Index

Please note that index links point to page beginnings from the print edition. Locations are approximate in e-readers, and you may need to page down one or more times after clicking a link to get to the indexed material.

A

accelerated processing unit (APU), 189

Acceptable Use Policy (AUP), 608

acceptance in change management, 614

access control lists (ACLs), 83, 480, 485

“access denied” messages

malware, 583

printers, 307

access points (APs)

description, 64

MAC address filtering, 480, 485

SOHO networks, 74–77, 544

accessories for mobile devices, 36–38

account management, 519

Active Directory, 522

guest accounts, 521

logon time restrictions, 521

passwords, 522–523

permissions, 519–520

accounts

desktop computers, 224

domains, 476–477

laptop computers, 226

recovery options, 622–623

unauthorized access to, 601

ACLs (access control lists), 83, 480, 485

ACPI (Advanced Configuration and Power Interface), 420

acronyms, avoiding, 648

actions in Task Scheduler, 385

active cooling, 191–194

Active Directory, 476

account management, 522

domains, 476–477

folder redirection, 479

group policy settings, 477–478

home folder, 479

login scripts, 476

organizational units, 479

Active Directory Domain Server (AD DS) server role, 476–477

Active drive status, 398

active listening, 649

active power factor correction (active PFC), 217

AD DS (Active Directory Domain Server) server role, 476–477

ad hoc printer connections, 232

adapters for hard drives, 147–148

add-on video cards, 194–196

ADF (auto document feeder) scanners, 208

administration and cloud services, 255

administrative privileges for command-line tools, 374

administrative shares

vs. local, 510–512

network, 439–441

administrative tools

Advanced Security, 390–391

Component Services, 385

Computer Management, 376–377

Device Manager, 377–378

Disk Management, 397–402

Event Viewer, 391–392

Local Security Policy, 383

Local Users and Groups, 378–379

ODBC Data Source Administrator, 386–387

Performance Monitor, 380–382

Print Management, 386–387

Services, 382–383

System Configuration, 383–385

Task Manager, 393–397

Task Scheduler, 385–386

User Account Management, 392–393

Windows Firewall, 388–390

Windows Memory Diagnostic, 388

ADSL (asynchronous DSL), 114

Advanced Configuration and Power Interface
(ACPI), 420

Advanced Encryption Standard (AES), 85, 490

advanced packaging tool (APT), 456

Advanced Power Management (APM) standard, 420

Advanced Security tool, 390–391

Advanced tab

Internet Options, 414

Performance Options, 419

Advanced Technology Attachment (ATA) drives, 144–146

Aero feature in Windows 7, 336

AES (Advanced Encryption Standard), 85, 490

air filter masks, 632, 636–637

airborne particles, 636–637

Airplane mode

configuring, 41

function keys for, 22

AirPrint devices, 232

alerts, 578–580

Allow setting, 509

alternative IP addresses, 448–449

analog modems, 113–116

Android operating system, 326–327

ANSI/TIA 568A/B cabling, 134

antennas

connectors and placement, 17–18

SOHO networks, 544

antistatic bags, 625–626

antistatic straps, 199, 626

antivirus/anti-malware programs

description, 483

mobile devices, 532

overview, 496

rogue, 581

updates, 458, 586

Anything/Everything as a Service (XaaS), 256

APFS (Apple File System), 362

APIPA (Automatic Private IP Addressing), 104, 315, 448, 567

APM (Advanced Power Management) standard, 420

App history tab in Task Manager, 396

app stores, 327, 456

Apple File System (APFS), 362

Apple Macintosh operating systems, 323–324

application log errors, 583, 597

applications

cloud, 261–262

compatibility, 367

configuring, 225

crashes, 557, 581

disabling, 571–572

drive space, 432

installation and deployment, 434–435

local user permissions, 435

mobile devices, 593

OS requirements, 433–434

questions, 436–437

RAM, 432

repairing, 569–570

review, 436

security, 435–436

synchronization, 53

system requirements, 431–433

Applications tab in Task Manager, 394

approvals in change management, 614

APs (access points)

description, 64

MAC address filtering, 480, 485

SOHO networks, 74–77, 544

APT (advanced packaging tool), 456

apt-get command, 465

APU (accelerated processing unit), 189

AR (augmented reality) headsets, 30–31

arrays for drives, 400

artifacts, 290

asset tags, 609–610

asynchronous DSL (ADSL), 114

ATA (Advanced Technology Attachment) drives, 144–146

ATX motherboard form factor, 173–175

audio editing workstation requirements, 221

augmented reality (AR) headsets, 30–31

AUP (Acceptable Use Policy), 608

authentication

device sharing, 233

Microsoft Windows, 512

mobile devices, 532–534

multifactor, 484

multiple services, 53

passwords, 483

wireless security, 490–491

authentication servers

Active Directory, 477

description, 98

authenticator applications, 534

auto document feeder (ADF) scanners, 208

auto-switching power supplies, 217

Automatic Private IP Addressing (APIPA), 104, 315, 448, 567

automatic services, 382

automobiles synchronization, 52

AutoRun, disabling, 523

B

backlight, function keys for, 22

backout plans in change management, 614

backups

vs. cloud storage, 622

disaster prevention and recovery, 617–620

malware protection, 496

mobile devices, 531

scheduled, 454

testing, 620

tools, 458–459

Bad Rabbit ransomware, 581

badge readers, 470

Balanced power plan, 420–421

barcode scanners, 209

barcodes, 609

Bash shell files, 657–659

basic partitions, 357

.bat file extension, 655

batteries

charging issues, 295

CMOS, 186

disposal, 628

mobile devices, 36–37

replacing, 13

short life, 298, 594–595

swollen, 299

UPSs, 620–621

battery chargers and packs, 36–37

bcdedit command, 566

BD (Blu-ray Disc) drives, 162

Belarc Advisor, 607

belts in inkjet printers, 242

Berg power connectors

description, 214, 216

hard drives, 146–147

biometric authentication, 532–533

biometric locks, 472

BIOS/UEFI settings

boot options, 183

CMOS setup utility, 181–183

firmware updates, 183–184

interface configurations, 184

motherboards, 181–186

NICs, 451

passwords, 518

RAID drives, 169

SATA drives, 167

security, 184–186

time and reset settings, 280

bitcoin, 493

BitLocker

description, 513

Microsoft Windows, 343–344

support for, 429

workstation security, 523

BitLocker To Go, 513

black lists in MAC addresses, 83, 480

black screens, 558

blackouts, 635

blank pages in printing, 308

blank screens

causes, 558

troubleshooting, 280

Blu-ray Disc (BD) drives, 162

Blue Screen of Death (BSoD)

causes, 557

troubleshooting, 283

Bluetooth

configuring, 42

connections, 35

connectivity issues, 297, 591

function keys for, 22

module replacement, 11

overview, 91–92

pairing security issue, 600

printers, 231

security, 600

SOHO network devices, 81

BNC connectors, 137–138

Bonjour Print Service, 232

Boot Camp, 463

Boot tab in System Configuration, 384

booting

methods, 348–351

Microsoft Windows issues, 556, 559–560, 570

options, 183

order of, 570

Safe Mode, 574

troubleshooting, 280, 286

bootrec command, 566

botnets, 495

BranchCache, 344

bridges, 69

brightness

function keys for, 22

mobile devices, 590

projectors, 206

Bring Your Own Device (BYOD) policies, 535–536

broadcast domains, 63

brownouts, 635

browser redirection, 578

brute force attacks, 504

BSDPy tool, 350

BSoD (Blue Screen of Death)

