Tinkertool System 4 Reference Manual Ii

Total Page:16

File Type:pdf, Size:1020Kb

Tinkertool System 4 Reference Manual Ii Documentation 0355-1849/2 TinkerTool System 4 Reference Manual ii Version 4.97, April 11, 2018. US-English edition. MBS Documentation 0355-1849/2 © Copyright 2003 – 2018 by Marcel Bresink Software-Systeme Marcel Bresink Software-Systeme Ringstr. 21 56630 Kretz Germany All rights reserved. No part of this publication may be redistributed, translated in other languages, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the prior written permission of the publisher. This publication may contain examples of data used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. The publisher may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Make sure that you are using the correct edition of the publication for the level of the product. The version number can be found at the top of this page. Apple, OS X, iCloud, and FireWire are registered trademarks of Apple Inc. Intel, Pentium and Xeon are registered trademarks of Intel Corporation. ARM is a registered trademark of ARM Limited or its subsidiaries. PowerPC is a registered trademark of IBM Corporation. UNIX is a registered trademark of The Open Group. Conduit is a trademark of Conduit Ltd. Genieo is a trademark of Genieo innovation Ltd. Twitter is a trademark of Twitter, Inc. Facebook is a trademark of Facebook, Inc. LinkedIn is a trademark of LinkedIn Corpora- tion. Sina Weibo is a trademark of Sina Corporation. Tencent Weibo is a trademark of Tencent Holdings Ltd. Trademarks or service marks are used for identification purposes only. This product includes artwork from Corel Corporation which is protected by the copy- right laws of the US, Canada and elsewhere. Used under license. Main text typeset with Fontin Sans, a font by Jos Buivenga (exljbris Font Foundry). Contents 1 Introduction 1 1.1 What is TinkerTool System 4? . 1 1.1.1 About the different functional areas of TinkerTool System 4 . 2 1.1.2 System Requirements . 3 1.2 The First Launch of the Application . 3 1.2.1 Changing the Security Policy . 4 1.2.2 Technical Details for Advanced Users . 5 1.2.3 Changing the Authorization Policy . 6 1.3 Basic Operations . 6 1.3.1 The control window of TinkerTool System . 6 1.3.2 Searching for features by keywords . 8 1.3.3 Context Help . 8 1.3.4 The Dock Menu . 9 1.3.5 Fields for file system objects . 9 1.3.6 Understanding when Changes Take Effect . 10 1.3.7 General Preferences . 10 1.3.8 Reverting All Permanent Changes to System Settings . 13 1.3.9 Searching for Software Updates . 14 1.4 System Integrity Protection (OS X El Capitan or later only) . 14 1.4.1 Technical Background . 14 1.4.2 Disabling Protection . 15 1.5 Integrating TinkerTool into TinkerTool System 4 . 16 1.5.1 Enabling Integration . 16 1.5.2 Disabling integration . 17 2 System Maintenance 19 2.1 The Pane Maintenance . 19 2.1.1 System Optimization . 19 2.1.2 Clear Directory Cache . 20 2.1.3 Locate Database . 22 2.2 The Pane Caches . 23 2.2.1 Introduction to caching . 23 2.2.2 Application-Related Caches (OS X Yosemite only) . 24 2.2.3 Unprotected and Protected Caches (OS X El Capitan only) . 