Chapter 22. Troubleshooting Desktop and Mobile Operating Systems

This chapter covers the following subjects:

Image Troubleshooting Common Symptoms—Learn the symptoms of problems with Windows, Linux, and OS and discover their solutions in this section.

Image Tools for Troubleshooting Software—Discover additional Windows tools and OS X and Linux repair techniques.

Image Troubleshoot Mobile OS and Application Issues—Find out how to deal with system lockout, issues, when and how to perform soft and hard resets, and uninstall/reinstall apps to solve problems.

Image Troubleshooting PC Security Issues—Learn the symptoms of malware infection, tools you can use to fight back, and a systematic approach to removing infections.

With the widespread use of mobile devices, troubleshooting is now more than just solving problems with computers. However, many of the same principles apply whether solving problems with computers, peripherals, or mobile devices: knowledge of products and operating system functions, understanding of the tools needed to diagnose and repair problems, and a determination to avoid data loss except when unavoidable. This chapter helps you apply these principles.

220-902: Objective 4.1 Given a scenario, troubleshoot PC operating system problems with appropriate tools.

220-902: Objective 4.2 Given a scenario, troubleshoot common PC security issues with appropriate tools and best practices.

220-902: Objective 4.3 Given a scenario, troubleshoot common mobile OS and application issues with appropriate tools.

220-902: Objective 4.4 Given a scenario, troubleshoot common mobile OS and application security issues with appropriate tools.

Foundation Topics

Troubleshooting Common Symptoms

Windows, OS X, and Linux differ in many ways, and in the following sections, you learn how to use each operating system’s features to solve common problems.

Proprietary Crash Screens

The Windows STOP error and the OS X pin wheel are examples of proprietary crash screens. These can be caused by operating system, application, or hardware errors.

Troubleshooting Windows STOP Errors (BSOD)

STOP errors (also known as Blue Screen Of Death or BSOD errors) can occur either during startup or after the system is running. The BSOD nickname is used because the background is normally blue (or sometimes black) with the error message in white text. STOP errors in Windows Vista and Windows 7 resemble the example shown in Figure 22-1. The STOP error is listed by name and number.

Image

Figure 22-1 A Windows 7 STOP error.

In Windows 8/8.1/10, STOP errors now look like the example shown in Figure 22-2. In these versions of Windows, the STOP error is listed by name.

Image

Figure 22-2 A Windows 8 STOP error.


Note

Regardless of when a STOP/BSOD error occurs, your system is halted by default. If the computer does not restart on its own, you must turn off the system and turn it back on. But before you do that, record the error message text and other information so that you can research the problem if it reoccurs. For more information, see the next section, “Causes of BSOD Errors.”


Causes of BSOD Errors
Image

BSOD errors can be caused by any of the following:

Image Incompatible or defective hardware or software—Start the system in Safe Mode and uninstall the last hardware or software installed. Acquire updates before you reinstall the hardware or software. Exchange or test memory. Run SFC/scannow to check for problems with system files.

Image Registry problems—Select Last Known Good Configuration (Windows Vista/7) as described later in this chapter and see whether the system will start. Using System Restore can also be used to revert the system and Registry to an earlier state; see the “System Recovery Options (Windows)” section later in this chapter for details.

Image Viruses—Scan for viruses and remove them if discovered.

Image Miscellaneous causes—Check the Windows Event Viewer and check the System log. Research the BSOD with the Microsoft Support website.

To learn how to start Windows in Safe Mode, see “Safe Mode (Windows),” p.1111, this chapter.

Researching Causes and Solutions

To determine the exact cause of a STOP error, note the number or name of the error (for example, STOP 0x0000007B, or HAL INITIALIZATION FAILED) and look it up at the Microsoft support website: http://support.microsoft.com. When you search for the error, be sure to specify the version of Windows in use.


Note

STOP errors are often referred to with a shortened version of the error code or by name. For example, the short version of a 0x0000007B error is 0x7B.



Tip

Unfortunately, you can’t take a screen capture of a BSOD for printing because a BSOD completely shuts down Windows. However, if you have a digital camera or smartphone handy, it makes a great tool for recording the exact error message. Just be sure to use the correct range setting to get the sharpest picture possible (normal or close-up, often symbolized with a flower icon). Turn off the flash, and use ISO 400 or higher, or Hi ISO to enable handheld shooting in dim light. You can also install NirSoft’s BlueScreenView utility and use it to view any BSOD that already occurred if your system is configured to save a minidump file. Learn more at http://nirsoft.net/utils/blue_screen_view.html.


The solution might involve one or more of the following changes to your system:

Image Changing the system registry. Sometimes, an automated registry repair tool can be downloaded to perform these changes for you. Whether you make the changes manually or automatically, back up the registry first!

Image Removing a newly added component. For example, to solve the error shown in Figure 22-1, I removed a memory module I had just added to my computer.

Image Replacing components such as memory.

Image Upgrading an application.

Image Downloading and installing a hotfix for your operating system.

On some systems, auto restart is enabled for STOP/BSOD errors, so the error message shown in the previous figures appear for only a moment before the computer restarts. For solutions, see the “Spontaneous Shutdown/Restart” section later in this chapter.


Note

Microsoft offers automated registry repair tools sometimes known collectively as “Fix it” to solve various Windows problems. If a registry repair tool is available for a particular problem, the link to it shows up when you search for the problem at the Windows Support website. For example, the results of searching for “problems with Windows security settings” brings up a link to https://support.microsoft.com/mats/malware_prevention. Click the button on the page to fix the problems listed.


OS X Pin Wheel

The official name for the OS X pin wheel is the spinning wait cursor (see Figure 22-3).

Image

Figure 22-3 The OS X pin wheel in OS X El Capitan.

It appears most often when an application or OS X itself has become unresponsive. For this reason, it is sometimes referred to as the “pin wheel of death.”

Image

Some causes of OS X unresponsiveness include:

Image Lack of system RAM—If your OS X device frequently displays the pin wheel and the device’s RAM can be upgraded, do so.

Image Less than 10 percent free space on the OS X system drive—Free space is used as a swapfile to substitute for RAM. Remove unwanted apps and save data to external or cloud storage to free up space. Some experts suggest keeping at least 20 percent of the OS X system drive free.

Image Damaged application—Run Disk Utility using the Verify Disk Permissions option (in OS X versions prior to El Capitan).

Some solutions include:

Image If a particular application causes unresponsiveness, open the ~Library/Preferences folder, find the .plist file for the app, and drag it to the trash. The .plist file will be rebuilt.

Image Use Activity Monitor to view CPU, memory, energy, disk, and networking performance stats. For OS X 10.9 and later, see https://support.apple.com/en-us/HT201464. For OS X 10.8 and earlier, see https://support.apple.com/en-us/HT201538.

Image Upgrade to the latest OS X version and keep it updated.

Image Use the Force Quit command to terminate an application that won’t respond. It’s available from the Apple menu or by pressing Command-Option-Esc. Select the app and click Force Quit.

Failure to Boot

Boot failures (failure to boot) can be caused by incorrect boot configuration in the BIOS, corrupt or missing boot files, and missing driver files. The solutions for these problems vary with the operating system version in use.

Windows Boot Errors

Windows uses the bootmgr and BCD files during the startup process. If these files are corrupted or missing, you will see corresponding error messages:

Image BOOTMGR is missing—This message displays if the bootmgr file is missing or corrupt. This black screen will probably also say Press Ctrl+Alt+Del to Restart; however, doing so will probably have the same results.

Image The Windows Boot Configuration Data file is missing required information—This message means that either the Windows Boot Manager (Bootmgr) entry is not present in the Boot Configuration Data (BCD) store or that the BootBCD file on the active partition is damaged or missing. Additional information you might see on the screen includes File: BootBCD, and Status: 0xc0000034.

Image

There are two ways to repair a missing BOOTMGR file:

Image Boot to the System Recovery Options and select the Startup Repair option. This should automatically repair the system and require you to reboot.

Image Boot to the System Recovery Options and select the Command Prompt option. Type the bootrec /fixboot command, as shown in Figure 22-4.

Image

Figure 22-4 Repairing BOOTMGR.exe from the Windows Recovery Environment’s command prompt.


Note

A hard drive’s lifespan is not infinite. In some cases, it is not possible to repair this file and unfortunately the hard drive will need to be replaced and the operating system reinstalled.


For more about these steps, see https://support.microsoft.com/en-us/kb/2622803.

To repair the BCD store, use this 3-step process:

Step 1. Boot to the System Recovery Options and select the Startup Repair option. This should automatically repair the system and require you to reboot. If not, move on to the second method.

Step 2. Boot to the System Recovery Options and select the Command Prompt option. Type bootrec /rebuildbcd. If the Bootrec.exe tool runs successfully, it presents you with an installation path of a Windows directory. To add the entry to the BCD store, type Yes. A confirmation message appears that indicates the entry was added successfully. Restart the system.

Step 2b. If the Bootrec.exe tool can’t locate any missing Windows installations, you must remove the BCD store and then re-create it. To do this, type the following commands in the order in which they are presented. Press Enter after each command.

Bcdedit /export C:BCD_Backup
ren c:ootcd bcd.old
Bootrec /rebuildbcd

You can find more information on this process at the following link:

Image Windows Vista, 7http://support.microsoft.com/kb/927391 (also works with Windows 8/8.1/10)

Image Windows 7http://support.microsoft.com/kb/2004518


Note

If you want to install two versions of Windows in a multiboot configuration, install the older version first. For example, install Windows 7 first, followed by Windows 8.1 or Windows 10.

Various issues can happen if you attempt to dual boot an older operating system that you installed after a newer version was installed. For example, the first operating system may cease to boot after the second operating system is installed. This could mean that the master boot record was overwritten, along with other issues. Several steps are involved to repair this problem. The initial command in this process, which will restore the MBR and the boot code that transfers control to the Windows Boot Manager program, is X: bootBootsect.exe /NT60 All. X is the drive where the installation media exists. See the following Microsoft Help and Support link for more information on how to manually create an entry into the BCD store for the new operating system and how to troubleshoot this further: http://support.microsoft.com/kb/919529.


If Windows boots to Safe Mode or displays an Advanced Boot Options menu, see the “Safe Mode (Windows)” section later in this chapter for more information.