causes, 557

troubleshooting, 283

burn-in, 291

burning smell, troubleshooting, 283

bus-powered USB hubs, 141

business processes in change management, 612

BYOD (Bring Your Own Device) policies, 535–536

C

cable locks, 23–24, 472

cable modems

description, 69

SOHO networks, 81–82

cable strippers, 122–123

cables and connectors, 132

cable testers, 124–125

coaxial, 136–137

Ethernet, 132–138

fiber, 135–136

hard drives, 144–148

Internet connections, 113

managing, 631–632

multipurpose, 139–143

patch panels, 69–70

questions, 150–151

review, 149–150

serial, 144

video, 138–139

caching hard drives, 233

CAD (computer-aided design) workstation requirements, 221

calibrating inkjet printers, 244

Camcode barcode website, 609

cameras

overview, 209

unauthorized activation, 602

webcams, 18

capacitors, distended, 283

carriages in inkjet printers, 242

cartridges in inkjet printers, 242–243, 245–246

CAs (certificate authorities), 481

CCFL (cold cathode fluorescent lamp) backlighting, 19

cd command, 371–372, 464

CD (compact disc) drives, 162

CDFS (Compact Disc File System), 162, 361

CDMA (code division multiple access), 47, 95

cell phones

cloud applications, 261–262

disposal, 629

operating systems, 325

cellular data networks

airplane mode, 41

Bluetooth, 42

connections, 445

hotspots, 40

standards, 93–94

tethering, 40

cellular devices

card replacement, 12

function keys for, 22

Internet connections, 117

security, 600

Cerber ransomware, 581

certificate authorities (CAs), 481

certificates

invalid, 583

overview, 481–482

certificates of destruction, 540

CF (CompactFlash) cards, 167

chain of custody in incident response, 642

change boards, 614

change management, 612–616

channels in wireless networks, 86, 90

charging step in laser printers, 238–239

Charms bar in Windows 8, 337–338

chassis intrusion detection/notification setting, 185

chip readers, 210

chkdsk command, 373

chmod command, 464

chown command, 464

Chrome operating system, 328

CIDR (Classless Inter-Domain Routing) system, 107–108

CITE (color infrastructure and translation engine), 244

classification, data, 644–645

Classless Inter-Domain Routing (CIDR) system, 107–108

clean OS installs, 353

cleaning

inkjet printers, 245

thermal printers, 246–247

cleaning step in laser printers, 240–241

clicking noises, troubleshooting, 286

client-side virtualization, 265

emulator requirements, 267

hypervisors, 268–272

network requirements, 267

questions, 273–274

resource requirements, 266

review, 272

security requirements, 267

virtual machines, 266

clients, 61

clock speed for CPUs, 188

clones, drive, 617

closed source software licenses, 644

cloud

for backups, 622

e-mail applications, 261

file storage services, 261

measured services, 260

models, 254–257

on-demand services, 260

printing, 232

questions, 264–265

resource pooling, 260

review, 263–264

shared resources, 258–259

synchronization, 51

virtual application streaming, 261–262

virtual desktop, 262–263

cloud-based network controllers, 65

cloud bursting, 257

CloudTrax provider, 65

CMOS battery, 186

CMOS clear setting, 188–189

CMOS setup utility, 181–183

coaxial cables and connectors, 136–137

code division multiple access (CDMA), 47, 95

cold cathode fluorescent lamp (CCFL) backlighting, 19

collate setting for printers, 230

color

Display Settings, 416

printer issues, 244, 308

troubleshooting, 290

color depth, 416

color infrastructure and translation engine (CITE), 244

color laser printers, 239

combo drives, 162

command-line tools

disk and file management, 373

help, 373

navigation, 371–372

networks, 372

recovery and repair, 565–566

system, 372–373

command prompt, 402–403

Command Prompt option, 562

comment syntax for scripts, 663

commercial licenses, 643–644

Common Unix Printer Service (CUPS), 229

communication techniques, 648–650

communications, ports for, 35

community clouds, 257

compact disc (CD) drives, 162

Compact Disc File System (CDFS), 162, 361

CompactFlash (CF) cards, 167

compatibility

applications, 367, 433–434

CPUs, 190–191

hardware, 366

operating systems, 329

software, 322

Compatibility wizard, 433

compliance

policies, 608

regulated data, 644–645

safety procedures, 632

component handling and storage, 625–627

Component Services tool, 385

compressed air, 637–638

compression in NTFS, 360

computer-aided design (CAD) workstation requirements, 221

Computer Management, 376–377

conditions in Task Scheduler, 385

confidence, projecting, 648

confidential materials, 652

conflicts in IP addresses, 107, 316

connections

Internet, 113–119

Microsoft Windows networks, 443–445

mobile devices, 34–36

for synchronization, 53

Connections tab in Internet Options, 414

connectivity

Internet, 581

Microsoft Windows, 556

network, 311–317

printers, 305

troubleshooting, 296–297

wireless, 591

connectors

cable. See cables and connectors

motherboards, 176–178

power supplies, 214–216

Wi-Fi antennas, 17–18

constructs in scripts, 663–665

content filtering in SOHO networks, 550

context menus in Microsoft Windows, 333

continuous reboots, troubleshooting, 281

Control Panel, 414

BitLocker, 429

Credential Manager, 423

Device Manager, 428

Devices and Printers, 425–426

Display Settings, 415–417

Folder options, 418–419

HomeGroup, 424–425

Internet Options, 414–415

Network and Sharing Center, 428

power options, 420–422

Programs and Features, 423

questions, 430–431

review, 429–430

Sound, 426

Sync Center, 429

System, 419–420

Troubleshooting, 426–427

User Accounts, 418

Windows Firewall, 420

convertible laptops, 24

cooling mechanisms for CPUs, 191–194

COPE (corporate-owned personally enabled) devices, 535–536

copied files and folders, permissions for, 510–511

copy command, 373

core components, troubleshooting, 279–285

corporate need considerations in operating systems, 343–345

corporate-owned personally enabled (COPE) devices, 535–536

costs for cloud services, 255

counters in Performance Monitor, 380

cp command, 464

CPUIDs (CPU identifiers), 188

CPUs

compatibility, 190–191

cooling mechanisms, 191–194

Hyper-Threading Technology, 186–187

integrated GPUs, 189

overclocking, 188–189

replacing, 14

single-core and multicore, 187

speeds, 188

virtualization, 188

crashes, 557, 581

CRC (cyclic redundancy check), 67

creased paper, troubleshooting, 305

Credential Manager, 423

credit card readers, 37–38

crimpers, 122–123

critical application backups, 619

CRT monitor disposal, 629

cryptographic hashes, 505

cultural sensitivity, 650

CUPS (Common Unix Printer Service), 229

customers, communicating with, 648–652

cyclic redundancy check (CRC), 67

D

DaaS (Desktop as a Service), 256

Data Collector Sets in Performance Monitor, 382

data destruction and disposal methods

physical destruction, 539–540

questions, 541–542

recycling and repurposing, 540–541

review, 541

Data Execution Prevention (DEP) tab, 419

Data Loss Prevention (DLP), 99, 485

data preservation in incidents, 641

Data Source Administrator, 386–387

data types in scripts, 665

data usage limits for mobile devices, 591

Database as a Service (DBaaS), 256

date settings, 364

daughter boards, 177–178

DBaaS (Database as a Service), 256

DC jacks, replacing, 13

DCs (domain controllers) in Active Directory, 476–477

dd command, 465

DDoS (distributed denial of service) attacks, 504

DDR2 DIMMs, 152–153

DDR3 DIMMs, 153

DDR4 DIMMs, 154

dead pixels, 290

debris, 637–638

defragmentation, disk, 408–409, 566

degaussing for data destruction, 540

deleting accounts, 522

demilitarized zone (DMZ) setting, 82

denial of service (DoS) attacks, 504

Deny setting, 509

dependency management, 455–456

deployment of applications, 434–435

DEs (desktop environments), 324

Desktop as a Service (DaaS), 256

desktop computers

cloud applications, 262

installing, 223–224

RAM, 152–155

desktop environments (DEs), 324

desktops

Microsoft Windows, 332, 345

multiple, 461

synchronization, 52

virtual, 262–263

Windows 10, 339–340

destruction and disposal methods

MSDS documentation, 634

physical destruction, 539–540

questions, 541–542

recycling and repurposing, 540–541

review, 541

Details tab in Task Manager, 396

developing step in laser printers, 238

Device Manager, 377–378, 428

devices

preservation in incidents, 641

sharing, 231–233

Devices and Printers applet, 425–426

DHCP (Dynamic Host Configuration Protocol)

IP addresses, 104–107

servers, 98

dial-up connections, 114–116, 444

dictionary attacks, 504

difficult customers, 650–651

digital assistant technology, 81

digital cameras

overview, 209

unauthorized activation, 602

webcams, 18

digital certificates

invalid, 583

overview, 481–482

digital rights management (DRM), 643

digital subscriber line (DSL), 81–82

gateways, 68

Internet connections, 113–114

modems, 68

digital versatile disc (DVD) drives, 162

Digital Visual Interface (DVI) cable, 138

digitizers, replacing, 19

dim display, 291, 294, 590

DIMMs (dual inline memory modules), 152–155

dir command, 371

direct thermal printers, 246

directory permissions, 484

DirectX, 407–408

disabled services, 382

disabling

accounts, 523

application startup, 571–572

AutoRun, 523

guest accounts, 521

ports, 550

services, 570–571

SSID broadcasts, 544

System Restore, 586

disassembling mobile devices, 300–301

disaster prevention and recovery methods, 616

account recovery options, 622–623

backup and recovery, 617–620, 622

questions, 623–624

review, 623

surge protectors, 621–622

UPSs, 620–621

Disk Cleanup utility, 432

Disk Defragmenter, 408–409

Disk Management

arrays, 400

drive additions, 400

drive initialization, 398

drive letters, 399–400

drive status, 397–398

partitions, 398–399

Storage Spaces, 401–402

volume mounting, 398

diskpart command, 373, 566

disks. See also drives

mirroring/duplexing, 170

quotas, 360–361

scheduled maintenance, 455

striping, 170

dism command, 372

display adapters

overview, 194–196

replacing, 12

Display Settings applet, 415–417

DisplayPort (DP) cable, 138

displays

battery drain from, 594–595

description, 206

digitizers and touchscreens, 19

dim, 291, 294, 590

Display Settings, 415–417

inverters, 19

laptop computers, 17–21

microphones, 19

questions, 20–21

review, 19

troubleshooting, 289–293

webcams, 18

Wi-Fi antenna connectors and placement, 17–18

disposal methods

MSDS documentation, 634

physical destruction, 539–540

questions, 541–542

recycling and repurposing, 540–541

review, 541

distended capacitors, 283

distorted geometry and images, troubleshooting, 291

distractions, avoiding, 650

distributed denial of service (DDoS) attacks, 504

distributions, Linux, 324

DLP (Data Loss Prevention), 99, 485

DMZ (demilitarized zone) setting, 82

DNAT (Dynamic NAT), 82

DNS (Domain Name Service)

description, 449

IP addresses, 106

malware indications, 499

servers, 98

Do/While loops in scripts, 664

Dock, 462

docking stations, 23

documentation

Acceptable Use Policy, 608

change management, 612, 615

incidents, 607–608, 642

inventory management, 609–610

knowledge bases, 607

network topology diagrams, 606

password policies, 609

questions, 610–611

regulatory and compliance policy, 608

review, 610

domain controllers (DCs) in Active Directory, 476–477

Domain Name Service (DNS)

description, 449

IP addresses, 106

malware indications, 499

servers, 98

domains

Active Directory, 476–477

Microsoft Windows, 343–344

setup, 363–364, 438–439

door locks, 472

DoS (denial of service) attacks, 504

dot-matrix printers, 247

dots per inch (dpi), 243

dotted-octet notation for IP addresses, 102

DP (DisplayPort) cable, 138

dpi (dots per inch), 243

draft-quality printheads, 247

drills for data destruction, 539

drive not recognized issues, 286–287

drive protection in setup utility, 185

drive space for applications, 432

drivers

expansion cards, 201

installing, 364–365

printers, 228–231

rolling back, 569

third-party, 363

updates, 457–458

drives. See also disks

adding, 400

arrays, 400

booting from, 351

caching, 233

clones, 617

fragmented, 408–409, 566

HDD vs. SSD drives, 7–8

initializing, 398

letters, 334–335, 399–400

logical, 357–358

magnetic, 163–165

maintenance utilities, 460

mapping, 439–441

partitioning, 356–359

replacing, 5–7

status, 397–398

troubleshooting, 285–289

types, 210–211

wiping utilities, 541

DRM (digital rights management), 643

DSL (digital subscriber line), 81–82

gateways, 68

Internet connections, 113–114

modems, 68

dual-channel memory, 159

dual-core CPUs, 187

dual displays

Display Settings, 417

function keys for, 22

dual inline memory modules (DIMMs), 152–155

dumpster diving, 503

duplex settings

NICs, 450

printers, 230

duplexing, disk, 170

duplexing assembly

inkjet printers, 243

laser printers, 236

dust and debris, 637–638

DVD (digital versatile disc) drives, 162

DVI (Digital Visual Interface) cable, 138

DVI to HDMI adapters, 147

DVI to VGA adapters, 147

DxDiag utility, 407–408

dynamic disks, 356, 358–359

Dynamic Host Configuration Protocol (DHCP)

