Hardware software support
Sunday, December 12, 2010
Chapter 12 lab
For our chapter 12 Lab we had to install Windows 7 on our class computer. Ones we finished the install using default settings we had to install all the drivers for the motherboard. Then we had to use windows update to make sure that we had all the patched and security updates for the system.
Chapter 21 labs
21-3
1. I own an acer aspire 5515-5879. The serial # is LXAZ0Y0028520F2BD1601.
2. Acer.com
3.
4. My computers website did not have a service manual it The service manual comes pre installed on the computer.
1. I own an acer aspire 5515-5879. The serial # is LXAZ0Y0028520F2BD1601.
2. Acer.com
3.
4. My computers website did not have a service manual it The service manual comes pre installed on the computer.
memory and harddrive veiw.
In class we learned how to replace the memory and harddrive in an old notebook computer.
Thursday, December 9, 2010
chapter 20 labs
20-2
For this lab, I had to download AVG antivirus software. Before I could install it, it made me delete my Mcafee total protection package. I updated the software definitions. I set the software to scan everyday at midnight. The software was already set to scan all incoming emails. I then scanned my system. there were no problems.
20-3
There were to tasks that ran in safe mode that were not running in normal mode they were ctfmon.exe, and helppane.exe. Here is the list of the processesses.
taskmgr.exe: provides detailed information about computer performance and running applications, processes and CPU usage, commit charge and memory information, network activity and statistics, logged-in users, and system services.
sidebar.exe: It is part of Windows "gadgets" and is associated with Windows Vista.
taskhost.exe: generic process which acts as a host for processes that run from DLLs rather than EXEs.
winlogon.exe: a process belonging to the Windows login manager. It handles the login and logout procedures on your system.
SCServer.exe:part of Microsoft's Search Client Server.It is a required part of the Windows Operating system
Easyshare.exe: This is part of my printer software.
csrss.exe:Csrss stands for Client/Server Run-Time Subsystem, and is an essential subsystem that must be running at all times. Csrss is responsible for console windows, creating and/or deleting threads, and implementing some portions of the 16-bit virtual MS-DOS environment.
avgtray.exe: The purpose of this avgtray.exe program is to scan your computer for various viruses and trojans, and it will allow easy access to your virus detector software as it sits in the system tray.
dwm.exe: Desktop Window Manager (dwm.exe) is the compositing window manager that gives you all those pretty effects in Windows Vista.
jusched.exe: Java, which is an OS independent application environment.
20-4
The autoruns is detailed and has more registry keys.
For this lab, I had to download AVG antivirus software. Before I could install it, it made me delete my Mcafee total protection package. I updated the software definitions. I set the software to scan everyday at midnight. The software was already set to scan all incoming emails. I then scanned my system. there were no problems.
20-3
There were to tasks that ran in safe mode that were not running in normal mode they were ctfmon.exe, and helppane.exe. Here is the list of the processesses.
taskmgr.exe: provides detailed information about computer performance and running applications, processes and CPU usage, commit charge and memory information, network activity and statistics, logged-in users, and system services.
sidebar.exe: It is part of Windows "gadgets" and is associated with Windows Vista.
taskhost.exe: generic process which acts as a host for processes that run from DLLs rather than EXEs.
winlogon.exe: a process belonging to the Windows login manager. It handles the login and logout procedures on your system.
SCServer.exe:part of Microsoft's Search Client Server.It is a required part of the Windows Operating system
Easyshare.exe: This is part of my printer software.
csrss.exe:Csrss stands for Client/Server Run-Time Subsystem, and is an essential subsystem that must be running at all times. Csrss is responsible for console windows, creating and/or deleting threads, and implementing some portions of the 16-bit virtual MS-DOS environment.
avgtray.exe: The purpose of this avgtray.exe program is to scan your computer for various viruses and trojans, and it will allow easy access to your virus detector software as it sits in the system tray.
dwm.exe: Desktop Window Manager (dwm.exe) is the compositing window manager that gives you all those pretty effects in Windows Vista.
jusched.exe: Java, which is an OS independent application environment.
20-4
The autoruns is detailed and has more registry keys.
chapter 19 labs
19-3
This was an inclass project. We disconnected our computers from the college network and added them to a switch in the classroom. We then had to download Advanced Port scanner. I accidently downloaded another program that opened another port. Most everyone had 8 ports open I had 9. We then opened a telnet port. We had to make sure that we disabled our firewall and we pinged everyones computer with the Ping command through the CLI. Ones we did that we were able to see which ports were open on all the other computers.
19-4
For this activitie I used my administrator account to create a standard user account. I was unable to create another account, open a file located in my administrator account, or load a program from my standard account without putting in my administrator account and password.
Real Problem 19-2
Ophcrack
For this activitie I used my administrator account to create a standard user account. I was unable to create another account, open a file located in my administrator account, or load a program from my standard account without putting in my administrator account and password.
Real Problem 19-2
Ophcrack
- Runs on Windows, Linux/Unix, Mac OS X, ...
- Free
- » Cracks LM and NTLM hashes.
- » Free tables available for Windows XP and Vista.
- » Brute-force module for simple passwords.
- » Audit mode and CSV export.
- » Real-time graphs to analyze the passwords.
- » LiveCD available to simplify the cracking.
- » Loads hashes from encrypted SAM recovered from a Windows partition, Vista included.
- » Free and open source software (GPL).
Active@ Password Changer is designed for resetting local administrator and user passwords on Windows XP / VISTA / 2008 / 2003 / 2000 & Windows 7 systems in case an Administrator's password is forgotten or lost. You do not need to re-install and re-configure the operating system.
Has a simple user interface
- Supports multiple hard disk drives
- 39.99 to 1499.00 depending on the type of license
- Detects several SAM databases (if multiple OS were installed on one volume) and provides the opportunity to pick the right SAM before starting the password recovery process.
- It displays a list of all local users.
- The software user simply chooses the local user from the list to reset the password.
- Other Windows login security restrictions like 'Account is disabled', 'Password never expires', 'Disable Force Smart Card Login', 'Account is locked out', 'User Must Change Password at Next Logon' and 'Logon Hours' can be changed or reset.
- With Active@ Password Changer you can log in as a particular user with a blank password.
Windows Password Reset
- $49.99
- Burn bootable CD/DVD or USB flash drive to reset Windows domain password and local password
- Reset Windows local password and domain administrator password with easy.
- Compatible with all Windows versions like Windows 7, Vista, XP, 2000 and Windows Server 2008(R2), 2003(R2)
Saturday, December 4, 2010
chapter 18 lab
For the chapter 18 lab we disconnected our computers from the network and added them all to a switch. We were all given IP addresses by Brad and then we had to ping each other using the command interface. to make sure we were all on the network. We then checked to make sure that we could view each other through the my network console in windows explorer. We then created a document and put it in a folder that we had to share. We had to make sure that password sharing was turned off.
chapter 17 labs
17-1
1. My hardware device for my computer to connect to the internet is an onboard wireless adapter. The computer named it broadcom 802.11g network adapter.
2. I do not have a nic card.
3. The IP address is 192.168.146.1 (preferred)
4. I used device manager and the command .exe utilities to answer the first three questions.
17-3
2. the first switch is a Belkin 8 port gigabit ethernet switch. It cost between 150 and 200 dollars.
The second switch the second switch is made by cisco and costs arounds 70 dollars. it also has 8 ports. Because cisco is one of the leaders in networking I would chose the cisco switch.
3.
1. My hardware device for my computer to connect to the internet is an onboard wireless adapter. The computer named it broadcom 802.11g network adapter.
2. I do not have a nic card.
3. The IP address is 192.168.146.1 (preferred)
4. I used device manager and the command .exe utilities to answer the first three questions.
17-3
2. the first switch is a Belkin 8 port gigabit ethernet switch. It cost between 150 and 200 dollars.
The second switch the second switch is made by cisco and costs arounds 70 dollars. it also has 8 ports. Because cisco is one of the leaders in networking I would chose the cisco switch.
3.
4. The three switches are all from tiger direct and they are from d link, intel and lynksys through cisco.
I would ones again chose athe cisco even at the higher price of 29.99 a piece trough tiger direct.
5. The cisco switch is around 70 and the adapters are 30 a piece the total price would be 190.
chapter 16 labs
16-1
1. The other parameters for the sfc command are:
/scanonce
3. No, because the findstr tells the computer where to find the corrupted file.
6. The icacls command is used to give the user full permissions to use files and directories.
16-4
Using task manager I had to try to sabatoge the windows 7 computer by trying to change the name of one of the startup programs. I chose to try to change the name and tryied to delete the explorer.exe startup file. The computer told me that I did not have permision to do the action.
1. The other parameters for the sfc command are:
/scanonce
/scanboot
/revert
/purgecache
/cachesize=x
/?
2. Findstr command allows you to use regular expressions, recursive searching down a directory tree, and the ability to exclude patterns.
3. No, because the findstr tells the computer where to find the corrupted file.
4. The edit command file is used to determine if the problems you are having are current or past problems.
5. The takeown command is used to take ownership of a file if no owner exists,
displays help at the command prompt, sets the size of the windows file protection file cache, purges the Windows File Protection file cache and scans all protected system files immediately. Returns the scan to its default operation. Scans all protected system files every time the computer is restarted.
6. The icacls command is used to give the user full permissions to use files and directories.
7. Go to your back-up/installation disk or get the files online.
16-4
Using task manager I had to try to sabatoge the windows 7 computer by trying to change the name of one of the startup programs. I chose to try to change the name and tryied to delete the explorer.exe startup file. The computer told me that I did not have permision to do the action.
Subscribe to:
Posts (Atom)