14. Configuring Telnet in Knoppix
|
|
- Arthur Scott
- 6 years ago
- Views:
Transcription
1 14. Configuring Telnet in Knoppix Estimated Time: 45 Minutes Objective In this lab, the student will learn how to configure the Telnet service on a system so that the user can remotely administer a Knoppix server. Equipment The following equipment is required for this exercise: o A computer running Knoppix 3.9 or greater. o Another system, either Linux or Windows, to attempt to Telnet into the Knoppix server. Scenario The student is setting up a Knoppix server that will need to be administered and accessed remotely. To do this, Telnet services will be installed on the Knoppix server. Procedures First, a user will be added to the system, since Telnet normally does not allow root to login. The student will then create a file in the home directory, so that the directory will be easily recognized when a Telnet connection is made. In Knoppix, the Telnet service is not started by default. In this lab, the student will edit two configuration files to add information that will be necessary when the service is started. After that, the student will start the internet daemon. In the last part of the lab, the student will test the Telnet service to confirm that it is properly installed and started on the server. Preliminary step First, click the Knoppix Penguin icon, to get to the root shell. Assign yourself a root password with the passwd command, and enter the password twice. passwd Changing password for user root. Enter new UNIX password: Retype new UNIX password: The password will be successfully updated. Step 1: Adding a user that can login to Telnet 1. The Telnet server requires a user to have a home directory. One option is needed with the useradd command to accomplish this. Create a user account, based on your name. For example, root could create an account for Maria Chavez like this: useradd m mchavez 2. As root, assign your new account a password in this way. For Maria s case, she would type (while logged in as root): passwd mchavez Changing password for user mchavez. Enter new UNIX password: Retype new UNIX password: Type it twice and it will be accepted. In Knoppix, passwords are locked by default. That is why mchavez couldn t create her own password immediately after her user account was created. Root has to do it. Step 2: Create a file that will be seen by a Telnet user Later in this lab, the student will connect to the Knoppix server via Telnet. After connecting to Telnet, the student will be placed into their home directory. Create a file there now that will be easy to recognize later. Type: touch /home/mchavez/testfile
2 or use the directory corresponding to your user s name. Step 3: Editing the internet daemon configuration file The Telnet service is not listed in this file in the standard Knoppix OS. A line must be added. 1. If not already root, login with the root account and open up a terminal emulator window. From the terminal window, type the following command. cd /etc This will change the user to the directory where the internet daemon configuration file is located. Verify that the file is present. Type: ls inetd* Does the output show the file inetd.conf? Yes The file /etc/inetd.conf. Note that there is no line for telnet. 2. Use the vi Editor to change this internet daemon configuration file. Type: vi inetd.conf
3 Navigate to the line below these ones: #:STANDARD: These are standard services. ftp stream tcp nowait root /usr/sbin/tcpd /usr/sbin/in.ftpd Press i to go into insert mode. type this line: telnet stream tcp nowait root Step 4: Creating a dummy ssl certificate This is a workaround, because the Knoppix telnet daemon requires a ssl certificate file to be present on the server (a dummy one will do), before it will run the login program that accepts a username and password. In addition, the certificate works when only the first field (Country Name) is filled in. The other fields should be left empty by putting a dot in them. In the following output, openssl is a command. The rest of the text is issued by that command. Notice that each line ends with a dot, which is typed by the student. Country Name ends with US, or any other country abbreviation. root@0[sbin]# cd /usr/lib/ssl/certs root@0[certs]# openssl req -new -x509 -nodes -out telnetd.pem -keyout telnetd.pem Generating a 1024 bit RSA private key writing new private key to 'telnetd.pem' You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank Country Name (2 letter code) [AU]:US State or Province Name (full name) [Some-State]:. Locality Name (eg, city) []:. Organization Name (eg, company) [Internet Widgits Pty Ltd]:. Organizational Unit Name (eg, section) []:. Common Name (eg, YOUR name) []:. Address []:. root@0[certs]# Step 5: Starting the internet daemon (inetd) Most daemons have start, stop and restart commands. If the internet daemon has not been started previously during this Knoppix session, start is used. If it is running, and you want it to re-read some altered configuration files, restart is used. Login with the root account. The internet daemon can only be started with the root account. Type: /etc/init.d/inetd start or restart, if you have previously started it during this session. Step 6: Testing Telnet Access to the Localhost 1. To test the Telnet service, type:
