SYNTHESIZED FROM STAR V LEARNING CENTERS COURSE MATERIALS · JACKSONVILLE, FL
| OS | Type | File System(s) | Key Notes |
|---|---|---|---|
| Windows | Closed-source commercial | NTFS, FAT32, ReFS, exFAT | Most common enterprise OS. Multiple editions (Home/Pro/Enterprise). |
| macOS | Closed-source (Apple) | APFS (modern), HFS+ (legacy) | UNIX-based. Apple hardware only. Proprietary ecosystem. |
| Linux | Open-source, UNIX-derived | ext4, XFS, Btrfs | Standard or rolling release models. Many distros (Ubuntu, Fedora, RHEL). |
| Chrome OS | Google's Linux-based OS | ext4 | Chromebooks only. Cloud-centric. Limited local software. |
| iOS | Apple mobile OS | APFS | iPhone/iPad. Closed, walled garden. More restrictive than Android. |
| Android | Google's Linux-based mobile OS | ext4, F2FS | Open-source core. Multiple manufacturers. More customizable than iOS. |
Key Settings Areas
C:\Windows = OS files. C:\Program Files = 64-bit apps. C:\Program Files (x86) = 32-bit apps. C:\Users\[name] = user profile data.
compmgmt.mscComputer Management — default admin console. Contains Device Manager, Disk Management, Event Viewer, Local Users and Groups, Services, etc.
devmgmt.mscDevice Manager directly.
diskmgmt.mscDisk Management — partition, format, initialize disks.
eventvwr.mscEvent Viewer — view system, application, and security logs.
secpol.mscLocal Security Policy — configure password policies, audit policies, user rights.
services.mscServices console — start, stop, enable, disable Windows services.
taskschd.mscTask Scheduler — automate tasks based on triggers (time, logon, events).
regedit.exeRegistry Editor — view and edit Windows registry (five root hives: HKLM, HKCU, HKCR, HKU, HKCC). Incorrect edits = system instability.
msconfig.exeSystem Configuration Utility — manage startup mode, boot options, startup services. For troubleshooting startup issues.
msinfo32.exeSystem Information — comprehensive hardware/software report. Drivers, firmware, OS version, environment variables, network config.
resmon.exeResource Monitor — advanced real-time monitoring beyond Task Manager. CPU, memory, disk, and network per-process detail.
perfmon.mscPerformance Monitor — counter logs, trace logs, data collector sets for historical performance analysis.
cleanmgr.exeDisk Cleanup — removes temp files, old Windows installs, Recycle Bin contents to reclaim disk space.
dfrgui.exeOptimize Drives (Defragmenter) — defragments HDDs, TRIM operations for SSDs.
certutil to calculate and verify file hashes.
Windows Subsystem for Linux (WSL)Enables running Linux distributions and applications directly on Windows. Enables Bash shell, Linux tools, and development environments without dual-boot.
Navigation & File Management
dirList files and directories. Switches: /a (hidden), /s (subdirectories), /o:n (sort by name), /o:s (sort by size), /o:d (sort by date).
cdChange directory. cd .. = up one level. cd \ = root. cd path = navigate to path.
copy / moveCopy or move files. Syntax: copy Source Destination.
robocopyRobust file copy — handles retries, can copy directory structure, ACLs, timestamps. Switches: /S (subdirs), /E (empty dirs), /xf (exclude files).
md / rdMake directory / Remove directory. rd /s /q removes directory and all contents without prompting.
delDelete files. Does not move to Recycle Bin — permanent deletion.