IP addresses, 104–107

servers, 98

Dynamic NAT (DNAT), 82

dynamic storage partitioning, 356

E

e-mail

cloud applications, 261

configuring, 42–47

encrypted, 298, 594

Exchange Online accounts, 45

filtering, 485

Gmail accounts, 45–46

iCloud, 44–45

IMAP, 43

integrated commercial provider e-mail configuration, 44

POP3, 42–43

ports and SSL, 43

S/MIME, 43

servers, 98

spam, 582

troubleshooting, 582

Yahoo accounts, 47

e-readers, 31

EAP (Extensible Authentication Protocol), 85, 490

ECC (error-correcting code) RAM, 159

education for malware, 497–498, 587–588

EFS (Encrypting File System), 345, 360, 514

802.11 Standards, 88–90

elasticity in cloud, 260

electrical fire safety, 630–631

electro-photographic imaging, 235

electromagnetic interference (EMI), 636

electromagnetic methods for data destruction, 540

electrostatic discharge (ESD)

expansion cards, 199

mats, 627

straps, 626–627

embedded systems, 100

EMI (electromagnetic interference), 636

emulator requirements for client-side virtualization, 267

enclosures, 636

Encrypting File System (EFS), 345, 360, 514

encryption

BitLocker, 429, 513

e-mail, 298, 592, 594

EFS, 514

Microsoft Windows, 343–345

mobile devices, 533–534

NTFS, 360

ransomware, 494

SOHO networks, 84–85, 543

SSH, 670–671

wireless security, 489–490

workstation security, 523–524

end-of-life for operating systems, 328–329

end-point management servers, 100

end-user acceptance in change management, 614

end-user device configuration in SOHO networks, 80

end-user education for malware, 497–498

End User License Agreements (EULAs), 643

enterprise licenses, 644

entry control rosters, 470

environment variables in scripts, 662–663

environmental impacts, 633–634

airborne particles, 636–637

description, 622

dust and debris, 637–638

MSDS documentation, 634

power, 635–636

weather conditions, 634–635

environmental services centers, 627

EoP (Ethernet over Power), 71

EPS12V power connectors, 215

equipment grounding, 624–625

error-correcting memory, 159

error messages, 283

eSATA (external SATA) cards, 199

eSATA (external SATA) drives

booting from, 348, 352

description, 145

ESD (electrostatic discharge)

expansion cards, 199

mats, 627

straps, 626–627

Ethernet

cables and connectors, 132–138

devices, 62

printer ports, 231

Ethernet over Power (EoP), 71

EULAs (End User License Agreements), 643

Event Viewer, 391–392

evidence in incident response, 642

exabytes, 360

exceptions for firewalls, 447–448

Exchange Online accounts, 45

ExFAT file system, 359–360

expand command, 566

expansion bus for motherboards, 176

expansion cards

eSATA, 199

installing, 199–202

NICs, 197–198

sound, 196–197

USB, 198–199

video, 194–196

expectations, meeting, 651–652

expiration of passwords, 518

exposing step in laser printers, 238

ext4 filesystem, 362

extended partitions, 357–358

Extended Unique Identifiers, 103

extending partitions, 398–399

Extensible Authentication Protocol (EAP), 85, 490

external batteries, 594

external drives, booting from, 348, 352

external modems, 114–115

external monitors, 297, 592

external resources in cloud, 258–259

external SATA (eSATA) cards, 199

external SATA (eSATA) drives

booting from, 348, 352

description, 145

external storage drives, 210–211

Extreme Digital (xD) Picture Cards, 167

F

face locks, 528–529

factory recovery partitions, 365, 562

faded prints, 304

Failed drive status, 398

failed login attempts

lockout, 521

restrictions, 532

failed printer jobs, 309

failure to boot, 286

fake security alerts, 578–580

fan assemblies for CPUs, 191–193

fanless cooling, 191

Fast Ethernet, 62

FAT32 file system, 359

FAT64 file system, 359

feeders in inkjet printers, 242

FHS (Filesystem Hierarchy Standard), 435

fiber optic cable, 116, 135–136

fiber-to-the-node (FTTN) services, 116

fiber-to-the-premises (FTTP) services, 116

fields in IPv6, 103

file attributes for permissions, 509–510

File Explorer, 333–334, 406

File History applet, 619

file-level backups, 617

file systems, 359–363

files

cloud storage, 261

permissions, 510–511

printing to, 248

script types, 655–662

servers, 97

shared, 510–512

sharing, 672

system, 512

troubleshooting, 582

Filesystem Hierarchy Standard (FHS), 435

filters

air, 632, 636–637

content, 550

e-mail, 485

MAC addresses, 83, 480, 485, 545–546

Finder utility, 462–463

fingerprint locks, 528

Fios FTTP service, 116

fire safety, 630–631

firewalls

description, 65–66

malware protection, 498

mobile devices, 534–535

overview, 483

settings, 447–448

SOHO networks, 82, 547–548

Windows Firewall, 388–390

firmware

motherboards, 183–184

radio, 47

updates, 457–458, 551

first response for incidents, 641

fitness monitors, 29–30

5 GHz band, 90

5G cellular standard, 93–94

568A/B cabling, 134

fixboot command, 566

fixed wireless, 118–119

fixmbr command, 566

flash drives, booting from, 348, 352

flash memory, 166–167

flashing BIOS, 183

flatbed scanners, 208

flexibility in cloud services, 255

flickering display, 291, 295

Folder options applet, 418–419

folders

applications, 435

Folder options, 418–419

permissions, 510–511

redirection, 479

shared, 510–512

system, 512

For/Next loops in scripts, 664

Force Quit feature, 461

Foreign Drive drive status, 398

form factors for motherboards, 173–176

format command, 373

formats, quick vs. full, 362–363

Formatting drive status, 398

formatting for data destruction, 540

forwarding, port, 548–550

4G cellular standard, 93–94

Fourth Extended File System, 362

fragmented drives, 408–409, 566

frames

NICs, 67–68

packets, 58

frequencies

CPUs, 188

wireless networks, 90

front panel connectors, 178–179

frozen systems, 299, 596

fsutil command, 566

FTTN (fiber-to-the-node) services, 116

FTTP (fiber-to-the-premises) services, 116

Full Control permission, 510

full device encryption, 533–534

full duplex settings for NICs, 450

full formats, 362–363

function keys, 21–22

fuser assemblies in laser printers, 236

fusing step in laser printers, 240

Fusion Drive technology, 165

G

game controllers, 207–208

game pads

description, 207–208

mobile devices, 36

gaming PC hardware requirements, 221

garbled characters in printing, 305

gateways

DSL, 68

IP addresses, 108

Microsoft Windows networks, 449

General Data Protection Regulation (GDPR), 645

General tab

Internet Options, 414

System Configuration, 384

geofencing, 601

gestures, 462

ghost cursors, 296

ghost images in printing, 304

Gigabit Ethernet, 62

Global Positioning Systems (GPSs)

function keys for, 22

overview, 32

troubleshooting, 299

Global System for Mobile Communications (GSM), 95

globally unique identifiers (GUIDs), 357

Gmail accounts, 45–46

goggles, 632

Google Play, 326

government regulations, compliance with, 632

GPSs (Global Positioning Systems)

function keys for, 22

overview, 32

troubleshooting, 299

GPTs (GUID partition tables), 356, 358

gpupdate command, 373

GPUs (graphics processing units), 189

granular policy settings, 477

graphic design workstations requirements, 221

graphics processing units (GPUs), 189

grep command, 464

grounding equipment, 624–625

groups

Active Directory, 477–478

Microsoft Windows security, 508–509

GSM (Global System for Mobile Communications), 95

guards, 471

guest accounts

disabling, 521

lockout, 521–522

guest operating systems for virtual machines, 270–272

GUID partition tables (GPTs), 356, 358

GUIDs (globally unique identifiers), 357

H

half duplex settings for NICs, 450

hammers for data destruction, 539

hard disk drives (HDDs), 163–164

booting from, 351

caching, 233

magnetic, 163–165

replacing, 5–7

vs. SSD drives, 7–8

troubleshooting, 285–289

hard drive cables and connectors, 144

adapters, 147–148

IDE, 145–146

Molex power connectors, 146–147

SATA and eSATA, 144–145

SCSI, 146

hardware

cables and connectors. See cables and connectors

drives and storage devices, 210–211

input devices, 207–210

installing, 223–228

motherboards. See motherboards

network. See network hardware devices

operating system compatibility, 366

output devices, 205–206

power supplies, 212–220

RAM, 151–161

selecting, 220–223

hardware/device replacement in laptop computers, 4–5

batteries, 13

Bluetooth modules, 11

cellular cards, 12

CPUs, 14

DC jacks, 13

hard drives, 5–7

keyboards, 5

memory, 8–11

optical drives, 11

plastics/frames, 13

questions, 15–16

review, 15

screens, 12–13

smart card readers, 11

speakers, 13–14

system boards, 14

touchpads, 13

video cards, 12

wireless cards, 11

hardware firewalls, 65, 483

hardware tokens, 470–471

harmonics in power supplies, 216

hashed passwords, 504–505

HDMI (High Definition Multimedia Interface) cable, 138

headsets

mobile devices, 36

VR/AR, 30–31, 206

Health Insurance Portability and Accountability Act (HIPAA), 645

heat sinks, 191–193

heating elements in thermal printers, 246–247

hextets in IPv6, 103

HFS+ (Hierarchical File System Plus), 362

HHDs (hybrid hard drives), 7–8, 165

Hibernate mode, 422

Hierarchical File System Plus (HFS+), 362

High Definition Multimedia Interface (HDMI) cable, 138

High performance power plan, 420–421

high resource utilization as security issue, 600

hijacked e-mail accounts, 582

HIPAA (Health Insurance Portability and Accountability Act), 645

HKEY_ Registry keys, 402–403

home folder in Active Directory, 479

HomeGroup, 424–425, 438

hosts

networks, 61, 97–102

USB controllers, 141

hot-swappable devices

hard drives, 145, 171

USB, 141

hotspots

configuring, 40

Internet connections, 117–118

mobile devices, 36

hubs

overview, 64

USB, 141

humidity issues, 634–635

hybrid clouds, 257

hybrid hard drives (HHDs), 7–8, 165

hybrid laptops/tablets, 24

Hyper-Threading Technology, 186–187

Hyper-V, 268–269

hypervisors

client-side virtualization, 265–266, 268–272

guest operating systems, 270–272

installing, 269–270

I

IaaS (Infrastructure as a Service), 255

ICCIDs (Integrated Circuit Card Identifiers), 48

iCloud

e-mail, 44–45

support for, 462

ICS (Internet Connection Sharing), 113

ID badges, 210

IDE (Integrated Drive Electronics)