4 telnet localhost This will use the system to access the Telnet services on the same system. At this point the system will attempt to make a Telnet to the system through the local loopback address, It will prompt the user to enter a username and password. 2. A user cannot login to a remote site with the root account. Use the student account you created earlier to log on and test the Telnet configuration. If a connection to the system is established, then the Knoppix server has been successfully configured for Telnet access. Here is sample output of a successful connection to Telnet. root@0[certs]# telnet localhost Trying Connected to Knoppix. Escape character is '^]'. Debian GNU/Linux 3.1 Knoppix Knoppix login: mchavez Password: Welcome to Knoppix! mchavez@1[~]$ pwd /home/mchavez mchavez@1[~]$ ls Desktop GNUstep testfile tmp mchavez@1[~]$ exit Connection closed by foreign host. root@0[certs]# 3. What directory are you in? To find out, type: pwd In the space below, write down the current working directory: /home/mchavez 4. Type: ls Do you see testfile, that you created earlier in this lab? Yes Step 7: Connecting to Other Systems via Telnet (optional) To connect to the Knoppix Telnet server from another system, another configuration file must be edited, and the NIC must be configured. 1. Using vi, edit the file /etc/hosts.allow, that has these contents. # /etc/hosts.allow: list of hosts that are allowed to access the system. # See the manual pages hosts_access(5), hosts_options(5) # and /usr/doc/netbase/portmapper.txt.gz # # Example: ALL: # ALL:.foobar.edu EXCEPT terminalserver.foobar.edu # # If you're going to protect the portmapper use the name "portmap" for the # daemon name. Remember that you can only use the keyword "ALL" and IP # addresses (NOT host or domain names) for the portmapper. See portmap(8) # and /usr/doc/netbase/portmapper.txt.gz for further information. # ssh sshd : ALL@ALL : ALLOW
5 ALL : LOCAL : ALLOW ALL : ALL@ALL : DENY As root, type: vi /etc/hosts.allow Navigate down to the last line: ALL : ALL@ALL : DENY Move the cursor to the D of DENY. Press x four times to remove the word DENY. Press i to enter insert mode. Type ALLOW in uppercase. ALL : ALL@ALL : ALLOW Press ESC to exit insert mode. Type :wq to exit and save the file. Step 8: Configuring the NIC In order to make a connection to the Knoppix server, its NIC, called eth0, must be configured and enabled. Select an IP address, network mask and broadcast address for your Knoppix server that is compatible with the other hosts on the network. Ask your instructor if you have questions. Then type: ifconfig eth netmask broadcast up Use numbers that are appropriate to your system. Remember to type the word up at the end of the line. That enables the eth0 card. The Knoppix server should now accept Telnet logins from remote hosts. Step 9: Restarting the internet daemon See step 5 for details. Type /etc/init.d/inetd restart Step 10: Testing network access to the Knoppix Telnet server 1. To test the Telnet service, type: telnet or use your address The Knoppix telnet server will prompt the user to enter a username and password. There will be some delay, because Knoppix runs from the CD, and there is probably some processing involving the dummy ssl certificate. Note: The student can use a MS Windows computer or a Linux computer to Telnet to the Knoppix server. 2. A user cannot login to a remote site with the root account. Use the student account you created earlier to log on and test the Telnet configuration. If a connection to the system is established, then the Knoppix server has been successfully configured for Telnet access.
6 Example of a successful connection to Telnet from Windows XP 3. What directory are you in? To find out, type: pwd In the space below, write down the current working directory: /home/mchavez 4. Type: ls Do you see testfile, that you created earlier in this lab? Yes Troubleshooting Configuring services like Telnet for a Linux operating system can be somewhat confusing to the inexperienced user. Editing the configuration files can be a difficult task, so it is important to remember where these files are located and how to navigate to them. Telnet can be a useful troubleshooting tool, which will allow access to the system from virtually any operating system that has an Internet connection. As a system administrator, this can help with troubleshooting efforts. Reflection 1. What security risks does enabling Telnet pose to a system? Passwords and text are sent unencrypted 2. What are some precautions that would allow an administrator to provide security while having Telnet access enabled on a system? Giving users access to only their home directory. Only giving Tlnet to users who need it. Not allowing root to have Telnet access. 3. Which daemon is used for the Telnet service? inetd
15. Creating a Samba Server in Knoppix v.3
15. Creating a Samba Server in Knoppix v.3 Estimated Time: 60 minutes Objective In this lab, the student will start the samba service in Knoppix, allowing transfer of files to and from a indows XP computer
More informationLAB :: Secure HTTP traffic using Secure Sockets Layer (SSL) Certificate
LAB :: Secure HTTP traffic using Secure Sockets Layer (SSL) Certificate In this example we are using apnictraining.net as domain name. # super user command. $ normal user command. N replace with your group
More informationTcpdump. For this exercise you must again be root. Login and obtain root privileges: Note that we use three computers for this exercise.
