive Screen - could be software issue, do a reset Apple IOS - power, slide, power button -hold power and home for 10 seconds Android - remove battery APP issues - not loading or slow, reset app IOS- double tap home, slide app up Android - settings, apps, select app, force stop Unable to decrypt Email - encryption built into email system -each user has a private key -Mobile device manager for private keys Short battery life - bad reception, always searching for signal
-airplane mode to fix that -disable unnecessary features, check app usage -replace aging batteries
Overheating - phone will shut down automatically to prevent damage -causes include charging, cpu useage -avoid direct sunlight Frozen Systems - nothing works, do a soft or hard reset -ongoing issue may require factory reset No sound from speakers - check volume settings (also in app) -reinstall software, try headphones -intermittent could be conflicting with other app -no sound = factory reset GPS not working - enable GPS and location services,need good sky view Swollen Battery - buildup of gas, designed to self contain -stop using immediately
Device Disassembly - much harder than desktops, hard to reassemble
-fragile
-document where parts go, cable locations
-use organizer for screws and other parts
-step by step take picture
-anti static important, tinier tools than desktop
Troubleshooting Printers
Test printer - print or scan a test page -build into windows, not printer app -Diagnostic tools Bad output - Inkjet- clean print heads -Laser - check for scratched drum Faded or blank - low toner or ink Ghost images - drum not cleaned properly, shadow of previous rotation Wrong color - low ink in one cartridge Smudges - toner now fused to paper, fuser may not be hot Paper Jam - do not rip paper out, could damage components Not feeding - check rollers Creased paper - paper loading incorrectly, wrong type of paper Printer Network Issues No connectivity - check power, wired cabling or wireless settings Access denied - security tab, print, manage printer, manage docs
Bad output -garbled characters
-bad drivers/wrong model -wrong page description language (PCL or postscript)
-bad app, check test page OS issue - unable to install printer, check 32 bit or 64 bit
-user must have proper rights to install
Backed up print queue - print server not working
-spooler crash -restart spooler (in windows)
Error message - On printer LCD screen Low memory - laser printer builds entire page in memory
-complex images use more memory
No output - check power, run test page (button on printer)
-check connectivity, print with attached device (USB) -check network and apps
Printer Troubleshooting Tools
Laser printer maintenance kits - laser printers do wear out -new feed rollers and fuser unit -check page counter to determine if needed -reset page counter when finished Toner Vacuum - specially made, anti static Outside of printer - use water or IPA Inside of printer - wipe dust away, clean rollers with IPA
Printer Spooler - manages printing in the background of windows -runs as a windows service -is not always perfect
902 Studies Section 1: Windows Operating Systems
Overview of windows Vista
Released 1-30-2007, 5 years after XP
Features-upgraded GUI, has Aero and integrated search functions
-Emphasis on security, UAC added
Home Use - Home basic: No AD or aero
Home Premium: DVD burning, more games Ultimate: bitlocker included, language packs, video background (dreamscene)
Work Use - Vista Business: AD, encrypting files, RDP, supports 2 CPUs
Enterprise - bitlocker, multilingual
Overview of Windows 7
Released 10-22-2009
Same HW and SW as vista, increased performance
New Features: libraries, homegroup, pinned taskbar
Starter- made for netbooks, no dvd drive, no aero, no WMC, only 32 bit, 2gb RAM max Home Premium - aero, dvd, 64 bit, 16gb ram max Ultimate - domain support, RDP, encryption, bitlocker, 64 bit 192gb ram max, same features as enterprise Professional - same features as home premium Domain support, RDP, EFS, no bitlocker 64bit 192gb ram Enterprise- sold only in volume license
Overview of Windows 8
New UI, new start menu. 8.1 was an update, but same OS
Core- very basic, 32&64 bit, account integration, windows defender Pro- similar to 7 pro/ultimate, bitlocker, EFS(full disk and file) Domain support and group policy Enterprise - large volume license, applocker, windows to go, direct access Physical Access Extension (PAE) PAE- allows 32 bit OS to use more than 4gb of ram Nx processor bit - protects against malicious software Streaming SIMB Extension 2 (SSE2) - instructions used by 3rd party SW And drivers
Windows Features
-64 bit can run 64 and 32 bit programs
-Drivers must match OS bit
-64 bit installs 32 bit apps in one folder (program files/x86) and 64 bit in another(program files)
Windows Aero- Only in Vista and 7, enhanced UI, allows switching between apps
UAC- user account control, limits software access, asks for admin password
Bitlocker- protects entire drive, including the OS, stays on HDD in case it’s stolen
Volume shadow copy - backup entire volumes while OS is running, even open file
System Restore- go back in time on OS to fix issues, not good for virus/malware
accessories/system tools/system restore
Sidebar/gadgets- vista had sidebar, 7 has gadgets that can go anywhere
Gadgets were discontinued for vulnerabilities
Windows 8 started using Apps instead of gadgets Ready Boost- cache to RAM instead of HDD Can be stored on flash memory Plug in compatibility Compatibility Mode - Run app as an old OS, OS pretends it’s an older version Windows XP mode (XPM) - VM on windows 7, not supported on any OSs anymore Windows Easy Transfer - migrates files and settings, xp/vista/7/8
8.1- only files, no settings
Admin tools- in the CP- computer management, services, memory tools Windows Defender- anti malware in vista/7, antivirus also in 8/8.1 Windows Firewall - allows or disallow certain traffic, prevents malware Security Center - vista (called action center in 7/8/8.1) - security overview of AV,
Updates, etc.
