Saturday, 24 February 2018

REMOTE ACCESS

Name of Student :Aashu pasi
   Name of faculty : Jyoti Mam
   Name of course : JCHNE+CLOUD V1
                   Roll No : JK-ENR-SW-1720




Softcopy

Blog: 09
GW/TPS:01
Mindmap :03
Simulation: 07
Presentatio:09
FB post.      : 05




BENEFITS OF REMOTE ACCESS 

   
  • It allow to IT administrators to get access of servers from anywhere any time in case of any service or server 
  • .can allow administrators to work from home.
  •  organization can save cost by allowing users to bring their own devices at work.





  •  

  • No more administrators are required to sit in data center to manage by physical service. 
  • It also important to improve the working efficiency of IT administrations to manage server remotely. 


DRAWBACK OF REMOTE ACCESS 


There is Every technology have some drawback which an administrator should  

- Administratior should be makes sure only required ports open in external firewall. 
- The administratior should limit user right on server for this team is required only authorized persons can access critical server. 


 






- Administrator should do proper server hardening to secure them.
- Administratior should use a secure VPN server to prevent kind of undwanted access.



Methods (Tools)  used to Remote access :

There are two tools are available in market. 

- RDP (Remote Desktop protocol). 
- Third party remote access tools. 



RDP (Remote desktop protocol)

The RDP is the original designed by Microsoft corporations to get the GUl (Graphical User interface) access to any machine to using internet connection.
RDP protocol by default include Microsoft propriety OS like. XP, VISTA, Win 7, win 8 and win 10.


RDP protocol version :

The RDP has multiple version available in market.




1. RDP 4.0 (launched with Windows NT 4.0)
2.RDP 5.0  (launched with Windows 2000 Server)
3. RPD 5.1 (launched with Windows XP)
4. RDP 5.2 (launched with server 2003)
5. RDP  6.0 (launched with Windows VISTA)
6. RDP6.1 (launched with Windows server2008)
7. RDP7.0 (launched with windows server 2008 R2)
8. RDP  8.0 (launhed with Windows server 2012)
9. RDP 8.1 (launched with Windows 8.1 and win 2012R2)
10. RDP (last version of RDP)



In addition, RDP contains the following features:

Support for 24-bit color.
Improved performance over low-speed dial-up connections through reduced bandwidth.
Smart Card authentication through Remote Desktop Services.
Keyboard hooking. ...
Sound, drive, port, and network printer redirection.


RDP Security :

The administrators can restrict remote access of any RDP enable machine by assignig the permission to users can access remotely or not.



RDP enable in windows 10 :

- Click on start button.
- Type Control panel.
- Click System Security.
- Click Allow Remote Access.
- Select Allow Remote Connection to this Computer.


Question :

1. Features of RDP ?
2. What is RDP ?
3. How many types of tools in RDP ?
4. How many types of Drawback of remote access?
5. What is a Benefits os Remote access ?




Thursday, 22 February 2018

TROUBLESHOOTING OUTLOOK

Name of Student :Aashu pasi
   Name of faculty : Jyoti Mam
   Name of course : JCHNE+CLOUD V1
                   Roll No : JK-ENR-SW-1720




Softcopy

Blog: 09
GW/TPS:01
Mindmap :03
Simulation: 07
Presentatio:09
FB post.      : 05



Common errors in outlook 


The first error is illustrated as Object not found 



- Your outlook profile is corrupt. 
- Automatic SMTP account and adding it again. 


Outlook For iSO and Android 

Microsoft provides cross platform mobile apps. 

- Outlook click for iSO and Android. 
- Apps are available through app Store and play Store. 
- Supports Exchange outlook. Com Yahoo Mail Gmail and other email Service.




- This aap is also comes with Calendar feature and including attachments integration with cloud. 
- Tha image Shows the outlook app for Android and  iOS respectively. 


Troubleshooting outlook for Android and iOS 

There are same issue and solutions :

Issues of outlook. 

Connot Install outlook app. 
Connot sing into App. 
Data Sync error in App. 
Connot see Calendar in App. 



