SlideShare une entreprise Scribd logo
Computer Architecture: 
OS Technologies 
Chapter 11 - 12 
Windows on a Network and the Internet 
Eric Vanderburg 
Eric Vanderburg – OS Technologies © 2005
Review (Concepts) 
• Protocols 
– Line protocols (layer 2) 
– Network protocols (layer 3) 
• Architectures 
• Media Types 
• Wireless 
• DNS, WINS, Hosts, LMHosts 
• Ports (pg. 504) 
• URLs (pg. 528) 
Eric Vanderburg – OS Technologies © 2005
Review (Hands On) 
• Installing services & protocols 
• Changing the computer name, 
workgroup, or domain 
• Changing protocol settings 
• Connecting to wireless networks 
• Sharing & accessing shares 
• Mapping drives 
• Creating network connections 
– Dial up 
– VPN 
– ICS 
Eric Vanderburg – OS Technologies © 2005
Review (Commands) 
• Ping 
• Ipconfig / winipcfg / ifconfig 
• Tracert 
• Netstat 
• Nslookup 
• Telnet 
• Arp 
Eric Vanderburg – OS Technologies © 2005
Our “favorite” browser : IE 
• Home page 
• Temp files, cookies 
• Changing defaults 
• Security Zones 
• Privacy 
• Certificates 
• Content Advisor 
• Connections (LAN & DUN) 
• Program handlers 
• Advanced options 
Eric Vanderburg – OS Technologies © 2005
FTP from the CLI 
• FTP 
• Open address 
• LOGIN: username 
• PASSWORD: password 
• CD 
• GET 
• PUT 
• BYE 
• GUI Tools: 
– Wsftp-lite, IE, Windows Explorer 
Eric Vanderburg – OS Technologies © 2005
FTP from the CLI 
• FTP 
• Open address 
• LOGIN: username 
• PASSWORD: password 
• CD 
• GET 
• PUT 
• BYE 
• GUI Tools: 
– Wsftp-lite, IE, Windows Explorer 
Eric Vanderburg – OS Technologies © 2005

Contenu connexe

Tendances

Tendances (20)

Glitch nix
Glitch nixGlitch nix
Glitch nix
 
ION Sri Lanka - DNSSEC at LK Domain Registry
ION Sri Lanka - DNSSEC at LK Domain RegistryION Sri Lanka - DNSSEC at LK Domain Registry
ION Sri Lanka - DNSSEC at LK Domain Registry
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Domain Services for Windows on OES11SP1
Domain Services for Windows on OES11SP1Domain Services for Windows on OES11SP1
Domain Services for Windows on OES11SP1
 
Kali linux
Kali linuxKali linux
Kali linux
 
1. centos tutorial
1. centos tutorial1. centos tutorial
1. centos tutorial
 
Docker - Hack Salem! - November 2014
Docker - Hack Salem! - November 2014Docker - Hack Salem! - November 2014
Docker - Hack Salem! - November 2014
 
CSCI 1100 Group 1 project 1
CSCI 1100 Group 1 project 1CSCI 1100 Group 1 project 1
CSCI 1100 Group 1 project 1
 
y3dips hacking priv8 network
y3dips hacking priv8 networky3dips hacking priv8 network
y3dips hacking priv8 network
 
kali linux
kali linuxkali linux
kali linux
 
Node on Guard
Node on GuardNode on Guard
Node on Guard
 
kali linux Presentaion
 kali linux Presentaion kali linux Presentaion
kali linux Presentaion
 
ION Sri Lanka - Why Implement DNSSEC?
ION Sri Lanka - Why Implement DNSSEC?ION Sri Lanka - Why Implement DNSSEC?
ION Sri Lanka - Why Implement DNSSEC?
 
A Byte of Software Deployment
A Byte of Software DeploymentA Byte of Software Deployment
A Byte of Software Deployment
 
Kali linux
Kali linuxKali linux
Kali linux
 
Simplifying openstack instances networking
Simplifying openstack instances networkingSimplifying openstack instances networking
Simplifying openstack instances networking
 
Sup
SupSup
Sup
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
DockerCon SF 2015: Docker Community in China
DockerCon SF 2015: Docker Community in ChinaDockerCon SF 2015: Docker Community in China
DockerCon SF 2015: Docker Community in China
 
ION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLSION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLS
 

En vedette (10)

Comp 107 unit 7 and 8 (networking, internet and intranet) (1)
Comp 107 unit 7 and 8 (networking, internet and intranet) (1)Comp 107 unit 7 and 8 (networking, internet and intranet) (1)
Comp 107 unit 7 and 8 (networking, internet and intranet) (1)
 
Computer Networking
Computer Networking Computer Networking
Computer Networking
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Chapter 1 computer networking Class 12th
Chapter 1 computer networking Class 12thChapter 1 computer networking Class 12th
Chapter 1 computer networking Class 12th
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
04 software system and application software
04 software   system and application software04 software   system and application software
04 software system and application software
 

Similaire à Computer Architecture - Software - Lessons 11-12 - Windows networking and the Internet - Eric Vanderburg

CompTIASecPLUS-Part1 Unlimited Edition- Edited.pptx
CompTIASecPLUS-Part1 Unlimited Edition- Edited.pptxCompTIASecPLUS-Part1 Unlimited Edition- Edited.pptx
CompTIASecPLUS-Part1 Unlimited Edition- Edited.pptx
mohedkhadar60
 
Attack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration TestingAttack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration Testing
NetSPI
 
Attack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration TestingAttack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration Testing
NetSPI
 

Similaire à Computer Architecture - Software - Lessons 11-12 - Windows networking and the Internet - Eric Vanderburg (20)

Computer Architecture - Software - Lesson 8 - Managing Windows XP - Eric Vand...
Computer Architecture - Software - Lesson 8 - Managing Windows XP - Eric Vand...Computer Architecture - Software - Lesson 8 - Managing Windows XP - Eric Vand...
Computer Architecture - Software - Lesson 8 - Managing Windows XP - Eric Vand...
 