Event Viewer - shows everything going on, info, warnings, critical events Control Panel - category view and classing view (everything in alphabetical order)
Windows 8/8.1 Features:
Pinning : Put apps on task bar: right click then pin to taskbar Onedrive: cloud service in OS, stores files and settings Windows Store: central point for modern UI apps Multimonitor taskbar: multiple monitors with different taskbars Charms: shortcuts available at anytime Powershell: command line for sysadmins Centralized account login: syncs account with email
Windows File Structures and Paths
Storage Device Naming- letter followed by a colon (C:) Files & Folders - just like physical folders Folders can contain other folders Folder names separated by backslash C:\users\admin\documents\file.text Windows Folders - \users: user doucments, important,make sure to backup \program files: all applications \windows : OS files
Windows Upgrade Paths
Upgrade- keeps files in place, much quicker, no install needed Options: in place upgrading and clean install Cannot upgrade 32>64 or 64>32, must do clean install XP cannot install to 7, clean install Install - start over completely fresh Windows anytime upgrade- upgrade within the current OS Very easy, not available in Vista
Preparing For Windows Install
Make sure updates are current, make room on HDD, backup important data
Installation sources- cd/dvd/usb/ pxe network boot/ netboot (MAC) Type of installs- In place upgrade- saves apps and settings -clean install -image- deploy a clone on every computer -unattended- answers questions asked during install -repair install- fixes OS problems, no file changes
Dual Boot - 2 OS’s on one computer Recovery Partition- hidden partition with install files Refresh/Restore - Windows 8 feature, built into OS, no install media needed Disk Partitions - separates physical drive into logical pieces Volumes- formatted partitions with file systems (NTFS, fat 32) MBR partition - Masterboot Record -Primary - contains OS bootable file -marked as active when booted from -max of 4 primaries per disk -Extended - extends max number of partitions -one extended per disk -partitions inside extended not bootable GPT partition- GUID partition table- latest, requires UEFI -up to 128 primary partitions First step when preparing disk- partition needs to be compatible with Windows (MBR or GUID) File Systems- FAT: File allocation table, one of the first PC file systems FAT32: Larger (2 TB) volume sizes, max file size of 4gb exFAT: microsoft flash drive system, files can be >4gb NTFS: NT file system, started in windows NT, improvements Included quotas, file compression, encryption, large File support, recoverability CDFS- CD file system, all OS’s can read the CD Ext3 - 3rd extended file system, use in linux Ext4 - update from Ext3, used in Linux and Android NFS- network file system, access drives as if they were local Storage Types - layered on top of partition and file system
Basic Disk Storage- in DOS and windows, partitions cannot
Span across separate physical disks Dynamic Disk Storage - span across multiple disks to make One volume (RAID) Quick Format - new file table, overwrites existing file table Full Format - overwrites and writes zeros to all data Checks disks for bad sectors
The Windows Command Line
OS command line tools - Not all users can run all commands, need permissions
Type “help” + command or [command]/? to get info Close cmd with “exit” Diskpart- change existing volumes Format - erases everything in a partition Example - “format C:” CHKDSK - CHKDSK /f - fix errors found on disk CHKDSK /r - finds bad sectors and recovers readable info If volume is locked, run during startup DIR - lists files and directories DEL - removes file example - del [filename] MD - make directory CD- change directory RD- remove directory COPY /V - verifies files are written correctly COPY /y - suppresses overwrite prompt, example - copy [filename][drive]/v XCOPY - copies files and entire directory trees Example - xcopy /s Documents E: (E being destination) ROBOCOPY - a better Xcopy, can resume copy if errors occur TASKLIST - manage tasks from cmd, show current processes TASKKILL - terminate process SFC- scan integrity of all protected file systems /scannow - repairs files SHUTDOWN - shut down pc /s or /r = shutdown or restart EXPAND - expands folders
Managing Group Policy- manage PCs in an AD domain, GP updated at login
GPUPDATE - force a GP update GPRESULT - view policy settings for a computer or user
Windows Recovery Environment Command Prompt
Preboot Command Prompt-
Can be very dangerous, make it a last resort Can fix issues before the OS starts Able to modify system files, enable/disable services Able to create/modify partitions Start by booting from install media (choose troubleshoot on windows 8)
Master Boot Record (MBR) - not located in a partition
-knows all other partitions, master list -knows location of active bootable partition Problems with MBR - error loading OS, missing OS, invalid partition table Fixing MBR - cmd bootrec /fixmbr,fixes MBR on physical drive
Partition Boot Record - also called volume boot record
Problems- “invalid partition table” Fix - bootrec/fixboot
Rebuilding Boot Config Data - Bootrec/rebuildbcd
Creates a new boot configuration data store
Windows Operating System Features
Windows Administrative Tools
Computer Management: pre built microsoft management console Shows events, users, accounts, storage management Device Drivers - OS does not know how to talk to hardware Drivers are found in device manager Local users and groups - admin is the super user, has all permissions Regular users and guest accounts Users can be put into groupd Local Security Policy- large companies manage this through AD Standalone computers need local policies (password length, complexity, expire time length) Performance Monitor- gathers long term statistics, creates reports -OS metrics such as disk usage, memory, cpu usage Services - running in background, no user interaction (AV,file indexing,etc) Useful when troubleshooting startup Many services start up automatically Cmd control - net start, net stop Task Scheduler- schedule and app or batch file Includes pre defined schedules Print Management - manage and configure printers and drivers Memory Diagnostics - check memory modules for read/write errors
Windows Firewall & Advanced Security
Stateful firewalls - remembers the state of traffic going through it
Windows Firewalls - integrated into the OS
Has fundamental firewall rules
Based on apps, no detailed control
No scope or IP range, all traffic applies
No connection security or rules
Advanced Security - inbound/ outbound rules
Connection security rules
Set rules by program/ port, predefined, custom
Using Windows System Configuration
Msconfig - manage boot process, startup apps, services
General tab- normal startup - loads all normal programs
Diagnostic startup - loads basic services,
Step up from safe mode
Selective startup - you choose what starts
Boot Tab - set different configurations
Advanced options - set number of CPUs, max memory
Boot options - safe boot, remove GUI, create boot log
Services Tab- enable/ disable services, easier to manage, check/uncheck
Startup tab - manage which programs start automatically at log in
Moved to task manager in 8/8.1
Tools Tab- easy to access popular admin tools
Using Task Manager
Task manager contains real time statistics (CPU usage, memory, disk)
Windows 7 - Applications tab - apps running on desktop
Processes-interactive & system tray apps,other user processes
Performance- shows historical usage
Networking - see performance of each network adapter
Users- see what they are doing, send messages, log off
Windows 8/8.1 - apps, processes, and services are all on one tab
Users- shows separate processes, performance stats
Using Windows Disk Management
Used to manage disk operations Disk status - Healthy, healthy & at risk, initializing, failed Failed Redundancy - failed RAID 1 or 5 ReSyncing- RAID 1 is syncing data between drives Regenerating- RAID 5 is recreating itself based on parity bit Mounting Drives- extend the available storage space, can be a folder Makes it so you do not need another drive letter Can set up a RAID 1 mirrored volume Storage Spaces - storage for data centers or clouds Multiple tiers, administrator controlled
Windows Migration Tools
Migrate- moving all files and settings Upgrade advisor (windows 7) - checks s/w and h/w is compatibility with OS Upgrade Assistant (windows 8)- check s/w and h/w compatibility with OS
Migration Methods - side by side- 2 pcs, transfer from one to the other Wipe & load - export data, wipe pc, install OS, move data To new OS Windows 8/8.1 - use one cloud to save files and settings Windows easy transfer - transfers all user info,docs,app Settings, videos pics, not the actual apps Supports side by side & wipe and load User State Migration Tool- can be used on any upgrade Included with automatic install kit (AIK) Used at command line, in large enterprises Can migrate a large quantity of machines 2 step process: 1: scan state- compiles and stores data 2: load state - loads on destination PC
Windows System Utilities
