IT Certification and Training Blog

The Seven Layers of Networking – Part III

Apr 2, 2014 9:27:00 AM / by Kelson Lawrence posted in The Internet Layer, The Network Access Layer, The Seven Layers of Networking – Part III, The Transport Layer, The Application Layer, Inter-Layer and Intra-Layer Communication

3 Comments

By Kailin Acheson

The previous two parts of this blog, Part I and Part II, covered the seven layers of the Open Systems Interconnection (OSI) model. This installment will cover the four layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) model and contrast the TCP/IP model with the OSI model.

Read More

The Seven Layers of Networking – Part II

Mar 25, 2014 2:29:00 PM / by Kelson Lawrence posted in application layer, encapsulation within layers, presentation layer, Seven Layers of Networking Part 2, session layer

3 Comments

By Kailin Acheson

In Part I of The Seven Layers of Networking blog, John began a discussion about the layers of the Open Systems Interconnection (OSI) model. The first four layers, which you can read about in that blog, are the Physical layer, the Data Link layer, the Network layer, and the Transport layer. In network discussions, you'll most often encounter the first four layers. The final three layers, the Session layer, the Presentation layer, and the Application layer, are not as commonly discussed but are still essential to a network. This blog will cover those three layers and the encapsulation process that occurs when one host communicates with another. Then you'll have to stay tuned for Part III, which will cover a related-yet-different layered model, the Transmission Control Protocol/Internet Protocol (TCP/IP) model.

Read More

.NET Quest, Part IV: Installing Boson Software in Oracle VirtualBox

Mar 19, 2014 9:04:00 AM / by Kelson Lawrence posted in .NET Quest

0 Comments

By James Hanback

Very few Sierra On-line adventure games from the 1980s and early 1990s contained the kind of first-person shooter action that would later come to dominate the PC gaming landscape. Mostly, the Sierra adventure gamer had to rely on his or her wits, knowledge, and perhaps the printed manual to piece together the clues that would eventually lead to the game’s solution. Some games, like Police Quest, required some real-life knowledge of police procedure to even get past the parking lot of the fictional Lytton, Calif., police station. Others, like Conquests of Camelot, required some research into arcane flower symbolism (which was helpfully documented in the game’s printed manual, the Liber Ex Doctrina). Similarly, you might find that you need to rely a little more on your own knowledge of your computer hardware to complete this phase of our adventure as we restore our game from the previous three posts and continue our quest to use Boson software in a non-Windows environment.

Read More

MS Windows 7 Tips and Tricks | 2.8.4 EFS – Part 2

Mar 5, 2014 8:25:00 AM / by Kelson Lawrence posted in file encryption key, Encrypting File System

0 Comments

2.8.4 EFS – Part 2

By Val Bakh

In part 1 of the blog post about Encrypting File System (EFS), we described how EFS works, in common-sense terms, using a story of your attempts to secure the door of your house as a convenient example. Now let’s continue this discussion and translate that story into technical terms. We’ll also talk about certificates because they are virtually inseparable from matters related to encryption.

Read More

.NET Quest, Part III: Installing Boson Software in Parallels Desktop for Mac

Feb 18, 2014 4:19:00 PM / by Kelson Lawrence posted in .NET Quest, Mac

0 Comments

By James Hanback

As 1980s home computing graphics technology improved and paved the way for the early 1990s, so did the animated graphical adventure worlds created by Sierra On-Line grow more detailed and artistically rendered. By the time the first King’s Quest was unleashed upon the world, Color Graphics Adapter (CGA) technology had given way to Enhanced Graphics Adapter (EGA) technology. By the early 1990s, EGA gave way to Video Graphics Array (VGA) technology. More pixels and more colors meant a better level of detail for the gamer. VGA graphics were such an improvement over previous display technologies that Sierra actually rereleased some of its classic games with updated graphics and some modified play. Instead of typing commands to interact with the game, you could use a mouse to select icons or tools that you could apply to the character to make him or her perform actions in the game. However, some gamers—your humble co-adventurer among them—actually preferred the older command interpreter-style play of those first editions.