26 iii iv CONTENTS 2.2.4 Using the Cache Maintenance Functions . 26 2.2.5 Font Caches . 28 2.2.6 Startup Driver Cache . 30 2.2.7 XPC Cache . 31 2.3 The Pane Diagnostics . 31 2.3.1 Evaluate RAM Size . 31 2.3.2 Test Finder Copy . 37 2.3.3 Inspecting Optical Disks . 40 2.3.4 Check Time Machine . 42 2.4 The Pane Emergency Tool . 45 2.4.1 Introduction to the standalone utility . 45 2.4.2 Installing the Standalone Version . 46 2.4.3 Removing the Standalone Version . 46 2.4.4 Using the Standalone Version . 46 2.5 The Pane Legacy Features . 47 2.5.1 Periodic Tasks . 47 2.5.2 Code Thinning . 49 2.6 The Pane Info . 55 2.6.1 System Information . 55 2.6.2 Malware Protection . 58 2.6.3 App Blacklist . 60 2.6.4 Driver Blacklist . 62 2.6.5 Logs and Reports . 64 3 File Operations 69 3.1 The Pane Files . 69 3.1.1 Link . 69 3.1.2 Protection . 71 3.1.3 Attributes . 72 3.1.4 Quarantine . 74 3.1.5 Contents . 75 3.1.6 Delete . 76 3.1.7 Trash . 78 3.1.8 Extended Attributes . 79 3.2 The Pane Clean Up . 81 3.2.1 General Policy when Deleting Files . 81 3.2.2 Hidden Support Files . 82 3.2.3 Log Archives . 84 3.2.4 Crash Reports . 86 3.2.5 Orphaned Files . 87 3.2.6 Aliases . 89 3.2.7 Removable Disks . 91 3.2.8 Core Dumps . 93 3.3 The Pane Languages . 93 3.3.1 Remove language support . 93 3.4 The Pane Applications . 99 CONTENTS v 3.4.1 Uninstallation Assistant . 99 3.4.2 Let TinkerTool System search for components . 99 3.4.3 Security Check . 103 3.4.4 Remove Adware . 107 3.5 The Pane ACL Permissions . 109 3.5.1 Introduction to Permissions . 109 3.5.2 POSIX Permissions . 110 3.5.3 Additional Permission Markers . 111 3.5.4 Access Control Lists . 112 3.5.5 Show or Set Permissions . 116 3.5.6 Effective Permissions . 121 3.5.7 Special Permissions . 121 4 System Settings 125 4.1 The Pane System . 125 4.1.1 Drives . 125 4.1.2 Volumes . 127 4.1.3 Spotlight . 129 4.1.4 Network . 131 4.1.5 Screen . 135 4.1.6 Preference Panes . 136 4.1.7 SSD (OS X 10.10.4 or later only) . 138 4.1.8 Permission Filter for New File System Objects (OS X 10.10.4 or later only) . 141 4.1.9 Miscellaneous . 143 4.2 The Pane Mobile Settings . 147 4.2.1 Motion Sensor . 147 4.2.2 Wake Up . 148 4.2.3 Safe Sleep . 148 4.3 The Pane Startup . ..
Recommended publications
  • Automatic Classifying of Mac OS X Samples
    Automatic Classifying of Mac OS X Samples Spencer Hsieh, Pin Wu and Haoping Liu Trend Micro Inc., Taiwan TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information Contents and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted 4 upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing Introduction herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy 6 is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to Mac OS X Samples Dataset the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. 10 Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as Classification of Mach-O Files to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. 11 Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, Malware Families indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, use of, or inability to use, or in connection with the use of this document, or any errors or omissions in the content 15 thereof.