Run Line- start an app as a command CMD- very powerful, can do anything with right permissions Regedit- windows registry editor, huge master database Drives, services, security account manager, backup Services.msc - shows background apps running Useful for troubleshooting startup Services can reveal dependencies on others MMC- microsoft management console Build your own management framework Decide what utilities or “snap ins” you want MSTSC- Microsoft Terminal Services Client Remote Desktop connection utility Common for “headless” machines Notepad - view & edit text files Explorer- file management, copy, view, or launch files MSinfo32- windows system info DXDIAG- direct x diagnostic tool, manage direct x installation DEFRAG - disk defragmentation Moves file fragments so they are contiguous Not needed with SSD’s System Restore - go back in time to an earlier working configuration Does not resolve virus or malware issues Windows update - keeps OS up to date, can be automatic Can download and not install
Windows Control Panel
Internet Options- make changes to IE General - homepage, history settings Security- Privacy- cookies, popup blocker, anonymous browsing Connections- VPN or proxy settings Programs- default browser, plug ins Advanced- detailed settings and reset Display- resolution, color, depth, refresh rate User Accounts- all local user accounts, change account settings Folder Options- manage windows explorer General- expand folders View- hide files, hide extensions Search- search options, searching non-indexed System- PC info, OS version and edition performance - virtual memory Remote settings- remote assistance and RDP System Protection- system restore Windows Firewall- integrated into the OS, protects from attacks Power Options- customize power usage Sleep- saves power, quick startup Switches to hibernate if power is low Stores open apps in memory Hibernate- open apps and docs are saved to disk Common on laptops No power is used during hibernation Programs and features- install/uninstall apps Can also enable/disable on windows Homegroup(7&8) - easily share files and devices Network settings must be set to home network Single password for everyone Devices & Printers- see everything on network Quicker and easier than device manager Sounds - configure output levels Troubleshooting - automates most common issues May require elevated access Network & Sharing Center - all network adapters (wired & wireless) Device Manager- list devices and drivers, add/remove hardware
Windows Networking
Workgroups - logical group of network devices, non centralized Every device is standalone and everyone is a peer All on a single subnet Homegroups- share files with everyone else on the homegroup Works only on a private network Network settings must be set to home or private Domain- business networks, centralized authentication Manage all devices from one central point Supports thousands of devices on multiple networks No homegroups on Vista, 7 has home network, 8 has private network
Windows Network Technologies
Network locations in Windows 7 Home - everything is trusted Work - Can see other computer but cannot join homegroup Public- You are invisible Network Locations in Windows 8 Private - similar to home, everything is trusted Public- No sharing or connectivity
Remote Access - Remote Assistance - one time remote access
Single use password Can be used through a firewall Remote Desktop Connection - on going access, may have to open ports Proxy Settings - can change the traffic flow, is an internet go between Defines an address and exceptions Network Shares - A folder accessible by anyone on the network Assign a drive letter to the network share Shares ending in “$” are hidden Printer Shares - similar to sharing folder, add a printer in windows explorer
Establishing Windows Network Connections
Network and sharing center found in the Control Panel VPN Concentrator- decrypts the encrypted data to the destination Windows has a built in VPN Multifactor Authentication - something you know, have, or are Dial Up Connections- uses a modem connection, standard phone line Wifi - 802.11 is the wifi standard SSID = Service Set Identification which is the network name WWAN - Wireless Wide Area Network - connects to cellular data
Configuring Windows Firewall
Windows firewall should always be on, only turn off for troubleshooting Settings - public and private Block all incoming connections- ignores exception list Modify Notification - notifies if app is blocked Traffic can be allowed/blocked by program name or port number Windows firewall has pre defined exception
Windows IP Address Configuration Windows gets IP address automatically through DHCP DHCP- Dynamic Host configuration Protocol Used to automatically assign private IP addresses APIPA - Automatic Private IP addressing (169.254.1.0 - 169.254.254.255) Only used if DHCP is unavailable Does not have any internet connectivity, non routing Static Address- addressed you assign manually IP Address- Unique identifier Subnet Mask - Identifies what the subnet is Gateway- The route from the subnet to the rest of the internet DNS - Translates names to IP addresses Loopback Address - 127.0.0.1
Configuring Network Adapter Properties
Properties- Link speed and Duplex need to match (autonegotiation)
Wake on LAN- computer will sleep until needed Good for late night software updates QOS - Quality of service, used to prioritise network traffic Apps, VOIP, video, all devices must support QOS DSCP Classification - Differentiated Service Code Points Classification Allows windows to change packets Managed through policy or group policy Network adapters can be enabled/disabled in BIOS
Windows Preventative Maintenance Best Practice
Scheduled Backups - can be hourly, daily, weekly
Must specify what you want backed up onsite and offsite
SMART- used to avoid hardware failures and look for warning signs
Logical and physical disk checks - in windows used CHKDSK
Scheduled Defrag - setup a weekly schedule, not needed for SSDs
Windows Updates - security patches, drivers, features
Patch Management - allows you to manage updates, many patches
Drivers/ Firmware - some updated more than others, some automatic
AV- keep it up to date
Windows Backup - backup/restore individual files
Can also do images and recovery discs
Cloud took over in windows 8
Section 2: Other OS’s & Technologies
Best Practices for MAC OS Scheduled Backups - “Time Machine” Included in MAC Hourly backups, daily, or weekly Starts deleting oldest data when disk is full Scheduled Disk Maintenance- Disk Utility- rarely needed Other utilities can run during Used to verify disk, run as needed System Updates- updates can be found in the app store Can be automatic or manual Both OS and app updates Driver/Firmware Updates- done in background, almost invisible System information is detailed hardware list Antivirus/Antimalware- not included in MAC os, 3rd party app MAC is not as vulnerable as windows
Best Practices For Linux Scheduled Backups - can use a CLI or GUI TAR- tape archive, easy to script schedule RSYNC- sync files between storage devices, Instant or scheduled Disk Maintenance- file systems require little maintenance Check file system Clean up disk space from log files System Updates - CLI tools, “apt-get” and “yum” GUI updates also Used of patch management, can be scheduled Driver/Software updates- many drivers are in the kernel Updated whenever the kernel updates Additional software updates can be done yourself Antivirus/Antimalware - not as vulnerable as windows Clam AV - open source, same update practices
MAC OS TOOLS
Time Machine - used for backups, auto and easy to use MAC takes local snapshots if time machine is unavailable Image Recovery - build a disk image in disk utility Creates an apple disk image file (.dmg) Mount on any MAC os system Appears as a normal system file Restore in disk utility Disk Utility - manage disks and images Verify and fix file systems Erase disks, modify partitions Manage RAID, restore image to volumes Create, convert, and manage images Terminal - CLI, used to run scripts Screen Sharing - intgerated into the OS Can be used with virtual networking computing Available devices in Finder or access them by IP Force Quit - stop an app from executing Command + option + escape or hold option key + right click
Linux Tools
Backups - May be built into OS GUI- backup/restore, scheduling CLI - TAR & RSYNC Image Recovery - not as many options as windows “DD”- Date Description- built into Linux and very powerful Creates an image of the entire drive 3rd party- GNU parted, clonezilla Disk Maintenance - Linux file systems do not require much maintenance Clean up logs, logs are stored in /var/log File System check- sudo touch /forcefsck Terminal - CLI for OS Screen Sharing - Can have screen access from remote device Closing Programs - use terminal, “sudo” gives admin privileges
- “Killall” can be used to stop program
Example: sudo killall firefox xKill- graphical kill<processID> - kill individual program
MAC OS Features
Mission Control - Quickly view everything that is running
Spaces- multiple desktops running
Keychain- password management: passwords, notes, certs, etc.
