Source: Adopted From www.computerhope.com
[bs_icon name=”glyphicon glyphicon-exclamation-sign”]Tip: This page only covers an overall slow computer and not a computer that has a slow boot up or slow Internet.
Source: Adopted From www.computerhope.com
[bs_icon name=”glyphicon glyphicon-exclamation-sign”]Tip: This page only covers an overall slow computer and not a computer that has a slow boot up or slow Internet.
Source: Adopted From www.computerhope.com
A slow Internet connection can be caused by any number of reasons. Below is a short list of some of the more common reasons your Internet connection may be slow. Read more »
Source: Adopted From www.computerhope.com
A slow Microsoft Windows boot up can be caused by a number of different issues. The following document contains various suggestions and tips that can help improve the overall speed of your computer’s startup. Read more »
A bad computer motherboard or CPU can cause an assortment of different issues on your computer. Below are just a few of the possible issues you may encounter. It is important to remember that the issues below can also be caused by more than just a bad motherboard and CPU. Read more »
A heat sink is an electronic device that incorporates either a fan or a peltier device to keep a hot component such as a processor cool. Read more »
A hardware device that keeps the overall computer or a computer device cool by circulating air to or from the computer or component. The picture is an example of a fan on a heat sink. Read more »
A chipset is a group of microchips that are designed to work with one or more related functions that were first introduced in 1986 when Chips and Technologies introduced the 82C206. Read more »
The BIOS and CMOS are often times thought to be the same thing, but they are not. Read more »
The southbridge is an IC on the motherboard responsible for the hard drivecontroller, I/O controller and integrated hardware. Integrated hardware can include the sound card and video card if on the motherboard, USB, PCI, ISA, IDE, BIOS, andEthernet. Read more »
Short for super input/output or Super I/O, SIO is anintegrated circuit on a computer motherboard that handles the slower and less prominent input/output devices shown below. Read more »
Less commonly referred to as the Centronics interface or Centronics connectorafter the company that originally designed it, the port was later developed by Epson. Read more »
Originally known as the Analog-to-Digital port (A-to-D port), the as a game port, joystick port, or game control adapter is a 15-pin connector port first found onIBM computers in 1981. Read more »
If your computer is losing its time or date settings, or you are receiving a messageCMOS Read Error, CMOS Checksum Error, or CMOS Battery Failure, the CMOS battery needs to be replaced. To do this, follow the steps below. Read more »
Alternatively referred to as a Real-Time Clock (RTC), Non-Volatile RAM (NVRAM) or CMOS RAM, CMOS is short for Complementary Metal-Oxide Semiconductor. Read more »
There are many types of expansion cards that can be installed in a computer, including sound, video, modem, network, interface card, and a number of others. In many cases, these expansion cards will fit in a slot in the computer called a PCI slot. Read more »
Alternatively referred to as a bus slot or expansion port, an expansion slot is connection or port located inside a computer on the motherboard or riser board that allows a computer hardware expansion card to be connected. Read more »
Okay, now that we’ve tested our AC outlet and put some protective power devices into play, let’s go ahead and talk power supplies. Read more »
You may not typically handle the insides of your computers, but if your business requires knowledge of Central Processing Units (CPU), then you’ll also need to learn about CPU sockets Read more »
In computer hardware, a port serves as an interface between the computer and other computers or peripheral devices. Read more »
Storage is the hard drive’s responsibility. Everything you keep on your computer is on a hard drive. Read more »
System memory, frequently called main memory or RAM (Random Access Memory), is a type of computer memory that can be accessed randomly. Read more »
Result contains:
Review the BIA
Computer as incidental to other crimes
Tunneling is a method of transferring data from one network to another by encapsulating the packets in an additional header. The additional header provides routing information so that the encapsulating payload traverse the intermediate networks. Read more »
IPSec Encryption: IPSec supports several variations of encryption algorithms, such as, AES.
1.Sending device feeds the original packet and the session key into the encryption formula, calculating the encrypted data.
2.The sending device encapsulates the encrypted data into a packet, which includes the new IP header and VPN header.
3.The sending device sends this new packet to the destination VPN device.
4.The receiving device runs the corresponding decryption formula, the same value as was used by the sending device to decrypt the data.
IPSec KEY Exchange: IPSec uses a dynamic key exchange called Internet Key Exchange (IKE) – defined by RFC 4306. IKE uses a specific process called the Diffie-Hellman (DH) key exchange protocol.
DH allows the devices to make up and exchange key securely.