    [Show full text]
  • Mac OS X Server Administrator's Guide
    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
    [Show full text]
  • Nextcloud User Manual Release Latest
    Nextcloud User Manual Release latest The Nextcloud developers May 16, 2021 Contents 1 Nextcloud latest user manual introduction1 2 What’s new for users in Nextcloud latest3 3 The Nextcloud Web interface7 3.1 Web browser requirements........................................7 3.2 Navigating the main user interface....................................8 4 Files & synchronization 11 4.1 Accessing your files using the Nextcloud Web interface........................ 11 4.2 Accessing Nextcloud files using WebDAV................................ 17 4.3 Managing deleted files.......................................... 28 4.4 Desktop and mobile synchronization.................................. 29 4.5 Encrypting your Nextcloud files on the server.............................. 29 4.6 File Sharing............................................... 32 4.7 Federated Shares............................................. 36 4.8 Making anonymous uploads....................................... 38 4.9 Large file uploads............................................ 40 4.10 Storage quota............................................... 40 4.11 Version control.............................................. 41 4.12 Projects.................................................. 41 4.13 Transfer Ownership........................................... 44 5 Groupware 47 5.1 Using the Contacts app.......................................... 47 5.2 Using the Calendar app......................................... 50 5.3 Synchronizing with Android....................................... 58 5.4 Synchronizing
    [Show full text]
  • Tinkertool System 7 Reference Manual Ii
    Documentation 0642-1075/2 TinkerTool System 7 Reference Manual ii Version 7.5, August 24, 2021. US-English edition. MBS Documentation 0642-1075/2 © Copyright 2003 – 2021 by Marcel Bresink Software-Systeme Marcel Bresink Software-Systeme Ringstr. 21 56630 Kretz Germany All rights reserved. No part of this publication may be redistributed, translated in other languages, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the prior written permission of the publisher. This publication may contain examples of data used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. The publisher may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Make sure that you are using the correct edition of the publication for the level of the product. The version number can be found at the top of this page. Apple, macOS, iCloud, and FireWire are registered trademarks of Apple Inc. Intel is a registered trademark of Intel Corporation. UNIX is a registered trademark of The Open Group. Broadcom is a registered trademark of Broadcom, Inc. Amazon Web Services is a registered trademark of Amazon.com, Inc.
    [Show full text]
  • ® Apple® A/UXTM Release Notes Version 1.0 Ii APPLE COMPUTER, INC
    .® Apple® A/UXTM Release Notes Version 1.0 Ii APPLE COMPUTER, INC. UNIBUS, VAX, VMS, and VT100 are trademarks of Digital © Apple Computer, Inc., 1986 Equipment Corporation. 20525 Mariani Ave. Cupertino, California 95014 Simultaneously published in the (408) 996-1010 United States and Canada. Apple, the Apple logo, APPLE'S SYSTEM V AppleTalk, ImageWriter, IMPLEMENTATION A/UX LaserWriter, Macintosh, RELEASE 1.0 RUNNING ON A MacTerminal, and ProDOS are MACINTOSH II COMPUTER registered trademarks of Apple HAS BEEN TESTED BY THE Computer, Inc. AT&T-IS' SYSTEM V VERIFICATION SUITE AND Apple Desktop Bus, A!UX, CONFORMS TO ISSUE 2 OF EtherTalk, and Finder are AT&T-IS' SYSTEM V trademarks of Apple Computer, INTERFACE DEFINITION Inc. BASE PLUS KERNEL Ethernet is a registered EXTENSIONS. trademark of Xerox Corporation. IBM is a registered trademark, and PC-DOS is a trademark, of International Business Machines, Inc. - ITC Avant Garde Gothic, ITC Garamond, and ITC Zapf Dingbats are registered trademarks of International Typeface Corporation. Microsoft and MS-DOS are registered trademarks of Microsoft Corporation. NFS is a registered trademark, and Sun Microsystems is a trademark, of Sun Microsystems, Inc. NuBus is a trademark of Texas Instruments. POSTSCRIPT is a registered trademark, and TRANSCRIPT is a trademark, of Adobe Systems Incorporated. UNIX is a registered trademark of AT&T Information Systems. Introduction to A/UX Release Notes, Version 1.0 These release notes contain late-breaking information about release 1.0 of the A!UXI'M software for the Apple® Macintosh® II computer. This package contains two kinds of materials: o Specific information that was not available in time to be incorporated into the printed manuals.
