SYS 140 TECH JOURNAL - ryanm292002/Ryans-Repository GitHub Wiki

Tech Journal Entry 9/4/20 (SCREENSHOTS ON CODE TAB ON REPOSITORY NAMED PING 9-04 or something like that) LAB 0

In this lab, we first started by establishing a VPN connection or just using a temporary VPN connection. Personally, I'm off-campus so it should have worked but I couldn't get the windows VPN to work in part 1 so I had to just do part 2 with the temporary machine instead, which is fine by me. Once we established that connection to the cyber.local VPN we could then connect to our assigned skiff workstation and then confirm to see that the skiff station had a connection by using the ipconfig command. Overall this was a good lab to set up the virtual machine and I don't think I could live without the almighty ping command

Lab #1 Tech Journal

In this lab, we learned about data conversions in the technological world, things like binary and hex also EBCDIC and ASCII text conversions were apart of it as well.

Tech Journal Entry (9/20/20) Lab #2 Processors In this lab, we researched different types of processors and some of the different features that come in processors. We researched both some mobile processors and also computer CPUs. The main CPU companies for computers are intel and AMD so we got to compare some products from those companies as well. On top of that, I also learned that the difference between i3, i5, and i7 with intel processors is that it's basically a class label to separate what processors can do when a new generation of Intel processors come out.

**Lab (Process Lab: Accessing Data In Memory) Sep 29 **

TECH JOURNAL In this lab we used the volatility command to look at memory on a specific drive. Not only did we do that but we also connected to the virtual machine, I personally am not on campus so I had to go through the view portal and then access vSphere to do the lab. Specifically, the image contained a 2005 memory dump that we got to look at, after running the first command which listed all the processes it showed basic data like the process id and the number of handles. Another command that volatility allowed was the hash command that showed the hashes of passwords on the computer.

Lab #4 Hard Drives October 11th In this lab we looked at traits of our personal hard drives and also researched various types of storage whether it be SSDs or Cloud storage, it was all in the lab.

Lab #5 Build a PC Oct 6th In this lab, we went online and chose parts to build a custom system of our choice. We had to find the components, figure how many of each component we needed, price the components out and finally describe what each component did on a day to day task.

Lab #6 (SysInternals Tools) In this lab on my virtual machine, I tried out three different windows Sysinternals tools. HELPFUL TOOLS: (du, process explorer, and autorun).

Lab #7 (Accessibility Options) In this lab, I looked at some of the accessibility options that Windows 10 offers. Helpful Options: Different Keyboard layouts in Windows language settings.

Lab #7b (Creating Your Own Virtual Machine) I downloaded a virtual box and set up a Linux Ubuntu virtual machine.

Lab #8a (Exploring Network Tools) We learned how to use the nslookup and traceroute commands

nslookup: >‘nslookup google.com’ ping: >ping 'x.x.x.x’ traceroute: >‘tracert x.x.x.x’

Lab #8b (TCPView and Whois) In this lab, we used two more Sysinternals tools: TCPView and Whois.

TCPView- Download from Sysinternals and run it with administrative rights. This tool allows you tool to look at TCP and/or UDP connections as well as processes with IDs on your end.

Whois- Download from Sysinternals, open and cmd and type the command "whois google.com". This is an internet program that uses DNS to find domain name information.