IT Questions and Answers :)

Wednesday, November 20, 2019

An application won't close on an Android phone. You've tried to Force Stop, but it doesn't work. What should you do next?

An application won't close on an Android phone. You've tried to Force Stop, but it doesn't work. What should you do next?

  • Soft reset the device
  • Hard reset the device
  • Stop the service in Running Services
  • Bring the device to an authorized service center 
An application won't close on an Android phone. You've tried to Force Stop, but it doesn't work. What should you do next?

EXPLANATION

Soft reset is one of the easiest ways you can rest your Android device. A soft reset means turn off your device and restart, it will shut all functions of your device and start it all over again. Doing this always refreshes your device clearing all running applications, which frees up the random access memory. It often increases functionality and does not affect your data.

Android apps can be stopped in three ways:
  1. Closing the app from the recent list (but this does not stop background services)
  2. Manually going to the 'Running Applications' setting and stopping the app or background process
  3. Force stopping the app
When method 1 and 2 mentioned above are used to end the application the onDestroy() method is called. In simple words, the application is closed with proper care and the programmer can do whatever they want before closing the app. So whenever the app is stopped in this way, the application is informed so that it can prepare itself to close.
But what if you Force Stop the app?
Well.. If you do this, the application is closed in a harsh way. This will immediately stop all processes (background process and foreground process) belonging to the app without informing it. So the application does not know that it will be stopped so it cannot prepare itself.
Example : If you start WhatsApp and then remove it from the recent list you will still receive notifications.
But if you Force Stop it, you will no longer receive notifications.
In simple words
Regular Stop:— 'Hey man i am going to shoot you. Any last wishes?'
Force Stop:— *Shoots

 

Share:

Which of the following is the first Wi-Fi troubleshooting method you can try on a mobile device?

Which of the following is the first Wi-Fi troubleshooting method you can try on a mobile device?

  • Rename the SSID
  • Use a static IP
  • Power cycle the device
  • Restart Bluetooth 
Which of the following is the first Wi-Fi troubleshooting method you can try on a mobile device?

EXPLANATION

Power cycling an electronic device is a technical way of saying "resetting" it. When you power cycle a device, you turn it off and then turn it back on again. Pretty high-tech, huh? Usually, you should let the device sit for a couple seconds after turning it off to make sure the memory in the device is fully cleared before turning it back on.

Any electronic device can be power cycled, but the term is frequently used with cable modems, DSL modems, and routers. This is because small internal errors in these devices can prevent them from functioning correctly. Resetting them typically fixes the errors and allows them to work correctly again.
Share:

Which of the following conditions can yield a "javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure" message?

Which of the following conditions can yield a "javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure" message?

  • Allow all cryptographic protocols/ciphers, including vulnerable ones, to run on the JVM and server
  • Restricting the JVM and server to use only ONE common protocol/cipher
  • A cryptographic protocol/cipher mismatch between the JVM and the JRE
  • A cryptographic protocol/cipher mismatch between the JVM and server 

Which of the following conditions can yield a "javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure" message?

EXPLANATION

The error message "javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure" is notoriously a signal of an issue between the cryptographic protocols and/or ciphers available on both the server and JVM.
Essentially, the error translates to "None of the cryptographic protocols and ciphers on the server and JVM match" thus the initial "Handshake" between the systems fails.

SOURCE

https://dzone.com/articles/troubleshooting-javaxnetsslsslhandshakeexception-r
Share:

Assuming all features are supported, on a *NIX system, what is the best way to protect an existing $file on an Extended Filesystem (ext#) partition from any changes and set maximum access restriction? (Prompts: $ = non-root user; # = root user.)

Assuming all features are supported, on a *NIX system, what is the best way to protect an existing $file on an Extended Filesystem (ext#) partition from any changes and set maximum access restriction? (Prompts: $ = non-root user; # = root user.)

  • $ chmod 000 $file && chown root:root $file
  • $ chmod 1744 $file && chown root:root $file
  • # chown root:root $file && chmod 1000 $file && chattr +iu $file
  • # chmod 400 $file && chown root:root $file && chattr +i $file 

 

EXPLANATION

chown root:root $file sets the user and group "root" as the owner of the file. chmod 1000 $file sets the sticky bit to 1, which means that only the owner can delete the file, and the zeroes mean that the owner, group, and world (other), respectively, have no access permissions on the file.
A component of the e2fsprogs package, chattr +iu sets the file to immutable (+i), so even root cannot change it, and sets the file to undeletable (+u) so that it cannot be deleted.
This answer assumes 1) that the user has permissions to set all flags & 2) that the +u flag in chattr is supported by the Linux kernel and the filesystem on which the file is written.
For documentation, see:
https://docs.oracle.com/cd/E19683-01/816-4883/secfile-69/index.html
http://permissions-calculator.org/
Note: for more realistic (real-world) command-line options, one would allow root to read the file with chmod 1400; and since chattr +i sets the file to immutable, it will not be deletable, so chattr +u is unnecessary.
Share:

Sunday, November 17, 2019

The Betamax was to VHS, as

The Betamax was to VHS, as

  • Terminate and Stay Resident is to Internal OS Commands
  • Switching is to Routing
  • Token-Ring is to Ethernet
  •  DASD is to SAN
The Betamax was to VHS, as

EXPLANATION

One one time in the 1980s Ethernet and Token-Ring were very competitive, vying for the same customers and networks,
replacing Arcnet (similar to Token-Ring) an older network topology.  Speed and reliability of Ethernet versus Token-Ring was the difference maker, and eventually Token-Ring is no longer used nor supported.

SOURCE

http://www.eweek.com/networking/30-years-ago-networking-in-the-1980s-meant-ethernet-vs.-token-ring

Share:

Friday, November 15, 2019

In terms of Internet Security, what is CEO Fraud?

In terms of Internet Security, what is CEO Fraud?

  • A Phishing email directed at a CEO or executive within a CEO's office
  • When a CEO embezzles from their company
  • A criminal who impersonates a supervisor or other high ranking individual in a phishing attempt
  • A CEO who impersonates someone to attain private information 

In terms of Internet Security, what is CEO Fraud?

EXPLANATION

Cyber criminals have developed a new attack called CEO Fraud, also known as Business Email Compromise (BEC).
In these attacks, a cyber criminal pretends to be a CEO or other senior executive from your organization. The criminals send an email to staff members like yourself that try to trick you into doing something you should not do. These types of attacks are extremely effective because the cyber criminals do their research. They search your organization’s website for information, such as where it is located, who your executives are, and other organizations you work with. The cyber criminals then learn everything they can about your coworkers on sites like LinkedIn, Facebook, or Twitter. Once they know your organization’s structure, they begin to research and target specific employees.

SOURCE

https://securingthehuman.sans.org/resources/national-cyber-security-awareness-month

Share:

Monday, November 11, 2019

What does this PowerShell command do: Get-Service *spool* | Restart-Service

What does this PowerShell command do: Get-Service *spool* | Restart-Service

  • Restarts any service that has "spool" in its name
  • Restarts the print spooler on the computer [No Custom Service This would be correct]
  • Restarts all services on the computer
  • Restarts the print spooler on the print server 
What does this PowerShell command do: Get-Service *spool* | Restart-Service

EXPLANATION


PS C:\Windows\system32> Get-Service *spool*

Status   Name               DisplayName
------   ----               -----------
Running  Spooler            Print Spooler
 

PS C:\Windows\system32> Get-Service *spool* | Restart-Service

Share:

Popular Posts