    [Show full text]
  • Mac OS X: an Introduction for Support Providers
    Mac OS X: An Introduction for Support Providers Course Information Purpose of Course Mac OS X is the next-generation Macintosh operating system, utilizing a highly robust UNIX core with a brand new simplified user experience. It is the first successful attempt to provide a fully-functional graphical user experience in such an implementation without requiring the user to know or understand UNIX. This course is designed to provide a theoretical foundation for support providers seeking to provide user support for Mac OS X. It assumes the student has performed this role for Mac OS 9, and seeks to ground the student in Mac OS X using Mac OS 9 terms and concepts. Author: Robert Dorsett, manager, AppleCare Product Training & Readiness. Module Length: 2 hours Audience: Phone support, Apple Solutions Experts, Service Providers. Prerequisites: Experience supporting Mac OS 9 Course map: Operating Systems 101 Mac OS 9 and Cooperative Multitasking Mac OS X: Pre-emptive Multitasking and Protected Memory. Mac OS X: Symmetric Multiprocessing Components of Mac OS X The Layered Approach Darwin Core Services Graphics Services Application Environments Aqua Useful Mac OS X Jargon Bundles Frameworks Umbrella Frameworks Mac OS X Installation Initialization Options Installation Options Version 1.0 Copyright © 2001 by Apple Computer, Inc. All Rights Reserved. 1 Startup Keys Mac OS X Setup Assistant Mac OS 9 and Classic Standard Directory Names Quick Answers: Where do my __________ go? More Directory Names A Word on Paths Security UNIX and security Multiple user implementation Root Old Stuff in New Terms INITs in Mac OS X Fonts FKEYs Printing from Mac OS X Disk First Aid and Drive Setup Startup Items Mac OS 9 Control Panels and Functionality mapped to Mac OS X New Stuff to Check Out Review Questions Review Answers Further Reading Change history: 3/19/01: Removed comment about UFS volumes not being selectable by Startup Disk.
    [Show full text]
  • Reporte De Amenazas De ESET Q3
    INFORME DE AMENAZAS TERCER TRIMESTRE 2020 WeLiveSecurity.com @ESETresearch ESET GitHub Contenido Prólogo ¡Bienvenido a la edición del Informe de Amenazas de ESET del tercer 3 HISTORIA DESTACADA trimestre de 2020! Mientras el hemisferio norte se prepara para pasar un invierno azotado por la pandemia, el COVID-19 parece es- 5 NOTICIAS DEL LABORATORIO tar perdiendo fuerza, al menos en el ámbito del cibercrimen. Como la táctica de usar señuelos relacionados con el coronavirus ya no tiene el impacto deseado, los delincuentes parecen haber “vuelto a los modelos clásicos” durante el tercer trimestre de 2020. Sin embargo, hay un área donde persisten los efectos de la pandemia: en el 9 ACTIVIDAD DE GRUPOS DE APT trabajo remoto, con sus numerosos desafíos de seguridad. Esto es especialmente cierto para los ataques dirigidos al Protocolo de Escritorio Remoto (RDP), que crecieron 13 ESTADÍSTICAS Y TENDENCIAS durante todo el primer semestre. En el tercer trimestre, los intentos de ataques al RDP considerando el número de clientes únicos apuntados, aumentaron un 37%. Es probable que el aumento se deba al creciente número de 14 Las 10 principales detecciones de malware sistemas mal protegidos que se fueron conectando a Internet durante la pandemia, y quizá también a que otros delincuentes se inspiraron en las bandas de ransomware y comenzaron a atacar el protocolo RDP. 15 Downloaders La escena del ransomware, seguida de cerca por los especialistas de ESET, tuvo consecuencias inéditas este tri- mestre. Por ejemplo, el ataque de ransomware investigado como homicidio tras la muerte de un paciente porque 17 Malware bancario su hospital quedó inhabilitado.