Integrated into the OS
Encrypts password with “3DES”
Spotlight - finds files, images, apps, or searches the web
Similar to windows search
iCloud- integrates all MAC OS’s and files
Shares across system (calender, photos, contacts)
Backs up your iOS device, integrated into OS
Gestures - customize what happens on trackpad
Swipe, pinch, click one finger, two fingers, three
Finder - OS file manager, similar to windows explorer
Remote Disk - use an optical drive from another computer
Designed for copying files
Made for data cds, not music or video
Setup in system preferences
Can set up to share with windows
Dock- fast and easy access to apps
Dot underneath icon indicates the app is running
Folders can be added to Dock
Boot Camp - dual boot into windows or MAC
Not the same as virtualization
Managed in boot camp, install partitions, drivers, etc.
Basic Linux Commands
Man- manual, help
“Man grep”
SU/SUDO - gives elevated rights, stands for superuser do
SU- become super user instead of typing SUDO everytime “Exit” to go back to regular user SUDO - used to run a single command as a super user
LS- list directory contents, similar to “dir” in windows
Lists files and directories, may suppost color coding blue= directory red = archived file Ls-l= long output
Grep- find text in a file, search through many files at once
Grep Text File “Grep banana document.log
Cd- change directory, use forward slashes instead of backslashes in windows
cd/var/log
Shutdown - similar to windows shutdown command Run as SU, time is in minutes “Sudo shutdown 2” Restart - “sudo shutdown -r 2” Ctrl-c to cancel PWD- print working directory, displays current working directory path Passwd- change a user account password “Passwd username” Can change other use password if SU MV - move a file or rename a file Move - Mv source destination Rename - “Mv first.txt second.txt” CP - copy a file Cp source destination Rm- removes a file or directory “Rm file.txt” Mkdir- make a directory or create a folder for file storage “Mkdir notes” Chmod - changes mode of a file system object Chown- change a file owner or group, modify file settings Sudo chown owner:group file “Sudo chown user banana.txt Iwconfig- view or change wireless network configuration
Change the essid, frequencies, channel, mode, rate
Ifconfig- view or configure networking info
Ip,subnet, similar to ipconfig on windows
PS- view all current processes and process IDS (PID) Apt-get - advanced packaging tool, install update or remove
“Sudo apt-get install wireshark”
Vi- visual mode editor, full screen editing with copy,paste, and more
Vi filename “Vi text.txt”
Dd- convert and copy files, backup and restore an entire partition
Virtualization
Ability to run multiple OS’s on a single desktop Host based Virtualization- virtual box, running on one main OS Enterprise Level- standalone machine that hosts the VMs Hypervisor - software that is able to create the VMs Manages the physical hardware Emmulation - trying to run the app as if it is the required OS Virtualization is the actual OS Resource Requirements - CPU must support virtualization Intel :Virtualization Technology (VT) AMD: AMD-V Memory must go above host requirements Network Requirements - VMs share IP with physical host Uses NAT to convert to the host IP Uses a private IP inside the VM Bridged Network - VM is its own device on network Private address- Can only communicate with other VMs
Cloud Computing
4 Characteristics- Rapid Elasticity - scale up and down as needed Seamless to everyone On Demand Self Service- adding resources in easy, virtualized Resource Pooling - all computer power located in one place One large instead of several small resources Measured Service- cost and use are closely tracked
Software as a service (SaaS) - on demand software, no local installation Program is managed by someone else (email,payroll) Your data is stored elsewhere (gmail) Infrastructure as a service (Iaas) -using someone elses hardware You are responsible for management and security Your data is elsewhere but you control it Example - web hosting providers Platform as a service (PaaS) - no server, no software, so HVAC Someone else handles the platform, you handle the product
You do not have direct control of data, people, infrastructure Example- salesforce.com
Cloud Deployment Models: Private- your own virtualized local data center
Public- available to everyone on the internet
Hybrid- mix of public and private
Community- several organizations sharing resources
Network Services Web server- responds to browser requests, uses standard protocols HTML, HTML5 Web pages are stored on a server Web pages are downloaded to the browser Pages can be static or built dynamically
File Server- stores all types of files Standard system of file management Windows uses SMB apple used AFP Print Server - connect a printer to a network Uses standard printing protocols (SMB, LDP) DHCP server - assigns IPs automatically
Enterprise DHCP servers are redundant
DNS Server - converts names in IP addresses Distributed- load balanced on many servers Managed by ISP or enterprise IP department Proxy Server - intermediate server, client makes requests to proxy Proxy performs the actual request from there Proxy provides result back to the client Features- caching, access control, content/url filtering Mail Server- incoming/outgoing mail, managed by ISP or IT dept. Authentication Server - login authentication to resources
Centralized management
Always on enterprise networks, not usually home Usually set of redundant servers so it’s always available
IDS/IPS- Intrusion detection system\ Intrusion Prevention System Intrusions - exploits in OS, apps, etc Buffer overflows, cross-site scripting, and others Detection - alarm or an alert for intrusion, does not stop Prevention- stops it before it gets into the network All-in-one security appliance - can be called next generation firewall Unified Threat Management (UTM) Web security gateway Examples - Firewall IDP/IPS, router, switch, spam filter Legacy Systems - really old systems Be aware if important service is running on legacy comp Embedded Systems - Purpose built device, usually no access to OS Example- alarm system
Mobile Operating Systems
iOS- based off of Unix, closed source Apps developed with software developer kits (SDK) Apps must be approved by apple Google Android- open source, based off of Linux Apps are on google play or 3rd party sites Windows Mobile -Microsoft OS,closed source,based on Windows NT kernel
Device Displays & Technologies- Calibration- older resistive touchscreens require calibration Periodically, modern touchscreens do not Accelerometer - motion sensor and detects orientation Gyroscope - detects pitch, roll, and yaw GPS - created by DOD, over 30 satellites in orbit Precise navigation requires at least 4 satellites Determines location based on timing differences
Location services use GPS, WIFI, and cell towers WIFI Calling - uses VOIP technologies, Virtual Assistant- talk to phone to get assistance (siri) Production and Development Models- IOS developed on MAC
OSx, Linux
Android- apps developed on windows, MAC osx, Linux
