Sunday, December 12, 2010
Chapter 12 lab
For our chapter 12 Lab we had to install Windows 7 on our class computer. Ones we finished the install using default settings we had to install all the drivers for the motherboard. Then we had to use windows update to make sure that we had all the patched and security updates for the system.
Chapter 21 labs
21-3
1. I own an acer aspire 5515-5879. The serial # is LXAZ0Y0028520F2BD1601.
2. Acer.com
3.
4. My computers website did not have a service manual it The service manual comes pre installed on the computer.
1. I own an acer aspire 5515-5879. The serial # is LXAZ0Y0028520F2BD1601.
2. Acer.com
3.
4. My computers website did not have a service manual it The service manual comes pre installed on the computer.
memory and harddrive veiw.
In class we learned how to replace the memory and harddrive in an old notebook computer.
Thursday, December 9, 2010
chapter 20 labs
20-2
For this lab, I had to download AVG antivirus software. Before I could install it, it made me delete my Mcafee total protection package. I updated the software definitions. I set the software to scan everyday at midnight. The software was already set to scan all incoming emails. I then scanned my system. there were no problems.
20-3
There were to tasks that ran in safe mode that were not running in normal mode they were ctfmon.exe, and helppane.exe. Here is the list of the processesses.
taskmgr.exe: provides detailed information about computer performance and running applications, processes and CPU usage, commit charge and memory information, network activity and statistics, logged-in users, and system services.
sidebar.exe: It is part of Windows "gadgets" and is associated with Windows Vista.
taskhost.exe: generic process which acts as a host for processes that run from DLLs rather than EXEs.
winlogon.exe: a process belonging to the Windows login manager. It handles the login and logout procedures on your system.
SCServer.exe:part of Microsoft's Search Client Server.It is a required part of the Windows Operating system
Easyshare.exe: This is part of my printer software.
csrss.exe:Csrss stands for Client/Server Run-Time Subsystem, and is an essential subsystem that must be running at all times. Csrss is responsible for console windows, creating and/or deleting threads, and implementing some portions of the 16-bit virtual MS-DOS environment.
avgtray.exe: The purpose of this avgtray.exe program is to scan your computer for various viruses and trojans, and it will allow easy access to your virus detector software as it sits in the system tray.
dwm.exe: Desktop Window Manager (dwm.exe) is the compositing window manager that gives you all those pretty effects in Windows Vista.
jusched.exe: Java, which is an OS independent application environment.
20-4
The autoruns is detailed and has more registry keys.
For this lab, I had to download AVG antivirus software. Before I could install it, it made me delete my Mcafee total protection package. I updated the software definitions. I set the software to scan everyday at midnight. The software was already set to scan all incoming emails. I then scanned my system. there were no problems.
20-3
There were to tasks that ran in safe mode that were not running in normal mode they were ctfmon.exe, and helppane.exe. Here is the list of the processesses.
taskmgr.exe: provides detailed information about computer performance and running applications, processes and CPU usage, commit charge and memory information, network activity and statistics, logged-in users, and system services.
sidebar.exe: It is part of Windows "gadgets" and is associated with Windows Vista.
taskhost.exe: generic process which acts as a host for processes that run from DLLs rather than EXEs.
winlogon.exe: a process belonging to the Windows login manager. It handles the login and logout procedures on your system.
SCServer.exe:part of Microsoft's Search Client Server.It is a required part of the Windows Operating system
Easyshare.exe: This is part of my printer software.
csrss.exe:Csrss stands for Client/Server Run-Time Subsystem, and is an essential subsystem that must be running at all times. Csrss is responsible for console windows, creating and/or deleting threads, and implementing some portions of the 16-bit virtual MS-DOS environment.
avgtray.exe: The purpose of this avgtray.exe program is to scan your computer for various viruses and trojans, and it will allow easy access to your virus detector software as it sits in the system tray.
dwm.exe: Desktop Window Manager (dwm.exe) is the compositing window manager that gives you all those pretty effects in Windows Vista.
jusched.exe: Java, which is an OS independent application environment.
20-4
The autoruns is detailed and has more registry keys.
chapter 19 labs
19-3
This was an inclass project. We disconnected our computers from the college network and added them to a switch in the classroom. We then had to download Advanced Port scanner. I accidently downloaded another program that opened another port. Most everyone had 8 ports open I had 9. We then opened a telnet port. We had to make sure that we disabled our firewall and we pinged everyones computer with the Ping command through the CLI. Ones we did that we were able to see which ports were open on all the other computers.