    [Show full text]
  • Aerohive Release Notes
    Aerohive Release Notes Release Versions: HiveOS 6.1r6 and HiveManager 6.1r6a, StudentManager 1.1r5 Platforms: AP110, AP120, AP121, AP141, AP170, AP230, AP320, AP330, AP340, AP350, BR100, BR200, BR200-WP, BR200-LTE-VZ, SR 2024 series devices; VPN Gateway Appliance, and VPN Gateway Virtual Appliance; HiveManager Online, and all HiveManager Physical and Virtual Appliances. Release Date: June 30, 2014 These are the release notes for HiveOS 6.1r6 firmware, HiveManager 6.1r6a software, and StudentManger 1.1r5 software. These releases contain numerous new and enhanced features, summaries of which are described in the following section. For more detailed descriptions, see the Aerohive New Features Guide. Known issues are described in the "Known Issues" on page 18 section and "Addressed Issues" on page 20 section near the end of this document. Although HiveOS 3.4r4 was the last release for the HiveAP 20 series, HiveManager 6.1r6a can continue to manage all Aerohive platforms. However, you must push full configuration updates to them because some commands have been removed, which would cause delta configuration updates to fail. HiveManager can support full and delta configuration updates to APs, BRs, and SR series devices running HiveOS 5.0, 5.1, 6.0, and 6.1. Memory Increase Required before Upgrading to HiveManager 6.0 or Later Before upgrading HiveManager software on existing HiveManager physical appliances and HiveManager Virtual Appliances to 6.0r1 or later, you must first increase their memory to 3 gigabytes. For instructions about increasing the memory for a physical HiveManager appliance, see the instructions in Memory Upgrade for 1U HiveManager Appliances.
    [Show full text]
  • OS X Support Essentials 10.9 Apple Pro Training Series
    Apple Pro Training Series: OS X Support Essentials 10.9 Apple Pro Training Series Training Apple Pro Network Configuration Locations: One selected by user Automatic Work Home Test Ethernet Wi-Fi Ethernet 2 FireWire VPN Services: Multiple services activate and prioritized based on service order Understand OS X Mavericks underlying technologies, Configurestand-alone and networked Mac Troubleshoot software and hardware issues software components, and industry-standard protocols. computers with step-by-step instructions. using Apple-recommended procedures and tools. OS X Mavericks Supporting and Troubleshooting OS X Support Essentials 10.9 The Apple-Certified Way to Learn This is the official curriculum of the Apple Mavericks 101: OS X The Apple Pro Training Series is both a self-paced Support Essentials 10.9 course and preparation for Apple learning tool and the official curriculum of the Apple Training and Certified Support Professional (ACSP) 10.9 certification— Certification program. Upon completing the course material in this as well as a top-notch primer for anyone who needs to support, book, you can become an Apple Certified Support Professional by troubleshoot, or optimize OS X Mavericks. This guide provides passing the OS X Support Essentials 10.9 Exam. Work through this comprehensive coverage of Mavericks and is part of the Apple book as self-study material or attend a class at an Apple Authorized Pro Training series—the only Apple-certified books on the Training Center. To learn more, please visit training.apple.com. market. Designed for support technicians, help desk specialists, and ardent Mac users, this guide takes you deep inside the Also in the Apple Pro Training Series: Mavericks operating system.
    [Show full text]
  • Malware List.Numbers