drives, 145–146

ports, 178–179

identity step for incidents, 641

IDSs (intrusion detection systems), 99

IEC-320 connectors, 213

ifconfig command, 108, 464

image-level backups, 617

images

Microsoft Windows, 568

OS installation, 355

printing to, 249

recovery, 355, 460

imaging drums in laser printers, 236, 240, 242

imaging process in laser printers, 237–241

IMAP (Internet Message Access Protocol), 43

IMAP4 (Internet Message Access Protocol version 4), 98

IMEI (International Mobile Equipment Identity) numbers, 47

impact printers, 247–248

impersonation, 503

IMSI (International Mobile Subscriber Identity) numbers, 48

in-place OS upgrades, 353

incidents

documentation, 607–608

response process, 641–643

incineration for data destruction, 540

indicator lights, troubleshooting, 282, 296

infrared (IR) connections, 36

Infrastructure as a Service (IaaS), 255

infrastructure connections for printers, 232

inherence factor in authentication, 490

inheritance of permissions, 511–512

initializing drives, 398

injectors for Power over Ethernet, 70

inkjet printers, 242–243

calibrating, 244

maintenance, 245–246

input devices, 207–210

input voltages for power supplies, 212–214

installing

applications, 434–435

cooling systems, 191–194

desktop computers, 223–224

DIMM sticks, 154–155

drivers, 364–365

expansion cards, 199–202

hypervisors, 269–270

laptop computers, 225–226

motherboards, 180

operating systems, 351–356

power supplies, 217–218

printers, 229–231

SO-DIMM sticks, 157–158

storage devices, 167–169

integers in scripts, 665

Integrated Circuit Card Identifiers (ICCIDs), 48

integrated commercial provider e-mail configuration, 44

Integrated Drive Electronics (IDE)

drives, 145–146

ports, 178–179

integrated GPUs, 189

integrated print servers, 232

integrated services digital network (ISDN), 117

Intel HD Graphics, 189

interface configuration settings, 184

intermittent device failure, 282

intermittent network connectivity, 315

intermittent wireless, 295, 590–591

internal fixed disks, booting from, 351

internal modems, 114–115

internal resources in cloud, 258–259

internal USB connectors, 180

International Mobile Equipment Identity (IMEI) numbers, 47

International Mobile Subscriber Identity (IMSI) numbers, 48

Internet appliances, 99–100

Internet Connection Sharing (ICS), 113

Internet connection types, 113

cable, 113

cellular, 117

dial-up, 114–116

DSL, 113–114

fiber, 116

hotspots, 117–118

ISDN, 117

line-of-sight, 118–119

satellite, 117

Internet connectivity, 581

Internet Message Access Protocol (IMAP), 43

Internet Message Access Protocol version 4 (IMAP4), 98

Internet of Things (IoT) devices, 81

Internet Options applet, 414–415

intrusion detection systems (IDSs), 99

intrusion prevention systems (IPSs), 99

invalid certificates, 583

inventory management, 609–610

inverters for displays, 19

iOS operating systems, 327

IoT (Internet of Things) devices, 81

IP addresses

APIPA, 104

DHCP, 104–107

DNS, 106

gateways, 108

IPv4 vs. IPv6, 103–104

link-local, 105

Microsoft Windows networks, 448–449

NAT, 110

networks, 315–316

overview, 102–103

questions, 111–112

review, 111

SOHO networks, 77–78, 546–547

static, 105–106

subnet masks, 107–108

VLANs, 110

VPNs, 109–110

ipconfig command

description, 372

IP addresses, 108–109

Microsoft Windows, 567–568

IPsec, 48

IPSs (intrusion prevention systems), 99

IPv4, 102–104

IPv6, 102–104

IR (infrared) connections, 36

ISDN (integrated services digital network), 117

ISO 9660 file system, 162, 361

ITX motherboard form factor, 175–176

iwconfig command, 464

J

jacks, replacing, 13

jams, paper, 305

jargon, avoiding, 648

JBOD (just a bunch of disks) storage, 170

jewelry safety issues, 630

joysticks, 207–208

.js file extension, 661–662

just a bunch of disks (JBOD) storage, 170

K

Kensington security lock connectors, 472

key fobs, 470–471

keyboard, video, mouse (KVM) switches, 210

keyboards

backlight, function keys for, 22

overview, 207

replacing, 5

Keychain Access, 461

keyloggers, 494

keys, Registry, 402–403

kill command, 465

killing tasks, 567

knowledge bases, 607

knowledge factor in authentication, 490

KVM (keyboard, video, mouse) switches, 210

L

L2TP (Layer 2 Tunneling Protocol), 48

language settings, 364

LANs (local area networks)

description, 119

switches, 63

laptop computers. See also mobile devices

cloud applications, 262

displays, 17–21

docking stations, 23

hardware/device replacement. See hardware/device replacement in laptop computers

installing, 225–226

locks, 23–24

port replicators, 23

RAM, 155–158

rotating/removable screens, 24

special function keys, 21–22

laser printers, 235

components and functions, 236

imaging process, 237–241

maintenance, 241–242

latency in satellite communications, 117

Layer 2 Tunneling Protocol (L2TP), 48

LC fiber optic connectors, 136

LCD (liquid crystal displays), 17

LCI (liquid contact indicator) stickers, 593

leaked personal files and data, 600

LED status indicators, 198

legacy systems, 100

letters, drive, 399–400

licensing, 643–644

lifting techniques, 630

lightning, 636

Lightning connectors, 35, 139–140

lights, troubleshooting, 282, 296

line-interactive UPSs, 621

line-of-sight wireless Internet service, 118–119

link lights, 198

link-local addresses, 105, 315

Linux operating system

commands, 463–465

distractions, 324–325

liquid contact indicator (LCI) stickers, 593

liquid cooling systems, 191, 193–194

liquid crystal displays (LCD), 17

List Folder Contents permission, 510

listening, active, 649

local area networks (LANs)

description, 119

switches, 63

local hosts, 61

local installation for applications, 434–435

Local Policy Editor, 519

Local Security Policy, 383, 519

local shares, 510–512

local snapshots, 458, 460

local user permissions, 435

Local Users and Groups tool, 378–379

location factor in authentication, 490

location services, battery drain from, 595

location tracking, unauthorized, 601

locator applications, 530–531

lockout

guest accounts, 521–522

mobile devices, 532, 597

locks

laptop computers, 23–24

physical security, 471–473

screen, 528–529

lockups, 280, 581

log entries, troubleshooting, 283

log errors, 583, 597

Log Summary section in Event Viewer, 391

logical drives, 357–358

logical security concepts, 475

ACLs, 485

Active Directory, 476–479

antivirus/anti-malware, 483

authentication, 483–484

certificates, 481–482

directory permissions, 484

DLP, 485

e-mail filtering, 485

firewalls, 483

MAC address filtering, 480

MDM policies, 480

passwords, 483

port security, 480

principle of least privilege, 486

questions, 488–489

review, 486–487

smart cards, 485

software sources, 486

software tokens, 479

VPNs, 484–485

login scripts in Active Directory, 476

logon time restrictions, 521

LoJack, 185

Long Term Evolution (LTE) cellular standard, 94

loopback addresses, 102–103

loopback plugs, 125

loops in scripts, 664

loud noises, troubleshooting, 282, 286

low-level formats for data destruction, 540

low RF signals, 316

ls command, 464

LTE (Long Term Evolution) cellular standard, 94

lumens for projectors, 206

M

M.2 drives, 166, 168–169

MAC (media access control) addresses

access points, 76

filtering, 83, 480, 485, 545–546

network interface cards, 67

Macintosh operating systems, 323–324

Magic Mouse gestures, 462

magnetic hard drives, 163–165

magnetic readers, 210

mail servers, 98

malware

botnets, 495

keyloggers, 494

ransomware, 494

removal tools and methods, 495–500, 585–589

rootkits, 495

spyware, 495

Trojans, 494

viruses, 495

worms, 495

MAM (mobile applications management), 435

man command, 463

man-in-the-middle (MITM) attacks, 504

managed switches, 63

MANs (metropolitan area networks), 119

mantraps, 470

manual services, 382

mapping

drives, 439–441

network printers, 441–442

ports, 548–550

masks

air filter, 632, 636–637

IP addresses, 107–108

master boot record (MBR) partitioning, 356

master file tables (MFTs), 360

material safety data sheets (MSDSs), 634

mats, antistatic, 627

mATX motherboards, 175

MBR (master boot record) partitioning, 356

MDM (mobile device management)

