You are on page 1of 27

isa: industry standard architecture

pci: peripheral component interconnect

agp: accelerated graphics port

pentium pro: socket 8

pentium ii: secc type type 1 socket

pentium iii: secc type 2 socket, also socket 370

pentium 75+ overdrive: socket 7

pcmcia type 2: 5mm thick

pcmcia type 1: 3.3mm thick

pcmcia type 3: 10.5mm thick

pga: pin grid array (pga) is a square ceramic cpu chip with pins on the bottom; the zero insertion force chip
fits into the zero-insertion force socket on the motherboard.

secc2: a cartridge-style cpu that accepts cartridge-type athlon cpu.

secc:a cartridge-style cpu

mau: mutltistation access unit

bridge: used to separate a large physical network into two smaller networks to reduce network traffic.

single setting: if, a single hard disk is attached to a primary ide channel, its jumper should be set to single

g0: global power state: fully operational

g1: global power state: sleep mode

g2: global power state: soft off

g3: global power state: mechanical off

network standard: 1. media; 2. speed; 3. topology

s1, s2, s3, s4: sleep modes: s4 consumes the least power of the four sleep modes; it is also called
"hibernation"

contrast ration: lcd measurement between the diff of darkest color and the lightest color that a screen can
display.

osi: the open systems interconnection model is used to describe how network protocols should function.
the osi model was designed by the international organization for standardization

hal: hardware abstraction layer. required for successful boot

worm: self-contained in that it can reproduce itself and doesn't need a host for transport

ntoskrnl.exe: is the core (or kernel) of the operating system and is loaded last.

windows 2000: requires 133MHz

windows xp: requires 233MHz

current drivers: to get the newest drivers available, always visit the manufacturer's website

corona wire, corona roller: transfers the neg charged toner from the neg charged print drum via a pos
charge that exceeds the difference -> corona is positive
ntfs: first file system, windows, that supported encryption

ieee1284: defines the ecp parallel port to use, a dma channel, and the buffer to be able to transfer data at
high speeds to printers standard

nlx form factor: places expansion slots on a special riser card and is used in low-pro pc's

class a: fire extinguisher: for water-based products

class b: fire extinguisher: for flammable liquids

class c: fire extinguisher: for electrical fires

class d: fire extinguisher: for flammable metals

i&a: identification and authentication

pcmcia type iii form factor: usu hard drives

pcmcia type ii form factor: usu sound cards & net adapters

erd: in win 2000, emergency repair disk - setup through windows backup to repair the registry.

asr: in win xp, automated system recovery is accessed through the windows backup utility and backs up
the registry.

built-in remote assistance: r-click 'my computer', sel properties, sel remote tab

vga mode: good boot choice to troubleshoot prob's emanating from inserting a new video card and
subsequent performance was impacted somehow by symptoms such as garbled and unreadable video.

ide: intrenal interface used to connect hard drives, cd drives, and dvd drives.

irda: infrared data association, is a cable-free method of connecting a printer by using a system similar to a
tv remote control.

parallel port: traditionally used for a printer port because it supports faster speeds than a serial port.

usb: becoming more popular than parallel ports because it is faster than them

dma: direct memory allocation - allows a device to bypass the cpu and place data directly onto ram itself

irq 7: by default assigned to lpt1

irq 3: assigned to com 2 & 4 - may want to check

bluetooth class 2 devices: most common form of commercial devices

ieee 802.15.1: bluetooth standard: 2.4GHz

do desktop systems occassionally share memory with the os, as laptops are known to do?

chkdsk: a utility used by xp/2000 that is capable of fixing cross-linked files on hard drives

asr: automated system recovery utility used to back up the registry in windows xp systems

what are 2 ways to change the file system on a partition? convert -> fat to ntfs: appears simple to
advanced, not reverse; format -> format the partition,

fdisk: partition utility

fuser: component in a laser printer most likely to f-you up, burn

transfer corona: changes the charge on the paper to positive to force the toner onto the paper from the
negatively charged drum
primary corona wire: applies a negative charge to the drum after it has gone through the cleaning phase

telnet: 23

ftp: 21

ssh: 22

hd partitions: can hold a max of 4 partitions: can be 4 primary, or three primary and one extended
partition

lpti: irq7

com2: 02f8-02ff

com1 & com3: both use irq4 -> avoid conflict

computer management: service selection & monitoring: here you can do such things as stop & restart the
print spooler

services & monitoring: control panel, admin tools, services: here you can stop & restart an offending
service

safe modes: listed in order of most minimal: safe mode, safe mode with networking, vga mode

task manager's performance tab: allows one to see processor, page-file, and physical mem stat's in real
time

fuser assembly: presses & melts the toner intot he paper

transfer corona: transfers the toner from the drum to the paper by putting a positive charge on the paper,
forcing the toner on a neg charged drum to transfer to the paper

printer controller circuitry: converts signals from the pc into signals for the various printer assemblies

paper transport assembly: controls the movement of the paper through the printer

dot-matrix printer: these use both tractor & friction feed paper mechanisms

write permission: in ntfs file system, this allows one to change the target's ownership, permissions,
attributes and create new entities within a folder

*fat, fat16, and fat32 file systems do not support local security features. should you require these, ntfs
should be used

ecp: was designed for fast transfer speeds. ecp uses dma channels and buffers to increase printing
performance

msds: material data safety sheet

infrared: does not use radio waves, not very susceptible to interference, can transmit at up to 16mbps,
bits.

inverter: responsible for powering the lcd backlight

video card: responsible for the video signal

transfer corona wire: laser printer: faulty corona wire would cause white streaks on paper

primary corona charging wire: applies a uniform -600vdc charge to the photosensitive drum. the drum is
then ready for the image to be written on it.

dark to light fading across the page: dot-matrix printer: likely the gear isn't turning the gear upon which
the ribbon is attached
solid-ink printer: uses ink that comes in a solid, wax form

thermal printer: use either heat only or heat along with a ribbon that contains a wax-based ink

bubble-jet printer: liquid ink

dye-sublimation: liquid ink

pin 9: laser printer: should read +24v

pin 1: laser printer: should read +5v

pin 5: laser printer: should read -5v

white streaks: laser printer: most likely caused by toner on the transfer corona wire

black streaks: vertical black lines: are likely caused by a scratch or a groove in the ep drum

fuser faulty: toner wouldn't bond to the paper and you would have smearing

writingprocess: laser printer: during the writing process, a laser shines on the photosensitive drum and
reduces the charge from -600vdc to 100vdc. the areas where the charge is reduced will form the image.

dye-sublimation printing: dye-sub printers use sheets of solid ink that immediately convert to gaseous
form and then adhere to the paper

laser printing order: cleaning, charging, writing, developing, transfering, fusing

blank line across line of text: if there is a consistent blank space, it likely means that a pin is not firing
properly, and the print head needs to be replaced

ghosting: laser printer phenom: due to a bad erasure lamp or a broken cleaning blade

elements that can damage a laser printer: heat, light, ozone and ammonia

scanning image fuzzy: solution: sharpen it

scanning image fuzzy: solution: could be simply a low-resolution scanner

vertical black lines: laser printer: cause: scratch or groove in teh eep drum

nslookup: command-line utility that lets one cross check names on a dns server

gateway: a gateway is an upper-layer device that can work between applications, such as different e-mail
protocols, and send between dissimilar networks

cname: dns record: canonical name record used to hold aliases for the host

soa: dns record: is the start of authority record, which holds the time to live and related info

hinfo: dns record: holds the tcp/ip address info, as do a records

a record: dns record: holds the

ptr: dns record: ptr is used for a reverse lookup. it holds the 'pointer' information

nsrecord: dns record: name server record. maps to the primary server for the zone

caching-only dns server: a caching-only dns server holds the results of queries it has performed but does
not have a zone file of its own

tftp: uses port 69

imap: internet mail access protocol

tracert: trace route: a utility used to test connectivity and see the path taken to reach another host
nslookup: is a command-line utility that enables you to verify entries on a dns server

solid-ink printer: thermal printers: use either heat only or heat along with a ribbon that contains a wax-
based ink.

liquid-ink printer: bubble-jet and dye-sublimation printers use liquid ink

laser printer: pin 9 has +24v

laser printer: pin 1 is +5v

laser printer: pin 5 is -5v

.scr: stands for screen and is an executable. can be used for attacks, ojo.

database local account: all databases have this account by default and thus hackers target it

.pif: this extension is used for program information files: a type of file that allows legacy executable
programs to run, ojo

tcp/ip hijacking: involves exploiting the existence of a valid session by intercepting communications and
gaining access to them; also, stealing a valid ip address and using it to gain authorization to a network

replay attack: a replay attack attempts to replay the results of a previously successful session to gain
access

tcpack attack: creates multiple incomplete sessions. eventually, the tcp protocol hits a limit and refuses
additional connections

smurf attack: using a broadcast ping (icmp) on a network. the return address of the ping can be any
system computer

task manager: control+shift+esc

sfc: system file checker: use if system files are corrupted - run sfc /scannow -> sfc will automatically repair
files it detects as corrupt.

