...CSCI 1483 Intro to UNIX/Linux Ch 1-5 Slide Objectives for Midterm exam prep Ch 1 Objectives * Define OSs, including PC and server OSs * Describe the UNIX and Linux operating systems * Explain the purpose of UNIX/Linux shells * Discuss how to select user names and passwords * Connect to UNIX/Linux using Telnet or SSH * Use basic *nix commands & editing features * Explain the role of a system administrator * Change your password for security * Use multiple commands to view the contents of files * Redirect output to a file Ch 2 Objectives * Discuss UNIX/Linux FSs and list several examples * State the standard tree structure * Define partition and list 3 recommended ones for *nix * What are inodes, and what is stored in them? * Describe contents of: /boot, /bin, /dev, /home, /lib, /mnt, /media, /proc, /root, /sbin, /tmp, /usr, and /var * State purpose of the mount and umount commands * State the path (pathnames) to any file, and prompts * List commands to do the following: * Navigate the FS, create and remove directories, copy and delete files, configure file permissions Ch 3 Objectives * Compare ASCII, binary, and executable files * Understand the types of editors * Tell how to enter the 3 modes of the vi editor * Be able to create and edit files using the vi editor * Be able to create and edit files using the Emacs editor * Nothing to submit for these last 2 objectives ...
Words: 397 - Pages: 2
...Linux Security Technology Security of a system is important in our today’s use of the internet. That is why Linux with its many layers that are always evolving in security to protect against all kinds of hackers or othe types of attacks . SELinux, Chroot Jail, IPTables, Mandatory Access Control and Discrestionary Access Control, just to name a few. SELinux is an access control implementation for the Linux kernel. Take for instants that you are the administrator and you define rules in user space and if the Linux kernel has been added with SELinux support, then those rules will be followed by the kernel. SELinux is a NSA Security-Enhanced Linux, in which the mandatory access control is flexible. The structure of SELinux supports against all kinds of mandatory access control policies. Some of which are Role-Based Access Control and Multi-Level Security. It was designed by NSA for the purpose of protecting a server against malicious daemons, by telling the daemons what they can and can’t do. This type of technology was created by Secure Computing Corporation, but was supported by the U.S. National Security Agency. In 1992, the thought for a more intense security system was needed and a project called Distributed Trusted Match was created. Some good solutions evolved from this, some of which were a part of the Fluke operating system. Which then became the Flux and finally led to the creation of the Flask architecture. Eventually it was combined with the Linux kernel, which...
Words: 873 - Pages: 4
...Administration système et sécurité sous LINUX La configuration de base du réseaux Enseignant: Arafet BOUSSAID arafet.boussaid@gmail.com 1 Service intro Prot ocol e http Port RFC Client Serveur Couche 3 TCP, UDP (httpdata) TCP Web 80 / 443 2616 Firefox, opera, chrom, Apache, IIS, Lighthttpd VSftpd, Role FTP, Filezilla server Postfix-dovecot eXchange, Lotus Domino BIND, Role DNS Vlc-server Transfert de fichier ftp 20 / 989 21 /990 959 FileZilla FlashFXP CuteFTP Messagerie Smtp 25 Pop 110 / 995 Imap 143 / 993 Resolution de nom streaming DNS 53 2821 Outlook, Thenderbird, Evolution 1034 Resolver TCP TCP UDP c/s TCP s/s UDP Rtp rtcp rtsp 5004, 5005 Vlc 2 Service intro à Admin distance Proto Port cole telnet Ssh 23 22 RFC 854 Client Serveur Telnetd openSSH Couche 3 TCP Cmd Shell linux 4253 Putty WinSCP 2131 système Auto Dhcp configuratio n IP Contrôleur de domaine Surveillanc e réseaux Ldap 67 Role dhcp Dhcpd OpenLdap, ActiveDiractory UDP 389 2251 Client/ serveur messgerie, OS client 2573 Nagios Cacti Zabbix système Tcp/udp Snmp 161 Snmp 162 -trap Agent SNMP Tcp/udp Synchronis ation du temps Ntp 123 NTPd UDP 3 /etc/services intro Description : Les candidats doivent être capables d'examiner, de changer et de vérifier les paramètres de configuration de la pile TCP/IP côté client Termes, fichiers et utilitaires utilisés : – /etc/hostname...