1 For this exercise you must again be root. Login and obtain root privileges: sudo su Note that we use three computers for this exercise. C S H 2 Create an account on the server that can be used from the
More informationLab 3a Using the vi editor
Lab 3a Using the vi editor Objectives: Become familiar with the vi Editor Review the three vi Modes Review keystrokes to move between vi modes Create a new file with vi Editor Invoke vi with show mode
More informationCENG 334 Computer Networks. Laboratory I Linux Tutorial
CENG 334 Computer Networks Laboratory I Linux Tutorial Contents 1. Logging In and Starting Session 2. Using Commands 1. Basic Commands 2. Working With Files and Directories 3. Permission Bits 3. Introduction
More informationJackson State University Department of Computer Science CSC / Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan
Jackson State University Department of Computer Science CSC 437-01/539-01 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan Lab Project # 2: Running Secure Shell (SSH) Server in a Virtual
More informationController Installation
The following describes the controller installation process. Installing the Controller, page 1 Controller Deployment, page 2 Controller Virtual Hard Disk Storage, page 4 Custom Controller Web UI Certificates,
More informationOptional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07
0Handouts: Optional Lab 1-1: Understanding the /etc/securetty file In this lab, you will examine a PAM component, the /etc/securetty file. 1. Boot into Linux as root. Open a Telnet client and attempt to
More informationHOWTO: Setup FTP with TLS support
HOWTO: Setup FTP with TLS support Contributed by Michael Felt HOWTO setup AIX FTPD for TLS sessions In this article I shall resolve a new fallacies about AIX FTP and TLS connections Fallacy #1: Hard to
More informationUsing WestGrid from the desktop Oct on Access Grid
Using WestGrid from the desktop Oct 11 2007 on Access Grid Introduction Simon Sharpe, UCIT Client Services The best way to contact WestGrid support is to email support@westgrid.ca This seminar gives you
More informationLab Working with Linux Command Line
Introduction In this lab, you will use the Linux command line to manage files and folders and perform some basic administrative tasks. Recommended Equipment A computer with a Linux OS, either installed
More informationManaging Certificates
Loading an Externally Generated SSL Certificate, page 1 Downloading Device Certificates, page 4 Uploading Device Certificates, page 6 Downloading CA Certificates, page 8 Uploading CA Certificates, page
More informationProftpd 지시자설정 10_29 페이지 년 10 월 29 일목요일 오후 2:08
Proftpd 지시자설정 2009 년 10 월 29 일목요일 오후 2:08 루트로접속막기 [root@ruffy&13:47& sbin]# cd /usr/local/ftp/etc/ [root@ruffy&14:05& etc]# vi proftpd.conf IP 대역접속제한 Order 는앞에서부터적용 (apache 와반대 ) 유저제한 디렉토리접근제한 젂송파일사이즈제한
More informationLinux Survival Guide
Linux Survival Guide Introduction: This guide is intended for use with classes at DACC that use a Linux operating system as the platform for students. It provides a quick summary and examples of how to
More informationIT Essentials II: NOS Linux Labs Using Knoppix
IT Essentials II: NOS Linux Labs Using Knoppix 1 IT Essentials II Linux Labs Using Knoppix Agenda Course Overview Knoppix Lab Map Knoppix Overview Lab: Basic System Administration in Knoppix v2 2 IT Essentials
More informationIntroduction to Unix May 24, 2008
Introduction to Unix May 24, 2008 Exercises: Privileges REFERENCE Reference: Shah, Steve, "Linux Administration: A Beginner's Guide", 2nd. ed., Osborne press, New York, NY. If you look at files in a directory
More information15-122: Principles of Imperative Computation
15-122: Principles of Imperative Computation Lab 0 Navigating your account in Linux Tom Cortina, Rob Simmons Unlike typical graphical interfaces for operating systems, here you are entering commands directly
More informationA Simple File Development System for the GESBC Paul H. Muller - Documatrix