open command prompt: command, cmd

run: edit: dos editor

device manager: deleting or uninstalling a card's driver will only be in effect until reboot when plug 'n' play
will reinstall 'em. disabling them is best.

computer management: contains event viewer, disk defragmenter and services.

restart spooler: control panel -> administrative tools -> services; or, computer management -> services.

ntldr: file that is responsible for switching from real to protected mode during the windows 2000/xp boot
process.

erd: emergency repair disk: the erd backs up the registry, which contains system configuration items.

attrib +r work.doc: r-> 'read-only' file

router: network device that affords network address translation.

shared memory: to reallocate memory sharing enter the system bios. for example, to reallocate memory
allocated to vga on ram, enter bios and adjust.

piconet: bluetooth network

network or net: ethernet network

cells: cellular network
infrared: doesn't really make networks. it's a point-to-point communication method

type iii pcmcia: 10.5mm thick

type ii pcmcia: 5mm thick

type i pcmcia: 3.3mm thick

safer+: the secure and fast encryption routine (safer+) is the encryption method used by bluetooth
devices

power adapters: you can use an ac or dc power adapter for a laptop as long as its output matches the
specified voltage and amperage.

devices can be enabled or disabled via the control panel or the bios

isa: antiquated computer expansion bus for video

pci: not so hot expansion bus for video

pcie: quick, good expansion bus for video

ram: all ram is solid state

modern bios: auto-conifig for cpu and ram

berg connector: this is the power connector for the floppy drive. it must be inserted correctly or the drive
will be damaged.

low-level formatting: this process ties ata (ide) drives to their controllers. manufacturers do this for ata
(ide) drives, but you must do yourself for scsi drives.

high-level formatting: partitioning and high-level formatting are based on the operating system being
used.

pincushion: a configuration option for computer video

contrast: a configuration option for computer video

trapezoid: a configuration option for computer video

standard input devices: i.e., human interface devices, such as keyboards and mice.

the fan always blows down: this is to push the heat out through the fins of the heat sink.

irq: interrupt request lines

phantom problems: open the cover, clean the inside of the computer, and reseat all cards adn chips.

class a extinguisher: wood & paper fires

class abc: will work fine for wood & paper fires

electricalcontacts: denatured isopropyl alcohol and a cotton swab should be used to clean electrical
contacts. water should never touch electrical components.

high-voltage probe: instrument designed to properly release electricity from high-voltage components -
e.g., those included in the back of crt computer monitors.

mtsd: material safety data sheet:

generally avoid using magnetic tipped tools within a computer's case.

3 most common screw drivers: flat, phillips and torx.
accidents and near accidents should always be reported.

threshold above which humans feel a shock: 3,000 volts

osha: doesn't mandate rules on safety training

alkaline batteries should always be recycled. older alkaline batteries contain lead, which is an
environmental hazard.

nickel metal hydride batteries: not, not considered environmental hazards.

ieee 802.3: csma/cd lan:

transport layer: it is the responsibility of the transport layer to signal 'all clear' by making sure are error-
free. it also controls the data flow and troubleshoots any prob's with tx

physical layer: is amongst other things, responsible for formatting the final packet of data for transmission
over a physical medium.

physical star topology: the hub provides the central connecting device in a star topology.

csma/ca: this access method uses smart interface cards to detect traffic before they try to send data.
carrier sense multiple access with collision avoidance. it is slightly more sophisticated than csma/cd. it
transmits a very small packet on the network. if it is successful, then the nic begins transmission of the
actual data.

csma/cd: the ieee 802.3 specification satates that csma/cd is the standard access method for ethernet
networks.

ep print process: cleaning, charging, writing, developing, tranferring, fusing

page-description language:

basis weight: quantity, type and size: 500, bond, 17x22

multipart forms: impact printers only can do this.

led page printers:

ep process laser printers:

page printer: a page printer is a type of computer printer that prints a page at a time. common types of
page printers are the laser printer and the inkjet printer.

printer controller assembly: the pritner controller assembly is responsible for the print job for the types of
printer being used.

page-description languate: postscript language & pcl

hal.dll: file specifically responsible for enabling communication between the system hardware and the
operating system. hal, or the hardware abstraction layer, is the translater between the hardware and the
operating system.

ASR: automated system recovery: it makes a backup of your system partition and creates a recovery disk.

neither autoexec.bat nor config.sys is involved in the windows xp/2000 boot process

sysedit, msconfig, defrag: all utilities used to troubleshoot or modify windows

replacing system files: attrib: in order to delete and/or replace system files, you must use the attrib
command to remove the hidden, system, and read-only attributes on the file.

autoexec.bat: windows file-related problems do not include autoexec.bat issues. autoexec.bat is a dos
batch file that is automatically executed during bootup if the file is present.
thrashing: means an extremely slow system speed and a disk that is constantly being accessed. this
condition occurs because windows doesn't have enough memory to contain all the programs that are
running.

boot.ini: file that frequently is the cause of faulty system boot due to corrupted system files.

*general protection fault: the most common error in windows. it happens when a program accesses
memory that another program is usingor when a program accesses a memory address that doesn't exist.
generally, gpf's are the result of sloppy programming; they can often be fixed by clearing the memory with
a reboot.

*illegal operation: is the windows error message displayed when a program is forced to quit because it did
something windows didn't like. the error's details include which module experienced the problem, the
memory location being accessed at the time, and the registers and flags of the processor at the time of the
error.

ntdetect.com: the information detected by ntdecect.com is used to create dynamic hardware information
in the registry.

registry problem/registry error correction: last known good configuration enables you to restore the system
to a prior, functional state if a change was made to the registry that turned out to be problematic.

windows update: windows update is a utility that is responsible for finding updates, patches, and service
packs, downloading them, and installing them on your computer.

system restore utility: windows xp automatically creates restore points, which are copies of your system
configuration. you can also create them manually through the system restore utility.

formatting: scans for bad spots, lays down magnetic tracks in concentric circles, splits tracks into pieces of
512 bytes called sectors and lastly creates a file allocation table that contains info about the location fo the
files.

*swap file: this is where idle pieces of programs are placed while the active pieces of the program are
placed into main memory.

*temporary files/temp files: look here -> sys control panel -> advanced dab -> environmental variables
button

*windows releases order: ...win 3, nt, 95, 98, 98se, 2k, me, xp, vista, win7

*requirements: win xp => hd space > 1.5GB

*partitioning & formatting: fdisk.exe & format.com, respectively.

*winnt.exe: from windows 9x -> windows 2k

*most common source of device problems: out-of-date hardware drivers

*add new hardware troubleshooting wizard: when plug and play doesn't work, users can use the win 2k &
win xp wizard to add new hardware and update drivers for existing hardware.

*win nt doesn't come with a version of either defrag or disk defrag. all succeeding win's versions do

*swap file: is a file used for virtual memory. it is where the information what was swapped from main
memory resides on the hard disk. it's also refereed to as a page file or paging file.

*where do you find the disk cache setting in win 2k & win xp? the settings for largesystemcache are
located in the windows registry.

*image of a computer: what utility do you use to create an image of a system if you are to use win 2k or
win xp? the sysprep utility comes with the 2 os's and is used to make an image of a computer. ghost is a
third-party utility made by norton.

*localis suspectus of temp files in windows: c:\temp, c:\windows\temp and c:\tmp.
*localis suspectus of other goodness: system control panel, click advanced tab, click environment variables
button.

*win xp: min processor required to run: 233MHz.

*virtual memory settings: system control panel -> performance tab

*win2k & winxp: 255 character max

*ps/2 mice: use irq 12

*ping utility: start by pinging local host, then ping a host on the same segment. if you get a response from
your machine and another local machine, the nic is functioning properly and the problem lies with the
network somewhere. then ping the near side of your router (gateway) and then the far side.

*power supply failure: this is a difficult problem to track down or deduce. its effects are hard to duplicate
and are intermittent - prob's can be inexplicable lockups, memory failures, keyboard errors.

*power supply testing with multi-meter: see 'a+_Supplemental_materials.pdf', pg. 4. test the voltages
being produced by the power supply. penetrateone of the red leads and then subsequently without
withdrawing the lead red probe, penetrate one of the black grounds. itshould read a quantity in agreement
with the associated legend. next penetrate the other red leads to test their voltages; do not withdraw the
ground probe from the sheath.

*dram: dynamic ram holds info for a short period of time and needs to be constantly refreshed to maintain
its memory.

*sram: static ram holds info until power is turned off and as a result is much faster (and more expensive)
than dram. for this reason, the majority of ram in a pc is dram.

*edo ram: legacy product.