Words: 1178 - Pages: 5
...Week 2 – Case Study SEC-280 11-9-2013 The first point that I will address consist on the multiple dangers that computer networks are exposed, that are in majority done by perpetrators that get access to servers of Windows and Linux to explode their vulnerabilities.. The use of these codes or malware in the form of viruses, worms, time bombs or any peculiar name this individuals use to give to their destructive toys, are a major concern to the protection of confidential information. Data so sensitive that in their majority is composing of identity, credit, and property information so well collected and compiler that is plenty for the creation of a clone of a company or a person. These identity theft atrocities are not limit to the software and information appropriation; also the attacks diminish computer performance, affecting their velocity and cause computers to crash. The CIO should possess a compendium of way’s to defend his network, and a rapid decision capability to take decisions in a short time period. Furthermore, in general terms security; as we can define “ the act of provide a sense or protection against lost, attack or harm”, can use or integrate a complete protection plan. Depending on the resources of the company the integration of a security plan that can integrate “the five pillars of security IT security operation: policy and audit management, access management, infrastructure and hardware security and incident response.” The real world presents to us a...
Words: 591 - Pages: 3
...Strayer University Assignment 3: Virtualization Across the Board Dennis R. Roque CIS512: Advanced Computer Architecture Professor Amir Afzal 4 March 2013 Table of Contents 1. Compare & contrast the AMP & SMP architectures 3 2. Determine if hardware virtualization helps businesses and organizations in terms of: 3 Cost management 3 Systems performance and scalability 4 Systems management and administration 4 3. Determine if software virtualization helps businesses and organizations in terms of: 4 Cost management 4 Systems performance and scalability 4 Systems management and administration 5 4. Compare and contrast VMware, Microsoft, and Citrix in terms of:…………………………………….5 Market adoption 5 Technical architecture 6 Technical support 8 5. Determine which vendor you would recommend for a virtualization strategy and explain why: 8 References:……………………………………………………………………………………………………………………………9 1. Compare & contrast the AMP & SMP architectures While symmetric multiprocessing (SMP) plays an important role in multi-core systems, the packet processing performance curve in an SMP configuration can flatten after only a few cores, yielding diminishing returns as more system resources are allocated to networking tasks. Wind River’s asymmetric multiprocessing (AMP) technologies provide a clean separation of control plane and data plane functions, which enable greater efficiency of multiple processing cores. The data...
Words: 2359 - Pages: 10
...1.1 (Intro.) CS-M74 Software Product Development (2003-4) 1.2 (Intro.) Roger D Stein BSc PhD MBCS CEng CITP R.D.Stein@swansea.ac.uk Room 302, Faraday Tower 1.3 (Intro.) CS-M74 Pre-requisites • CS-M01 Distributed Programming in Java 1.4 (Intro.) Assessment Report 10% Linux / C 10% Group Project 20% Project Specification 30% Written Examination (May/June) 30% Lectures approx. 20 in total ((plus tutorials)) TB1 Tues. 9.00 Far-L ? Andy Gimblett (3 Linux + 6 C) [with CS-244] Wed. 11.00 Glyn-A ? Roger Stein (start on 5 November) TB2 Lectures Linux /C 9 Introduction 1 Ethics 1 Legal Issues 1 Project Management 2 (Group Project 2) Software Engineering 4 1.4 (Intro.) Books B. Ayres, The Essence of Professional Issues in Computing, Prentice-Hall, 1999 S Baase, A Gift of Fire, 2nd ed., Prentice-Hall, 2003 B. Hughes and M. Cotterell, Software Project Management, 3rd ed., McGraw-Hill, 2002 R. Pressman, Software Engineering: A Practitioner’s Approach, 5th ed., McGraw-Hill, 2000 I. Summerville, Software Engineering, 6th ed., Addison-Wesley, 2001 1.5 (Intro.) Why Software Engineering? “Engineering … to define rudely but not inaptly, is the art of doing that well with one dollar, which any bungler can do with two after a fashion” - Arthur Mellen Wellington, The Economic Theory...