Solutions of outlook. 

Check Outlook app support iSO 8.0 higher & Android 4.0 & higher. 
Check your email account is supported by app. 
If your account already added. 
Then remove the account and add it again. 
Check internet connection, Check Free Storage. 


(OffCAT) office Configuration Analyzer Tool. 

- Diagnosed issues little crashes, hangs, configuration issues etc. 
- Help to detect problem in MS office program. 
- Used in Corporate HelpDesk environment. 



- OffCAT is the preferred software for corporate Helpdesk environment.


Enable logging option in outlook :

- Used to trobleshoot technical issues in Microsoft outlook.
- To Enable or Disable Logging,

1. Open outlook 2016 File options
2. Select Advanced Tick options
   '' Enable  troubleshootin logging ''.





Question :

1. How many types of issues in Microsoft outlook?
2. What is offCAT?
3.  What is (Cal Check)?
4. What is outlook iSO and Android?
5. How many types of errors in outlook?



Thursday, 15 February 2018

EMAIL CLIENT INSTALLATION AND CONFIGURATION

Name of Student :Aashu pasi
   Name of faculty : Jyoti Mam
   Name of course : JCHNE+CLOUD V1
                   Roll No : JK-ENR-SW-1720




Softcopy

Blog: 09
GW/TPS:01
Mindmap :03
Simulation: 07
Presentatio:09
FB post.      : 05



There are so many types of Email client application :

1. Microsoft outlook.
2. Mozilla Thunderbird.
3. Mail.
4. Windows Live Mail.
5.eM Client.
6.Inbox by Gmail.




Microsoft outlook 2016




Outlook 2016 is a part of Microsoft office 2016 Productivity Suite. 





There are some point :

- Microsoft outlook 2016 is a most popular email client. 
- Outlook 2016 is a part of Microsoft office 2016.
- The table showing hardware and software prerequisites outlook 2016.
- Outlook is also known as MAPI (Messaging Application programming Interface.)
- Outlook it can be used in Mac device. 


Steps :

- First Install the outlook 2016 On your PC. 
- Go to the start menu than click all program. 
- Selecte the Microsoft outlook 2016 and open it. 
- click next than selecte yes and click next. 
- Enter your name and email address and password than click next Button. 
- Use Information / Enter your A/C type Incoming mail server .
- Outgoing server (SMTP) longon information. 
- Enter your user name and password. 
- Account type POP3 for incoming. 
- Enter pop. gmail. Com. 
- Outgoing server used (SMTP) than enter the smtp. gmail. Com
- Go to the more setting and first click .
- Than go to Advance settings. 
- Selecte Incoming server (pop3) 995 Than click the This server And select the (SSL). 
- For outgoing server selecte the 465.
- close all than click next and Finish. 



Outlook 2016 for Mac 



# The outlook 2016 for Mac is Microsoft based for Apples MacBook. 



- Enter your email address. 
- Password. 
- User Name. 
- Type click the drop down and select IMAP or POP.  - Mail service. 
- Check the SSL and Use SSL contact. 
- Finally click Add Account.



Question :

1. What is outlook?
2. The outlook is which part of Company?
3. How many types of hardware requirement?
4. How many types of steps install outlook?
5. How to Finalizing outlook 2016?




Tuesday, 13 February 2018

EMAIL CLIENT CONFIGURATION

Name of Student :Aashu pasi
   Name of faculty : Jyoti Mam
   Name of course : JCHNE+CLOUD V1
                   Roll No : JK-ENR-SW-1720




Softcopy

Blog: 09
GW/TPS:01
Mindmap :03
Simulation: 07
Presentatio:09
FB POST : 05



Introduction to Email 


  • Email stand for electronic mail 
  • Used to send and receive mails across Internet 


                     
            
  

  • Email is used to exchange the data of one email to another email . 
  • More plainly e-mail is massage that may be contain text files , image , or other attachments 
  • From year 2000 onwards  electronic mail a preferred medium over postal mail.



