Download presentation
Presentation is loading. Please wait.
Published byWilliam Quinn Modified over 9 years ago
1
Practical Lecture 1 Dr. John P. Abraham Professor UTPA
2
Chapter 1 Dealt with setting up networks
3
Chapter2 Process Explorer Starting a program remotely. –I might ask you how to do this on the test Killing a process tree – why? Signed and unsigned programs –Know how to check for this and the differences Validating downloaded program using winSCP Installing active directory domain services
4
Chapter 3 Windows 2008 Security configuration Wizard. –New security policy creation –Rolling back security configurations –Creating a security template Applying security settings from a template –Analyzing security configurations –Auditing object access
5
Chapter4 DNS Old way – look up file on each machine called the host file
6
Host file C:\Windows\System32\drivers\etc # Copyright (c) 1993-2006 Microsoft Corp. # # This is a sample HOSTS file used by Microsoft TCP/IP for Windows. # # This file contains the mappings of IP addresses to host names. Each # entry should be kept on an individual line. The IP address should # be placed in the first column followed by the corresponding host name. # The IP address and the host name should be separated by at least one # space. # # Additionally, comments (such as these) may be inserted on individual # lines or following the machine name denoted by a '#' symbol. # # For example: # # 102.54.94.97 rhino.acme.com # source server # 38.25.63.10 x.acme.com # x client host 127.0.0.1 localhost ::1 localhost
7
Detecting unautherized changes to system files md5deep Installing IIS and FTP service –Learn to use FTP services Wireshark Capturing and analyzing telnet traffic
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.