19-4
For this activitie I used my administrator account to create a standard user account. I was unable to create another account, open a file located in my administrator account, or load a program from my standard account without putting in my administrator account and password.
Real Problem 19-2
Ophcrack
For this activitie I used my administrator account to create a standard user account. I was unable to create another account, open a file located in my administrator account, or load a program from my standard account without putting in my administrator account and password.
Real Problem 19-2
Ophcrack
- Runs on Windows, Linux/Unix, Mac OS X, ...
- Free
- » Cracks LM and NTLM hashes.
- » Free tables available for Windows XP and Vista.
- » Brute-force module for simple passwords.
- » Audit mode and CSV export.
- » Real-time graphs to analyze the passwords.
- » LiveCD available to simplify the cracking.
- » Loads hashes from encrypted SAM recovered from a Windows partition, Vista included.
- » Free and open source software (GPL).
Active@ Password Changer is designed for resetting local administrator and user passwords on Windows XP / VISTA / 2008 / 2003 / 2000 & Windows 7 systems in case an Administrator's password is forgotten or lost. You do not need to re-install and re-configure the operating system.
Has a simple user interface
- Supports multiple hard disk drives
- 39.99 to 1499.00 depending on the type of license
- Detects several SAM databases (if multiple OS were installed on one volume) and provides the opportunity to pick the right SAM before starting the password recovery process.
- It displays a list of all local users.
- The software user simply chooses the local user from the list to reset the password.
- Other Windows login security restrictions like 'Account is disabled', 'Password never expires', 'Disable Force Smart Card Login', 'Account is locked out', 'User Must Change Password at Next Logon' and 'Logon Hours' can be changed or reset.
- With Active@ Password Changer you can log in as a particular user with a blank password.
Windows Password Reset
- $49.99
- Burn bootable CD/DVD or USB flash drive to reset Windows domain password and local password
- Reset Windows local password and domain administrator password with easy.
- Compatible with all Windows versions like Windows 7, Vista, XP, 2000 and Windows Server 2008(R2), 2003(R2)
Saturday, December 4, 2010
chapter 18 lab
For the chapter 18 lab we disconnected our computers from the network and added them all to a switch. We were all given IP addresses by Brad and then we had to ping each other using the command interface. to make sure we were all on the network. We then checked to make sure that we could view each other through the my network console in windows explorer. We then created a document and put it in a folder that we had to share. We had to make sure that password sharing was turned off.
chapter 17 labs
17-1
1. My hardware device for my computer to connect to the internet is an onboard wireless adapter. The computer named it broadcom 802.11g network adapter.
2. I do not have a nic card.
3. The IP address is 192.168.146.1 (preferred)
4. I used device manager and the command .exe utilities to answer the first three questions.
17-3
2. the first switch is a Belkin 8 port gigabit ethernet switch. It cost between 150 and 200 dollars.
The second switch the second switch is made by cisco and costs arounds 70 dollars. it also has 8 ports. Because cisco is one of the leaders in networking I would chose the cisco switch.
3.
1. My hardware device for my computer to connect to the internet is an onboard wireless adapter. The computer named it broadcom 802.11g network adapter.
2. I do not have a nic card.
3. The IP address is 192.168.146.1 (preferred)
4. I used device manager and the command .exe utilities to answer the first three questions.
17-3
2. the first switch is a Belkin 8 port gigabit ethernet switch. It cost between 150 and 200 dollars.
The second switch the second switch is made by cisco and costs arounds 70 dollars. it also has 8 ports. Because cisco is one of the leaders in networking I would chose the cisco switch.
3.
4. The three switches are all from tiger direct and they are from d link, intel and lynksys through cisco.
I would ones again chose athe cisco even at the higher price of 29.99 a piece trough tiger direct.
5. The cisco switch is around 70 and the adapters are 30 a piece the total price would be 190.
chapter 16 labs
16-1
1. The other parameters for the sfc command are:
/scanonce
3. No, because the findstr tells the computer where to find the corrupted file.
6. The icacls command is used to give the user full permissions to use files and directories.
16-4
Using task manager I had to try to sabatoge the windows 7 computer by trying to change the name of one of the startup programs. I chose to try to change the name and tryied to delete the explorer.exe startup file. The computer told me that I did not have permision to do the action.
1. The other parameters for the sfc command are:
/scanonce
/scanboot
/revert
/purgecache
/cachesize=x
/?
2. Findstr command allows you to use regular expressions, recursive searching down a directory tree, and the ability to exclude patterns.