*rdram: rambus dram. high-speed form of memory

*sdram: synchronous dram is a higher speed dram and is about 3x as fast as conventional memory.

*vram: video ram

*wram: windows ram. higher perf than vram bec it can address large blocks at once

*ide: integrated device electronics: is a general reference to a technology that allows mass storage devices
to be connected to a pc

*eide: enhanced ide allows for faster data throughput and larger drives than older ide

*ata: advanced technology attachment: interface for ide

*atapi: advanced technology attachmnet packet interface: interface for eide

*cmos: complimentary metal oxide semiconductor: works in tandem with the system bios. in fact, cmos is
where the user configurable settings are stored.

*plug and play: there exist the following: pnp bios, pnp os and pnp devices - non-pnp devices can be used
in a pnp environment, but they must be manually configured.

*isdn: requires a leased line: private ip addressing: see t1, t3, etc.

*scandisk: scandisk is a utility that can find different types of errors on hard disks and correct some of
them; lost clusters are an example. the program also scans the surface fo the hard disk (the disk platters)
for physical defects.

*xcopy: command to copy large amounts of data from one disk to another. xcopyhas many switches.
maybe as many as 18 or more.

*mscdex:
*edit.com: is a dos-based text editor that allows you to create, read and modify text documents, batch files
(.bat), initialization files (.ini) adn some .sys and .com files. it is invoked by typing edit from a command
prompt.

*wscript.exe: is a microsoft windows script host language-independent scripting host for activex scripting
engines.

*asd.exe: is the automatic skip driver agent, whick is a windows 98/me utility that identifies devices that
are causing a pc to hang during startup. using this this info, asd bypasses the problem devices by disabling
them the next time you restart the computer.

*safe mode: a state that can be invoked manually or automatically at times when drivers are installed
incorrectly. safe mode loads windows 9x/me/2000 with a minimal set of drivers, and bypasses the
commands found in autoexec.bat or config.sys.

*command.com: command.com is the command interpreter. if you have access to a boot disk you can
copy command.com from teh disk to the hard drive (making sure the boot disk is the same os version).

*himem.sys: is an extended memory manager. if this file is corrupt, dos or windows can't access anything
over 1mb of memory.

*numeric error codes that occur during the post:

100 range- system board errors

200 range- ram errors

300 range- keyboard errors

500 range- video controller errors

6000 range- scsi or network card errors

7300 range- floppy drive errors

*winnt32.exe /ox: create boot disks

*autostart a program: place a shortcut to the desired application in the startup folder

*recovery console: you can install Recovery Console as a boot option so it’s always available. To install the
Recovery Console on your system, get to a command prompt and type:

drive :\i386\winnt32.exe /cmdcons

(drive = the location of your Windows 2000 installation CD)

This will load the Recovery Console and make it available at system boot. Using Recovery Console enables
you to recover from the following problems:

*windows protection error: a windows protection error occurs when the system tries to load or unload a
virtual device driver.

*win /b: crate a boot log that will capture drivers loaded up to fail and presumably capture the name of the
offending driver immediately prior to failure.

*systematic troubleshooting solution: You can also boot into safe mode and from there type msconfig to
load the configuration utility. From there you can uncheck items in the system.ini, win.ini autoexec.bat and
config.sys files and reboot. Each time you
reboot, add items back in one at a time until you discover the one causing the error. From there either
permanently remove the item/driver or reinstall.

*vxd's: virtual device drivers:

*illegal operation errors: occurs when an application does something the cpu doesn't know how to interpret
or process.

*ipx/spx: internetwork packet exchange/sequenced packet exchange. this is a networking protocol used in
novell netware networks. microsoft has a compatible protocol called nwlink.

*netbui: netbios extended user interface-is a fast connectionless protocol taht is non-routable and used
typically in small peer-to-peer networks. its low overhead and minimal config makes it well suited to small,
single-segmented networks.

*freezing on an irregular basis and no new software or drivers have been installed: run the windows
memory diagnostic tool

*startup repair should be used if a computer running windows vista cannot complete the boot process.

Windows Restore - System Restore vs. Windows Complete PC Restore

*system restore should be used to return to an existing restore point.

*windows complete pc restore is to restore a pc fully, including applications and data.

*Windows Vista – Windows Firewall: Enable Block All Connections will block all inbound connections and still
allow Internet use, as Internet outbound requests don’t qualify as inbound connections because the
communication was initiated from the inside.

*Pointer Options: Tablet PC: Pointer Options are used to vary the appearance of the pen on the display.

*Gestures are used when entering special characters such as Tab and Enter using the character or writing
pads.

*Windows Vista: Aero theme: Changing the theme Windows Vista will restore Windows Aero.

*Setting the theme to Windows Classic disables Windows Aero.

*Software Explorer: will tell you about which applications have been installed and their startup status, but
will not inform you about ActiveX controls.

*The Manage Add Ons function of Internet Explorer will tell you which ActiveX controls have been
downloaded and installed.

*Programs and Features will tell you which applications, but not which ActiveX controls, have been
installed.

*System Restore: This moves back to a prior point in time -> The installation of updates can sometimes
have unusual side effects. A new update might cause problems with an existing driver or hardware device.
The quickest way to resolve such problems is to perform a system restore, which returns the computer to
the state it was in prior to the installation of the update.

*Diagnose and Repair in Network and Sharing Center performs routines that assume the network has been
misconfigured. It doesn’t change the driver, change the adapter, etc.

*System Restore cannot be used to restore corrupted data.

*Startup Repair: only use Startup Repair if there exists a problem with the computer’s ability to boot.

*In a situation where both applications and user data have become corrupted and a system image backup
exists, you should use the Windows Complete PC Restore Option.

*Windows Firewall with Advanced Security: Rules: Exceptions cannot be used to block, only to allow. Rules,
which are an attribute of Windows Firewall with Advanced Security, can be used to allow or block.
*Custom view: a custom view can be configured to display only those messages in a folder that
havespecific properties, such as being flagged. When the view is applied, you only see those messages.
When the view is removed, you see all of the other messages located in the folder.

*Sorting: sorting arranges objects in a grouped arrangement for easy an organizational view, but the non-
desired objects are still visible. To allow one to see only what is desired, custom views should be used.

*ReadyBoost devices should have a minimum of 256MB storage, support the USB 2.0 specification, and
have a 2.5MB/sec throughput for 4KB random reads and 1.75MB/sec for 512KB random writes.

*Different Subnet: if a share isn’t listed when you search in the Connect To ANetwork whatever, it is likely
that the share is located on a separate subnet. It is possible to connect to a share on a different subnet
using the share’s IP address or fully qualified domain name (FQDN).

*Windows Meeting Space: You must not be logged into a network prior to joining the Windows meeting. It
is necessary to be signed into “People Near Me” touse Windows Meeting Space. You must actually
disconnect from the local Internet connection so you can join the ad-hoc wireless meeting.

*Investigate Software Explorer:

*Investigate The Reliability Monitor:

*Power Options Advanced Settings dialog: Configure Lid Close Action – So, shutting the lid will not turn the
computer off.

*DNS error check: If you are able to ping a host by IP address, but not by its FQDN, then there is a problem
with Domain Name System (DNS).

*Upgrading Windows XP to Vista: if there is a prohibitive problem, you can resort to the Roll Back option to
Windows XP. Until a successful login has occurred, this option is available. It is preferred to any other
measure in this case: that an integrated graphics adapter built into the laptop’s motherboard isn’t
supported by Vista.

*Restricted Sites zone: If an intranet server has been infected with a virus, you can add it to all Windows
Vista comptuers’ restricted sites zones to prevent access & virus propogation.

*If you manipulate the monitor settings and then cannot see anything in order to boot, you must boot off
the installation media and run Startup Repair.

*Dos Commands:

Bootcfg: rec console – boot.ini file utility

Whatever.exe: relaunch app – whichever application

Sfc.exe: system file checker

Sys a:: make “a:” bootable

Fdisk: fix master boot record – if infected with virus, for example.

Fdisk /mbr: replace mbr with backup copy

Smartdrv /c: forces smart drive to write out all cached data

Attrib c:\myfiles +a /s: archive directories and sub-directories

*Roll back to the system restore point generated prior to the update’s installation: This is what you should
do if after you apply a recent update, you reboot your computer you notice you are unable to access any
system resources.

*Restore Point: It is possible to return to a previous system state via Restore Point even by booting from
Installation Media.

*The Startup Repair function repairs startup files and resolves common startup problems.
*Presentation Settings: Enabling presentation settings stops the display of notifications, such as calendar
reminders and messages that appear through instant messaging programs. When enabled, Presentation
Settings ensure that the computer will not go into hibernation or sleep and the screen saver will not be
displayed. It is also possible to see to it that a special desktop background is displayed during
presentations rather than the one that is normally shown.

