Premium Essay

Linux Homework 4 and 5

In:

Submitted By sam006
Words 329
Pages 2
1. Submit written answer to the following questions:
A. What command can be used to view a list of directory hierarchies, including the file system type? df -hT
B. What command will display a list of NFS exports? ls /etc/exports
C. What /etc/exports entry would export a directory named /nfs to all clients on the subnet 192.168.10.0 and give them read-only access? cat /nfs 192.168.10.0 (ro,sync)
D. What entry would you place in /etc/fstab to mount the above export at boot time? Presume the directory hierarchy is being exported by a server named nfsserv, and the mount point is /mnt/nfs. nfsserv: /nfs 192.168.10.0 (ro,sync) /nfsserv.nfs
E. What command line utility is used to create/change passwords for Samba user accounts? smbpasswd F. Why is it a bad idea to run swat (Samba Web Administration Tool) across an insecure network?
The password is sent in cleartext over the connection you are using and can easily be “sniffed”
G. What Samba share will allow users to use their home directories across a Windows network?
[homes]
H. What is the name of the main Samba configuration file?
/etc/samba/smb.conf
2. Create an entry for the above file that would allow Samba to share a directory named /data. The share should be named Data, should be browsable and writable, and should only be accessible by a user named bob. cat /etc/samba/smb.conf
[global]
Workgroup = WORKGROUP server string = Samba Server Version %v log file = /var/log/samba/log.%m
; max log size = 50
; hosts allow = 127.0.0.1, 172.16.192.150
; hosts deny = ALL
; security = user
; encrypt passwords = YES
; guest ok = NO
; guest account = nobody
[homes]
comment = Home Directories read only = NO browsable = NO

[Data] comment = Directory path = /bob writeable = YES guest = NO
; available = YES
; browsable = YES

3. What command line utility can

Similar Documents

Free Essay

It250 Week 9

...Unit 9: Basic Linux Administration Objectives 9: Administer and maintain a Linux system. 9.1: Create users and groups by using the CLI and GUI tools. 9.2: Back up a Linux system by using the tar utility. 9.3: Maintain effective logs by using the log rotate utility. Readings A Practical Guide to Fedora and Red Hat Enterprise Linux Chapter 11, pp. 407-425 * Chapter 16 In-Class Assessment * Week 9 Quiz: Homework The following homework is designed to cover the course objectives for this unit. Assignment 9.1: Complete the following exercise in your textbook: * Chapter 16: Question 1-5 on page 643 Submit your written answer to your instructor at the start of Unit 10. Labs Instructor Notes: Assign students the following lab which can be printed from Appendix D. Lab 9.1: Using tar to Back Up Files What is the purpose? This lab exercise lets you perform basic file backup on your Linux system. What are the steps? Task 1: Backing up with tar Procedure 1. Open a terminal window as a regular user. 2. Create a directory named backup in your home directory. 3. Copy some files from your home directory into your new directory. 4. Create a backup of your new directory by using tar and compress the file with bzip2. Make sure that the backup file is not placed in the directory you are backing up. You will need to: a. Create permission. b. Choose verbose mode option. c. Choose the bzip2 file format. d. Specify...

Words: 1093 - Pages: 5

Free Essay

Stuff

...| IT250 Linux Operating System | Jerry Black | Spring 2012 | | | | Course Description: Installation, configuration and management of a Linux operating system will be explored. Focus will be on functions that resemble the UNIX environment. Directory and file management, user account management and certain device management (such as drives, printers, interface cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by...

Words: 2032 - Pages: 9

Free Essay

Nt1430 Linux Networking

...NT1430: Linux Networking Unit 4 Homework Assignment Chapter 14: 1. Which commands can you use from the command line to send a file to the default printer? a. lpoptions –d printer 2. Which command would you give to cancel all print jobs on the system? a. cancel job-id 3. Which commands list your outstanding print jobs? a. lpc status 4. What is the purpose of sharing a Linux printer using Samba? a. Sharing a Linux printer using Samba allows Windows and OS/2 clients to send print jobs to the printer. 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol? a. 1.) System-config-printer 2.) lpinfo Displays available drivers 3.) lpadmin configures printers b. IPP is the native protocol Chapter 10: 1. Describe the similarities and differences between these utilities: a. Scp and ftp i. SCP stands for Secure Copy Protocol, and FTP is an acronym for the File Transfer Protocol, which was the original file transfer protocol. SCP and FTP are two applications for copying files from one computer to another. Both were based on their own protocols, but both now use different prtocols. b. Ssh and telnet i. Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the user against anyone with malicious intent while Telnet has no security measures whatsoever. c. Rsh and...