Can’t Boot Linux

If Linux won’t start normally, hold down the Shift key while starting the system. If the GRUB or GRUB2 boot loader appears, select the entry marked “Rescue” or “Recovery” to load a minimal version of Linux. With some distributions, such as Ubuntu, you might need to select Advanced (see Figure 22-5) before you can select a recovery option (see Figure 22-6).

Image

Figure 22-5 GRUB2 bootloader for Ubuntu offers memory diagnostics as well as access to advanced boot options.

Image

Figure 22-6 Select a Recovery mode.

When Linux is run in Recovery mode, the screen is full of commands (most distros hide startup commands by default). From the Recovery menu (see Figure 22-7), you might be offered a variety of options to fix your system (varies by distribution). If a Linux distribution doesn’t have a menu offering these options, most can be run from the command prompt (might require su or sudo to run).

Image

Figure 22-7 Recovery options in Ubuntu.

Here is more information about the Recovery Menu options in Figure 22-7.

Image resume—Continues normal boot process

Image clean—Frees up space on your file system (use if disk is about full)

Image dpkg—Repairs broken software (use if software installation failed); be sure to enable networking first with network

Image failsafex—Enables system to boot to GUI

Image fsck—Repairs file system errors

Image grub—Updates grub boot loader

Image network—Enables networking, which is turned off in recovery mode

Image root—Opens system in read/write root shell mode (for experts only)

Image system-summary—Displays information about the system

Other startup problems:

Image Some BIOS will not boot to Linux because Linux partitions don’t use the MS-DOS boot flag. To fix the problem, start the system from a Live CD or Live USB drive and open a terminal session. Use the command sudo fdisk /dev/sda and view partition table settings by giving the p (print) command. A bootable partition is marked as a (active). If no partition is marked as active, use the a command to mark this partition as active, save changes with w (write), and restart the system after removing the live CD.

Image If Linux is being installed in a separate disk partition on a system running Windows 8/8.1/10, it is usually necessary to disable the BIOS setting for Secure Boot (also known as Windows 8/10 mode) to enable booting from a Linux USB drive or optical disc. After installation, to boot either Windows 8/8.1/10 or Linux, a new version of the grub bootloader must be installed that adds support for EFI/UEFI with the command sudo apt-get install grub-efi. For more details, see http://askubuntu.com/questions/459979/operating-system-not-found-error-when-booting-from-usb-in-windows-8.

Can’t Boot OS X

To start OS X Lion or later in special startup modes, press Command + R keys as soon as the startup sound plays and hold them down until you are prompted to select a language. Select your language, and the OS X Utilities menu (see Figure 22-8) appears. It includes options to:

Image Restore from Time Machine Backup—Restores the system from a Time Machine backup

Image Reinstall OS X—Reinstalls OS X

Image Get Help Online—Opens online help and remote diagnostics options

Image Disk Utility—Repairs problems with hard drives

Image

Figure 22-8 OS X Utilities Menu.

To boot from a different partition than usual, such as a Boot Camp partition, start up your OS X system and hold down the Alt/Option key until a list of bootable drives appears. Select the drive to use.


Note

Boot Camp is OS X’s multiboot support for Windows.


Improper Shutdown (Windows)

Some startup programs or services might prevent Windows from shutting down properly. To solve improper shutdown problems, use msconfig to perform a clean boot to see whether Windows can shut down correctly. If so, reenable services and programs with msconfig until you determine which service or program is causing a problem.

For details, see http://support.microsoft.com/kb/929135. See “MSCONFIG (Windows)” later in this chapter for more.

Spontaneous Shutdown/Restart

A spontaneous shutdown/restart event usually happens because of a serious problem with the operating system or with hardware. The following sections cover what to do.

Windows STOP (BSOD) Error Automatic Restart

Windows can be configured to automatically restart if a STOP error occurs. When a STOP (BSOD) error happens on a system configured to restart automatically, the system will seem to spontaneously shut down and restart. This problem is sometimes referred to as an Auto Restart Error.

If a system needs to be available at all times and STOP/BSOD errors are rare, it might be preferable to configure the system to restart automatically. (Different versions of Windows enable or disable this option by default.) To change this option, follow these steps:

Step 1. Open the System Properties window. Click or tap Advanced System Settings.

Step 2. Click the Advanced tab.

Step 3. Click Settings under the Startup and Recovery section.

Step 4. To enable auto restart, select the checkbox for Automatically Restart under the System Failure section (see Figure 22-9). To disable auto restart if it is already enabled, clear this checkbox.

Image

Figure 22-9 The Automatically Restart checkbox on the Startup and Recovery dialog determines whether a STOP error halts or restarts the system.


Tip

Spontaneous shutdown/restart can also be caused by a failing power supply. If you disable automatic restart and the system restarts spontaneously anyway, test the power supply. If the voltage on the Power Good line is too high or too low, the system will shut down and restart. For details, see “Multimeter,” p.588, Chapter 13.


OS X Kernel Panic Automatic Restart

In the event of a kernel panic (a Linux and OS X term for the operating system shutting down after a fatal error), OS X reboots to the screen shown in Figure 22-10.

Image

Figure 22-10 A restart after an OS X El Capitan kernel panic.

Press a key to restart. To learn more about reporting a kernel panic, see the “Kernel Panic (OS X/Linux)” section later in this chapter.

To test your system after a kernel panic or any other issue, restart your system and run Apple Diagnostics (systems built in 2013 or later), or Apple Hardware Test (older systems).

On systems with Apple Diagnostics or Apple Hardware Test built in, disconnect external drives, docking stations, and network adapters, open the Apple menu and select Restart. To launch the diagnostics test, hold down the D key while the system restarts. Follow the onscreen prompts to test your system. For more information, see https://support.apple.com/kb/PH21879. For more about kernel panics, see https://support.apple.com/en-us/HT200553.

Device Fails to Start/Detected (Windows)

A device fails to start/detected issue is shown in Device Manager by the device being listed with an error icon, typically a black exclamation mark on a yellow field. When you view the properties sheet for the device, it displays This Device Cannot Start. (Code 10). See Figure 22-11.

Image

Figure 22-11 A Code 10 error for a device in Windows 7 Device Manager.

In most cases, updating the drivers with the Drivers tab solves the problem. If this does not resolve the problem, see http://support.microsoft.com/kb/943104 or search for information about the specific device with an error to learn what to do next.

A device that is detected as an Unknown device has no driver installed. Install the driver, then open Device Manager to see if the device is now working. In some cases, it might be necessary to remove the device before installing the driver, then reconnecting/reinstalling the device after the driver is present.

Missing DLL Message (Windows)

A dynamic link library (DLL) file is a binary file used by Windows or a program. An error message indicating a missing DLL might indicate one of the following problems:

Image File deletion or renaming

Image Damage from virus or malware

Before attempting to fix the problem, check your system for viruses and malware and resolve any detected infections.

If the file is a Windows system DLL, use SFC (System File Checker) to check your Windows files and reinstall a replacement.

If the file appears to be part of an application, use Uninstall a Program in Control Panel to see if there’s a repair option for the program. If this option doesn’t work or is not available, uninstall and reinstall the program.

Services Fail to Start

Services are used by Windows, OS X, and Linux to run important operating system features. Here’s how to detect and solve problems with services.

Windows

Many Windows features, such as the print spooler, wireless network configuration, Windows Search, and others, are run as services. Services are managed through the Services and Applications branch of Computer Management.

A service might not start for the following reasons:

Image Hardware used for the service is not present. For example, wireless network configuration will not run automatically if a wireless adapter is not installed.

Image Other services that are used by the service are not running. In this case, an error such as “The Dependency Service or Group Failed to Start” appears.

Image The service requires login information that has not been provided.

Image The service has stopped due to previous errors and is not configured to restart automatically.

To learn how to manage services, see “Services (Services.msc),” p.764, Chapter 15.

Linux

Linux services that run at startup are referenced in the /etc/rc.conf DAEMONS array. Services that started correctly are shown in the /var/run/daemons/ directory. Compare these to see if any services failed to start.

To troubleshoot a service that didn’t start, open a Terminal session as root and run the service’s command to see if there’s an error message.

OS X

OS X uses a variety of startup settings to configure system processes. For a list, see http://www.dgkapps.com/blog/osx-tips/OSX-Tips-System-Startup-launchd-launch-daemons-startup-items-launch-agents-and-login-items.

To disable loading all of these items for troubleshooting, start OS X in Safe Mode (press the power button while holding down Shift). For more troubleshooting in Safe Mode, see https://support.apple.com/en-us/HT201262.

Compatibility Error (Windows)

Programs written for older versions of Windows might trigger a compatibility error, displaying the This Program Has Known Compatibility Issues dialog when you try to run them. The dialog box lists the program name and location and the program developer and provides you with three choices:

Image Check for Solutions Online—Choose this option to see whether an updated program or a patch is available.

Image Run Program—Windows will run the program, but it is not likely to work.

Image Cancel—Windows will not run the program.

Get an updated version of the program, either by selecting the Check for solutions... option or by manually searching for and downloading an update.

For more solutions, see “Compatibility Mode,” p.681, Chapter 14.

Slow System Performance

Slow system performance can be caused by many issues in Windows, OS X, or Linux. Here are solutions to try.

Windows

Look at the following possible causes and solutions:

Image System not configured for maximum performance—To solve this problem, set the Power setting to High Performance using the Power options icon in the notification area or the Power options in Control Panel. This option is not available on tablets.

Image Drive containing paging file and temporary files is nearly full or badly fragmented—The paging file and temporary files are normally stored on C: (system) drive. If this drive has less than 15 percent free space, performance can suffer. Use Disk Cleanup in drive properties to remove unwanted files, check the drive for errors, and defragment it. If you have more available space on a different drive, use the Advanced tab in System properties to change the location of the paging file and temp files.

Image System is overheating and CPU is running at reduced speed—Remove dust and dirt on the CPU and system fans. Check for adequate airflow through the system. Change back to Balanced power setting.

Image Add RAM—Exceed the minimums recommended for the version of Windows in use for better performance.

Image Check for viruses and malware—Especially important if performance has suddenly plunged.