Advantages of email  









  • Productivity tools : Email is usually package with a calendar address book IM { instant messaging } and more for convenience and productivity  
  • A vaild Email is requirement to Access to web service from shopping sites like Amazon, flipkart. 
  • Easy mail management : Email service provider have tools that allow you to file,  label prioritze,  find group and filter your email for easy management 
  • Privacy : Your email is delivered is your own Account personal and private account. 


Components in email Service 


There are so many components in email Service. 




1.  Email Server : It is either public Server and private (Corporate) server .The core difference is that public Email server is administration and managed by internet like Goolge Yahoo etc. 

2. Protocols 
- Outgoing -SMTP ( Simple Mail Transfer protocol) 
- For incoming POP3 ( That is post office protocol version 3 )
Or IMAP4 ( Internet mail access protocol version 4 ) .




Email server 


1. Architecture Type 

- Public 
- Private and Corporate 





2. Operating system 

- Window 
- Linux and Unix 

3  Example 

- Microsoft Exchange Server 
- Qmail 
- PostFix



Email Protocol 


1. For sending email (Simple Mail Transfer protocol)  is used 




2. For Receiving Emails 

- Either POP3 (post office protocol version 3)
- IMAP4 (Internet Message access protocol version 4)



Question :

1. What is Email ?
2. How many types of Advantages of email ?
3. How many types of components in email?
4. What is email server ?
5. What is Email Protocol ?



Sunday, 11 February 2018

TROUBLESHOOTING MOBILE DEVICES

Name of Student :Aashu pasi
   Name of faculty : Jyoti Mam
   Name of course : JCHNE+CLOUD V1
                   Roll No : JK-ENR-SW-1720




Softcopy

Blog: 09
GW/TPS:01
Mindmap :03
Simulation: 07
Presentatio:09


Less Storage Space 






A few years back a mobile used to make a cell.  with an invention of a smartphone everything has changed. 

A smartphone is used to celling you can watch movies click pictures shoot video  etc.
You can free up the storage of space of your smartphone using tips.

- Uninstall unnecessary apps. 
- Delete temporary files. 
- Remove irrelevant data. 
- Move Data to SD card online storage. 




Screen Flickers :

Your Screen is Flickers effect displeasing to eyes 





Same steps :

- While opening apps. 
- While using the on-screen keyboard. 
- When viewing website pages on the Chrome Browser. 

Reason behind flickering issues in phone :

- Go to Settings =More tab =About device 
- Find Build number on your phone get text on your phone display. 
- You are now a developer. 
- Go to Home Screen =Settings =More tab. 
- See the Developer options. 
- Developer options = Drawing section or rendering Section =Find Trun off hardware overlays or Disable hardware overlays 


Speaker Issues :

If your mobile speaker is not working properly than you slov the problem. 





- You cannot be hear ringtone and/or music. 
- you can hear a ringtone but it is distorted or difficult to understand. 
- Fix the issue and troubleshooting tha problem. 


Check your apps :


- If you check any app around the same time that this issue has started occurring the phone. 
- Most time newly download app is root cause of the problem. 
- You can uninstall the app and check the speaker is wroking fine. 


Backup and reset :


- If this problem is tha software related.
- You should format your phone. 
- Before starting with formatting. 
- It will you remove any problemmatic thirty party application. 
- Like corrupt files, bugs or viruses etc. 


Replace the speaker :

If the reset doesn't work than the last option is replace the speaker. 

Wi-Fi Connection Issue :

There are many reasons is issue of your Wi-Fi network. 




- Problem with devices. 
- Problem with network. 
- Problem with Internet connection. 
- Ensure that Wi-Fi is on your phone. 
- Then turn Wi-Fi Off and on again to reconnect. 
- Switch off your phone and reset it again. 


Question :

1. What is  less Storage Space ?
2. How to solve the problem of Flickers screen ?
3. What is Backup? 
4. How to fix the problem of speakers ?
5. What is Wi-Fi ? 


