Windows Help document Part A

Size: px
Start display at page:

Download "Windows Help document Part A"

Transcription

1 Compiled by: Todd Johnstone Before starting these steps, open a Word document, save it in documents in a folder called computing problems and use that document to capture items that show as bad as you go through this tutorial. Give it a filename with the date you collect the data for example. Windows 10 customized items and troubleshooting. Taskbar and start menu properties. o Right click on task bar at bottom of screen o Select properties o On the taskbar and start menu properties Choose task bar location (Taskbar tab) Navigation tab (Click on corner navigation) Windows key + X or right click on lower left corner brings up power shell Tool Bars remove unused toolbars as needed. Sample of Power Shell Options: Page 1

2 Power Shell gives quick access to: Programs and features was old uninstall software option Event Viewer very useful to check on health of machine Control Panel Control all options as needed Search (only place to find it sometimes) Computer Management o Performance Open resource monitor to see what is happening to slow computer. o Click on cpu to rank processes in order of cpu % Use Task Manager Boot time log, Admin events, system problems Events and Errors Message Center Each time the machine is booted a log is kept and evaluated, here is a horrible boot (mine) Log Name: Microsoft-Windows-Diagnostics-Performance/Operational Source: Microsoft-Windows-Diagnostics-Performance Date: 8/9/2016 5:20:05 PM Event ID: 100 Task Category: Boot Performance Monitoring Level: Critical Keywords: Event Log User: LOCAL SERVICE Computer: Deneb-3 Page 2

3 Description: Windows has started up: Boot Duration : ms Note: 157 seconds! IsDegradation : false Incident Time (UTC) : T00:14: Z Windows slow issues: There is a windows 10 process that uses a lot of cpu for no good reason: Runtime Broker it s designed to give you continuous hints and suggestions in windows 10 as you work. Try turning all the useless notifications off and see if speed improves, and if you miss any of the services. Settings->System->Notifications and actions->>>>> Unselect Show me tips about windows 10 All of these are set to on as a default. Page 3

4 How do I know if I m connected to the internet if the browser doesn t seem to work? Click on lower left corner (or windows x power shell) Type RUN Open CMD A black dos command window will open, type the following: ping google.com To EXIT a cmd window type Exit, To stop an activity type (CTL) C. This will tell you if you get a ping reply from google, and how fast, under 100MS is fast. Any lost packets are a problem, as is an inability to find google.com Many viruses redirect the DNS (Domain name server) to a spoof one. Above see that google.com was correctly identified as ip address [ ] and using that 4 pings were sent out and replies were received. In other words. If you can ping google, you can communicate on the internet. Page 4

5 Domain Name Service (DNS) Domain name service is the internet directory to look up addresses. DNS servers take a (URL) Name like google.com and look up the real IP internet address. Use of IP addresses and domain names to Ping or trace route are excellent ways to see if your problem is network related. has many tools that can be used for network troubleshooting. Network Tools Tools that can be run from command line Example: run=> cmd => ping google.com ipconfig This tool returns the IP address of your machine, on your local network, also returns the gateway used to access the internet and the DNS servers being used. (full is ipconfig /all which shows all adapters on the machine) NSLOOKUP will look up the domain, or if given the Domain will look up the IP address of that domain. Example: nslookup google.com Page 5

6 Ping Ping sends a message to an ip address or domain with a small amount of data, the end hardware then reply s. The time to go to and from the end machine/router is measured. Also percent loss if measured to see if all pings were returned. The ping confirms a network connection between your machine and google. With no lost messages. Trace Route - tracert This is a really fun tool which traces the route across the internet that your ping follows. It will also show if there are portions of that path which are slow or non-responsive. Tracert google.com Page 6

7 Following the trace route the first hop is inside the house to the amped router within the house, then to the gateway within the DSL box supplied by the phone co. (Hop 2) After that we go to major phone company backbone routers in Tukwilla, seattle, and various other locations, the longest delay is hop 6 which is a qwest.net router. can be used to check who owns the IP addresses in this trace. The final address is owned by Google: Local Area Network (inside your house) Since nearly everything connected to the internet will respond to a ping a broadcast ping can be sent to cause all devices to respond. Looking at ipconfig it showed my gateway to be , substituting.255 for the.1 will cause everyone to respond: Ping Page 7

