IT Certification and Training Blog
2.7.2 AppLocker (part 2)
By Val Bakh
In last month’s blog post about AppLocker, we covered the basics of using AppLocker. Now let’s consider a few examples of AppLocker use that might help you avoid unexpected and sometimes unpleasant situations.
By Tim Charlton
What’s the difference between 32-bit and 64-bit computing?
If you’re in the market for a new computer, or perhaps just a new operating system (OS), you’ve likely noticed designations such as x86, x64, 32-bit, or 64-bit. What do these designations mean, and how do they relate to your next technology purchase? Simply put, these designations indicate the amount of data that a computer system can process at any given time.
When you use the Boson Exam Environment (BEE) for an ExSim-Max or a Marketplace practice exam, you can incorporate several available customization options – these deliver a customized exam experience and allow you to take the exam in a way that works best for your study goals.
By Kailin Acheson
In Part 1 of the Device Access Modes blog, we looked at some fundamentals: switches, routers, and access modes. To recap those modes quickly, user EXEC mode is represented by the Switch> prompt (or similar) and does not allow configuration changes. Privileged EXEC mode is represented by the Switch# prompt (or similar) and does allow configuration changes.
By John Oden
It is 2013, and the last of the unallocated IPv4 address space was handed out by the Internet Assigned Numbers Authority (IANA) several years ago. The IT industry has been contemplating the looming depletion of the IPv4 address space since the early 2000s. Back in 2003, one would have thought that by 2013, we would be well on our way with the deployment of IPv6, which would once and for all eliminate the scarcity of available global IP addresses. Except that we're not. Not well on our way with the global deployment of IPv6, that is.
By Kailin Acheson
It's been said that legendary coach Vince Lombardi once stood in front of his team of professional football players and stated, "Gentlemen, this is a football." That is starting at the beginning, with the fundamentals. Today we are going to discuss some fundamentals of networking: switches, routers, user EXEC mode, and privileged EXEC mode.
By Thomas Chipman
“The network is slow” … four little words that are the bane of every network administrator. You will find that no matter how well a network design meets an organization’s current or projected needs, the day will surely come when those four dreaded words will find their way into a trouble ticket. If anecdotal evidence is to be believed, you will most likely hear those four words about 12 minutes before you had planned to head out for a weekend getaway; and they are usually uttered by your CEO as she is standing in your doorway with her laptop. Well, today’s that day and she isn’t going to leave your office until you’ve worked your magic. After all, that IS why she made YOU senior vice architect of network engineering.
By John Oden
It’s difficult to have a conversation about networking without hearing someone refer to this layer or that layer. If you talk for more than a few minutes, you’ll soon hear someone say this device operates at Layer X or that device operates at Layer Y. We often begin these conversations assuming that everyone knows what these layers are and how they relate to the issues being discussed.