...NOS 120 Journal Ubuntu 10.04 This document is a periodical listing of all assignments and instructions completed in the NOS 120 class. 2011 NOS 120 Journal Ubuntu 10.04 This document is a periodical listing of all assignments and instructions completed in the NOS 120 class. 2011 ------------------------------------------------- Table of Contents: Table of Contents ………………………………………………………………………………………………………………………………… 2 Table of Contents (cont.) …………………………………………………………………………………………………………………….. 3 Course Syllabus ……………………………………………………………………………………………………………………………………. 4 Journal Post (8/17) ……………………………………………………………………………………………………………………………… 13 Chapter 1 Questions …………………………………………………………………………………………………………………………… 14 Journal Post (8/24) ……………………………………………………………………………………………………………………………… 16 Chapter 2 Questions ……………………………………………………………………………………………………………………………. 17 Journal Post (9/7) ………………………………………………………………………………………………………………………………… 18 Chapter 3 Questions ……………………………………………………………………………………………………………………………. 19 Journal Post (9/12) ……………………………………………………………………………………………………………………………… 20 Chapter 4 Questions …………………………………………………………………………………………………………………………… 21 Chapter 5 Questions …………………………………………………………………………………………………………………………… 23 NOS 120 Test 2 …………………………………………………………………………………………………………………………………… 24 Linux File System vs. Windows File System …………………………………………………………………………………………. 27 Journal Post (9/14) ……………………………………………………………………………………………………………………………… 28 10.04 Sources List ………………………………………………………………………………………………………………………………...
Words: 17866 - Pages: 72
...How to Dual-boot Linux and Windows (on a PC with Windows 7 already installed) The purpose of this Instructable is to set up your computer to dual-boot Windows 7 and Ubuntu Linux. Dual-booting is a technique which allows a single physical computer to run two or more operating systems (OSes). This is useful for experimenting with new OSes without putting all your eggs in one basket. Step 1: Getting Prepared Prerequisites: 1. A PC running Windows 7, with at least 30 GB of free hard-drive space. 2. A CD/DVD burner and blank CD/ DVD or a USB drive with a capacity of 1GB or more 3. An external Harddrive big enough to backup your Windows installation 4. Administrative access to the PC 5. Internet Connectivity Most PCs sold in the last three years should meet the criteria for number 1. To confirm what version of Windows you are running, go to My Computer and click on “System properties.” The listed version should be Windows 7. From that same screen, you should see how much free space you have left, which is underneath the blue bar for each disk. In the example image, there is "8.49 GB free of 55.7GB". NOTE: The 8.49GB shown in the example is not enough space for most people. While you can install Ubuntu to a partition this size, you will typically want more space store documents and applications. 20GB is probably the minimum size you would want. Step 2: Select a Linux Distro Linux comes in many flavors. Some distributions are aimed at full configurability...
Words: 1716 - Pages: 7
...it is difficult to find real devices for which students can easily write drivers. Moreover, providing devices to students might be financially infeasible, even if an appropriate device could be found. We have thus found it easiest for students to write a driver for a virtual device. Specifically, we have them implement a RAM disk driver, which allocates a large block of memory and presents it in the form of a block device ------------------------------------------------- Supported Hardware Ubuntu does not impose hardware requirements beyond the requirements of the Linux kernel and the GNU tool-sets. Therefore, any architecture or platform to which the Linux kernel, libc, gcc, etc. have been ported, and for which an Ubuntu port exists, can run Ubuntu. Rather than attempting to describe all the different hardware configurations which are supported for AMD64, this section contains general information and pointers to where additional information can be found. Supported Architectures Ubuntu 12.04 supports...
Words: 2453 - Pages: 10
...Security summarized 1. First of all: there is no 100 % security. Not in real life and not in the digital world. Not even when your computer is running Linux. You should always use your common sense. And even then it can go wrong. A certain amount of risk, however small, is unavoidable. A Frenchman would say: c'est la vie. About viruses, firewalls and exploits I can be brief: Antivirus software 1.1. You don't need antivirus software in Ubuntu, Linux Mint and Debian. Because a virus can't do anything in Linux. Mainly because of this: in order to install on your computer, a virus needs your password. And that it doesn't have. Furthermore, you generally only install software from the secured "software store" (repositories) of your Linux distribution. This is a very effective barrier against malware. Therefore there are no Linux viruses "in the wild" (with the exception of web servers, but securing web servers is quite a different cup of tea). The best protection against viruses is this: - install a well-supported Linux, like Ubuntu or Linux Mint; - check daily for updates; - don't use antivirus, as antivirus in Linux gives only a false sense of security, but simply use your common sense. For the full story, read on (item 2 and further). Firewall 1.2. A firewall is already installed by default. It's called IPtables. IPtables can be managed through the application Uncomplicated Firewall (ufw), which is also installed by default. By default the firewall isn't...