8 However we don t really see them respond unless we check a table within the computer called the ARP table (address resolution protocol) which is where the computer listens to all the network traffic, and takes note of what it hears so it can more quickly find devices (like your printer). (IP addresses need to be converted to physical addresses called : MAC addresses ) Arp a will show the arp table. Everything that responded will be in the arp table: An interesting thing about MAC addresses is that it tells what the device is, and who made it. This tool will help look up a vendor for an address: Put in the first 3 sets of number c for example which comes back to Belkin - F8-7b-8c ---- traces to F8:7B:8C Amped Wireless which is the manufacturer of my router and 8 port switch :80:77 Brother industries, LTD. Which is my printer. Page 8

9 Lastly what is my computer taking to right now? Netstat -a This provides much more information than can easily be digested, however, if looking for spyware and other connections it can be helpful: It will keep telling you what is communicating until you close the command window. Open your browser and go to google.com and you can see the connections being established. Page 9

10 Anti-virus and Anti-Malware Windows 10 has windows defender which should be all you need, with a functioning windows firewall. Check on the status of your protection and update status by going to Settings => Update & Security => Windows Defender Clear up Malware infections If your computer is infected and you need to remove a virus: Malwarebytes.com is excellent and the paid version gives real time protection. Also check out Malwarebytes Anti-exploit Freeantivirus.com/us/ Trend Micro House Call : one time scan from trend micro Trend Micro Antivirus: Comodo for windows 10: Page 10

TCP/IP Diagnostic Utilities on Windows 2008 Server

TCP/IP Diagnostic Utilities on Windows 2008 Server TCP/IP Diagnostic Utilities on Windows 2008 Server June 20, 2012 Copyright 2012 by World Class CAD, LLC. All Rights Reserved. TCP/IP Utilities In this lesson, we will learn about how to use the TCP/IP

More information

ANNOYING COMPUTER PROBLEMS

ANNOYING COMPUTER PROBLEMS ANNOYING COMPUTER PROBLEMS And their solution Before you do this to your computer read this information. Feel free to print it out. This will make it easier to reference. Table of Contents 1. Computer

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 9 Networking Practices

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 9 Networking Practices : Managing, Maintaining, and Troubleshooting, 5e Chapter 9 Networking Practices Objectives Learn how to connect a computer or small network to the Internet using a broadband, satellite, or dialup connection

More information

Fix network connection issues in Windows 10

Fix network connection issues in Windows 10 0 Sign in Fix network connection issues in Windows 10 If you re having problems getting connected to a network and can t connect to the Internet, here are some things you can try in Windows 10. Things

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network Chapter 17 Windows Resources on a Network Objectives Learn how to support some client/server applications Learn how to share and secure files and folders on the network Learn how to troubleshoot network

More information

NET 311 D INFORMATION SECURITY

NET 311 D INFORMATION SECURITY 1 NET 311 D INFORMATION SECURITY Networks and Communication Department TUTORIAL 6 :Securing Your Windows 8 System 4 Steps to secure your windows 8 system 2 1. Configure Windows 8 Settings. 2. Installing

More information

Lesson 12 Lab Key Lab Exercises

Lesson 12 Lab Key Lab Exercises Lab 1 Doing a Ping Test Lesson 12 Lab Key Lab Exercises The purpose of this lab is to familiarize the student with running a ping test. This lab will also help the student correctly interpret the results

More information

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com Networking Notes Common Internet Speeds Dial Up 56 kbs 1000kbs = 1 mbs (1 user capacity) DSL 1.5 mbs (1 channel 10 user capacity) T1 1.5 mbs (24 channel 500 user capacity) Scalable Ethernet (Adjustable

More information

A+ Certification Guide. Chapter 16 (Part B) Networking

A+ Certification Guide. Chapter 16 (Part B) Networking A+ Certification Guide Chapter 16 (Part B) Networking Chapter 16 (Part B) Objectives Installing and Configuring Network Interface Cards Networking Configuration for Small Network Switches and Routers Setting

More information

Troubleshooting Your Network

Troubleshooting Your Network Troubleshooting Your Network Networking for Home and Small Businesses Chapter 9 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License 3.0 By-Sa Cisco name, logo and

More information

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Protegent Total Security Solution USER GUIDE 2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Table of Contents PROTEGENT TOTAL SECURITY...3 INSTALLATION...4 REGISTERING PROTEGENT TOTAL SECURITY...

