CST3607 Class Notes 2022-08-25

Meetings via Zoom

  • When: Aug 25, 2022 08:00 PM Eastern Time (US and Canada)
  • Zoom registration is required.
  • Go to our class section in Blackboard. The meeting registration information is in Content > Information
  • When you register, make sure to select all 30 sessions.

Stay Informed! News Sources

Studying & Learning Tips

The Final Exam will be on Tuesday: December 20, 2022

News & Tools

Notes

  • The Class Web page is located at ConsciousVibes.com (With No www. prefix!)
    • Select the “City Tech” menu, on the right.
    • All assignments, reading and written, will be posted only on the class Web page
    • Assignments will never be posted on Blackboard.
  • Make sure you can log into Blackboard and access our class section as soon as possible.
    • Exams and quizzes will be administered via Blackboard

Principle of Least Privilege

Malware (short for malicious software. e.g. Virus, Trojan Horse, Worm, Adware, etc.)

  • The key to solving the malware problem is avoidance, not detection and removal.
  • Rootkit : You can never be sure you’ve removed all traces of a rootkit. The only way to be certain that your system is clean of malware is to:
    1. Backup only your data. (Do not backup any .exe’s, .com’s as they may have been compromised.)
    2. Erase/format the hard drive
    3. Do a clean install of the operating system from known safe media. (Do not use the recovery partition, as it may have been compromised too.)

Zero-Day Vulnerability

  • A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to those interested in mitigating the vulnerability (including the vendor of the target software), and anti-virus makers.

Tools

Microsoft Windows and Office ISO Download Tool

  • This tool allows an easy way to download genuine Windows disk images (ISO) directly from Microsoft’s servers, as well as Microsoft Office.
    • In the past, Microsoft provided disk images for many of their products through their subcontractor “Digital River”. These downloads were pulled in early 2014. Afterwards, Microsoft made a limited selection of downloads available on their TechBench site. This tool accesses that TechBench site, and unlocks a large number of hidden download files on it.

Create a bootable USB Flash Drive from an ISO

  • Rufus : Create a bootable USB from an ISO, and Windows to Go USB Flash Drive from an ISO
  • XBoot : Create a bootable USB flash drive with multiple Live OS’s

Live Recovery OS and AntiVirus Media

  • Troubleshoot/Test hardware or recover data
  • Ubuntu, KNOPPIX, Kali Linux
  • Lubuntu (for older, slower, or low resource PC’s)

BadUSB

PortaPow Fast Charge + Data Block USB Adaptor

  • Blocks data transfer – your device will not go into ‘data transfer’ mode if connected to a computer, so you can use a computer just like a mains charger. This also prevents data hacking and any risk of viruses being loaded onto your device when charging from an unknown/public USB socket.
  • Puts your device into fast charge mode – allows you to charge at high speed (up to 2.4A) from a computer USB socket or other USB charger even if it was not originally designed for your device. Most Android and Apple products will charge at double the speed of normal computer USB charging.
  • Available from Amazon.com

Backing Up: 3-2-1 Rule

  • 3: Have three copies of your files. The original, plus 2 copies
  • 2: On different storage mediums. e.g. separate hard drives, optical (CD/DVD), tape
  • 1: Have a current backup that is offsite and/or a secure online service:

Optical Media for Long Term Archives

M-DISC (Millennial Disc)

Memorize these Bit Patterns of Often Used Subnet Mask Values

Bit(s)BinaryDecimal
110000000128
211000000192
311100000224
411110000240
511111000248
611111100252
711111110254
811111111255

Troubleshooting Client Network Connectivity

Determine why a client workstation did not receive a valid IP address for your network, while other client workstations can.

  • Step-by-step troubleshooting. Keep it simple.
  • What configuration information does a DHCP client expect to received from the DHPC server?
  • Example network: 10.10.5.0 /24
  • Automatic Private IP Addressing (APIPA)

Send me an e-mail

  • Send me an e-mail, from the e-mail address you check regularly, or get alerts from, that I will use to communicate with you for the rest of this semester. My e-mail address is on the information page in Blackboard.
    • E-mail Subject: CST3607 Contact Info
    • In the Body of the e-mail: Include your first and last names and your mobile phone number.
    • Note: I will not share your phone number or e-mail address with anyone.
  • Always sign e-mails to me with your full first and last names.

Read / Watch

CST3607 Class Outline / Syllabus

CCNA Certification Study Guide, Volume 2: Exam 200-301

  • Read Chapter 1: Network Fundamentals
  • Do the Written Labs
  • Answer the Review Questions
    • Do not submit your answers for this chapter. The answers are in Appendix B

OSI Reference Model

CCNA Certification Study Guide, Volume 2

  • Take the “Assessment Test” on p. xl

About the Review Questions at the end of every chapter

  • It is your responsibility to continually evaluate your knowledge and understanding of each chapter by completing the written labs, review questions, and hands-on labs, and then going back to study those areas you’re not confident with.
  • Make sure you ask questions about the areas you’re having difficulty with during class.
  • Do not submit your answers to the Review Questions for grading.
  • The answers for the Review Questions are in Appendix B of the textbook.

Read / Do

  • Take the “Assessment Test” on p. xl
  • Read Chapter 1: Network Fundamentals
  • Do the Written Labs
  • Answer the Review Questions