Reflection
Day 1
Today I learned Trouble Shooting Theory, Safety Rules, and Windows, Mac, and Linux Features and Tools. In Trouble Shooting Theory, there are steps that you need to follow if you run into trouble while on your computer. You will have to identify your problem and ask yourself or the user what they did to cause the problem and observe the computer. After that, you have to establish a theory of probable cause. You will have to do research and possibly use your own knowledge. Next, you will have to test your theory. If your theory didn’t work, you will have to go back a step and see what you did wrong. The next step is, establishing a plan of action. After you settle your plan, you will have to verify full system functionality to make it official. The last step is always documenting your findings and write down or blog your problem you went through for someone else to read so they will know what to do if they run into that exact problem.
In Safety Rules, I learned that ESD Mats (grounding mat) and ESD Straps prevents you from getting shocked and destroying anything in the device. Anti-static bags prevent EMI (Electromagnetic interference). When lifting things in the technology field, always bend your knees or else you will hurt yourself. Always disconnect the power when working on computers and move loose cables out the way.
The last thing I learned was the different features of the Windows, Mac, and the Linux OS. The Windows has Aero, Sidebar and Gadgets, Windows XP Mode, Pinning, Side by Side Apps, Compatibility Mode, Metro UI, Multi-Monitor Taskbar, Windows 8 Start Menu, Charms, Windows Defender, Windows Firewall, User Account Control, BitLocker, Windows Security Center, Easy Transfer, ReadyBoost, Windows Store, One Drive, and File Structures and Paths. Mac OS has Mission control, Keychain, Spotlight, iCloud, Gestures, Finder, Remote Disk, Dock, Boot Camp, Time Machine, Terminal, Force Quit, Screen Sharing, and Disk Utility. Linux OS has different tabs show up at the same time and same gestures as Mac OS.
Day 2
Today I learned about Hard drives, Motherboards, and the same safety rules. Just in case of a fire, use a Class C fire extinguisher for computer fires. Always put your hair up if you have long hair while working and fixing computers. Another thing I learned is, if you have another working item too close to your Motherboard, it will destroy your Motherboard components. I learned that BIOS stands for Basic Input Output System. RAM stands for Random Access Memory which only holds temporary storage. CMOS is the smallest component in the Motherboard that can be removed at any point of time. I learned that SO DIMM is only half of the DIMM (Dual Inline Memory Module). I also learned that everything has to go by RAM in order to work such as mouse clicks and scrolling over the screen. Next I learned, the North and South Bridge is also in the motherboard. The North Bridge is the memory controller and the South Bridge is the input/output controller.
There are 2 different types of CPU’s (Central Processing Unit) which are LGA (Land Grid Array) and PGA (Pin Grid Array). Another thing I learned was, PSU (Power Supply Unit) is the power supply that has to connect to the Motherboard in order to give the Motherboard power. The main cords plug into the honey shaped block in order to provide power. I also learned the bigger the computer, the bigger Motherboard.
Day 3
Today I learned about Hacking, Types of Hackers, Different Teams, and Pen Test. I learned that White Hats act as Black Hats (bad people) to attack your system to find all the ways they hacked you and help you out. Grey hats need permission from you and other company owners or other people to get into your system. I also learned the Penetration System means being hired to find vulnerabilities. Another thing I learned about the Red Team (they are the bad people/hackers), the Blue Team (they defend which means they are waiting until someone comes and shield), the White Team (they are the referees), and the Purple Team (they attack and defend and teach at the same time which means they are both the Red and Blue Team). The last thing I learned was the Pen Test. The White Box pretends to be an employee that was given all access, the Black Box doesn’t have any information to start with, and the Grey Box is both White and Black Box (some information they also have good intentions but they do it the wrong way).
Day 4
Today I learned more about Social Engineering and Phishing. I learned the effective way of Social Engineering which was if someone tries to gain information from you, they can impersonate you and make you have a bad reputation. When an attacker gets to you, they will project authority towards you and it will give them more power because you will become scared (intimidation). Another lesson I learned was the word ‘Familiarity’. Familiarity means that people have their guards down when they trust them (the attackers) and possibly become friends. There different types of Phishing. There is Spam, Shoulder Surfing, Spear Phishing, Whaling, URL Hijacking/Typo Squatting, Tailgating, Piggybacking, and Dumpster Diving. I really like these classes! I would like to retake this class to get a better understanding out of it and make better choices.
Commenti