Words: 2232 - Pages: 9
...Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY ISSUE #90 - October 201 4 Photo: miss_millions (Flickr.com) P R I S O N AR C H I T E C T BUILD YOUR OWN OPEN SOURCE PRISON Fu ll Ci rcle M a g a zi n e i s n e i th e r a ffi li a te d wi th , n o r e n d o rse d b y, Ca n o n i ca l Ltd . full circle magazine #90 1 contents ^ HowTo OpenConnect to Cisco p.1 4 Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY Linux News p.04 BACK NEXT MONTH LibreOffice p.1 5 Command & Conquer p.1 2 Arduino p.25 LinuxLabs p.XX Broadcast With WCS p.1 7 Linux Labs p.28 Review p.36 My Story p.37 BACK NEXT MONTH Blender p.XX Letters p.40 Tuxidermy p.41 Q&A p.42 BACK NEXT MONTH Inkscape BACK NEXT MONTH Ubuntu Women p.XX Ubuntu Games p.44 Graphics p.22 Security p.XX The articles contained in this magazine are released under the Creative Commons Attribution-Share Alike 3.0 Unported license. This means you can adapt, copy, distribute and transmit the articles but only under the following conditions: you must attribute the work to the original author in some way (at least a name, email or URL) and to this magazine by name ('Full Circle Magazine') and the URL www.fullcirclemagazine.org (but not attribute the article(s) in any way that suggests that they endorse you or your use of the work). If you alter, transform, or build upon this work, you must distribute the resulting work under...
Words: 22047 - Pages: 89
...running on Ubuntu Linux. Installing Python $ sudo apt-get install python-software-properties $ sudo add-apt-repository ppa:ferramroberto/java Update the source list $ sudo apt-get update Install Sun Java 6 JDK $ sudo apt-get install sun-java6-jdk Select Sun's Java as the default on your machine. (See 'sudo update-alternatives --config java' for more information.) $ sudo update-java-alternatives -s java-6-sun The full JDK which will be placed in /usr/lib/jvm/java-6-sun (well, this directory is actually a symlink on Ubuntu). After installation, make a quick check whether Sun’s JDK is correctly set up: $ java –version java version "1.6.0_20" Java(TM) SE Runtime Environment (build 1.6.0_20-b02) Java HotSpot(TM) Client VM (build 16.3-b01, mixed mode, sharing) Adding a dedicated Hadoop system user $ sudo addgroup hadoop $ sudo adduser --ingroup hadoop hduser This will add the user hduser and the group hadoop to your local machine. Configuring SSH user@ubuntu:~$ su – hduser hduser@ubuntu:~$ ssh-keygen -t rsa -P "" Generating public/private rsa key pair. Enter file in which to save the key (/home/hduser/.ssh/id_rsa): Created directory '/home/hduser/.ssh'. Your identification has been saved in /home/hduser/.ssh/id_rsa. Your public key has been saved in /home/hduser/.ssh/id_rsa.pub. The key fingerprint is: 9b:82:ea:58:b4:e0:35:d7:ff:19:66:a6:ef:ae:0e:d2 hduser@ubuntu The key's randomart image is: [...snipp...] hduser@ubuntu:~$ cat $HOME/...
Words: 2067 - Pages: 9
...Windows 8 on my Asus machine the windows operating system was installed when I purchased my machine. For my Virtual operating system I chose an Ubuntu (64bit) operating system since I had no former experience with it I will be running the operating system on the Oracle VM Box Manager. My first experience with the Virtual Operating system is that I had to go to https://www.virtualbox.org/ to download the files to use to get the program for the virtual operating system. This took some leg work for me because I wanted to make sure that I was doing this correctly I didn’t want to accidently download a virus or something that would hurt my machine or break it so to speak. I consulted http://www.pythian.com and I found that the information there seemed legitimate so I went ahead with the downloading process. When you look on the site for the Oracle VM Box Manager they do include a very detailed manual so I found the correct install for my host which is windows it only took a couple of minutes for it to download. Once downloaded you go through the wizard which is pretty straight forward but I do highly suggest keeping the manual open for a reference so that you are able to know how much RAM to allocate your guest operating system. Once you have your virtual machine named and set up with a virtual hard drive you are ready to install your guest your operating system. Don’t worry there is a wizard for this and again there is also the handy manual located on their site. I will...