*Custom Search Provider: http://search.contoso.local/results.aspx?q=TEST

*Software Explorer: Software Explorer can be used to temporarily disable an application’s automatic startup.

*Programs and Features: this rather than Windows Update, is the Windows Vista feature that you use to remove the installed updates.
This is accomplished by uninstalling the update and might be necessary in the event that an installed update causes problems with
your computer.

*Tablet PC: The Target Specific Errors routine, available through the Handwriting Personalization dialog box, allows one to correct
specific recognition mistakes. This is a good option if the handwriting recognizer routinely recognizes most characters, but mistakes a
single character constantly.

*The Administrators group is allowed to make changes without entering credentials.

*Unscramble is used to undo Rot 13 encoding.

*Windows Vista Upgrade Advisor: won’t work with XP Pro 64-bit, Win 2k Pro 32-bit or Win Me.

*Windows Aero Theme: Access on/off via The Theme item in Personalization. It can be used to switch between Win Classic & Win
Aero.

*Add-On Manager: Can provide a report of all Internet Explorer add-ons that run without requiring permission as well as all add-ons
that have been installed or used by the Web browser.

*Set Up A Connection or Network: can be used to configure a new wireless router.

*People Near Me: You can configure People Near Me to limit from whom you receive invitations. The op’s are Trusted Contacts, Anyone
and No One.

*In the event you change the refresh rate and/or resolution in a way that results in the inability to see anything, you should boot into
safe mode to rectify the problem.

*Cookies: Internet Options dialog box: if set so that “all cookies are blocked,” IE will block all cookies regardless of source and existing
cookies stored on the computer cannot be read.

*The Problem Reports and Solutions feature provides you with information about any problems with your computer and possible
solutions.

*The Reliability Monitor can inform you that a crash has occurred and which software has caused the crash, it provides no information
on how to resolve the issue.

Tablet PC: PC Tablet: Pointer: Pen Entry: Handwriting Recognition: Input Device

*Pin Flicks enable shortcuts like cut and paste to be assigned to specific movements of the pen.

*Gestures are used on the Input panel to add special characters like Tab and Enter. They cannot be used to configure pen shortcuts
like cutting and pasting.

*Pointer options determine the visual feedback of the pen in a similar way to configuring mouse pointers and cannot be used to
configure pen shortcuts.

*Windows Vista Aero Graphics Card Properties Required to Run Aero: WDDM driver, Hardware Pixel Shader
2.0, DirectX 9 capable, 32-bits per pixel capacity, and an adequate amount of graphics memory.

*The amount of memory required on the graphics adapter depends on the resolution in which you want to run Aero. Running Windows
Aero at the lowest possible resolution requires 64 MB of graphics adapter memory.

*Any graphics adapter, whether it is PCI, PCIe, or AGP, will work with Windows Aero as long as it has the other required
characteristics.

*Web Restrictions: use this to put mischievous children on lockdown.

*Allow list: Re: Web Restrictions: Allows on to allow their kids to visit an approved Web site without
changing any of the blocking options, i.e., defaults & defined settings.
*Windows Firewall: Each network profile has a unique set of exceptions. An exception applied to one
network profile is not applied to other network profiles. Windows Firewall can be applied selectively to
interfaces, but Windows Firewall exceptions cannot be configured on a per-interface basis – they apply to
all interfaces for which the firewall is configured.

*Rules: only rules, not exceptions, can be used to block outbound traffic.

*Restricted Sites zone:

*User Account Control: Deny Elevation Requests – to lock block someone

*Admin Approval mode:

*sync partnerships:

*msd: diagnostics utility

*chkntfs:

*chkdsk:

*defrag:

*scandisk:

*scanreg:

*Computer Management Snapin Launcher:

*User Account Control: Administer Users

*ESRB: Entertainment Software Rating Board

*Cryptographic Operators:

*Backup Operators:

*Power Users:

*Internet zone Privacy slider:

*Protected mode:

*Pop-up Blocker:

*Phishing Filter:

*Manage Add Ons:

*Configure People Near Me:

*System Protection:

*Restore Previous Versions:

*Configure Windows Sidebar Properties:

*Remote Administration, Remote Assistance, Remote Desktop and Remote Service Management

*Windows Firewall Settings: Here you can make exceptions for applications & services you want to run.

*Windows Update Driver Settings dialog box:

*Secure Desktop: WTF?
*Windows Firewall: Web Server: lecturer offering students opp to download notes via his Windows Vista file
share, one must configure Win Firewall to allow exceptions to the World Wide Web Services (http), this is if
host doesn’t have Secure Sockets Layer (SSL) layer configured.

*The Display Settings: span display across both monitors: 1. Click Display 1; & 2. Select Extend The
Desktop Onto this Monitor check box.

*Pop-Up Blocker: Allow Exception: The Pop-up Blocker settings of IE include a configurable list of sites that
you can exempt from the application. Adding a site to the Trusted Sites zone does not allow pop-ups if
Pop-up Blocker is enabled.

*Which of the following can you accomplish directly in the Change Search Defaults dialog box? 1. Set a
default search provider; & 2. Remove a search provider.

*User Account Control prompt: Only members of the Administrators group can get a User Account Control
prompt.

*The Theme item in Personalization: this is where you go to switch between Windows Aero and Windows
Classic.

File Sharing – Share – UNC – shared folder – File and Printer Sharing

*Core Networkingexception: The Core Networking exception is required for general remote network
connectivity.

*File and Printer sharing: The File and Printer Sharing exception is required to allow remote clients to
access shared folders and printers on the local computer running Windows Vista.

*Administrators group: Only members of the Administrator’s group are able to elevate privileges without
providing credentials, and this is only the case if the local policy is configured in a specific way.

*The Power Users group is included in Windows Vista for backward-compatibility reasons.

*Intel Core Duo processor is a 32-bit processor: Only a 32-bit edition of Windows Vista can be installed on
this computer.
*Blocking outbound traffic: Port blocking: Firewall configuration: Only Windows Firewall with Advanced
Security can be configured to block outgoing traffic.

* Blocking outbound traffic: Port blocking: Firewall configuration: Basic Windows Firewall can only block or
allow inbound traffic.

*Windows Defender: WD is used to block spyware and does not block network traffic.

*Cookie management: Internet zone Privacy slider

*Task Scheduler backup limitations: Automated backups can only back up personal data. This includes
Internet Windows Contacts data, Windows Mail data and Microsoft Internet Explorer bookmarks. Regarding
Automated backups, system files and application files are not able to be backed up via automated
backups.

*Windows Easy Transfer cable:

*USB TV Tuner:

*Red network X’d Icon in Task Bar: no connectivity at all; neither wired or wireless.

*Yellow warning Network System icon: may indicate more, but can indicate ip conflict.

*published calendar: publishing calendar off of a share: coworkers will subscribe: make sure that changes
are being published and poster’s computer and that subscriptions settings on her coworker’s computers is
correct.

*Restore Hidden Updates:

*Windows Vista Upgrade Advisor: The Windows Vista Upgrade Advisor will only run on 32-bit editions of
Windows XP and Windows Vista. This means that it will not run on Windows XP Pro 64-bit edition, Win
2000 Pro 32-bit or Windows Me.

*Scopes: Windows Firewall: Scopes can be applied to single IP addresses, IP address ranges, any
computers and the local subnet. However, it is not possible to apply a scope to a domain name suffix
using Windows Firewall.

*Windows Meeting Space: There is no way to forcibly eject a disruptive @#$!. One must close and re-send
all invites excluding on for the @#$!.

*Programs and Features: It is here you can uninstall a Windows Update, not through Windows Update.

*Target Specific Errors routine: Handwriting recognition for Tablet PC’s - > use to target little oddities.

*WDDM: Even if the hardware of a graphics adapter is compliant, the graphics adapter needs to have a
WDDM driver installed before it can be used to display the Windows Aero interface.

*Windows Defender: It is possible to scan only CD-ROM, network share and USB hard disk drive for
spyware.

*Xbox 360: Windows Media Center extender: Set this up to transmit captured data over the Internet to an
Xbox 360 located a bit away so that you can use it as a transceiver to play captured data on a big-screen
TV attached to the Xbox 360.

*Windows Vista Windows Genuine Advantage: Must have 2 things: 1. Active Internet connection; & 2.
Perform Windows Product Activation.

* Group Policy settings -By default, members of the Administrators group can click through User Account
Control dialog boxes and standard users must provide credentials. It is possible to change this through
Group Policy settings.

*Subnet mask: static network IP address: Default gateway: This is possible: default gateway:
192.168.23.100; static ip: 192.168.23.47; subnet mask: 255.255.255.0.
*System Restore: Advanced Restore: use advanced restore to restore non-native files on a computer on
which they weren’t created and on a computer on which they never existed by using backup data created
on a second & different computer.

