Please note that index links point to page beginnings from the print edition. Locations are approximate in e-readers, and you may need to page down one or more times after clicking a link to get to the indexed material.
A
accelerated processing unit (APU), 189
Acceptable Use Policy (AUP), 608
acceptance in change management, 614
access control lists (ACLs), 83, 480, 485
“access denied” messages
malware, 583
printers, 307
access points (APs)
description, 64
MAC address filtering, 480, 485
accessories for mobile devices, 36–38
account management, 519
Active Directory, 522
guest accounts, 521
logon time restrictions, 521
passwords, 522–523
permissions, 519–520
accounts
desktop computers, 224
domains, 476–477
laptop computers, 226
recovery options, 622–623
unauthorized access to, 601
ACLs (access control lists), 83, 480, 485
ACPI (Advanced Configuration and Power Interface), 420
acronyms, avoiding, 648
actions in Task Scheduler, 385
active cooling, 191–194
Active Directory, 476
account management, 522
domains, 476–477
folder redirection, 479
group policy settings, 477–478
home folder, 479
login scripts, 476
organizational units, 479
Active Directory Domain Server (AD DS) server role, 476–477
Active drive status, 398
active listening, 649
active power factor correction (active PFC), 217
AD DS (Active Directory Domain Server) server role, 476–477
ad hoc printer connections, 232
adapters for hard drives, 147–148
add-on video cards, 194–196
ADF (auto document feeder) scanners, 208
administration and cloud services, 255
administrative privileges for command-line tools, 374
administrative shares
vs. local, 510–512
network, 439–441
administrative tools
Advanced Security, 390–391
Component Services, 385
Computer Management, 376–377
Device Manager, 377–378
Disk Management, 397–402
Event Viewer, 391–392
Local Security Policy, 383
Local Users and Groups, 378–379
ODBC Data Source Administrator, 386–387
Performance Monitor, 380–382
Print Management, 386–387
Services, 382–383
System Configuration, 383–385
Task Manager, 393–397
Task Scheduler, 385–386
User Account Management, 392–393
Windows Firewall, 388–390
Windows Memory Diagnostic, 388
ADSL (asynchronous DSL), 114
Advanced Configuration and Power Interface
(ACPI), 420
Advanced Encryption Standard (AES), 85, 490
advanced packaging tool (APT), 456
Advanced Power Management (APM) standard, 420
Advanced Security tool, 390–391
Advanced tab
Internet Options, 414
Performance Options, 419
Advanced Technology Attachment (ATA) drives, 144–146
Aero feature in Windows 7, 336
AES (Advanced Encryption Standard), 85, 490
air filter masks, 632, 636–637
airborne particles, 636–637
Airplane mode
configuring, 41
function keys for, 22
AirPrint devices, 232
alerts, 578–580
Allow setting, 509
alternative IP addresses, 448–449
analog modems, 113–116
Android operating system, 326–327
ANSI/TIA 568A/B cabling, 134
antennas
connectors and placement, 17–18
SOHO networks, 544
antistatic bags, 625–626
antivirus/anti-malware programs
description, 483
mobile devices, 532
overview, 496
rogue, 581
Anything/Everything as a Service (XaaS), 256
APFS (Apple File System), 362
APIPA (Automatic Private IP Addressing), 104, 315, 448, 567
APM (Advanced Power Management) standard, 420
App history tab in Task Manager, 396
Apple File System (APFS), 362
Apple Macintosh operating systems, 323–324
application log errors, 583, 597
applications
cloud, 261–262
compatibility, 367
configuring, 225
disabling, 571–572
drive space, 432
installation and deployment, 434–435
local user permissions, 435
mobile devices, 593
OS requirements, 433–434
questions, 436–437
RAM, 432
repairing, 569–570
review, 436
security, 435–436
synchronization, 53
system requirements, 431–433
Applications tab in Task Manager, 394
approvals in change management, 614
APs (access points)
description, 64
MAC address filtering, 480, 485
APT (advanced packaging tool), 456
apt-get command, 465
APU (accelerated processing unit), 189
AR (augmented reality) headsets, 30–31
arrays for drives, 400
artifacts, 290
asset tags, 609–610
asynchronous DSL (ADSL), 114
ATA (Advanced Technology Attachment) drives, 144–146
ATX motherboard form factor, 173–175
audio editing workstation requirements, 221
augmented reality (AR) headsets, 30–31
AUP (Acceptable Use Policy), 608
authentication
device sharing, 233
Microsoft Windows, 512
mobile devices, 532–534
multifactor, 484
multiple services, 53
passwords, 483
wireless security, 490–491
authentication servers
Active Directory, 477
description, 98
authenticator applications, 534
auto document feeder (ADF) scanners, 208
auto-switching power supplies, 217
Automatic Private IP Addressing (APIPA), 104, 315, 448, 567
automatic services, 382
automobiles synchronization, 52
AutoRun, disabling, 523
B
backlight, function keys for, 22
backout plans in change management, 614
backups
vs. cloud storage, 622
disaster prevention and recovery, 617–620
malware protection, 496
mobile devices, 531
scheduled, 454
testing, 620
tools, 458–459
Bad Rabbit ransomware, 581
badge readers, 470
Balanced power plan, 420–421
barcode scanners, 209
barcodes, 609
Bash shell files, 657–659
basic partitions, 357
.bat file extension, 655
batteries
charging issues, 295
CMOS, 186
disposal, 628
mobile devices, 36–37
replacing, 13
swollen, 299
UPSs, 620–621
battery chargers and packs, 36–37
bcdedit command, 566
BD (Blu-ray Disc) drives, 162
Belarc Advisor, 607
belts in inkjet printers, 242
Berg power connectors
hard drives, 146–147
biometric authentication, 532–533
biometric locks, 472
BIOS/UEFI settings
boot options, 183
CMOS setup utility, 181–183
firmware updates, 183–184
interface configurations, 184
motherboards, 181–186
NICs, 451
passwords, 518
RAID drives, 169
SATA drives, 167
security, 184–186
time and reset settings, 280
bitcoin, 493
BitLocker
description, 513
Microsoft Windows, 343–344
support for, 429
workstation security, 523
BitLocker To Go, 513
black lists in MAC addresses, 83, 480
black screens, 558
blackouts, 635
blank pages in printing, 308
blank screens
causes, 558
troubleshooting, 280
Blu-ray Disc (BD) drives, 162
Blue Screen of Death (BSoD)
causes, 557
troubleshooting, 283
Bluetooth
configuring, 42
connections, 35
function keys for, 22
module replacement, 11
overview, 91–92
pairing security issue, 600
printers, 231
security, 600
SOHO network devices, 81
BNC connectors, 137–138
Bonjour Print Service, 232
Boot Camp, 463
Boot tab in System Configuration, 384
booting
methods, 348–351
Microsoft Windows issues, 556, 559–560, 570
options, 183
order of, 570
Safe Mode, 574
bootrec command, 566
botnets, 495
BranchCache, 344
bridges, 69
brightness
function keys for, 22
mobile devices, 590
projectors, 206
Bring Your Own Device (BYOD) policies, 535–536
broadcast domains, 63
brownouts, 635
browser redirection, 578
brute force attacks, 504
BSDPy tool, 350
BSoD (Blue Screen of Death)
causes, 557
troubleshooting, 283
burn-in, 291
burning smell, troubleshooting, 283
bus-powered USB hubs, 141
business processes in change management, 612
BYOD (Bring Your Own Device) policies, 535–536
C
cable modems
description, 69
SOHO networks, 81–82
cable strippers, 122–123
cables and connectors, 132
cable testers, 124–125
coaxial, 136–137
Ethernet, 132–138
fiber, 135–136
hard drives, 144–148
Internet connections, 113
managing, 631–632
multipurpose, 139–143
patch panels, 69–70
questions, 150–151
review, 149–150
serial, 144
video, 138–139
caching hard drives, 233
CAD (computer-aided design) workstation requirements, 221
calibrating inkjet printers, 244
Camcode barcode website, 609
cameras
overview, 209
unauthorized activation, 602
webcams, 18
capacitors, distended, 283
carriages in inkjet printers, 242
cartridges in inkjet printers, 242–243, 245–246
CAs (certificate authorities), 481
CCFL (cold cathode fluorescent lamp) backlighting, 19
CD (compact disc) drives, 162
CDFS (Compact Disc File System), 162, 361
CDMA (code division multiple access), 47, 95
cell phones
cloud applications, 261–262
disposal, 629
operating systems, 325
cellular data networks
airplane mode, 41
Bluetooth, 42
connections, 445
hotspots, 40
standards, 93–94
tethering, 40
cellular devices
card replacement, 12
function keys for, 22
Internet connections, 117
security, 600
Cerber ransomware, 581
certificate authorities (CAs), 481
certificates
invalid, 583
overview, 481–482
certificates of destruction, 540
CF (CompactFlash) cards, 167
chain of custody in incident response, 642
change boards, 614
change management, 612–616
channels in wireless networks, 86, 90
charging step in laser printers, 238–239
Charms bar in Windows 8, 337–338
chassis intrusion detection/notification setting, 185
chip readers, 210
chkdsk command, 373
chmod command, 464
chown command, 464
Chrome operating system, 328
CIDR (Classless Inter-Domain Routing) system, 107–108
CITE (color infrastructure and translation engine), 244
classification, data, 644–645
Classless Inter-Domain Routing (CIDR) system, 107–108
clean OS installs, 353
cleaning
inkjet printers, 245
thermal printers, 246–247
cleaning step in laser printers, 240–241
clicking noises, troubleshooting, 286
client-side virtualization, 265
emulator requirements, 267
hypervisors, 268–272
network requirements, 267
questions, 273–274
resource requirements, 266