Disk & System Management
diskpartAdvanced disk and partition management CLI. Commands: list disk, select disk, create partition, format, assign letter. More powerful than Disk Management GUI.
formatCreate a new file system on a drive, erasing all data. Specify file system: format C: /fs:NTFS.
chkdskCheck disk for file system errors and bad sectors. /f = fix errors, /r = recover bad sectors (requires reboot if drive is in use).
sfc /scannowSystem File Checker. Scans for and repairs corrupted Windows system files. Run from elevated command prompt.
shutdown/s = shutdown, /r = restart, /h = hibernate, /l = log off. /t 0 = immediately.
net userManage user accounts from CLI. Create user, reset password, force password change at next login. Example: net user username password /add.
gpupdateForce Group Policy refresh without waiting for next automatic update interval.
gpresultDisplay applied Group Policy settings for the current user and computer. Useful for troubleshooting GPO issues.
regsrv32Register or unregister DLL files. Used when application services fail to start due to missing registered components.
ncpa.cpl (Network Connections). Set static IP or DHCP, DNS servers, gateway. Right-click adapter → Properties → IPv4.
Network ProfilesPrivate (home/work) = discoverable, file sharing enabled. Public = not discoverable, more restrictive firewall. Domain = managed by Group Policy.
UNC PathUniversal Naming Convention. Format: \\ServerName\ShareName. Used to access shared resources. Network Discovery must be enabled on Private profile.
VPN ConfigurationSettings → Network & Internet → VPN. Add VPN connection (built-in client) or use third-party client software.
WWANWireless Wide Area Network. Uses cellular network (3G/4G/5G) via USB adapter or internal module with SIM card. Backup or primary connection for mobile/remote users.
Proxy SettingsSettings → Network & Internet → Proxy. Configure manually or via auto-detect. Proxy caches content and forwards requests. Transparent proxies require no client configuration.
Windows Defender FirewallHost-based firewall. Configured via Settings or wf.msc (advanced). Add exceptions for specific apps, ports, or addresses. Domain, Private, and Public profiles each have independent rules.
ipconfig /allFull IP configuration: IP address, subnet mask, gateway, MAC address, DNS servers, DHCP server, lease info. First step in network troubleshooting.
ipconfig /releaseRelease current DHCP lease.
ipconfig /renewRequest new DHCP lease.
ipconfig /flushdnsClear local DNS resolver cache. Use when DNS changes aren't resolving.
pingTest ICMP connectivity. Sequential ping test: 127.0.0.1 (loopback → TCP/IP stack) → own IP (NIC) → gateway (local routing) → remote IP (WAN routing) → hostname (DNS).
tracertTrace route to destination. Shows each hop and round-trip time. Identifies where connectivity fails along the path.
nslookupDNS query tool. Resolves hostnames to IPs and vice versa. If you can ping by IP but not hostname — DNS problem. Use nslookup to diagnose.
netstatShows active connections and listening ports. Switches: -a (include UDP), -b (show owning process), -n (numeric addresses), -e (Ethernet stats), -s (per-protocol stats).
Boot Sequence
Boot Recovery Tools
regsvr32 to re-register DLL components.
Services Not StartingCheck if disabled. Check dependencies (a required service may be stopped). Verify sufficient privilege to start. Run sfc /scannow if core Windows services affected.
Time DriftSystem clock desynced. Kerberos fails with >5 minute skew. Sync with NTP server (port 123). Check CMOS battery if clock resets after power off.
| Edition | Key Features | Max RAM (64-bit) | Notes |
|---|---|---|---|
| Home | Basic features. No domain join, no Group Policy, no BitLocker, no RDP host. | 128 GB | OEM or retail license. Consumer only. |
| Pro | Domain join, Group Policy Editor, BitLocker, RDP host, Hyper-V, Windows Sandbox. | 2 TB | Business standard. Most common in enterprise desktops. |
| Enterprise | All Pro features + DirectAccess, AppLocker, Credential Guard, App-V, BranchCache. | 2 TB | Volume license only. Largest organizations. |
| Education | Based on Enterprise. For educational institutions. | 2 TB | Requires institutional agreement. |
unattend.xml). Provides answers to all setup prompts without human interaction. Used for mass deployments.
Network-Based / PXEBoot from network via DHCP + TFTP. Downloads OS image from deployment server. Requires no physical media. Scales to hundreds of machines simultaneously.
MultibootMultiple OSes installed on one computer. Each OS requires its own partition. Boot menu appears at startup to select OS. Consider partition layout carefully before setup.
