CST3607 Class Notes 2019-01-29

Stay Informed! News Sources

Studying & Learning Tips

News & Tools

  • Disable FaceTime Now! Bug Lets Callers Snoop On You Without Permission
    • The bug would cause the microphone of the person you are calling to turn on and you could listen through their microphone without them even answering your call. Even worse, if the person you called pressed the power button to mute the incoming FaceTime call, it would also enable the front facing camera so you could see what is happening in the room.
    • Apple Disabled Group FaceTime While Working on Bug Fix
  • The Final Exam will be on Thursday: May 21, 2019, at 8PM
  • Cybrary – Free IT & Security Training
  • The Privacy Paradox Challenge: A week of challenges with thousands of other “Note to Self” podcast listeners Feb 6-10.
  • Surveillance Self-Defense is Electronic Frontier Foundation (EFF)’s guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.
  • security.txt: “When security risks in web services are discovered by independent security researchers who understand the severity of the risk, they often lack the channels to properly disclose them. As a result, security issues may be left unreported. Security.txt defines a standard to help organizations define the process for security researchers to securely disclose security vulnerabilities.”
  • Microsoft Windows and Office ISO Download Tool: This tool allows an easy way to download genuine Windows 7, and Windows 10 disk images (ISO) directly from Microsoft’s servers, as well as Microsoft Office for Windows and Mac.
  • InSpectre: Easily examine and understand any Windows system’s hardware and software capability to prevent Meltdown and Spectre attacks.
    • Security Now 645: Meltdown and Spectre Explained
    • Security Now 648: Post Spectre?

Notes

  • The Class Web page is located at ConsciousVibes.com (Do Not use the www. prefix!)
    • Select the “CityTech” menu.
    • All assignments, reading and written, will be posted only on the class Web page
    • Assignments will not be posted on Blackboard.
  • Make sure that you can log into Blackboard and access our class section as soon as possible.
    • Exams and quizzes will be administered via Blackboard
  • Free ESL, GED, Job prep classes are available from the Office of Adult & Continuing Education

Principle of Least Privilege

Malware (short for malicious software. e.g. Virus, Trojan Horse, Worm, Adware, etc.)

  • The key to solving the malware problem is avoidance, not detection and removal.
  • Rootkit : You can never be sure you’ve removed all traces of a rootkit. The only way to be certain that your system is clean of malware is to:
    1. Backup only your data. (Do not backup any .exe’s, .com’s as they may have been compromised.)
    2. Erase/format the hard drive
    3. Do a clean install of the operating system from known safe media. (Do not use the recovery partition, as it may have been compromised too.)

Live Recovery OS and AntiVirus Media

  • Troubleshoot/Test hardware or recover data
  • Ubuntu, KNOPPIX, Kali Linux
  • Lubuntu (for older, slower, or low resource PC’s)

BadUSB

PortaPow Fast Charge + Data Block USB Adaptor

  • Blocks data transfer – your device will not go into ‘data transfer’ mode if connected to a computer, so you can use a computer just like a mains charger. This also prevents data hacking and any risk of viruses being loaded onto your device when charging from an unknown/public USB socket.
  • Puts your device into fast charge mode – allows you to charge at high speed (up to 2.4A) from a computer USB socket or other USB charger even if it was not originally designed for your device. Most Android and Apple products will charge at double the speed of normal computer USB charging.
  • Available from Amazon.com

Password Managers


Backing Up: 3-2-1 Rule

  • 3: Have three copies of your files. The original, plus 2 copies
  • 2: On different storage mediums. e.g. separate hard drives, optical (CD/DVD), tape
  • 1: Have a current backup that is offsite and/or a secure online service:

Optical Media for Long Term Archives

  • Regular writable optical media, CDs & DVDs, etc., are not reliable for long term storage. The die used with optical media degrade with exposure to light, temperature extremes, etc. Because of this, the data on the media will start to degrade within 1 to 5 years.
  • M-DISC (Millennial Disc) is a write once optical disc technology available in DVD and Blu-ray forms.
  • Millenniata claims that properly stored M-DISC DVD recordings will last 1,000 years, and are readable in conventional optical drives.
  • Drives with M-DISC support and M-DISC Media

Memorize these Bit Patterns of Often Used Subnet Mask Values

Bit(s)BinaryDecimal
110000000128
211000000192
311100000224
411110000240
511111000248
611111100252
711111110254
811111111255

Troubleshooting Client Network Connectivity

  • Reasons why a client workstation did not get an IP address from the DHCP server within the correct IP address scope of your network, while other client workstations do.

Read / Watch

CST3607 Class Outline / Syllabus

CCNA Routing and Switching Study Guide 2nd Edition

  • Chapter 1: Internetworking

OSI Reference Model

CCNA Routing and Switching Study Guide 2nd Edition

  • Take the “Assessment Test” on p. lvii

About the Review Questions

  • It is your responsibility to continually evaluate your knowledge and understanding of each chapter by completing the written labs, review questions, and hands-on labs, and then going back to study those areas you’re not confident with.
  • We will go over some of the Review Question during the next class.
  • Make sure you ask questions about the areas you’re having difficulty with during class.
  • Do not submit your answers to the Review Questions for grading.
  • The answers for the Review Questions are in Appendix B of the textbook.

Read / Do

  • Take the “Assessment Test” on p. lvii
  • Read Chapter 1: Internetworking
  • Do the Written Labs
  • Answer the Review Questions

Send an e-mail to me

  • Send me an e-mail, from the e-mail address you check regularly, that I will use to communicate with you for the rest of this semester.
    • E-mail Subject: CST3607 Contact Info
    • In the Body of the e-mail: Include your first and last names and your mobile phone number.
    • Note: I will not share your phone number or e-mail address with anyone.
Spread the love

Leave a Comment