IT Certification and Training Blog

.NET Quest, Part I: Installing Boson Software in a non-Windows Environment

Jan 21, 2014 9:34:00 AM / by Kelson Lawrence posted in Dual Boot, Wine, Virtualization

5 Comments

By James Hanback

If you were ever into mid-1980s computer gaming, you might know about a little graphical computer adventure game called King’s Quest. At the time, the game was developed and distributed by a company known as Sierra On-Line. King’s Quest was a role-playing adventure game, which meant that your goal as player was to guide the main character, Sir Graham, through the three-dimensional computer-generated Kingdom of Daventry. You walked Sir Graham around Daventry (and beyond) by using the keyboard. You made him perform other actions by typing verb and noun combinations or phrases like “take mirror” to gather items you would later use to solve puzzles that eventually (hopefully) enabled you to solve the game’s ultimate objective. Sometimes the game’s interpreter couldn’t figure out what you were telling Sir Graham to do, and those were the times that you’d need to get creative.

Read More

ACL Basics

Jan 14, 2014 3:45:00 PM / by Kelson Lawrence posted in Delana Hallstedt, permit, deny, syntax access-list, ACL basics, dysfunctinoal access control lists, standard ACLs, implicit deny rule

1 Comment

By Delana Hallstedt

If I were to start a conversation with my husband about a “broken ACL,” he would immediately panic and begin searching the Web for evidence that his beloved Megatron was free from injury and that his anterior cruciate ligament (ACL) was in perfect working order. Especially this time of year! Although I’m rather fond of the guy myself, for fantasy football purposes, that’s not the sort of ACL I’d most likely be referring to.

Read More

MS Windows 7 Tips and Tricks | 2.8.3 EFS – Part 1

Jan 9, 2014 8:39:00 AM / by Kelson Lawrence posted in NTFS, Encrypting File System, EFS Part 1

0 Comments

2.8.3 EFS – Part 1

By Val Bakh

As the world of information technology (IT) becomes more and more sophisticated with each passing day, the security of the information that we store on computers has become a major headache. But, just as we occasionally have to go to work while suffering a migraine, we have to accept the pervasive need for IT security. There’s no way around it. It’s like locking the door to your house when you are leaving for work. There’s always the risk that you might misplace your house keys during the day or leave them behind in your office, but leaving the door unlocked is no longer as viable an option as it used to be a few decades ago. Similarly, we have to secure our data. The question is, how? Data security is an extremely complex but fascinating subject area. There are many technologies and methods, which are usually implemented in conjunction with one another to form a multilayered, impregnable (keep your fingers crossed) fortress.

Read More

13 in '13 | Recapping the Year at Boson

Jan 2, 2014 9:10:00 AM / by Kelson Lawrence posted in certification, practice exams, courseware

0 Comments

By Kailin Acheson

2013 has flown by, and 2014 (our 15th anniversary!) is close on its heels. As we start the new year, I thought I'd share my top 13 highlights from the Boson World in 2013.

Read More

Much Ado About Noting OSPF Area IDs in Dotted Decimal Format

Nov 21, 2013 8:20:00 AM / by Kelson Lawrence posted in Noting OSPF Area IDs in Dotted Decimal Format

0 Comments

By James Hanback

Time for a pop quiz. You have less than one second. Shout out the first term that pops in your head when you examine the following string of characters:

Read More

How to Activate and Use Boson’s Digital CCNA Courseware

Oct 23, 2013 9:51:00 AM / by Kelson Lawrence posted in activating digital CCNA Courseware, javelin reader, activating ccna curriculum

0 Comments

By James Hanback

Back in the early aughts I could sometimes be seen lugging around gargantuan certification study guides that—once I obtained certification—ended up either creating a sizable footprint on my reference shelf or propping my bedroom door open at night. Although printed books have been and always will be a convenient means of carrying information with you, tomes such as certification study guides can be cumbersome to juggle alongside your briefcase, your laptop bag, your lunch, and the various mobile devices you carry along on your daily jaunt through this thing called modern life. Nevermind trying to maintain that balancing act while crossing a busy intersection, trying to jam your car keys into your pocket or purse, and keeping yourself dry of the hot coffee that’s sloshing around in your travel mug.

Read More

MS Windows Tips and Tricks | 2.8.2. Windows Firewall – Part 2

Oct 2, 2013 12:25:00 PM / by Kelson Lawrence posted in Windows Firewall, WF, scope, block edge traversal, part 2, protocols and ports, programs and services, edge traversal

0 Comments

2.8.2. Windows Firewall – Part 2

By Val Bakh

In last month’s blog post about Windows Firewall (WF), we introduced network firewalls and host-based firewalls and explained the general principles of their operation. We also became acquainted with WF, its most important general settings, and two types of rules. Now we’ll discuss both types of WF rules and examine their main settings. We will also consider an example scenario that illustrates how the two types of rules work together.

Read More

The Perils of Default

Sep 17, 2013 2:05:00 PM / by Kelson Lawrence posted in default cisco hardware settings, Perils of Default

0 Comments

Read More

Using Syslog to Stop the Mad Power Cycle

Sep 10, 2013 10:05:00 AM / by Kelson Lawrence posted in Syslog

2 Comments

By James Hanback

If you’ve ever worked a help desk job in a small office environment, you might have unwittingly trained the end users in your company that a simple restart is the magical solution to every problem, from slow performance to a crashing application. It might even clear up your acne and cure that nagging cough you can’t seem to kick. Naturally, you know better. But over the many years that computer systems have entrenched themselves in every niche of our lives, some of the most common problems end users face have been most easily solved—at least in the short term—by a system reboot (or by pressing the Caps Lock key). So the user reboots and, hopefully, moves on.

Read More

NetSim 9 GUI Updates | September 4, 2013

Sep 4, 2013 10:40:00 AM / by Kelson Lawrence posted in separate windows, lab instructions, netmap

2 Comments

By Brian Scheibe and Kelson Lawrence

Quick NetSim 9 GUI update here....The NetSim 9 GUI has recently been updated to include several features that you should find helpful to your studies.

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

see all

Recent Posts