Premium Essay

Nt1430

In:

Submitted By DanteD07
Words 1068
Pages 5
Chapter 19
Exercises
1. What changes does FTP make to an ASCII file when you download it in ASCII mode to a Windows machine from a Linux server? What changes are made when you download the file to a Mac? a. FTP only makes changes necessary for compatibility with Unix vs. Windows line / carriage returns.It replaces new line with a return 2. What happens if you transfer an executable program file in ASCII mode? b. The file will be corrupted: Any bytes that match a NEWLINE will be changed, resulting in a program that will not execute properly. 3. When would ftp be a better choice than sftp? c. When you are sharing public files 4. How would you prevent a local user from logging in on a vsftpd server using her system username and password? d. /etc/vsftpd.conf: local_enable=NO 5. What advantage does sftp have over ftp? e. Ftp is NOT a secure protocol. All usernames and passwords exchanged in setting up an FTP connection are sent in cleartext, data exchanged over and FTP connection is not encryption and the connection is subject to hijacking. A SFTP protocol however, is secure, thus your information is far safer. 6. What is the difference between cd and lcd in ftp? f. A cd command changes the remote working directory; an lcd command changes the local working directory.
Advance Exercises 7. Why might you have problems connecting to an FTP server in PORT mode? g. Server might be because blocked or not enabled 8. Why is it advantageous to run vsftpd in a chroot jail? h. Because it makes it hard for a malicious user to compromise the system. 9. After downloading a file, you find that it does not match the MD5 checksum provided. Downloading the file again gives the same incorrect checksum. What have you done wrong and how would you fix it? i. If you download the file multiple

Similar Documents

Free Essay

Nt1430

...Nt1430 Unit 4 Chptr 14 1. Which commands can you use from the command line to send a file to the default printer? lp or lpr 2. Which command would you give to cancel all print jobs on the system? Either sudo lprm – or sudo cancel –a will remove all jobs from the print queues 3. Which commands list your outstanding print jobs? lpq or lpstat 4. What is the purpose of sharing a Linux printer using Samba? Sharing a Linux printer using Samba allows Windows and OS/2 clients to send print jobs to the printer. 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol? System-config-printer lpinfo Displays available drivers lpadmin configures printers The cups native protocol is IPP Chptr 10 1. Describe the similarities and differences between these utilities: a. scp and ftp SCP stands for Secure Copy Protocol, and FTP is an acronym for the File Transfer Protocol, which was the original file transfer protocol. SCP and FTP are two applications for copying files from one computer to another. Both were originally based on their own protocols, but both now use different protocols b. ssh and telnet Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the users against anyone with malicious intent while Telnet has no security measures whatsoever c. rsh and ssh They...

Words: 459 - Pages: 2

Premium Essay

Nt1430

...Unit 5 Ch 18 end of chapter questions/exercises #1 -4 , #6. 1. What is the difference between scp and sftp utilities? The SCP (secure copy) utility copies an ordinary or directory file from one system to another on a network SFTP is a secure FTP Client. 2. How can you use ssh to find out who is logged inon a remote system? Assuming you have the same username on both systems, the following command may prompt you for your password on the remote system and displays the output of who: $ ssh host who 3. How would you use scp to copy your ~/.bashrc file from the system named plum to the local system? Scp user@bravo:-r your@home:blank 4. How would you use SSH to run xterm on plum and show the display on the local system? Assuming you have the same username on both systems and an X11 server running locally, the following command runs xterm on plum and presents the display on the local system: $ ssh plum xterm You need to use the –Y option if trusted X11 forwarding is not enabled. 6. When you try to connect to another system using an OpenSSH client and you see a message warning you that the remote host identification has changed, what has happened? What should you do? This message indicates that the fingerprint of the remote system is not the same as the local system remembers it. Check with the remote system’s administrator to find out if something changed. If everything seems to be in order, remove the remote system’s key from the file specified in the error...

Words: 464 - Pages: 2

Free Essay

Nt1430

...Linux Commands The following table is a list of linux commands found on a Redhat 9.0 server. To see a list of bash shell commands, go to the shell commands page. For those of you who are unsure how to use linux commands, see our Linux Commands Tutorial. Click on the command name or the  to see a description of the command. Click on the  to see the man page for that command. Command | Description |   |   | adduser | Add a new user |   | | arch | Print machine architecture | | | awk | Find and Replace text within file(s) |   | | bc | An arbitrary precision calculator language |   | | cal | Display a calendar | | | cat | Concatenate files and print on the standard output | | | chdir | Change working directory | | | chgrp | Change the group ownership of files | | | chkconfig | Tool for maintaining the /etc/rc[0-6].d directory hierarchy |   | | chmod | Change the access permissions of files and directories |   | | chown | Change the user and group ownership of files | | | chroot | Change root directory |   | | cksum | Print CRC checksum and byte counts |   | | clear | Clear terminal screen |   | | cmp | Compare two files |   | | comm | Compare two sorted files line by line |   | | cp | Copy one or more files to another location |   | | cron | Daemon to execute scheduled commands |   | | crontab | Schedule a command to run at a later time |   | | csplit | Split a file into context-determined pieces |   | | cut...

Words: 924 - Pages: 4

Free Essay

Nt1430

...1. What is the utility that can be used to copy a file, including text and executable program (binary) files? cp 2. Which of the following Linux utilities lists the names of files in a single directory? ls 3. What command displays the last 10 lines of a file? -tail What command displays the first 10 lines of a file? -head 4. What is a Process? What Utility provides communication between processes where output of one process provide input for another? 1.) A process is the execution of a command by Linux. They have the ability to communicate with eachother. 2.) | (Pipe) 5. Which of the following utilities do you use to determine the list of users logged on to a specific terminal? who command 6. What does the command pwd do? What does the cd command do? 1.) Prints the working directory. 2.) Changes from the current directory to another working directory. 7. In terms of file or directory permissions, what does U-G-O stand for? What are the 3 permission that can be given to a file or directory? 1.) User: owner of the file, Group: changes group permissions, Other: anyone who isn’t an owner of a file or in a group. 2.) read, write, execute 8. In terms of permissions, what does 777 mean? It means everyone has permission to read, write and execute a file. 9. What does the command chmod do? What happens when I use it with the following? chmod 755 myfile 1.) It modifies the access permission on the file. It lets you tell the system how much...

Words: 348 - Pages: 2

Free Essay

Nt1430

...VI “Cheat” Sheet ACNS Bulletin ED–03 February 1995 vi Editor “Cheat Sheet” Invoking vi: Format of vi commands: vi filename [count][command] Command mode versus input mode Vi starts in command mode. The positioning commands operate only while vi is in command mode. You switch vi to input mode by entering any one of several vi input commands. (See next section.) Once in input mode, any character you type is taken to be text and is added to the file. You cannot execute any commands until you exit input mode. To exit input mode, press the escape (Esc) key. Input commands (end with Esc) a i o O :r file Append after cursor Insert before cursor Open line below Open line above Insert file after current line Any of these commands leaves vi in input mode until you press Esc. Pressing the RETURN key will not take you out of input mode. Change commands (Input mode) cw cc c$ rc R s S . Change word (Esc) Change line (Esc) - blanks line Change to end of line Replace character with c Replace (Esc) - typeover Substitute (Esc) - 1 char with string Substitute (Esc) - Rest of line with text Repeat last change Changes during insert mode h w u Back one character Back one word Back to beginning of insert (count repeats the effect of the command) File management commands :w name :wq :q! ZZ :sh Write edit buffer to file name Write to file and quit Quit without saving changes Same as :wq Execute shell commands (d) ...

Words: 794 - Pages: 4

Free Essay

Nt1430

...Chapter 1 Exercise 1 Free software is software which is not charged for; as such you can share it with whoever you want, as many times as you want. You can also install it on as many of your home computers as you wish. Chapter 1 Exercise 4 GNU a group dedicated to creating an operating system compatible with the Unix software system. Linux is based off the original Unix operating software. Unix provided the kernel, while Linux provided the interface that people used in place of another operating system like windows or apples own software. Linus Torvalds developed the Linux kernel, and Richard Stallman created the GNU Project Chapter 2 Exercise 1 Depending on the installation being done, Fedora/RHEL either overwrites all the files on the hard drive, or updates the software that has new versions Chapter 3 Exercise 1 A live system is where you have a linux running on top of another operating system like windows. The advantages are that none of the changes you make are kept, as it doesn’t write to the hard drive Chapter 3 Exercise 4 I honestly could not find the answer to this question Chapter 3 Exercise 8 Disk Druid is a GUI program that allows users to add, delete or modify partitions on a hard disk Chapter 11 Exercise 1 Single user mode is where only the system console is enabled, you can run programs from the console, so long as they are not graphical programs (Text only). Multi user Mode is where you have a graphical interface to use. Chapter 11 Exercise 3 SU...

Words: 358 - Pages: 2

Premium Essay

Nt1430

...Domain Name System (DNS) is defined by the website www.wikipedia.org as a hierarchical distributed naming system for computers, services, or any resource connected to the internet or a private network. DNS translates to numerical internet protocol IP addresses. DNS structure consists of the root level, top level and second level. The top of the DNS hierarchy is called the root domain. This is simply the starting point of the top level domain structure on the Internet. The next level in the hierarchy is divided into a series of nodes called the top-level domains. According to the website http://technet.microsoft.com,the top-level domains are assigned by organization type and by country/region. The second level domains contain the domains and names for organizations and countries/regions. The Intermodal Association of North America (IANA) manages the names and DNS servers of the root domain and the top-level domains. Individual organizations are responsible for managing the names in their second-level domains while the names in second-level domains are administered by the organization or country/region either directly or by using an Internet service provider (ISP) who manages the names on the customer's behalf. Naming in DNS is also hierarchical, and names are parsed from right to left. A domain name always ends with an implicit period, or dot (such as com, net, and org). Whenever you type a URL in to your web browsing program, you are depending on DNS records to get you to the...

Words: 581 - Pages: 3

Premium Essay

Linux Nt1430

...Josslynn Brown Linux NT1430 Chapter 1 1) Free software is software that gives you the user the freedom to share, study and modify it. We call this free software because the user is free. To use free software is to make a political and ethical choice asserting the right to learn, and share what we learn with others. The three main characteristics of free software are: The source code has to be distributed with the program, you cannot restrict people from redistributing/modifying/using the software, and users must be allowed to redistribute modified versions under the same terms/licensing. 2) Question # 4: The Free Software Foundation) is the principal organizational sponsor of the GNU Project. GNU developed many of the tools, including the C compiler that are part of the Linux operating system. Linux is the name of the operating system kernel developed by Linus Torvalds, which has since been expanded and improved by thousands of people on the Internet. Torvalds’s kernel and GNU’s tools work together as the Linux operating system. Chapter 2 1) Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible, including fresh installations, upgrades from older releases of Fedora/RHEL, and dual-boot installations. Chapter 3 1) A live system gives you a chance to preview Fedora...

Words: 517 - Pages: 3

Free Essay

Nt1430 Linux Networking

...NT1430: Linux Networking Unit 4 Homework Assignment Chapter 14: 1. Which commands can you use from the command line to send a file to the default printer? a. lpoptions –d printer 2. Which command would you give to cancel all print jobs on the system? a. cancel job-id 3. Which commands list your outstanding print jobs? a. lpc status 4. What is the purpose of sharing a Linux printer using Samba? a. Sharing a Linux printer using Samba allows Windows and OS/2 clients to send print jobs to the printer. 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol? a. 1.) System-config-printer 2.) lpinfo Displays available drivers 3.) lpadmin configures printers b. IPP is the native protocol Chapter 10: 1. Describe the similarities and differences between these utilities: a. Scp and ftp i. SCP stands for Secure Copy Protocol, and FTP is an acronym for the File Transfer Protocol, which was the original file transfer protocol. SCP and FTP are two applications for copying files from one computer to another. Both were based on their own protocols, but both now use different prtocols. b. Ssh and telnet i. Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the user against anyone with malicious intent while Telnet has no security measures whatsoever. c. Rsh and...

Words: 284 - Pages: 2

Premium Essay

Research Paper Nt1430

...Matt Moore NT1430 5-30-13 Research Paper When it comes to IPv6 there are a lot of topics that can be discussed. It will change the Internet forever as we know it. IPv4 is the fourth version of protocol using a 32 bit address space whereas IPv6 will be using 128 bits of hexadecimal addressing to allow for drastically more addresses. Currently IPv4 allows roughly 4,294,967,296 possible addresses and with the current allocation practices it limits the number of public address to a few hundred million. In contrast, the 128 bit address space that IPv6 uses can provide roughly 3.4 x 1038 possible addresses. The sheer size of the IPv6 address allows for the subdividing of the address into a hierarchical routing structure that in turn can reflect the current topology of the Internet. This will provide great flexibility for the addressing and routing in the future where the IPv4 obviously lacks in comparison. It would hard to imagine a world where we do have anymore Internet addresses to go around. This should hopefully solve that problem, at least for a while to come. When configuring DHCP on Linux to use IPv6 one must be sure that they have everything in order. The two most used means of auto configuration IPS are on the router advertisement and dhcpv6. When you are using the RA a server daemon needs to advertise a network prefix which is typically a /64, gateway and sometimes a DNS server. Then the Client machines can auto configure their IPv6 addresses when they...

Words: 538 - Pages: 3

Premium Essay

Hey There Nt1430

...Please ignore: TODAY it seems to me providential that Fate should have chosen Braunau on the Inn as my birthplace. For this little town lies on the boundary between two German states which we of the younger generation at least have made it our life work to reunite by every means at our disposal. German-Austria must return to the great German mother country, and not because of any economic considerations. No, and again no: even if such a union were unimportant from an economic point of view; yes, even if it were harmful, it must nevertheless take place. One blood demands one Reich. Never will the German nation possess the moral right to engage in colonial politics until, at least, it embraces its own sons within a single state. Only when the Reich borders include the very last German, but can no longer guarantee his daily bread, will the moral right to acquire foreign soil arise from the distress of our own people. Their sword will become our plow, and from the tears of war the daily bread of future generations will grow. And so this little city on the border seems to me the symbol of a great mission. And in another respect as well, it looms as an admonition to the present day. More than a hundred years ago, this insignificant place had the distinction of being immortalized in the annals at least of German history, for it was the scene of a tragic catastrophe which gripped the entire German nation. At the time of our fatherland's deepest humiliation, Johannes Palm of Nuremberg...

Words: 3681 - Pages: 15

Free Essay

Nt1430 Lab1

...1. n/a 2. Which utility can you use to display the absolute pathname of the working directory? What is the absolute pathname of the working directory? pwd varies depending on your username 3. Change directories so the /tmp directory is the working directory and verify the name of the working directory. cd /tmp pwd 4. What is the quickest way to make your home directory the working directory? Cd 5. n/a 6. Linux does not rely on filenames or filename extensions to determine the type of a file. Use the file utility (Sobell, page 156) to determine the type of the following files. a. /etc/passwd: ASCII text block special symbolic link symbolic link JPEG image data b. /usr/bin/passwd: executable c. /var/log: directory d. /usr/share/man/man1/ls.1.gz: gzip compressed data e. /dev/tty1: character special f. /dev/sda: block special g. /dev/cdrom: symbolic link symbolic link JPEG image data h. /usr/share/magic: symbolic link i. /usr/share/pixmaps/faces/sky.png: JPEG image data 7. Text files can be viewed using cat, head, tail, and less (Sobell, pages 148, 152, 153, and 149, respectively). Choose the best application to a. Display the contents of the /etc/issue file. cat /etc/issue b. Display the contents of the /etc/sysconfig/network file. cat /etc/sysconfig/network c. Display the first few lines of the /etc/passwd file. head /etc/passwd d. Determine the last word in the /usr/share/dict/linux.words file. tail /usr/share/dict/linux.words e....

Words: 470 - Pages: 2

Free Essay

Nt1430 Linux

...1. What is free software? List three characteristics of free software. a. Free software, also known as software libre, or open source software, is a type of software that can be used and modified by the software owner, as well as redistributed. b. Free software is not synonymous with "freeware," which is software that is available for use free of charge, but may or may not be modified. This software is sometimes also free of charge, but sometimes requires a fee to purchase; the "free" in the name refers to the fact that it may be freely used and changed. 2. Why is Linux popular? Why is it popular in academia? a. It is very fast, easy to use and reliable. Writing programs and scripting on Linux is often times much easier than doing so on Windows as many of the users are that use Linux are computer savy but also because the framework that makes up Linux is completely open source, thus allowing programmers to program with Linux not around it. b. Students understand the source code for the operating system and how Linux works without complications. 3. What are multiuser systems? Why are they successful? a. A multi-user operating system is a computer operating system (OS) that allows multiple users on different computers or terminals to access a single system with one OS on it. b. Because you can add a user to your computer and have a different profile then another user, instead of buying another computer. This makes it cost effective. 4. What is the Free Software...

Words: 382 - Pages: 2

Free Essay

Nt1430 Hw Week 1

...Javier Lara PT430 NT1430 CH. 1 Page 20-21 Exercise 1 A) Free software is computer software that gives users the freedom to run the software for any purpose as well as to study, modify, and distribute the original software and the adapted versions. Free software is free, can be shared and also be updated by the people using it Exercise 4 A) The Free Software Foundation is a 501(c) non-profit organization founded by Richard Stallman on 4 October 1985 to support the free software movement, which promotes the universal freedom to study, distribute, create, and modify computer software, with the organization's preference for software being distributed under copyleft ("share alike") terms, such as with its own GNU General Public License. Linux a Unix-like and mostly POSIX-compliant computer operating system assembled under the model of free and open-source software development and distribution CH.2 Page 53 Exercise 1 A) When you install a Fedora/REHL, you copy operating system files from a cd or dvd to hard disk(s) on a system and setup configuration files so that Linux can run properly on hardware. CH.3 Page 86 Exercise 1 A) Live system is a complete bootable computer installation including operating system which runs in a computer's memory, rather than loading from a hard disk drive. Live systems can be used without a hard disk installed in a computer. Exercise 4 A) You would put the boot in a different folder so it doesn’t overwrite the original boot...

Words: 367 - Pages: 2

Free Essay

Nt1430 Week 1 Hw

...NT1430 12/15/13 Chapter 1 #1, 4 1. Free software is software that users have the freedom to distribute and change. The three main characteristics of free software are: The source code has to be distributed with the program, users must be allowed to redistribute modified versions under the same terms/licensing, and you can not restrict people from redistributing/modifying/using the software. 4. GNU stands for "GNU'S Not Unix", and it was designed to be a UNIX-like operating system developed by Richard Stallman. Linux is the name of operating system kernel developed by Linus Torvalds. GNU's tools aside the Linux kernel make the operating system known as “Linux” aka “GNU/Linux”. Thousands, possibly hundreds of thousands, of people helped refine the operating system because it was distributed freely online. Chapter 2 # 1 1. Installing Fedora/RHEL uses the process of copying operating system files from a CD, DVD, or USB flash drive to the hard disk on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible including fresh installations, upgrades from older releases of Fedora, and dual-boot. Chapter 3 #1, 4, 8 1. A live system gives you a chance to preview Fedora without installing it. It does not write/install to hard disks. 4. Put /boot at the beginning of the drive (partition 1) so that there is no issue of Linux having to boot from a partition too far into the drive. 8. When the system...

Words: 470 - Pages: 2