Our Vision

To give customers the most compelling IT Support experience possible.

Our Mission

Our mission is simple: make technology an asset for your business not a problem.

Our Values

We strive to make technology integrate seamlessly with your business so your business can grow. As your technology partner, when your business grows ours will grow with you, therefore, we will work hand in hand with you to support your growth.

Our Values

We develop relationship that makes a positive difference in our customers Business.

Our Values

We exibit a strong will to win in the marketplace and in every aspect of our Business

Showing posts with label Tips and Tricks. Show all posts
Showing posts with label Tips and Tricks. Show all posts

Sunday, April 14, 2019

Best Free Open Source Software of 2019 for your Home or Small Business

The term OPEN SOURCE refers to software whose source code is freely available to download, edit, use and share, with no copyright restrictions and that's why we love it.

You will find open source versions of almost every software imaginable - from Operating system, office suites, media to accounting and productivity. With that in mind, here's our pick of the very best open source software.

Operating System: Linux

Lets Start with the main thing you need first is a Operation System for your PC or Laptop .In the past 10 years the gap between the features in all the major operating systems has become smaller and smaller.Linux operating systems aren't just for geeks and nerds. Anyone can install Linux and use it for their everyday computing needs including browsing the web, watching Netflix, typing letters, sorting home finances, video editing, photo editing and managing music collections. There is a lot of option to choose form for everyone from Novice to System Administrator to  Hackers and Security professionals everyone love Linux as their OS.

Ubuntu: One of the most popular distros for good reason, Ubuntu is an open source software operating system that runs from the desktop, to the cloud, to all your internet connected things.
Ubuntu is officially released in three editions: Desktop, Server, and Core (for internet of things devices and robots). Ubuntu is a popular operating system for cloud computing. Ubuntu is released every six months, with long-term support (LTS) releases every two years. The latest release is 18.10 ("Cosmic Cuttlefish"), and the most recent long-term support release is 18.04 LTS ("Bionic Beaver"), which is supported until 2028.  Download form here

 

Linux Mint is a great ‘default’ distro for new Linux users, as it comes with a lot of the software you’ll need when switching from Mac or Windows, such as LibreOffice, the favoured productivity suite of Linux users. It also has better support for proprietary media formats, allowing you to play videos, DVDs and MP3 music files out of the box. Why not give it a go today.  


Office software: LibreOffice

The next is you required your productivity tool and here comes to the rescue. LibreOffice is a powerful office suite – its clean interface and feature-rich tools help you unleash your creativity and enhance your productivity.  LibreOffice is a full suite of workplace software package, together with wonderful apps for text documents, spreadsheets, presentations, and databases. These are all absolutely compatible with the most recent Microsoft file formats, thus you’ll haven't any hassle sharing files that employment with users of Word, Excel, PowerPoint, and Access.

LibreOffice includes several applications that make it the most powerful Free and Open Source office suite on the market. You can download it form clicking to their official link here .

 

Email client: Mozilla Thunderbird

Email is key part of our everyday life Thunderbird is a free and open source email, news feed, chat, and calendaring client, that’s easy to set up and customize. One of the core principles of Thunderbird is the use and promotion of open standards - this focus is a rejection of our world of closed platforms and services that can’t communicate with each other. We want our users to have freedom and choice in how they communicate. You can download it form clicking to their official link here .


Web browser: Mozilla Firefox

Download Mozilla Firefox, a free Web browser. Firefox is created by a global non-profit dedicated to putting individuals in control online. Firefox is available for Microsoft Windows, macOS, Linux, BSD, illumos and Solaris operating systems. Its sibling, Firefox for Android, is also available .
You can download it form clicking to their official link here even you can download in your onw language .
 