review, 272
security requirements, 267
virtual machines, 266
clients, 61
clock speed for CPUs, 188
clones, drive, 617
closed source software licenses, 644
cloud
for backups, 622
e-mail applications, 261
file storage services, 261
measured services, 260
models, 254–257
on-demand services, 260
printing, 232
questions, 264–265
resource pooling, 260
review, 263–264
shared resources, 258–259
synchronization, 51
virtual application streaming, 261–262
virtual desktop, 262–263
cloud-based network controllers, 65
cloud bursting, 257
CloudTrax provider, 65
CMOS battery, 186
CMOS clear setting, 188–189
CMOS setup utility, 181–183
coaxial cables and connectors, 136–137
code division multiple access (CDMA), 47, 95
cold cathode fluorescent lamp (CCFL) backlighting, 19
collate setting for printers, 230
color
Display Settings, 416
troubleshooting, 290
color depth, 416
color infrastructure and translation engine (CITE), 244
color laser printers, 239
combo drives, 162
command-line tools
disk and file management, 373
help, 373
navigation, 371–372
networks, 372
recovery and repair, 565–566
system, 372–373
command prompt, 402–403
Command Prompt option, 562
comment syntax for scripts, 663
commercial licenses, 643–644
Common Unix Printer Service (CUPS), 229
communication techniques, 648–650
communications, ports for, 35
community clouds, 257
compact disc (CD) drives, 162
Compact Disc File System (CDFS), 162, 361
CompactFlash (CF) cards, 167
compatibility
CPUs, 190–191
hardware, 366
operating systems, 329
software, 322
Compatibility wizard, 433
compliance
policies, 608
regulated data, 644–645
safety procedures, 632
component handling and storage, 625–627
Component Services tool, 385
compressed air, 637–638
compression in NTFS, 360
computer-aided design (CAD) workstation requirements, 221
Computer Management, 376–377
conditions in Task Scheduler, 385
confidence, projecting, 648
confidential materials, 652
conflicts in IP addresses, 107, 316
connections
Internet, 113–119
Microsoft Windows networks, 443–445
mobile devices, 34–36
for synchronization, 53
Connections tab in Internet Options, 414
connectivity
Internet, 581
Microsoft Windows, 556
network, 311–317
printers, 305
troubleshooting, 296–297
wireless, 591
connectors
cable. See cables and connectors
motherboards, 176–178
power supplies, 214–216
Wi-Fi antennas, 17–18
constructs in scripts, 663–665
content filtering in SOHO networks, 550
context menus in Microsoft Windows, 333
continuous reboots, troubleshooting, 281
Control Panel, 414
BitLocker, 429
Credential Manager, 423
Device Manager, 428
Devices and Printers, 425–426
Display Settings, 415–417
Folder options, 418–419
HomeGroup, 424–425
Internet Options, 414–415
Network and Sharing Center, 428
power options, 420–422
Programs and Features, 423
questions, 430–431
review, 429–430
Sound, 426
Sync Center, 429
System, 419–420
Troubleshooting, 426–427
User Accounts, 418
Windows Firewall, 420
convertible laptops, 24
cooling mechanisms for CPUs, 191–194
COPE (corporate-owned personally enabled) devices, 535–536
copied files and folders, permissions for, 510–511
copy command, 373
core components, troubleshooting, 279–285
corporate need considerations in operating systems, 343–345
corporate-owned personally enabled (COPE) devices, 535–536
costs for cloud services, 255
counters in Performance Monitor, 380
cp command, 464
CPUIDs (CPU identifiers), 188
CPUs
compatibility, 190–191
cooling mechanisms, 191–194
Hyper-Threading Technology, 186–187
integrated GPUs, 189
overclocking, 188–189
replacing, 14
single-core and multicore, 187
speeds, 188
virtualization, 188
CRC (cyclic redundancy check), 67
creased paper, troubleshooting, 305
Credential Manager, 423
credit card readers, 37–38
crimpers, 122–123
critical application backups, 619
CRT monitor disposal, 629
cryptographic hashes, 505
cultural sensitivity, 650
CUPS (Common Unix Printer Service), 229
customers, communicating with, 648–652
cyclic redundancy check (CRC), 67
D
DaaS (Desktop as a Service), 256
Data Collector Sets in Performance Monitor, 382
data destruction and disposal methods
physical destruction, 539–540
questions, 541–542
recycling and repurposing, 540–541
review, 541
Data Execution Prevention (DEP) tab, 419
Data Loss Prevention (DLP), 99, 485
data preservation in incidents, 641
Data Source Administrator, 386–387
data types in scripts, 665
data usage limits for mobile devices, 591
Database as a Service (DBaaS), 256
date settings, 364
daughter boards, 177–178
DBaaS (Database as a Service), 256
DC jacks, replacing, 13
DCs (domain controllers) in Active Directory, 476–477
dd command, 465
DDoS (distributed denial of service) attacks, 504
DDR2 DIMMs, 152–153
DDR3 DIMMs, 153
DDR4 DIMMs, 154
dead pixels, 290
debris, 637–638
defragmentation, disk, 408–409, 566
degaussing for data destruction, 540
deleting accounts, 522
demilitarized zone (DMZ) setting, 82
denial of service (DoS) attacks, 504
Deny setting, 509
dependency management, 455–456
deployment of applications, 434–435
DEs (desktop environments), 324
Desktop as a Service (DaaS), 256
desktop computers
cloud applications, 262
installing, 223–224
RAM, 152–155
desktop environments (DEs), 324
desktops
multiple, 461
synchronization, 52
virtual, 262–263
Windows 10, 339–340
destruction and disposal methods
MSDS documentation, 634
physical destruction, 539–540
questions, 541–542
recycling and repurposing, 540–541
review, 541
Details tab in Task Manager, 396
developing step in laser printers, 238
devices
preservation in incidents, 641
sharing, 231–233
Devices and Printers applet, 425–426
DHCP (Dynamic Host Configuration Protocol)
IP addresses, 104–107
servers, 98
dial-up connections, 114–116, 444
dictionary attacks, 504
difficult customers, 650–651
digital assistant technology, 81
digital cameras
overview, 209
unauthorized activation, 602
webcams, 18
digital certificates
invalid, 583
overview, 481–482
digital rights management (DRM), 643
digital subscriber line (DSL), 81–82
gateways, 68
Internet connections, 113–114
modems, 68
digital versatile disc (DVD) drives, 162
Digital Visual Interface (DVI) cable, 138
digitizers, replacing, 19
DIMMs (dual inline memory modules), 152–155
dir command, 371
direct thermal printers, 246
directory permissions, 484
DirectX, 407–408
disabled services, 382
disabling
accounts, 523
application startup, 571–572
AutoRun, 523
guest accounts, 521
ports, 550
services, 570–571
SSID broadcasts, 544
System Restore, 586
disassembling mobile devices, 300–301
disaster prevention and recovery methods, 616
account recovery options, 622–623
backup and recovery, 617–620, 622
questions, 623–624
review, 623
surge protectors, 621–622
UPSs, 620–621
Disk Cleanup utility, 432
Disk Defragmenter, 408–409
Disk Management
arrays, 400
drive additions, 400
drive initialization, 398
drive letters, 399–400
drive status, 397–398
partitions, 398–399
Storage Spaces, 401–402
volume mounting, 398
disks. See also drives
mirroring/duplexing, 170
quotas, 360–361
scheduled maintenance, 455
striping, 170
dism command, 372
display adapters
overview, 194–196
replacing, 12
Display Settings applet, 415–417
DisplayPort (DP) cable, 138
displays
battery drain from, 594–595
description, 206
digitizers and touchscreens, 19
Display Settings, 415–417
inverters, 19
laptop computers, 17–21
microphones, 19
questions, 20–21
review, 19
troubleshooting, 289–293
webcams, 18
Wi-Fi antenna connectors and placement, 17–18
disposal methods
MSDS documentation, 634
physical destruction, 539–540
questions, 541–542
recycling and repurposing, 540–541
review, 541
distended capacitors, 283
distorted geometry and images, troubleshooting, 291
distractions, avoiding, 650
distributed denial of service (DDoS) attacks, 504
distributions, Linux, 324
DLP (Data Loss Prevention), 99, 485
DMZ (demilitarized zone) setting, 82
DNAT (Dynamic NAT), 82
DNS (Domain Name Service)
description, 449
IP addresses, 106
malware indications, 499
servers, 98
Do/While loops in scripts, 664
Dock, 462
docking stations, 23
documentation
Acceptable Use Policy, 608
inventory management, 609–610
knowledge bases, 607
network topology diagrams, 606
password policies, 609
questions, 610–611
regulatory and compliance policy, 608
review, 610
domain controllers (DCs) in Active Directory, 476–477
Domain Name Service (DNS)
description, 449
IP addresses, 106
malware indications, 499
servers, 98
domains
Active Directory, 476–477
Microsoft Windows, 343–344
door locks, 472
DoS (denial of service) attacks, 504
dot-matrix printers, 247
dots per inch (dpi), 243
dotted-octet notation for IP addresses, 102
DP (DisplayPort) cable, 138
dpi (dots per inch), 243
draft-quality printheads, 247
drills for data destruction, 539
drive not recognized issues, 286–287
drive protection in setup utility, 185
drive space for applications, 432
drivers
expansion cards, 201
installing, 364–365
printers, 228–231
rolling back, 569
third-party, 363
updates, 457–458
drives. See also disks
adding, 400
arrays, 400
booting from, 351
caching, 233
clones, 617
HDD vs. SSD drives, 7–8
initializing, 398
logical, 357–358
magnetic, 163–165
maintenance utilities, 460
mapping, 439–441
partitioning, 356–359
replacing, 5–7
status, 397–398
troubleshooting, 285–289
types, 210–211
wiping utilities, 541
DRM (digital rights management), 643