Image Check for Registry errors—The Piriform CCleaner is widely used for this task.

Image Use the performance troubleshooters in your version of Windows—Search for “performance troubleshooter.”

Linux

To improve system performance, follow these general guidelines:

Image Remove unneeded startup programs—With recent versions of Ubuntu, use the Startup Application manager. With Fedora or other distributions, install GNOME-TWEAK and use its startup application manager.

Image Install more RAM—Exceed the minimums recommended for the version of Linux in use for better performance.

Image Disable unneeded system services—System services are typically located in the /etc/init.d directory (folder). Depending on your distribution, you might have a control center that can be used to disable system services, or you might need to use the Nautilus file manager, right-click a service, go to Properties > Permissions, and unclick the Execute: Allow Executing File as Program. To determine what a particular service does, look it up in the manpages for your distribution.


Note

For many other suggestions, see www.techradar.com/us/news/computing/pc/how-to-speed-up-your-linux-machine-1078475 and www.howtogeek.com/115797/6-ways-to-speed-up-ubuntu/. Using a VM to experiment with speedup strategies is a good idea, as some changes could cause problems if they are used incorrectly. Create a snapshot with your VM manager before trying a speedup tip.


OS X

In addition to following the suggestions in the “OS X Pin Wheel” section of this chapter, try these additional strategies to improve system responsiveness:

Image If your MacBook Pro was built in 2012 or earlier and uses a hard disk, replace it with an SSD. Step-by-step instructions are available at www.cnet.com/how-to/upgrade-your-macbook-install-ssd-hard-drive/.

Image Add more RAM.

Image Use Disk Utility to remove apps you no longer need.

Image Use System Preferences to disable unneeded startup apps.

Image Be sure to install OS X updates as they become available.

Image Remove unwanted Dashboard programs (widgets).

Boots to Safe Mode (Windows)

If Windows Vista/7 does not shut down properly (such as because of a crash, lockup, or power failure), it displays the option to start in Safe Mode the next time the computer starts. You can accept this option or elect to start the system in Normal mode.

Even if you don’t believe there are serious problems with the system, it is usually best to start the system in Safe Mode and then perform the shutdown/restart procedure from the Windows desktop. If there are no serious problems with the system, it usually restarts correctly.

Windows 8/8.1/10 recover from an improper shutdown without user intervention.

File Fails to Open

If a file can be opened from the File, Open menu in an application but not from Windows Explorer/File Explorer, the file extension is not associated with a program. A file association is used by Windows to determine the default file types that will be opened by an app. In this situation, you might not see an error message, or you might see an error message such as

This File Does Not Have a Program Associated with It for Performing This Action. Please Install a Program, or if One Is Already Installed, Create an Association in the Default Programs Control Panel.

In Windows Vista/7, open Default Programs in Control Panel and select Associate a file type or protocol with a program.

In Windows 8/8.1/10, open the Charms menu, and select PC Settings > Search and apps > Defaults > Choose default apps by file type.

Missing GRUB/LILO (Linux)

GRUB or the improved GRUB2 is the most common boot loader in current Linux distributions, while older Linux distributions used LILO. In either case, the loss of the boot loader prevents Linux from starting. Frequently, Linux bootloaders are overwritten because of a Windows installation.

Although missing bootloaders can be restored with manual processes, bootable repair programs are recommended. Some of these include:

Image Boot-repair (https://sourceforge.net/p/boot-repair/home/Home/)

Image Rescatux (www.supergrubdisk.org/rescatux/)

Image SystemRescueCd (www.system-rescue-cd.org/SystemRescueCd_Homepage)

These programs can be installed to a bootable CD or USB flash drive. They work by scanning the drive for operating systems and use that information to recreate GRUB or LILO and its entries, including Windows.

Kernel Panic (OS X/Linux)

In OS X and Linux, a kernel panic is the result of a fatal error that prevents the operating system from continuing. With OS X, when a system restarts after a kernel panic, OS X displays “Your computer was restarted because of a problem.” To continue, click Ignore. To view a report first, click Report. On the next dialog, you have three options: Show Details, Don’t Send, or Send to Apple (default). Click Show Details to see what happened (see Figure 22-12). After reviewing it, you can add a comment, and then click Send to Apple.

Image

Figure 22-12 Reviewing a problem report before sending it to Apple.

With Linux, depending on the distribution and the cause of the kernel panic, you might see a Kernel Panic error message on-screen, or the clues might simply be the Num Lock and Caps Lock indicator lights flashing on the keyboard and a completely unresponsive Linux installation.

Unlike normal shutdowns, which are logged by Linux, a kernel panic itself isn’t logged. By examining Linux log files and viewing the times, you might be able to get some clues about what happened, but this can be frustrating and time-consuming.

Check the following:

Image Was new hardware installed shortly before the kernel panic?—Remove the hardware or update its drivers. Some hardware vendors now provide Linux drivers, so try them instead of open-source versions.

Image Was the system overheating?—Install Psensor (http://www.tecmint.com/psensor-monitors-hardware-temperature-in-linux/) to provide real-time monitoring of system temperature. If a kernel panic occurs again, you will have information about overheating.

Image Was new software installed?—Uninstall it and check for updated versions.

Image Is a stable update to the Linux distribution available?—Install it.

Image Is system memory working properly?—Run a memory test. Some distributions, such as Ubuntu, include Memtest86+ as an advanced boot option. Otherwise, it can be downloaded from www.memtest.org.

Multiple Monitor Misalignment/Orientation

Multiple monitors (displays) are supported by Windows, Linux, and OS X. The following sections discuss how to configure each OS’s support for multiple displays.

Before an additional display can be used by an OS, make sure it is plugged into AC power and a video port and turned on.

Windows

Windows supports dual displays with virtually all recent laptop display hardware as well as with desktop computers with two or more video ports. A USB 2.0 or 3.0 HDMI video dongle can also be added to provide support for an additional display. The additional display can be used as a mirror of the primary display or as an extended desktop running different apps.

To use an additional display with Windows Vista:

Step 1. Right-click an empty area of the desktop and select Personalize.

Step 1a. From the Vista Personalize menu, click Display Settings.

Step 2. If the additional display is not visible, click Detect.

Step 3. To enable the additional display, click it.

Step 4. Click Apply and then click OK ; it mirrors the contents of the primary display. One or both displays might change resolution.

Step 5. To use it as a mirror, click the Extend My Windows Desktop onto This Monitor.

Step 6. Adjust the screen resolution as needed for the second display. To determine usable resolutions, check the documentation for the display.

Step 7. Click Apply and then click OK to use the settings.

To use an additional display on Windows 7/8/8.1/10 using the Display properties sheet:

Step 1. Before turning on the computer, plug in the appropriate video cable to the video port.

Step 2. Turn on the external monitor, TV, or projector.

Step 3. Turn on the computer.

Step 4. Right-click an empty area on the desktop and select Screen Resolution.

Step 5. If the secondary screen is not detected, click Detect.

Step 6. Multiple displays are initially configured as mirrored, and resolutions might be adjusted automatically to enable both displays to run at the same resolution (see Figure 22-13).

Image

Figure 22-13 Additional displays are configured as mirrors of the first display in Windows.

Step 7. To use extended desktop, open the Multiple Displays menu and select Extend These Displays.

Step 8. Click Apply.

Step 9. Select the second display and adjust the screen resolution as needed. To determine usable resolutions, check the documentation for the display.

Step 10. Drag the display to match its location relative to the original display (see Figure 22-14).

Image

Figure 22-14 Using an additional display as an extended desktop in Windows 8.1.

Step 11. Click Apply and then click OK to use the settings.


Note

Windows Vista/7 also include the Windows Mobility Center, which features an option to connect to a projector. With Windows 8/8.1/10, connect the projector, then press Windows key+P to display options to use the second screen (projector) only, duplicate screens, extended desktop, or use PC screen only.


OS X

Using an additional display with OS X:

Step 1. Connect the additional display and turn it on.

Step 2. Open System Preferences > Displays.

Step 3. A window opens for each display. In the Optimize window, you can optimize for the new display, or choose a scaled display from a choice of resolutions (see Figure 22-15).

Image

Figure 22-15 Configuring the display resolutions in OS X.

Step 4. Click the Arrangement tab.

Step 5. By default, the displays are mirrored.

Step 6. Drag the new display to the correct position relative to the original display (which is marked with a menu bar across the top of the icon (see Figure 22-16). The menu bar can be dragged to the additional display if desired.

Image

Figure 22-16 The additional display is now at the left of the original display.

Step 7. To use the additional display as an extended desktop, clear the Mirror Displays checkbox.


Note

By dragging the icon for the additional display to its relative position vis-à-vis the original display, the mouse moves smoothly between displays when you drag an app, and so on.


For more information, see https://support.apple.com/en-us/HT202351 and https://support.apple.com/en-us/HT202780.

Linux

To configure multiple displays in Ubuntu Linux:

Step 1. Open the Settings app and click Display.

Step 2. If only one display is visible, and other displays are plugged in and turned on, click Detect Displays.

Step 3. If a mirrored display is desired, make sure the Mirror box is checked. For an extended desktop, make sure it is not checked.

Step 4. Select each display and adjust its resolution. When running Linux in a VM (as shown in Figure 22-17), displays are listed as “Unknown display.” When running Linux on physical hardware, displays are listed by brand and size.

Image

Figure 22-17 The additional display is at the upper right of the original display.

Step 5. Drag displays into position and click Apply.

Some Linux distributions will not retain multiple monitor alignment positions after restarting. To solve this problem, a startup script that will provide the monitor alignments needs to be created.

A good example for Ubuntu is available from: http://bernaerts.dyndns.org/linux/74-ubuntu/309-ubuntu-dual-display-monitor-position-lost.

For Fedora (and other distributions using KDE or GNOME GUIs), see http://tech.isatya.in/post/9090316930/setting-forcing-changing-fedora-15-screen.

Missing Boot Configuration Data

See the “Windows Boot Errors” section in the “Failure to Boot” section later in this chapter.

Missing Operating System

An Operating System Not Found or Missing Operating System error can be caused by incorrect or missing hard disk settings in the system BIOS/UEFI firmware or by problems with the hard disk’s master boot record (MBR) or GUI partition table (GPT).