More information

WHEN YOUR COMPUTER SLOWS TO A CRAWL

WHEN YOUR COMPUTER SLOWS TO A CRAWL WHEN YOUR COMPUTER SLOWS TO A CRAWL A Hands-On Class Featuring More Than a Dozen Individual Step-By-Step Ideas that You Can Use on Your Own Presented by Bill Wilkinson 1. Beware of Computer Repair Offers

More information

Quiz 7 May 14, 2015 Computer Engineering 80N

Quiz 7 May 14, 2015 Computer Engineering 80N Quiz 7 May 14, 2015 Computer Engineering 80N Left Neighbor: Right Neighbor: Keep this side up on your desk until you are told to turn the page over. This is a closed book quiz. No calculators. First Name

More information

Windows. Not just for houses

Windows. Not just for houses Windows Not just for houses Windows 110 Windows Server Essentially a jacked up windows 8 box Still GUI based Still makes no sense No start menu :( (Install classic shell)... trust me... Windows Server

More information

Copyright Link Technologies, Inc.

Copyright Link Technologies, Inc. 3/15/2011 Mikrotik Certified Trainer / Engineer MikroTik Certified Dude Consultant Consulting Since 1997 Enterprise Class Networks WAN Connectivity Certifications Cisco, Microsoft, MikroTik BGP/OSPF Experience

More information

CompTIA CompTIA A+ Certification.

CompTIA CompTIA A+ Certification. CompTIA 220-902 CompTIA A+ Certification http://killexams.com/pass4sure/exam-detail/220-902 Question: 1177 A user wants to configure their network to support VoIP. Which of the following would BEST support

More information

Networks and the Internet

Networks and the Internet UofM Internet Concepts TECH 1010 Dan Kohn University of Memphis Engineering Technology Department 2018 v2.1 ed. Networks and the Internet A network is a collection of computers and devices connected together,

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Windows. Not just for houses

Windows. Not just for houses Windows Not just for houses Everyone Uses Windows! (sorry James!) Users Accounts to separate people on a computer Multiple user accounts on a computer Ex) shared family computer Access level can be set

More information

Cannot Remove The Mcafee Agent Other Products Are Using It

Cannot Remove The Mcafee Agent Other Products Are Using It Cannot Remove The Mcafee Agent Other Products Are Using It Trying to uninstall Mcafee agent gives me a "can't uninstall agent because it is in use by other programs" error. Using the cleanup utility also

More information

Parrot Dialer Requirements

Parrot Dialer Requirements Parrot Dialer Requirements Ensure EACH agent meets ALL of the requirements below. Quick check: USB Headset Computer with Sound Card and Windows 7 (or higher recommended) or MAC or Chrome operating system

More information

CTS2134 Introduction to Networking. Module : Troubleshooting

CTS2134 Introduction to Networking. Module : Troubleshooting CTS2134 Introduction to Networking Module 10.4 10.7: Troubleshooting Interpreting ipconfig Condition Static IP DHCP Alternate Configuration APIPA ipconfig /all Output DHCP Enabled = No and DHCP Server

More information

Packet: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets.

Packet: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets. Broadband Setup from A to Z Print out all the info below and get to work...have fun!! A word of caution! It is very important that you SECURE your wireless network using WEP or WPA encryption (password).

More information

Monitoring the EN-2000

Monitoring the EN-2000 EN-2000 Reference Manual Document 9 Monitoring the EN-2000 T his document provides information for monitoring the EN-2000 router s configuration and performance. Screens specifically for monitoring the

More information

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA A+ Certification ( ) Study Guide Table of Contents CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System

More information

Incident Response Tools

Incident Response Tools Incident Response Tools James Madison University Dept. of Computer Science June 13, 2013 1 Introduction Being successfully attacked is inevitable. A determined hacker WILL be able to penetrate your network.