DSL (digital subscriber line), 81–82
gateways, 68
Internet connections, 113–114
modems, 68
dual-channel memory, 159
dual-core CPUs, 187
dual displays
Display Settings, 417
function keys for, 22
dual inline memory modules (DIMMs), 152–155
dumpster diving, 503
duplex settings
NICs, 450
printers, 230
duplexing, disk, 170
duplexing assembly
inkjet printers, 243
laser printers, 236
dust and debris, 637–638
DVD (digital versatile disc) drives, 162
DVI (Digital Visual Interface) cable, 138
DVI to HDMI adapters, 147
DVI to VGA adapters, 147
DxDiag utility, 407–408
Dynamic Host Configuration Protocol (DHCP)
IP addresses, 104–107
servers, 98
Dynamic NAT (DNAT), 82
dynamic storage partitioning, 356
E
cloud applications, 261
configuring, 42–47
Exchange Online accounts, 45
filtering, 485
Gmail accounts, 45–46
iCloud, 44–45
IMAP, 43
integrated commercial provider e-mail configuration, 44
POP3, 42–43
ports and SSL, 43
S/MIME, 43
servers, 98
spam, 582
troubleshooting, 582
Yahoo accounts, 47
e-readers, 31
EAP (Extensible Authentication Protocol), 85, 490
ECC (error-correcting code) RAM, 159
education for malware, 497–498, 587–588
EFS (Encrypting File System), 345, 360, 514
802.11 Standards, 88–90
elasticity in cloud, 260
electrical fire safety, 630–631
electro-photographic imaging, 235
electromagnetic interference (EMI), 636
electromagnetic methods for data destruction, 540
electrostatic discharge (ESD)
expansion cards, 199
mats, 627
straps, 626–627
embedded systems, 100
EMI (electromagnetic interference), 636
emulator requirements for client-side virtualization, 267
enclosures, 636
Encrypting File System (EFS), 345, 360, 514
encryption
EFS, 514
Microsoft Windows, 343–345
mobile devices, 533–534
NTFS, 360
ransomware, 494
SSH, 670–671
wireless security, 489–490
workstation security, 523–524
end-of-life for operating systems, 328–329
end-point management servers, 100
end-user acceptance in change management, 614
end-user device configuration in SOHO networks, 80
end-user education for malware, 497–498
End User License Agreements (EULAs), 643
enterprise licenses, 644
entry control rosters, 470
environment variables in scripts, 662–663
environmental impacts, 633–634
airborne particles, 636–637
description, 622
dust and debris, 637–638
MSDS documentation, 634
power, 635–636
weather conditions, 634–635
environmental services centers, 627
EoP (Ethernet over Power), 71
EPS12V power connectors, 215
equipment grounding, 624–625
error-correcting memory, 159
error messages, 283
eSATA (external SATA) cards, 199
eSATA (external SATA) drives
description, 145
ESD (electrostatic discharge)
expansion cards, 199
mats, 627
straps, 626–627
Ethernet
cables and connectors, 132–138
devices, 62
printer ports, 231
Ethernet over Power (EoP), 71
EULAs (End User License Agreements), 643
Event Viewer, 391–392
evidence in incident response, 642
exabytes, 360
exceptions for firewalls, 447–448
Exchange Online accounts, 45
ExFAT file system, 359–360
expand command, 566
expansion bus for motherboards, 176
expansion cards
eSATA, 199
installing, 199–202
NICs, 197–198
sound, 196–197
USB, 198–199
video, 194–196
expectations, meeting, 651–652
expiration of passwords, 518
exposing step in laser printers, 238
ext4 filesystem, 362
extended partitions, 357–358
Extended Unique Identifiers, 103
extending partitions, 398–399
Extensible Authentication Protocol (EAP), 85, 490
external batteries, 594
external drives, booting from, 348, 352
external modems, 114–115
external resources in cloud, 258–259
external SATA (eSATA) cards, 199
external SATA (eSATA) drives
description, 145
external storage drives, 210–211
Extreme Digital (xD) Picture Cards, 167
F
face locks, 528–529
factory recovery partitions, 365, 562
faded prints, 304
Failed drive status, 398
failed login attempts
lockout, 521
restrictions, 532
failed printer jobs, 309
failure to boot, 286
fake security alerts, 578–580
fan assemblies for CPUs, 191–193
fanless cooling, 191
Fast Ethernet, 62
FAT32 file system, 359
FAT64 file system, 359
feeders in inkjet printers, 242
FHS (Filesystem Hierarchy Standard), 435
fiber optic cable, 116, 135–136
fiber-to-the-node (FTTN) services, 116
fiber-to-the-premises (FTTP) services, 116
fields in IPv6, 103
file attributes for permissions, 509–510
File History applet, 619
file-level backups, 617
file systems, 359–363
files
cloud storage, 261
permissions, 510–511
printing to, 248
script types, 655–662
servers, 97
shared, 510–512
sharing, 672
system, 512
troubleshooting, 582
Filesystem Hierarchy Standard (FHS), 435
filters
content, 550
e-mail, 485
MAC addresses, 83, 480, 485, 545–546
Finder utility, 462–463
fingerprint locks, 528
Fios FTTP service, 116
fire safety, 630–631
firewalls
description, 65–66
malware protection, 498
mobile devices, 534–535
overview, 483
settings, 447–448
Windows Firewall, 388–390
firmware
motherboards, 183–184
radio, 47
first response for incidents, 641
fitness monitors, 29–30
5 GHz band, 90
5G cellular standard, 93–94
568A/B cabling, 134
fixboot command, 566
fixed wireless, 118–119
fixmbr command, 566
flash drives, booting from, 348, 352
flash memory, 166–167
flashing BIOS, 183
flatbed scanners, 208
flexibility in cloud services, 255
Folder options applet, 418–419
folders
applications, 435
Folder options, 418–419
permissions, 510–511
redirection, 479
shared, 510–512
system, 512
For/Next loops in scripts, 664
Force Quit feature, 461
Foreign Drive drive status, 398
form factors for motherboards, 173–176
format command, 373
formats, quick vs. full, 362–363
Formatting drive status, 398
formatting for data destruction, 540
forwarding, port, 548–550
4G cellular standard, 93–94
Fourth Extended File System, 362
fragmented drives, 408–409, 566
frames
NICs, 67–68
packets, 58
frequencies
CPUs, 188
wireless networks, 90
front panel connectors, 178–179
fsutil command, 566
FTTN (fiber-to-the-node) services, 116
FTTP (fiber-to-the-premises) services, 116
Full Control permission, 510
full device encryption, 533–534
full duplex settings for NICs, 450
full formats, 362–363
function keys, 21–22
fuser assemblies in laser printers, 236
fusing step in laser printers, 240
Fusion Drive technology, 165
G
game controllers, 207–208
game pads
description, 207–208
mobile devices, 36
gaming PC hardware requirements, 221
garbled characters in printing, 305
gateways
DSL, 68
IP addresses, 108
Microsoft Windows networks, 449
General Data Protection Regulation (GDPR), 645
General tab
Internet Options, 414
System Configuration, 384
geofencing, 601
gestures, 462
ghost cursors, 296
ghost images in printing, 304
Gigabit Ethernet, 62
Global Positioning Systems (GPSs)
function keys for, 22
overview, 32
troubleshooting, 299
Global System for Mobile Communications (GSM), 95
globally unique identifiers (GUIDs), 357
Gmail accounts, 45–46
goggles, 632
Google Play, 326
government regulations, compliance with, 632
GPSs (Global Positioning Systems)
function keys for, 22
overview, 32
troubleshooting, 299
GPTs (GUID partition tables), 356, 358
gpupdate command, 373
GPUs (graphics processing units), 189
granular policy settings, 477
graphic design workstations requirements, 221
graphics processing units (GPUs), 189
grep command, 464
grounding equipment, 624–625
groups
Active Directory, 477–478
Microsoft Windows security, 508–509
GSM (Global System for Mobile Communications), 95
guards, 471
guest accounts
disabling, 521
lockout, 521–522
guest operating systems for virtual machines, 270–272
GUID partition tables (GPTs), 356, 358
GUIDs (globally unique identifiers), 357
H
half duplex settings for NICs, 450
hammers for data destruction, 539
hard disk drives (HDDs), 163–164
booting from, 351
caching, 233
magnetic, 163–165
replacing, 5–7
vs. SSD drives, 7–8
troubleshooting, 285–289
hard drive cables and connectors, 144
adapters, 147–148
IDE, 145–146
Molex power connectors, 146–147
SATA and eSATA, 144–145
SCSI, 146
hardware
cables and connectors. See cables and connectors
drives and storage devices, 210–211
input devices, 207–210
installing, 223–228
motherboards. See motherboards
network. See network hardware devices
operating system compatibility, 366
output devices, 205–206
power supplies, 212–220
RAM, 151–161
selecting, 220–223
hardware/device replacement in laptop computers, 4–5
batteries, 13
Bluetooth modules, 11
cellular cards, 12
CPUs, 14
DC jacks, 13
hard drives, 5–7
keyboards, 5
memory, 8–11
optical drives, 11
plastics/frames, 13
questions, 15–16
review, 15
screens, 12–13
smart card readers, 11
speakers, 13–14
system boards, 14
touchpads, 13
video cards, 12
wireless cards, 11
hardware tokens, 470–471
harmonics in power supplies, 216
hashed passwords, 504–505
HDMI (High Definition Multimedia Interface) cable, 138
headsets
mobile devices, 36
Health Insurance Portability and Accountability Act (HIPAA), 645
heat sinks, 191–193
heating elements in thermal printers, 246–247
hextets in IPv6, 103
HFS+ (Hierarchical File System Plus), 362
HHDs (hybrid hard drives), 7–8, 165
Hibernate mode, 422
Hierarchical File System Plus (HFS+), 362
High Definition Multimedia Interface (HDMI) cable, 138
High performance power plan, 420–421
high resource utilization as security issue, 600
hijacked e-mail accounts, 582
HIPAA (Health Insurance Portability and Accountability Act), 645
HKEY_ Registry keys, 402–403