Repair InstallReinstalls Windows while preserving user data and apps. Used when OS files are corrupted. Run from installation media, choose "Repair your computer."
Navigation & File Management
lsList directory contents. ls -la shows all files including hidden, with permissions and details.
cdChange directory. cd ~ = home directory. cd / = root. cd .. = up one level.
pwdPrint working directory. Shows current path.
cpCopy files or directories. cp -r for directories (recursive).
mvMove or rename files/directories.
rmDelete files. rm -r = delete directory and all contents. No Recycle Bin — permanent.
mkdir / rmdirCreate / remove empty directory.
df -hShow disk free space in human-readable format.
du -shShow disk usage of a specific directory.
cat / lessDisplay file contents. less allows scrolling.
grepSearch for patterns in files. grep "error" /var/log/syslog finds error lines in the syslog.
findSearch for files. find /home -name "*.txt"
mount / umountMount or unmount filesystems. /etc/fstab defines filesystems to mount automatically at boot.
User & Permission Management
sudoRun command with superuser (root) privileges. Logs the command. Preferred over su for security.
suSwitch user. su - switches to root with root's environment.
chmodChange file permissions. Symbolic: chmod u+x file. Numeric (octal): chmod 755 file. Owner only can change. Read=4, Write=2, Execute=1.
chownChange file ownership. Requires superuser. chown user:group file.
Permission Formatrwxr-xr-- = Owner(rwx) Group(r-x) Other(r--). Each set: r=read(4), w=write(2), x=execute(1). Octal: 754.
Package Management
apt update → apt upgrade → apt install package → apt remove package. Package files: .deb
DNF (RHEL/Fedora/CentOS)dnf check-update → dnf upgrade → dnf install package → dnf remove package. Package files: .rpm
Network & Process Commands
pingTest connectivity. Ctrl+C to stop (Linux ping runs continuously by default).
tracerouteLinux equivalent of Windows tracert. Traces path to destination.
digDNS query tool. More detailed than nslookup. dig google.com MX queries MX records.
curlTransfer data via URLs. Tests APIs. Downloads files. Supports HTTP, HTTPS, FTP.
ps auxShow all running processes with details.
top / htopReal-time process monitor (similar to Windows Task Manager).
killTerminate a process by PID. kill -9 PID = force kill.
crontab -eEdit scheduled tasks (cron jobs). Format: minute hour day month weekday command. Cron runs every minute, checks all user crontabs.
/System = OS files (protected, do not modify). /Library = system-wide app resources. ~/Library = per-user app data. /Applications = installed apps.
FindermacOS file manager equivalent to Windows File Explorer. Access iCloud Drive, local files, network shares.
System SettingsSettings → System Settings (macOS Ventura+). Configure users, security, network, displays, sound, peripherals, privacy.
Time MachineAutomatic backup to APFS or HFS+ drives. Hourly backups (last 24 hours), daily (last month), weekly (earlier). Oldest deleted when drive full. Can restore individual files or entire system.
FileVaultmacOS full-disk encryption. Requires iCloud or recovery key. Encrypts entire startup drive using XTS-AES-128.
iCloud & ContinuityLink Apple ID to macOS for iCloud sync (files, photos, keychain). Continuity features: Handoff (pass tasks between devices), AirDrop, Universal Clipboard.
App InstallationApp Store (sandboxed, verified) or .dmg files (drag to Applications). Gatekeeper validates apps are signed by identified developers. Notarization provides additional validation.
| Protocol | Encryption | Auth | Status |
|---|---|---|---|
| WEP | RC4 (40/128-bit) | Open / Shared | Broken. Never use. Crackable in minutes. |
| WPA2-PSK | AES-CCMP | Pre-shared key + 4-way handshake | Current standard. Handshake can be captured and cracked offline. |
| WPA3-SAE | GCMP-128 / AES-CCMP | Simultaneous Auth of Equals (SAE) | Strongest. Resistant to offline dictionary attacks. Perfect forward secrecy. |
Enterprise Authentication (802.1X)
wf.msc. Configure rules by port, application, or address. Domain, Private, and Public profiles. Default: block inbound, allow outbound.