Friday, 9 February 2018

iPHONE MAC BOOKS AND TROUBLESHOOTING MOBIL DEVICES

Name of Student :Aashu pasi
   Name of faculty : Jyoti Mam
   Name of course : JCHNE+CLOUD V1
                   Roll No : JK-ENR-SW-1720




Softcopy

Blog: 09
GW/TPS:01
Mindmap :03
Simulation: 07
Presentatio:09




Overview of iPhone and Mac



















features of  iPhone 



  • iPhone 1st Generation 
  • 1G 2007 combined cell phone internet and iPod. 
  • Price is 1250
  • Storage  i2
  • Ram 1GB

  • 3G 2009 3G network support Apply store .
  • Price 12000
  • Storage i3
  • Ram 2GB

  • 3GS 2009 hardware quality upgraded .
  • Price 15000
  • Storage i3
  • Ram 2GB


  • 4 2010 Thinner Front  camera video calling Higher display resolution Metal chassis 
  • Price 19999
  • Storage i3
  • Ram 8GB


  •  5 2012 4-inch display Lightning connector .
  • Price 12990
  • Storage i3
  • Ram 4GB


  • 5C 2013 Available in several Colour option .
  • Price 19999
  • Storage i4
  • Ram 16GB

  • 5S 2013 Improved hardware Fingerprint reader .
  • Price 1
  • Storage i5
  • Ram 32GB


  • 6 2014 5.5-inch display .
  • Price 25999
  • Storage i5
  • Ram32 GB




  • 6S 2015 5.5 inch display with a 1920x1080pixel resolution at 401 ppi .
  • Price 35000
  • Storage i6
  • Ram 32GB

  • 7 and plus 2016 Water resistance Improved system graphics performance Rear dual camera setup .
  • Price 45000
  • Storage i7
  • Ram 32GB




Question

1. what is iPhone 3G ?
2. what is iPhone 3GS ?
3. what is iPhone 4S ?
4. what is iPhone 5S ?
5.what is iPhone 6S ?



Wednesday, 7 February 2018

OTHER MOBILE DEVICES / ACCESSORIES /PORTS

Name of Student :Aashu pasi
   Name of faculty : Jyoti Mam
   Name of course : JCHNE+CLOUD V1
                   Roll No : JK-ENR-SW-1720




Softcopy

Blog: 08
GW/TPS:01
Mindmap :03
Simulation: 07
Presentatio:09



Introduction 



- Wearable technologies. 
- Phablets. 
- e-books and eReaders. 
- Global Positioning System (GPS). 
- Different computer accessories and ports. 



Wearable Technology Devices 


- Wearable technology :  Category of technology devices worn by a consumer that sync with either PC or more mobile device. 





Smart Watch : Smart watch is a watch with a touch screen display designed to be worn on the worst.  It is connected to Smart phone via Bluetooth etc. 




Fitness Tracker : A fitness tracker is a device or application for monitoring and tracking fitness related metrics such as distance walked or run calorie consumption and in some cases heart and quality of sleep. 





Phablet : is a commonly used to describe a gadget that combines the capabilities of smartphone and tablets. Phablet is used a lager smartphone but smaller than a tablet. 






E-books : E-books is celled as electronic book are popular the day by day. 
Electronic book they are fies that you access on your PC. Like a normal paper book. 




Smart camera : camera is a device is built in os which is capable of uploading and sharing photos online via built in Wi-Fi Or data connection. 




(GPS) : GPS is stand for Global positioning System is a worldwide nevigation system. it is utilize about 24 satellite . GPS is tools are used in cars,  planes,  construction equipment and movie making gear.





PreSee - 2

Accessories and ports

Bluetooth 4.0
 
In today's  digital world,  nerly everyone is connected to one another somehow using wireless network technology.

Bluetooth is a wireless technology standard exchanging data over short distances from fixed mobile device and building personal area network (PANs).




- An optimized version of Bluetooth technology.
- was first appeared in Apple 2012 releasses of the MacBook Air and MacBook Mini.
- Uses low energy than previous versions that allows manufacturer to include Bluetooth in small battery operated devices.
- Also know as Bluetooth Smart, Bluetooth Smart Ready and Bluetooth low Energy (LE).