Before attempting to repair the MBR or GPT, restart the computer, enter the BIOS setup program, and check the following:

Image Make sure the system drive is correctly identified in the system BIOS.

Image Make sure the system drive is listed before other bootable drives in the boot sequence or boot order menu.

Save any changes needed, and restart the computer. If the same error is displayed, restart the computer with the Windows installation media.

With Windows, start the Windows Recovery Environment and use Startup Repair.

Missing Graphical Interface

Windows can be started without a graphical user interface (GUI) by selecting the Command Prompt Only option from the Advanced Startup menu. To restore the GUI, simply restart Windows normally.

To learn more, see “Safe Mode (Windows)” and “To learn more, see the “Safe Mode (Windows)” section later in this chapter.

If Linux is normally started with a GUI, but fails to launch the GUI, hold down the Shift key when starting Linux. From the GRUB2 menu, boot into Recovery mode. Use a startup option that loads failsafeX, or run it after the startup process is complete from the terminal command prompt.

GUI Fails to Load (Windows)

If the display’s vertical refresh setting in Windows is out of range, you can see BIOS boot information, such as the splash screen or the summary of onboard components, but you will not see the Windows GUI. Your display might provide a warning of an incorrect vertical refresh rate setting when it’s time to load the Windows desktop.

To solve this problem, restart Windows in limited resolution (VGA) mode, open the Advanced Display properties sheet, and select the correct refresh rate (typically 60Hz for LCD or LED panels or integrated LCD or LED displays).

Tools for Troubleshooting Software

Several of the tools for troubleshooting an operating system have already been discussed in this chapter. In the following sections, we discuss additional tools you might need.

BIOS/UEFI

As you learned in Chapter 2, the BIOS (traditional or UEFI firmware) is the first issue to consider if a system will not start. Make sure the following settings are correct:

Image RAID array (if used for boot) is properly configured

Image Drives are properly identified and configured (AHCI, SATA 6Gbps, and so on)

Image Secure Boot on for running Windows 8/8.1/10 only, or disabled if dual-booting with Linux or older Windows versions

Image Memory recognized correctly

Image Boot sequence

SFC (Windows)

System File Checker (SFC) is a Windows utility that checks protected system files (files such as .DLL, .SYS, .OCX, and .EXE, as well as some font files used by the Windows desktop) and replaces incorrect versions or missing files with the correct files. For more information, see “SFC,” p.752, Chapter 15.

Logs

Windows stores system events, warnings, and errors in various event logs. Although these events can be viewed from Computer Management Console, it is easier to view them with Event Viewer. Event Viewer can be run from the Tools tab in Msconfig or from Administrative Tools in the System folder of Control Panel.

Use the Overview and Summary window or the branches of the Event Viewer or Computer Management Console to locate the log message you need to read. Look for Critical errors (marked with a white X on a red circle) first and then Warnings (yellow triangle). Frequent errors or warnings that point to the same program or device can indicate a serious problem (see Figure 22-18 and Figure 22-19). You might need to update drivers for a problem device, obtain a software update for a problem program, or remove the device or program and replace it with a different one to resolve the problems.

Image

Figure 22-18 Viewing a series of errors involving the DHCP-client with the Windows 7 Event Viewer.

Image

Figure 22-19 Viewing a series of errors involving kernel-power issues with the Windows 8.1 Event Viewer.

System Recovery Options (Windows)

Windows includes System Recovery Options that can be started automatically when a Windows system has problems, or by using the Windows distribution media to restart the system.

To start System Recovery Options manually with Windows Vista/7, see “Repair Discs,” this chapter, p. 1108.

To restart the system and use System Recovery Options in Windows 8/8.1/10:

Step 1. Hold down the Shift key and click the onscreen power button at the Windows login screen.

Step 2. Select Restart.

Step 3. Select Troubleshoot.

Troubleshooting options:

Image Refresh your PC to remove apps not from the Windows Store, reinstall apps from the Windows store, and keep the user’s files and settings.

Image Reset your PC to return it to its factory condition. All users’ files, settings, and programs will be lost.

Select Advanced options for other repair choices:

Image System Restore to return the system to its condition as of a restore point (System Restore must be enabled for this to be possible)

Image System Image Recovery to restore a system image (create the image with the System Image Backup link in File History)

Image Startup Repair to repair a system that won’t start

Image Command prompt to run a command-line program such as bootrec

Image UEFI firmware settings to enter the UEFI firmware (BIOS)

Image Startup settings to get access to the special startup options (also known as the F8 menu startup options).

Figure 22-20 illustrates these three dialogs.

Image

Figure 22-20 The Windows 8/8.1/10 advanced startup menu for repair and troubleshooting.

Repair Discs

Windows Recovery Environment (WinRE) provides access to Startup Repair, System Restore, full-featured command prompt and run-line utilities, Windows memory diagnostics, and Complete PC restore (restores image backup). WinRE can be run from a hidden recovery partition, from the Windows distribution media, or from a repair disc. WinRE is an example of a preinstallation environment.

Windows Repair Disc enables the user to run WinRE from a bootable CD or DVD. Repair discs (also known as repair disks) can be created with Windows Vista SP1 or higher and with any release of Windows 7. Windows Repair Disc can be used to restart the system to run the Windows Recovery Environment (see Figure 22-21).

Image

Figure 22-21 The Windows Vista/7 Recovery Environment.

To restart the computer with a repair disc, insert it, turn on or restart the system and, if prompted, press a key to boot from the disc.

Pre-installation Environments

Windows PE is a special version of Windows that can be used to prepare a system for deployment or for other troubleshooting or repair purposes. Windows PE is included with Windows deployment kits. To learn more about Windows PE 5.0 for Windows 7/8/8.1, see https://technet.microsoft.com/en-us/library/hh825110.aspx. Older versions of Windows PE work with Windows Vista.

Windows PE for Windows 10 is described at https://msdn.microsoft.com/en-us/library/windows/hardware/dn938389(v=vs.85).aspx. It can be downloaded as part of the Windows Assessment and Deployment Kit for Windows 10.


Note

Many third-party recovery tools are based on Windows PE. To learn more about these, see https://www.raymond.cc/blog/5-system-rescue-boot-disc-based-on-windows-pe/.


MSCONFIG (Windows)

The Microsoft System Configuration Utility, MSCONFIG, enables you to selectively disable programs and services that run at startup. If your computer is unstable, runs more slowly than usual, or has problems starting up or shutting down, using MSCONFIG can help you determine whether a program or service running when the system starts is at fault. See “MSCONFIG,” p.773, Chapter 15, for more information.

DEFRAG

Defragging a hard disk drive can help improve system performance, especially if the drive has frequent changes. Windows includes DEFRAG. For information about using defragmentation tools, see “Defragmentation,” p.607, Chapter 13, for more information.

REGSVR32 (Windows)

If a program stops working after another program was installed or removed, some program components might have been replaced or disabled. The Microsoft command-line tool REGSVR32 (sometimes misspelled as regsrv32) is used to reregister .dll or .ocx files used by applications.

To use Regsvr32.exe, open a command prompt as administrator. Go to the folder containing the file(s) you need to reregister.

The basic syntax to register a program file with Regsvr32 is:

Regsvr32 filename.ext

For example, to reregister a file called jscript.dll in the current folder, use the following:

Regsvr32 jscript.d11


Note

On a 64-bit version of Windows operating system, there are two versions of the Regsvr32.exe file:

Image The 64-bit version is %systemroot%System32 egsvr32.exe.

Image The 32-bit version is %systemroot%SysWoW64 egsvr32.exe.

To learn more about Regsvr32, see http://support.microsoft.com/kb/249873.


REGEDIT (Windows)

The Windows Registry Editor, REGEDIT, can be used to fix issues with software, drivers, and Windows configuration settings if they cannot be resolved in any other way. To learn more about using Regedit, see “Using REGEDIT,” p.789, Chapter 15.

Safe Mode (Windows)

Safe Mode and other advanced boot options can be used when the system won’t boot normally; press F8 repeatedly in Windows Vista and Windows 7 when starting the system until you see the Advanced Boot Options menu. Figure 22-22 illustrates the Windows 7 version.

Image

Figure 22-22 The Windows 7 Advanced Boot Options menu featuring Safe Mode and other special startup options. The Repair Your Computer option runs the Windows Recovery Environment.

With Windows 8/8.1/10, getting to the Advanced Boot Options menu takes more steps. Press the Power button on the login screen, hold down the Shift key, and click/tap Restart. Select Troubleshoot > Advanced Options > Startup Settings > Restart. The Windows 8/8.1 startup settings menu (see Figure 22-23) adds a couple of new features but looks similar to that of Windows 7.

Image

Figure 22-23 The Windows 8.1 Advanced Boot Options menu featuring Safe Mode and other special startup options.

The Windows 10 Startup Settings menu has similar options to the Windows 8.1 version, but is more graphical (see Figure 22-24).

Image

Figure 22-24 The Windows 10 Startup Settings menu has the same options as the Windows 8.1 version, but in a different order and selectable by number.


Tip

To return the F8 function key method for accessing the Windows 8.1 Advanced Boot Options menu, follow these steps.

From an administrative command prompt enter:

bcdedit /set {default} bootmenupolicy legacy

Exit the command prompt and reboot. Press F8 and the Advanced Boot Options menu appears.

To undo and return to standard settings, from an administrative command prompt enter:

bcdedit /set {default} bootmenupolicy standard

Exit the command prompt and reboot. You are back to standard boot settings and F8 will not work.


Here’s what the options do:

Image Safe Mode—Starts the system with a minimal set of drivers; can be used to start System Restore or to load Windows GUI for diagnostics.

Image Safe Mode with Networking—Starts the system with a minimal set of drivers and enables network support.

Image Safe Mode with Command Prompt—Starts the system with a minimal set of drivers but loads command prompt instead of Windows GUI.

Image Enable Boot Logging—Creates an ntbtlog.txt file.

Image Enable low-resolution video—Uses a standard VGA driver in place of a GPU-specific display driver, but uses all other drivers as normal.

Image Last Known Good Configuration—Starts the system with the last configuration known to work; useful for solving problems caused by newly installed hardware or software.