Words: 985 - Pages: 4
...The Hacker’s Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems By: David Melnichuk http://www.learn-how-to-hack.net http://www.MrCracker.com 1 Copyright Notice This report may not be copied or reproduced unless specific permissions have been personally given to you by the author David Melnichuk. Any unauthorized use, distributing, reproducing is strictly prohibited. Liability Disclaimer The information provided in this eBook is to be used for educational purposes only. The eBook creator is in no way responsible for any misuse of the information provided. All of the information in this eBook is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly. The word “Hack” or “Hacking” in this eBook should be regarded as “Ethical Hack” or “Ethical hacking” respectively. You implement the information given at your own risk. © Copyright 2008 Learn-How-To-Hack.net. All Rights Reserved. 2 Table of Contents A. Introduction..............................................................................................5 1. How can I use this eBook? 2. What is a hacker 3. Hacker Hierarchy 4. What does it take to become a hacker? 5. Disclaimer B. Programming............................................................................................9 1. Do I really need it? 2. Where should I...
Words: 16651 - Pages: 67
...* Reference: ** Basics: *** Getting help: # View the manual for target command man command # Get help with a target command (probably the same as above, but not always): command -h # In case you forget the name of a command, print possible commands relating to any given word: apropos word # View index of help pages: info *** Command Line Utilities: **** Basic File and Directory Operations: # Print current working directory: pwd # Show files in current directory: ls # Show maximum information about all files, including hidden: ls -a # Recurse into subdirectories and list those as well: ls -R # List files by modification time, most recent first. ls -lt # Move/rename a file or directory (be careful that you don't move the source over a destination with the same name): mv source destination # Delete target forever (be very careful), use -r recursive flag for directories: rm target # Copy file or directory: cp source destination # Mount filesytem: mount /dev/device_name /media/device_name # Unmount: umount /media/device_name # Forensically clone filesystems and do other low-level operations on files. Be careful with this one. Can be destructive: dd # Work with disk partitions: parted # Filesystem creation tool: mkfs **** System Administration: # Execute command as an administrator (can be destructive/insecure. Use only for system administration tasks): sudo command # Become system administrator: sudo...
Words: 1920 - Pages: 8
...The Hacker’s Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems By: David Melnichuk http://www.learn-how-to-hack.net http://www.MrCracker.com 1 Copyright Notice This report may not be copied or reproduced unless specific permissions have been personally given to you by the author David Melnichuk. Any unauthorized use, distributing, reproducing is strictly prohibited. Liability Disclaimer The information provided in this eBook is to be used for educational purposes only. The eBook creator is in no way responsible for any misuse of the information provided. All of the information in this eBook is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly. The word “Hack” or “Hacking” in this eBook should be regarded as “Ethical Hack” or “Ethical hacking” respectively. You implement the information given at your own risk. © Copyright 2008 Learn-How-To-Hack.net. All Rights Reserved. 2 Table of Contents A. Introduction..............................................................................................5 1. How can I use this eBook? 2. What is a hacker 3. Hacker Hierarchy 4. What does it take to become a hacker? 5. Disclaimer B. Programming............................................................................................9 1. Do I really need it? 2. Where should I start? 3. Best way to...
Words: 16651 - Pages: 67
...CNIT 345 | Enterprise Internetwork Design & Implementation | Lab IV | | Contents OSPF 4 BASIC COMMANDS 4 Backup link Configuration 4 QOS 8 Testing 10 Trouble Shooting 11 Implications/How it works 11 SNMP & NetFlow 12 In Global Configuration Mode on each Cisco Router: 12 In Interface Configuration Mode on each Cisco Router: 12 Install Cacti on the HQ Server 12 Installing NfSen on the HQ Server: 13 Troubleshooting: 14 Verification/Testing: 14 Explanation: 15 What was not accomplished: 15 Formatting Cisco IOS on 2600 series routers 15 Testing 16 Trouble Shooting 16 General IPv6 commands: 17 Rip6 commands: 17 Implications/How it works 18 Testing 19 Troubleshooting 20 IP 21 Delegation: 21 VLAN information: 22 VLAN IP Addresses: 23 HQ Subnetting: 23 Store Subnetting: 24 Procedures: 25 Troubleshooting: 27 Traffic generation/Services 29 Installing Ubuntu 10.04.2 LTS 29 Installing and Configuring NTP on Ubuntu 31 Installing BackTrack 4 R2 32 Installing and Configuring Nping 35 Verification and Troubleshooting for Nping 35 Reflection 36 Troubleshooting 36 Adtran 37 Commands for set-up 37 How does Adtran differ from Cisco? 38 How do you verify/what were the results 38 Bibliography 39 Appendix A 40 OSPF BASIC COMMANDS The following commands are entered into global configuration mode. router ospf 10 network <the ip network of the network you wish to add> <the inverse...