Accounting / Small Business Accounting: GnuCash

GnuCash is personal and small-business financial-accounting software, freely licensed under the GNU GPL and available for GNU/Linux, BSD, Solaris, Mac OS X and Microsoft Windows.
Designed to be easy to use, yet powerful and flexible, GnuCash allows you to track bank accounts, stocks, income and expenses. As quick and intuitive to use as a checkbook register, it is based on professional accounting principles to ensure balanced books and accurate reports. Download here

Clean Your System and Free Disk Space: BleachBit

When your computer is getting full, BleachBit quickly frees disk space. When your information is only your business, BleachBit guards your privacy. With BleachBit you can free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there. Designed for Linux and Windows systems, it wipes clean thousands of applications including Firefox, Internet Explorer, Adobe Flash, Google Chrome, Opera, Safari,and more. Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster. Better than free, BleachBit is open source. Download link


Password manager: KeePass Password Safe

Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your website's FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use different passwords for each account. Because if you use only one password everywhere and someone gets this password you have a problem... A serious problem. The thief would have access to your e-mail account, website, etc. Unimaginable.

KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish). Download link



Safeguard Your Data/ Disk Encryption: 

DiskCryptor is an open encryption solution that offers encryption of all disk partitions, including the system partition. DiskCryptor is file and drive encryption software with all the whistles and bells you will ever need. Just like in TrueCrypt, DiskCrypror can encrypt any of your files, system drives and other external devices like CD’s and thumb drives. Moreover, DiskCryptor can encrypt your data with different encryption algorithms like AES (Advanced Encryption Standard), Twofish, Serpent and also uses a combination of cascaded algorithms for increased security. If you are previously using TrueCrypt for your encryption purposes, then DiskCryptor is the closest free option available with active development and support.

Media player: VLC Media Player

VLC media player (commonly known as VLC) is a free and open-source, portable, cross-platform media player and streaming media server.VLC offers everything you could need from a media player - comprehensive format support, streaming, downloading and much more download here

 

Photo editor: GIMP

GIMP is a cross-platform image editor available for GNU/Linux, OS X, Windows and more operating systems. It is free software, you can change its source code and distribute your changes.
Whether you are a graphic designer, photographer, illustrator, or scientist, GIMP provides you with sophisticated tools to get your job done. You can further enhance your productivity with GIMP thanks to many customization options and 3rd party plugins.Download Link

Video editor: Shotcut

Shotcut is a free, open source, cross-platform video editor. Shotcut is a free, open source, cross-platform video editor for Windows, Mac and Linux. Major features include support for a wide range of formats; no import required meaning native timeline editing; Blackmagic Design support for input and preview monitoring; and resolution support to 4k. More features and download link here

Audio editor: Audacity

Free, open source, cross-platform audio software. Audacity is an easy-to-use, multi-track audio editor and recorder for Windows, Mac OS X, GNU/Linux  Download Here


Remote Access Software

Access other computers or allow another user to access your computer securely over the Internet. Remote desktop software is really useful for lots of situations, from helping your dad who lives 500 miles away, work through a computer issue, to remotely administering from your Melbourne office the dozens of servers you run in a USA data center! etc

Remote Utilities

Runs on Windows only and Great for both spontaneous and unattended remote access this also supports portable mode and doesn't require router port changes. This software is Free for both personal and business use which lets you connect to up to 10 computers for free.


No Machine 

Wherever your desktop is, you can control it and remotely access what’s on it from the other side of the world in a few simple clicks. A free remote desktop utility for personal use, NoMachine is designed to suit anyone who uses multiple computers and devices and wants to securely access them and their content using one simple tool. It's just one software package to be installed on the computer you are connecting from and on the remote computer you want to connect to. If you want a tool that enables you to work from home, regardless of what network you are connecting on, and which lets you stream multi-media files, access and edit documents, provide remote support to friends, print, transfer files and more, you've come to the right place. Download NoMachine and start using all these great features today.


Chrome Remote Desktop

The host computer has to have the Chrome browser installed, Lets you remote into the computer even when the user isn't logged in,Installs quickly.Has multi-monitor support and works well for unattended and on-demand remote access also Lets you remote into the computer via an app.Works on Windows, macOS, and Linux download link 

                            


What did we miss?