*All Control Panel Items: Everything

*Default Program Associations: Control Panel > All Control Panel Items > Default Programs

*nbtstat –a computer-name

*route PRINT: TABLE

*arp –a 10.40.2.21

*format drive: control panel > computer management > Storage > Disk Management

*format drive: above or - > control panel > all control panel items > admin istrative tools > computer
management > storage > disk management

*'traceroute -m 30 -q 3 -f 3 76.174.115.47'

*User Account Control: change settings here to implement strictness regarding alerts and permissions
about new applications and their allowance – regarding the suspect program being added to change
system settings, configuration, etc.

*ipconfig /flushdns

*ren temp files

*fdisk: command-line partition utility

*com2: address i/o: 02F8-02ff

*tracert:

*nslookup:

*ntbackup: manage dns configuration

*rd dir1: remove directory, directory 1

*File Settings and Transfer Wizard:

*Windows Easy Transfer:

*User State Migration Tool:

*You want to record information such as the number of paging operations carried out per second and the percentage of available
processor time used when a computer is carrying out.

*Windows Anytime Upgrade:

*Services:

*Component Services:

*Heuristics:

*ipconfig /renew

*shadow copies: previous versions of files

*Mobile Device Center: Bluetooth modem via cellular phone: config a partnership via Windows Mobile Device Center

*Trusted Sites:”protected mode,” one of a few security zone classifications, is not enabled by default in the local intranet.

*Keep setting: a Media Center recording default
*Virtual Memory dialog box: another route: from Performance Information and Tools dialog box see Advanced Tools

*Create a Standard User Account: Local Users And Groups MMC snap-in.

*Content Advisor: you can configure this to allow access to sites that have no content rating

*Content Advisor: Generally parental controls

*Plug-and-play hardware: Non-plug and play hardware needs to be installed by using the Add Legacy Hardware command in the
Device Manager.

*”protected mode” is disabled for Trusted Sites.

*Media Center recording defaults: automatically eliminating the movies one has watched

*SideShow: A device that can access one’s

*Reliability Monitor: Re the appearance of inexplicable system failures can be zeroed in on by looking on the Reliability Monitor for a
sudden drop off.

*Software Explorer: Startup Programs, Currently Running Programs, Windows Sockets (Winsock) Service Providers, Network-
Connected Programs

*Windows Firewall: These profiles are available for configuration: 1. Private; 2. Public; & 3. Domain.

*Public Profile: Windows Firewall: The Public Profile is gen more restrictive than the other 2 and is intended for use in a user’s non-
network environment when he is not a member of the Active Directory domain.

*Domain Profile: Windows Firewall: The Domain Profile is used when a computer is a part of a network and also a domain member.

*Away Mode: Media Center Extender: The Media Center Extender can penetrate the Media Center for data even if the Media Center is
shut down completely at the time of the distant Media Center Extender requests the data.

*Z-shaped scratch-out gesture: Input Panel options: selecting or extablishing this option will restrict scratch-out gestures to only the z-
scratch out – i.e., eliminate all others.

*The Windows Vista Upgrade Advisor runs on all versions of Windows XP and Vista.

*Local Users And Groups MMC snap-in: New User: here you can create owned accounts in that you can make users create or change
the password you initially provide them with.

*User Account Control: Virtualize File And Registry Write Failures To Per-User Locations: This prevents legacy files that attempt to write
to protected parts of the registry or file system from running.

*Advanced Power Settings: High Performance plan: Editing the Advanced Power Settings of the current plan allows you to modify
whether a password is required when the computer is woken up based upon ac or dc, i.e., wall or battery power.

*System Recovery Options: Startup Repair: Startup Repair should be your first port of call with any startup problem encountered by a
computer running Windows Vista.

*Gadget Gallery: Windows Sidebar: If the gadgets aren’t removed from the Gadget Gallery, you can drag and drop them back off at
the Windows Sidebar

*Problem Reports and Solutions: System and Maintenance: You can check here intermediately for solutions to problems.

*Windows Aero: Circumnavigation to restore Aero: The only way another standard user can disable the Aerotheme is by forcibly
changing the number of colors displayed. The user who wants to reverse this can reverse the colors shown to 32-bit.

*UAC: User Access Control: This is Vista and after: It by default requires admin users to acknowledge by clicking ok at minimum to
acknowledge allowance of admin options, install, configuration, deletion, etc. It is here that you impose restrictions and rules on
actions. This setting causes administrator accounts to run continuously with elevated privileges. Standard accounts cannot supply
administrator permissions to run administrator tasks. This is legacy Windows XP mode, and UAC is disabled.

*Microsoft Messenger: From here you can transmit Remote Assistance requests.

*Windows Problem Reporting and Solutions: Admin can impose or chose “All Users …On.”

*Vista minimum speed processor: 800MHz

*LCD screens should always be set to their native resolutions. If an LCD screen is set to another setting, it will appear blocky.

*Windows Firewall: Limitation: It can edit only the currently active network profile when editing.

*You need to run the Program Compatibility Wizard and select the Run This Program As An Administrator check box.
*Internet Information Server: ? Can you use this to penetrate a firewall?

*Terminal Gateway Services: THIS PROVIDES AN ALTERNATIVE TO USING VPN SOFTWARE -

*Windows Mobility Center: configure slate mode vs laptop mode; portrait vs landscape

*Color Management Utility:

*User Access Control:

*Handwriting Personalization:

*Target Specific Errors in Handwriting Personalization: target errors

*Parental Controls: Application Restrictions:

*Fax accounts: fax accounts allow you to shift between using a built-in fax modem and a fax server on the network.

*Presentation Settings dialog box: Turn off system notifications, change screen background, access a list of connected displays and
set the speaker vol

*Ask Me Later: Clicking the Ask Me Later allows you to configure Windows Vista to use a local update server rather than having the
computer automatically contact the Microsoft Update servers on the Internet.

*Parental Controls: Control Panel: 1. Set Up Parental Controls for any User; & 2. Add or Remove User Accounts.

*Windows Firewall: Export Policy: Before making changes to the Windows Firewall Policy, you should export the current policy so that
you can import it later if you @#$%@ up.

*Windows Meeting Space meeting:

*Windows Anytime Upgrade: prior to running WAU, you must activate your current edition of Windows Vista

*Windows Vista Upgrade Advisor: runs on all 32-bit versions of Windows XP & Vista

*Trusted Sites: protected mode is not enabled on these sites by default.

*Aggregator functions: auto-fetch, offline presense, grouping and organization

*Elevated Privileges: Updates: Which updates can be installed without requiring elevated privileges. They can also be installed
automatically even Important and Recommended.

*You need to run the Program Compatibility Wizard and select the Run This Program As An Administrator check box.

*Create a View: Creating views allows one to distinguish between email from multiple accounts

*Recommended Updates: Install Updates Automatically: Recommended Updates are the only significant class of updates that can be
activated or deactivated to update if Windows is set to Audo-Update.

*Windows Mobility Center: See here . . .

*Windows Vista Minimum RAM requirement: 512MB

*Public Folder Sharing: Enabling Public Folder Sharing allows the user to share files without requiring administrator intervention.
Enabling Public Folder Sharing allows the user to share files without requiring administrator intervention. Enabling Password Protected
Sharing ensures that only users who have accounts on the computer can access the files. Enabling Network Discovery enables the
user to access her files from another workstation. The user will not use the file sharing method because this requires administrator
intervention, so in this scenario it does not matter whether this setting is enabled or disabled. However, it is good practice to disable
any feature that is not used.

*Note the difference between “file” sharing and “folder” sharing

*UAC: configure UAC settings: Expand Local Policies, and select Security Options.

*Opacity Settings: Configure each gadget’s opacity settings. This is an individual thing baby.

*Restore Plan Defaults: Create a power plan: Creating a custom power plan ensures that if you revert to default by a slip of the
mouse, your settings won’t revert to anything but what they are – hence, no loss. If you adjust a pre-existing setting and hit “Restore
Plan Defaults,” you will wind up with a severe reversion.

* The Target Specific Recognition Errors function

*System Restore is performed via Restore Points: System restore points are automatically created whenever a new application or
device driver software is installed. This means that you can return the computer to the state it was in prior to installing the
application by using the restore point taken at that point in time.
*Parental Controls: One setting is Select All. Clear the programs you want to block.

*UAC dialog box: is by default set to Secure Desktop: In a Microsoft Question, the user who wanted to capture a screenshot should
have disabled Secure Desktop in order to allow image data to be captured to the clipboard so that it can be saved in Microsoft Paint.

*Remote Assistance: Remote Assistance connections are not possible with the Remote Assistance panel closed.

*Calendar Sharing: This consists of at least 2 steps: 1. Creating; & 2. Publishing.

