...Francisco Ramirez Unit 5 assignment 1 Ch. 18 1. Sftp-secure file transfer protocol is a network protocol that provides file access, transfer, and management over a trusted data stream. Scp-secure transfer protocol is a network protocol that transfers data that can withstand or is immune to interception and tampering. 2. Use the “ssh host who” command in the terminal to show who is logged in 3. Scp user@bravo:-r your@home:blank 4. “$ ssh plum xterm” or use this command with “-y” if x11 forwarding is not trusted 5. The problem that enabling compression prevent when using a ssh to run remote x11 applications on a local display would be that this creates a backup feature. Should the computer crash, all of your work will be saved on the hard drive. 6. Check with the remote administrator to see if something has changed. Ch. 20 1. Edit “etc/aliases file to include the entry: root, var/logs/systemmail 2. “Cat~/. Forward”, then max@bravo.com then “/max” 3. Edit “/etc/mail/access” and add the following: “connect 192.168.1.1 relay” 4. “dnl” stand for “delete to new line”, works the same as # in shell script; it instructs the compiler to ignore any line followed by “dnl” 5. Go to content configuration on Spamassassin, then under “required spam assassin score”, change 3 to 5. 6. First, type the mail followed by the e-mail address of the recipient: mail Max@email.com, then type the subject line, then press enter. Type your message, then...
Words: 270 - Pages: 2
...LINUX-6 Curriculum chnoworld ive Development | Training | Consultancy Rh124 Red Hat System Administration I Red Hat System Administration I (RH124) is designed for IT professionals who are new to Linux and require core Red Hat Enterprise Linux skills. Focused on administration tasks that will be encountered in the workplace, this course will actively engage students in task-focused activities, labbased knowledge checks, and facilitative discussions to ensure maximum skill transfer and retention. In addition, GUI-based tools will be featured to build on the students' existing technical knowledge, while key command line concepts will be introduced to provide a foundation for students planning to become fulltime Linux system administrators. By the end of the five-day course, students will be able to perform installation, establish network connectivity, manage physical storage, and perform basic security administration. LINUX-6 Course Outline Unit 1: Get Started with the GNOME Graphical Desktop Objective: Get started with GNOME and edit text files with gedit Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus Unit 3: Get Help in a Graphical Environment Objective: Access documentation, both locally and online Unit 4: Configure Local Services Objective: Configure the date and time and configure a printer Unit 5: Manage Physical Storage I Objective: Understand basic disk concepts and manage system...
Words: 1463 - Pages: 6
...Unit 1 None Unit 2 Search and explore the ITT Tech Virtual Library for resources on the Linux Filesystem. Use the following keywords and phrases to help you locate appropriate resources: ext file system Linux hierarchical file system Linux standards base Linux directory structure Unit 3 Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: bash scripts bash history bourne shell bourne again shell commands in Linux Unit 4 Search and explore in the following places. Find resources that help you understand how CUPS is used for printer management. Submit one resource from the ITT Tech Virtual Library and one from the Chapter 14 suggested resources. ITT Tech Virtual Library The More Information section of textbook Chapter 14, page 561 Use the following keywords and phrases to help you locate appropriate resources: CUPS server CUPS in Linux Linux printer configuration Fedora 15 printer server Unit 5 Search and explore in the following places. Find resources that help you understand mail services in Linux. ITT Tech Virtual Library The More Information section of textbook Chapter 20, page 732 Use the following keywords and phrases to help you locate appropriate resources: Send mail configuration SMTP in Linux Dovecot Email servers in Linux Fedora 15 email server Unit 6 Search and explore the ITT Tech Virtual Library for information on the...
Words: 467 - Pages: 2
...| IT250 Linux Operating System | Jerry Black | Spring 2012 | | | | Course Description: Installation, configuration and management of a Linux operating system will be explored. Focus will be on functions that resemble the UNIX environment. Directory and file management, user account management and certain device management (such as drives, printers, interface cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by...
