Your Cart

1-3 Concepts 101

On Sale
$0.00
Free Download
Added to cart
Table of Contents
When you first enter, get a holistic idea of what's going on......................................................................2
Narrowing It Down....................................................................................................................................4
Keys to Understanding the Client..............................................................................................................5
Clarifying Concepts...................................................................................................................................6
Review: The Four New Threats............................................................................................................7
Legalized Spyware................................................................................................................................7
Update Attacks......................................................................................................................................7
Hostageware/Ransomware/Cryptolocker..............................................................................................8
Support Scams.......................................................................................................................................9
Tips on Downloading Programs..........................................................................................................11
Other Scams!.......................................................................................................................................12
Tech Concepts..........................................................................................................................................13
Types of hard drives............................................................................................................................13
File tree/hierarchy/folder structure......................................................................................................13
Filesystems..........................................................................................................................................14
32 vs. 64 Bit Processor Architectures..................................................................................................14
Surge protection & UPS Devices........................................................................................................15
Device Drivers.....................................................................................................................................15
Tiny Issues...........................................................................................................................................15
Nifty Keyboard Shortcuts....................................................................................................................15
The Industry & Design.............................................................................................................................16
The Chi Square of Reliability..............................................................................................................17
Rental Software...................................................................................................................................18
Ultra-centralization and Factory Dependence.....................................................................................18
The Cloud is a One-Way Street...........................................................................................................19
Notification Attacks.............................................................................................................................19
Critical Mass, a.k.a.Ponzi Schemes.....................................................................................................20
DRM....................................................................................................................................................20
Myths & Rumors.................................................................................................................................20
Cloud Control......................................................................................................................................21
Honest Wear & Tear vs "Out of Support"...........................................................................................22
Integration...........................................................................................................................................22
Craigslist..............................................................................................................................................22
Smaller Concepts.....................................................................................................................................23
Why you shouldn't sign in to websites with a major account.............................................................23
Why don't we back up the entire copy of Windows or image the entire hard drive?..........................23
"Salted" Viruses..............................................................................................................................23
Rootkits...............................................................................................................................................24
System Restore....................................................................................................................................24
The Evils of Fake Shutdown...............................................................................................................24
Messaging Protocols............................................................................................................................25
Why having a Microsoft Account is such a threat...............................................................................25Open Source & Eternal Standards.......................................................................................................26
SENSE OF SMELL.................................................................................................................................27
On the Job Training.............................................................................................................................28
Tai Chi Style of Learning....................................................................................................................28
Gray Areas...........................................................................................................................................28
Conquering Anything That Comes Your Way.....................................................................................29
The Art of Fooling Technology...........................................................................................................29
You will get a PDF (552KB) file