home folder in Active Directory, 479
hosts
USB controllers, 141
hot-swappable devices
USB, 141
hotspots
configuring, 40
Internet connections, 117–118
mobile devices, 36
hubs
overview, 64
USB, 141
humidity issues, 634–635
hybrid clouds, 257
hybrid hard drives (HHDs), 7–8, 165
hybrid laptops/tablets, 24
Hyper-Threading Technology, 186–187
Hyper-V, 268–269
hypervisors
client-side virtualization, 265–266, 268–272
guest operating systems, 270–272
installing, 269–270
I
IaaS (Infrastructure as a Service), 255
ICCIDs (Integrated Circuit Card Identifiers), 48
iCloud
e-mail, 44–45
support for, 462
ICS (Internet Connection Sharing), 113
ID badges, 210
IDE (Integrated Drive Electronics)
drives, 145–146
ports, 178–179
identity step for incidents, 641
IDSs (intrusion detection systems), 99
IEC-320 connectors, 213
image-level backups, 617
images
Microsoft Windows, 568
OS installation, 355
printing to, 249
imaging drums in laser printers, 236, 240, 242
imaging process in laser printers, 237–241
IMAP (Internet Message Access Protocol), 43
IMAP4 (Internet Message Access Protocol version 4), 98
IMEI (International Mobile Equipment Identity) numbers, 47
impact printers, 247–248
impersonation, 503
IMSI (International Mobile Subscriber Identity) numbers, 48
in-place OS upgrades, 353
incidents
documentation, 607–608
response process, 641–643
incineration for data destruction, 540
indicator lights, troubleshooting, 282, 296
infrared (IR) connections, 36
Infrastructure as a Service (IaaS), 255
infrastructure connections for printers, 232
inherence factor in authentication, 490
inheritance of permissions, 511–512
initializing drives, 398
injectors for Power over Ethernet, 70
inkjet printers, 242–243
calibrating, 244
maintenance, 245–246
input devices, 207–210
input voltages for power supplies, 212–214
installing
applications, 434–435
cooling systems, 191–194
desktop computers, 223–224
DIMM sticks, 154–155
drivers, 364–365
expansion cards, 199–202
hypervisors, 269–270
laptop computers, 225–226
motherboards, 180
operating systems, 351–356
power supplies, 217–218
printers, 229–231
SO-DIMM sticks, 157–158
storage devices, 167–169
integers in scripts, 665
Integrated Circuit Card Identifiers (ICCIDs), 48
integrated commercial provider e-mail configuration, 44
Integrated Drive Electronics (IDE)
drives, 145–146
ports, 178–179
integrated GPUs, 189
integrated print servers, 232
integrated services digital network (ISDN), 117
Intel HD Graphics, 189
interface configuration settings, 184
intermittent device failure, 282
intermittent network connectivity, 315
intermittent wireless, 295, 590–591
internal fixed disks, booting from, 351
internal modems, 114–115
internal resources in cloud, 258–259
internal USB connectors, 180
International Mobile Equipment Identity (IMEI) numbers, 47
International Mobile Subscriber Identity (IMSI) numbers, 48
Internet appliances, 99–100
Internet Connection Sharing (ICS), 113
Internet connection types, 113
cable, 113
cellular, 117
dial-up, 114–116
DSL, 113–114
fiber, 116
hotspots, 117–118
ISDN, 117
line-of-sight, 118–119
satellite, 117
Internet connectivity, 581
Internet Message Access Protocol (IMAP), 43
Internet Message Access Protocol version 4 (IMAP4), 98
Internet of Things (IoT) devices, 81
Internet Options applet, 414–415
intrusion detection systems (IDSs), 99
intrusion prevention systems (IPSs), 99
invalid certificates, 583
inventory management, 609–610
inverters for displays, 19
iOS operating systems, 327
IoT (Internet of Things) devices, 81
IP addresses
APIPA, 104
DHCP, 104–107
DNS, 106
gateways, 108
IPv4 vs. IPv6, 103–104
link-local, 105
Microsoft Windows networks, 448–449
NAT, 110
networks, 315–316
overview, 102–103
questions, 111–112
review, 111
static, 105–106
subnet masks, 107–108
VLANs, 110
VPNs, 109–110
ipconfig command
description, 372
IP addresses, 108–109
Microsoft Windows, 567–568
IPsec, 48
IPSs (intrusion prevention systems), 99
IPv4, 102–104
IPv6, 102–104
IR (infrared) connections, 36
ISDN (integrated services digital network), 117
ISO 9660 file system, 162, 361
ITX motherboard form factor, 175–176
iwconfig command, 464
J
jacks, replacing, 13
jams, paper, 305
jargon, avoiding, 648
JBOD (just a bunch of disks) storage, 170
jewelry safety issues, 630
joysticks, 207–208
.js file extension, 661–662
just a bunch of disks (JBOD) storage, 170
K
Kensington security lock connectors, 472
key fobs, 470–471
keyboard, video, mouse (KVM) switches, 210
keyboards
backlight, function keys for, 22
overview, 207
replacing, 5
Keychain Access, 461
keyloggers, 494
keys, Registry, 402–403
kill command, 465
killing tasks, 567
knowledge bases, 607
knowledge factor in authentication, 490
KVM (keyboard, video, mouse) switches, 210
L
L2TP (Layer 2 Tunneling Protocol), 48
language settings, 364
LANs (local area networks)
description, 119
switches, 63
laptop computers. See also mobile devices
cloud applications, 262
displays, 17–21
docking stations, 23
hardware/device replacement. See hardware/device replacement in laptop computers
installing, 225–226
locks, 23–24
port replicators, 23
RAM, 155–158
rotating/removable screens, 24
special function keys, 21–22
laser printers, 235
components and functions, 236
imaging process, 237–241
maintenance, 241–242
latency in satellite communications, 117
Layer 2 Tunneling Protocol (L2TP), 48
LC fiber optic connectors, 136
LCD (liquid crystal displays), 17
LCI (liquid contact indicator) stickers, 593
leaked personal files and data, 600
LED status indicators, 198
legacy systems, 100
letters, drive, 399–400
licensing, 643–644
lifting techniques, 630
lightning, 636
Lightning connectors, 35, 139–140
lights, troubleshooting, 282, 296
line-interactive UPSs, 621
line-of-sight wireless Internet service, 118–119
link lights, 198
link-local addresses, 105, 315
Linux operating system
commands, 463–465
distractions, 324–325
liquid contact indicator (LCI) stickers, 593
liquid cooling systems, 191, 193–194
liquid crystal displays (LCD), 17
List Folder Contents permission, 510
listening, active, 649
local area networks (LANs)
description, 119
switches, 63
local hosts, 61
local installation for applications, 434–435
Local Policy Editor, 519
Local Security Policy, 383, 519
local shares, 510–512
local user permissions, 435
Local Users and Groups tool, 378–379
location factor in authentication, 490
location services, battery drain from, 595
location tracking, unauthorized, 601
locator applications, 530–531
lockout
guest accounts, 521–522
locks
laptop computers, 23–24
physical security, 471–473
screen, 528–529
log entries, troubleshooting, 283
Log Summary section in Event Viewer, 391
logical drives, 357–358
logical security concepts, 475
ACLs, 485
Active Directory, 476–479
antivirus/anti-malware, 483
authentication, 483–484
certificates, 481–482
directory permissions, 484
DLP, 485
e-mail filtering, 485
firewalls, 483
MAC address filtering, 480
MDM policies, 480
passwords, 483
port security, 480
principle of least privilege, 486
questions, 488–489
review, 486–487
smart cards, 485
software sources, 486
software tokens, 479
VPNs, 484–485
login scripts in Active Directory, 476
logon time restrictions, 521
LoJack, 185
Long Term Evolution (LTE) cellular standard, 94
loopback addresses, 102–103
loopback plugs, 125
loops in scripts, 664
loud noises, troubleshooting, 282, 286
low-level formats for data destruction, 540
low RF signals, 316
ls command, 464
LTE (Long Term Evolution) cellular standard, 94
lumens for projectors, 206
M
MAC (media access control) addresses
access points, 76
filtering, 83, 480, 485, 545–546
network interface cards, 67
Macintosh operating systems, 323–324
Magic Mouse gestures, 462
magnetic hard drives, 163–165
magnetic readers, 210
mail servers, 98
malware
botnets, 495
keyloggers, 494
ransomware, 494
removal tools and methods, 495–500, 585–589
rootkits, 495
spyware, 495
Trojans, 494
viruses, 495
worms, 495
MAM (mobile applications management), 435
man command, 463
man-in-the-middle (MITM) attacks, 504
managed switches, 63
MANs (metropolitan area networks), 119
mantraps, 470
manual services, 382
mapping
drives, 439–441
network printers, 441–442
ports, 548–550
masks
IP addresses, 107–108
master boot record (MBR) partitioning, 356
master file tables (MFTs), 360
material safety data sheets (MSDSs), 634
mats, antistatic, 627
mATX motherboards, 175
MBR (master boot record) partitioning, 356
MDM (mobile device management)
applications, 435
policies, 480
mdsched command, 566
measured services in cloud, 260
media access control (MAC) addresses
access points, 76
filtering, 83, 480, 485, 545–546
network interface cards, 67
media capacity for optical drives, 163
Media Center, 344
media for OS installation, 351
media formats for optical drives, 162–163
media options, function keys for, 22
media workstation requirements, 221
memory
mobile devices, 38
RAM. See RAM
storage devices. See storage devices
metered services in cloud, 260
meters, 123
metropolitan area networks (MANs), 119
MFDs (multifunction devices), 208
MFTs (master file tables), 360
mice, 207
micro-SD cards, 166–167
micro-USB connections, 34, 143
microATX motherboards, 175
microphones
description, 209
replacing, 19
Sound applet, 426
unauthorized activation, 602
microSD card slots, 38