Words: 284 - Pages: 2

Premium Essay

List the Number and Name of Each Runlevel as Used by Fedora/Red Hat Linux Provide a Brief Explanation of Each Runlevel.

...Homework Assignment 1.1 1. List the number and name of each runlevel as used by Fedora/Red Hat Linux Provide a brief explanation of each runlevel. ID | Name | Description | 0 | Halt | Shuts down the system. | 1 | Single-user Mode | Mode for administrative tasks. | 2 | Multi-user Mode | Does not configure network interfaces and does not export networks services. | 3 | Multi-user Mode with Networking | Starts the system normally. | 4 | Not used/User-definable | For special purposes. | 5 | Start the system normally with appropriate display manager. ( with GUI ) | As runlevel 3 + display manager. | 6 | Reboot | Reboots the system. | 2. Which two runlevel should never be set as the default?  0 (HALT) and 6 (reboot) should never be set as default. 3. What script contains the default runlevel? /etc/rc <tab> 4. The init scripts for each runlevel are contained in which directory tree? Check /etc/inittab 5. What would you name the link to an init script that would start the fictitious bigd daemon early in the boot process? Open /etc/rc.local and write the script to run at boot time. 6. What would you name the link to kill the same daemon? Kill -9 <pid> 7. How would you use the service command to manually kill the bigd daemon? Kill -9 <pid /// You can get through ps for service> 8. How would use chkconfig to set the bigd daemon to start at runlevel 2 and 3? chkconfig bigd --level 23 on 9. How would you use...

Words: 1402 - Pages: 6

Free Essay

Nt 1210

...Monday, Tuesday, Wednesday, Thursday 3:30 – 6:00 PM Objectives: Complete current week’s assignments submissions Important Notes: Attendance in class is critical to your accomplishments Missing class is missing valuable information that will help you succeed and accomplish your goals Please attend every class for success in your field! Grading Policy: * Please read the last page of your syllabus which will be covered in week one. * Missing labs will be made up at 80% after the first week, 70% the after the second week and 0% the third week. * Quizzes will not be made up. * Students can potentially be dropped by the Dean of Academic Affairs after missing 4 or 5 cumulative classes. * Students who miss three consecutive class will be dropped by the Dean of Academic Affairs * Assignments and Labs will be counted at 0% after three weeks. Course Objectives Covered by This Unit * CO1 Identify the major needs and stakeholders for computer networks and network applications * CO2 Identify the classifications of networks and how they are applied to various types of enterprises * CO3 Compare and contrast the OSI and TCP/IP models and their applications to actual networks * CO4 Explain the functionality and use of typical network protocols * CO5 Analyze network components and their primary functions in a typical data network from both logical and physical perspectives ...

Words: 799 - Pages: 4

Premium Essay

Linux

...12/10/11 Week 1 homework Page 19 1. What is free software? List three characteristics of free software. Free software includes GNU/Linux, Apache, and some examples of free applications are: KDE, OpenOffice.org. all these application can be used for router/mobile phones..Etc. Linux is free and price plays a roll but not so crucial as other OS. Also source code is available, and software can be used for any purpose, also can be studied and changed. Linux software can be distributed and changed versions as well. 2. What are multiuser sytems? Why are they successful? A multiuser system allows each user at their work terminals to be connected to the computer. The operating system of computer assigns each user a portion of RAM and drives the computer’s time among various users; it is also called time sharing system. In other words, a multiuser system allows many users to simultaneously access the facilities of the host computer. This type of system is capable of having 100’s of users use this computer at once. The commonly used multiuser systems are: 1. LOCAL AREA NETWORK 2. WIDE AREA NETWORK 3. METROPOLITAN AREA NETWORK. 3. In what language is linux written? What does the language have to do with the success of linux? Linux is written in the C programming language and because it is written in the C language the language can be imbedded in all type of devices from TV’s, to PDA’s, cell phones, cable boxes for the reason of this language being so portable. 4. What is a utility...