More information

15 CMD Commands Every Windows User Should Know

15 CMD Commands Every Windows User Should Know 15 CMD Commands Every Windows User Should Know https://www.makeuseof.com/tag/15-cmd-commands-every-windows-user-know/ Contents 1. Assoc... 1 2. Cipher... 2 3. Driverquery... 2 4. File Compare... 3 5. Ipconfig...

More information

Software troubleshooting

Software troubleshooting N E W S L E T T E R IT Computer Technical Support Newsletter Software troubleshooting November 9, 2015 Vol.2, No.4 TABLE OF CONTENTS Software troubleshooting...1 Unexplained software crashes and error

More information

Chapter 14: Advanced Troubleshooting

Chapter 14: Advanced Troubleshooting Chapter 14: Advanced Troubleshooting IT Essentials v6.0 ITE v6.0 1 Chapter 14 - Sections & Objectives 14.0 Introduction Review Troubleshooting Steps 14.1 Computer Components and Peripherals Troubleshoot

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

Troubleshooting Can not access the router on

Troubleshooting Can not access the router on Troubleshooting Can not access the router on 192.168.0.1 Please note that when accessing the router s Web interface via http://192.168.0.1 you are not accessing some web site on the Internet. The router

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program

How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program How to find out if malware--a Trojan, virus, or worm got past your anti-virus and firewall, how to remove the malicious code manually.

More information

MIS Week 6. Operating System Security. Windows Antivirus

MIS Week 6. Operating System Security. Windows Antivirus MIS 5170 Operating System Security Week 6 Windows Antivirus Tonight s Plan 2 Questions from Last Week Review on-line posts In The News Malware/Spyware Detection tools Antivirus Sniffers Assignment 3 Overview

More information

Install and Configure ICT Equipment and Operating Systems Unit 229 Utility Programs

Install and Configure ICT Equipment and Operating Systems Unit 229 Utility Programs Install and Configure ICT Equipment and Operating Systems Unit 229 Utility Programs What is a Utility Program? Utility Program Definition Smaller than an application in size, a utility program is a computer

More information

Chapter 3 LAN Configuration

Chapter 3 LAN Configuration Chapter 3 LAN Configuration This chapter describes how to configure LAN Setup, LAN Groups and Routing (Static IP) features of your ProSafe VPN Firewall 50. These features can be found under the Network

More information

Lab 9.8.1: Address Resolution Protocol (ARP)

Lab 9.8.1: Address Resolution Protocol (ARP) Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5

More information

Remove Mcafee Antivirus Plus 2013 Link Version For 90 Days

Remove Mcafee Antivirus Plus 2013 Link Version For 90 Days Remove Mcafee Antivirus Plus 2013 Link Version For 90 Days Meanwhile McAfee Antivirus Plus insisted that my AV subscription expired, and I am getting tech help to remove it and put Microsoft essentials

More information

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic Chapter Objectives n Understand how to use appropriate software tools to assess the security posture of an organization Chapter #7: Technologies and Tools n Given a scenario, analyze and interpret output

More information

Update your network settings

Update your network settings IT2400 - ARP Lab Objectives Use different network utilities to obtain information about your computer and network This should be done on your Windows virtual machine Update your network settings Make sure

More information

Spreedbox Getting Started Guide

Spreedbox Getting Started Guide Spreedbox Getting Started Guide Last Updated: September 2017 CONTENTS 1. Introduction... 3 2. Prerequisites... 4 3. Opening the box... 5 4. USB Manual, Quick Start Guide & MAC Sticker... 6 5. International

More information

Even a non-technical user can even operate it with ease.the user can do any task in CCS with just a few clicks.