Image Debugging Mode—An advanced diagnostics tool that enables the use of a debug program to examine the system kernel for troubleshooting.

Image Disable automatic restart on system failure—Prevents Windows from automatically restarting if a STOP (BSOD) error causes Windows to fail. Choose this option only if Windows is stuck in a loop where Windows fails, attempts to restart, and fails again.

Image Disable driver signature enforcement—Allows drivers containing improper signatures to be installed.

Image Disable early launch anti-malware protection—Use this when a legitimate driver is mistaken for malware by Windows 8/8.1/10’s Early Launch Anti-Malware Protection feature.

Image Start Windows Normally—Can be used to boot to regular Windows. This option is listed in case a user inadvertently presses F8 but does not want to use any of the Advanced Boot Options.

If Windows 7 or Vista fails to start properly and then restarts automatically, they normally display the Windows Error Recovery screen and give you the following options: Safe Mode, Safe Mode with Networking, Safe Mode with Command Prompt, Last Known Good Configuration, and Start Windows Normally. This means that Windows has acknowledged some sort of error or improper shutdown and offers a truncated version of the Advanced Boot Options menu.

Table 22-1 lists typical problems and helps you select the correct startup option to use to solve the problem.

Image
Image
Image

Table 22-1 Using the Windows Advanced Boot Options and Startup Settings Menus


Note

The Last Known Good Configuration option (Windows Vista/7) will be helpful only before a successful logon occurs. After a user logs on, that becomes the Last Known Good logon. It is recommended that you attempt to repair a computer with Advanced Boot Options before using Windows 7 or Vista’s System Recovery Options.


Command Prompt (Windows)

The Windows command prompt can be used from recovery modes and special startup options to perform repairs on the boot configuration data store, to run system file checker (SFC) and perform other repair and recovery tasks.

If you need to perform tasks that might change computer configuration from the normal Windows desktop, be sure to run command prompt as elevated (administrative mode):

Image Search for CMD, right-click it, and select Run as Administrator (Windows Vista/7).

Image With Windows 8/8.1/10, press Windows key+X and select Command Prompt (Administrative).

Uninstall/Reinstall/Repair

You can run a Windows repair install by restarting a system with the Windows distribution media and selecting Repair Installation when prompted.

Windows 8/8.1/10 provide Refresh and Reset as additional alternatives.

For OS X Recovery (Lion release and later), see https://support.apple.com/en-us/HT201314.

Use Recovery System on your startup drive to reinstall the most recent OS X release installation on that computer; Internet Recovery installs the OS X version the computer was originally shipped with.

A Linux repair installation is destructive, so the system should be backed up first. Use a repair disc (discussed earlier in this chapter) to repair the system if possible first.

Troubleshoot Mobile OS and Application Issues

Some common mobile OS and Application issues you might encounter include:

Image System Lockout

Image Hard reset

Image Soft reset

Image Adjust configurations/settings

Image Uninstall/reinstall apps

The following sections discuss these issues and the solutions.


Note

For other mobile device issues, including:

Image Dim display

Image Intermittent wireless

Image No wireless connectivity

Image No Bluetooth connectivity

Image Touchscreen non-responsive

Image Apps not loading

Image Slow performance

Image Unable to decrypt e-mail

Image Extremely short battery life

Image Overheating

Image Frozen system

Image No sound from speakers

Image Inaccurate touch-screen response

See “Mobile Device Troubleshooting,” p.633, Chapter 13.


System Lockout

A system lockout takes place if you have forgotten your password, PIN code, or pattern code (drawing a shape on the screen) and because of too many attempts to log in, login attempts are blocked.

If it’s an Android phone, make sure you know your Google (Android) login information. You are prompted to provide this if you are blocked. If you can provide this when prompted, you are logged back into your device. Be sure to change the password, PIN code, or pattern code. If you don’t have this information, you might need to perform a hard reset on the phone. This wipes out all apps and data.

On an iPhone, if it has locked you out, you can use iTunes to back up your device before restoring it if you have previously used iTunes for this task. See https://support.apple.com/en-us/HT204306 for more information and how to erase your device.


Note

Before you perform a hard reset on an Android device, try the tips provided at https://www.matthewhollander.com/locked-out-of-your-android-phone/.


Soft Reset

A soft reset, also known as a “soft restart,” restarts an Android device to help fix problems with the phone or its apps without deleting user data. Depending upon the device, you can use one or more of the following methods:

Image Press and hold the power button until you are prompted to turn off the device, then tap Power Off. To turn the device back on, press and hold the power button until the device restarts.

Image Remove the battery. After a minute or two, reinstall the battery and restart the device.

Image Press and hold the power button and volume down button until the device restarts.

On an iOS device, some people use the term “hard reset” to refer to a reset that clears the iOS firmware and can help solve problems with unresponsive hardware, botched updates, and other issues, but does not erase any data or apps. Apple prefers to use the term “restart” or “forced restart” instead. Here’s how to do a restart.

Step 1. Press and hold Sleep/Wake until the Slide to power off slider appears.

Step 2. Drag the slider to off and then wait a few seconds.

Step 3. Press and hold Sleep/Wake until the device displays the Apple logo.

If this doesn’t work, try a forced restart:

Step 1. Hold down the Sleep/Wake and Home buttons for about 10 seconds until the Apple logo is displayed.

See https://support.apple.com/en-us/HT201559 for more information.

Hard Reset

The term hard reset refers to deleting all the information from your mobile device to reset it to factory condition (reset to factory default). Apple prefers to use the term Erase.

If you decide that you need to erase your iOS device so it can be given away or sold, this can be done with Settings > General > Reset > Erase All Content and Settings. See https://support.apple.com/en-us/HT204686 for more information.

Before doing a hard reset on an Android device:

Step 1. Back up the device if possible.

Step 2. Try a soft reset.

Step 3. If you must perform a hard reset, make sure the device is charged.

Step 4. Unplug the device from power.

Step 5. Turn it off.

Step 6. Use the keystroke(s) for your smartphone or tablet and version of Android.

As an example of step 6, with recent Samsung Galaxy smartphones:

Step 1. Press and hold Volume Up, Home, and Power at the same time.

Step 2. Release the Power key only when the Galaxy logo is displayed or the phone vibrates.

Step 3. From the Android system recovery screen, select wipe data/factory reset (use the volume keys to scroll and Power to choose this option).

Step 4. After the factory reset is over, select Reboot system now to restart a phone empty of user data with factory settings only.


Note

For more about this process including keystrokes for other popular smartphones and Android versions, see www.smartmobilephonesolutions.com/content/how-to-hard-reset-an-android-phone.


Adjust Configurations/Settings

The Settings menus in iOS and Android provide options for removing unwanted apps, checking for updates, and other troubleshooting features. Table 22-2 lists typical settings for Android and where to make them.

Image

Table 22-2 Android Mobile Configuration Settings

Table 22-3 lists typical settings for iOS and where to make them.

Image

Table 22-3 iOS Mobile Configuration Settings

Windows 10 Mobile uses the Settings menu for configuration. It is similar to the Windows 10/Windows 10 Pro versions for desktop and laptop computers.

Mobile Devices and Application Security Issues

Mobile devices can have many issues, most caused by their limited storage and memory and their reliance on wireless and cellular networking. The following issues may appear on the exam and reflect the challenges of day-to-day mobile use.

Signal Drop/Weak Signal

With a Wi-Fi connection, scan for other available wireless networks.

With a cellular data connection, move to a different location, preferably near a window or outside the building, or adjust how you hold the phone.

To determine the cellular signal strength in dB for a smartphone, use the Field Test Mode. For more information for iOS and Android phones, see https://www.repeaterstore.com/pages/field-test-mode. Note that a stronger signal is indicated by a lower value.

Check connection speeds with the case on and off to see if it is affecting performance. Ookla Speedtest is available from Google Play and the App Store to test performance over cellular data and Wi-Fi connections.


Note

If cellular connections are good outside your office or home but poor inside your home, a cellular repeater can help improve performance. See www.repeaterstore.com and www.ubersignal.com among others.


Power Drain

Power drain is caused by having too many apps running at the same time. Closing apps properly will help, but force closing apps that run continuously saves more power.

See the “Force Stop” section later in this chapter.

Slow Data Speeds

Slow data speeds can be caused by:

Image No connection to a 4G network—Check the network indicator at the top of your smartphone or cellular-equipped tablet to determine the network connection type.

Image A weak 4G or Wi-Fi signal—With Wi-Fi, switch to a stronger SSID signal if possible. With 4G, use a cell tower scanner to locate a stronger cell tower.

Image “Unlimited” Data Plan speed caps after reaching 4G speed limit per billing period—Some of the providers who offer “unlimited” data plans drastically reduce speed after a certain level of data is transferred during a billing period. Check data usage and set up a warning to be displayed before you reach this goal or consider switching users to a different plan.

Unintended Wi-Fi Connection

Some smartphones connect automatically to available Wi-Fi hotspots (for example, AT&T smartphones can connect automatically to AT&T hotspots). These hotspots are not secure connections and are thus not desirable for secure communications.

To disable this feature, check the Wi-Fi settings on your smartphone. On an AT&T Android phone, for example, go to Settings > Connections > Wi-Fi > More > Advanced > Disable Auto Connect.

On an iPhone, go to Settings > Wi-Fi and then turn off Ask to Join Networks.

To prevent reconnections to a previously used network, select the network and tap Forget.

Unintended Bluetooth Pairing

To prevent your device from pairing with unknown devices:

Image Turn off Bluetooth when you do not use Bluetooth devices.

Image When you use Bluetooth devices, make sure your mobile device requests a code from a device attempting to pair with it. You can do this by attempting to pair a Bluetooth-enabled device in your possession with another Bluetooth-enabled device.

Leaked Personal Files/Data

To prevent personal files or data from being discovered in the event your mobile device is lost:

Step 1. Enable encryption.

Step 2. Enable options to wipe your device in case of loss.

Step 3. Avoid open Wi-Fi networks.

Step 4. Use VPN for secure connections if you must use an open Wi-Fi network.

Step 5. Disable Wi-Fi tethering or connection sharing services if not in use.

Data Transmission Overlimit

Exceeding the amount of data included in your cellular plan (overlimit) could be expensive.