3. No, because the findstr tells the computer where to find the corrupted file.
4. The edit command file is used to determine if the problems you are having are current or past problems.
5. The takeown command is used to take ownership of a file if no owner exists,
displays help at the command prompt, sets the size of the windows file protection file cache, purges the Windows File Protection file cache and scans all protected system files immediately. Returns the scan to its default operation. Scans all protected system files every time the computer is restarted.
6. The icacls command is used to give the user full permissions to use files and directories.
7. Go to your back-up/installation disk or get the files online.
16-4
Using task manager I had to try to sabatoge the windows 7 computer by trying to change the name of one of the startup programs. I chose to try to change the name and tryied to delete the explorer.exe startup file. The computer told me that I did not have permision to do the action.
Chapter 15 Labs
15.3
1. To start up the repair process I inserted the cd into the drive, booted from disk, when the select language screen came up I clicked english and then next, and then clicked on repair your computer. Startup repair could not detect a problem.
2. The most recent restore point on the computer was windows modules installer on 11/30/2010 at 11:11:41 AM.
3. To open the registry editor I had to enter regedit.exe in the command prompt
4. I was supposed to copy a file to my usb drive. while implementing the copy command it kept telling me that it could not find the file path.
15-4 and 15-7
For these two labs had to turn on boot logging in the advanced boot aptions tab to create a ntbtlog text file for normal boot. When starting in safe mode the computer already generates an ntbtlog file. I saved booth files. all of the same drivers were loaded in safemode that were loaded in normal mode. The safe mode start up log file described more details about what was and wasn't loaded. The network drivers were not loaded.
1. To start up the repair process I inserted the cd into the drive, booted from disk, when the select language screen came up I clicked english and then next, and then clicked on repair your computer. Startup repair could not detect a problem.
2. The most recent restore point on the computer was windows modules installer on 11/30/2010 at 11:11:41 AM.
3. To open the registry editor I had to enter regedit.exe in the command prompt
4. I was supposed to copy a file to my usb drive. while implementing the copy command it kept telling me that it could not find the file path.
15-4 and 15-7
For these two labs had to turn on boot logging in the advanced boot aptions tab to create a ntbtlog text file for normal boot. When starting in safe mode the computer already generates an ntbtlog file. I saved booth files. all of the same drivers were loaded in safemode that were loaded in normal mode. The safe mode start up log file described more details about what was and wasn't loaded. The network drivers were not loaded.
Tuesday, November 23, 2010
Chapter 14 labs
14-1
For This lab, I had to check all of the running processes using the task manager or taskmgr.exe in normal and safe mode to see which processes ran that were different. The processes that ran in normal mode that did not run in safe mode are two java processes, two s3 processes, search protocol, two open office processes, taskhost, and a wuaudt process. There was a process than ran in safe mode that did not run in normal mode which was ctfmon.exe a ctf loader.
For This lab, I had to check all of the running processes using the task manager or taskmgr.exe in normal and safe mode to see which processes ran that were different. The processes that ran in normal mode that did not run in safe mode are two java processes, two s3 processes, search protocol, two open office processes, taskhost, and a wuaudt process. There was a process than ran in safe mode that did not run in normal mode which was ctfmon.exe a ctf loader.
14-2 The startup programs were able to start after asking permision.
14-3
for this lab we had to create 2 startup programs and see if they were able to open without errors. these are the steps I took:
Open task schedular
right click task schedular library
click on create task
on the general tab I entered a name for the task and description
on the triggers tab
click new
on the drop down menu I set it to "at log on"
settings=any user
ok
On the action tab
new
action dropdown "at startup"
browse-C:windows/system32/notepad
click ok twice
log off and logged back on
for the command prompt I placed it in a folder and then set it up to start at start up
both worked without errors.
14-5
This lab required me to copy part of the registry to the desktop and then useing the registry editor I had to change the name of the rycyling bin. I then refreshed the desktop and it changed. I had to copy the registry in case I messed it up I could restore it.
14-6
I created a MMC and apped two snap ins. I then had to create a shortcut on the desktop.
Tuesday, November 16, 2010
Chapter 13 Labs
13-1
I created a restore point and then changed the size of the Icons to large. I also changed the background image to nature. I restarted the system and then ran system restore. The Icons went back to normal size but the background image remained the same.
13-2
For this excercise I turned on my guest user. I then ran disk cleanup using both my administrator and guest users. They both had the same options to choose from.
Defraging the hard drive
I used the tools to analyze disk C to see if it needed to be defragmented. After it analyzed the disk it said that the drive was 0% defragmented.