EFS (Encrypting File System)File and folder encryption on NTFS volumes. Transparent to the encrypting user — files auto-decrypt on access. Only the encrypting user (and admin with recovery agent) can access. NOT available on Windows Home. Back up EFS certificate or risk permanent data loss.
BitLockerFull volume encryption. Requires TPM 2.0 (preferred) or USB startup key. Requires Windows Pro or higher. BitLocker To Go = BitLocker for removable drives (USB). Recovery key must be backed up (AD, Microsoft account, or print).
AutoRun/AutoPlayLegacy AutoRun auto-executed programs on inserted media — disable to prevent malware. Modern AutoPlay prompts user to choose action — safer but still review settings. Disable AutoRun completely via Group Policy.
Execution ControlTrusted vs untrusted software sources. Only install from vetted, signed sources. AppLocker (Enterprise) restricts which executables can run.
certutil -hashfile filename SHA256). Avoid third-party download sites — common source of bundled malware.
Extensions & Plug-insInstall only from official browser stores. Disable unused extensions. Plug-ins (Flash, Java) largely replaced by HTML5. Each extension is a potential attack surface.
HTTPS & CertificatesPadlock icon = valid TLS certificate. Certificate validates identity of the server. CA (Certificate Authority) issues and signs certs. Enterprise: internal CA certs must be added to browsers.
Private/Incognito BrowsingDoesn't save browsing history, cookies, or form data locally. Does NOT make you anonymous online — ISP, employer, and websites can still see traffic. Does NOT prevent malware.
Clear Cache / Browsing DataRemoves stored cookies, cached files, browsing history. Useful for troubleshooting site issues or clearing sensitive session data.
Browser HardeningKeep browser patched. Use ad blockers. Enable DNS over HTTPS (DoH). Disable password saving if using a password manager. Configure cookie settings. Enterprise: manage via Group Policy (GPMC).
Common Malware Symptoms
Deployment Models
| Type | What's Backed Up | Archive Bit | Backup Speed | Restore Speed |
|---|---|---|---|---|
| Full | All selected data regardless of previous backup | Cleared | Slowest | Fastest (1 set) |
| Incremental | Changed since last backup (full OR incremental) | Cleared | Fastest | Slowest (full + all incrementals) |
| Differential | Changed since last FULL only | NOT cleared | Moderate (grows over time) | Moderate (full + latest diff) |
Backup Best Practices
Power Issues & Mitigations
| Language | Extension | Platform | Notes |
|---|---|---|---|
| Bash | .sh | Linux / macOS | Set execute: chmod +x script.sh. Run: ./script.sh. Comment: #. Shebang: #!/bin/bash. |
| PowerShell | .ps1 | Windows (also Linux/macOS) | Cmdlets use Verb-Noun format (Get-Process, Set-Item). Edit in PowerShell ISE or VS Code. Comment: #. |
| Batch | .bat / .cmd | Windows (legacy) | CMD-based. Simple automation. Comment: REM. Limited compared to PowerShell. |
| VBScript | .vbs | Windows | Legacy. Runs via wscript.exe or cscript.exe. Comment: ' (apostrophe). |
| Python | .py / .pyw | Cross-platform | Python 3 current standard (Python 2 EOL 2020). Interpreter-based. Comment: #. |
| JavaScript | .js | Browsers / servers | Web scripting. Node.js for server-side. JXA for macOS automation. |
Core Script Constructs
NAME="value" (no spaces). PowerShell: $name = "value". Reference with $NAME (Bash) / $name (PS).
Comments# in Bash, PowerShell, Python. REM in Batch. ' in VBScript. Comments are not executed — used for documentation.
Shebang (#!)First line of Unix scripts. Specifies interpreter. #!/bin/bash. NOT a comment despite starting with #.
Control FlowIf/else (conditional branching). For/while/until loops (repetition). Prevent infinite loops — always include an exit condition.
OperatorsComparison: ==, !=, <, >. Logical: && (AND), || (OR).
Scripting Best Practices