Computer System Architecture
At the core of every computer system is the CPU and hardware that make it run. Read more »
At the core of every computer system is the CPU and hardware that make it run. Read more »
Penetration testing is a series of activities undertaken to identify and exploit security vulnerabilities. Read more »
Single sign-on is an attempt to address a problem that is common for all users and administrators. Read more »
Data access controls are established to control how subjects can access data, what they can access with it, and what they can do with it once accessed. Three primary types of access control are discussed in this section.
The two law systems that form the basis of legal systems in most countries are: Read more »
Source by wikipedia
To Become Cretified For CISSP Please Visit This Link ;
Asymmetric Systems
–Uses a pair of keys (private and public) for encryption and decryption Read more »
Identify Commonly Used TCP/UDP Ports
Common networking command-line tools include the following:
Read more »
An IDS is designed to function as an access-control monitor. It can monitor network or host activity and record which users attempt to access specific network resources. Read more »
Bluetooth is a short-range technology aimed at simplifying communications and synchronization among network devices. Bluetooth is divided into three classes:
Read more »
Wireless Ethernet Versions: (Name – Data Transfer Rate – Frequency) Read more »
Cabling Standards include: Read more »
Networking Protocols include: FTP – File Transfer Protocol : Port 21 Read more »
Get our complete tutorial in PDF
Tip #1) Make sure as soon as you get into testing room, write all your IP subnet tables, since you have about 20 mins before the exam start
[bs_icon name=”glyphicon glyphicon-chevron-right”] Custom PCs include:
Audio/Video workstations – needs special A/V cards, fast hard drives and multiple monitors Read more »
Wireless encryption protocols include :
Switches connect computers together in a LAN. Read more »
ATX 12V 2.x Power Supplies connect to the motherboard by way of 24-pin cable + 4-pin for CPU and 6 or 8-pin for video.
**Source by wikipedia **
To Become Cretified For CompTIA A+ Please Visit This Link ;
IPv4 addresses are 32 bit dotted-decimal numbers (like 192.168.1.1) and can be statically (manually) inputed or dynamically (automatically) assigned by DHCP.
Short for Universal Serial Bus, USB (pronounced yoo-es-bee) is a plug-and-play interface that allows a computer to communicate with peripheral and other devices. Read more »
When You Open a new router you will see
Router> This is called user mode;
then you type en=enable to get to enable mode
Router# This is called privilege mode
Get our complete tutorial in PDF
To Find Out If Link is UP
Switch#show ip int brief
Get our complete tutorial in PDF
To Find out if link is up and has Ip address
Router#show ip int brief
In this Lab we will cover the concept of Extended ACL , make sure read another blogs about Standard ACL .
Read more »
Click here to read the presentation
There are two kinds of ACL:
seated at PC1 =10.10.10.1 I can not ping 30.30.30.6
Wild cards are very important in OSPF
In this lab we are trying to make our Cisco Router Act as a DHCP server , that is R1 will give ip address 10.10.10.0/24 to left side Pc and it will give the IP address 20.20.20.0/24 to right side of PC. The Goal is Prepare you for your Cisco CCNA Certification exam.
Authentication : The verification of a person’s identity – Helps protect against unauthorized access.
Optical disc drives use removable media to store and retrieve data, typically 5.25”.
Read more »
No network connectivity?
Read more »
Hard Disk Drives are nonvolatile (meaning they don’t lose data when power off) devices that store data, generally 3.5”. Types of HDD include:
Read more »
RAID stands for Redundant Array of Inexpensive Disks.
[bs_icon name=”glyphicon glyphicon-arrow-right”] RAID 0 is not fault-tolerant. If RAID 1 uses two disk controllers, it is disk duplexing.
Short for Redundant Array of Inexpensive Disks, RAID is an assortment of hard drives connected and setup in ways to help protect or speed up the performance of a computer’s disk storage. RAID is commonly used on servers and high performance computers.
Spanning and Software Striping
Splitting information and writing it across multiple physical disk drives. RAID 0 utilizes this technique.
Mirroring
Duplication of data from one disk drive to another.
Duplexing
Duplicates the disk drive as well as the disk controller.
Deferred
Data is cached in cache memory and writes to the hard drive as the disk drive becomes available.
Hot Swapping
Failed disk drives can be replaced and data can be placed back onto the disk drive while the remainder of the system is in operation.
Hot Sparing
Disk drive is automatically initialized into the array when another fails.
Spindle Synchronization
Synchronization of the rotation of all disk drives in the array allowing information to be written all at once.
RAID 0
Software stripping and Block Interleave (minimum 2 drives). Data is written to each drive in succession, each block going to the next available drive (striping) for a faster operation and less chance of overloaded. The volume can of course be much larger than any single drive. Since no redundancy is provided, the failure of a single drive will bring the system down. RAID 0 is the fastest and most efficient array type, but offers no fault-tolerance.