applications, 435

policies, 480

mdsched command, 566

measured services in cloud, 260

media access control (MAC) addresses

access points, 76

filtering, 83, 480, 485, 545–546

network interface cards, 67

media capacity for optical drives, 163

Media Center, 344

media for OS installation, 351

media formats for optical drives, 162–163

media options, function keys for, 22

media workstation requirements, 221

memory

mobile devices, 38

RAM. See RAM

storage devices. See storage devices

metered services in cloud, 260

meters, 123

metropolitan area networks (MANs), 119

MFDs (multifunction devices), 208

MFTs (master file tables), 360

mice, 207

micro-SD cards, 166–167

micro-USB connections, 34, 143

microATX motherboards, 175

microphones

description, 209

replacing, 19

Sound applet, 426

unauthorized activation, 602

microSD card slots, 38

Microsoft Management Console (MMC), 403–404

Microsoft Windows networking, 438

alternative IP addresses, 448–449

connections, 443–445

domain setup, 438–439

firewall settings, 447–448

HomeGroup vs. Workgroup, 438

network card properties, 449–451

printer sharing vs. network printer mapping, 441–442

proxy settings, 446

public and private, 447

questions, 452–454

Remote Desktop Connection, 446

review, 451–452

shares, 439–441

Windows Remote Assistance, 446–447

Microsoft Windows operating systems

administrative tools. See administrative tools

command-line tools, 371–376

Control Panel. See Control Panel

corporate needs vs. personal, 343–345

desktop styles, 345

features, 331–336

questions, 346–347

review, 346

system utilities. See system utilities

versions, 326

Windows 7, 336, 341

Windows 8, 337–338, 341–342

Windows 8.1, 338

Windows 10, 339–340, 342

workstations, 322

Microsoft Windows security

BitLocker, 513

EFS, 514

permissions, 509–512

questions, 516–517

review, 514–516

Run as Administrator, 513

shared files and folders, 510–512

system files and folders, 512

user and groups, 508–509

user authentication, 512

Microsoft Windows troubleshooting

application issues, 569–572

boot issues, 570

common symptoms, 556–560

driver issues, 569

fragmented drives, 566

killing tasks, 567

network settings, 567–568

OS reimaging, 568

profiles, 575

rebooting, 566–567

repair and recovery, 560–566

safe boots, 574

services, 570–571

update issues, 568–569

mini connectors for power supplies, 214, 216

Mini-ITX (mITX) motherboards, 175–176

Mini-PCIe, 12

mini-SD cards, 166–167

mini-USB connections, 34

mirrored drives, 170, 400

Mission Control feature, 323, 461

MITM (man-in-the-middle) attacks, 504

mITX (Mini-ITX) motherboards, 175–176

MMC (Microsoft Management Console), 403–404

mobile applications management (MAM), 435

mobile device management (MDM)

applications, 435

policies, 480

mobile device security

antivirus/anti-malware applications, 532

authenticator applications, 534

biometric authentication, 532–533

failed login attempts restrictions, 532

firewalls, 534–535

full device encryption, 533–534

locator applications, 530–531

multifactor authentication, 534

patches and updates, 532

policies and procedures, 535–536

questions, 537–539

remote backup applications, 531

remote wipes, 530

review, 537

screen locks, 528–529

software sources, 534

troubleshooting, 599–604

mobile devices

accessories, 36–38

airplane mode, 41

Bluetooth, 42

connection types, 34–36

disassembling, 300–301

displays, 17–21

docking stations, 23

e-mail configuration, 42–47

e-readers, 31

GPS, 32

hardware/device replacement. See hardware/device replacement in laptop computers

hotspots, 40, 117–118

IMEI vs. IMSI, 47–48

locks, 23–24

port replicators, 23

PRI, 47

radio firmware, 47

rotating/removable screens, 24

smartphones, 27–28

special function keys, 21–22, 51–56

tablets, 28

tethering, 40

troubleshooting, 294–303, 590–599

VPNs, 48–49

wearable, 29–31

modems

analog, 113–116

cable, 69

DSL, 68

SOHO networks, 81–82

Modify permission, 510

Molex power connectors

hard drives, 146–147

power supplies, 214, 216

monitors. See also displays

description, 206

disposal, 629

motherboards

BIOS/UEFI settings, 181–186

CMOS battery, 186

connectors, 176–178

cooling systems, 191–194

CPUs, 186–191

expansion cards, 194–202

form factors, 173–176

front panel connectors, 178–179

installing, 180

internal USB connectors, 180

power supply connectors, 215–217

questions, 204–205

replacing, 14

review, 202–204

sockets, 178

mount points, 357–358, 398

moved files and folders, permissions for, 510–511

msconfig utility, 383–385

MSDSs (material safety data sheets), 634

msinfo32 tool, 407

MSTSC utility, 404–405

multi-rail power supplies, 214

multiboot OS installations, 354–355

multichannel memory configurations, 159

multicore CPUs, 187

multifactor authentication

description, 484

mobile devices, 534

wireless security, 491

multifunction devices (MFDs), 208

multimeters, 123

multimode fiber optic cable, 136

multiple desktops, 339–340, 461

multiple displays, 417

multipurpose cables, 139–143

mutual authentication, 53

mv command, 464

N

NaaS (Network as a Service), 256

Nano-ITX motherboards, 175

NAS (network attached storage) devices, 221

NAT (Network Address Translation)

IP addresses, 110

SOHO networks, 82

near field communication (NFC) devices

description, 210

overview, 35

wireless networking protocols, 92

near-letter-quality (NLQ) printheads, 247

nested, striped mirrors, 170

net use command, 372

net user command, 372

NetBoot volumes, 350

netstat command, 372

NetSUS tool, 350

Network Address Translation (NAT)

IP addresses, 110

SOHO networks, 82

Network and Sharing Center applet, 428

Network as a Service (NaaS), 256

network attached storage (NAS) devices, 221

network-based installation for applications, 434–435

network controllers, 65

Network File System (NFS), 361

network hardware devices, 61

access points, 64

bridges, 69

cloud-based network controllers, 65

Ethernet, 62

Ethernet over Power, 71

firewalls, 65–66

hubs, 64

modems, 68–69

NICs, 65–68

patch panels, 69–70

Power over Ethernet, 70

questions, 72–73

repeaters, 68

review, 71–72

routers, 62

switches, 63

network interface cards (NICs)

overview, 65–68, 197–198

properties, 449–451

SOHO networks, 78–80

virtual, 262–263

network names in SOHO networks, 543

network printers

installing, 230–231

mapping, 441–442

network topology diagrams, 606

Network view in Microsoft Windows, 334

Networking tab in Task Manager, 395

networks, 58

booting from, 349–350

cables and connectors. See cables and connectors

client-side virtualization requirements, 267

hardware devices. See network hardware devices

hosts, 97–102

Internet appliances, 99–100

Internet connection types, 113–119

IP addresses, 102–109

Microsoft Windows. See Microsoft Windows networking

OS installation, 355

ports and protocols, 58–61

servers, 97–99

settings updates, 567–568

SOHO. See small office/home office (SOHO) networks

TCP vs. UDP, 59–60

tools, 122–123

troubleshooting, 311–318

types, 119–120

wireless. See wireless networks

New Technology File System (NTFS)

overview, 360–361

permissions, 509–510

NFC (near field communication) devices

description, 210

overview, 35

wireless networking protocols, 92

NFS (Network File System), 361

NICs (network interface cards)

overview, 65–68, 197–198

properties, 449–451

SOHO networks, 78–80

virtual, 262–263

NLQ (near-letter-quality) printheads, 247

NMIs (non-maskable interrupts), 557–558

no display, troubleshooting, 294

no image on screen, troubleshooting, 290

no OS found, troubleshooting, 556–557

noises, troubleshooting, 282, 286

non-compliant systems, 505

non-maskable interrupts (NMIs), 557–558

non-parity RAM, 159

Non-Volatile Memory Express (NVMe) drives, 166

non-volatile ROM, 181

Notepad utility, 404, 406

notification area in Microsoft Windows, 332–333

nslookup command, 372

NTFS (New Technology File System)