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgNetworking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
 
computer networks ppt.pptx
computer networks ppt.pptxcomputer networks ppt.pptx
computer networks ppt.pptx
 
CompTIASecPLUS-Part1 Unlimited Edition- Edited.pptx
CompTIASecPLUS-Part1 Unlimited Edition- Edited.pptxCompTIASecPLUS-Part1 Unlimited Edition- Edited.pptx
CompTIASecPLUS-Part1 Unlimited Edition- Edited.pptx
 
Secure360 - Attack All the Layers! Again!
Secure360 - Attack All the Layers! Again!Secure360 - Attack All the Layers! Again!
Secure360 - Attack All the Layers! Again!
 
Networking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg
Networking Concepts Lesson 09 part 1 - Complex Networks - Eric VanderburgNetworking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg
Networking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg
 
Computer network coe351- part1- final
Computer network coe351- part1- finalComputer network coe351- part1- final
Computer network coe351- part1- final
 
Information Security Lesson 7 - Remote Access - Eric Vanderburg
Information Security Lesson 7 - Remote Access - Eric VanderburgInformation Security Lesson 7 - Remote Access - Eric Vanderburg
Information Security Lesson 7 - Remote Access - Eric Vanderburg
 
Computer Architecture - Software - Lesson 13 - Printers, Mac OS and Linux - E...
Computer Architecture - Software - Lesson 13 - Printers, Mac OS and Linux - E...Computer Architecture - Software - Lesson 13 - Printers, Mac OS and Linux - E...
Computer Architecture - Software - Lesson 13 - Printers, Mac OS and Linux - E...
 
Zero configuration networks
Zero configuration networksZero configuration networks
Zero configuration networks
 
DCUS17 : Docker networking deep dive
DCUS17 : Docker networking deep diveDCUS17 : Docker networking deep dive
DCUS17 : Docker networking deep dive
 
Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)
 
Attack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration TestingAttack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration Testing
 
Attack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration TestingAttack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration Testing
 
Building a Reliable Remote Communication Device with Java ME8 [CON2285]
Building a Reliable Remote Communication Device with Java ME8 [CON2285]Building a Reliable Remote Communication Device with Java ME8 [CON2285]
Building a Reliable Remote Communication Device with Java ME8 [CON2285]
 
Networking Concepts Lesson 01 - Intro - Eric Vanderburg
Networking Concepts Lesson 01 - Intro - Eric VanderburgNetworking Concepts Lesson 01 - Intro - Eric Vanderburg
Networking Concepts Lesson 01 - Intro - Eric Vanderburg
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
Security tools
Security toolsSecurity tools
Security tools
 
Sculpturing SIP World
Sculpturing SIP WorldSculpturing SIP World
Sculpturing SIP World
 
2nd sdn interest group session2 (121218)
2nd sdn interest group   session2 (121218)2nd sdn interest group   session2 (121218)
2nd sdn interest group session2 (121218)
 

Plus de Eric Vanderburg

Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 

Plus de Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Dernier

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Dernier (20)

Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 

Computer Architecture - Software - Lessons 11-12 - Windows networking and the Internet - Eric Vanderburg

  • 1. Computer Architecture: OS Technologies Chapter 11 - 12 Windows on a Network and the Internet Eric Vanderburg Eric Vanderburg – OS Technologies © 2005
  • 2. Review (Concepts) • Protocols – Line protocols (layer 2) – Network protocols (layer 3) • Architectures • Media Types • Wireless • DNS, WINS, Hosts, LMHosts • Ports (pg. 504) • URLs (pg. 528) Eric Vanderburg – OS Technologies © 2005
  • 3. Review (Hands On) • Installing services & protocols • Changing the computer name, workgroup, or domain • Changing protocol settings • Connecting to wireless networks • Sharing & accessing shares • Mapping drives • Creating network connections – Dial up – VPN – ICS Eric Vanderburg – OS Technologies © 2005
  • 4. Review (Commands) • Ping • Ipconfig / winipcfg / ifconfig • Tracert • Netstat • Nslookup • Telnet • Arp Eric Vanderburg – OS Technologies © 2005
  • 5. Our “favorite” browser : IE • Home page • Temp files, cookies • Changing defaults • Security Zones • Privacy • Certificates • Content Advisor • Connections (LAN & DUN) • Program handlers • Advanced options Eric Vanderburg – OS Technologies © 2005
  • 6. FTP from the CLI • FTP • Open address • LOGIN: username • PASSWORD: password • CD • GET • PUT • BYE • GUI Tools: – Wsftp-lite, IE, Windows Explorer Eric Vanderburg – OS Technologies © 2005
  • 7. FTP from the CLI • FTP • Open address • LOGIN: username • PASSWORD: password • CD • GET • PUT • BYE • GUI Tools: – Wsftp-lite, IE, Windows Explorer Eric Vanderburg – OS Technologies © 2005