To avoid unexpected bills, periodically check data usage. On Android, go to Settings > Connections > Data usage. Scroll down to see which apps are using the most data. Set data limit should be turned on to set a limit, warning, and to prevent exceeding the limit.

On iOS, go to Settings > Cellular > Cellular Data Usage. Use sliders to disable any apps that should not be using cellular connections. Turn off Cellular Data if there is no data allowance left in the current period.

If you see unusual amounts of data usage, it could be a sign of malware.

Unauthorized Account Access

Set up security on your banking or other accounts so that attempts to access it must be authorized by you first. Typically, this is done by specifying an e-mail or messaging number that must be responded to before a new device can be added as an authorized device.

Unauthorized Root Access

Android devices are relatively easy to root (to gain root access to) so that users can install different operating systems and continue to use their cellular and data connections. On the other hand, iOS devices must be “jailbroken” and run the risk that their devices might be blocked for updates.

However, unauthorized root access is a different story. Unauthorized root access on an Android device is a risk when users download apps that are not from Google Play. These apps do not properly follow the permissions rules and may elevate permissions without the user’s knowledge or consent. Running a device in Developer mode (used for software and service development and testing) disables most safeguards. On current versions of Android, it takes several steps to enable Developer mode so it’s difficult to do it accidentally.

Jailbreaking an iOS device or rooting an Android device puts the device and its information at much higher risk than with a normally functioning device.

Unauthorized Location Tracking

Location tracking features are found in both iOS and Android smartphones.

To prevent iOS from tracking your location by Wi-Fi connections:

Image Go to Settings > Privacy > Location Services > System Services and then turn off Frequent Locations and clear history.

To prevent Android from tracking your location by Wi-Fi connections:

Image Go to Settings > Personal > Privacy and Safety > Location > Locating Method > GPS only.

Third-party apps can be used to perform location tracking without the authorization of the device user. These apps are marketed to parents and organizations who want to keep track of individuals.

Malicious apps with this feature could be installed by a user who does not use Google Play or the App Store to install apps.

Unauthorized Camera/Microphone Activation

Third-party apps can use the device’s camera or microphone without the authorization of the device user. These apps are marketed to parents and organizations who want to keep track of individuals.

Some apps can be installed on iOS without physical access to the device: just the Apple ID and password are needed.

Malicious apps with this feature could be installed by a user who does not use Google Play or the App Store.

High Resource Utilization

High resource utilization (cellular data, CPU, memory, storage) can have many causes. To check cellular data use by app, see the “Data Transmission Overlimit” section earlier in this chapter.

To reduce CPU, memory, and storage usage:

Image Uninstall apps that are not needed.

Image Configure apps to receive updates only via Wi-Fi.

Image Turn off background updates.

To see real-time resource usage by app for iOS, download the latest version of Xcode from the Apple Developer website and use its Instruments app. Learn more at http://apple.stackexchange.com/questions/71237/how-to-identify-cpu-and-memory-usage-per-process-on-iphone.

To see real-time resource usage by app for Android, use System Monitor from AndroidPit.com. For additional resource monitoring, see https://www.androidpit.com/best-apps-for-monitoring-system-performance-on-your-android-device.

See the next section, “Tools,” for methods for detecting and blocking malware and hostile apps and processes.

Tools

Mobile users and techs have a wide variety of software tools available to help boost performance and security. They’re covered in the following sections.

Anti-Malware

Both Android and iOS devices can be protected with anti-malware apps, some free, and some paid, from the same vendors who protect desktop and laptop systems. Every mobile device should be protected, if for no other reason than that a mobile device can be used as an infection vector for any other device it connects to. Check Google Play and the App Store for anti-malware apps from AVAST, AVG, Kaspersky Labs, Norton, McAfee, Bitdefender, AVIRA, ESET, and many others.

App Scanner

During the installation process for an app, the user sees a long list of permissions the app is being granted. Reading this list carefully is a bit like listening closely to the side effects for a medicine: you wonder if the app is worth the side effects of potential threats to privacy. An app scanner can help determine whether an app is safe to use. Here are two examples:

Image The Zscaler Application Profile (http://zap.zscaler.com/) is a well-regarded tool for evaluating iOS and Android apps. Search for the name of an app and the operating system, and Zscaler checks its database for matches. For example, searching for flashlight iOS came up with five matching apps, four of which had security/privacy risks of 50 or greater (100 being greatest risk, 0 being no risk). Zscaler can also check an app you specify on the App Store or Google Play for risks.

Image Bitdefender anti-malware offers a free Android app called the Clueful Privacy Advisor through Google Play. Clueful lists apps by potential threat and enables the user to see the permissions for any app.

Factory Reset/Clean Install
Image

Before retiring a device, or as a way to eliminate apps that may risk privacy, perform a factory reset on the device. This can be followed by a clean install of desired apps.

If the device is not encrypted yet, set up a PIN first. This automatically encrypts the device.

For Android:

Step 1. Make sure Back up my data and Automatic restore are enabled. See the “Backup/Restore” section in this chapter, for additional backup processes.

Step 2. Go to Settings > Personal > Backup and reset > Factory Data Reset.

Step 3. After reviewing the warnings, click Reset Device.

The device will be returned to its factory configuration. All data and device updates will be removed from the device.

To restore data to this device or to a different device, see the “Backup/Restore” section later in this chapter.

For iOS:

Step 1. Install the latest version of iTunes on your host PC or OS X computer.

Step 2. Start iTunes.

Step 3. Connect your device to the computer via the 30-pin or Lightning charge/sync cable. Trust the device or enter a passcode if prompted.

Step 4. Select your device.

Step 5. Back up its contents. See https://support.apple.com/en-us/ht203977 “Make a backup using iTunes.” Be sure to use Transfer Purchases for content purchased from iTunes, the Health & Activity data stored on your device (backup must be encrypted), and start your backup. To learn more about the iOS Health app, see https://support.apple.com/en-us/HT203037.

Step 6. To erase the device, go to Summary > Restore.

Step 7. Click Restore again to erase your device and reload it to its original factory condition.

Use iTunes to restore data afterwards. See https://support.apple.com/en-us/ht2041844.

Uninstall/Reinstall Apps

To solve problems with corrupt or outdated apps, you can uninstall them and then reinstall them. For Android:

Step 1. Go to Settings > Device > Applications > Application Manager.

Step 2. Select an app and tap Uninstall.

Step 3. To reinstall the app, go to Google Play and reinstall it.

For iOS:

Step 1. From the apps dialog (home screen), press and hold any app icon until they wriggle.

Step 2. Click the X to remove the app. Click Delete to confirm.

Apps can also be deleted by going to Settings > General > Storage & iCloud Usage > Manage Storage, selecting an app, and then tapping Delete.

To uninstall an iOS app, press the app’s icon, click the X, and confirm deletion. You can reinstall it from the Apple App Store.

To uninstall an app with Windows 10 Mobile, press and hold the app icon, and select Uninstall. You can reinstall the apps with the Windows Store.

Wi-Fi Analyzer

Use a Wi-Fi analyzer app to see which channels are in use and by which SSIDs. If you are using public Wi-Fi, this is useful to locate the best signal. If you are working on setting up or maintaining a home or office wireless network, use this information to choose the best channel.

The Wifi Analyzer from Farpoint is available from Google Play. It provides monitoring in real time, showing SSID, signal strength, and channel (see Figure 22-25).

Image

Figure 22-25 Using Wifi Analyzer to view 2.4GHz networks in use.

Force Stop

Even when you close a mobile app, it might restart right away. Use Force Stop to close an app that doesn’t want to close or won’t stay closed.

For Android:

Image Go to Settings > Device > Applications > Application manager, select an app, tap Force Stop, and then tap OK.

For iOS:

Image Press the Home button twice, swipe left to find the preview of the app, and then swipe up on the preview to close it.

Cell Tower Analyzer

Cell tower analyzer apps can detect signal strength for the various 3G and 4G data network services in use. There are numerous third-party apps for Android (Google Play) and iOS (App Store).

Backup/Restore

Backup and restore is an often-neglected part of mobile device maintenance. iOS devices offer two ways to back up:

Image iCloud (automatic)

Image iTunes (requires connection to the host PC or OS X computer)

iCloud is easier, but free iCloud storage is limited to 5GB. To back up an entire device, use iTunes.

Android Cloud backup can back up most features of your smartphone or tablet to Google Drive (the first 15GB of storage is free).

To back up e-mails, contacts, calendar, and apps:

Step 1. Go to Settings.

Step 2. Go to Backup and reset.

Step 3. Turn on Back up my data.

Step 4. Turn on Automatic restore.

Step 5. Select Google account for Backup Account.

Step 6. Go to Settings.

Step 7. Go to Accounts.

Step 8. Select Google.

Step 9. Select Gmail and select the services to back up.

To back up photos and videos to Android Cloud:

Step 1. Start Google Photos (download from Google Play if not installed).

Step 2. Open the menu (it’s the three-line icon at the upper left corner of the app).

Step 3. Sign in if prompted.

Step 4. Go to Settings > Back up & sync > Backup (On).

Step 5. Select whether to back up while charging, back up all photos/videos now, or whether to back up while roaming on cellular.


Note

For a visual tour of these options, see http://www.techbout.com/backup-android-phone-6081/.


Use third-party apps to back up SMS messages. To back up all phone contents, use backup services provided by some smartphone vendors or download third-party apps from Google Play.

With Windows Mobile, enable automatic cloud-based backup for settings and app data, enable message sync, and turn on camera upload to OneDrive for photos and videos. For details, see http://windows.microsoft.com/en-us/windows-10/getstarted-back-up-mobile.

Apple Configurator

The Apple Configurator (https://www.apple.com/support/business-education/apple-configurator/) is designed to mass configure and deploy iPhone, iPad, iPod Touch, and Apple TV (second generation or later) devices for schools and organizations. Apple Configurator runs on OS X computers running El Capitan or later with iTunes 12.3 or later.

A blueprint is the term for actions that will be applied to devices, such as configuration profiles and app installation.

Configuration profiles specify device settings for networks, e-mail servers, and other options.

After these steps are complete, devices can be prepared for use.