Words: 796 - Pages: 4

Premium Essay

Homework Assignment 2.1

...users have the freedom to distribute and change. 2. Describe the relationship between Linux and the GNU Project.  Linux is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called “Linux” distributions are really distributions of GNU/Linux. 3. List and describe in detail four advantages of Linux. Applications – Linux is both free and commercial as well as a wide variety of tools: graphical, word processing, networking, security administration, Web server and many others. Flexibility - Linux can be used for high performance server applications, desktop applications, and embedded systems. You can save disk space by only installing the components needed for a particular use. You can restrict the use of specific computers by installing for example only selected office applications instead of the whole suite. Performance - Linux provides persistent high performance on workstations and on networks. It can handle unusually large numbers of users simultaneously, and can make old computers sufficiently responsive to be useful again. Stability - Linux doesn’t need to be rebooted periodically to maintain performance levels. It doesn’t...

Words: 1165 - Pages: 5

Free Essay

Latest Operating System in Modern World

...of a smartphone operating system? a. iOS b. BlackBerry c. Android d. Linux 2. You are most likely to find a real-time operating system (RTOS) a. in your automobile b. on a laptop c. on a smartphone d. on an iPad 3. All of the following are key attributes of an operating system EXCEPT a. manages memory and storage b. provides a user interface c. manages the CPU d. tracks connections to external networks 4. Modern operating systems such as Windows and OS X use a _____________ interface. a. command-driven b. graphical user c. menu-driven d. text-based 5. If your computer can’t store all the required operating system data in RAM, it can use a temporary file on the hard drive to store data. This is known as a _________ file. a. Linux b. non-volatile c. swap d. thrash True–False _____ 1. Each device attached to your computer needs a device driver to communicate with the operating system. (True) _____ 2. The first step of the boot process is the Power-on self-test (POST). (False) Part 1: Critical Thinking 1. Market Dominance Microsoft and Apple are large corporations and have control of most of the OS market. Although there have been some innovative changes to both of their proprietary operating systems, does their size and market dominance prevent more innovation? Why or why not? Linux, as an open source environment, is poised for greater innovation. Why do you think the Linux OS doesn’t have a greater market share? Responses may vary but students should...

Words: 1075 - Pages: 5

Premium Essay

Paper

...Chap. 5 Homework Student Name: Leslie Martin-Freeman True/False Questions T F | 1: | The directory structure is arranged in levels and is known as a hierarchical structure. | T F | 2: | Your login name and your home directory name are usually the same. | T F | 3: | Every UNIX file structures has a root directory named / (slash). | T F | 4: | Files in your current directory are immediately accessible. Files on the other directories must be identified by their pathnames. | T F | 5: | Absolute and relative pathnames are the same and indicate the same pathname. | T F | 6: | If you have just logged in, your home, current or working directories are the same. | T F | 7: | In UNIX filenames XYZ and xyz are indicating the same filename. | T F | 8: | In UNIX filename extension is absolutely necessary. | T F | 9: | The pwd command prints your working directory on the printer. | T F | 10: | The cd command returns you to the root directory. | T F | 11: | The invisible files are the files that only the owner can see. | T F | 12: | You can use only one command option at a time on the command line. | T F | 13: | You can use the vi editor or the cat command to look at the content of a file. | T F | 14: | Using cat command you can stop scrolling by pressing [Ctrl-s].to continue scrolling press [Ctrl-q]. | T F | 15: | After the print command is issued, there is no way to cancel the print job...