*UAC: What setting disables UAC: User Account Control: Run All Administrators in Admin Approval Mode is Disabled

*Receiving Faxes on Vista: You must do a minimum of 2 things: 1. Config the send/receive options to allow the device to receive faxes;
2. Config a Fax Account

*ReadyBoost: Microsoft suggests using a flash memory device that has a capacity equal to 1x to 3x the size of the machine’s RAM.

*Application’s Compatibility with Vista: Microsoft suggests two main steps: 1. Check with the prog’s vendors; & 2. Run the Windows V
upgrade Advisor: it maintains a list of prog’s with known compatibility issues.

*Parental Controls: High restriction level: this levl ermits children only to access websites approved for children.

*UAC: You just installed Vista Ultimate on a computer that is part of a workgroup: These settings are enabled by default: 1. Only
Elevate UIAccess Applications That are Installed in Secure Locations; 2. Run All Administrators in Admin Approval Mode; 3. Virtualize
File and Registry Write Failures to Per-User Locations; & 4. Switch to the Secure Desktop when Prompting for Elevation.

*Windows Meeting Space meeting: Ad-hoc Wireless Networking: If you want to create a wireless Ad-hoc network and don’t have a pre-
existing, functional network in place and only have a few laptops or maybe desktops, you must have IPv6 enabled. This is the case
whether one is attempting to establish a Windows Meeting Space via wired or wireless connections.

*Reliability and Performance Monitor: One can use this utility to establish a baseline from which to compare seemingly abnormal
behavior in search for problems: In Control Panel, select System And Maintenance. Click Performance Information And Tools. Click
Advanced Tools. Select Open Reliability And Performance Monitor.

*Sync Partnership: resort to this to sync certain spec’s amongst two devices: for example, a specific folder from your desktop to your
laptop.

*Windows Vista Home Premium: This OS doesn’t support offline file synchronization.

*User State Migration Tool: Only the User State Migration Tool is able to migrate both user settings and data from a computer running
Win 2k Pro to Windows Vista.

*Native Resolution: LCD: Blurry & Blocky => monitor is not set to its native resolution.

*Restricted Sites zone: Sites containing suspect contenct(such as ActiveX controls and certain utilities) can be added to the Restricted
Sites zone and this is done to impose strict rules on permissions extended to the site in question. Users can still visit sites in the
Restricted Sites zone, however these users cannot download anything even fonts: don’t misconstrue this to mean they cannot
visually see content the site contains displayed in their browser on their computer.

*Windows Meeting Space meetings: 4 users. A saves first. Then B saves and so on. Later, users will see only the additional work done
by user A because only the first saving user’s additions or changes are “replicated” to the document in question.

*User State Migration Tool: This is “the only utility that “can take user data & settings from a machine running Vista to an XP machine

*Add Legacy Hardware: Device Manager: to install non-plug and play hardware. For example, a non-plug and play PCI card.

*Severe alert items: Windows Defender: this is the only alert level for which users cannot specify a response to take due to the alert
at hand.

*Negative caching: Internet Explorer cannot display a webpage: These are actions Microsoft suggests taking in response to this
dilemma: 1. Wait for a while and try again; 2. Reboot the computer; 3. Access the website from another computer; & 4. Open the
Command Prompt console by right-clicking the item in the Accessories menu and selecting Run AsAdministrator. Enter ipconfig
/flushdns. Refresh the browser.

The computer’s DNS Resolver cache has stored the information that the website URL cannot resolve. Rebooting the
computer clears the

cache. Also, DNS Resolver cache is periodically cleared and so the negative cache will be discarded in time. Finally, Run As
Administrator –

ipconfig /flushdns clears the DNS cache.

*Windows Device Drivers, New: Find new Windows produced drivers: 1. Windows Update; & 2. Device Manager: from here, you would
check by right-clicking a specific device and selecting Update Driver.
*Remote Assistance: Procedures that must be followed for this to work: 1. Computer and firewall must be config to allow inbound
Remote Asistance connections; 2. Penetrated computer must be on and have its Remote Assistance Panel open.

*footer specification box: &bPage &p of &P&b: this will show, as a general example, “Page 6 of 10.”

*Roll back the device driver:

*Content Advisor:

*In Control Panel, select System And Maintenance. Click Performance Information And Tools. Click Advanced Tools. Select View
Performance Details In Event Log.

*In Control Panel, select System And Maintenance. Click Performance Information And Tools. Click Advanced Tools. Select Open
Reliability And Performance Monitor.

*Game Overrides:

*Game Restrictions:

*Problem Reports and Solutions & Reliability Monitor: Diagnostics when clueless

*Command Prompt: Command Prompt as Administrator: Accessories -> Command Prompt -> Right-Click & Select Run as
Administrator

*ipconfig /flushdns: Must be run from Command Prompt as Admin: See above

*whoami

*Windows Mobile Partnership through WMDC.

*Orientation Calibration: Configure this for stylus mismatch in.

*Complex Activation & Licensing Requirements: Sometimes an Upgrade rather than a migration is the answer.

*Protected Mode: Local Intranet: For additional internal network security to protect your computer from internal penetration, reverse
the default to not include the Local Intranet in the protected mode.

*Logs: See at Event Viewer: 1. mmc.exe; 2. Eventvwr.msc; &

*Graphics Adapter Requirements to run Vista:

*Tablet PC running Vista: how do you create shortcuts.

*Which of the following audio data formats do not support the Copy Protect Music option? (Choose all that apply.)

*Ian's computer running Windows Vista has System Protection enabled for all volumes on Ian's computer.

*Restore Previous Versions

*Spanned Display:

*Block All Incoming Connections: It appears this overrides any specified exceptions: It is the “big” lockdown.

*Presentation Settings: Configure them so that there is no interference or future configuration changes for supported users; they just
switch into Presentation Mode when the “Time is Right.”

*Web Restrictions: Block Web Content Automatically setting

*Remote Desktop Users: They must be named in order to connect.

*Away Mode: Windows Vista Media Center Extender: Windows Media Center: you can wake up the repository with the “Extender” with
this setting enabled on the repository.

*Parental Controls: Configure Game Restrictions to block Drug Referenc

*Logging: Email: Attach Task to this Event to the event in question to implement a defined response to the event, such as emailing
yourself.

*WDDM: Windows Display Driver Model

*Restore categories: Restore Files, Advanced Restore, System Restore complete PC restore.

*Roll back Vista install: if there materializes some prohibitive component or some other mishap during a Vista install, one can reboot
the computer and at the boot menu there is an option to roll back to Windows XP.
*Windows Defender: Windows Defender can detect spyware in hardware device drivers!

*Change Search Defaults:

*Use the Services and Drivers real-time protection option.

*Reliability Monitor: Check here for system failures.

*Microsoft Windows Media Player Library: share music: must do prior configurations -> 1. Core Networking Exception; & 2. Firewall
configuration.

*3D Flip: procedure to check to see whether Windows Aero is functioning

*Modify particular Aero features: System Properties -> Advanced Tab -> Performance and modify the original settings of the Visual
Effects tab

*Windows Vista Fax and Scan:

*Windows Mobility Center: Windows Vista Tablet PC

*Automatic Driver Update: Change the Windows Update driver setting to Check For Drivers Automatically.

*Resource Monitor:

*1. mmc.exe; 2. Eventvwr.msc; 3. Perfmon.exe (performance monitor); 4. Perfmon.exe /res (resource monitor)

*Device Manager: use Device Manager to Install drivers, update drivers, and troubleshoot drivers but use Windows Update to
download current drivers.

*Program Compatibility Wizard: helps get non-compatible app’s working with a new system.

*Reliability Monitor:

*Plug-ins: mmc:

*User Account Control: Use Local Security Policies to Configure User Account Control:

*Internet Security Zones: Allowed, Blocked, Restricted,

*Advanced Firewall: Windows Firewall: Ensure that Windows Firewall is active on all interfaces

*nslookup: networking commands:

*Vista display to span monitors:

*Crossover cable: you can use a crossover cable to coattail your neighbors’

*Attach Task to This Event: Security log:

*Firewall Exceptions: The professor lecturer example – he wanted to allow students to download lecture notes from his personal
laptop running a web server. The professor would configure exceptions for FTP server and “core networking,” whatever that is?!

*Public, Private and Work Network profiles each have a corresponding Public, Private and Work firewall profile

*Remote Assistance: configure “Remote Assistance”

*Encoding:

*Heuristics: activate this on your computer

*Web server feature:

*Click Show Me All The Shared Network Folders On This Computer in Network and Sharing Center.

*Advanced Restore:

*ipconfig /release: you will now be unable to connect to anything and must issue this command: ipconfig /renew

*Restore hidden updates: how?

*Windows Firewall: Worms: Windows Firewall protects against worms.

*default feed settings determine whether or not an audible alert is triggered when ie detects a new feed.
*Run As Administrator: This option exists to solve issues such as installation failure due to no UAC requests made by the offending
application, which will frequently be programs coded for older OS’s – such as Win 2k. This is not a “Compatibility” issue it is a UAC
issue and the solution therefore not solved by using the “compatibility mode” issue. This problem will also not be solved by using the
Admin account created when Vista was installed because it is subject to the same UAC constraints.