overview, 360–361

permissions, 509–510

NVMe (Non-Volatile Memory Express) drives, 166

O

objects in Performance Monitor, 380

octets in IP addresses, 102

ODBC Data Source Administrator, 386–387

off-site e-mail applications, 261

Offline drive status, 398

OLED (organic LED) displays, 17

on-demand services in cloud, 260

onboard video cards, 194

100BaseT, 62

1000BaseT, 62

Online drive status, 398

online UPSs, 621

open-source software licenses, 643–644

OpenSSH client, 670–671

operating systems

32-bit vs. 64-bit, 322

application compatibility, 322, 367

application requirements, 433–434

boot methods, 348–351

cell phones and tablets, 325

compatibility, 329

drivers, 364–365

factory recovery partitions, 365

file systems, 359–363

hardware compatibility, 366

in-place upgrades, 353

installing, 351–356

Microsoft Windows. See Microsoft Windows operating systems

partition requirements, 365–366

partitioning, 356–359

prerequisites, 366

questions, 370–371

RAM limitations, 322

regional settings, 364

review, 368–369

third-party drivers, 363

upgrade paths, 367–368

vendor-specific limitations, 328–329

virtual machines, 270–272

workgroup vs. domain setup, 363–364

workstations, 322–325

optical discs

booting from, 348, 352

media capacity, 163

media formats, 162–163

replacing, 11

speeds, 163

types, 210

optical mice, 207

organic LED (OLED) displays, 17

organizational units (OUs), 479

orientation setting

function keys for, 22

printers, 230

OS not found, troubleshooting, 287

OUs (organizational units), 479

output devices, 205–206

output voltages for power supplies, 214–216

overclocking CPUs, 188–189

overflow of laser printer memory, 237–238

overheating

avoiding, 596

causes, 281, 298

shutdown from, 290

overloaded networks, 590

oversized images and icons, 291

Overview section in Event Viewer, 391

overwrite operations for data destruction, 540

ownership factor in authentication, 490

P

PaaS (Platform as a Service), 255

package manager programs, 455–457

packages, RAM, 152

packets, 58

page files, 336

pages per minute (ppm) for inkjet printers, 243

PANs (personal area networks), 91–92, 119

paper

impact printers, 247–248

thermal printers, 246–247

troubleshooting, 305

parallel ATA (PATA) drives, 145–146

parental controls, 550

parity RAM, 159

partitions

booting from, 351

factory recovery, 365, 562

modifying, 398–399

recovery, 355

requirements, 365–366

swap, 362

types, 356–359

passcode locks, 529

passive cooling, 191–192

passphrases for access points, 76

passwd command, 464

passwords

access points, 76

account management, 522–523

attacks, 504–505

best practices, 517–518

policies, 609

setup utility, 184

SOHO networks, 544–545

strong, 483

PATA (parallel ATA) drives, 145–146

patch panels, 69–70

patches

managing, 456–457

mobile devices, 532

workstation security, 524–525

Payment Card Industry (PCI) standard, 645

PB (petabytes), 360

PCI Express (PCIe) bus, 176–177

PCI Express (PCIe) power connectors, 214, 216

PCI (Payment Card Industry) standard, 645

PCI (Peripheral Component Interconnect) bus, 176

PDF files, printing to, 248

performance

hard drives, 286

Microsoft Windows, 556

mobile devices, 297–298, 593

RAM, 159

as security issue, 580

Performance Monitor, 380–382

Performance Options dialog box, 419

Performance tab in Task Manager, 394–396

Peripheral Component Interconnect (PCI) bus architecture, 176

peripherals

drives and storage devices, 210–211

input devices, 207–210

output devices, 205–206

questions, 211–212

review, 211

permissions

account management, 519–520

applications, 435

directory, 484

Microsoft Windows, 509–512

personal area networks (PANs), 91–92, 119

personal files and data, leaked, 600

personal licenses, 644

personal safety, 629–632

personally identifiable information (PII), 608, 644–645

petabytes (PB), 360

phablets, 28

PHI (protected health information), 645

phishing, 503

photosensitive drums in laser printers, 236

physical security

badge readers, 470

locks, 23–24, 471–473

mantraps and entry control rosters, 470

possession factors, 470–471

privacy screens, 473

questions, 474–475

review, 474

security guards, 471

SOHO networks, 551–552

pickup rollers in laser printers, 236

Pico-ITX motherboards, 175

PII (personally identifiable information), 608, 644–645

ping command, 372

pinned programs in Microsoft Windows, 333

PINs for mobile devices, 529

pinwheel, troubleshooting, 283

plans in change management, 613

plastic filaments in 3-D printers, 249

plastics and frames, replacing, 13

Platform as a Service (PaaS), 255

plenum cabling, 134

PoE (Power over Ethernet), 70

point-of-sale (POS) machines, impact printers for, 247

pointer drift, 296

pointing devices, 207

policies

Acceptable Use Policy, 608

MDM, 480

mobile device security, 535–536

passwords, 609

regulatory and compliance, 608

polymorphic malware, 496

polyvinyl chloride (PVC) cable jackets, 134

pools, storage, 401

pop-ups, 578

POP3 (Post Office Protocol version 3), 42–43, 98

port forwarding in SOHO networks, 82–83

port replicators, 23

portable battery rechargers, 594

ports

disabling, 550

e-mail, 43

mobile devices, 35

motherboards, 178–179

networks, 58–61

security, 480

SOHO networks, 548–550

USB, 142

POS (point-of-sale) machines, impact printers for, 247

positive attitude in communication, 648

possession factors

authentication, 490

physical security, 470–471

POST code beeps, 280

Post Office Protocol version 3 (POP3), 42–43, 98

power

hard drive connectors, 146–147

issues, 635–636

management options, 420–422

ports, 35

safety issues, 629–630

troubleshooting, 281–282, 296

power drain as security issue, 600

power good wire, 215

Power over Ethernet (PoE), 70

power packs, 594

power plans, 420–421

Power saver power plan, 420–421

power-saving modes, 595

power supply units (PSUs), 212–213

devices powered, limitations, 217

input voltages, 212–214

installation, 217–218

output voltages, 214–216

questions, 219–220

review, 218

wattage ratings, 216–217

powered USB hubs, 141

ppm (pages per minute) for inkjet printers, 243

Preboot Execution Environment (PXE), 349–350

Preferred Roaming Lists (PRLs), 47

prerequisites for operating systems, 366

PRI (product release instruction) updates, 47

primary partitions, 357

principle of least privilege, 486

Print Management tool, 386–387

print queues, backed-up, 306

print servers, 97, 232

printers

3-D, 249

configuring, 230–231

description, 205–206

Devices and Printers, 425–426

drivers, 228–231

impact, 247–248

inkjet, 242–246

laser, 235–242

managing, 386–387

mapping, 441–442

Microsoft Windows, 559

questions, 251–252

review, 250

sharing, 231–233, 441–442

thermal, 246–247

troubleshooting, 303–311, 559

virtual, 248–249

printheads

impact printers, 247

inkjet printers, 242–244

privacy in device sharing, 233

privacy screens, 473

Privacy tab in Internet Options, 414

private clouds, 257

private materials, 652

private Microsoft Windows networks, 447

PRLs (Preferred Roaming Lists), 47

probes, 123

Processes tab in Task Manager, 394

processors, video, 196

product release instruction (PRI) updates, 47

professionalism, 650–652

profiles

mobile device security, 536

rebuilding, 575

slow loading, 560

Program Compatibility Troubleshooter, 433

Program Files folder, 335

Programs and Features applet, 423

Programs tab in Internet Options, 414

projectors, 206

promptness, 650

propagation of permissions, 510–511

proper language in communication, 648

proprietary crash screens, 283

proprietary ports, 35

protected health information (PHI), 645

protective covers for mobile devices, 37

protocols, network, 58–61

proxy servers, 98, 446

ps command, 465

.ps1 file extension, 655–657

PSUs. See power supply units (PSUs)

public clouds, 257

public Microsoft Windows networks, 447

public printers, sharing, 232–233

punchdown tools, 125–126

purpose determination in change management, 613

PVC (polyvinyl chloride) cable jackets, 134

pwd command, 464

PXE (Preboot Execution Environment), 349–350

.py file extension, 659–660

Python scripts, 659–660

Q

QR (Quick Response) scanners, 209

quad-channel memory, 159

Quality of Service (QoS)

NICs, 450–451

SOHO networks, 84

quality setting for printers, 231

quarantines for malware, 586

quick formats, 362–363

Quick Response (QR) scanners, 209

quotas, disk, 360–361

R

radio firmware, 47

radio frequency ID (RFID)

badge readers, 470

wireless networking, 92

radio frequency (RF) technologies, 88

radio power levels in SOHO networks, 544

RADIUS (Remote Authentication Dial-In User Service) protocol

wireless security, 491

WPA and WPA2, 77

RAID (redundant array of independent disks)

drives, 400

overview, 169–170

troubleshooting, 287

rainbow table attacks, 504–505

RAM, 151–152

applications, 432

client-side virtualization, 266

configuring, 158–159

desktop, 152–155

error-correcting, 159

laptops, 155–158

laser printers, 237–238

operating system limitations, 322

performance, 159

printers, 306

questions, 160–161

replacing, 8–11

review, 160

Windows Memory Diagnostic, 388

ransomware, 494, 581

rapid elasticity in cloud, 260

raster image processors (RIPs) in laser printers, 237

RDP (Remote Desktop Protocol), 668–670

Read permission, 510

Read & Execute permission, 510

read/write failures, 286

real-time-clock (RTC), 186

rebooting

Microsoft Windows, 566–567

troubleshooting, 281

rebuilding profiles, 575

rebuildmbr command, 566

Recently Viewed Nodes section in Event Viewer, 391

recovery

disaster prevention and recovery, 617–620

images, 460

Microsoft Windows, 560–566

Recovery Console, 496

recovery partitions in OS installation, 355

Recycle Bin folder, 335

recycling, 627

Red Hat Package Manager (RPM), 456

redirection

browser, 578

folder, 479

redundant array of independent disks (RAID)