Check disk
I used the tools to check the disk for errors. I scheduled it to check the next time I logged off. After verification it said I had 53 large files and 0 bad files the check disk went through 5 steps: File verification, index verification, security descriptors verification, file verification, and free space verification.
Verify start up programs
Backup
For this lab I Backed up my home computer using windows 7 backup utility. I clicked on Start, Control Panel, System & Security, and Setup Backup. I choose to backup to disk using drive E:. I choose to let windows choose which files to backup, the other option was to let me chose. Windows choose to backup all users. I then put a disk in the drive and when that one was full back up asked me to put in a new disk. It took 4 disks to backup my home computer.
New Volumes
In order to create a new volume on my hard drive I moved all of my files from my D drive to my C drive and then deleted my d drive. I then went to computer management and right clicked my unallocated space and clicked on create simple volume. I chose to create a volume og only 5 gigabits. I was able to save a file to my newly created volume after words.
I created a restore point and then changed the size of the Icons to large. I also changed the background image to nature. I restarted the system and then ran system restore. The Icons went back to normal size but the background image remained the same.
13-2
For this excercise I turned on my guest user. I then ran disk cleanup using both my administrator and guest users. They both had the same options to choose from.
Defraging the hard drive
I used the tools to analyze disk C to see if it needed to be defragmented. After it analyzed the disk it said that the drive was 0% defragmented.
Check disk
I used the tools to check the disk for errors. I scheduled it to check the next time I logged off. After verification it said I had 53 large files and 0 bad files the check disk went through 5 steps: File verification, index verification, security descriptors verification, file verification, and free space verification.
Verify start up programs
Backup
For this lab I Backed up my home computer using windows 7 backup utility. I clicked on Start, Control Panel, System & Security, and Setup Backup. I choose to backup to disk using drive E:. I choose to let windows choose which files to backup, the other option was to let me chose. Windows choose to backup all users. I then put a disk in the drive and when that one was full back up asked me to put in a new disk. It took 4 disks to backup my home computer.
New Volumes
Thursday, November 11, 2010
Lab 9-1
In this lab I had to install a device on in the computer. I installed a dvd rom drive. This device is a SATA drive and worked when I used it to install the OS from disk. The sata drive is inserted in the sata 2 port.
LAB 8-6
This is a picture of the installed sata hard drive. The sata drive is connected to sata 1. This is the third drive I had to install. My first drive was an IDE. It did not work. The second drive was a sata but after installing the operating system and then shutting the computer down it lost the boot record. This hard drive works so far.
I have two partitions on this hard drive.
I have two partitions on this hard drive.
Sunday, September 19, 2010
Lab 7-3
Project 7-3
1. The maximum amount of memory the slots on the motherboard will accommodate is 1Gb. There is two slots on the motherboard for memory. The maximum memory for the motherboard is 2 Gb.
2. The motherboard supports DDR2 533 or DDR2 667 DIMM memory.
3. There are two modules installed on the motherboard with 1 Gb of memory per module for a total of two Gb of memory .
4. My banks are already filled to capacity at 1 Gb per module. However, if I had to replace them it would cost about $38
Chapter 5 lab
1. The ports that come directly from the motherboard are the PS/2 ports for the keyboard and mouse, a VGA port, a serial port, a parallel port, 4 USB ports, a LAN port and a 3 audio ports consisting of microphone, line in and line out ports.
2. There was a modem card in the one of the PCI slots.
4.
.
6. The motherboard is an ECS 945GCT-M3 motherboard.
7.click on this link to view the manuel for the motherboard http://download.ecsusa.com/dlfileecs/manual/mb/eng/p4/945GCT-M3v3.0/23_945GCT-M3%20(3.0A)-low.pdf
Tuesday, September 14, 2010
Lab 6-1 and 6-2
Christina Costley
CTS 155
September 14, 2010
Chapter 6 labs
Project 6-1
1. The motherboard installed on my lab computer is a viotech3100+
2. The CPU is a VIA C7-D 1.6
3. The socket is a VIA V4
4. The cooler assembly consists of a large heat sink and several case fans.
Project 6-2
1. The mother supports only a VIA C7-D 1.6 or 1.8 GHz processor.
2. The processor comes with the motherboard because it is an integrated processor. There is only one type of processor like this for this board.
3. 3. I would recommend the 1.8 GHz because it is faster than the 1.6.
Monday, September 13, 2010
Lab 4-1
For this lab we had to take a computer apart and then put it back together. I took a part my computer at school and put it back together and I am going to discuss the steps I did. I also toke a computer apart that I had at home That I plan to rebuild.