    CLASS A - Tested once a month (and as significant updates and samples are available) (95% or higher detection rate) CLASS B - Tested every two months (and if many new samples or significant updates are available) (95 - 85% detection rate) CLASS C - Tested every three months (85-75% detection rate) CLASS D - Tested every six months (75% or lower detection rates) For Comparison, not an actual Antivirus CLASS F - Excluded from future testing (read notes) Notes, comments, remarks, FAQ and everything else. McAfee Endpoint Protection for Malware Family (by year) # Malware Sample Type MD5 Hash Avast 9.0 Intego VirusBarrier X8 10.8 Norman 3.0.7664 ESET 6.0 Sophos 9 F-Secure 1.0 Kaspersky Security 14 G Data AntiVirus for Mac Dr Web 9.0.0 Avira ClamXav 2.6.4 (web version) Norton 12.6 (26) Comodo Webroot 8 Thirtyseven4 Total Security eScan 5.5-7 iAntivirus 1.1.4 (282) ProtectMac 1.3.2 - 1.4 BitDefender 2.30 - 3.0.6681 McAfee Internet Security for Mac* AVG AntiVirus for Mac Dr Web Light 6.0.6 (201207050) Max Secure Antivirus MacBooster X-Protect Gatekeeper Intego VirusBarrier 2013 10.7 Intego VirusBarrier X6 VirusBarrier Express 1.1.6 (79) Panda Antivirus 1.6 Bitdefender (App Store) 2.21 MacKeeper 2.5.1 - 2.8 (476) Panda Antivirus 10.7.6 Trend Micro Titanium 3.0 McAfee Security 1.2.0 (1549) Norton 11.1.1 (2) Trend Micro Smart Sur. 1.6.1101 McAfee VirusScan for Mac 8.6.1 FortiClient 5.0.6.131 Quick Heal Total Sec 1.0 MacScan 2.9.4 McAfee Virex 7.7 (163) Magician 1.4.3 Vipre 1.0.51 Mac Malware Remover 1.1.6 MD5 Hash Mac 1 Price -> Free $39.99 (Internet
    [Show full text]
  • Ipv6ops/Sunset4 Joint Meeting Minutes for Tuesday July 21St
    IPv6Ops/Sunset4 Joint Meeting Minutes for Tuesday July 21st ============================= Minutes: Jason Weil Jabber: Ole Troan Recording at http://ietf93.conf.meetecho.com/index.php/ Recorded_Sessions#V6OPS Slides at https://datatracker.ietf.org/meeting/93/materials.html Opening remarks by Fred Lots of drafts showed up on July 6th which is a problem because there is a rule that you need to discuss on mailing list before you can be added to agenda - so submit earlier and introduce your draft if you want to get on the agenda Gap Analysis for IPv4 Sunset draft Added legacy IPv4-only APIs, some editorial changes Haven’t added DHCP4o6, for v6o clients requiring DHCP(v4) coniguration options. Because it’s not a general-purpose use; client must support DHCP4o6. Ian Farrell: “yet”? Peng: No, don’t plan to incorporate Ian: There’s a mechanism to do it over DHCPv6, don’t need it in the doc. -IanF - there is already ways to disable DHCPv4 -needs a reviewer or two - no volunteers in the room Also need more review of Analysis of NAT64 Port Allocation Methods for Shared IPv4 Addresses IPv6 Design Choices draft Victor presenting Did WGLC, had comments More cleanup still needed. Overview of Diffs Q: Does WG agree on inclusion of Enterprise and/or EIGRP? Jan Zorz - yes to enterprise inclusion and no comment on EIGRP Alain Durand - would be good to have info on enterprise but may be better to have separate document for that instead of including in this doc Victor Kuarsingh: We tried to keep it high level so it applies to both.
    [Show full text]
  • Computer Service Technician- CST Competency Requirements
    Computer Service Technician- CST Competency Requirements This Competency listing serves to identify the major knowledge, skills, and training areas which the Computer Service Technician needs in order to perform the job of servicing the hardware and the systems software for personal computers (PCs). The present CST COMPETENCIES only address operating systems for Windows current version, plus three older. Included also are general common Linux and Apple competency information, as proprietary service contracts still keep most details specific to in-house service. The Competency is written so that it can be used as a course syllabus, or the study directed towards the education of individuals, who are expected to have basic computer hardware electronics knowledge and skills. Computer Service Technicians must be knowledgeable in the following technical areas: 1.0 SAFETY PROCEDURES / HANDLING / ENVIRONMENTAL AWARENESS 1.1 Explain the need for physical safety: 1.1.1 Lifting hardware 1.1.2 Electrical shock hazard 1.1.3 Fire hazard 1.1.4 Chemical hazard 1.2 Explain the purpose for Material Safety Data Sheets (MSDS) 1.3 Summarize work area safety and efficiency 1.4 Define first aid procedures 1.5 Describe potential hazards in both in-shop and in-home environments 1.6 Describe proper recycling and disposal procedures 2.0 COMPUTER ASSEMBLY AND DISASSEMBLY 2.1 List the tools required for removal and installation of all computer system components 2.2 Describe the proper removal and installation of a CPU 2.2.1 Describe proper use of Electrostatic Discharge
    [Show full text]