A Simple File Development System for the GESBC-9302 Paul H. Muller - Documatrix www.documatrix-usa.com ulx@linuxmail.org Disclaimer: The programs and procedures described here have been tested and are
More information1. Add these options in kernel configuration file and recompile the kernel
Chapter 21 Security Firewall (1) Using ipfw 1. Add these options in kernel configuration file and recompile the kernel options IPFIREWALL options IPFIREWALL_VERBOSE options IPFIREWALL_FORWARD options IPFIREWALL_DEFAULT_TO_ACCEPT
More informationServer software page. Certificate Signing Request (CSR) Generation. Software
Server software page Certificate Signing Request (CSR) Generation Software Apache (mod_ssl and OpenSSL)... 2 cpanel and WHM... 3 Microsoft Exchange 2007... 8 Microsoft Exchange 2010... 9 F5 BigIP... 13
More informationKey File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171
Key File Generation NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Table of Contents Introduction... 2 PuTTY Installation... 2 Key Generation... 7 Configuring PuTTY
More informationAn internal CA that is part of your IT infrastructure, like a Microsoft Windows CA
Purpose This document will describe how to setup to use SSL/TLS to provide encrypted connections to the. This document can also be used as an initial point for troubleshooting SSL/TLS connections. Target
More informationLinux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2
Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working
More informationUser Guide Version 2.0
User Guide Version 2.0 Page 2 of 8 Summary Contents 1 INTRODUCTION... 3 2 SECURESHELL (SSH)... 4 2.1 ENABLING SSH... 4 2.2 DISABLING SSH... 4 2.2.1 Change Password... 4 2.2.2 Secure Shell Connection Information...
More informationYour Apache ssl.conf in /etc/httpd.conf.d directory has the following SSLCertificate related directives.
If you ever need to use HTTPS or SSL with your website, you will need to have an SSL certificate created, which your Apache web server would use to hand out to the web browsers of the site visitors. The
More informationNETW 110 Lab 5 Creating and Assigning Users and Groups Page 1
NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users
More informationThis lab exercise is to be submitted at the end of the lab session! passwd [That is the command to change your current password to a new one]
Data and Computer Security (CMPD414) Lab II Topics: secure login, moving into HOME-directory, navigation on Unix, basic commands for vi, Message Digest This lab exercise is to be submitted at the end of
More informationLinux hep.wisc.edu
Linux Environment @ hep.wisc.edu 1 Your Account : Login Name and usage You are given a unique login name (e.g. john) A temporary password is given to you Use this to login name and password to enter the
More informationHelsinki 19 Jan Practical course in genome bioinformatics DAY 0
Helsinki 19 Jan 2017 529028 Practical course in genome bioinformatics DAY 0 This document can be downloaded at: http://ekhidna.biocenter.helsinki.fi/downloads/teaching/spring2017/exercises_day0.pdf The
More informationjodbc Service and SQL Catalog
jodbc Service and SQL Catalog 2006, 2016 Zumasys, Inc. jbase_agent {options} The jbase_agent command can be run from the command prompt (windows) or shell (Linux) as a foreground process for testing and
More informationELE409 SPRING2018 LAB0
ELE409 SPRING2018 LAB0 Getting familiar with the LXDE system Objectives: Pre-Lab: 1. Burn the linux system onto a micro-sd card 2. Get familiar with basic linux commands 3. Be able to communicate with
More informationVII. Corente Services SSL Client
VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...
More informationLab 2A> ADDING USERS in Linux
Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.
More informationGetting Started With UNIX Lab Exercises
Getting Started With UNIX Lab Exercises This is the lab exercise handout for the Getting Started with UNIX tutorial. The exercises provide hands-on experience with the topics discussed in the tutorial.
More informationFreeBSD Security Advisories
Security FreeBSD Security Advisories http://www.freebsd.org/security/advisories.html 2 FreeBSD Security Advisories Advisory Security information Where to find it Web page (Security Advisories Channel)
More informationLAB :: Secure SHell (SSL)
LAB :: Secure SHell (SSL) In this example we are using apnictraining.net as domain name. # super user command. $ normal user command. X replace with your group no. Username apnic and password training
More informationFreeBSD Security Advisories
Security FreeBSD Security Advisories http://www.freebsd.org/security/advisories.html 2 FreeBSD Security Advisories Advisory Security information Where to find it Web page (Security Advisories Channel)
More informationThese instructions describe the system requirements and process for installing and initial configuration of jbase on Linux operating systems.
DOCUMENT SCOPE These instructions describe the system requirements and process for installing and initial configuration of jbase 5.5.1 on Linux operating systems. ABOUT THE JBASE DATABASE MANAGEMENT SYSTEM
More informationHistory. Terminology. Opening a Terminal. Introduction to the Unix command line GNOME
Introduction to the Unix command line History Many contemporary computer operating systems, like Microsoft Windows and Mac OS X, offer primarily (but not exclusively) graphical user interfaces. The user
More informationNetwork Monitoring & Management. A few Linux basics
Network Monitoring & Management A few Linux basics Our chosen platform Ubuntu Linux 14.04.3 LTS 64-bit LTS = Long Term Support no GUI, we administer using ssh Ubuntu is Debian underneath There are other
More informationSECURITY+ LAB SERIES. Lab 3: Protocols and Default Network Ports Connecting to a Remote System
SECURITY+ LAB SERIES Lab 3: Protocols and Default Network Ports Connecting to a Remote System Document Version: 2015-09-24 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported
More informationLINUX ADMINISTRATION TYBSC-IT SEM V
1 LINUX ADMINISTRATION TYBSC-IT SEM V 2 UNIT 4 CHAPTER 1 : INTERNET SERVICES WHAT IS AN INTERNET SERVICE? Internet Service can be defined as any service that can be accessed through TCP/IP based networks,
More informationBitnami Coppermine for Huawei Enterprise Cloud
Bitnami Coppermine for Huawei Enterprise Cloud Description Coppermine is a multi-purpose, full-featured web picture gallery. It includes user management, private galleries, automatic thumbnail creation,
More informationGetting Started with UNIX
Getting Started with UNIX What is UNIX? Boston University Information Services & Technology Course Number: 4000 Course Instructor: Kenny Burns Operating System Interface between a user and the computer
More informationLab 4: Protocols and Default Network Ports - Connecting to a Remote System
CompTIA Security+ Lab Series Lab 4: Protocols and Default Network Ports - Connecting to a Remote System CompTIA Security+ Domain 1 - Network Security Objective 1.4: Implement and use common protocols Objective
More informationAMS 200: Working on Linux/Unix Machines
AMS 200, Oct 20, 2014 AMS 200: Working on Linux/Unix Machines Profs. Nic Brummell (brummell@soe.ucsc.edu) & Dongwook Lee (dlee79@ucsc.edu) Department of Applied Mathematics and Statistics University of
More informationLinux/Cygwin Practice Computer Architecture
Linux/Cygwin Practice 2010 Computer Architecture Linux Login Use ssh client applications to connect (Port : 22) SSH Clients zterm ( http://www.brainz.co.kr/products/products4_2.php ) Putty ( http://kldp.net/frs/download.php/3411/hangulputty-0.58.h2.exe
More information3. In the upper left hand corner, click the Barracuda logo ( ) then click Settings 4. Select the check box for SPoE as default.
Week 1 Lab Lab 1: Connect to the Barracuda network. 1. Download the Barracuda NG Firewall Admin 5.4 2. Launch NG Admin 3. In the upper left hand corner, click the Barracuda logo ( ) then click Settings
More informationHPE Knowledge Article
HPE Knowledge Article HPE 5930/5940 Switch Series - Connect to OVSDB Client Article Number mmr_sf-en_us000021071 Environment HPE 5930/5940 switches can be configured as OVSDB servers. One common use case
More informationCST Lab 2 Review #1
CST8177 - Lab 2 Review #1 Student Name Student number Section Objectives To review command line features, file system access, and permissions Lab Outcome A review of working with the command line A review
More informationTELE301 Lab16 - The Secure Shell
TELE301 Lab16 - The Secure Shell Department of Telecommunications May 7, 2002 Contents 1 Introduction 2 2 OpenSSH 2 3 Replacing Telnet 2 4 Logging in without a password 2 5 SSH Agent 3 5.1 SSH Add..............................