Are there open source application that we missed? These are just a few of the best open source/ free software I use for my personal use. They offer terrific value and since most of them are open source they are more secure for your privacy and protection in this digital age. 

We think of this as a work in progress, so if you believe there are software that should be added to this list, please let us know in the comments section below.

If you like this post feel free share and if you want to connect with me just add me up on LinkedIn  Faysal Hasan https://au.linkedin.com/in/faysalhasan

Tuesday, November 15, 2016

Adobe Elements, Adobe Acrobat Reader, "Attempt to access invalid address" in Windows 10, Windows 7



Adobe Elements, Adobe Acrobat Reader, error message "attempt to access invalid address  in Windows 10, Windows 7


Try this Reg fix 

The key is "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Memory Management" 

Look for entry MoveImages 
if not there create new DWORD and it will be hexadecimal value 0x0 by default
If you set the key to 1 instead of 0 and restart your machine it resolved this error message


For Office 365 Attempt to access invalid address

The issue is for EMET (Enhanced Mitigation Experience Toolkit) which  causing the problems.
Try upgrading to new version from here https://technet.microsoft.com/en-us/security/jj653751
or uninstalling EMET doesn't work 
Then try this reg fix :

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\
For any process used by MS product it will have a value for 'MitigationOption' (eg excel.exe, infopath.exe etc) 

Set 'MitigationOption' to 0 or delete it.

Friday, April 8, 2016

Google Apps for your small business

I've been using Google Apps for my company, and it's really helped my team work more quickly and efficiently. I think that you'd also benefit from trying it out for your business.

Google Apps is a cloud-based productivity suite that includes Gmail for professional email, Drive for online storage, Hangouts for video meetings, Calendar for scheduling and Docs for editing files. 

I especially like how easy it is to get things done and work with others from anywhere, using any device that I choose. I've also found Apps to be highly cost effective.

Google Apps helps teams communicate, collaborate and get things done from anywhere and on any device. It's simple to set up, use and manage, so your business can focus on what really matters.

Millions of organisations around the world count on Google Apps for professional email, file storage, video meetings, online calendars, document editing and more.

These are some highlights:
Business email for your domain:

Looking professional matters, and that means communicating as you@yourcompany.com. Gmail’s simple, powerful features help you build your brand while getting more done.

Access from any location or device:
Check emails, share files, edit documents, hold video meetings and more, whether you’re at work, at home or in transit. You can pick up where you left off from a computer, tablet or phone.

Enterprise-level management tools:
Robust admin settings give you total command over users, devices, security and more. Your data always belongs to you, and it goes with you, if you switch solutions.

Start free trial

Faysal Hasan - is a IT System Engineer has with a passion for security. He worked in information technology service delivery for more than 7 years. He received his Bachelor in IT from Southern Cross University, Australia and has earned numerous technical certifications throughout his career. He is currently working as the System Engineer in Enterprise Operations looking after technology infrastructure for Victoria Police.

Friday, April 1, 2016

Windows 10 Change your Default Browser

Change Your Default Browser
If you upgraded to Windows 10 from Windows 7 or 8, you'll notice that Microsoft Edge is now your default browser, even if Chrome or Firefox was your default before. Edge Browser is a bit faster than Chrome or Firefox, but doesn't provide the level of extensibility that its competitors offer. If you are a Chrome or Firefox user, you'll want to change your default right away.
1. Navigate to settings.

2. Click System.



  
3. Select Default apps from the left pane.
                    
4. Click the Microsoft Edge icon under the "Web browser" header.
 

5. Select the browser you want as your new default (ex: Chrome).

Windows 10 how to Disable User Account Control

Isn't it annoying every time you try to remove or install something windows ask for your account username and password or at least you have to press yes now you get say goodbye to User account control pop up. Here is how to Disable User Account Control










Windows wants to wag a finger at you every time you try to install a program or change a vital setting by popping up a dialog box and making you click Ok to continue. Why warn  you if you already know what you're doing? Good question. Disable User Account control to stop the needless, annoying dialog boxes.
1. Search for "user account control" in the search box.
2. Open "Change User Account Control settings."
3. Slide the slider down to "Never notify" and click Ok.
4. Click Yes when prompted.