Internet Key Exchange (IKE)
Security Associations (SAs)
IPSec KEY Authentication and Message Integrity:
Authentication here generally refers to the process by which a receiving VPN device can confirm that a received packet was really sent by a trusted VPN peer.
Message Integrity , sometimes referred to as message authentication, allows the receiver to confirm that the message was not tampered with in transit.
Hashed-based Massage Authentication Code (HMAC) is used. The sending device computes a has and stores the result in the VPN header. The receiving device re-computes the hash using a shared key, and compares the value with the value listed in the VPN header. If it matches then receiver knows message did not change.
Function | Method | Description |
Message integrity | HMAC-MD5 | Uses a 128-bit shared key, generating a 128-bit hash value |
Message integrity | HMAC-SHA | SHA uses different key sizes – 160, 256, 512. Considered better than MD5 but has more overhead. |
Authentication | Pre-shared Keys | Both VPN devices must be preconfigured with same secret key |
Authentication | Digital Signatures | RSA is used for encryption.
|
The ESP and AH Security Protocols – IPSec defines these two security protocols with each defining a header.
Encapsulating Security Payload (ESP) – defines the rules for performing authentication, message integrity, encryption and anti-replay. ESP can be used with or without AH.
Authentication Header (AH) – supports authentication and message integrity. AH does not offer any encryption services.
Endpoint communicate with IPSec using either transport or tunnel mode.
To Become Certified For CISSP Please Visit This Link;
Open Systems Interconnect (OSI) Model Read more »
Wide area networks (WANs) are considerably different than LANs. Organizations usually own their own LANs, but WAN services are typically leased; it’s not feasible to have your network guy run a cable from New York to Dallas. Read more »
Measurement plays a critical role within ITIL®, both as a part of Continual Service Improvement, but also within Service Level Management and as an essential part of all processes. Measurements can be used for four basic purposes as shown below: Read more »
Incident Management is concerned with the rapid restoration of services and with minimization of impact to the business. Read more »
The Service Operation phase of the Service Lifecycle is concerned with ensuring that services operate within agreed parameters. When service interruptions do occur, Service Operation is charged with restoring service as quickly as possible and with minimizing the impact to the business.
Service Operation is the only lifecycle phase in which value is actually realized by customers. Whereas all other phases of the Service Lifecycle contribute to and enable value, it is only experienced during Service Operation.
Service Operation also adds business value by:
[bs_icon name=”glyphicon glyphicon-chevron-right”] Balance
Because Service Operation is the first lifecycle phase in which the Service Provider organization must respond to rather than plan for and drive user and customer demand, balance is difficult to maintain. Accordingly, ITIL® emphasizes the importance of striving to achieve and maintain balance during Service Operation in the form of specific balances between :
[bs_icon name=”glyphicon glyphicon-chevron-right”] Communication
During Service Operation, the importance and criticality of communication is especially acute. ITIL stresses the importance of communication :
[bs_icon name=”glyphicon glyphicon-chevron-right”] Incident
An incident is any occurrence which causes or may cause interruption or degradation to an IT Service.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Problem
A problem is the unknown underlying cause of one or more incidents. A problem is NOT just a particularly serious incident.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Error
An error is the known underlying cause of one or more incidents.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Known Error
A known error is the known cause of an incident for which a workaround also exists.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Event
An event is any change of state of an infrastructure or other item which has significance for the delivery of a service.
**Source by wikipedia**
To Become Certified For Exin ITIL Please Visit This Link ;
Change Management is concerned with recording, evaluating, approving, testing, and reviewing changes to services, systems, and other Configuration Items. Read more »
[bs_icon name=”glyphicon glyphicon-chevron-right”] Change Authority
In ITIL® the entity charged with approval of a Request for Change is called the Change Authority. Read more »
IT Security Management is the process concerned with the protection of IT assets (including services) from security threats. Read more »
[bs_icon name=”glyphicon glyphicon-chevron-right”] Normal Changes are changes which meet predefined criteria that qualify them for handling via the Normal Change Management process.
The ‘Four P’s of Service Design’ represent areas which should be taken into consideration when designing a service. Read more »
Capacity Management is concerned with ensuring that cost-effective capacity exists at all times which meets or exceeds the agreed needs of the business as established in Service Level Agreements. Read more »
ITIL also utilizes the RACI model as a generic tool for reviewing and assigning four key roles to any important task or activity. Read more »
The Service Desk provides a single point of contact between users and the IT organization.
Source mc mcse Certification Resources
Source mc mcse Certification Resources