Apps distributed in Android app package (APK) format
Windows- apps developed in windows 8.1 visual studio Wireless Emergency Alert- similar to SMS, no cost
Works on all mobile OS’s
Mobile Device Payments - can be used with SMS
Charge to mobile account (apps) Mobile web payments from browser NFC
Mobile Device Connectivity
Baseband Radio Processor- communicates to the mobile provider
Has it’s own firmware and memory Firmware updated over the air
PRL updates (preferred roaming list)
Used on CDMA networks (verizon & sprint) Allows phone to be connected to correct tower
PRI updates (product release instructions)
Radio settings (ID numbers) network & country codes
IMEI - International Mobile Station Equipment Identity
Identifies the physical mobile device Every phone has a different IMEI Can be used to allow/disallow access
IMSI - International Mobile Subscriber Identity
Identifies the user of a mobile network In the SIM card
Wireless networks - Enable/disable data,wifi,bluetooth independently
iOS- settings/cellular Android - settings / wireless & network settings Windows - settings / wifi
Bluetooth - is a Personal Area Network (PAN)
Range of 10 meters
Tethering - phone is a wifi hotspot, uses carriers internet Airplane Mode - turns off all radios VPN - turn phone into a VPN endpoint, integrated into OS
May support mulitfactor authentication
Configuring Email on Mobile Devices
Retrieving Email- POP3 & IMAP Sending Email - SMTP POP3- downloads email to local client May delete email from mail server (TCP/110) IMAP- Access mail on a central mail server Mail is stored on the server (TCP/143) Network ports - defined by the mail provider May not be 110 or 143 SSL settings - POP3S - TCP/995 IMAPS- TCP/993 SMTP - sends email from device to server Must send mail from a local or trusted server Microsoft exchange - enterprise email, contacts, calendar, and reminders Able to sync with a mobile device S/MIME - secure/multipurpose Internet mail extensions Encrypts and digitally signs emails
GMAIL- IMAP and POP3 Yahoo - IMAP and POP3 Outlook - IMAP and POP3 iCloudmail- IMAP only
Mobile Device Synchronization
Syncing is used for many types of data (contacts, programs, emails, pics) Syncing to desktop - needs minimal memory but lots of storage space iOS- Itunes syncs everything from phone so it can transfer to another Android - syncs online with google or can use 3rd party to sync locally Windows phone - windows app with sync media but not email or contacts
Cloud syncing - all wirelessly, may be integrated with email
iOS- syncs all data to cloud, good for backup and recovery Android- syncs to google Windows- syncs to your microsoft account
Synchronization Connections- iOS- usb to 30 pic (older) or 8 pin lightning cable
802.11 wireless, or mobile network Android - usb micro or wireless
Section 3: Security
Threats- Malware- Malicious software, can gather info, such as keystrokes
Can be a bot and run in a group, called a Botnet Used for extortion-money Viruses and worms can be malware Spyware- Malware that watches you, tricks you into installing Captures web browsing habits, can be a keylogger Viruses- malware that can reproduce itself through network file systems May or may not cause issues, can be invisible or annoying AV must be updated regularly, there are new viruses everyday Worms- malware that self replicates, can take over many PC’s quickly Worms can also be good, can fix issues by spreading Trojan Horse- software that pretends to be good, but is actually a virus Better trojans can avoid and disable your AV Rootkits- can be invisible to the OS, won't see in task manager or services Modifies your core system files, part of the kernel Can be named something similar to a common windows file Ransomware- data is held hostage, OS will work but data is encrypted Must pay the bad guys for encryption key, untraceable Phishing - social engineering, fake web pages to get your login, password Always check the URL when logging in Spear Phishing- Targeted and sophisticated phishing Spoofing- pretending to be someone you are not Mac spoofing- changing mac to look like one on network IP spoofing- changing IP to look like one on network Spoofing is used in many DDOS attacks Social Engineering- suspicious phone calls, unattended persons Tricking you into giving info Shoulder Surfing - watching what someone is doing, easy to do in public Can be done from afar with binoculars Zero Day Attacks- many vulnerabilities in apps not found yet Bad guys try to find before good guys patch them DDOS- launch an army of computers to bring down a service Uses all the bandwidth or resources, traffic spike Bad guys use botnets-thousands or millions of pcs at your command Attackers are zombies, most have no idea their computer is a bot Brute Force - keep trying to log in until password is guessed Online- very slow, most accounts will lock out after so many Offline- obtain the list of users and hashes, calculate Dictionary Attack - only using well known words to brute force Non-Compliant Systems - constant challenge, always changes and updates Standard Operating Environment (SOE) - set of tested and approved hardware/software systems OS & App updates- must have patches to be in compliance, OS & AV Tailgating- use someone else to gain access to a building, follow them in Man-in-the-middle attack- traffic goes to man in middle, he forwards to Destination You never know the traffic was redirected Example - ARP poisoning Avoid by encrypting your data
Security Prevention Methods
Door Access Control- conventional key and lock Deadbolt- physical bolt Electronic- keyless, RFID badge Token based- magnetic swipe card, key fob Biometric- hand, finger, retina Mantraps- one door on each side of the room All doors unlocked, but opening one locks the other Securing Physical Items- safes- heavy, difficult to steal, environmental Cable Locks- temporary security, connects hardware to something solid Privacy Filters- screen looks black when walking by Badges & Entry Roster - security guard- physical protection Validates identity ID Badge- picture, name, other details Many include RFID chip Digital Security Prevention Methods Antivirus/Antimalware - software the runs on the PC, must keep updated Host Based Firewall- also called a personal firewall Included in many OS’s, can be 3rd party Windows Firewall filters by port,app, etc. Stops people from accessing pc from outside Only allows communication if you have started it Network Based Firewall- filters traffic by port number tcp/udp layer 4 Can encrypt traffic in/out of network Can proxy traffic as well Most firewalls can be a layer 3 device (router) User Authentication - user name and password to gain access Identifier- every windows account has security identifier Credentials- password, pin, smartcard Profile- info stored about the user (name,contact,group) Strong Passwords - weak passwords can be easy to brute force Hashed passwords can be brute forced online Complexity and constant refresh Multi Factor Authentication - more than one factor Something you are,have,know, or do Can be expensive, separate hardware tokens Can be cheap - free smartphone apps Directory permissions - NTFS permissions- much for granular that FAT Lock down access, prevent accidental mods or deletes VPN Concentrator- VPN- encrypts private data traversing on public network Concentrator- encrypt/decrypt access drive Can be hardware or software Data Loss Prevention (DLP) - stops unencrypted data from leaking Can be built into the firewall Access Control Lists (ACL)-permissions associated with an object Used in file systems, network devices, OS etc List Permissions- “Bob can read files” “Fred can access network” “Jim can access network 192.168.1.0/24 using 80,443,8088”