To prepare multiple devices at the same time, connect them to USB 2.0 or 3.0 ports on the device, or use hubs or iPad charge/sync carts that are MFi certified (MFi is Apple’s Made for iPhone, Made for iPod, Made for iPad, and AirPlay certification program).

A single device can be prepared and backed up; the backup can be restored to other devices.

The processes can be automated if desired.

Google Sync

Google Sync enables Google Services such as Gmail, Contacts, Calendar, and Chrome search to be synchronized to your computer or mobile device.

Technically speaking, the Google Sync app itself is now restricted to paid users of Google Apps for Work, Education, and Government. Google is now using CardDAV to perform sync for its users of free Gmail, Contacts, Google Calendar, and Chrome services.

When these accounts are set up, CardDAV is configured as part of the setup process.

Troubleshooting PC Security Issues

The following sections help you deal with PC security issues, including common symptoms of malware infections, software tools to help battle malware, and best practices for removing malware.

Common Symptoms of Malware Infections

There are many common symptoms of malware infections. In Table 22-4, you learn what to look for. Be sure to know these for the 220-902 exam.

Image
Image
Image
Image

Table 22-4 Common Symptoms of Malware Infection

Tools

Windows, OS X, and Linux all include tools that can be used to prevent malware attacks or clean up damage, and third-party tools are available to help plug any holes in built-in protection. Table 22-5 discusses these tools. Be aware of these tools and how they help for the 220-902 exam. For more information, follow the links or see the appropriate sections in Chapter 14, Chapter 15, Chapter 18, or Chapter 21.

Image
Image

Table 22-5 OS and Third-Party Tools to Prevent and Fight Malware Infections

Best Practice Procedure for Malware Removal

Follow this seven-step procedure to remove malware:

Step 1. Identify malware symptoms. Use Table 22-4 to identify symptoms.

Step 2. Quarantine infected system. Disconnect the system from wired and wireless networks and suspect any media that has touched the system as being possibly infected.

Step 3. Disable System Restore (in Windows). System Restore has been used by some malware programs to reinfect the system. System Restore is designed to help recover from user error or system crashes, not malware.

Step 4. Remediate infected systems. Use a different system to change passwords for network access, e-commerce, and social media. Back up data in case the system must be reformatted. Check backup for malware before reinstalling it.

a. Update anti-malware software. To update anti-malware on a quarantined system, download offline update files on a different system, burn them to an optical disc and close the disc so it cannot be written to again, or copy them to a USB flash drive and install the updates on the quarantined system.

b. Scan and removal techniques (safe mode, pre-installation environment). If a quarantined system’s antivirus/antimalware cannot be updated, the apps might be themselves infected or blocked by malware. Download the files needed to create a Live CD or USB bootable anti-malware disc or USB drive on a different system.

Step 5. Schedule scans and run updates. If the infection source is unknown, run full scans with both antivirus and anti-malware. If the infection source is known by name, first use a specific removal tool (if available) and follow it up with full scans. Scan with more than one tool to assure the infection is removed.

Step 6. After the system is cleaned, reenable System Restore (the source of the infection, such as email, flash drives, downloaded app, and so on) and create a restore point manually.

Step 7. Educate end users. Discuss principles of avoiding malware infections with end users. If the infection vector (the source of the infection, such as email, flash drives, downloaded app, etc.) is known, discuss it specifically as well as provide general guidance for safe computing (avoiding the use of “orphan” USB flash drives, not opening attachments from unknown sources, using real-time antivirus software, scanning systems weekly, etc.).

Exam Preparation Tasks

Review All the Key Topics

Review the most important topics in the chapter, noted with the Key Topic icon in the outer margin of the page. Table 22-6 lists a reference of these key topics and the page numbers on which each is found.

Image
Image

Table 22-6 Key Topics for Chapter 22

Complete the Tables and Lists from Memory

Print a copy of Appendix B, “Memory Tables” (found on the companion website), or at least the section for this chapter, and complete the tables and lists from memory. Appendix D, “Memory Tables Answer Key,” also on the companion website, includes completed tables and lists to check your work.

Define Key Terms

Define the following key terms from this chapter, and check your answers in the glossary.

Stop errors

BSOD

pin wheel

failure to boot

improper shutdown

spontaneous shutdown/restart

device fails to start/detected

missing DLL

compatibility error

file extension

file association

boot configuration data

DLL

missing operating system

GUI

GRUB

LILO

kernel panic

multiple monitor

BIOS

UEFI

SFC

logs

system recovery options

repair disks

pre-installation environments

MSCONFIG

DEFRAG

REGSVR32

REGEDIT

Safe Mode

command prompt

pop-ups

browser redirection

security alerts

rogue antivirus

spam

file permissions

hijacked e-mail

access denied

invalid certificate (trusted root CA)

antivirus software

anti-malware software

Recovery Console

terminal

Refresh

Reset

malware

System Restore

quarantine

remediate

restore point

scan

end user

system lockout

hard reset

soft reset

factory default

overlimit

pairing

root access

app scanner

factory reset

clean install

Wi-Fi analyzer

Force Stop

cell tower analyzer

iTunes

iCloud

Apple Configurator

Google Sync

OneDrive.

Complete Hands-On Lab

Complete the hands-on lab, and then see the answers and explanations at the end of the chapter.

Lab 22-1: Troubleshooting Windows, OS X, Linux, iOS, and Android

Image Look up Windows STOP errors and causes for the Windows versions you work with.

Image Use Activity Monitor on an OS X system to see how it is using resources.

Image Start Linux in Recovery or Rescue mode.

Image Start Windows in Safe mode.

Image Start OS X using Command+R.

Image Use Device Manager to see if any devices are unknown, disabled, or can’t start.

Image Use two displays with Linux, OS X, and Windows and set them up as mirrored or extended desktops.

Image Use a soft reset/soft restart with an iOS and an Android device.

Image Install a new app on an iOS and/or Android device. Update it and then delete it.

Image Check data usage on an iOS and/or Android smartphone.

Answer Review Questions

1. Which operating system is displaying this message?

A. OS X

B. Windows 7

C. Linux

D. Windows 8.1

How would go go about researching this problem?

1. Search online for “A problem has been detected”

2. Go to Linux.org and search for IRQ_NOT_LESS_OR_EQUAL

3. Go to Apple.com and search for IRQ_NOT_LESS_OR_EQUAL

4. Go to Microsoft.com and search for IRQ_NOT_LESS_OR_EQUAL

Which of the following is the most likely solution to the problem?

a. Install an update to OS X

b. Open Device Manager and update a driver

c. Use apt-get to install a Linux update

d. Reinstall the operating system

Image

2. In the following figure, the screen is displaying a spinning wait cursor or pin wheel that indicates that the system is unresponsive. One possible cause for this pin wheel could be that there is less than 10 percent free space left on the system drive. Why would a lack of free space be causing a problem for the system?

Image

A. You are running out of space on the drive and cannot store any more files

B. At least 10 percent free space is needed for a swap file.

C. You do not have enough free space on the drive to upgrade to the latest version of the operating system.

D. Your applications need more space in which to run.

3. How would you try to repair a missing or corrupt BOOTMGR file on a Windows system?

A. Use the System Recovery Options.

B. Use the Advanced Boot Options.

C. Reboot the computer and edit the BIOS startup program.

D. Go to the Internet and download a new BOOTMGR file.

4. Which of the following procedures best describes how to create a dual boot system using Windows 7 and Windows 8.1?

A. Install Windows 7 first, then install Windows 8.1 into a separate partition.

B. Install Windows 8.1 first, then install Windows 7 into a separate partition.

C. It does not matter which you install first.

D. You cannot dual boot these two operating systems.

5. Which of the following is the most common boot loader in current Linux distributions?

A. CRON

B. LILO

C. BCD

D. GRUB

6. Which of the following procedures best describes how to access the special startup modes in OS X?

A. Press Ctrl+R.

B. Press Command+R.

C. Press Ctrl+Alt+Del.

D. Press Alt+F1.

7. If a program that loads automatically during startup is causing problems during startup or shutdown, which Windows utility should be used to diagnose and resolve the problem?

A. BIOS

B. SFC

C. MSCONFIG

D. REGEDIT

8. Your Windows computer has been configured to automatically restart after a system shutdown due to a STOP error. Which of the following menu options best describes how to disable the automatic restart feature?

A. MSCONFIG > Boot > No GUI boot

B. System Properties > Advanced > Startup and Recovery > clear Automatically restart checkbox

C. Drive Properties > General > Disk Cleanup

D. System Properties > System Protection > Create

9. In Windows, how will a non-working device be displayed?

A. In MSCONFIG on the Startup tab, an error message is displayed next to the device.

B. Action Center displays an error message.

C. An error message will be displayed in the System Restore utility.

D. In the Device Manager, the device will be displayed with an exclamation mark inside a yellow triangle.

10. Which of the following statements best describes why a device is listed as Unknown in the Device Manager?

A. There is no installed driver.

B. The device is not functioning.

C. The device has been disabled and is no longer listed.

D. The device has been removed.

11. If a Windows system file is missing or damaged, which utility is used to recover it?

A. Device Manager

B. SFC

C. MSCONFIG

D. Safe Mode

12. Which of the following could be causes of poor system performance on a Windows computer? (Choose all that apply.)

A. The drive containing paging and temporary files is nearly full.

B. Dust and dirt are restricting airflow and the CPU is overheating.

C. Too many services are configured to start automatically during startup.

D. Minimum memory requirements have been met but not exceeded.

13. In Windows, when a file extension is not associated with a program, which of the following occurs?

A. The file will not open.

B. The file will open in Notepad with no formatting.

C. The file will open in Notepad with minimum formatting.

D. The file will open in either Windows Explorer or File Explorer.

14. When a Linux or OS X system crashes as a result of a fatal error in the operating system, it is known as which of the following?

A. A STOP error

B. A fatal error

C. A kernel panic

D. A kernel wipe

15. Match the method for configuring multiple displays with the operating system.

Image

1. System Preferences > Displays

2. Display > Screen Resolution

3. Settings > Display

16. In which of the following locations would you find the log files that Windows creates describing information, warnings, and errors on your system?