*Customize: Click “Customize” in Network and Sharing Center to rectify a misclassified location: such as, public rather than
private. Note: Manage Network Connections in Network and Sharing Center allows you to change adapter properties, not
alter network designations!

*Vista: Items in Control Panel that require privilege elevation are indicated with a shield icon.

*Windows Anytime Upgrade: Windows Aero-compatible graphics adapter will improve your user’s experience, although it is not
necessary to perform the upgrade from one version of Vista to a version with more capabilities – Note: Anytime Upgrade implies in
and of itself that Vista pre-exists on the machine in question, hence it has to be Vista capable regardless of whether or not it is Aero
capable.

*Automatic Learning: Switching off Automatic Learning deletes all existing handwriting recognition data. Rebooting and then turning
Automatic Learning back on will allow the Tablet PC to start learning afresh the new user’s handwriting.

*Handwriting Recognition problems: If a new user assumes ownership of a new tablet, the following methods will not resolve the
computer’s inability to recognize the new user’s handwriting: 1. Teach the Recognizer Your Handwriting Style routine; 2. Calibrate the
pen; & 3. Target Specific Recognition Errors routine on the new Tablet PC. The solution is to Switch off Automatic Learning, reboot the
computer, and then turn Automatic learning back on.

*Windows Mobile powered phone: A Windows Mobile powered phone can be partnered with a maximum of two different computers.

*VPN: VPN is already configured, how do you initiate connection via the VPN in question? In at minimum either of the following 2
methods: 1. Use Connect to a Network and Sharing Center; & 2. Use Manage Network Connections in Network and Sharing Center.

*Windows Firewall with Advanced Security: Only Windows Firewall with Advanced Security allows the importation and/or exportation of
Firewall policy.

*Remote Desktop timeout: When a new user requests a session, the current user has 30 seconds to respond or s/he is booted from
their session against their will. The new user than has the option of initiating a connection.

*Trusted Sites zone: If you notice that in your IE browser window that some sites show “not protected,” then you can deduce that that
site must be listed in the Trusted Sites zone.

*Trusted Sites zone: sites added here are not subject to “protected mode” settings

*Fax Settings: allow one to select which fax device will be used if multiple devices exist.

*Fax Accounts Settings: allow one to select between a local fax modem and fax servers on the network.

*Firewall Rules: if a rule’s scope, protocol and port numbers are correct and you are having problems succeeding with your objective
check if the rule is set to permit or deny.

*Pen Flicks: enable shortcuts like cut and paste to be assigned to specific movements of the pen.

*Pen Gestures: are used on the input panel to add special characters like Tab and Enter.

*Share a file full of files with everyone on your local network: How do you carry this out? 1. Copy the folder you wish to share to the
Public folder; & 2. Turn on Public Folder Sharing in Network and Sharing Center.

*Public Folder Sharing: When you enable Public Folder Sharing, File Sharing and Network Discovery are automatically enabled.

*Allow and Block lists: If the Block Some Websites or Content option is not set, the Allow and Block lists will not be used.

*Windows Firewall exception: scopes: custom exceptions can be applied to an IP address range, computers (any), a local subnet and
finally a single IP address.

*Windows Firewall exception: scopes: It is not possible to apply a scope to a domain name suffix using Windows Firewall.

*the yellow warning Network System icon: actually both of these cases occur when your computer has only 1 network interface. 1.
Incorrect password provided when attempting to join a wireless network; & 2. An IP address conflict between your computer and
another computer (this only occurs in the event that your machine has a single network interface).

*The Local Only Network System Icon will be displayed when your DNS servers are misconfigured.

*The Local Only Network System Icon will be displayed also when your WINS server address is incorrectly configured.

*The Local Only Network System Icon will be displayed yet again when one has an incorrectly configured default gateway.
*What info must you have to configure an exception in Windows Firewall? It is necessary to know either the program’s name or the
protocol and port that the program uses.

*It is necessary to know the IP address of the people who will connect?!

*Configure Sharing within Windows Media Player: this allows others with Media Player installed to share the offering computers
program.

*Disable Secure Desktop:

*What protocols can be used by Windows Mail to retrieve e-mail from a mail server? POP3 & IMAP4.

*Updates; after applying a recent update, you reboot and are unable to access any network resources – what do you do? Roll back to
the system restore point gen prior to update.

*Intel Core Duo is a 32-bit processor and it cannot run 64-bit Vista.

*Window Sideshow Gadgets: they are displayed on an auxiliary display.

*If you want to run a web server without SSL, what exceptions must be made to Windows Firewall? World Wide Web services (HTTP)
and Core Networking Exception.

*If you want to run a web server without SSL, what exceptions must be made to Windows Firewall? World Wide Web services (HTTP)
and Core Networking Exception. NOTE: SSL is required only if you want to use secure World Wide Web services.

*Safe List Only: can be used to restrict permissible email senders to your machine; usually set up for older people who can’t
understand what spam is.

*Calendar Subscriptions: Read only permission is the minimum requirement. If someone is already “subscribed,” then you can
conclude that the correct permissions are set.

*Red x: Disconnected: Either a cable is unplugged or there is no wireless access point, which is the ethereal equivalent

*Yellow warning network system icon: one condition that will cause this to show up is if the machine in question is able to make
contact with the network, but the machine cannot obtain a DHCP IP address.

*Local Only Network System icon: this appears as two computers only, no globe, no red x and no yellow triangle of death.

*Remote Assistance: Stop Sharing: Clicking the Stop Sharing only prevents the “Assistor” from further interaction with the desktop

*Remote Assistance: Disconnect icon: this disconnects the remote “Assistor.”

*Remote Assistance: The “Assistor” will be unable to see the desktop in question if the Pause icon is clicked.

*Remote Assistance: Clicking the Stop Sharing icon does not stop any dialog that is in progress through the chat utility.

*User Account Control policy settings: members of the Administrators group can click through User Account Control dialog boxes and
standard users must provide credentials. It is possible to change this through Group Policy Settings.

*Group Policy Settings:

*Power Users: in previous versions of Microsoft Windows, Power Users had limited administrator ability, in Windows Vista if an account
is not in the Administrators local group it is a standard user.

*Windows Firewall with Advanced Security: A can’t configure a rule to allow B to FTP into his machine. He must get the spec’s right
plus do the following: 1. Change the rule from outbound to inbound; & 2. Change the rule action from block to allow.

*Windows Sidebar properties: Ian wants to see his stock gadgets at all times. Therefore he has no alternative but to configure
Windows Sidebar properties so that the Windows Sidebar is always displayed on top of other panes.

*Gadget Opacity: Windows Sidebar: Gadget Opacity is only relevant when Windows Sidebar is visible.

*Windows Sideshow: Windows Sideshow also has gadgets but these are not displayed on Windows Sidebar.

*Public Folder Sharing: Network and Sharing Center: Sharing and Discovery: if you enable Public Folder Sharing and set it up so that
anyone can access files in question, what processes are activated? 1. Network Discovery; & 2. File Sharing. Test material says that
these two are activated auto if Public Folder Sharing is enabled.

*Password Protected Sharing: This is not automatically enabled and must be configured manually.

*Media Sharing: this too must be manually configured.

*You want to share some files over the network. You have configured a shared folder and appropriate
permissions. Which exceptions should you configure? 1. File and Printer Sharing; & 2. Core Networking.
*Core Networking: The Core Networking exception is required for general remote network connectivity.

*Program Installation: Program Installation Troubleshooting: Occassionallyone encounters a problem with policy settings. One policy
that can be problematic is “the local policy that only elevates executables that are signed and validated. NOTE: This is a seeming
oddity but there is a clear indication of the problem if some applications can install and others can’t! The ones that can’t are
requesting Admin authority and it would be declined with this setting set to on. Unsigned software can be stopped by disallowing
elevation of privileges for unsigned software.

*If there are multiple interfaces, Windows Vista considers all classified identically with the least secure network interface location.

*Window Aero: Personalization: Theme: It is here that you can return your computer to the Aero theme if it

*Windows key + Spacebar: show desktop

*Windows Sidebar: It is not possible to adjust the size of Windows Sidebar:

*editing gadget properties: this can only be done if the gadget is located on the desktop.

*Recovery Console: this is antiquated: It existed in Win 2k, Win XP and Win Server 2003. In Vista there is “System Recovery Options”

*Windows Vista does not allow simultaneous connections to a computer.

*Windows Firewall: To which interfaces can Windows Firewall be applied? 1. Local area network; 2. Bluetooth; & 3. Mobile device.