Disabling Unused Ports - stop anyone from plugging into your network Does not just rely on 802.1x Required periodic audits Smart Cards- contains a digital certificate Multiple factors- card + pin or fingerprint Email Filtering - unsolicited email/spam- stopped at gateway before it Gets to users Scan & Block malware - executables Trusted/Untrusted Software Sources- consider the source Must not have access to the code Trusted Source - Internal apps, well known publishers Digitally signed Untrusted Source - apps from 3rd party, links from emails Drive by downloads
Security Awareness
All policies on intranet so everyone can see In person training sessions Company policy for visitors How to deal with viruses procedure
Network Policies- govern network use, AUP, all rules signed Principle Of Least Privileged- only have rights required for job
Applies to physical & digital
Windows Security Settings
Accounts - Admin- super user Guests- Limited Access Standard User- Regular access Power user- not much more control than standard Groups - assign group of users with certain permission NTFS Permissions- apply to local and network connections Share Permissions- apply only over the network Most restrictive settings win deny > allow Explicit Permissions - set default permissions for a share or object Inherited Permissions - set a permission & applies to everything under Explicit permissions take priority over inherited Administrative Shares - Hidden Shares created during installation Local Shares are created by user View Shares - computer management/shares -net shares Authentication - user name & password + others Single Sign On (SSO) - windows domain, provide credentials once Managed through kerberos Run as Administrator- additional rights and permissions Can edit system files & install services Right click + run as administrator Bitlocker - encrypts entire volume of data including the OS Bitlocker to go - encrypts USB flash drives Encrypting Files Systems (EFS) on NTFS- password and username to Encrypt key
Workstation Security
Password Complexity- no single works or obvious passwords Strong password, atleast 8 characters Set password expiration and require change Password Expiration - all passwords should expire Critical systems could expire more often Recovery should have a formal process Desktop Security- require a screensaver password Disable auto run, disabled in the registry No autorun in 7/8/8.1 Consider changing autoplay (Flash drive) Have all security patches Passwords- change all default usernames/passwords BIOS- supervisor/admin password- prevent changes User password - prevents booting User Permissions - Not everyone should be an admin Groups - assign rights to group, add users to group Login Time restrictions - only able to log in during work hours Disabling Unnecessary accounts- disable guest account if not needed Only some accounts run services, disable interactive logins Change default names and passwords to prevent brute forcing Account Lockout- too many wrong passwords, can prevent brute forcing Data Encryption - full disk or file system, removable media Backup keys, may be integrated into AD Patch & Update Management - built into the OS, update utility Many apps include updater
Securing Mobile Devices
Screen Lock- fingerprint,face recognition,swipe pattern,passcode/pin Too many fails- iOS- erase all data after 10 attempts Android- locks device and requires a google login Windows - delays next attempt or factory reset Locators - built in GPS, able to find phone on a map Control from afar, or wipe everything Remote Backup- backup to cloud, restore with one click Antivirus/Antimalware- iOS- equipment less vulnerable Malware must find a vulnerability Android- more open, apps can be installed from anywhere Easier for malware to find a way in WIndows phone - closed environment Apps run in “sandbox” Patching/OS Update- security updates, don’t want to get behind Biometric Authentication - multifactor authentication Something you are, know, have….etc. Authenticator Apps - random token generator Full Device Encryption - phone keeps the key iOS8 & later- data encrypted with passcode Android- encryption can be turned on Windws phone 8/8.1 - available with exchange active sync -also available with mobile device manager Trusted vs Untrusted Source - Do not install APK from untrusted source iOS- all apps are checked by the app store Andorid - google play is good, 3rd party bad Windows- apps are created by microsoft Firewalls- mobile phones do not include a firewall Most activity is outbound, not inbound Mobile firewall apps are available Policies & Procedures - BYOD- bring your own device MDM- mobile device manager Centralized management of mobile devices Set policies, data stored, camera, control device Manage Access Control- require pins or passcodes
Data Destruction and Disposal
Physical Destruction - never to be used again Shredder, tools, electromagnet, fire Certificate of Destruction - done by 3rd party Gives confirmation it was destroyed Paper trail of when it was destroyed Disk Formatting - Low Level Format- provided by factory Not possible by user Standard/Quick Format- sets up a file system Clears master file table Creates a boot sector Can still be recovered Standard Formatting - overwrites every sector with 0’s Available in windows vista and later Cannot recover data Hardware Security - always audit 3rd party destruction File Level overwrite-Sdelete- windows sysinternals Whole drive wipe - DBAN, Dariks Boot & Nuke Secure data removal
Securing a SOHO Network
SSID Management - Service Set Identifier
Change default name to something unique Disable your SSID broadcast
Wireless Encryption - only people with password can transmit and listen
WEP- outdated and insecure Use WPA or WPA2
Antenna Placement - AP’s close to each other should not be on same channel
Same channel will cause frequency overlap
Power Level Controls- set as low as possible so people in house can access
Make it so no one outside can access
MAC Address Filtering - Limit access through phyical address
Not foolproof, MAC cloning Set up in WAP
WPS- wifi protected setup
Easier to connect to wifi, uses a pin configured on the AP Push button on the AP , NFC is used Very easily hacked, not used on modern APs
Default username and password- must change to something unique IP Addressing - DHCP or static
IPs are easy to see on unencrypted network
Firewall Settings - Inbound- allow only required traffic