Words: 2032 - Pages: 9
...Brandon Cain 6/26/13 Unit 2: Lab 1: Cost of different cloud services: Amazon: Has a price range of $0.060 per hour on a Linux based system and goes up to $0.155 per hour for a Windows with SQL and Web system. You can purchase a per year upfront cost or stay at a monthly cost. Google: Offers you two pricing options, $5 per user per month or $10 per user per month. The $5 option does not give you any archiving, data retrieval or data discovery and export options. Where the $10 a month per user has those options. Rackspace: The pricing ranges from $0.022 per hour to $2.64 per hour for more resources. Bandwidth is calculated separately. Speed: Rackspace does not have a charge for incoming bandwidth. Outgoing bandwidth is $0.12/gb and no charge for private network. Amazon can give you up to 10 gigs a sec. Brandon Cain 6/26/13 Unit 2: Lab 1: Cost of different cloud services: Amazon: Has a price range of $0.060 per hour on a Linux based system and goes up to $0.155 per hour for a Windows with SQL and Web system. You can purchase a per year upfront cost or stay at a monthly cost. Google: Offers you two pricing options, $5 per user per month or $10 per user per month. The $5 option does not give you any archiving, data retrieval or data discovery and export options. Where the $10 a month per user has those options. Rackspace: The pricing ranges from $0.022 per hour to $2.64 per hour for more resources. Bandwidth is calculated separately...
Words: 1249 - Pages: 5
...NT1430 Linux Networking STUDENT COPY: Assignment 1 for All Units Assignment 1 for All Units: Chapter Exercises (NT1430.GA1) Learning Objectives and Outcomes Each unit exercise covers the Learning Objectives and Outcomes for that unit. You can review those objectives and outcomes in your syllabus. Assignment Requirements Type out answers for the end-of-chapter exercise questions indicated in the list below for each unit. You will be graded on accuracy and completeness. Required Resources Sobell, M. G. (2012). A practical guide to Fedora and Red Hat Enterprise Linux. (6 ed.). Upper Saddle River, NJ: Prentice Hall. th Submission Requirements Submit your word-processed answers to your instructor at the beginning of the next class after the assignment. Units 1-10 Chapter Exercises Unit 1 § § § § Unit 2 § § Unit 3 § § § Unit 4 § § Sobell, Chapter 14, p. 582, Exercises 1-5 Sobell, Chapter 10, p. 403, Exercise 1 Sobell, Chapter 7, pp. 251, Exercises 1, 3, 4, 8 Sobell, Chapter 9, pp. 356, Exercises 1, 2, 3, 4, 5, 6, 8 Sobell, Chapter 9, pp. 357, Advanced Exercises 10, 11 Sobell, Chapter 5, p. 182, Exercises 1, 3, 4, 8, 10 Sobell, Chapter 6, p. 221, Exercises 1, 2, 3, 4, 6 Chapter 1, pp. 20-21, Exercises 1, 4 Chapter 2, p. 53, Exercise 1 Chapter 3, p. 86, Exercises 1, 4, 8 Chapter 11, p. 498, Exercises 1, 3, 7 © ITT Educational Services, Inc. All Rights Reserved. -118- Change Date: 05/30/2012 NT1430 Linux Networking STUDENT COPY: Assignment 1 for All...
Words: 403 - Pages: 2
...Unit 9: Basic Linux Administration Objectives 9: Administer and maintain a Linux system. 9.1: Create users and groups by using the CLI and GUI tools. 9.2: Back up a Linux system by using the tar utility. 9.3: Maintain effective logs by using the log rotate utility. Readings A Practical Guide to Fedora and Red Hat Enterprise Linux Chapter 11, pp. 407-425 * Chapter 16 In-Class Assessment * Week 9 Quiz: Homework The following homework is designed to cover the course objectives for this unit. Assignment 9.1: Complete the following exercise in your textbook: * Chapter 16: Question 1-5 on page 643 Submit your written answer to your instructor at the start of Unit 10. Labs Instructor Notes: Assign students the following lab which can be printed from Appendix D. Lab 9.1: Using tar to Back Up Files What is the purpose? This lab exercise lets you perform basic file backup on your Linux system. What are the steps? Task 1: Backing up with tar Procedure 1. Open a terminal window as a regular user. 2. Create a directory named backup in your home directory. 3. Copy some files from your home directory into your new directory. 4. Create a backup of your new directory by using tar and compress the file with bzip2. Make sure that the backup file is not placed in the directory you are backing up. You will need to: a. Create permission. b. Choose verbose mode option. c. Choose the bzip2 file format. d. Specify...