*User State Migration Tool 3.0: This tool is used to transfer userdata and settings from XP to Vista and the tool can be used with a
script that allows the automation of the migration of user data and settings from Win XP to Vista. Windows Easy Transfer would
require that each step be performed manually.

*File Settings and Transfer Wizard was a Win XP tool that performed similar functions to Windows Easy Transfer. This cannot be used
to transfer data to Vista.

*Change Search Defaults: It is only possible to remove a provider or set the default search provider in the Change Search Defaults
dialog box.

*Change Search Defaults: new providers must be added through the Add Provider web pages.

*Add Provider web pages: where you would add a search provider.

*Search provider properties: It is not possible to edit existing provider properties.

*Priority settings among search providers: there is no priority setting among search providers, as there can only be one default search
provider and all the others are alternates.

* Windows Easy Transfer : Windows 2000 pro cannot be migrated in totality through Windows Easy Transfer: one cannot transfer
desktop settings, bookmarks or user accounts from Win 2000 to Vista, although this is a possibility when performing a migration from
XP to Vista.

*Windows Easy Transfer: Windows Easy Transfer cannot be used to migrate passwords under any circumstances.

*Windows Firewall: Each network profile has a unique set of exceptions. An exception applied to one network profile is not applied to
others. Windows Firewall can be applied selectively to interfaces.

*Windows Firewall: EXCEPTIONS cannot be configured on a per-interface basis, they are applied to all interfaces upon which the
firewall is configured. NOTE: this means that you can set the firewall on or off for bluetooth, but any exceptions to the firewall are
applied across all interfaces upon which it is acting upon.

*Windows Firewall with Advanced Security: Rules: Rules are an attribute of Windows Firewall with Advanced Security and can be used
to allow and block.

*Windows Firewall: Exceptions: exceptions are an attribute of Windows Firewall, basic. They can only allow.

*Windows Firewall with Advanced Security: Only RULES, not exceptions, can be used to block outbound traffic.

*Windows Meeting Space: through Windows Meeting Space, one can share via workgroup network or ad-hoc network. The individual
hosting the application can ‘’grant’’ a participant in the Windows Meeting Space meeting control of the application so that the
participant in question can make changes remotely to the host’s application or document belonging to the application hosted on the
remote desktop.

*Handouts:

*Windows Meeting Space: Handouts: applications cannot be dispensed as ‘’handouts.’’

*Subscribed RSS feeds: It is only possible to configure automatic attachment downloads on a per-feed basis, so you must
configure every one.
*RSS feed properties cannot be configured using Windows Mail.

*RSS feed properties cannot be configured using the default feed settings.

*Admin Approval mode: policies determine whether a prompt to continue, a request for credentials or automatic elevation occurs.

*Start Menu Power button: This is not the Power Button! This setting is configured in the Power Options Advanced Settings dialog
box.

*Sync conflict: Sync Center: synchronization conflicts occur when the local and remote copies of the file have been modified in the
period between synchronization.

*Sync Center: deleted files do not cause synchronization errors.

*Deleted gadgets: Gadget Gallery: Ian deleted three default gadgets from the Gadget Gallery. He has decided he wants to use one of
thgadgets he removed. How would he get it back? Edit Windows Sidebar properties. From Windows Sidebar Properties, it is possible
to click Restore Gadgets Installed with Windows. This reinstalls all of the default gadgets.

*Gadget Gallery: Windows Sidebar: The default gadgets cannot be downloaded from the Internet again.

*Windows Anytime Upgrade: It is possible to use full versions of Windows Vista software to perform an upgrade as long as the
upgrade path is supported, although this is more expensive than using Windows Anytime Upgrade.

*Network projectors: Network projectors can be protected with a password,ensuring only approved users connect to it. If one can see
it but cannot connect, it is nec to enter the password.

*Network projectors: it is not necessary to elevate privileges to connect to a network projector.

*Windows Sideshow Gadgets can be shown on a computer’s auxiliary display.

*Windows Sidebar Gadgets can only be shown on the sidebar or on the desktop.

*Application Event log: Although the Reliability Monitor will inform you of the specific applications that have failed on a
particular day, you need to examine the Application event log to learn exactly what time the event occurred.

*UNC path names use this syntax: \\computername\sharename\folder\filename. NOTE: Network shares do not have the same name as
the local folder that they are sharing.

*I Do Not Think That This is a Phishing Website: This will report directly to Microsoft and they will verify your claim.

*Administrators: Only members of the Administrators group are able to elevate privileges without providing credentials.

*Power Users: the Power Users group is included in Windows Vista for backward-compatibility reasons.

*Cryptographic Operators and Backup Operators groups can perform specific tasks, unless a user account is a member of the the
Administrator group, credentials are necessary to elevate privileges.

*Windows XP Tablet PC upgrade while maintaining Tablet PC functionality? Vista Ultimate, Vista Enterprise and Vista Business.

*Network Icons: Cannot access Internet: Only two computers, no yellow, no red

*red x: no wire or no access point

*yellow warning: haven’t received an IP address

*WDDM: Windows Display Driver Model: One must exist for the monitor one plans to use or Aero isn’t going to work.

*Windows Aero compatible adapter: Assuming a WDDM exists, the next 2 important characteristics are these 2: 1. Amount of adapter
memory; & 2. Hardware Pixel Shader support (Hardware Acceleration).

*Graphics adapter suggested memory: 64MB for low res & 128MB for high res or generally recommended settings.

*Graphics adapter: Hardware Pixel Shader standard is version 2.0 or higher

*Graphics: the adapter must also support 32-bit color.

*Graphics: the speed at which the graphics memory runs is not important.

*Graphics: both PCIe and AGP adapters are supported, as are DVI and VGA output.

*Security zones: These zones allow you to manually add sites: 1. Restricted Sites zone (you can directly add); 2. Trusted Sites zone
(you can directly add); & 3. Local Intranet zone (you can add to the Intranet zone by going through the Advanced Properties dialog
box.
*Security zones: Internet zone: only the Internet zone doesn’t allow you to manually add sites to it.

*RSS feeds: the default feed applies to all feeds that are not using a custom schedule.

*Vista Screen corruption on older programs: lower color, 256 colors, and lower res, 640 by 480.

*Automated backups: What types of media allow Vista to perform automated backups? Network share and USB external hard disk.

*Adjust for Best Performance OfBackground Services: set this for a computer running Vista that is rarely used and is running a IIS Web
server interfacing with an SQL database. This sets processor scheduling – that is what is really being adjusted.

*Adjust for Best Performance of Programs: set this when the computer is primarily used to run applications, such as games or
Microsoft Office.

*Windows Aero: Graphics Adapters: any graphics adapter will work as long as it meets the other required characteristics: PCI, PCIe or
AGP.

*Windows Aero: Graphics Adapters: what are the required characteristics? 1. Capable of running DirectX 9 or higher; 2. Have a WDDM
driver; 3. Have a Hardware Pixel Shader 2.0; 4. 32-bits per pixel capacity; & 5. An adequate amount of graphics memory – this exact
quantity depends on the resolution at which you want to run Aero. Running Aero at the lowest possible resolution requires 64MB of
graphics adapter memory.

*Sleep Mode: Password upon Awake: Configure the password requirement in Power Options

*Screensaver: Password upon Awake: Personalization -> Screen Saver Settings -> check “On resume, display logon screen.” NOTE:
The password upon awake is different from the password upon screen saver!

*Internet Explorer protected mode: which zones have protected mode enabled by default? 1. Local intranet; 2. Internet; & 3.
Restricted Sites.

*Internet Explorer Protected mdoe: by default all zones except “Trusted Sites zone” have protected mode enabled.

*Application Installation Failure: User Account Control: when an User Account Control is enabled, and an application fails to install, it is
likely that “Alter the settings of the User Account Control: Detect applications installatioonsa nd prompt for elevation policity” is the
problem. This is generally the case for managed environments.

*Software Installation: Only members of the Administrators group, either directly or indirectly can install applications in Vista.

*Parental controls: what are the limitations: these aspects cannot be controlled: 1. DVD with inappropriate conduct; 2. Offensive
music; & 3. Email with profanity.

*Windows Mobile Device Center: Partnership: you can automatically browse a mobile device’s memory without establishing a
partnership, but doing so makes it easier to coordinate contacts and syncing calendars.

*Windows Mobiel Device: Tethered modem: you do not have to configure a partnership to use a Bluetooth-compatible phone that has
modem functionality as a modem.

*Windows Mobile Device: Automatically updating contacts and syncing calendars requires that a partnership is established.

*Complete PC Backup functionality: Vista Business, Vista Enterprise, and Vista Ultimate.

*Backing up: Windows Vista Home Basic and Windows Vista Home Premium do not support the creation of a complete PC backup
image.

*Remote Desktop: if A is logged in locally using B’s account and B logs in Remotely using his own account, A will be kicked off.

*Remote Desktop: Really fast speeds are required for font smoothing and host computer desktop background.

*