Read More

.NET Quest, Part II: Installing Boson Software in VMware Fusion

Feb 12, 2014 8:50:00 AM / by Kelson Lawrence posted in .NET Quest, Installing Boson in VMware Fusion

0 Comments

By James Hanback

It probably came as no surprise to the developers of mid-1980s computer role-playing adventure games like King’s Quest that some players might get impatient, frustrated, or just plain stuck while trying to decipher the varied solutions to the puzzles they encountered along the way. In fact, guides to completing such games, known as walk-throughs, became a clever way to make a little bit of additional revenue on the sale of a game. For many games, you could purchase a printed walk-through. Some of them even came with little red cellophane decoders that enabled you to reveal only specific clues to yourself as you followed along, thus allowing you to preserve some of the mystery of playing the game without a guide. Late in the decade, there were also some automated 1-900 hint lines you could call that, for a per-minute fee, would guide you through the particular part of the game that was frustrating you. These days, of course, you can get all the walk-through you need for free on the Internet. Back in 1984, the term Internet had only been around for a couple of years and the world’s first Web browser was still six years away.

Read More

.NET Quest, Part I: Installing Boson Software in a non-Windows Environment

Jan 21, 2014 9:34:00 AM / by Kelson Lawrence posted in Dual Boot, Wine, Virtualization

5 Comments

By James Hanback

If you were ever into mid-1980s computer gaming, you might know about a little graphical computer adventure game called King’s Quest. At the time, the game was developed and distributed by a company known as Sierra On-Line. King’s Quest was a role-playing adventure game, which meant that your goal as player was to guide the main character, Sir Graham, through the three-dimensional computer-generated Kingdom of Daventry. You walked Sir Graham around Daventry (and beyond) by using the keyboard. You made him perform other actions by typing verb and noun combinations or phrases like “take mirror” to gather items you would later use to solve puzzles that eventually (hopefully) enabled you to solve the game’s ultimate objective. Sometimes the game’s interpreter couldn’t figure out what you were telling Sir Graham to do, and those were the times that you’d need to get creative.

Read More

ACL Basics

Jan 14, 2014 3:45:00 PM / by Kelson Lawrence posted in Delana Hallstedt, permit, deny, syntax access-list, ACL basics, dysfunctinoal access control lists, standard ACLs, implicit deny rule

1 Comment

By Delana Hallstedt

If I were to start a conversation with my husband about a “broken ACL,” he would immediately panic and begin searching the Web for evidence that his beloved Megatron was free from injury and that his anterior cruciate ligament (ACL) was in perfect working order. Especially this time of year! Although I’m rather fond of the guy myself, for fantasy football purposes, that’s not the sort of ACL I’d most likely be referring to.

Read More

MS Windows 7 Tips and Tricks | 2.8.3 EFS – Part 1

Jan 9, 2014 8:39:00 AM / by Kelson Lawrence posted in NTFS, Encrypting File System, EFS Part 1

0 Comments

2.8.3 EFS – Part 1

By Val Bakh

As the world of information technology (IT) becomes more and more sophisticated with each passing day, the security of the information that we store on computers has become a major headache. But, just as we occasionally have to go to work while suffering a migraine, we have to accept the pervasive need for IT security. There’s no way around it. It’s like locking the door to your house when you are leaving for work. There’s always the risk that you might misplace your house keys during the day or leave them behind in your office, but leaving the door unlocked is no longer as viable an option as it used to be a few decades ago. Similarly, we have to secure our data. The question is, how? Data security is an extremely complex but fascinating subject area. There are many technologies and methods, which are usually implemented in conjunction with one another to form a multilayered, impregnable (keep your fingers crossed) fortress.

Read More

13 in '13 | Recapping the Year at Boson

Jan 2, 2014 9:10:00 AM / by Kelson Lawrence posted in certification, practice exams, courseware

0 Comments

By Kailin Acheson

2013 has flown by, and 2014 (our 15th anniversary!) is close on its heels. As we start the new year, I thought I'd share my top 13 highlights from the Boson World in 2013.

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

see all

Recent Posts