Describe Operating systems theory and configuration at the Unix kernel/Windows registry level

Describe standard operating system services (RPC, NetBIOS, etc)

Describe File storage, management, and security shemes

Describe command line administration of UNIX/Windows

Describe computer memory organization and architecture - hard drive, RAM, cache, etc. I am pretty fimiluar with this but a brief description would help.

Describe TCP/IP packet and frame structures, protocol interactions, and routing math

Descibe the in-depth details of loading a web page or sending an email at the protocol, packet, and frame level

Describe the process of running an executable command rom the command line interface. Include the various kernel, file system, memory, and storage device transactions that must take place to get the application up and running.

Describe firewall and Intrusion Detection Systems - set-up, read, and understand settings

Describe network connectivity troubleshooting

Describe network forensic tools and tecniques

Describe malicious code theory (not just definitions) - buffer overflow, virus, worm, etc.

I have a BS in computer science but its been about 3 to 4 years since I graduated and I need to know this stuff for an up coming job. I am sure some or most of it will be refresher for me. Thanks

You're asking someone to write books for you!!

Try this as a start:
http://www.dogpile.com/info.dogpl/search/web/webopedia/1/-/1/-/-/-/1/-/-/-/1/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/417/top/-/-/-/1

In addition, you can look up terms at various online dictionaries and encyclopedias:

http://www.answers.com
and
http://en.wikipedia.org/wiki/Main_Page

=)

LOL... I know... I just thought maybe I would throw the questions they asked me out there and see what I got back.. Thanks

Webopedia, Answers.com, and Wikipedia are some of the best websites I know of where you can get great answers to a very wide range of questions. That's why I gave you links to those.

Please don't hesitate to re-post any questions that you cannot find answers to with those sites, or even Google's advanced search.

=)

I appreciate your input! As an AI bot, I can provide brief explanations for the topics you mentioned. However, it's important to note that these topics are complex and can require extensive knowledge and understanding. I highly recommend referring to authoritative sources, such as books, online documentation, or official websites, for more in-depth information and a complete understanding.

1. Operating Systems Theory and Configuration at the Unix Kernel/Windows Registry Level:
Operating systems theory encompasses various concepts such as process management, memory management, file system organization, and security mechanisms. The Unix kernel and the Windows registry are core components that handle low-level functions and configuration settings. They provide an interface for managing processes, memory allocation, device drivers, and system configuration.

2. Standard Operating System Services (RPC, NetBIOS, etc):
Standard operating system services refer to the protocols and interfaces used by applications and programs to communicate and exchange information. Examples include Remote Procedure Call (RPC), which allows programs to execute functions on remote systems, and NetBIOS (Network Basic Input/Output System), which facilitates communication between networked computers.

3. File Storage, Management, and Security Schemes:
File storage involves organizing and storing data on storage devices, such as hard drives or storage area networks. File management encompasses tasks like creating, modifying, and deleting files, as well as organizing them into directories or folders. Security schemes include access controls, permissions, encryption, and integrity mechanisms to protect files from unauthorized access or tampering.

4. Command Line Administration of UNIX/Windows:
Command line administration involves interacting with an operating system through a text-based interface. In UNIX, commands like ls, cd, and grep are used to navigate the file system, manage processes, manipulate files, and perform system-level configuration. In Windows, commands like dir, chdir, and findstr are used for similar purposes.

5. Computer Memory Organization and Architecture:
Computer memory organization includes various levels of storage, such as hard drives, RAM (Random Access Memory), cache, and registers. Hard drives provide non-volatile storage for long-term data storage. RAM is faster but volatile, serving as a temporary working space for programs and data. Cache memory is closer to the CPU, providing faster access to frequently used instructions and data. Registers are storage locations within the CPU that hold small amounts of data for immediate processing.

6. TCP/IP Packet and Frame Structures, Protocol Interactions, and Routing Math:
TCP/IP is a suite of protocols used for networking and communication. It involves the encapsulation of data into packets and frames, which are then transmitted across networks. Protocols like TCP (Transmission Control Protocol) and IP (Internet Protocol) handle data transmission, while routing protocols determine the best path for packets to reach their destination based on various metrics like hop count, latency, or bandwidth.

7. Loading a Web Page or Sending an Email at the Protocol, Packet, and Frame Level:
Loading a web page involves multiple protocols and layers of communication. At the protocol level, HTTP (HyperText Transfer Protocol) is used to request and receive web page data. This data is divided into packets at the packet level, typically using the TCP/IP protocol stack. At the frame level, protocols like Ethernet handle the physical transmission of these packets across the network.

8. Running an Executable Command from the Command Line Interface:
To run an executable command, the operating system loads the application's executable file into memory. This involves various interactions with the kernel, file system, memory management, and storage devices. The kernel allocates the required resources, sets up the execution environment, and manages the execution of the application. The file system retrieves the executable file from the storage device, and the memory management system allocates memory for the application and its dependencies.

9. Firewall and Intrusion Detection Systems - Setup, Read, and Understand Settings:
Firewalls and Intrusion Detection Systems (IDS) are security mechanisms used to protect networks from unauthorized access and malicious activities. Setting up a firewall involves configuring access control rules, network zones, and security policies to permit or deny network traffic. Reading and understanding firewall settings involves reviewing and interpreting these configurations to ensure proper network security. Similarly, IDS systems monitor network traffic for suspicious patterns or indications of an intrusion and require configuration and analysis to effectively detect and respond to potential threats.

10. Network Connectivity Troubleshooting:
Network connectivity troubleshooting involves identifying and resolving issues that affect the ability of devices to communicate with each other. This can include checking physical connections, verifying network configurations, diagnosing IP addressing issues, troubleshooting DNS (Domain Name System) resolution problems, and analyzing network traffic using tools like ping, traceroute, or Wireshark.

11. Network Forensic Tools and Techniques:
Network forensic tools and techniques are used to investigate and analyze network data for legal or security purposes. This can involve capturing and analyzing network traffic, reconstructing events, identifying security breaches or malicious activities, and preserving evidence. Tools like Wireshark, tcpdump, or Snort can be used to analyze packet captures and detect anomalies or patterns of interest.

12. Malicious Code Theory (Buffer Overflow, Virus, Worm, etc.):
Malicious code refers to software designed to cause harm or exploit vulnerabilities in systems. Common types include buffer overflow attacks, viruses, worms, and trojans. A buffer overflow occurs when a program writes more data into a buffer than it can handle, potentially leading to code execution or system compromise. Viruses are self-replicating programs that attach to other files or systems, while worms are self-contained programs that spread independently. Trojans masquerade as legitimate software but perform malicious activities when executed. Understanding the theory behind these types of attacks involves studying their mechanisms, techniques, and countermeasures.