A. Device Manager

B. Event Viewer

C. Finder

D. Recovery Environment

17. System Restore is used to do which of the following?

A. Restore the system to its original configuration

B. Remove apps not from Windows Store and reinstall apps that are from Windows Store

C. Use a system image to restore the computer to its original condition

D. Create a restore point with which to restore the computer to an earlier point in time

18. Which Windows utility is used to disable any programs and services that run when the computer boots?

A. REGEDIT

B. MSCONFIG

C. SFC

D. MSINFO32

19. In Windows, if one program stops working after you install or remove another program, you might need to register the .dll or .ocx files for the first program. Which utility should be used to do this?

A. REGSVR32

B. SFC

C. Recovery System

D. Safe Mode

20. In Windows 8/8.1/10, which of the following procedures is used to open Safe Mode? (Choose two.)

A. Press F8 during startup.

B. Press Alt + F1 during startup.

C. Use MSCONFIG, Boot tab.

D. Reboot, hold down the Shift key, and select Restart.

21. Match the following Advanced Boot Options or Startup Settings with the phrase that describes their functions.

Image

Answer Options:

1. You want to determine which device or process is stopping startup.

2. You have just installed new hardware or software and Windows won’t start.

3. You have just upgraded a device driver and Windows won’t start.

4. Configure this setting if you have frequent STOP errors.

5. You have just installed a new video card and Windows won’t start.

22. On an OS X computer, when you reboot and select Internet Recovery from the recovery options, which of the following occurs?

A. The computer’s original operating system reinstalls.

B. The most recent OS X release installs.

C. System fixes and updates are installed.

D. Nothing. You cannot reboot to Internet Recovery.

23. Which of the following procedures best describes how to stop mobile devices from pairing with unknown Bluetooth devices?

A. Use encryption on your mobile devices.

B. Require a device to have the correct code before pairing.

C. Use a VPN whenever possible.

D. Disable Wi-Fi tethering.

24. Which of the following problems might occur when you install third-party apps on a mobile device? (Choose all that apply.)

A. Unexpectedly high resource utilization

B. Unauthorized root access

C. Unauthorized location tracking

D. Unauthorized camera or microphone activation

25. You need to back up 14.5GB of information from an iOS device. Which of the following is the best choice?

A. iCloud

B. iTunes

C. Android Cloud

D. OneDrive

26. You want to prevent an Android smartphone from tracking the user by Wi-Fi connections. Which of the following is the correct command sequence?

A. Settings > Privacy > Location Services > System Services

B. Settings > Network > Wi-Fi > Disabled

C. Settings > Personal > Privacy and Safety > Location > Locating Method > GPS only

D. Settings > Network > Airplane Mode

Answers and Explanations to Hands-On Lab

Lab 22-1: Troubleshooting Windows, OS X, Linux, iOS, and Android

If you see a STOP (BSOD) error, take a digital photo of it and show it to co-workers for reference. Did you find solutions to problems you have previously seen?

On a Linux system, which boot options are available when starting in Recovery or Rescue mode?

On an OS X system, did you discover any performance problems when using Activity Monitor?

Did you discover any problem devices with Device Manager? Were you able to resolve the problem? If you discovered problems with unknown devices or devices that can’t start on a laptop that is running a version of Windows that is newer than the version that was originally loaded on the laptop, you might need to download specific driver packs for the laptop and Windows version.

When you installed the app, were you offered an update automatically? If not, check for an update after a week or two.

When you checked data usage, were you near the device’s data plan limit per billing cycle? If so, make sure the user knows when to use Wi-Fi and when to use cellular connections.

Answers and Explanations to Review Questions

1. B. This is an error message from Windows 7. 4 To find the answer, search for the error message at the Microsoft website. b Uninstalling the most recent app or hardware device, followed by installing an updated app or a hardware device with an updated driver is the most likely solution. Reinstalling the operating system is the last solution to try, only after all other measures have been tried.

2. B. Free space on the system partition is used as a swap file when sufficient RAM is not available. If this is the reason that your system has become unresponsive, you should clear space from the system partition by rebooting the computer to free up temporary files, emptying the Trash, or removing files and storing them on another drive or in the cloud. Upgrading to a newer OS X version can also help to improve responsiveness.

3. A. Use the System Recovery Options and select either the Startup Repair option or open a command prompt and enter bootrec /fixboot. Advanced Boot Options are used to start windows in Safe Mode or other troubleshooting modes. Although a change in the BIOS startup settings to a different startup drive could cause this problem, it isn’t likely. BOOTMGR cannot be downloaded from the Internet.

4. A. You should always install the older operating system first. Thus, you should install Windows 7 first, then install Windows 8.1 into a separate partition.

5. D. GRUB is the most common boot loader in current Linux distributions, while older Linux distributions used LILO. To load Grub, press the Shift key while restarting the system. If you need to repair the system, choose Rescue or Recovery when Grub loads. Cron is a time-based job scheduling utility in Linux computer operating systems. BCD is the boot configuration database used by Windows Vista/7/8/8.1/10.

6. B. Press Command+R as soon as you hear the startup sound. After choosing your language, you will have the option to restore, reinstall, get help, or open the Disk Utility. OS X uses the Command key in place of the Control key used in Windows. Ctrl+Alt+Del displays a menu that includes Task Manager and other options. Alt+F1 opens the Applications menu in Ubuntu or the Start menu in KDE’s K-menu.

7. C. MSCONFIG is a Windows diagnostic tool that allows you to disable and reenable programs and services that automatically load and run during startup. The BIOS (also applies to UEFI firmware) is used to configure basic hardware settings before the OS starts. SFC is the Windows System File Checker. REGEDIT is the Windows Registry editor.

8. B From the Start menu, right-click Computer and select Properties (Windows Vista/7). Press Windows key+X, System (Windows 8/8.1/10). Then click Advanced System Settings. Under Startup and Recovery, select Settings. Under System Failure, clear the Automatically Restart checkbox. The MSCONFIG Boot tab is used to specify startup options such as Safe Boot, boot log, and others (equivalent to selecting options from the Advanced Boot Options menu at startup). The General tab in a drive’s properties shows the file system, drive letter and name, and free/used space. The System Protection tab in System Properties is used for System Restore functions.

9. D. Device Manager reports on the status of all hardware devices on the system. A non-working device will be displayed with a black exclamation mark inside a yellow triangle. Also, when you open the properties of the device, you will see a brief description of the problem on the General tab. MSCONFIG does not list device information. Action Center displays warnings about maintenance and security issues, but not about device drivers. System Restore displays information about device drivers that will be removed or reloaded when a restore point is chosen but it does not display error messages.

10. A. An unknown device does not have a driver installed. Try installing the driver and then reconnecting the device. The device cannot function without a driver. A disabled device is still listed, but it’s displayed with an icon indicating it is disabled. A removed device is also removed from Device Manager.

11. B. SFC checks your system files, locates damaged/corrupted files, and reinstalls replacement files. Device Manager is used to view, manage, and install devices and drivers. MSCONFIG is used to configure Windows startup options. Safe Mode is used to start Windows for troubleshooting.

12. A, B, C, D. The drive containing the paging and temporary files must have at least 10 percent free space; 20 percent free space would be better. If dust and dirt build up around internal components, the CPU and system fans might not be able to adequately circulate the air and dissipate the heat that builds up, so the CPU might overheat. If your system is performing at a low level, you might try increasing the amount of RAM. Generally speaking, more RAM equals better performance. Too many programs and services at start up will slow the startup process and slow down system performance afterward.

13. A. When a file extension is not associated with the file, Windows will not know which application to use to open it. For example, a file with the .docx extension must be opened with Word; it cannot be opened with Excel.

14. C. Kernel panic is when a Linux or OS X system crashes as a result of a fatal error. It is similar to a STOP error in a Windows system. Kernel wipe is not a valid issue with these operating systems.

15. A—1. B—3. C—2.

16. B. The Event Viewer contains the log files that Windows creates to record problems within the system. Device Manager stores information regarding hardware devices and their drivers. Recovery Environment is used in Windows Vista/7/8/8.1/10 to diagnose and repair system failures. Finder is the file manager program in OS X.

17. D. Use the System Restore utility to create restore points before making major changes to your system. Then, if your system has a problem, you can revert to a restore point and your computer will be configured as it was when the restore point was created.

18. B. MSCONFIG is a troubleshooting tool that is used to configure your system startup. You may use it to disable or enable any programs or services that run automatically when the system boots. You may also use it to configure a Normal, Diagnostic, or Selective startup and to configure the order in which multiple operating systems boot. REGEDIT can be used to change all Windows settings, but it is not the preferred tool. SFC is used to replace damaged Windows system files. MSInfo32 is used to display Windows and hardware configuration.

19. A. Use REGSVR32 to register file types. SFC is used to replace damaged Windows system files. Recovery System is not a valid Windows feature. Safe Mode starts Windows with minimal drivers for troubleshooting.

20. C, D. Safe Mode is one of the selections in the Startup Settings menu. In Windows 8/8.1, you should reboot the system, hold down the Shift key, and then select Restart. You can also enter Safe Mode from the MSCOFIG utility on the Boot tab. In previous versions of Windows, you could press F8 when rebooting, but that will not work in Windows 8/8.1.

21.

Image

22. A. Rebooting the computer and selecting Internet Recovery will reinstall the operating system to the state the computer was in when it was new. If you were to select the Recovery System option, you would install the most recent release of the operating system.

23. B. If your mobile devices use Bluetooth, you should configure those devices to request a code from any devices that attempt to pair with them. Encryption, VPN, and disabling tethering are all good security measures but they do not prevent pairing with unknown devices.

24. A, B, C, D. All of these problems could be caused by malicious software that was not downloaded from Google Play or the App Store.

25. B. iTunes is the best choice because it is limited only by available disk space on the iTunes host. iCloud has only 5GB of capacity unless the user has subscribed to a paid data plan. Android Cloud backs up Android devices. OneDrive is a Microsoft product that can be used by OS X and Android devices but requires a free Microsoft account.

26. C. Settings > Personal > Privacy and Safety > Location > Locating Method > GPS only. Settings > Network > Wi-Fi > disabled turns off Wi-Fi. Settings > Privacy > Location Services > System Services > is the correct answer for iOS. Settings > Network > Airplane Mode turns off all radio services.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset