NT1430 Final Review 1. Know what a swap partition is used for. a. The swap partition is an independent section of the hard disk used solely for swapping; no other files can reside there. Swap partition is used to turn the hard drive into extra RAM. 2. Know what an architecture is, and which are supported by Fedora. a. 32 and 64 bit b. Fedora CDs and DVDs hold programs compiled to run on a specific processor architecture (class of processors, or CPUs) c. There are several that Fedora supports:
Words: 1334 - Pages: 6
Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack. Each technical advance brings wave after wave of security holes. A new protocol might result in dozens of actual implementations, each of which could contain exploitable programming errors. Logic errors, vendor-installed backdoors, and default configurations plague everything from modern operating
Words: 9203 - Pages: 37
Investigators LLC Controls and Countermeasures Private Investigators Limited Liability Company (LLC) has a small office with one server and six workstations. This LLC partnership hosts its own website that allows clients to log in and enter case information. An evaluation of the network and security configuration to determine threats and weakness to the existing system has been completed. A list of the top five associated threats for the Server, Workstations, and Website are outlined below. The
Words: 2179 - Pages: 9
free version that you can download. Mandrake Linux : Mandrake is perhaps strongest on the desktop. Originally based off of Red Hat Linux. Gentoo Linux : Gentoo is a specialty distribution meant for programmers. A runlevel is a software configuration of the system which allows only a selected group of processes to exist The processes spawned by init for each of these runlevels are defined in the /etc/inittab file Init can be in one
Words: 7097 - Pages: 29
_________________________________ Date _____________ SEC450 Security Testing iLab Objectives In this lab, the students will examine the following objectives. * The use of Flow Analysis Port Scan to determine the open ports on routers or hosts * Discovery of network vulnerabilities and mitigation of possible threats Scenario A small company is using the topology shown below. Minimal security measures have been implemented. Possible vulnerabilities need to be discovered in any of
Words: 1259 - Pages: 6
IP Spoofing by Farha Ali, Lander University The Internet Protocol, or IP, is the main protocol used to route information across the Internet. The role of IP is to provide best-effort services for the delivery of information to its destination. IP depends on upper-level TCP/IP suite layers to provide accountability and reliability. The heart of IP is the IP datagram, a packet sent over the Internet in a connectionless manner. An IP datagram carries enough information about the network to get
Words: 3368 - Pages: 14
TCP/IP protocols have long been subject to man-in-the-middle (MITM) attacks, but the advent of SSL/TLS was supposed to mitigate that risk for web transactions by providing endpoint authentication and encryption. The advent of Dug Song's 'webmitm' in late 2000 demonstrated the feasibility of mounting an MITM attack on the protocol, but a properlyconfigured client SSL implementation would warn the user about problems with the server certificate. This paper examines the mechanics of the SSL protocol attack
Words: 6154 - Pages: 25
Commands with some options: * tar - options to create and extract, preserve options, gzip compress (you should have used either of these when you created your kernel source code backup.) * chmod - options to recursively change user, group and other permissions on files/directories * chown - options to recursively change file and directory user ownership * chgrp - options to recursively change file and directory group ownership * kill - superkill vs sending other signals
Words: 4587 - Pages: 19
NI-LIMIT 11 NI-LIMIT COMPUTER NETWORK SYSTEM PROPOSAL [Type the document subtitle] [Type the author name] TABLE OF CONTENTS ACKNOWLEDGEMENTS My fellow group members would like to thank our dear lecturer Mrs. Noris Ismail for doing her lecturing job professionally which broadened our knowledge greatly about networking and enabled us to come up with such a detailed proposal for network infrastructure and mixing it with several other ideas to finally make a final report on it. I would
Words: 10139 - Pages: 41
Final Paper: Cross-Layer or Hybrid Analysis and Recommendations Final Paper: Cross-Layer or Hybrid Analysis and Recommendations According to "Cat-5" (2014), "Cat-5, short for Category 5, network cabling that consists of four twisted pairs of copper wire terminated by RJ45 connectors. Cat-5 cabling supports frequencies up to 100 MHz and speeds up to 1000 Mbps. It can be used for ATM, token ring, 1000Base-T, 100Base-T, and 10Base-T networking. Computers hooked up to LAN s are connected using Cat-5
Words: 5457 - Pages: 22