Windows 10 how to Enable System Protection / Create a Restore Point

Enable System Protection / Create a Restore Point
What happens if you install a bad piece of software or a defective driver and your computer starts acting strangely or you can't even boot. You'll want to revert Windows 10 to the previous system restore point, which will turn back the clock on your drivers, programs and settings to a time when the system worked perfectly. However, Windows 10 comes with system protection disabled. If you want to protect yourself -- and you should -- set up restore points following the instructions below.
1. Search for "restore point" in the Windows search box.


2. Launch "Create a restore point" from the results. You should see a list of available drives.
3. Select the system drive and click Configure. The system drive is usually the C: drive and has the word "(System)" written after its volume name.
4. Toggle Restore Settings to "Turn on system protection," set the maximum disk space usage by moving the slider and click Ok. We recommend leaving 2 or 3 percent for restore pints but you may be able to get away with the lowest (1 percent).
5. Click Create so that you create an initial restore point right away.
6. Name the initial restore point when prompted.
 7. Click Close when it is done.
If you need to restore from one of these points, you can click the System Restore button on the System Protection tab. If you can't boot, you can hit F8 or Shift + F8 during boot to get to the emergency menu on some computers. On other PCs, if you can at least get to the log in screen, you can hold down Shift while you select Restart.


Thursday, October 2, 2014

Windows 10 Download



Originally codenamed Windows Threshold, the new operating system essentially does away with the dependency on the tiled "Metro" user interface that Microsoft had attempted to implement across its entire device line, from desktop PCs to Surface tablets and Windows Phone devices. In its place is a combination of the so-called live tiles, present in areas like the new Start Menu, and a more classic Windows experience that aims to please both touch and keyboard-and-mouse users.

One way to look at it is that Windows is at a threshold :-). It’s time for a new Windows. This new Windows must be built from the ground-up for a mobile-first, cloud-first world. This new Windows must help our customers be productive in both their digital work and their digital life. This new Windows must empower people and organizations to do great things.

That new Windows is Windows 10.

Windows 10 represents the first step of a whole new generation of Windows. Windows 10 unlocks new experiences for customers to work, play and connect. Windows 10 embodies what our customers (both consumers and enterprises) demand and what we will deliver.

Windows 10 will run across an incredibly broad set of devices – from the Internet of Things, to servers in enterprise data centers worldwide. Some of these devices have 4 inch screens – some have 80 inch screens – and some don’t have screens at all. Some of these devices you hold in your hand, others are ten feet away. Some of these devices you primarily use touch/pen, others mouse/keyboard, others controller/gesture – and some devices can switch between input types.

We’re not talking about one UI to rule them all – we’re talking about one product family, with a tailored experience for each device.

And across this breadth of devices, we are delivering one application platform for our developers. Whether you’re building a game or a line of business application, there will be one way to write a universal app that targets the entire family. There will be one store, one way for applications to be discovered, purchased and updated across all of these devices.
Windows 10 will deliver the right experience on the right device at the right time. It will be our most comprehensive platform ever.

here’s a peek at some of the new features you can test drive once you become an Insider:
Start menu: The familiar Start menu is back, but it brings with it a new customizable space for your favorite apps and Live Tiles.

Everything runs in a window: Apps from the Windows Store now open in the same format that desktop apps do and can be resized and moved around, and have title bars at the top allowing for maximize, minimize, and close with a click.

Snap enhancements: You can now have four apps snapped on the same screen with a new quadrant layout. Windows will also show other apps and programs running for additional snapping and even make smart suggestions on filling available screen space with other open apps.

New task view button: There’s a new task-view button on the taskbar for quick switching between open files and quick access to any desktops you create.