Even a non-technical user can even operate it with ease.the user can do any task in CCS with just a few clicks. The Comodo Client Security identifies all security risks and provides protection against it.now, the interface of the Comodo Client Security is made very simple. It is integrated with Firewall, Antivirus,

More information

Session 16 Windows 7 Professional DNS & Active Directory

Session 16 Windows 7 Professional DNS & Active Directory Session 16 Windows 7 Professional DNS & Active Directory Fall 2011 ITE153 Operating Systems 1 Session 16 Windows 7 Professional Configuring TCP/IP Addressing & Name Resolution Fall 2011 ITE153 Operating

More information

This chapter discusses some common problems and their solutions

This chapter discusses some common problems and their solutions Troubleshooting Hardware and Performance This chapter discusses some common problems and their solutions for hardware on your system including the normal components of a computer. Additionally, information

More information

Configuring your Home Wireless Network

Configuring your Home Wireless Network Configuring your Home Wireless Network Questions How many of you have more than one computer at home? How many of you connect to the Internet using broadband (Cable or DSL) How many already have a home

More information

N exam.420q. Number: N Passing Score: 800 Time Limit: 120 min N CompTIA Network+ Certification

N exam.420q. Number: N Passing Score: 800 Time Limit: 120 min N CompTIA Network+ Certification N10-006.exam.420q Number: N10-006 Passing Score: 800 Time Limit: 120 min N10-006 CompTIA Network+ Certification Sections 1. Network security 2. Troubleshooting 3. Industry standards, practices, and network

More information

Adding Malwarebytes Anti-Malware Protection to a Computer from the Creator's Web Site

Adding Malwarebytes Anti-Malware Protection to a Computer from the Creator's Web Site Adding Malwarebytes Anti-Malware Protection to a Computer from the Creator's Web Site Malwarebytes.com Malwarebytes is the Anti-Malware Industry s leading scanner. It detects and removes malware like ads,

More information

The Library Res-Net Troubleshooting Guide

The Library Res-Net Troubleshooting Guide The Library Res-Net Troubleshooting Guide My Res-Net connection is not working If your Res-Net connection is not working then it will be due to one of three things: the computer, the network cable or the

More information

Networking By: Vince

Networking By: Vince Networking 192.168.1.101 By: Vince Disclaimer I am NOT a Networking expert you might ask questions that I don t know the answer to Networking is hard to teach but I know how to do your homeworks so that

More information

Anti-virus SCEP and Windows Defender. Common symptoms of an infection. How to Open SCEP or Windows Defender

Anti-virus SCEP and Windows Defender. Common symptoms of an infection. How to Open SCEP or Windows Defender Anti-virus SCEP and Windows Defender The University of Aberdeen uses System Center Endpoint Protection software (SCEP) and Windows Defender to protect servers and networked Windows PCs against viruses,

More information

Cannot Uninstall Mcafee Agent Because Other

Cannot Uninstall Mcafee Agent Because Other Cannot Uninstall Mcafee Agent Because Other Products Are Using It Is there a tool or a command line to manually uninstall the agent deployed by beta EPO 5.2? via Programs and Features using the default

More information

Unable To Uninstall Avira Antivirus Error Code 7

Unable To Uninstall Avira Antivirus Error Code 7 Unable To Uninstall Avira Antivirus Error Code 7 20:15:35 (UPD) (ERROR) Failed to get update bridge data: WinHTTP: Failed to send Since I have Avira Antivirus Pro (paid for product) I contacted Avira email

More information

GreenEye Monitor. GEM Communication Setup Manual. For GEM model: GEM-W. (Wifi Only Option)

GreenEye Monitor. GEM Communication Setup Manual. For GEM model: GEM-W. (Wifi Only Option) GreenEye Monitor GEM Communication Setup Manual For GEM model: GEM-W (Wifi Only Option) Document Code: COM-W Ver 1.7 2013-10-23 Copyright Brultech Research Inc. 2013 Introduction CONTENTS 1 Introduction...

More information

UKNova s Getting Connectable Guide

UKNova s Getting Connectable Guide UKNova s Getting Connectable Guide Version 1.2 2010/03/22 1. WHAT IS "BEING CONNECTABLE" AND WHY DO I NEED IT? Being connectable means being able to give back to others it is the fundamental principle

More information

Using SANDBOXIE to Safely Browse the Internet (verified with ver 5.22) Jim McKnight Sandboxie.lwp revised

Using SANDBOXIE to Safely Browse the Internet (verified with ver 5.22) Jim McKnight  Sandboxie.lwp revised Using SANDBOXIE to Safely Browse the Internet (verified with ver 5.22) Jim McKnight www.jimopi.net Sandboxie.lwp revised 11-8-2017 WINDOWS 10 USERS: The Fall Creators Update build 1709 requires Sandboxie

More information

DCP585CW Windows Network Connection Repair Instructions

DCP585CW Windows Network Connection Repair Instructions Difficulty printing from your PC can occur for various reasons. The most common reason a networked Brother machine may stop printing, is because the connection between the computer and the Brother machine

More information

7, 8, 8.1, 10. You can still get windows ten upgrade from 7, 8 and 8.1 now. Just need the right file to upgrade, I have it.

7, 8, 8.1, 10. You can still get windows ten upgrade from 7, 8 and 8.1 now. Just need the right file to upgrade, I have it. 7, 8, 8.1, 10 This presentation is on windows 10. Most if not all procedures we will discuss today will work on all 4 versions of windows talk about today. Below is when support ends for each version.

More information

Win 7 Security 2011 Virus Manual Removal

Win 7 Security 2011 Virus Manual Removal Win 7 Security 2011 Virus Manual Removal Hi Stinger, You are requested to work with a free malware removal forum listed at Windows 7 64 Bit Sp1 Norton Security V 22.5.0.124 Reg: 31-May-2011. Steps to uninstall

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

This guide provides all of the information necessary to connect to MoFo resources from outside of the office.

This guide provides all of the information necessary to connect to MoFo resources from outside of the office. REMOTE ACCESS GUIDE Introduction This guide provides all of the information necessary to connect to MoFo resources from outside of the office. Connect Remotely from Your Firm Notebook Using VPN Connect

More information

Chapter 16: Advanced Security

Chapter 16: Advanced Security : Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

MFC8870DW Windows 7 Network Connection Repair Instructions

MFC8870DW Windows 7 Network Connection Repair Instructions Difficulty printing from your PC can occur for various reasons. The most common reason a networked Brother machine may stop printing, is because the connection between the computer and the Brother machine

More information

To see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP.

To see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP. Lab Exercise ARP Objective To see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP. Requirements Wireshark: This lab uses the Wireshark

More information

Remove Manually Norton Internet Security 2012 Will Not Start

Remove Manually Norton Internet Security 2012 Will Not Start Remove Manually Norton Internet Security 2012 Will Not Start Restart your computer to check if you can start your Norton product. I cannot connect to the Internet My Norton product does not work or displays

More information

Zillya Internet Security User Guide

Zillya Internet Security User Guide Zillya Internet Security User Guide Content Download Zillya Internet Security... 4 Installation Zillya Internet Security... 4 System Status... 7 System Scanning... 9 When Zillya Internet Security finds

More information

Networks and the Internet

Networks and the Internet UofM Internet Concepts TECH 1010 Dan Kohn University of Memphis Engineering Technology Department Networks and the Internet A network is a collection of computers and devices connected together, often

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

Security Task Manager User Guide

Security Task Manager User Guide Security Task Manager User Guide Enhanced Process Viewer with security risk rating A. & M. Neuber Software GmbH 2 Security Task Manager Table of Contents Part I Features of Security Task Manager 4 Part

More information

Material for the Networking lab in EITF25 & EITF45

Material for the Networking lab in EITF25 & EITF45 Material for the Networking lab in EITF25 & EITF45 2016 Preparations In order to succeed with the lab, you must have understood some important parts of the course. Therefore, before you come to the lab

More information

Fencing Time Version 4.3

Fencing Time Version 4.3 Fencing Time Version 4.3 Server System Guide October 2017 Copyright 2017 by Fencing Time, LLC. All rights reserved. Table of Contents Table of Contents Table of Contents... 2 Chapter 1: Fencing Time Server