RAID 1
Disk Mirroring and Duplexing ( minimum 2 drives ). Drives are used in pairs and all data is written identically to both drives. Each drive can be duplexed by being connected to its own interface controller. The failure of one drive will not bring down the system, instead the other drive will continue to operate. Of course, two drives are now used for the equivalent storage capacity of one drive. There is no performance gain with this level. The array of choice for performance-critical, fault-tolerant environments. Also, RAID 1 is the only choice for fault-tolerance if no more than two drives are desired.
RAID 2
Data striping and bit interleave. Data is written across each drive in succession, one bit at a time. Checksum data is recorded in a separate drive. RAID 2 is very slow for disk writes and seldom used today since ECC is embedded in almost all modern disk drives.
RAID 3
Data striping with bit interleave and parity checking. RAID 3 is similar to lever 2, but more reliable. Data striping is done across the drives, one byte at a time. Usually 4 or 5 drives are used providing very high data transfer rates. One drive is dedicated to storing parity information. The failure of a single drive can be compensated by using the parity drive to reconstruct the failed drive contents. Since the parity drive is accessed on every write operation, the writing of data tends to be slower. The failure of two drives or more can be a problem. RAID 3 can be used in data intensive environments with long sequential records to speed up data transfer. However, it does not allow multiple I/O operations to be overlapped and requires synchronized-spindle drives to avoid performance degradation with short records.
RAID 4
Block interleave data striping with parity checking. As in level 3, RAID 4 uses a single parity drive and block data striping like in RAID 0. The drives in this RAID level function individually, with an individual drive reading a block of data. A failure of the controller will of course be catastrophic. Offers no advantages over RAID-5 and does not support multiple simultaneous write operations.
RAID 5
Block interleave, data striping with distributed check-data on all drives. The one to use for NetWare. Parity information is distributed across all drives. RAID 5 efficiency goes up as the number of disks increases. You can use hot spares to rebuild a failed drive on “the fly”. The best choice in multi-user environments, which are not write performance sensitive. However, at least three, and more typically five drives, are required for RAID-5 arrays.
RAID 6
Extension to RAID 5, which adds a log structured file system providing a mapping between a disk drives physical sectors and their logical representation. As information is written it is placed to sequential physical disk sectors.
RAID 10
Stripped array whose segments are RAID 1 arrays and containing the same fault tolerance as RAID 1. High I/O rates are achieved by stripping RAID 1 segments. Excellent solution for those considering RAID 1 since it provides an good write performance, but is an expensive solution.
RAID 53
Implemented as striped RAID 0 array whose segments are RAID 3 arrays. RAID 53 also contains the same Fault tolerance and overhead as RAID 3. Excellent solution for those considering RAID 3 since it provides additional write performance, but is an expensive solution and requires all drives to have the same synchronization.
[bs_icon name=”glyphicon glyphicon-exclamation-sign”]Note: RAID can be setup with multiple partitions instead of multiple drives for some protection if sectors of the drive become bad. However, if the drive fails you will lose all of your data. For any RAID setup it’s best to use at least two drives to eliminate a single point of failure and total data loss.
Some computer and RAID manufacturers have created their own scheme of labeling their RAID devices. For example, RAID 0/1 would mean that it combines the striping of RAID 0 with the mirroring of RAID 1.
Source By:<www.computerhope.com>
To Become Cretified For CompTIA A+ Please Visit This Link ;
Sound cards connect as x1 PCIe or PCI cards and normally have PC 99 color-coded 1/8” mini-jacks for I/O and speakers, and optical I/Os known as S/PDIF (example: TOSLINK).
Alternatively referred to as an audio output device, sound board, or audio card. A sound card is an expansion card or IC for producing sound on a computer that can be heard through speakers or headphones. Although the computer does not need a sound device to function, they are included on every machine in one form or another, either in an expansion slot (sound card) or on the motherboard (onboard).
The picture is an example of a sound card audio ports oraudio jacks on the back of your computer, associated colors, and the connector symbols.
Tip: Usually the cables connecting to the devices are also color-coded and will match or be close to the colors the cables connect into. For example, the end of the speakers cable may have a green line or be completely green.
Source By:<www.computerhope.com>
To Become Cretified For CompTIA A+ Please Visit This Link ;
Video cards connect to motherboards by way of x16 PCIe (most common, typically black), AGP (brown), or PCI (white) expansion slots. Read more »
Random Access Memory (RAM) types include SDRAM, DDR, DDR2, DDR3, RDRAM and SODIMMs.
Read more »
The Central Processing Unit (CPU) or processor takes care of all calculations. Read more »
Motherboards – Connect everything together. Typical form factors include ATX (most common), microATX, ITX, and BTX.
Read more »
[bs_icon name=”glyphicon glyphicon-expand”] Here is ASM’s Cisco CCNA Students practical video lab.
[bs_icon name=”glyphicon glyphicon-expand”] Here is ASM’s A+ Bootcamp Students practical video lab. They are building a brand new PC as a part of their training program (Computer Cost is included in tuition).
To Become Certified For CompTIA A+ Please Visit This Link ;
Here are ASM Students who has taken ,CompTIA ,Cisco ,CCNA, CCNP ,Microsoft ,MCSA Exam. We are proud of them.