Words: 3498 - Pages: 14
...Unix / Linux vs. Microsoft Windows Server Student Name Goes Here Class Number Goes Here Due Date Goes Here Professor Name Goes Here Unix / Linux vs. Microsoft Windows Server Introduction Pace Glass Company is a global cutting, polishing and bending company with operating facilities in two U.S. cities. Pace Glass Company's major clientele include RV manufacturers, specialty car manufacturers, automotive parts manufacturers, aircraft manufacturers, appliance manufacturers and most prestigiously N.A.S.A. With manufacturing plants in Southwest Michigan and Northwest Ohio, Pace Glass Company's online business plays a vital role in continued growth and as such there is heavy consideration underway as to which type of computer operating base the company upgrades will be implemented against. Pace Glass executives and partners recognize that security and reliability are key to the continued growth in their online presence which plays a substantial role in system determination. Purpose The purpose of this study is to discuss the differences between Unix, Linux and Microsoft Windows and server environments. This study will discuss facts that cover security, administrative, networking, performance, programmability as well as provide a briefing in conclusion. Security Approach A fundamental difference between the Unix approach to system security and the Windows approach is that significant security characteristics of Unix systems are a consequence of good architectural design...
Words: 2110 - Pages: 9
...ITT TECHNICAL INSTITUTE NT1210 INTRO TO NETWORKING Salem, Oregon. Exercise 2.4.1 Record the steps that you take, and copy the output from the command into your lab report. The utility (ipconfig) allows you to get the IP address information of a Windows computer. It also allows some control over active TCP/IP connections. ipconfig is an alternative to the older 'winipcfg' utility. The output of the default command contains the IP address, network mask and gateway for all physical and virtual network adapters. 'ipconfig' supports several command line options as described below. The command "ipconfig /?" displays the set of available options. Windows Command Line Step1 [pic] Step2 [pic] Step2 type ipconfig [pic] Lab2.4 Review 1 what common information was given by the operating systems? With windows ipconfig we have the IP address IPv4 10.162.108.99. Step2. With Fedora Linux ifconfig we have the Inet addr 10.251.209.100. From table 2-16 at the Lab manual. Therefore we see that the common info is the IP address. 2 outside of networking, is there a benefit to knowing how to access the command line interface of an operating system? You can used the command line interface of an operanting system in your personnal area network (PAN) at your home. You can used it at other computer systems outside the school’s network. 3 Some network devices do not have a convenient graphical user interface or gui for you to explore their...
Words: 265 - Pages: 2
...Intro. To programming review Module is a group of statements to perform a task Function is a group of statements that perform a task and return a value CH.1 Difference between application software and OS Know OS's (give example: Microsoft, Linux, Mac, etc.) Know what interpreter does for you Know difference between a Logic & Syntax error Know Fortran is first High level programming language Know Assembly Language Know how CPU works(Fetch,Decode,Execute) Which is faster, Interpreter or compiler Pg.18 Machine Language (1001001) Know about unicode Know difference between logic and syntax......again lol Program development cycles Pg.30 Difference between psuedocode and flowchart Same as 13 Repetition and sequence of structure Know all of the processing symbols for flowchart Mathematical operators Pg.46 Order of precedence Know data types Pg.56 What is constant variable (named constant) Know benefits of using modules know pseudocode in sequence same as 23 know about return point (memory address location) what flowchart symbol is the module call (rectangle with 2 lines?) difference between flowchart and hierarchy chart Pg.83 parameter difference know passing argument by value and by reference Pg.97 know difference between global & Local variable same as 28 difference between control and sequence of structure what is sequence structure ...