1. The first steps in taking the computer apart was that we had to take out any adapter cards that were plugged into the motherboard as well as take out all the RAM that was in the motherboard.
2. I then disconnected all the IDE cables and power cables from the motherboard.
3. I then proceeded to take out the screws to remove the power supply from the case.
4. I then removed the CPU fan and then the heat sink from the motherboard. The one I had at home also Had a heat sink over a chip on top of the mother board.
5. I then unscrewed the motherboard from the case and lifted it out of the case.
6 I then removed the hard drive, floppy drive and optical drive from the case.
7 On the computer I have at hope I removed all of the case peripherals so that I could thoroughly clean the case.
Ones I finished I reassembled the computer at school opposite the way I took it apart.
Hear are some pictures that show how this was done and the end result.
1. The first steps in taking the computer apart was that we had to take out any adapter cards that were plugged into the motherboard as well as take out all the RAM that was in the motherboard.
2. I then disconnected all the IDE cables and power cables from the motherboard.
3. I then proceeded to take out the screws to remove the power supply from the case.
4. I then removed the CPU fan and then the heat sink from the motherboard. The one I had at home also Had a heat sink over a chip on top of the mother board.
5. I then unscrewed the motherboard from the case and lifted it out of the case.
6 I then removed the hard drive, floppy drive and optical drive from the case.
7 On the computer I have at hope I removed all of the case peripherals so that I could thoroughly clean the case.
Ones I finished I reassembled the computer at school opposite the way I took it apart.
Hear are some pictures that show how this was done and the end result.
Lab 3-1
1. My strongest social skill is being able to listen to others. This is a good asset when dealing with deskside support.
2. I take everything people say to heart. Een if their problem is not with me. This would not be good when dealing with customers who are upset.
3. I need to learn how to be empathetic to someones problems without letting them get to me on a personnal level. I need to be able to distance my feelings away from the job.
4. I don't like dealing with people on the phone however in the past when having to deal with people in a support position over the phone my strength is being able visualize the screen in order to help someone figure out what went wrong. Ones again my weakness is angry customers who scream and holler and cus at me.
5. I would enjoy going and traveling to different buildings and departments and meeting new people however I am also kind of self concious. That can distance me away from people sometimes.
2. I take everything people say to heart. Een if their problem is not with me. This would not be good when dealing with customers who are upset.
3. I need to learn how to be empathetic to someones problems without letting them get to me on a personnal level. I need to be able to distance my feelings away from the job.
4. I don't like dealing with people on the phone however in the past when having to deal with people in a support position over the phone my strength is being able visualize the screen in order to help someone figure out what went wrong. Ones again my weakness is angry customers who scream and holler and cus at me.
5. I would enjoy going and traveling to different buildings and departments and meeting new people however I am also kind of self concious. That can distance me away from people sometimes.
Lab 2.2
4a. The operating system is Microsoft Windows 7 Professional version 6.1
4b The CPU speed is 1596 MHz
4c.The Bios was Manufactured by Acer and is using version 1.00
4d. I was unable to locate information on the video adapters for this computer using this software.
4E. C:\windows\system32\drivers\USBstor.SYS
5a. The MSinfo32 system was alot easier to me to use than the Fresh Diagnose software. I was able to find the answers quicker with the MSinfo 32.
5b. The Fresh Diagnose gives more information about the system than the MSinfo32 utilities does.
5c. The system Information is already installed on the computer.
5d. The fresh diagnose utilities provides more information than the system information does.
5E. I still prefer to use my system utilities rather than having to download yet another program to my computer.
Tuesday, August 31, 2010
project2-1
2a. The operating system is Microsoft Windows 7 Professional version 6.1.7600.
2d there is 256 mb of video RAM. I found this information by clicking components, multimedia, Display, looked at adapter RAM.
2b. The CPU speed is 1.6 ghz
2c The BIOs manufacturer is Acer Version1.0.
2d there is 256 mb of video RAM. I found this information by clicking components, multimedia, Display, looked at adapter RAM.
2e The file that manages my usb ports is usbehci. There is no parallel port added to my laptop.
pc cleaning lab
In this lab at school we took our pc's downstairs and used compressed air to clean all the dust from inside and outside the computer case. We had to make sure that we dusted odd the connections and devices as well as the fans inside the case. I was unable to get a picture of me cleaning the case but I have a picture of the inside of the case all nice and clean.
Subscribe to:
Posts (Atom)