Multiple desktops: Create desktops for different purposes and projects and switch between these desktops easily and pick up where you left off on each desktop.

Find files faster: File Explorer now displays your recent files and frequently visited folders making for finding files you’ve worked on is easier.





 DOWNLOAD Windows 10

Anyone wants windows 10 to play withCheck it out for download  http://windows.microsoft.com/en-us/windows/preview-iso

Product Key: NKJFK-GPHP7-G8C3J-P6JXR-HQRJR




Thursday, September 20, 2012

Desktop Support Interview Questions


Here is some sample Questions that will give you some idea of Desktop support job role and expertise that you required:

Q:Tell me something about yourself.    
Tell about your education, place you belong to, some struggle in life which shows that you have positive attitude and will to fight the odds.

1) What is Active Directory?       
A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administrator users, computers and printers in the network from active directory.    

2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and mx records? 
DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request.

Forward lookup: Converting names to IP address is called forward lookup.

Reverse lookup: Resolving IP address to names is called reverse lookup.

'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name.

'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS.


3) What id DHCP? Why it is used? What are scopes and super scopes?
DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy.

Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network.

Superscope: When we combine two or more scopes together its called super scope.

4) What are the types of LAN cables used? What is a cross cable?
Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed.Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.

5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable?      
The way the paired wires are connected to the connector (RJ45) is different in cross cable and normal LAN cable. The theoritical length is 100 meters but after 80 meters you may see drop in speed.

6) What would you use to connect two computers without using switches?
Cross cable.   

7) What is IPCONFIG command? Why it is used?       
IPCONFIG command is used to display the IP information assigned to a computer. From the output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.     

8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available?     
When DHCP server is not available the Windows client computer assigns an automatic IP address to itself so that it can communicate with the network computers. This ip address is called APIPA. ITs in the range of 169.254.X.X. APIPA stands for Automatic private IP addressing.         


 9) What is a DOMAIN? What is the difference between a domain and a workgroup?
Domain is created when we install Active Directory. ITs a security boundary which is used to manage computers inside the boundary.    

Domain can be used to centrally administer computers and we can govern them using commo policies called group policies. We can't do the same with workgroup.

10) Do you know how to configure outlook 2000 and outlook 2003 for a user?
Please visit the link below to find out how to configure outlook 2000 and outlook 2003.
http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp


11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express?          
PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express useds odb file.   

12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it?     
BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "Last known good configuration". If this doesn't work than boot the computer in safe mode. If it boots up than the problems with one of the devices or drivers.


13) What is RIS?
RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS.


What is Imaging/ghosting?   Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or imaging/ghosting because installing OS every time using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging.  


14) What is VPN and how to configure it?      
A VPN, or Virtual Private Network, is just a network of computers that are all connected securely even though they’re in different locations and all using different connection methods. The biggest benefit to a VPN is that all of the computers on one are securely connected to one another and their traffic encrypted and kept away from prying eyes. Another great benefit to a VPN is that all of the computers on one are effectively on the same network, meaning they can communicate as if they were right next to one another, plugged in to the same router. VPN can be configured using the steps mentioned in the KB: http://support.microsoft.com/kb/305550
Setting up VPN in windows 7 : http://www.wikihow.com/Configure-a-VPN


15) Your computer slowly drops out of network. A reboot of the computer fixes the problem. What to do to resolve this issue?          
Update the network card driver.    

16) Your system is infected with Virus? How to recover the data?
Install another system. Install the OS with the latets patches, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.

17) How to join a system to the domain? What type of user can add a system to the domain?       

Adding a Computer to an Active Directory Domain is not hard by any means, but there are 3 things you should always remember:
  • Rename the machine to a user friendly, recognizable name before adding it to the Domain.
  • Make sure your DNS settings are pointing to the correct DNS Server for the domain.
  • You have to have access to a Domain account that is part of the Domain Admins security group.
http://www.howtogeek.com/99381/it-how-to-join-machines-to-your-active-directory-domain/ 

18) What is the difference between a switch and a hub?  
Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.    