Words: 1093 - Pages: 5
...Code Subject Name Scheme L 1PGDCA1 1PGDCA2 1PGDCA3 1PGDCA4(A) 1PGDCA4(B) Fundamentals of Computers & Information Technology Introduction to Operating Systems (Dos, Windows, Linux) PC Packages Elective - 1 Foxpro MS-Access 4 4 1 3 T P Theory Paper 80 80 Internal Evaluation 20 20 Practical Exams Total Marks 100 100 4 4 1 3 3 80 80 20 20 25 25 125 125 Semester Total 450 (*L-Lecture, T-Tutorial, P-Practical) SEMESTER –II Subject Code Subject Name Scheme L 2PGDCA1 2PGDCA2 2PGDCA3 2PGDCA4(A) 2PGDCA4(B) 2PGDCA5 System Analysis and Design Programming with Visual Basic.NET Internet & E-Commerce Elective - 2 OOPs & Programming with C++ Financial Accounting with Tally Project Work 4 4 4 4 T 1 P 3 3 3 Theory Paper 80 80 80 80 Internal Evaluation 20 20 20 20 Practical Exams Total Marks 100 125 100 125 25 1 25 4 100 Semester Total 550 General Instructions: 1. For passing the subject examination minimum 40% marks must be separately scored in Theory Paper, Practical Exams and Internal Evaluation in the subject. 2. For passing the semester, minimum aggregate marks must be 45% in the semester. Course : PGDCA Sub Code : 1PGDCA1 Semester: I Subject Name : Fundamentals of Computers & Information Technology Workshops Total Hours Field Visits Practical’s UNIT–I Brief History of Development of Computers, Computer System Concepts, Computer System Characteristics, Capabilities And Limitations, Types...
Words: 4021 - Pages: 17
...option, what is the interest rebate according to (i) actuarial method, (ii) rule of 78 method and, (iii) SLM? Computer Fundamentals Caselet 1 Over the past two years Linux has spread like wildfire through corporate data centers. Companies once dependent on expensive proprietary systems from Sun, IBM, or HewlettPackard have replaced them with dirt-cheap Dell or no-name servers that are Intel powered and loaded with the Linux operating system. Linux now runs almost 15 percent of all servers and is growing at about 23 percent a year. And even mainframe systems have joined in, with IBM estimating that over 10 percent of its mainframe sales are for running Linux applications.Though PC users haven’t switched to Linux – less than 1 percent of all computers run Linux – a 2002 survey by CIO magazine found that almost 30 percent of chief technologists were considering moving their companies’ PCs to a Linux PC operating system like Lindows. Wal-Mart, which began selling Lindows-ready PCs on its website in September 2002, had such success with that offering that by Christmas it was having trouble meeting demand. Almost every major PC electronics maker, from HP in printers to Epson in scanners, is making sure it has Linux-compatible offerings. And Sun has poured millions of dollars into its Star Office software suite, which gives Linux users programs that work like – and more...
Words: 6192 - Pages: 25
...Interface for Linux CLI PN 900-0024-00, Revision E April 23, 2003 User Guide Copyright ©2003 3ware, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form by any means, electronic, mechanical, photocopying, recording or otherwise, without the proper written consent of 3ware, Inc., 455 West Maude Avenue, Sunnyvale, CA 94085. Trademarks 3ware, the 3ware logo, Escalade, StorSwitch, TwinStor, R5 Fusion and 3DM are all registered trademarks of 3ware, Inc. All other trademarks herein are property of their respective owners. Disclaimer 3ware, Inc. assumes no responsibility for errors or omissions in this document, nor does 3ware, Inc. make any commitment to update the information contained herein. Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Command Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Ways to Run the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1) Interactive with command interface . . . . . . . . . . . . . . . . . . 4 2) Single command with output . . . . . . . . . . . . . . . . . . . . . . . . 4 3) Multiple commands through an input file . . . . . . . . . . . . . . 5 Controller...
Words: 6727 - Pages: 27
...Week 1 Lab This lab consists of two parts: Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 1 and Unit 2 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part # 1 Install a Core Linux Operating System on a Server Learning Objectives and Outcomes Upon completing this lab, students should know more about the following tasks: * Install a base Linux operating system using a Fedora core Linux server for production use on the VM server farm * Create secured partitions within the core Linux server for desired security hardening, performance, and application support * Enable a network time server during installation to maintain a synchronized time setting throughout the system * Set a hostname that is descriptive of the role of the server to maintain standard and concise naming conventions during installation * Create a non-privileged user account for system administration access as a secure alternative to logging in as root user Overview In this lab the students will see how to install and partition a Fedora Core Linux Server. The installation process, applying passwords, creating partitions, and system administrator access controls will be part of the operating system configuration requirements. The demonstration will show how to use the terminal or terminal emulator for...
Words: 1494 - Pages: 6
...web server vulnerabilities with security countermeasures to eliminate risk from compromise and exploitation Overview This Lab will demonstrate a Cross-site Scripting (XSS) exploit and an SQL Injection attack on the test bed web application and web server using the Damn Vulnerable Web App (DVWA) loaded on an Apache Web Server on “TargetUbuntu01” Linux VM server. They will first identify the IP target host, identify known vulnerabilities and exploits, and then attack the web application and web server using XSS and an SQL Injection to exploit the web application using a web browser and some simple command strings. Assignment Requirements Watch the Demo Lab in Learning Space Unit 5 and then answer questions 1-10 below. Lab Assessment Questions & Answers 1. Why is it critical to perform a penetration test on a web application prior to production implementation? 2. What is a cross-site scripting attack? Explain in your own words. 3. What is a reflective cross-site scripting attack? 4. What common method of obfuscation is used in most real world SQL attacks? 5. Which web application attack is more prone to extract privacy data...