Microsoft Management Console (MMC), 403–404
Microsoft Windows networking, 438
alternative IP addresses, 448–449
connections, 443–445
domain setup, 438–439
firewall settings, 447–448
HomeGroup vs. Workgroup, 438
network card properties, 449–451
printer sharing vs. network printer mapping, 441–442
proxy settings, 446
public and private, 447
questions, 452–454
Remote Desktop Connection, 446
review, 451–452
shares, 439–441
Windows Remote Assistance, 446–447
Microsoft Windows operating systems
administrative tools. See administrative tools
command-line tools, 371–376
Control Panel. See Control Panel
corporate needs vs. personal, 343–345
desktop styles, 345
features, 331–336
questions, 346–347
review, 346
system utilities. See system utilities
versions, 326
Windows 8.1, 338
workstations, 322
Microsoft Windows security
BitLocker, 513
EFS, 514
permissions, 509–512
questions, 516–517
review, 514–516
Run as Administrator, 513
shared files and folders, 510–512
system files and folders, 512
user and groups, 508–509
user authentication, 512
Microsoft Windows troubleshooting
application issues, 569–572
boot issues, 570
common symptoms, 556–560
driver issues, 569
fragmented drives, 566
killing tasks, 567
network settings, 567–568
OS reimaging, 568
profiles, 575
rebooting, 566–567
repair and recovery, 560–566
safe boots, 574
services, 570–571
update issues, 568–569
mini connectors for power supplies, 214, 216
Mini-ITX (mITX) motherboards, 175–176
Mini-PCIe, 12
mini-SD cards, 166–167
mini-USB connections, 34
Mission Control feature, 323, 461
MITM (man-in-the-middle) attacks, 504
mITX (Mini-ITX) motherboards, 175–176
MMC (Microsoft Management Console), 403–404
mobile applications management (MAM), 435
mobile device management (MDM)
applications, 435
policies, 480
mobile device security
antivirus/anti-malware applications, 532
authenticator applications, 534
biometric authentication, 532–533
failed login attempts restrictions, 532
firewalls, 534–535
full device encryption, 533–534
locator applications, 530–531
multifactor authentication, 534
patches and updates, 532
policies and procedures, 535–536
questions, 537–539
remote backup applications, 531
remote wipes, 530
review, 537
screen locks, 528–529
software sources, 534
troubleshooting, 599–604
mobile devices
accessories, 36–38
airplane mode, 41
Bluetooth, 42
connection types, 34–36
disassembling, 300–301
displays, 17–21
docking stations, 23
e-mail configuration, 42–47
e-readers, 31
GPS, 32
hardware/device replacement. See hardware/device replacement in laptop computers
IMEI vs. IMSI, 47–48
locks, 23–24
port replicators, 23
PRI, 47
radio firmware, 47
rotating/removable screens, 24
smartphones, 27–28
special function keys, 21–22, 51–56
tablets, 28
tethering, 40
troubleshooting, 294–303, 590–599
VPNs, 48–49
wearable, 29–31
modems
analog, 113–116
cable, 69
DSL, 68
SOHO networks, 81–82
Modify permission, 510
Molex power connectors
hard drives, 146–147
monitors. See also displays
description, 206
disposal, 629
motherboards
BIOS/UEFI settings, 181–186
CMOS battery, 186
connectors, 176–178
cooling systems, 191–194
CPUs, 186–191
expansion cards, 194–202
form factors, 173–176
front panel connectors, 178–179
installing, 180
internal USB connectors, 180
power supply connectors, 215–217
questions, 204–205
replacing, 14
review, 202–204
sockets, 178
moved files and folders, permissions for, 510–511
msconfig utility, 383–385
MSDSs (material safety data sheets), 634
msinfo32 tool, 407
MSTSC utility, 404–405
multi-rail power supplies, 214
multiboot OS installations, 354–355
multichannel memory configurations, 159
multicore CPUs, 187
multifactor authentication
description, 484
mobile devices, 534
wireless security, 491
multifunction devices (MFDs), 208
multimeters, 123
multimode fiber optic cable, 136
multiple desktops, 339–340, 461
multiple displays, 417
multipurpose cables, 139–143
mutual authentication, 53
mv command, 464
N
NaaS (Network as a Service), 256
Nano-ITX motherboards, 175
NAS (network attached storage) devices, 221
NAT (Network Address Translation)
IP addresses, 110
SOHO networks, 82
near field communication (NFC) devices
description, 210
overview, 35
wireless networking protocols, 92
near-letter-quality (NLQ) printheads, 247
nested, striped mirrors, 170
net use command, 372
net user command, 372
NetBoot volumes, 350
netstat command, 372
NetSUS tool, 350
Network Address Translation (NAT)
IP addresses, 110
SOHO networks, 82
Network and Sharing Center applet, 428
Network as a Service (NaaS), 256
network attached storage (NAS) devices, 221
network-based installation for applications, 434–435
network controllers, 65
Network File System (NFS), 361
network hardware devices, 61
access points, 64
bridges, 69
cloud-based network controllers, 65
Ethernet, 62
Ethernet over Power, 71
firewalls, 65–66
hubs, 64
modems, 68–69
NICs, 65–68
patch panels, 69–70
Power over Ethernet, 70
questions, 72–73
repeaters, 68
review, 71–72
routers, 62
switches, 63
network interface cards (NICs)
properties, 449–451
SOHO networks, 78–80
virtual, 262–263
network names in SOHO networks, 543
network printers
installing, 230–231
mapping, 441–442
network topology diagrams, 606
Network view in Microsoft Windows, 334
Networking tab in Task Manager, 395
networks, 58
booting from, 349–350
cables and connectors. See cables and connectors
client-side virtualization requirements, 267
hardware devices. See network hardware devices
hosts, 97–102
Internet appliances, 99–100
Internet connection types, 113–119
IP addresses, 102–109
Microsoft Windows. See Microsoft Windows networking
OS installation, 355
ports and protocols, 58–61
servers, 97–99
settings updates, 567–568
SOHO. See small office/home office (SOHO) networks
TCP vs. UDP, 59–60
tools, 122–123
troubleshooting, 311–318
types, 119–120
wireless. See wireless networks
New Technology File System (NTFS)
overview, 360–361
permissions, 509–510
NFC (near field communication) devices
description, 210
overview, 35
wireless networking protocols, 92
NFS (Network File System), 361
NICs (network interface cards)
properties, 449–451
SOHO networks, 78–80
virtual, 262–263
NLQ (near-letter-quality) printheads, 247
NMIs (non-maskable interrupts), 557–558
no display, troubleshooting, 294
no image on screen, troubleshooting, 290
no OS found, troubleshooting, 556–557
noises, troubleshooting, 282, 286
non-compliant systems, 505
non-maskable interrupts (NMIs), 557–558
non-parity RAM, 159
Non-Volatile Memory Express (NVMe) drives, 166
non-volatile ROM, 181
notification area in Microsoft Windows, 332–333
nslookup command, 372
NTFS (New Technology File System)
overview, 360–361
permissions, 509–510
NVMe (Non-Volatile Memory Express) drives, 166
O
objects in Performance Monitor, 380
octets in IP addresses, 102
ODBC Data Source Administrator, 386–387
off-site e-mail applications, 261
Offline drive status, 398
OLED (organic LED) displays, 17
on-demand services in cloud, 260
onboard video cards, 194
100BaseT, 62
1000BaseT, 62
Online drive status, 398
online UPSs, 621
open-source software licenses, 643–644
OpenSSH client, 670–671
operating systems
32-bit vs. 64-bit, 322
application compatibility, 322, 367
application requirements, 433–434
boot methods, 348–351
cell phones and tablets, 325
compatibility, 329
drivers, 364–365
factory recovery partitions, 365
file systems, 359–363
hardware compatibility, 366
in-place upgrades, 353
installing, 351–356
Microsoft Windows. See Microsoft Windows operating systems
partition requirements, 365–366
partitioning, 356–359
prerequisites, 366
questions, 370–371
RAM limitations, 322
regional settings, 364
review, 368–369
third-party drivers, 363
upgrade paths, 367–368
vendor-specific limitations, 328–329
virtual machines, 270–272
workgroup vs. domain setup, 363–364
workstations, 322–325
optical discs
media capacity, 163
media formats, 162–163
replacing, 11
speeds, 163
types, 210
optical mice, 207
organic LED (OLED) displays, 17
organizational units (OUs), 479
orientation setting
function keys for, 22
printers, 230
OS not found, troubleshooting, 287
OUs (organizational units), 479
output devices, 205–206
output voltages for power supplies, 214–216
overclocking CPUs, 188–189
overflow of laser printer memory, 237–238
overheating
avoiding, 596
shutdown from, 290
overloaded networks, 590
oversized images and icons, 291
Overview section in Event Viewer, 391
overwrite operations for data destruction, 540
ownership factor in authentication, 490
P
PaaS (Platform as a Service), 255
package manager programs, 455–457
packages, RAM, 152
packets, 58
page files, 336
pages per minute (ppm) for inkjet printers, 243
PANs (personal area networks), 91–92, 119
paper
impact printers, 247–248
thermal printers, 246–247
troubleshooting, 305
parallel ATA (PATA) drives, 145–146
parental controls, 550
parity RAM, 159
partitions
booting from, 351
modifying, 398–399
recovery, 355
requirements, 365–366
swap, 362
types, 356–359
passcode locks, 529
passive cooling, 191–192
passphrases for access points, 76
passwd command, 464
passwords
access points, 76
account management, 522–523
attacks, 504–505
best practices, 517–518
policies, 609
setup utility, 184
SOHO networks, 544–545
strong, 483
PATA (parallel ATA) drives, 145–146
patch panels, 69–70
patches
managing, 456–457
mobile devices, 532
workstation security, 524–525
Payment Card Industry (PCI) standard, 645
PB (petabytes), 360
PCI Express (PCIe) bus, 176–177
PCI Express (PCIe) power connectors, 214, 216
PCI (Payment Card Industry) standard, 645
PCI (Peripheral Component Interconnect) bus, 176
PDF files, printing to, 248
performance
hard drives, 286
Microsoft Windows, 556
RAM, 159
as security issue, 580
Performance Monitor, 380–382
Performance Options dialog box, 419
Performance tab in Task Manager, 394–396
Peripheral Component Interconnect (PCI) bus architecture, 176
peripherals
drives and storage devices, 210–211
input devices, 207–210
output devices, 205–206
questions, 211–212
review, 211
permissions
account management, 519–520
applications, 435
directory, 484
Microsoft Windows, 509–512
personal area networks (PANs), 91–92, 119
personal files and data, leaked, 600
personal licenses, 644
personal safety, 629–632
personally identifiable information (PII), 608, 644–645
petabytes (PB), 360
phablets, 28
PHI (protected health information), 645
phishing, 503
photosensitive drums in laser printers, 236
physical security
badge readers, 470
mantraps and entry control rosters, 470
possession factors, 470–471
privacy screens, 473
questions, 474–475
review, 474
security guards, 471
SOHO networks, 551–552
pickup rollers in laser printers, 236
Pico-ITX motherboards, 175
PII (personally identifiable information), 608, 644–645
ping command, 372
pinned programs in Microsoft Windows, 333
PINs for mobile devices, 529
pinwheel, troubleshooting, 283
plans in change management, 613
plastic filaments in 3-D printers, 249
plastics and frames, replacing, 13
Platform as a Service (PaaS), 255
plenum cabling, 134
PoE (Power over Ethernet), 70
point-of-sale (POS) machines, impact printers for, 247
pointer drift, 296
pointing devices, 207
policies
Acceptable Use Policy, 608
MDM, 480
mobile device security, 535–536
passwords, 609
regulatory and compliance, 608
polymorphic malware, 496
polyvinyl chloride (PVC) cable jackets, 134
pools, storage, 401
pop-ups, 578
POP3 (Post Office Protocol version 3), 42–43, 98
port forwarding in SOHO networks, 82–83
port replicators, 23
portable battery rechargers, 594
ports
disabling, 550
e-mail, 43
mobile devices, 35
motherboards, 178–179
networks, 58–61
security, 480
SOHO networks, 548–550
USB, 142
POS (point-of-sale) machines, impact printers for, 247
positive attitude in communication, 648
possession factors
authentication, 490
physical security, 470–471
POST code beeps, 280
Post Office Protocol version 3 (POP3), 42–43, 98
power
hard drive connectors, 146–147
issues, 635–636
management options, 420–422
ports, 35
safety issues, 629–630
power drain as security issue, 600
power good wire, 215
Power over Ethernet (PoE), 70
power packs, 594
power plans, 420–421
Power saver power plan, 420–421
power-saving modes, 595
power supply units (PSUs), 212–213
devices powered, limitations, 217
input voltages, 212–214
installation, 217–218
output voltages, 214–216
questions, 219–220
review, 218
wattage ratings, 216–217
powered USB hubs, 141
ppm (pages per minute) for inkjet printers, 243
Preboot Execution Environment (PXE), 349–350
Preferred Roaming Lists (PRLs), 47
prerequisites for operating systems, 366
PRI (product release instruction) updates, 47
primary partitions, 357
principle of least privilege, 486
Print Management tool, 386–387
print queues, backed-up, 306
printers
3-D, 249
configuring, 230–231
description, 205–206
Devices and Printers, 425–426
drivers, 228–231
impact, 247–248
inkjet, 242–246
laser, 235–242
managing, 386–387
mapping, 441–442
Microsoft Windows, 559
questions, 251–252
review, 250
thermal, 246–247
virtual, 248–249
printheads
impact printers, 247
inkjet printers, 242–244
privacy in device sharing, 233
privacy screens, 473
Privacy tab in Internet Options, 414
private clouds, 257
private materials, 652
private Microsoft Windows networks, 447
PRLs (Preferred Roaming Lists), 47
probes, 123
Processes tab in Task Manager, 394
processors, video, 196
product release instruction (PRI) updates, 47
professionalism, 650–652
profiles
mobile device security, 536
rebuilding, 575
slow loading, 560
Program Compatibility Troubleshooter, 433
Program Files folder, 335
Programs and Features applet, 423
Programs tab in Internet Options, 414
projectors, 206
promptness, 650
propagation of permissions, 510–511
proper language in communication, 648
proprietary crash screens, 283
proprietary ports, 35
protected health information (PHI), 645
protective covers for mobile devices, 37
protocols, network, 58–61
ps command, 465
.ps1 file extension, 655–657
PSUs. See power supply units (PSUs)
public clouds, 257
public Microsoft Windows networks, 447
public printers, sharing, 232–233
punchdown tools, 125–126
purpose determination in change management, 613
PVC (polyvinyl chloride) cable jackets, 134
pwd command, 464
PXE (Preboot Execution Environment), 349–350
.py file extension, 659–660
Python scripts, 659–660
Q
QR (Quick Response) scanners, 209
quad-channel memory, 159
Quality of Service (QoS)
NICs, 450–451
SOHO networks, 84
quality setting for printers, 231
quarantines for malware, 586
quick formats, 362–363
Quick Response (QR) scanners, 209
quotas, disk, 360–361
R
radio firmware, 47
radio frequency ID (RFID)
badge readers, 470
wireless networking, 92
radio frequency (RF) technologies, 88
radio power levels in SOHO networks, 544
RADIUS (Remote Authentication Dial-In User Service) protocol
wireless security, 491
WPA and WPA2, 77
RAID (redundant array of independent disks)
drives, 400
overview, 169–170
troubleshooting, 287
rainbow table attacks, 504–505
RAM, 151–152
applications, 432
client-side virtualization, 266
configuring, 158–159
desktop, 152–155
error-correcting, 159
laptops, 155–158
laser printers, 237–238
operating system limitations, 322
performance, 159
printers, 306
questions, 160–161
replacing, 8–11
review, 160
Windows Memory Diagnostic, 388
rapid elasticity in cloud, 260
raster image processors (RIPs) in laser printers, 237
RDP (Remote Desktop Protocol), 668–670
Read permission, 510
Read & Execute permission, 510
read/write failures, 286
real-time-clock (RTC), 186
rebooting
Microsoft Windows, 566–567
troubleshooting, 281
rebuilding profiles, 575
rebuildmbr command, 566
Recently Viewed Nodes section in Event Viewer, 391
recovery
disaster prevention and recovery, 617–620
images, 460
Microsoft Windows, 560–566
Recovery Console, 496
recovery partitions in OS installation, 355
Recycle Bin folder, 335
recycling, 627
Red Hat Package Manager (RPM), 456
redirection
browser, 578
folder, 479
redundant array of independent disks (RAID)
drives, 400
overview, 169–170
troubleshooting, 287
Refresh option for operating systems, 356
refresh rate for Display Settings, 416
Refresh your PC option, 563
reg command, 566
Regedit utility, 402–403
regional settings, 364
Registry Editor, 402–403
regulated data, 644–645
regulations
compliance, 632
policies, 608
reimaging Microsoft Windows, 568
reloading Microsoft Windows, 568
remote access technologies
questions, 673–674
RDP, 668–670
review, 672
security, 672
SSH, 670–671
Telnet, 670
third-party tools, 671–672
Remote Assistance, 419, 446–447
Remote Authentication Dial-In User Service (RADIUS) protocol
wireless security, 491
WPA and WPA2, 77
remote backup applications, 531
Remote Desktop, 419
Remote Desktop Connection, 404–405, 446, 668
Remote Desktop Protocol (RDP), 668–670
Remote Disc feature, 462
remote hosts, 61
remote printing, 232
remote settings, 419–420
remote wipes, 530
removable screens, 24
removing malware, 585–589
repair OS installations, 353–354
repairing
applications, 569–570
Microsoft Windows, 560–566
repeaters, 68
reporting incidents, 641
requiring passwords, 518
reservations in DHCP, 107
Reset your PC option, 563
resolution
Display Settings, 415–416
inkjet printers, 243
laser printers, 238
printers, 231
resolution enhancement technology (RET), 237–238
resource pooling, 260
resources
client-side virtualization requirements, 266
cloud, 258–260
utilization as security issue, 600
restarting services, 567
Restore option, 356
restore points, 409–410
restores
malware protection, 496
snapshots, 460
RET (resolution enhancement technology), 237–238
RF signals, 316
RG coax cable, 137
ribbons for impact printers, 247
RIPs (raster image processors) in laser printers, 237
riser cards, 177–178
risk analysis in change management, 613
RJ-11 cables and connectors, 134–135
RJ-45 cables and connectors, 133
rm command, 464
robocopy command, 373
rogue antivirus apps, 581
rollers in inkjet printers, 242
rolling back
updates, 568
ROM chips, 181
root directory in Microsoft Windows, 335
root hubs for USB, 141
rootkits, 495
rotating screens, 24
RPM (Red Hat Package Manager), 456
RS-232 (serial) cable, 144
RSA tokens, 470–471
rsnapshot utility, 460
RTC (real-time-clock), 186
Run as Administrator setting, 513
S
S.M.A.R.T. errors, 287
S/MIME (Secure/Multipurpose Internet Mail Extensions), 43
SaaS (Software as a Service), 256
Safe Mode, 574
safety goggles, 632
safety procedures
compliance, 632
component handling and storage, 625–627
equipment grounding, 624–625
personal safety, 629–632
questions, 633–634
review, 632–633
toxic waste handling, 627–629
Samba, 361
SAS (Serial Attached SCSI) drives, 146
SATA (serial ATA) standard
drives, 167–168
ports, 178–179
satellite connections, 117
SC fiber optic connectors, 136
scanners, 208–209
scanos command, 566
scheduled backups, 454
scheduled disk maintenance, 455
scoping in change management, 613
screen locks, 528–529
screen share feature, 671
screens. See also displays
orientation, function keys for, 22
replacing, 12–13
rotating/removable, 24
sharing, 461
screensaver required passwords, 518
scripts, 654
Active Directory, 476
comment syntax, 663
constructs, 663–665
data types, 665
file types, 655–662
OS installation, 352–353
questions, 666–667
review, 666
SCSI (Small Computer System Interface) drives, 146
SD (Secure Digital) cards, 166–167
SDSL (synchronous DSL), 114
Secure Boot, 185
Secure Digital (SD) cards, 166–167
Secure/Multipurpose Internet Mail Extensions (S/MIME), 43
Secure Shell (SSH), 670–671
Secure Sockets Layer (SSL)/Transport Layer Security (TLS), 48–49
security
applications, 435–436
best practices, 645
BIOS/UEFI settings, 184–186
client-side virtualization, 267
cloud services, 255
data destruction and disposal methods, 539–542
logical security concepts. See logical security concepts
malware, 493–502
Microsoft Windows. See Microsoft Windows security
mobile devices, 528–539
physical, 470–475
remote access technologies, 672
social engineering, 502–503
SOHO networks, 543–553
threats and vulnerabilities, 503–508
troubleshooting, 578–585
wireless, 489–493
workstations, 517–528
security guards, 471
Security tab in Internet Options, 414
self-grounding, 627
separation pads in laser printers, 236
serial ATA (SATA) standard
drives, 167–168
ports, 178–179
Serial Attached SCSI (SAS) drives, 146
serial (RS-232) cable, 144
serial switchboxes, 231
Server Message Block (SMB), 361
servers
authentication, 477
locks, 473
network, 61
print, 232
roles, 97–99
service set identifiers (SSIDs)
network issues, 316
SOHO networks, 543–544
services
disabling, 570–571
failure to start, 559
restarting, 567
services.msc, 403
Services tab
System Configuration, 384
Task Manager, 394–396
Services tool, 382–383
SFF (small form factor) motherboards, 175–176
.sh file extension, 657–659
shared cloud resources, 258–259
shared files and folders, 510–512
shares
administrative vs. local, 510–512
network, 439–441
sharing
devices, 231–233
permissions, 509–510
printers, 441–442
screens, 461
shielded twisted pair (STP) cable, 134
shoulder surfing, 503
shredders, 539
shrinking partitions, 398–399
shutdowns, troubleshooting, 279
side-by-side apps in Windows 8, 337
signal drop as security issue, 600
signature pads, 207
signed drivers for expansion cards, 201
Simple Mail Transfer Protocol (SMTP), 98
simultaneous multithreading (SMT), 187
single-core CPUs, 187
single-factor authentication, 491
single memory channels, 159
single-mode fiber optic cable, 136
single-rail power supplies, 214
single sign-on (SSO)
description, 512
mobile devices, 53
SiSoftware Sandra app, 607
64-bit operating systems, 322
slang, avoiding, 648
Sleep mode, 422
slow data speeds as security issue, 600
slow performance
hard drives, 286
Microsoft Windows, 556
as security issue, 580
slow transfer speeds, 316
Small Computer System Interface (SCSI) drives, 146
small form factor (SFF) motherboards, 175–176
small office/home office (SOHO) network security
content filtering and parental controls, 550
firewalls, 547–548
firmware updates, 551
MAC filtering, 545–546
physical, 551–552
ports, 548–550
questions, 552–553
review, 552
static IP addresses, 546–547
usernames and passwords, 544–545
wireless-specific, 543–544
small office/home office (SOHO) networks, 73
access points, 74–77
channels, 86
device sharing, 231–233
encryption, 84–85
end-user device configuration, 80
firewalls, 82
IoT device configuration, 81
IP addresses, 77–78
MAC filtering, 83
modem configuration, 81–82
NIC configuration, 78–80
printers, 228–231
QoS, 84
routers and switches, 74
smart speaker/digital assistant technology, 81
wireless settings, 84–86
small-outline DIMMs (SO-DIMMs) modules, 155–158
smart card readers
description, 210
replacing, 11
smart speakers, 81
smart watches, 29
smartphones, 27–28
SMB (Server Message Block), 361
smoke, troubleshooting, 282
SMT (simultaneous multithreading), 187
SMTP (Simple Mail Transfer Protocol), 98
snap-ins in MMC, 403–404
snapshots
restoring, 460
SO-DIMMs (small-outline DIMMs) modules, 155–158
social engineering, 502–503
sockets
CPU, 190
motherboards, 178
software
operating system compatibility, 322
updates, 364–365
Software as a Service (SaaS), 256
software firewalls
malware protection, 498
software tokens, 479
SOHO networks. See small office/home office (SOHO) networks
solid-state drives (SSDs)
booting from, 351
vs. hard drives, 7–8
overview, 165–167
sound
sound cards, 196–197
Spaces feature, 323
spam, 582
spanned drives, 400
spanned volumes, 358
speakers
characteristics, 196–197
description, 206
mobile devices, 36
replacing, 13–14
SOHO networks, 81
Sound applet, 426
spear phishing, 503
special function keys, 21–22
speed
CPUs, 188
networks, 316
NICs, 450
optical drives, 163
SPI (stateful packet inspection), 65, 547–548
spikes, power, 635
Spinning Pinwheel of Death (SPoD), 283
splitting partitions, 398–399
spoofed cell towers, 600
spoofing, 505
Spotlight feature, 323, 461–462
sprays, antistatic, 626
SPSs (standby power systems), 621
spyware, 495
SSDs (solid-state drives)
booting from, 351
vs. hard drives, 7–8
overview, 165–167
SSH (Secure Shell), 670–671
SSIDs (service set identifiers)
network issues, 316
SOHO networks, 543–544
SSL for e-mail, 43
SSL (Secure Sockets Layer)/Transport Layer Security (TLS), 48–49
SSO (single sign-on)
description, 512
mobile devices, 53
ST fiber optic connectors, 136
standard formats for data destruction, 540
standard thick client requirements, 220
Standby mode, 422
standby power systems (SPSs), 621
Start button
Windows 7, 336
Windows 8, 337
Start menu in Microsoft Windows, 332–333
Startup Repair option, 561
Startup tab
System Configuration, 384
Task Manager, 396
stateful packet inspection (SPI), 65, 547–548
static IP addresses
overview, 105–106
SOHO networks, 546–547
status
communicating, 651–652
drives, 397–398
NIC indicator lights, 198
steering wheels, 207
sticking keys, 295
storage devices, 161
configuring, 169–170
drive types, 210–211
hot-swappable drives, 171
installing, 167–169
magnetic hard drives, 163–165
optical drives, 162–163
questions, 172–173
review, 171–172
solid-state drives, 165–167
Storage Spaces utility, 401–402
storage systems
client-side virtualization, 266
cloud, 261
troubleshooting, 285–289
STP (shielded twisted pair) cable, 134
straps, ESD, 626–627
streaks in printing, 303
strings in scripts, 665
strong passwords, 483, 517–518
su command, 465
sudo command, 465
Summary of Administrative Events section in Event Viewer, 391
surges, power
description, 635
surge protectors, 621–622
Suspend mode, 422
swap files, 336
swap partitions, 362
swipe locks, 529
switches
KVM, 210
network, 63
NICs, 67
Power over Ethernet, 70
SOHO networks, 74
swollen batteries, 299
Sync Center applet, 429
synchronization apps for cloud, 261
synchronization for mobile devices
applications, 53
automobiles, 52
cloud, 51
connection types for, 53
data types, 52–53
desktop, 52
questions, 55–56
review, 54
settings, 226
single sign-on, 53
synchronous DSL (SDSL), 114
syslog protocol, 98–99
System applet, 419–420
system boards. See motherboards
System Configuration utility, 383–385
system crystal, 188
system files and folders, 512
System Image Recovery option, 562
System Information tool, 407
system lockout for mobile devices, 532, 597
system lockups, 280
system log errors, 583
System Protection tab, 420
system requirements for applications, 431–433
System Restore
malware removal, 586–587
overview, 409–410
system tray in Microsoft Windows, 332–333
system updates, 455–456
system utilities
command prompt, 402–403
Disk Defragmenter, 408–409
DxDiag, 407–408
MMC, 403–404
MSTSC, 404–405
Regedit, 402–403
services.msc, 403
System Information, 407
System Restore, 409–410
Windows Explorer, 406
Windows Update, 410–411
SystemRoot in Microsoft Windows, 335
T
Tablet mode in Windows 10, 339–340
tablets
cloud applications, 261–262
description, 28
disposal, 629
operating systems, 325
TACACS+ (Terminal Access Controller Access-Control System Plus), 491
tailgating, 503
tap pay devices, 210
Task Manager, 393–397
Task Scheduler, 385–386
Task View in Windows 10, 339
taskbars in Microsoft Windows, 332
taskkill command, 373
tasks, killing, 567
TB (terabytes), 360
TCP (Transmission Control Protocol)
overview, 58–60
printer sharing, 232
TCP/IP (Transmission Control Protocol/Internet Protocol), 58–59
Telnet program, 670
temperature issues, 634–635
temporal factor in authentication, 490
Temporal Key Integrity Protocol (TKIP), 85, 490
10BaseT, 62
terabytes (TB), 360
Terminal Access Controller Access-Control System Plus (TACACS+), 491
Terminal program, 460
testing backups, 620
tethering
configuring, 40
Internet connections, 117–118
mobile devices, 35
thermal interface material (TIM), 193
thermal printers, 246–247
thermal throttling, 593
thick clients
description, 223
installing, 223–224
thin clients
description, 223
hardware requirements, 220
installing, 223–224
third-party drivers, 363
third-party tools for remote access technologies, 671–672
32-bit operating systems, 322
This PC view in Microsoft Windows, 333
threads, 186–187
3-D printers, 249
3Gcellular standard, 93–94
throttling, thermal, 593
Thunderbolt interface, 140
TIM (thermal interface material), 193
Time Machine, 458–460
time settings, 364
timeout/screen locks, 521
TKIP (Temporal Key Integrity Protocol), 85, 490
tokens
hardware, 470–471
software, 479
tone generators, 123
toner
cleaning, 241
disposal, 629
tools
cable testers, 124–125
crimpers and cable strippers, 122–123
loopback plugs, 125
multimeters, 123
punchdown, 125–126
tone generators and probes, 123
Wi-Fi analyzers, 127
Tools tab in System Configuration, 384
topology diagrams, 606
touchpads
configuring, 225
description, 207
function keys, 22
replacing, 13
touchscreens
configuring, 225
replacing, 19
toxic waste handling, 627–629
TPM (Trusted Platform Module)
BitLocker, 513
setup utility, 185
tracert command, 372
tractor-feed paper, 247
training for malware, 497–498, 587–588
transfer belts in laser printers, 236, 239
transfer rollers in laser printers, 236
transfer speeds in networks, 316
transferring step in laser printers, 238–239
Transmission Control Protocol (TCP)
overview, 58–60
printer sharing, 232
Transmission Control Protocol/Internet Protocol (TCP/IP), 58–59
transparency feature in Windows 7, 336
triggers
ports, 549–550
Task Scheduler, 385–386
triple-channel memory, 159
Trojans, 494
troubleshooting
core components, 279–285
hard drives, 285–289
malware removal, 585–589
methodology, 276–279
Microsoft Windows. See Microsoft Windows troubleshooting
mobile device security, 599–604
mobile devices, 294–303, 590–599
networks, 311–318
printers, 303–311
security issues, 578–585
video, 289–293
Troubleshooting applet, 426–427
Trusted Face feature, 529
Trusted Platform Module (TPM)
BitLocker, 513
setup utility, 185
trusted root CAs, 481
trusted software sources, 486, 534
tunneling in SSH, 670–671
2.4 GHz band, 90
24-pin motherboard adapters, 215
Type 1 hypervisors, 268
Type 2 hypervisors, 268
U
UDP (User Datagram Protocol), 58–60
UEFI (Unified Extensible Firmware Interface). See BIOS/UEFI settings
Unallocated drive status, 397
unattended OS installations, 352–353
unauthorized account access, 601
unauthorized location tracking, 601
unavailable resources in networks, 312
unexpected shutdowns, 279
Unified Extensible Firmware Interface (UEFI). See BIOS/UEFI settings
unified threat management (UTM), 99
unintended Bluetooth pairing, 600
unintended Wi-Fi connections, 600
uninterruptible power supplies (UPSs), 620–621
universal plug and play (UPnP) devices, 82
universal serial bus. See USB (universal serial bus)
unmanaged switches, 63
unshielded twisted pair (UTP) cable, 62, 134
untrusted software sources, 486, 534
updates
antivirus/anti-malware, 458, 586
drivers and firmware, 457–458
failures, 581
mobile devices, 532
network settings, 567–568
operating system limitations, 329
rolling back, 568
software, 364–365
system, 455–456
Windows Update, 410–411
workstation security, 524–525
upgrades, operating system, 353, 367–368
UPnP (universal plug and play) devices, 82
UPSs (uninterruptible power supplies), 620–621
USB (universal serial bus)
connectors, 141–143
drives, booting from, 348, 352
expansion cards, 198–199
locks, 473
motherboard connectors, 180
printer switches, 231
thumb drives, 166
USB-C connections, 34
USB to Ethernet adapters, 148
User Account Management, 392–393
User Accounts applet, 418
User Datagram Protocol (UDP), 58–60
user education for malware, 497–498, 587–588
user interface in Microsoft Windows, 346
user permissions for applications, 435
usernames in SOHO networks, 544–545
users
authentication. See authentication
Microsoft Windows security, 508–509
Users folder in Microsoft Windows, 335
Users tab in Task Manager, 395–396
UTM (unified threat management), 99
UTP (unshielded twisted pair) cable, 62, 134
V
vacuum cleaners, 638
variables in scripts, 662–663, 665
.vbs file extension, 657
VBScript (Visual Basic Script), 657
vendor-specific limitations for operating systems, 328–329
vendor-specific ports, 35
ventilation, 634–635
versioning for file backups, 617
vertical lines on page, 306
VGA (Video Graphics Array) cable, 138
VGA (Video Graphics Array) mode, 290
vi command, 465
video. See also displays
cables and connectors, 138–139
troubleshooting, 289–293
video cards
overview, 194–196
replacing, 12
video editing workstation requirements, 221
Video Graphics Array (VGA) cable, 138
Video Graphics Array (VGA) mode, 290
views in Microsoft Windows, 333
virtual application streaming, 261–262
virtual desktops, 262–263
virtual local area networks (VLANs), 110
virtual machine managers (VMMs), 268
virtual machines
cloud, 258–259
creating, 269–270
guest operating systems, 270–272
purpose, 266
virtual memory
description, 152
Microsoft Windows, 335–336
virtual printers, 248–249
virtual private networks (VPNs)
connections, 443
mobile devices, 48–49
virtual reality (VR) headsets, 30–31, 206
virtualization
client-side. See client-side virtualization
CPUs, 188
virtualization workstation requirements, 220
viruses, 495
Visual Basic Script (VBScript), 657
Visual Effects tab, 419
VLANs (virtual local area networks), 110
VMMs (virtual machine managers), 268
volatile RAM, 181
volume, function keys for, 22
volumes
creating, 357–358
mounting, 398
VPNs (virtual private networks)
connections, 443
mobile devices, 48–49
VR (virtual reality) headsets, 30–31, 206
W
WAIK (Window Automated Installation Kit), 352–353
Wake-on-LAN (WOL) settings, 450
WANs (wide area networks), 63, 119
WAPs (wireless access points)
description, 64
MAC address filtering, 480, 485
watches, 29
waterproofing mobile devices, 37
wattage ratings for power supplies, 216–217
wax ribbons in thermal printers, 246–247
WCS (Windows Color System), 244
weak signals as security issue, 600
wearable technology devices, 29–31
weather conditions, 634–635
web servers, 97
webcams
overview, 209
replacing, 18
weight limitations, 630
WEP (Wired Equivalent Privacy) encryption, 85, 490
white lists in MAC addresses, 83, 480
Wi-Fi analyzers, 127
Wi-Fi devices
antenna connectors and placement, 17–18
IoT, 81
printers, 231
Wi-Fi Protected Access (WPA), 85, 490
Wi-Fi Protected Setup (WPS), 85, 544
wide area networks (WANs), 63, 119
Window Automated Installation Kit (WAIK), 352–353
Windows operating systems. See Microsoft Windows operating systems
Windows 7 operating system
editions, 341
overview, 336
Windows 8 operating system
editions, 341–342
overview, 337–338
Task Manager, 395–396
Windows 8.1 operating system, 338
Windows 10 operating system
editions, 342
overview, 339–340
Task Manager, 395–396
Windows Color System (WCS), 244
Windows directory, 335
Windows Explorer, 333–334, 406
Windows Firewall
overview, 388–390
settings, 420
Windows Hello facial recognition, 529
Windows Memory Diagnostic tool, 388, 562
Windows Preinstallation Environment (WinPE), 365, 560
Windows Recovery Environment (WinRE)
malware, 496
overview, 560–565
Windows Registry Editor, 402–403
Windows Remote Assistance, 446–447, 669
Windows Server Update Services (WSUS), 524
Windows Update, 364–365
overview, 410–411
workstation security, 524–525
WinPE (Windows Preinstallation Environment), 365, 560
WinRE (Windows Recovery Environment)
malware, 496
overview, 560–565
wipes
drives, 541
remote, 530
wire snips, 122
wired connections
Microsoft Windows networks, 445
mobile devices, 34–35
wired devices, sharing, 231
Wired Equivalent Privacy (WEP) encryption, 85, 490
wired NICs in SOHO networks, 78–79
wireless access points (WAPs)
description, 64
MAC address filtering, 480, 485
wireless cards, replacing, 11
wireless connections
Microsoft Windows networks, 444–445
mobile devices, 35–36
wireless devices
battery drain from, 595
sharing, 231–232
wireless mesh networks (WMNs), 119
wireless networking protocols, 88
802.11 standards, 88–90
Bluetooth, 91–92
cellular standards, 93–94
channels, 90
frequencies, 90
NFC, 92
questions, 95–96
review, 95
RFID, 92
Z-Wave, 93
ZigBee, 92–93
wireless networks
airplane mode, 41
Bluetooth, 42
connectivity issues, 296
function keys for, 22
hotspots, 40
laptop settings, 226
SOHO network settings, 84–86
tethering, 40
wireless NICs for SOHO networks, 79–80
wireless security, 600
authentication, 490–491
protocols, 489–490
questions, 492–493
review, 492
SOHO networks, 543–544
WMNs (wireless mesh networks), 119
WOL (Wake-on-LAN) settings, 450
Workgroup, 438
workgroups setup, 363–364
workstation security
account management, 519–523
AutoRun, 523
data encryption, 523–524
passwords, 517–518
patches, 524–525
questions, 526–528
review, 526
workstations
hardware requirements, 220–221
operating systems, 322–325
worms, 495
WPA (Wi-Fi Protected Access), 85, 490
WPA2, 490
WPS (Wi-Fi Protected Setup), 85, 544
Write permission, 510
WSUS (Windows Server Update Services), 524
WWAN connections, 445
X
XaaS (Anything/Everything as a Service), 256
xcopy command, 373
xD (Extreme Digital) Picture Cards, 167
XPS Document Writer, 248–249
Y
Yahoo accounts, 47
Z
Z-Wave standard
devices, 81
wireless networking protocols, 93
ZB (zettabytes), 360
zero-day attacks, 504
zero-fill operations for data destruction, 540
zero insertion force (ZIF) sockets, 190
ZigBee networks, 92–93
zombies, 505
3.19.29.89