Words: 1299 - Pages: 6

Free Essay

Comp 228 Outline

... Concordia University COMP228 Fall 2009 Instructor: H.F. Li [EV 3.409; hfli@cse.concordia.ca; x3020] Office Hours: Tue 4:15 – 5:15 pm; Thurs 10:30 – 11:30 am. Objective: The objective of this course is to introduce key concepts in computer organization at the level of assembly/machine language. Students are expected to learn about features that affect programmability and performance at the hardware layer. Hardware details are discussed at a level appropriate for beginning students in computer science and software engineering. Basics of assembly language programming via a simple language are introduced, supplemented with some hands-on experience on NASM. Tentative Course Outline Topic Material Text Week Introduction Some basic concepts/terminologies, Chapter 1 1 system abstractions, von Neumann model Data Representation Binary representations of integer and Chapter 2 2 – 3 floating point number, 2’s complement addition, ASCII, CRC and Hamming code Digital Logic Boolean functions, logic circuit, Chapter 3 4 full adder, register A Simple Computer Processor internal, introduction to bus, Chapter 4 5 – 8 memory, I/O subsystems, Marie ISA and programming, real examples (NASM) More on ISA variations of ISA, pipelining Chapter 5 8 – 9 Memory types of memory, memory hierarchy, Chapter 6 10 – 11 I/O and Storages I/O interfaces and programming, Chapter...

Words: 769 - Pages: 4

Premium Essay

Linus Torvalds Research Paper

...LINUS TORVALDS: THE MAN WHO CREATED LINUX By John Eirich Edward Falce Advanced OS 4/27/2014 TABLE OF CONTENTS Early Years ………………………………………. 1-2 The Creation of Linux…………………………… 2-4 Linux Among the Public………………………….. 4-5 Life in California…………………………………... 5-6 Microsoft and Others Take Notice of Linux……... 6-7 Continuing his Work on Linux……………………. 7-8 Awards and Achievements………………………… 8-9 Cited Sources……………………………………….. 10 John Eirich Edward Falce Advanced OS 4/27/2014 LINUS TORVALDS: THE MAN WHO CREATED LINUX EARLY YEARS Linus Torvalds is one of the most famous people in the world. The man who is known for creating the Linux operating system that corporations have taken to using over Windows. Linus Benedict Torvalds was born...

Words: 2541 - Pages: 11

Free Essay

Digital Forensic

...Laboratory Notes Laboratory Number: 1 Examiner Name: Date & Time Activity 2-2-2015 1:03pm 1:19pm 1:21pm 1:22pm 1:23pm 1:24pm 1:25pm 1:26pm 1:28 All steps performed on linux mint-17 32-bit, kernel 3.13.0-37 generic Tools used: dd (coreutils) 8.21, sha1sum (GNU coreutils) 8.21, xxd version 1.10, Eye of mate Image Viewer 1.8.1, Script version 2.20.1 Received the USB device from officer Linda Mood of the USSS Cyber forensics Team in an antistatic bag with tamper resistant tape. Her initials were written over the tape. I removed the USB flash drive from the bag. It was a 2GB black and green retractable Sony flash drive with the serial number of D33021. Using the mount command I confirmed that the USB had not mounted. Command: mount Using the date command I showed when I began the forensic work on the USB device. Sun Feb 1 13:21:34 EST 2015 Command: date Using the command fdisk I looked to see what the size of the device was and how much data was on the USB. It was shown to have 1MB or 1474560 bytes of information. Command: sudo fdisk -l Using the hash command sha1sum on the device I obtained the hash for the USB. 32b9fcb741aab43a4f80393d3df67c32c726924f /dev/sdb Command: sudo sha1sum /dev/sdb Using dd I was able to image the information from the USB device to another file named Ailes.case01.dd. Command: Sudo dd if=/dev/sdb of=Ailes/case01.dd bs=8192 ...

Words: 1068 - Pages: 5

Premium Essay

It250 Chapter 2 Assignment

...IT250: HOMEWORK Chapter 2 Assignment 1-      The process of installing Fedora/RHEL involves putting a CD into the DVD drive. Then you go through all the computer specifics, making choices from the menu. 2-      The anaconda is an installation tool that performs an interactive installation using the graphical or textual interface. 3-      I would set up a GUI on a server system to make it more users friendly. 4-      To make a system boot from a DVD, first enter the BIOS and change the settings from hard disk to CD. 5-      Free space in the area of the disk not occupied by any partition. 6-      ISO image files are files that hold data you use to create DVD/CD 7-      Two reason you should not use raid to replace backup are of you computer is stolen, in a fire. 8-      Its RAM that is made to look like a floppy diskette or hard disk. It is frequently used as part of the boot process 9-      SHA-256 is a set of cryptographic has functions. When you process a file using SHA-256 it generates a number based on the file. ASSIGNMENT 3.1 PAGE 184 3. WHAT HAPPENS WHEN YOU GIVE THE FOLLOWING COMMNADS IF THE FILE NAMED DONE ALREADY EXISTS? $ cp to_do done $ mv to_do done ANWSER: cp - copy files and directories mv - move (rename) files. You would just basically overwrite the file. 4. HOW CAN YOU FIND OUT WHICH UTILITIES ARE AVAILABLE ON YOUR SYSTEM FOR EDITING FILES ? WHICH UTILITIES ARE AVAILABLE FOR EDITING ON YOUR SYSTEM? ANWSER:...