More information

IT Essentials: PC Hardware and Software v4.1 Mapping to CompTIA A Objectives

IT Essentials: PC Hardware and Software v4.1 Mapping to CompTIA A Objectives IT Essentials: PC Hardware and Software v4.1 Mapping to CompTIA A+ 220-702 Objectives 1.0 Hardware 1.1 Given a scenario, install, configure and maintain personal computer components Storage devices o HDD

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

CompTIA A Practical Application Exam, 2009 Edition

CompTIA A Practical Application Exam, 2009 Edition CompTIA A+ 220 702. Practical Application Exam, 2009 Edition Examination Objectives Mapped to Chapters Chapters Domain Hardware 1.0 1.1 Given a scenario, install, configure and maintain personal computer

More information

Part 1: Understanding Windows XP Basics

Part 1: Understanding Windows XP Basics 542362 Ch01.qxd 9/18/03 9:54 PM Page 1 Part 1: Understanding Windows XP Basics 1: Starting Up and Logging In 2: Logging Off and Shutting Down 3: Activating Windows 4: Enabling Fast Switching between Users

More information

MIS Week 6. Operating System Security. Windows Antivirus

MIS Week 6. Operating System Security. Windows Antivirus MIS 5170 Operating System Security Week 6 Windows Antivirus Tonight s Plan 2 Questions from Last Week Review on-line posts In The News Malware/Spyware Detection tools Antivirus Sniffers Assignment 3 Overview

More information

NUIT Tech Talk: Data and Information Security at Northwestern January 24, 2007

NUIT Tech Talk: Data and Information Security at Northwestern January 24, 2007 NUIT Tech Talk: Data and Information Security at Northwestern January 24, 2007 Roger Safian, Senior Data Security Analyst, NUIT Agenda Introduction and brief bio Security statistics Protecting yourself

More information

MAC Address Filtering Setup (3G18Wn)

MAC Address Filtering Setup (3G18Wn) MAC Address Filtering Setup (3G18Wn) MAC Address Filtering MAC address filtering refers to the process of allowing (or denying) access to your wireless network based on the hardware address of the device

More information

How to update Windows and Office offline

How to update Windows and Office offline How to update Windows and Office offline Computers which have fast Internet access can download and install Windows and Office updates automatically, through the Windows Automatic Updates service in the

More information

GAME100 Lab 5. Before beginning the lab, please download and install Cisco Packet Trace

GAME100 Lab 5. Before beginning the lab, please download and install Cisco Packet Trace GAME100 Lab 5 Name: Part 1: Learn to Use Packet Tracer Objectives Develop an understanding of the basic functions of Packet Tracer. Create/model a simple Ethernet network using two hosts and a switch.

More information

LabSim Mapping Matrix

LabSim Mapping Matrix LabSim Mapping Matrix A+ Guide to Software Managing, Maintaining, and Troubleshooting, Fourth Edition LabSim for A+ IT-Technician(220-602) Mapping: LabSim to Chapters 0.0 Introduction LabSim Chapter Reference

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

Franzes Francisco Manila IBM Domino Server Crash and Messaging

Franzes Francisco Manila IBM Domino Server Crash and Messaging Franzes Francisco Manila IBM Domino Server Crash and Messaging Topics to be discussed What is SPAM / email Spoofing? How to identify one? Anti-SPAM / Anti-email spoofing basic techniques Domino configurations

More information

Using Diagnostic Tools

Using Diagnostic Tools Using Diagnostic Tools The Tools System Diagnostics page on the INVESTIGATE view provides several diagnostic tools that help troubleshoot various kinds of network problems and process monitors. Tech Support

More information

COMPUTER HEALTH CHECKLIST

COMPUTER HEALTH CHECKLIST COMPUTER HEALTH CHECKLIST Disk Cleanup Clear Browser Data Google Chrome Mozilla Firefox Safari Install Antivirus Update Software Windows Mac Remove Unused Programs Windows Mac Install Essential Programs

More information

INTERNET BASICS / FILE OPERATIONS Defining Information Technology

INTERNET BASICS / FILE OPERATIONS Defining Information Technology L A B 2 INTERNET BASICS / FILE OPERATIONS Defining Information Technology This lab covers fundamental concepts of network organization, focusing on the client-server model for network resources such as