Question :

1. What do you mean by Wearable technology ?
2. What do you mean by Smart Watch ?
3. What do you mean by fitness Tracker ?
4. What do you mean by phablet ?
5. What do you mean by Bluetooth 4.0 ?


Monday, 5 February 2018

CONFIGURING MOBILE DEVICES

Name of Student :Aashu pasi
   Name of faculty : Jyoti Mam
   Name of course : JCHNE+CLOUD V1
                   Roll No : JK-ENR-SW-1720




Softcopy

Blog: 08
GW/TPS:01
Mindmap :03
Simulation: 07
Presentatio:09



INTRODUCTION 



- Parameters required to configure email on your mobile phone. 
- Configure personal and professional email account on the iPhone. 
- Taking backup of contacts and photos stored on your mobile phone. 
- Configure email account and sync contacts for Android and iOS. 
- Connecting mobile to organization Wi-Fi network. 
- Syncing iTunes with PC. 
- Syncing Windows phone with PC. 
- Initiating app testing on the mobile device after - connecting with the office Wi-Fi network. 



Parameter required to configure email, POP and SMTP. 



Accessing email software via mobile phone has become the people. 

Whatever email software or smartphone you use, the setting are always identical to configure an email address. 




- Email Address : full email address, for example tims @inmotiontesting. Com 
- Username and password : Full email address (in case of Gmail)  or the username that you send your email address and password for the same account. 
- POP or IMAP Server : Your incoming POP or IMAP server. 
- Security Type : SSL
- Server Port : Incoming Server Port (IMAP without SSL - 143, IMAP with SSL - 993, POP without SSL - 110, POP with SSL - 995).



Outgoing Server Settings :




- SMTP server. 
- Security Type : SSL 
- Server Port : 465 or 25

Configuration Email in mobile (Android and iPhone) :


There are same steps :

- Go to Home. 
- On your Account page.
- Select Next. 
- nickname selected. 
- Selecte Done. 
- Go to Menu Account settings. 





Steps for manual setup. 

- Go your phone press Home. 
- Go to your Account. 
- Select Next or Add Account. 
- Select Next. 
- Select IMAP account. 

Incoming server settings : 

- For Username,  enter your email address. 
- For IMAP Server. 
- Port enter  993 or 143.
- For security type,  select SSL (always). 
- Select Next. 


Outgoing server settings :

- For SMTP server enter  smtp. g mail. Com. 
- For Port  enter 465. 
- For Security type, select SSL (always).
- Select Next. 





Steps to set Gmail on your iPhone :

- Go to settings. 
- Tap Wi-Fi  and tap toggle button to turn it off. 
- Tab the setting button. 
- Tap to Mail. 
- Tab to your Account. 
- Tap Add Account. 
- Tap other. 
- Then tap Add mail Account. 
- Tap Next. 
- Tap to IMAP or POP. 
- Under New Account. 


Question :

1. What is POP and SMTP? 
2. What is outgoing Server? 
3. What is a Backup? 
4. What is incoming server? 
5. How many types of steps in incoming server settings? 


Sunday, 4 February 2018

OS PASSWORD RECOVERY HIREN'S BOOT CD

Name of Student :Aashu pasi
   Name of faculty : Jyoti Mam
   Name of course : JCHNE+CLOUD V1
                   Roll No : JK-ENR-SW-1720




Softcopy

Blog: 08
GW/TPS:01
Mindmap :03
Simulation: 07
Presentatio:09


Windows password Recovery Tools 



The Windows password recovery tools are used to recover, or reset lost user and administrator password required to Windows OS.




There are various free windows password Recovery available in a market esliy like Windows 10, Windows 8, 7, Windows vista and windows XP passwords.

There are same steps :

Ophcrack :

With ophcarack is the access to Windows. You just need to visit the site From another computer, Download the free ISO image,  burn it to a CD or a flash drive and then boot from it.

Offline NT Password/ Registry Editor :

It erases your Windows password instead of Recovering it. You boot the burned disc or flash drive created with the offline NT password/ Registry Editor ISO file.


Kon-Boot :

With kon-Boot,  you need to just burn the program to a disc or USB drive/ boot from it.

There are so many types of software :

- Cain and Abel
- LCP
- Trinity Rescue Kit
- John the Ripper
- Hiren Boot CD



HIREN BOOT CD 



Hiren boot CD is an all in one CD drive solution that contains a load of useful tools that  can be used in hard drive failure, virus infections, partitioning, password and data recovery. 




To use Hiren's boot CD :

- To download and burn the downloaded ISO file into a CD.
- Put the CD in the drive and restart your computer.


Precautions :

To maintain organization  security



- Download from publishers site.
- Scan before installing.
- Watch out PUPs.
- Follow the IT Standard Policy.


Question :

1. What is password Recovery tools ?
2.What is the Ophcarack?
3. How many types of software ?
4. What is the Hiren boot CD ?
5. What is the Precautions ?



Thursday, 1 February 2018

DESKTOP/LAPTOP SECURITY SETTING AND OS PASSWORD RECOVERY


Name of Student :Aashu pasi
   Name of faculty : Jyoti Mam
   Name of course : JCHNE+CLOUD V1
                   Roll No : JK-ENR-SW-1720




Softcopy

Blog: 08
GW/TPS:01
Mindmap :03
Simulation: 07
Presentatio:09



Desktop/Laptot Security Settings 


WEBSENSE


The websense lnc.  Offers desktop security solutions for clients workstation  laptop, and other endpoint devices to prevent from data loss inbound Wed threats. When the devices are outside corporate network. 



ENDPOINT CLIENTS 

- Remote Filtering Clinent. 
- Websense Web Endpoint. 
- Websense Data Endpoint. 

REMOTE FILTERING 

Websense web Filter Web Security and web Security Gateway ( anywhere)  customers can use remote filtering software to monitor and filter Internet activity. 






A Web Security all deployment includes Web Security. Web security Gateway and web Security Gateway Anywhere features. 

In Remote filtering software 

- Remote filtering clients is installed on each endpoint device. 
- Remote filtering service resides inside the network and acts as a proxy to Websrnse filtering service. 


WEB ENDPOINT 

In Web security Gateway Anywhere deployments Websense Web Endpoint can be used to secure client machine. 



- Provides transparent authentication. 
- Enforce the use of hybrid filtering policies. 
- Passes the authentication details to the hybrid service. 

BITLOCKER 





- The Bit locker is a full  disk encryption tool built in Windows vista,  7,8,pro and windows 10 version as well as windows server and later 
- Offers an easy secure confidential data by encrypting your drivers. 
- Support AES (128 and 256-bit)  encryption. 
- Primarily used for whole - disk encryption. 


Steps to use Bit locker :





1. Click Start , click Control Panel, click System and Security (if the control panel items are listed by category), and then click BitLocker Drive Encryption.

2. Click Turn on BitLocker.

3. turn on BitLocker
BitLocker scans your computer to verify that it meets the system requirements.
If your computer meets the system requirements, the setup wizard continues with the BitLocker.

4. message to remove CDs, DVDs, or USB drives and then shut down
Turn your computer back on after shutdown. 

5. restart message
If your computer shuts down again, turn it back on.
The BitLocker setup wizard resumes atomically. Click Next.

6. BitLocker wizard resumes
When the BitLocker startup preferences page is displayed, click Require a PIN at every startup.

7. BitLocker startup preferences
Enter a PIN from 8 to 20 characters long and then enter it again in the Confirm PIN field..

8. set PIN
To store your recovery key, select Print the recovery key and then click Next.


9. select where you want to store your recovery key
Print a copy of your recovery key.

10. print recovery key
You will be prompted to restart your computer to start the encryption process. You can use your computer while your drive is being encrypted.

Question :

1. What is the Websense? 
2. what is the Endpoint clients? 
3. what is Remote Filtering? 
4. What is the Bitlocker? 
5. How many types of steps of Bitlocker?