Tech

Portable Computing Security & More–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

Portable Computing Security & More

The Internet

  • Telnet & SSH
    • The Telnet and the Secure Shell (SSH) protocols provide command line access to remote systems.
    • Telnet runs on TCP port 23; SSH runs on TCP port 22.
    • Telnet is unencrypted; SSH is encrypted.
    • Telnet uses Port 23.
    • Telnet:
      • One of the earliest application protocols; allows access to another computer;
      • A remote command line tool; a powerful tool; allows you to get to the command line on another comuter.
      • To access a Telnet server, you need a Telnet client (similar to how in order to access a web server you need a web client, aka–web browser).
      • Putty is a popular Telnet client.
    • Telnet lacks encryption and offers NO SECURITY!!!
    • SSH–uses port 22 (SSH is like Telnet’s encrypted big brother!)
    • SSH gets you to a command line but with end-to-end encryption!
      • Only use SSH when connecting over the internet (outside of a private network)
  • Remote Desktop Connections
    • Windows uses Remote Desktop Protocol (RDP) for remote connectivity; uses port 4389.
    • Use Virtual Network Computing (VNC) protocol for connecting to Linux & Mac systems.
    • Try TightVNC to use VNC from a Windows system.
  • The World Wide Web
    • The WWW uses either the HTTP (Hypertext Transfer Protocol) or HTTPS (HTTP Secure) protocols.
    • HTTP uses port 80 and is NOT secure.
    • HTTPS uses port 443 and uses certificates to make a secure connection.
    • Make sure to recognize typical certificate errors!
    • SSL (Secure Sockets Layer) (Note: SSL & SSH are two separate things!)
    • TLS (Transport Layer Security)
    • Tools:
      • neverssl.com
      • badssl.com
      • Gives examples of bad certificates.
  • Troubleshooting Internet Connections
    • Network troubleshooting, check physical connectivity first!
    • Run ipconfig /all from the CLI to get a ton of network info.
    • Run traceroute (Linux/Mac)/tracert (Windows) to test Internet connectivity (before you have problems!)
      • ex: traceroute www.google.com
    • Run ping to test connection between two systems (plus DNS).
    • KNOW YOUR NETWORK! (Know your network ID, know what your router is, & know what your DNS server is!) (Run ‘ipconfig’ for these!)
    • Many connectivity problems can be fixed with just ping, traceroute, & ipconfig!

Portable Computing

  • Power Management: Laptops
    • ACPI (Advanced Configuration and Power Interface).
      • Built-in functions; built into the CPU; power functions.
    • ACPI level 0 is enabled, but unused.
    • ACPI level 3 is sleep mode. RAM is powered.
    • ACPI level 4 is hibernation. RAM data is copied to mass storage.
    • All operating system provide power management utilities.
    • AC Adapter
      • many use Vendor Specific Power Ports (proprietary).

Care & Feeding of Mobile Devices

  • Mobile Devices & Email
    • CDMA phones do not use SIM cards. GSM phones use SIM cards.
    • Screen locks prevent others from accessing your phone using fingerprints, pin codes, passwords or facial recognition.
    • Multifactor authentication (MFA or 2FA) means to use more than one way to authenticate.
    • Authenticator apps add on extra layer of security.
    • Location apps like “Find My Phone” help locate lost devices.
    • MDM (Mobile Device Management)
    • BYOD (Bring Your Own Device)
    • COPE (Corporate Owned Personally Enabled)