19) What is a router? Why we use it?  
Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so.

20) What are manageable and non manageable switches?           
Switches which can be administered are called manageable switches. For example we can create VLAN for on such switch. On no manageable switches we can't do so.

21) What is bootloader?
Answer: Boot loader facilitates loading of operating system on the system. It enables the booting process and gives OS options to the user while starting the system. 

22) Which is better - Windows 7 or Windows XP? Support your answers with examples.
Answer: Windows 7 boasts of better features and is recommended over Windows XP. The looks and graphics of windows 7 are impressive and features better secured system. It is better equipped to defend virus and malware attacks. Speech recognitions, backup and restore functions, application compatibility, quick installation, etc., are some of the features that give advantage to Windows 7 than windows XP. 

23) How to recover files if the system detects virus?
Answer: Firstly, install another operating system with latest patches and upgraded antivirus protection. Now, connect the main infected hard disk to the system. Run the antivirus and scan the secondary HDD. Once the hard disk is cleaned, copy the files to another system. 

24) Differentiate between firewall and proxy server
Answer: Firewall is used to protect the internal IT infrastructure from hackers. Proxy servers allow sharing internet connections and protecting IP addresses. Firewall is a networking based technology and proxy server is an application based technology. 

25) What measures are taken to improve the security of the desktop system?
Answer: First step is to install and upgrade the anti-virus for the system. Secondly, ask all users to not give out or write down passwords, include special characters, and it must be at least 8 characters long. Thirdly, for desktop security, ensure the screen is locked and password secured during the day, and logged off during the night. 

Situational Questions
These questions are based on a situation that requires actions from your side. Since your profile is of a desktop support, you are required to constantly answer queries. There are several situations that require your assistance. We have listed a few as examples.
  1. What steps will you follow if you have to install same operating system on over 70 computers at the same time?
  2. Describe the process for adding a new user to a network of 15 computers?
  3. How would you retrieve passwords if one of the users have forgotten their password and can no longer access their official account?
  4. How would you resolve a problem if the complainant says that whenever she tries to use internet explorer, the page does not load and instead gives a prompt, 'virus detected'?
  5. Give example of an instance where you have explained a complex technical term or procedure to a layman? Which examples you gave to solve their queries?
While answering these questions, give a step-by-step analysis of the method to resolve the problem. Use simple language that even a layman can understand. Try to give instances from your work experience in support of your answer. Refrain from using a typical answer. Customize it as per the given problem and work nature. 

These were some examples of technical questions. Besides these, they may be asked certain personal questions too. It includes introspective questions like strengths, weaknesses, ambitions, goals, etc. These questions are asked with the objective of finding more about the personality and capability of the candidate.

Interview is your one chance at success. Candidates have to give their best to make most of this one chance. Hence, we suggest candidates to participate in mock interviews and practice interview questions. You can study these answers or make your own as per your experience. Feel free to utilize these desktop support interview questions to your benefit and make a positive first impression on your recruiter. 

For instance, OSI model's a standard one... because everyone who is even remotely involved with networking should at least be aware of what it is. If a desktop tech knows enough to be able to at least say something like "layer 1 is hardware layer" then at least they've shown enough formal knowledge that they're capable of learning more (meaning, recognize the question and give an intelligible response, no matter how primitive). Equivalently, that a shop would ask an entry-level applicant that indicates that the shop finds it important enough to ask questions like that, and so it's likely asking if you the candidate can be formally trained by asking for formal knowledge.

Not that this is all set in stone, of course (plenty of variance!), but as information goes back and forth, you the candidate should be evaluating the potential employer just as much, if not more, than the potential employer is evaluating you.

Sadly, it's just not possible to cover every question an entry level tech support position could possibly be asked. Worse, we don't know if the interviewer is of the school that by asking something really complex, he wants to gauge your response (do you panic, do you umm and ahh, do you reason through it, what do you do), and so doesn't really care whether you answer the question right or not.