Words: 1054 - Pages: 5
...Week 1 Lab This lab consists of two parts: Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 1 and Unit 2 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part # 1 Install a Core Linux Operating System on a Server Learning Objectives and Outcomes Upon completing this lab, students should know more about the following tasks: * Install a base Linux operating system using a Fedora core Linux server for production use on the VM server farm * Create secured partitions within the core Linux server for desired security hardening, performance, and application support * Enable a network time server during installation to maintain a synchronized time setting throughout the system * Set a hostname that is descriptive of the role of the server to maintain standard and concise naming conventions during installation * Create a non-privileged user account for system administration access as a secure alternative to logging in as root user Overview In this lab the students will see how to install and partition a Fedora Core Linux Server. The installation process, applying passwords, creating partitions, and system administrator access controls will be part of the operating system configuration requirements. The demonstration will show how to use the terminal or terminal emulator for...
Words: 1168 - Pages: 5
...4/5/2016 Intel® Celeron® Processor 877 (2M Cache, 1.40 GHz) Specifications Intel® Celeron® Processor 877 (2M Cache, 1.40 GHz) Specifications - Essentials Status Launched Launch Date Q2'12 Processor Number 877 L3 Cache 2 MB DMI 5 GT/s Instruction Set 64-bit Instruction Set Extensions SSE4.x Embedded Options Available No Lithography 32 nm Recommended Customer Price N/A Datasheet Link - Performance # of Cores 2 # of Threads 2 Processor Base Frequency 1.4 GHz TDP 17 W - Memory Specifications Max Memory Size (dependent on memory type) 16 GB Memory Types DDR3 1066/1333 Max # of Memory Channels 2 Max Memory Bandwidth 21.3 GB/s ECC Memory Supported ‡ No - Graphics Specifications Processor Graphics ‡ Intel® HD Graphics Graphics Base Frequency 350 MHz Graphics Max Dynamic Frequency 1 GHz Graphics Output eDP/DP/HDMI/SDVO/CRT Intel® Quick Sync Video No Intel® InTru™ 3D Technology No Intel® Insider™ No http://ark.intel.com/products/67192/IntelCeleronProcessor8772MCache1_40GHz 1/5 4/5/2016 Intel® Celeron® Processor 877 (2M Cache, 1.40 GHz) Specifications Intel® Wireless Display No Intel® Flexible Display Interface (Intel® FDI) Yes Intel® Clear Video HD Technology No Intel® Clear Video Technology No # of Displays Supported ‡ 2 - Expansion Options PCI Express Revision ...
Words: 1956 - Pages: 8
...1. 1.1 Security Strategies in Linux Platforms and Applications, Pages 22–23 2. 1.2 Security Strategies in Linux Platforms and Applications, Page 7 3. 1.3 Security Strategies in Linux Platforms and Applications, Page 21 4. 1.4 Security Strategies in Linux Platforms and Applications, Page 24 5. 1.5 Security Strategies in Linux Platforms and Applications, Page 10 6. 2.1 Security Strategies in Linux Platforms and Applications, Page 69 7. 2.2 Security Strategies in Linux Platforms and Applications, Page 62 8. 2.3 Security Strategies in Linux Platforms and Applications, Page 39 9. 2.4 Security Strategies in Linux Platforms and Applications, Page 37 10. 2.5 Security Strategies in Linux Platforms and Applications, Page 40 11. 3.1 Security Strategies in Linux Platforms and Applications, Pages 95–97 12. 3.2 Security Strategies in Linux Platforms and Applications, Page 85 13. 3.3 Security Strategies in Linux Platforms and Applications, Page 88 14. 3.3 Security Strategies in Linux Platforms and Applications, Page 104 15. 3.5 Security Strategies in Linux Platforms and Applications, Page 97 16. 4.1 Security Strategies in Linux Platforms and Applications, Pages 116–117 17. 4.2 Security Strategies in Linux Platforms and Applications, Page 138 18. 4.2 Security Strategies in Linux Platforms and Applications, Page 134 19. 4.4 Security Strategies in Linux Platforms and Applications, Page 128 20. 4.5 Security Strategies in Linux Platforms and Applications, Page...
Words: 793 - Pages: 4