Joseph Doss
Forum Replies Created
-
AuthorPosts
-
Joseph DossParticipant
It is very different at times to see my God-given purpose, but I do know Him. Sometimes I think I’m on the correct path but honestly don’t know, I can only pray for guidance and look to find it.
Joseph DossParticipantNeed to know policy in order to keep important data from those who do not need access to it. May help in setting up VLANs
A mobile device policy should be in place (provided the company intends on using mobile devices) would need to know if VPNs are being used or not, a remote access policy would also tie in to this.
Technical standards policy in order to ensure that all devices can easily communicate and to provide a more standardized environment so less training would be needed.
Joseph DossParticipantI don’t think there are any “good people” in the world. From mankind’s perspective, there are good and bad people but we are all sinners. But thanks be to God that Jesus paid for all the sins of all who believe in His name and accept Him as lord and savior.
Joseph DossParticipantThe most basic would be to use a firewall which would block unwanted traffic from entering the network and gaining access to certain servers/computers/devices.
The use of a DMZ for web services to separate internal private servers from those accessible online to the public such as webpages, lessens the chance of an attacker gaining access to private Information by attacking public servers.
Joseph DossParticipantA router acts as a bridge between two or more networks such as a WAN like the Internet and a LAN such as an office or home network. A switch essentially allows you to take a single network port from a device and divide it into multiple ports allowing you to connect many more devices into a network. There are managed and unmanaged or “dumb” switches managed switches can perform some routing support such as VLANS and can be managed remotely over the network whereas unmanaged switches have no such features.
Joseph DossParticipantSSH (Secure Shell) – enables remote administration of a (enabled) computer or device over a network connection, SSH runs on port 22 and is encrypted. SSH is a more secure replacement of Telent, allows the same administration of devices but is not encrypted.
HTTPS (HyperText Transfer Protocol Secure)- Is an encrypted version of HTTP (HyperText Transfer Protocol) both are used to send data over the internet such as webpages. HTTPS runs of port 443, While HTTP runs on port 80.
SMB (Server Message Block) – Is a protocol used to share files on a local network, it runs on port 445 and port 139
Joseph DossParticipantJesus is many things but mainly I would say that Jesus is my Lord and Savior who rose from the dead after talking my sins to the cross and that He is the son of the one and only God.
Joseph DossParticipantThree devices include, routers, switches and modems. Routers are used both in home and business environments they have many functions but their primary function is to route data and is typically the center of a home network many home routers include functions such as firewalls and DHCP some higher end models support VLANS. A switch is a device that allows multiple devices to connect to the same router/switch/computer port by sorting out data and sending to a specific connected device. A modem is the device that connects a local network to the ISPs many of which also serve as routers in a home or small business network.
Joseph DossParticipantWhen troubleshooting always start with the simplest checks first (ex. if you have network connection issues is your router on) Check if the device or devices are properly connected to power and powered on. If so check you other connections (if network issue check your Ethernet cable or WiFi, if it’s a video issue check your monitor connection and so on) depending on your case and escalate upward into more advanced testing until you find the issue, of course tanking into account what COULD be the issue (If you keyboard isn’t working don’t check your mouse for issues) anything that could not be the issue can be automatically ruled out before continuing further.
Joseph DossParticipantSometimes I do feel the weight of Satan’s pursuit, seeing how sin is affecting my own life as well as the world around me. It seems that day by day the world gets increasingly worse. But I feel that I am protected by God through Jesus and that the world can be also if we Christians are willing to pick up our crosses and bring light into the world guiding and aiding others to the good news of Christ.
Joseph DossParticipantThere are many types of computer expansions. PCI and PCIe are used for installing new expansions within a PC such as graphics cards, network cards, Wi-Fi modules and other specialty hardware.
Joseph DossParticipantRAM (Random Access Memory) is actively used while a PC is running any opened file or running application is pulled from a storage device such as the HDD or external drive and stored within the RAM. Once an application is closed or a file is saved the information is pulled from the RAM and written to the storage drive. When a device is powered down the RAM is cleared.
ROM (Read Only Memory) is used only in specific instances and is not (normally) written to, this is typically used to store a devices Firmware/BIOS/UEFI. The only time ROM is written to would be a firmware update or a BIOS flash. ROM is not cleared when a device is powered off
Joseph DossParticipantYou should always begin with the simple things like being sure the power supply is actually plugged in (I’ve had people have power issues and turns out the machine wasn’t plugged in) and that there is power at the wall outlet before looking into the computer’s supply. then work your way up to more advanced testing, l One of the simplest techniques would be to start the computer to see what exactly the power supply is doing or not doing (unless hazardous) check for noises, or see if the system fires up at all then research the results. If that fails the use of a power supply tester can be done in order to check results. You could also use a multimeter, by removing all connections from the computer and bridging pins 15 and 16 then connecting the power. connect one end of the multimeter to a ground pin and then test each other pin individually comparing the results with what is expected.
Joseph DossParticipantThe MOBO is responsible for all the communication between all the Hardware within (or attached to) a computer such as the CPU, RAM, HDD/SSD, etc. The CPU is responsible for the logic and processing within the system as it controls all other chips.
Joseph DossParticipantTroubleshooting is a process of finding and correcting an issue, such as a Hardware issue. Its value is that it helps resolve issues faster and at times cheaper than random fixes. Documenting your process along the way aids in future troubleshooting making it easier and faster next time a similar issue arises.
-
AuthorPosts