Port forwarding to map ports to device Consider a DMZ Outbound- blacklist- allow all, block some Whitelist- block all, allow some
Disabling Physical Ports- disable unused ports to prevent access
Network access control- 802.1x controls Cannot communicate unless authorized
Content Filtering- control traffic based on data within content
Can filter data for sensitive data Can control inappropriate content Scan against malware and viruses
Physical Access- doorlocks, biometrics
Section4: Software Troubleshooting
BSOD- startup and shutdown BSOD- bad hardware, drivers, app
Apple- pinwheel/beachball- hang or constant retries by app Fix- use last known good configuration or safemode Restore or remove hardware
Boot errors- cant find OS, OS could be missing
Boot loader chaged or replaced, multiple OS’s installed FIX- check boot drive, remove any media Start up repair, command “bootrec/rebuildbcd
Improper Shutdown- should recover normally
If not, “launch startup repair” should fix most issues
Missing GUI- no login or desktop, start in VGA mode and run SFC
Update the drivers in safe mode 8/8.1- repair/refresh
Startup Repair
Missing NTLDR- main windows bootloader issue Run startup repair, check boot device Missing OS- boot configuration may be wrong Run startup repair or manually configure BCD Auto safe mode boot- run startup repair
Linux- Missing GRUB- Grand Unified Bootloader, most common
LILO- Linux Loader, least common Missing bootloader- could be overwitten by other OS
Starting the System
Device not starting- check device manager and event viewer remove/replace driver “One or more services failed to start”- bad driver/hardware Try manual start, check permission Check file systems, reinstall app DLL- Dynamic Link Library- code installed that many apps use A shared library DLL versions are very specific Apps are written to a library version Windows File Protection/Windows Resource Protection Protects DLL versions to avoid conflicts Files & Compatibility Errors- files associated with apps Configure file types to specific apps
Control panel / default programs applet Compatibility Tab- run app as an older windows app
Slow System Performance
Task Manager- check for CPU usage and input/output Windows Update- Keep patches and drivers updated Disk Space- check for available disk space or run defrag Laptops- confirm the laptop is not in power saving mode AV/AM- scan for any infection Kernel Panic- unix, linux, MAC OSx, similar to windows BSOD Stops all activity Multiple Monitor Misalignment- monitors not “aligned” Mouse will not move easily between screens Just drag the monitors into alignment Can be fixed in control panel/display/screen resolution
OS Troubleshooting Tools
BIOS/UEFI Tools- Built in diagnostics, check for temps and current stats SFC- system file checker, integrity scan os OS files, find & corrects errors Logs- found in windows event viewer & Boot logs C:\windows\nbtlog.txt Linux- individual app logs /var/log MAC- utilities/console CMD- can accessed pre boot, gives you complete control System Repair Disc- boots & provides you with recovery options Pre-Installation Environment (PE)- minimal windows operating environment Used for troubleshooting and recovery Can built your own PE MSconfig- enable/disable startup apps and services Defragmentation- modifies file fragments so they are contiguous Cmd-defrag Regedit- registry editor, used to modify settings add/modify/delete keys Regsvr32- register/unregister DLLs Event Viewer- see what is going on with apps, setup, security, settings Options at Boot time- F8 to get to advanced boot options Most recovery options are found here Safe Mode- in advanced boot options VGA mode- low resolution, used for video driver issues Uninstall/reinstall/repair- 8 & 8.1 includes a refresh option Refresh option cleans out windows without losing files
Troubleshooting Security Issues
Popups- Could be legitimate or malicious
Have an updated browser and a pop up blocker If pop ups are not related to your browsing, scan for malware Browser Redirection- instead of a google result, you end up elsewhere Caused by malware, run a malware scan
Browser Security Alert- security alerts and invalid certificates Means something is not right Check out details by clicking the lock icon Could be an expired or wrong domain Malware Network Symptoms-slow performance, lockups, connectivity Issues, OS update failures Malware OS Symptoms- Renamed system files, files disappear or become Encrypted, can change file permissions System Lockup - completely stops, toggle caps lock to see if OS responds May be able to terminate bad apps with task manager Check logs after restarting to see the cause App Crashes- apps stop working or just disappear Check out the event log and the reliability monitor Reliability monitor has history of app issues Virus Alerts & Hoaxes- Rogue Antivirus- fake, may include real logs Wants to bill you Ransomware- asks for money or subscription for Access to your PC Email Security- Spam- unsolicited email, phishing, ads, spreads viruses Hijacked email- infected PCs can become email spammers
Tools for Security Troubleshooting
AV&AM- stops malware from running, must keep signatures updated daily Sometimes they are bundled together Recovery Console/CMD - very powerful, filesystem access Terminal- cmd for MAC/Linux, able to modify every aspect of the OS System Restore- create restore points, go back in time to correct problems Does not guarantee recovery from virus/malware LVM Snapshots- local volume manager- just like windows restore Works very quickly Pre Installation Environment- minimal windows OS environment Used for troubleshooting and recovery Event Viewer- get info about security events and whats going on in your PC Refresh & Restore- windows 8/8.1 Refresh- reinstalls windows but keeps files and settings in place Restore- returns to a previous restore point MSconfig- safeboot minimal- loads GUI but no networking Safeboot alternate shell- cmd with minimal services, no network Safeboot active directory repair- safe mode with file explorer & AD Safeboot:Network- uses networking
Best Practices for Malware Removal
Malware Symptoms - odd error message, unusual icons or apps, very slow Quarantine Infected systems-disconnect from network to stop spreading Isolate removable media Disable System Restore- malware can also infect restore points Delete all the restore points you have Disable system protection Update AV- keep signature and AV version up to date Automate updates instead of doing it manually Malware can prevent updates Scan & Remove- get a well known program, use standalone removal apps Safe mode- just enough services to get the OS running, bare minimum May prevent the malware from running Schedule- AV&AM automatically update signatures Make sure OS updates are scheduled Enable System Restore- only do once the system is clean Educate End User- one on one training, visable posters
Troubleshooting Mobile Device Apps