More information

LabSim Mapping Matrix

LabSim Mapping Matrix LabSim Mapping Matrix A+ Guide to Software Managing, Maintaining, and Troubleshooting, Fourth Edition LabSim for A+ IT-Technician(220-602) Mapping: Chapters to LabSim Chapter Pages LabSim Chapter 1 Pages

More information

FieldView. Management Suite

FieldView. Management Suite FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote

More information

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps 2018 By: RemoveVirus.net Remove A Virus From Your PC In 5 Simple Steps PCs, like Macs and Mobile Devices are susceptible to different types of malware. Avoid panicking when you realize that your PC has

More information

Install & Configure Windows 10, Visual Studio, & MySQL Dr. Tom Hicks Trinity University

Install & Configure Windows 10, Visual Studio, & MySQL Dr. Tom Hicks Trinity University Install & Configure Windows 10, Visual Studio, & MySQL Dr. Tom Hicks Trinity University Windows 10 Install 1] Push the Next Button. 2] Push the Install Now Button. Windows-Database-Server-Installation-1.docx

More information

Activation Screen Virus

Activation Screen Virus How To Get Rid Of Spyware Windows Xp Activation Screen Virus Spyware Clear it's technically not a virus, but it does exhibit plenty of malicious To uninstall the Spyware Clear program from Windows XP,

More information

College of Pharmacy Windows 10

College of Pharmacy Windows 10 College of Pharmacy Windows 10 Windows 10 is the version of Microsoft s flagship operating system that follows Windows 8; the OS was released in July 2015. Windows 10 is designed to address common criticisms

More information

Sam Spade 1.14 Open Source Security Tool by Steve Atkins

Sam Spade 1.14 Open Source Security Tool by Steve Atkins CS 413 Spring 2005 Max Konovalov Sam Spade 1.14 Open Source Security Tool by Steve Atkins University of Alaska Anchorage Department of Mathematical Sciences This paper describes Sam Spade 1.14 open source

More information

I m InTouch Installation Guide for the DSL/Cable environment with a Linksys router Models: BEFSRU31, BEFSR41 V.2, BEFSR11

I m InTouch Installation Guide for the DSL/Cable environment with a Linksys router Models: BEFSRU31, BEFSR41 V.2, BEFSR11 I m InTouch router configuration p. 1 I m InTouch Installation Guide for the DSL/Cable environment with a Linksys router Models: BEFSRU31, BEFSR41 V.2, BEFSR11 Note: Different models may vary slightly

More information

Lab DHCP Client Setup

Lab DHCP Client Setup Lab 9.3.5 DHCP Client Setup Objective The purpose of this lab is to introduce Dynamic Host Configuration Protocol (DHCP) and the process for setting up a network computer as a DHCP client to use DHCP services.

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.1 1 Chapter 15 Objectives 15.1 Identify potential safety hazards and implement proper safety procedures related to networks 15.2

More information

Cisco 1: Networking Fundamentals

Cisco 1: Networking Fundamentals Western Technical College 10150110 Cisco 1: Networking Fundamentals Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 This course

More information

FAQ. Safe Anywhere PC 12. Disclaimer:

FAQ. Safe Anywhere PC 12. Disclaimer: FAQ Safe Anywhere PC 12 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch pad, F-Secure

More information

FUN TECH TIPS 101 SUMMER CLOVIS UNIFIED SCHOOL DISTRICT INFORMATION TECHNOLOGY SERVICES Prepared by Tanie McKinzie, TSS III

FUN TECH TIPS 101 SUMMER CLOVIS UNIFIED SCHOOL DISTRICT INFORMATION TECHNOLOGY SERVICES Prepared by Tanie McKinzie, TSS III FUN TECH TIPS 101 SUMMER 2016 CLOVIS UNIFIED SCHOOL DISTRICT INFORMATION TECHNOLOGY SERVICES Prepared by Tanie McKinzie, TSS III PUBLISHER BASICS... 3 Creating a text box... 3 Adding a picture... 4 Manipulating

More information