Words: 1961 - Pages: 8

Free Essay

Blah

...periodical listing of all assignments and instructions completed in the NOS 120 class. 2011 ------------------------------------------------- Table of Contents: Table of Contents ………………………………………………………………………………………………………………………………… 2 Table of Contents (cont.) …………………………………………………………………………………………………………………….. 3 Course Syllabus ……………………………………………………………………………………………………………………………………. 4 Journal Post (8/17) ……………………………………………………………………………………………………………………………… 13 Chapter 1 Questions …………………………………………………………………………………………………………………………… 14 Journal Post (8/24) ……………………………………………………………………………………………………………………………… 16 Chapter 2 Questions ……………………………………………………………………………………………………………………………. 17 Journal Post (9/7) ………………………………………………………………………………………………………………………………… 18 Chapter 3 Questions ……………………………………………………………………………………………………………………………. 19 Journal Post (9/12) ……………………………………………………………………………………………………………………………… 20 Chapter 4 Questions …………………………………………………………………………………………………………………………… 21 Chapter 5 Questions …………………………………………………………………………………………………………………………… 23 NOS 120 Test 2 …………………………………………………………………………………………………………………………………… 24 Linux File System vs. Windows File System …………………………………………………………………………………………. 27 Journal Post (9/14) ……………………………………………………………………………………………………………………………… 28 10.04 Sources List ………………………………………………………………………………………………………………………………. 29 Things to do after installing Ubuntu 10.04 …………………………………………………………………………………………. 37 Journal Post (9/21) …………………………………………………………………………………………………………………………….. 45 How to...

Words: 17866 - Pages: 72

Premium Essay

Operation Management

...Chapter Solutions Operations Management.pdf DOWNLOAD HERE CHAPTER 12: INVENTORY MANAGEMENT – Suggested Solutions to ... http://users.ipfw.edu/khamaljn/P301/Class_Notes/Solutions-Chapter12.pdf 1 BUS P301:01 CHAPTER 12: INVENTORY MANAGEMENT – Suggested Solutions to Selected Questions Summer II, 2009 Question 12.5 This is EOQ with D = 19,500 units/yr; H = $ ... CHAPTER 11 Operations Management http://www.eng.uwi.tt/depts/mech/ugrad/courses/meng3006/Week09b.pdf Operations Management, ... • To decouple operations ... CHAPTER 11 11-39 Inventory Management Economic Production Quantity I n v en t o r y L ev el CHAPTER 10 Operations Management - Academic Resources at ... http://academic.missouriwestern.edu/mlewis14/MGT%20416/Lectures/My%20Chap010.pdf Operations Management 8th edition 10-2 Quality Control CHAPTER 10 Quality Control McGraw-Hill/Irwin Operations Management, Eighth Edition, by William J. Stevenson PRODUCTION/OPERATIONS MANAGEMENT - … http://faculty-staff.ou.edu/B/Samir.Barman-1/POMsp02.doc PRODUCTION/OPERATIONS MANAGEMENT. BAD 5262 . SPRING 2002. Course Instructor: Samir Barman, Ph.D. ... Apr 02 Chapter 3 All Example Problems. Operations in a PR: 3.1-3.6 Chapter 7 Accounting for Financial Management http://harbert.auburn.edu/~yostkev/teaching/finc3630/notes/Chapter7solutions.pdf Chapter 7 Accounting for Financial Management ANSWERS TO END-OF-CHAPTER QUESTIONS 7-3 No, because the $20 million of retained earnings would probably not be held as cash...

Words: 852 - Pages: 4