More informationRFC RFC. Configuring FTP Server. FTP Clients
RFC slide 1 RFC slide 2 as a network manager it is important to understand some of the subtle issues within networking within the TCP/IP suite of protocols including: TCP, UDP, IP, SNMP, ICMP, SMTP, FTP,
More informationChapter 1 An Introduction to C++, Unix, SSH and Komodo Edit
Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit Contents 1 An Introduction to C++, Unix, SSH and Komodo Edit 1.1 Introduction 1.2 The C++ Language 1.2.1 A Brief Introduction 1.2.1.1 Recommended
More informationBitnami ez Publish for Huawei Enterprise Cloud
Bitnami ez Publish for Huawei Enterprise Cloud Description ez Publish is an Enterprise Content Management platform with an easy to use Web Content Management System. It includes role-based multi-user access,
More informationMessage Networking 5.2 Administration print guide
Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do
More informationLab Configuring and Verifying Extended ACLs Topology
Topology 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1
More informationOnce you have installed MobaXterm, open MobaXterm. Go to Sessions -> New Session, and click on the SSH icon.
Lab 1 In order to get credit for the lab, you need to be checked off by the end of lab. For nonzero labs, you can earn a maximum of 3 points for lab work completed outside of lab time, but you must finish
More informationTCP Wrapper. Provides host-based access control to network services
1 TCP Wrapper Provides host-based access control to network services It has the following features: Logging Access Control Host Name Verification User Name Verification Spoofing Protection 2 TCP Wrapper
More informationTutorial 1: Unix Basics
Tutorial 1: Unix Basics To log in to your ece account, enter your ece username and password in the space provided in the login screen. Note that when you type your password, nothing will show up in the
More informationIntroduction to the UNIX command line
Introduction to the UNIX command line Steven Abreu Introduction to Computer Science (ICS) Tutorial Jacobs University s.abreu@jacobs-university.de September 19, 2017 Overview What is UNIX? UNIX Shell Commands
More informationHow to Enable Client Certificate Authentication on Avi
Page 1 of 11 How to Enable Client Certificate Authentication on Avi Vantage view online Overview This article explains how to enable client certificate authentication on an Avi Vantage. When client certificate
More informationBitnami Tiny Tiny RSS for Huawei Enterprise Cloud
Bitnami Tiny Tiny RSS for Huawei Enterprise Cloud Description Tiny Tiny RSS is an open source web-based news feed (RSS/Atom) reader and aggregator, designed to allow you to read news from any location,
More informationEKT332 COMPUTER NETWORK
EKT332 COMPUTER NETWORK LAB 1 INTRODUCTION TO GNU/LINUX OS Lab #1 : Introduction to GNU/Linux OS Objectives 1. Introduction to Linux File System (Red Hat Distribution). 2. Introduction to various packages
More informationParallel Programming Pre-Assignment. Setting up the Software Environment
Parallel Programming Pre-Assignment Setting up the Software Environment Authors: B. Wilkinson and C. Ferner. Modification date: Aug 21, 2014 (Minor correction Aug 27, 2014.) Software The purpose of this
More informationUCON-IP-NEO Operation Web Interface
UCON-IP-NEO Operation Web Interface copyright G&D 25/01/2012 Web Interface version 2.30 Subject to possible errors and technical modifications License notes G&D license Copyright G&D GmbH 2003-2012: All
More informationSession 16 Windows 7 Professional DNS & Active Directory
Session 16 Windows 7 Professional DNS & Active Directory Fall 2011 ITE153 Operating Systems 1 Session 16 Windows 7 Professional Configuring TCP/IP Addressing & Name Resolution Fall 2011 ITE153 Operating
More informationChapter 1 An Introduction to C++, Unix, SSH and Komodo Edit
Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit A portion of this lab is to be done during the scheduled lab time. The take-home programming assignment is to be turned in before the next lab;
More informationCS Fundamentals of Programming II Fall Very Basic UNIX
CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)
More informationPhysics REU Unix Tutorial
Physics REU Unix Tutorial What is unix? Unix is an operating system. In simple terms, its the set of programs that makes a computer work. It can be broken down into three parts. (1) kernel: The component
More informationCCNA Discovery Server Live CD v2.0
CCNA Discovery Overview CCNA Discovery Server Live CD v2.0 Information and Installation Instructions The Discovery Server Live CD provides all of the network services necessary to support the CCNA Discovery
More informationMac OSX Certificate Enrollment Procedure
Mac OSX Certificate Enrollment Procedure 1. Log on to your Macintosh machine, open a terminal to create a key: openssl genrsa -des3 -out dpvpn-cert.key 1024 2. Create a CSR file with the newly created
More informationCS CS Tutorial 2 2 Winter 2018
CS CS 230 - Tutorial 2 2 Winter 2018 Sections 1. Unix Basics and connecting to CS environment 2. MIPS Introduction & CS230 Interface 3. Connecting Remotely If you haven t set up a CS environment password,
More informationLinux Systems Administration Getting Started with Linux
Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
More information1 Getting Started with Linux.