Dim Display- check brightness settings Could be a backlight issue Wireless Connectivity- intermittent, try moving closer to the AP None- check/enable wifi, confirm correct key Do a hard reset Non responsive touchscreen- Apple- iOS restart, hard or regular Android- remove battery and put back in Hold the power and volume button App issues- apps run slow or not loading Restart the phone or close out of the app Update the app Unable to decrypt email- built into corporate email systems Each user has their own private key Install individual private keys on each device Done with the mobile device manager Short battery life- bad reception, always signal searching Turn off unnecessary features Battery could be aging Overheating- phone will automatically shut down if too hot Check apps for CPU usage Avoid direct sunlight Frozen System- hard or soft reset If problem is ongoing, do a factory reset No sound- check volume settings for the app and phone Bad software, delete and reload Try headphones or external speakers Sound starts then stops- could be dueling apps No sound- factory reset, load the latest software Inaccurate Touch Screen response- close some apps, low memory Restart the device May require new digitizer or reseat cables System Lockout- too many incorrect password attempts
Mobile Device Security Troubleshooting
Signal drop/weak signal- only use a trusted network Never use public wifi without a VPN Speed test- cell tower analyzer and test Power Drain- heavy app usage, increased network activity
Check app before install, use app scanner Run anti malware, factory reset and clean app install Slow Data Speeds- use a trusted wifi network Run a wifi analyzer Run a speed test Examine apps for unusual activity Unattended Bluetooth Pairing- never pair a device that isn’t yours Remove device and repair Can just disable bluetooth completely also
Locked Information- determine cause of data breach with AV or AM Do a factory reset Unauthorized Camera/Mic usage- AM scan, factory reset, app scanner
Section 5 Operational Procedures
Managing Electrostatic Discharge
Static Electricity- electricity that does not move, can be very damaging Around 3500 volts.100v is only needed to cause damage Controlling ESD- humidity over 60% helps Use hand to self ground, metal case of PS works Unplug PC from a power source Do not touch components directly, card edges only Use antistatic pad & wrist strap Antistatic bags for components
Computer Safety Procedures
Remove all power sources before working on a device Replace entire power supply versus trying to repair it Equipment Grounding- diverts electrical faults away from people Large equipment racks have a large groundwire Do not use electrical grounding for static grounding Personal Safety- Remove jewelry, neck/badge straps Lift with legs, use a cart Electrical Fire Safety- no water or foam Carbon dioxide, FM-200, dry chemicals Cable Management- tie together, avoid trip hazards Safety glasses & air filter mask Toxic Waste- dispose of batteries at hazardous waste facilities CRT glass contains lead Recycle & reuse toner, ship toner back to company Local Government & Regulations- health and safety laws Building & electrical codes Environmental- proper disposal of electronic components
Managing Your Computing Environment
Disposal Procedures- check your MSDS MSDS- product and company info Includes ingredients, hazard info, etc. Environmental Controls- Temperature- devices need constant cooling Humidity- 50% is good Proper ventilation- helps circulate the heat UPS- uninterruptible power supply- backup battery Types- Standby- always a primary power, has backup batteries On-line- always running off of the batteries Surge Suppressor - spikes are sent to ground Noise filter removes line noise Surge Suppressor Specs - higher joules is better, more protection High amp rating is good Let through rating- less is better Protection From Airborne particles- protects from dust,oil,smoke, etc. Dust & Debris- cleaning with neutral detergents, non ammonia based
Use a computer vacuum, reduces static Compressed air pump instead of canned air
Prohibited Activity & End User Policies
First Response- identify issue- logs, in person, monitoring data Report to proper channels Collect and protect info on event Documentation - outline in security policy Documentation must be available to employees Detail as much as possible Chain Of Custody - control evidence, maintain integrity Avoid tampering, use hashes Label and catalog, seal, store, digitally sign Licensing/EULA - closed source- source code is private End user only gets the .exe file FOSS- Free and Open Source Software End user makes their own .exe EULA - determines how software is allowed to be used Digital Rights Management - DRM- electronic limits on use of software Licenses- Personal- associated with the device owned by one person Designed for home use, one time purchase Enterprise - site licenses, can install everywhere, annual renewals PII- part of privacy policy, determines how to handle PII Contents Policies - security policies Block Policies - block by URL, app, username/group
Communication
Communication skills are needed for troubleshooting Avoid Jargon - no acronyms or slang when helping customer Translate technical terms for simpler terms Avoid Interrupting- Listen to customers issue even if you know answer Clarify Customer Statements - ask questions to clarify customers issue Repeat your understanding to customer Setting Expectations - offer options ( repair/replace) State the cost & time frame Document everything Follow up for customer satisfaction
Professionalism
Maintain a positive Attitude- keep a positive tone of voice Problems cannot always be fixed but do your best Have a good attitude with the customer Avoid Being Judgemental- No insults, you are the teacher You also make mistakes Goal is to make people smarter Be on time & Avoid Distractions- no phone, no talking to others customer and their issue is your number one concern Create an environment for conversation Difficult Situations- Do not argue or be defensive Make easier by listening and asking questions Communicate even if there is no update on progress Never vent on social media Don’t minimize problems - technical issues can be traumatic Must be a tech and a counselor
Maintain Confidentiality- keep private info private IT people have access to a lot of data Be respectful with other’s personal info
Troubleshooting Theory
Identify the problem- gather information Get as much info & duplicate issue if possible Identify symptoms, may be more than one Question the end user Determine any recent changes to environment Establish a Theory - start with the obvious, but consider everything Make a list of all possible causes Test The Theory - confirm the theory, determine the next steps Re-establish theory if it did not work Call an expert for other ideas Create A plan of action - once theory is working, correct the issue Some issues cannot be fixed curing regular hours All plans can go bad, have a plan A,B, & C Implement the Solution - fix the issue Escalate if necessary, may need 3rd party Verify Full System Functionality- confirm the solution solved the issue Have the customer test and confirm also Implement preventative measures Document Finding- Don’t lose the knowledge Consider a formal database