Words: 259 - Pages: 2
...Darius Murdock ------------------------------------------------- 2322 Saint Clair Drive, Temple Hills, MD 20748 ------------------------------------------------- 240-392-2369(home) 240-308-9360(cell) dariusm_murdock@hotmail.com, dmurdock114@email.itt-tech.edu SKILLS & ABILITIES Networking * TCP/IP /LAN/WAN / Cisco Router / OSI * Network Technology * GUI ApplicationsOperating Systems * Windows 2000/7/XP/8 * Windows Server 2008/2010 / Active Directory * Linux * VMwareHardware * Assemble/disassemble PC’s * Install, configure, troubleshoot and repair * Installation, testing and troubleshooting of cabling (Patch, Fiber, Twisted & Crossover)Software * Microsoft Word, Excel, PowerPoint, Outlook, Publisher, Visio * Exchange and Sendmail for E-mail servers * Install, and troubleshoot | Development * Intro Programming * Client Server General * Strong written and oral communication skills * Team building * Customer Service * Problem Solving * Reliable * Flexibility | EDUCATION ITT Technical Institute – Springfield, Virginia- Present Associate of Applied Science Degree in Information Technology – Network Systems Administration Anticipated Graduation Date: Spring 2015 Suitland High School- Forestville, Maryland- 2009-2013 High School Diploma RELEVANT EXPERIENCE Save A Lot Grocery Store- Store Clerk July 2014-Present * Stock store product in the all the aisles. * Greet...
Words: 300 - Pages: 2
...Common Lab Tasks In each lab, you will follow a series of step-by-step instructions designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list...
Words: 2387 - Pages: 10
...Common Lab Tasks In each lab, you will follow a series of step-by-step instructions designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list...
Words: 2388 - Pages: 10
...Chapter 2 OPERATING SYSTEM CONCEPTS SYS-ED/ Computer Education Techniques, Inc. Solaris System Administration: Introduction Operating System Concepts Objectives You will learn: • Operating system components. • Solaris usage of processes. • File management and file systems. • Use of the Solaris Management Console. SYS-ED/COMPUTER EDUCATION TECHNIQUES, INC. (Solaris – System Admin: Intro - 6.5) Ch 2: Page i Solaris System Administration: Introduction 1 Operating System Concepts Operating System: Definition An operating system is the set of programs that controls a computer. The core of the operating system is the kernel. The kernel is a control program that functions in privileged state that allows all hardware instructions to be executed. It reacts to interrupts from external devices and to service requests and traps from processes. The kernel creates and terminates processes and responds to requests for service. Operating systems are resource managers. The main resource is computer hardware in the form of processors, storage, input/output devices, communication devices, and data. Operating system functions include: • Implementing the user interface. • Sharing hardware among users. • Allowing users to share data among themselves. • Preventing users from interfering with one another. • Scheduling resources among users. • Facilitating input/output. • Recovering from errors...
Words: 2421 - Pages: 10
...gives the user a feeling of empowerment and control being that close to the “Bare Metal” of the programming process. Many programs written today are C derivitives such as Java ( considered a cousin to C). C is still widely used and can be used in standalone executables. It also compiles for every platform and every processor architecture. A major reason why C is still in use is the fact that they keep extending and rewriting C so it stays fresh and up to date. There is also a lot of existing software that is C and C++ and converting it to another programming method would be costly and take a great effort. C also starts from scratch and has foundational concepts that today’s concepts stand on. Major parts of Windows, Unix and Linux are still written in C. In order to understand some of today’s other computer languages, Such as the afore mentioned cousin to C, Java, one must first learn C in order to learn the other languages more easily. Many of today’s Device drivers of new devices are always written in C due to the ease of access that C allows you to the basic elements of the computer. Gives you direct access to the memory of your CPU through pointers. It also allows you to manipulate and play with the bits and bytes of your CPU. C is also ideally suited for embedded system programming such as T.V.’s, Microwaves, P.D.A.’s, Mobiles, and a vast...
Words: 544 - Pages: 3
...definition of the terms for Networking. Kirmayer, Andrew (2003-2012). “What are the Advantages of Network Management?” Accessed on 18, August 2013 from http://www.wisegeek.com/what-are-the-advantages-of-network-management.htm This reference gives the advantages of Network Management and how the problems are resolved. Management Information Base for Network Management of TCP/IP-based Internets: MIB-II. McCloghrie, K.; Rose, M.T., eds.1991 March. Accessed on 25, August 2013 from http://www.airlinx.com/index.cfm/id/1-11.htm With this reference I just received some brief information on Network Management. Nadi, F. (2009, November 17th). Network Management & Monitoring Overview. Retrieved from http://www.pacnog.org/pacnog6/presentations/linux-network/network-management.pdf This reference gives a brief overview of network management as well and...
Words: 454 - Pages: 2