So I'll just advise some very general concepts:
1) Don't panic.
2) Don't panic. and 
3) Answer truthfully and honestly. If you don't know something, say "I don't know, but I know how to Google it/research it/find out," assuming that you actually can Google it/research it/find it out. Did I mention not to panic? 

Don't treat it like an exam, there will not be a grade. Just do your best, and show that you're the best candidate for the job by being level-headed, honest, willing to learn, and capable.
3) Answer truthfully and honestly. If you don't know something, say "I don't know, but I know how to Google it/research it/find out," assuming that you actually can google it/research it/find it out.

This is the best advice yet. I'll add a 4.      

4.) Whatever you do, don't try to BS your way out of a situation.         

A favorite scenario I've seen goes something like this: 

Interviewer: "Have you had any experience working with with Startex printers?"
Candidate: "Yeah, a couple years ago."I: "What did you do when you supported them"        
C: "Oh the usual stuff-- maintenance, toners, etc. I don't really remember too much, we didn't have too many of them in the company."       

    
I: "That's funny you have all that experience, because I just made up Startex printers."

An honest no is a MUCH better answer. You can usually relate a "no" back to something you do know on some level.           

Typical troubleshooting questions will often be scenarios. The point is that the interviewer will want to see you talk through a problem, not produce the magical answer. Doing scenarios allows the interviewer to change things up as needed. I like to troubleshoot a "no POST" first off. A candidate who can't get at least partway through the process is hopeless. If they remember to check the basics (plugged in, power supply turned on, power strip/UPS on, etc.) or remember to ask the user what happened prior to the problem, then you see an extra level of attention to detail.

I'll ask rote memorization questions as well, but I'd rather lead a candidate through a discussion where I can see how they think. It's a horrible cliché, but for a candidate that only has a hammer, they start attacking problems like nails. For an entry level tech, they're not expecting stupidly hard-core computer knowledge-- they want the basics of computer operation, understanding of the troubleshooting process, and the ability to think through a problem creatively.        

Whenever I interview people I ask them some questions to determine two things: their level of competence with the technology they'll be using and their methodology for solving problems that they don't immediately know the answer to. Doesn't matter if it's entry level helpdesk or advanced system design, it's all in how the job candidate answers the question and not so much the answer itself.

Q: How does X work?
If you can tell me exactly how it works, great. If you can't, tell me how you THINK it works, how it might be similar to something else that you understand, how it works from a more general perspective, how you would find out how it works, etc. Pull out a piece of paper and start drawing that shit out. Whatever, just show me that if you don't know the full answer that you can explain to me what you do know, how you think it might work, and how you'll figure it out.

I think you're likely to get some questions to judge your general troubleshooting skills as well as some basic knowledge about the environment you'll be supporting. Based on the job description, at least have a simple understanding of the systems and tech you'll be working with. I think in an entry-level job they'll probably have most of the stuff you need to know written down somewhere for you to use as you run into a given problem.

Remember that most IT concepts are just that - concepts. The technical ins-and-outs change from hardware to hardware, software to software, but the concepts nearly always remain the same.

So when hit with something like, "What experience do you have with Startex printers?", you could respond with, "I haven't, but most printer management and maintenance techniques are the same, depending on printer type (desktop, office laser, plotter, etc) across the industry."

For instance, I had no clue how to manage the specific e-mail server software at my new job, but I've had extensive Exchange experience, and of course the concepts of e-mail systems management are essentially the same across the board.



Thank you All


Faysal Hasan
Microsoft Certified IT Professional (MCSA, MCTS, MCITP)
Citrix Certified Administrator (CCA), 
Information Technology Infrastructure Library -V3 Certified
Bachelor of Info Tech (Southern Cross University, Australia)

It’s Your Life ... ... C O L O U R IT "


Note: The above suggestions and questions are not my work I just collected them organized, modified and presented here so that people like you who is looking for answer don't have to lost in a sea of Google search result.

Twitter Facebook Favorites More