drives, 400

overview, 169–170

troubleshooting, 287

Refresh option for operating systems, 356

refresh rate for Display Settings, 416

Refresh your PC option, 563

reg command, 566

Regedit utility, 402–403

regional settings, 364

Registry Editor, 402–403

regulated data, 644–645

regulations

compliance, 632

policies, 608

reimaging Microsoft Windows, 568

reloading Microsoft Windows, 568

remote access technologies

questions, 673–674

RDP, 668–670

review, 672

security, 672

SSH, 670–671

Telnet, 670

third-party tools, 671–672

Remote Assistance, 419, 446–447

Remote Authentication Dial-In User Service (RADIUS) protocol

wireless security, 491

WPA and WPA2, 77

remote backup applications, 531

Remote Desktop, 419

Remote Desktop Connection, 404–405, 446, 668

Remote Desktop Protocol (RDP), 668–670

Remote Disc feature, 462

remote hosts, 61

remote printing, 232

remote settings, 419–420

remote wipes, 530

removable screens, 24

removing malware, 585–589

repair OS installations, 353–354

repairing

applications, 569–570

Microsoft Windows, 560–566

repeaters, 68

reporting incidents, 641

requiring passwords, 518

reservations in DHCP, 107

Reset your PC option, 563

resolution

Display Settings, 415–416

inkjet printers, 243

laser printers, 238

printers, 231

resolution enhancement technology (RET), 237–238

resource pooling, 260

resources

client-side virtualization requirements, 266

cloud, 258–260

utilization as security issue, 600

restarting services, 567

Restore option, 356

restore points, 409–410

restores

malware protection, 496

snapshots, 460

RET (resolution enhancement technology), 237–238

RF signals, 316

RG coax cable, 137

ribbons for impact printers, 247

RIPs (raster image processors) in laser printers, 237

riser cards, 177–178

risk analysis in change management, 613

RJ-11 cables and connectors, 134–135

RJ-45 cables and connectors, 133

rm command, 464

robocopy command, 373

rogue antivirus apps, 581

rollers in inkjet printers, 242

rolling back

drivers, 201, 569

updates, 568

ROM chips, 181

root directory in Microsoft Windows, 335

root hubs for USB, 141

rootkits, 495

rotating screens, 24

routers, 62, 74

RPM (Red Hat Package Manager), 456

RS-232 (serial) cable, 144

RSA tokens, 470–471

rsnapshot utility, 460

RTC (real-time-clock), 186

Run as Administrator setting, 513

S

S.M.A.R.T. errors, 287

S/MIME (Secure/Multipurpose Internet Mail Extensions), 43

SaaS (Software as a Service), 256

Safe Mode, 574

safety goggles, 632

safety procedures

compliance, 632

component handling and storage, 625–627

equipment grounding, 624–625

personal safety, 629–632

questions, 633–634

review, 632–633

toxic waste handling, 627–629

Samba, 361

SAS (Serial Attached SCSI) drives, 146

SATA (serial ATA) standard

connectors, 144–145, 214, 216

drives, 167–168

ports, 178–179

satellite connections, 117

SC fiber optic connectors, 136

scanners, 208–209

scanos command, 566

scheduled backups, 454

scheduled disk maintenance, 455

scoping in change management, 613

screen locks, 528–529

screen share feature, 671

screens. See also displays

orientation, function keys for, 22

replacing, 12–13

rotating/removable, 24

sharing, 461

screensaver required passwords, 518

scripts, 654

Active Directory, 476

comment syntax, 663

constructs, 663–665

data types, 665

file types, 655–662

OS installation, 352–353

questions, 666–667

review, 666

variables, 662–663, 665

SCSI (Small Computer System Interface) drives, 146

SD (Secure Digital) cards, 166–167

SDSL (synchronous DSL), 114

Secure Boot, 185

Secure Digital (SD) cards, 166–167

Secure/Multipurpose Internet Mail Extensions (S/MIME), 43

Secure Shell (SSH), 670–671

Secure Sockets Layer (SSL)/Transport Layer Security (TLS), 48–49

security

applications, 435–436

best practices, 645

BIOS/UEFI settings, 184–186

client-side virtualization, 267

cloud services, 255

data destruction and disposal methods, 539–542

logical security concepts. See logical security concepts

malware, 493–502

Microsoft Windows. See Microsoft Windows security

mobile devices, 528–539

physical, 470–475

remote access technologies, 672

social engineering, 502–503

SOHO networks, 543–553

threats and vulnerabilities, 503–508

troubleshooting, 578–585

wireless, 489–493

workstations, 517–528

security guards, 471

Security tab in Internet Options, 414

self-grounding, 627

separation pads in laser printers, 236

serial ATA (SATA) standard

connectors, 144–145, 214, 216

drives, 167–168

ports, 178–179

Serial Attached SCSI (SAS) drives, 146

serial (RS-232) cable, 144

serial switchboxes, 231

Server Message Block (SMB), 361

servers

authentication, 477

locks, 473

network, 61

print, 232

roles, 97–99

service set identifiers (SSIDs)

network issues, 316

SOHO networks, 543–544

services

disabling, 570–571

failure to start, 559

restarting, 567

services.msc, 403

Services tab

System Configuration, 384

Task Manager, 394–396

Services tool, 382–383

sfc command, 373, 566

SFF (small form factor) motherboards, 175–176

.sh file extension, 657–659

shared cloud resources, 258–259

shared files and folders, 510–512

shares

administrative vs. local, 510–512

network, 439–441

sharing

devices, 231–233

permissions, 509–510

printers, 441–442

screens, 461

shielded twisted pair (STP) cable, 134

shoulder surfing, 503

shredders, 539

shrinking partitions, 398–399

shutdown command, 372, 464

shutdowns, troubleshooting, 279

side-by-side apps in Windows 8, 337

signal drop as security issue, 600

signature pads, 207

signed drivers for expansion cards, 201

Simple Mail Transfer Protocol (SMTP), 98

simultaneous multithreading (SMT), 187

single-core CPUs, 187

single-factor authentication, 491

single memory channels, 159

single-mode fiber optic cable, 136

single-rail power supplies, 214

single sign-on (SSO)

description, 512

mobile devices, 53

SiSoftware Sandra app, 607

64-bit operating systems, 322

slang, avoiding, 648

Sleep mode, 422

slow data speeds as security issue, 600

slow performance

hard drives, 286

Microsoft Windows, 556

mobile devices, 297–298, 593

as security issue, 580

slow transfer speeds, 316

Small Computer System Interface (SCSI) drives, 146

small form factor (SFF) motherboards, 175–176

small office/home office (SOHO) network security

content filtering and parental controls, 550

firewalls, 547–548

firmware updates, 551

MAC filtering, 545–546

physical, 551–552

ports, 548–550

questions, 552–553

review, 552

static IP addresses, 546–547

usernames and passwords, 544–545

wireless-specific, 543–544

small office/home office (SOHO) networks, 73

access points, 74–77

channels, 86

device sharing, 231–233

encryption, 84–85

end-user device configuration, 80

firewalls, 82

IoT device configuration, 81

IP addresses, 77–78

MAC filtering, 83

modem configuration, 81–82

NIC configuration, 78–80

printers, 228–231

QoS, 84

questions, 87–88, 234–235

review, 86–87, 233–234

routers and switches, 74

smart speaker/digital assistant technology, 81

wireless settings, 84–86

small-outline DIMMs (SO-DIMMs) modules, 155–158

smart card readers

description, 210

replacing, 11

smart cards, 470–471, 485

smart speakers, 81

smart watches, 29

smartphones, 27–28

SMB (Server Message Block), 361

smoke, troubleshooting, 282

SMT (simultaneous multithreading), 187

SMTP (Simple Mail Transfer Protocol), 98

snap-ins in MMC, 403–404

snapshots

local, 458, 460

restoring, 460

SO-DIMMs (small-outline DIMMs) modules, 155–158

social engineering, 502–503

sockets

CPU, 190

motherboards, 178

software

operating system compatibility, 322

sources, 486, 534

updates, 364–365

Software as a Service (SaaS), 256

software firewalls

description, 65, 483

malware protection, 498

software tokens, 479

SOHO networks. See small office/home office (SOHO) networks

solid-state drives (SSDs)

booting from, 351

vs. hard drives, 7–8

overview, 165–167

sound

sound cards, 196–197

troubleshooting, 299, 596

Sound applet, 197–198, 426

Spaces feature, 323

spam, 582

spanned drives, 400

spanned volumes, 358

speakers

characteristics, 196–197

description, 206

mobile devices, 36

replacing, 13–14

SOHO networks, 81

Sound applet, 426

troubleshooting, 299, 596

spear phishing, 503

special function keys, 21–22

speed

CPUs, 188

networks, 316

NICs, 450

optical drives, 163

SPI (stateful packet inspection), 65, 547–548

spikes, power, 635

Spinning Pinwheel of Death (SPoD), 283

splitting partitions, 398–399

spoofed cell towers, 600

spoofing, 505

Spotlight feature, 323, 461–462

sprays, antistatic, 626

SPSs (standby power systems), 621

spyware, 495

SSDs (solid-state drives)

booting from, 351

vs. hard drives, 7–8

overview, 165–167

SSH (Secure Shell), 670–671

SSIDs (service set identifiers)

network issues, 316

SOHO networks, 543–544

SSL for e-mail, 43

SSL (Secure Sockets Layer)/Transport Layer Security (TLS), 48–49

SSO (single sign-on)

description, 512

mobile devices, 53

ST fiber optic connectors, 136

standard formats for data destruction, 540

standard thick client requirements, 220

Standby mode, 422

standby power systems (SPSs), 621

Start button

Windows 7, 336

Windows 8, 337

Start menu in Microsoft Windows, 332–333

Startup Repair option, 561

Startup tab

System Configuration, 384

Task Manager, 396

stateful packet inspection (SPI), 65, 547–548

static IP addresses

overview, 105–106

SOHO networks, 546–547

status

communicating, 651–652

drives, 397–398

NIC indicator lights, 198

steering wheels, 207

sticking keys, 295

storage devices, 161

configuring, 169–170

drive types, 210–211

hot-swappable drives, 171

installing, 167–169

magnetic hard drives, 163–165

optical drives, 162–163

questions, 172–173

review, 171–172

solid-state drives, 165–167

Storage Spaces utility, 401–402

storage systems

client-side virtualization, 266

cloud, 261

troubleshooting, 285–289

STP (shielded twisted pair) cable, 134

straps, ESD, 626–627

streaks in printing, 303

strings in scripts, 665

striped drives, 170, 400

strong passwords, 483, 517–518

su command, 465

subnet masks, 107–108, 449

sudo command, 465

Summary of Administrative Events section in Event Viewer, 391

surges, power

description, 635

surge protectors, 621–622

Suspend mode, 422

swap files, 336

swap partitions, 362

swipe locks, 529

switches

KVM, 210

network, 63

NICs, 67

Power over Ethernet, 70

SOHO networks, 74

swollen batteries, 299

Sync Center applet, 429

synchronization apps for cloud, 261

synchronization for mobile devices

applications, 53

automobiles, 52

cloud, 51

connection types for, 53

data types, 52–53

desktop, 52

questions, 55–56

review, 54

settings, 226

single sign-on, 53

synchronous DSL (SDSL), 114

syslog protocol, 98–99

System applet, 419–420

system boards. See motherboards

System Configuration utility, 383–385

system crystal, 188

system files and folders, 512

System Image Recovery option, 562

System Information tool, 407

system lockout for mobile devices, 532, 597

system lockups, 280

system log errors, 583

System Protection tab, 420

system requirements for applications, 431–433

System Restore

description, 356, 561

malware removal, 586–587

overview, 409–410

system tray in Microsoft Windows, 332–333

system updates, 455–456

system utilities

command prompt, 402–403

Disk Defragmenter, 408–409

DxDiag, 407–408

MMC, 403–404

MSTSC, 404–405

Notepad, 404, 406

Regedit, 402–403

services.msc, 403

System Information, 407

System Restore, 409–410

Windows Explorer, 406

Windows Update, 410–411

SystemRoot in Microsoft Windows, 335

T

Tablet mode in Windows 10, 339–340

tablets

cloud applications, 261–262

description, 28

disposal, 629

operating systems, 325

TACACS+ (Terminal Access Controller Access-Control System Plus), 491

tailgating, 503

tap pay devices, 210

Task Manager, 393–397

Task Scheduler, 385–386

Task View in Windows 10, 339

taskbars in Microsoft Windows, 332

taskkill command, 373

tasks, killing, 567

TB (terabytes), 360

TCP (Transmission Control Protocol)

overview, 58–60

printer sharing, 232

TCP/IP (Transmission Control Protocol/Internet Protocol), 58–59

Telnet program, 670

temperature issues, 634–635

temporal factor in authentication, 490

Temporal Key Integrity Protocol (TKIP), 85, 490

10BaseT, 62

terabytes (TB), 360

Terminal Access Controller Access-Control System Plus (TACACS+), 491

Terminal program, 460

testing backups, 620

tethering

configuring, 40

Internet connections, 117–118

mobile devices, 35

thermal interface material (TIM), 193

thermal printers, 246–247

thermal throttling, 593

thick clients

description, 223

installing, 223–224

thin clients

description, 223

hardware requirements, 220

installing, 223–224

third-party drivers, 363

third-party tools for remote access technologies, 671–672

32-bit operating systems, 322

This PC view in Microsoft Windows, 333

threads, 186–187

3-D printers, 249

3Gcellular standard, 93–94

throttling, thermal, 593

Thunderbolt interface, 140

TIM (thermal interface material), 193

Time Machine, 458–460

time settings, 364

timeout/screen locks, 521

TKIP (Temporal Key Integrity Protocol), 85, 490

tokens

hardware, 470–471

software, 479

tone generators, 123

toner

cleaning, 241

disposal, 629

tools

cable testers, 124–125

crimpers and cable strippers, 122–123

loopback plugs, 125

multimeters, 123

punchdown, 125–126

tone generators and probes, 123

Wi-Fi analyzers, 127

Tools tab in System Configuration, 384

topology diagrams, 606

touchpads

configuring, 225

description, 207

function keys, 22

replacing, 13

touchscreens

configuring, 225

replacing, 19

troubleshooting, 297, 592–593

toxic waste handling, 627–629

TPM (Trusted Platform Module)

BitLocker, 513

setup utility, 185

tracert command, 372

tractor-feed paper, 247

training for malware, 497–498, 587–588

transfer belts in laser printers, 236, 239

transfer rollers in laser printers, 236

transfer speeds in networks, 316

transferring step in laser printers, 238–239

Transmission Control Protocol (TCP)

overview, 58–60

printer sharing, 232

Transmission Control Protocol/Internet Protocol (TCP/IP), 58–59

transparency feature in Windows 7, 336

triggers

ports, 549–550

Task Scheduler, 385–386

triple-channel memory, 159

Trojans, 494

troubleshooting

core components, 279–285

hard drives, 285–289

malware removal, 585–589

methodology, 276–279

Microsoft Windows. See Microsoft Windows troubleshooting

mobile device security, 599–604

mobile devices, 294–303, 590–599

networks, 311–318

printers, 303–311

security issues, 578–585

video, 289–293

Troubleshooting applet, 426–427

Trusted Face feature, 529

Trusted Platform Module (TPM)

BitLocker, 513

setup utility, 185

trusted root CAs, 481

trusted software sources, 486, 534

tunneling in SSH, 670–671

2.4 GHz band, 90

24-pin motherboard adapters, 215

Type 1 hypervisors, 268

Type 2 hypervisors, 268

U

UDP (User Datagram Protocol), 58–60

UEFI (Unified Extensible Firmware Interface). See BIOS/UEFI settings

Unallocated drive status, 397

unattended OS installations, 352–353

unauthorized account access, 601

unauthorized location tracking, 601

unavailable resources in networks, 312

unexpected shutdowns, 279

Unified Extensible Firmware Interface (UEFI). See BIOS/UEFI settings

unified threat management (UTM), 99

unintended Bluetooth pairing, 600

unintended Wi-Fi connections, 600

uninterruptible power supplies (UPSs), 620–621

universal plug and play (UPnP) devices, 82

universal serial bus. See USB (universal serial bus)

unmanaged switches, 63

unshielded twisted pair (UTP) cable, 62, 134

untrusted software sources, 486, 534

updates

antivirus/anti-malware, 458, 586

drivers and firmware, 457–458

failures, 581

firmware, 183–184, 551

mobile devices, 532

network settings, 567–568

operating system limitations, 329

rolling back, 568

software, 364–365

system, 455–456

Windows Update, 410–411

workstation security, 524–525

upgrades, operating system, 353, 367–368

UPnP (universal plug and play) devices, 82

UPSs (uninterruptible power supplies), 620–621

USB (universal serial bus)

connectors, 141–143

drives, booting from, 348, 352

expansion cards, 198–199

locks, 473

motherboard connectors, 180

printer switches, 231

thumb drives, 166

USB-C connections, 34

USB to Ethernet adapters, 148

User Account Management, 392–393

User Accounts applet, 418

User Datagram Protocol (UDP), 58–60

user education for malware, 497–498, 587–588

user interface in Microsoft Windows, 346

user permissions for applications, 435

usernames in SOHO networks, 544–545

users

authentication. See authentication

Microsoft Windows security, 508–509

Users folder in Microsoft Windows, 335

Users tab in Task Manager, 395–396

UTM (unified threat management), 99

UTP (unshielded twisted pair) cable, 62, 134

V

vacuum cleaners, 638

variables in scripts, 662–663, 665

.vbs file extension, 657

VBScript (Visual Basic Script), 657

vendor-specific limitations for operating systems, 328–329

vendor-specific ports, 35

ventilation, 634–635

versioning for file backups, 617

vertical lines on page, 306

VGA (Video Graphics Array) cable, 138

VGA (Video Graphics Array) mode, 290

vi command, 465

video. See also displays

cables and connectors, 138–139

troubleshooting, 289–293

video cards

overview, 194–196

replacing, 12

video editing workstation requirements, 221

Video Graphics Array (VGA) cable, 138

Video Graphics Array (VGA) mode, 290

views in Microsoft Windows, 333

virtual application streaming, 261–262

virtual desktops, 262–263

virtual local area networks (VLANs), 110

virtual machine managers (VMMs), 268

virtual machines

cloud, 258–259

creating, 269–270

guest operating systems, 270–272

purpose, 266

virtual memory

description, 152

Microsoft Windows, 335–336

virtual printers, 248–249

virtual private networks (VPNs)

connections, 443

mobile devices, 48–49

overview, 109–110, 484–485

virtual reality (VR) headsets, 30–31, 206

virtualization

client-side. See client-side virtualization

CPUs, 188

virtualization workstation requirements, 220

viruses, 495

Visual Basic Script (VBScript), 657

Visual Effects tab, 419

VLANs (virtual local area networks), 110

VMMs (virtual machine managers), 268

volatile RAM, 181

volume, function keys for, 22

volume mount points, 358, 398

volumes

creating, 357–358

mounting, 398

VPNs (virtual private networks)

connections, 443

mobile devices, 48–49

overview, 109–110, 484–485

VR (virtual reality) headsets, 30–31, 206

W

WAIK (Window Automated Installation Kit), 352–353

Wake-on-LAN (WOL) settings, 450

WANs (wide area networks), 63, 119

WAPs (wireless access points)

description, 64

MAC address filtering, 480, 485

SOHO networks, 74–77, 544

watches, 29

waterproofing mobile devices, 37

wattage ratings for power supplies, 216–217

wax ribbons in thermal printers, 246–247

WCS (Windows Color System), 244

weak signals as security issue, 600

wearable technology devices, 29–31

weather conditions, 634–635

web servers, 97

webcams

overview, 209

replacing, 18

weight limitations, 630

WEP (Wired Equivalent Privacy) encryption, 85, 490

white lists in MAC addresses, 83, 480

Wi-Fi analyzers, 127

Wi-Fi devices

antenna connectors and placement, 17–18

IoT, 81

printers, 231

Wi-Fi Protected Access (WPA), 85, 490

Wi-Fi Protected Setup (WPS), 85, 544

wide area networks (WANs), 63, 119

Window Automated Installation Kit (WAIK), 352–353

Windows operating systems. See Microsoft Windows operating systems

Windows 7 operating system

editions, 341

overview, 336

Windows 8 operating system

editions, 341–342

overview, 337–338

Task Manager, 395–396

Windows 8.1 operating system, 338

Windows 10 operating system

editions, 342

overview, 339–340

Task Manager, 395–396

Windows Color System (WCS), 244

Windows directory, 335

Windows Explorer, 333–334, 406

Windows Firewall

overview, 388–390

settings, 420

Windows Hello facial recognition, 529

Windows Memory Diagnostic tool, 388, 562

Windows Preinstallation Environment (WinPE), 365, 560

Windows Recovery Environment (WinRE)

malware, 496

overview, 560–565

Windows Registry Editor, 402–403

Windows Remote Assistance, 446–447, 669

Windows Server Update Services (WSUS), 524

Windows Update, 364–365

overview, 410–411

workstation security, 524–525

WinPE (Windows Preinstallation Environment), 365, 560

WinRE (Windows Recovery Environment)

malware, 496

overview, 560–565

wipes

drives, 541

remote, 530

wire snips, 122

wired connections

Microsoft Windows networks, 445

mobile devices, 34–35

wired devices, sharing, 231

Wired Equivalent Privacy (WEP) encryption, 85, 490

wired NICs in SOHO networks, 78–79

wireless access points (WAPs)

description, 64

MAC address filtering, 480, 485

SOHO networks, 74–77, 544

wireless cards, replacing, 11

wireless connections

Microsoft Windows networks, 444–445

mobile devices, 35–36

wireless devices

battery drain from, 595

sharing, 231–232

wireless mesh networks (WMNs), 119

wireless networking protocols, 88

802.11 standards, 88–90

Bluetooth, 91–92

cellular standards, 93–94

channels, 90

frequencies, 90

NFC, 92

questions, 95–96

review, 95

RFID, 92

Z-Wave, 93

ZigBee, 92–93

wireless networks

airplane mode, 41

Bluetooth, 42

connectivity issues, 296

function keys for, 22

hotspots, 40

intermittent, 295, 590–591

laptop settings, 226

SOHO network settings, 84–86

tethering, 40

wireless NICs for SOHO networks, 79–80

wireless security, 600

authentication, 490–491

protocols, 489–490

questions, 492–493

review, 492

SOHO networks, 543–544

WMNs (wireless mesh networks), 119

WOL (Wake-on-LAN) settings, 450

Workgroup, 438

workgroups setup, 363–364

workstation security

account management, 519–523

AutoRun, 523

data encryption, 523–524

passwords, 517–518

patches, 524–525

questions, 526–528

review, 526

workstations

hardware requirements, 220–221

operating systems, 322–325

worms, 495

WPA (Wi-Fi Protected Access), 85, 490

WPA2, 490

WPS (Wi-Fi Protected Setup), 85, 544

Write permission, 510

WSUS (Windows Server Update Services), 524

WWAN connections, 445

X

XaaS (Anything/Everything as a Service), 256

xcopy command, 373

xD (Extreme Digital) Picture Cards, 167

XPS Document Writer, 248–249

Y

Yahoo accounts, 47

Z

Z-Wave standard

devices, 81

wireless networking protocols, 93

ZB (zettabytes), 360

zero-day attacks, 504

zero-fill operations for data destruction, 540

zero insertion force (ZIF) sockets, 190

ZigBee networks, 92–93

zombies, 505

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.19.29.89