Words: 7461 - Pages: 30
...Private network will ensure that they don’t interfere with any other DHCP or TFTP server on the Public network. Once the installation has finished, the client can be moved to the Public network. Installation media You can use any media you want. You can burn iso to DVD of CentOS 5 or 6 or Fedora. Network selection. For the Network Configuration, I renamed System eth0 and System eth1 to Public andPrivate respectively. I configured each NIC with static information and made sure to check theConnect Automatically checkbox for each — otherwise NetworkManager will not bring the NICs up. Package Selection For this section either you can rely on kickstart file which will have all packages listed in a tab called %packages or you can have minimal install like “Server”. Post-Installation Steps. Disable the Firewall It’s possible to have the firewall running — you just need to ensure that the proper ports are opened. For simplicity, and since this server is in a private network, I chose to have the firewall turned off. You can disable the firewall by doing: 1 | $ system-config-firewall-tui | and unselecting “Enabled” Disable SELinux I tried to have Cobbler run properly with SELinux, but in...
Words: 16529 - Pages: 67
...(GFS) and of the MapReduce computing paradigm. Hadoop’s HDFS is a highly fault-tolerant distributed file system and, like Hadoop in general, designed to be deployed on low-cost hardware. This document describes how to install, configure and manage non-trivial Hadoop clusters ranging from a few nodes to extremely large clusters with thousands of nodes. Required Software Required software for Linux and Windows include: 1. Java 1.6.x, preferably from Sun, must be installed. 2. ssh must be installed and sshd must be running to use the Hadoop scripts that manage remote Hadoop daemons. Installation Installing a Hadoop cluster typically involves unpacking the software on all the machines in the cluster. Typically one machine in the cluster is designated as the NameNode and another machine the as JobTracker, exclusively. These are the masters. The rest of the machines in the cluster act as both DataNode and TaskTracker. These are the slaves. The root of the distribution is referred to as HADOOP_HOME. All machines in the cluster usually have the same HADOOP_HOME path. Steps for Installation 1. Install java 1.6 Check java version: $ java –version 2. Adding dedicated user group $ sudo addgroup hadoop $ sudo adduser --ingroup hadoop hduser 3. Install ssh $ su - hduser Generate keypairs: $ ssh-keygen -t rsa -P "" Enable access to the local machine: $ cat $HOME/.ssh/id_rsa.pub >> $HOME/.ssh/authorized_keys $ ssh localhost 4. Disable IPV6 $ sudo gedit /etc/sysctl...
Words: 1213 - Pages: 5
...American Intercontinental University * Leonel A Silvestre * ITCO211 * File System Hi As your help desk technician I will do everything we can to help you with the operating system problem. Everybody knows what is a Hard Disk or Hard Drive let me refresh your mind, with a simple explanation: Hard Disk/ Drive, is a device for storing and retrieving digital information, primarily computer data. It consists of one or more rigid rapidly rotating discs (platters) coated with magnetic material, and with magnetic heads arranged to write data to the surfaces and read it from them. With that been said, now move forward with Operating System and Hard Disk/ Drive. I would like to recommend you the best operating system is DOS (Disk Operating System), why? Because has everything you need. Let me tell you a little more about DOS. Disk Operating System: Most often abbreviated as DOS, refer to operating system software used in most computers that provides the abstraction and management of secondary storage devices and the information on them (e.g., file systems for organizing files of all sorts). Such software is referred to as a disk operating system when the storage devices it manages are made of rotating platters, such as floppy disks or hard disks. In the early days of microcomputers, computer memory space was often limited, so the disk operating system was an extension of the operating system. This component was only loaded if needed. Otherwise, disk...
Words: 1780 - Pages: 8
...Assessment Criteria (Marks Breakdown) Please note that during the preparation of your assignment documentation, you must include the following marking table. Ensure you fill in the details of your full name and student ID. Name/ Student ID: Preperation of the executive summary and legal warrants (10) Documentation (10) Conclusions/recommendations (10) Referencing (10) Evidence identification and preservation (15) Critical analysis and evaluation of the case (15) Q&A session during presentation (30) Total (100) The marking table must be placed on a single page, located as either the second or third page of your final assignment documentation. Contents EXECUTIVE SUMMARY 2 AUTHORIZATION 3 IDENTIFICATION 4 COLLECTION AND PRESERVATION 5 Mr. Mike’s Work-Station 5 TTBANK Server 5 CHAIN OF CUSTODY FORM 7 EXAMINATION AND ANALYSIS 8 EVIDENCES RECOVERED 8 RECONSTRUCTION 11 RELATIONAL ANALYSIS 12 CONCLUSION & RECOMMENDATION 13 EXECUTIVE SUMMARY This is the case involving the staff of TTBANK that was suspected of misuse of company property due to that staff bragging about gaining access to privileged information to his colleagues that he should have otherwise not have gotten access to. The issue first came to the attention of Mr. Ali, the Enterprise Systems Administrator of TT Bank who had investigated silently to discover the identity of the staff and that the person was a member of the Loans Department and his name was Mr. Mike...
Words: 1635 - Pages: 7