PHYS-4007/5007: omputational Physics Tutorial #1 Using Linux for the First Time 1 Getting Started with Linux. The information of logging in on the Linux side of the computers in Brown Hall 264 can be found
More informationOPERATING SYSTEMS LINUX
OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu Process management Linux operating systems work with processes. Basically a process consists of program code
More informationUnix Tutorial Haverford Astronomy 2014/2015
Unix Tutorial Haverford Astronomy 2014/2015 Overview of Haverford astronomy computing resources This tutorial is intended for use on computers running the Linux operating system, including those in the
More informationSpring 2017 Gabriel Kuri
Lab 2 ECE 431L Spring 2017 Gabriel Kuri This lab is made up of two parts. Part 1 will consist of familiarizing yourself with the Raspberry Pi (RPi). It includes running Unix/Linux commands to become somewhat
More informationOPERATING SYSTEMS. Božo Krstajić, PhD, University of Montenegro Podgorica.
OPERATING SYSTEMS Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu 1 The /etc/rc.d directory The system initialization files are stored in the /etc/rc.d directory. Each task or runlevel
More informationeftp Application User Guide
Team A eftp User Guide 1/30 eftp Application User Guide Table of Contents Page 1. Acknowledgement 2 2. Introduction a. Welcome eftp Audience 3 b. What s in this manual 3 c. Manual Conventions 3 d. Getting
More informationC++ Programming on Linux
C++ Programming on Linux What is Linux? CS 2308 Spring 2017 Jill Seaman Slides 14-end are for your information only, you will not be tested over that material. 1 l an operating system l Unix-like l Open
More informationThere are two tools with which you should be familiar: the program su, and more importantly, sudo. Here we see how to use them.
Operating Systems and Systems Integration Administration, the root User and Configuring sudo 1 Aim The aim of this activity is to understand the purpose of the root account, and the security risks of logging
More informationidirect Technical Note 1. INTRODUCTION 2. DIFFERENCES BETWEEN INFINITI AND NETMODEM II+ SERIES
idirect Technical Note Subject: Recovering infiniti Remotes Date: March 10, 2006 Applies To: Version 6.0.1 and Later 1. INTRODUCTION This technical note contains information and procedures pertaining to:
More informationCS1600 Lab Assignment 1 Spring 2016 Due: Feb. 2, 2016 POINTS: 10
CS1600 Lab Assignment 1 Spring 2016 Due: Feb. 2, 2016 POINTS: 10 PURPOSE: The purpose of this lab is to acquaint you with the C++ programming environment on storm. PROCEDURES: You will use Unix/Linux environment
More informationContent and Purpose of This Guide... 1 User Management... 2
Contents Introduction--1 Content and Purpose of This Guide........................... 1 User Management........................................ 2 Security--3 Security Features.........................................
More informationBitnami ProcessMaker Community Edition for Huawei Enterprise Cloud
Bitnami ProcessMaker Community Edition for Huawei Enterprise Cloud Description ProcessMaker is an easy-to-use, open source workflow automation and Business Process Management platform, designed so Business
More informationCSCI 2132 Software Development. Lecture 4: Files and Directories
CSCI 2132 Software Development Lecture 4: Files and Directories Instructor: Vlado Keselj Faculty of Computer Science Dalhousie University 12-Sep-2018 (4) CSCI 2132 1 Previous Lecture Some hardware concepts
More informationOffloading NDO2DB To Remote Server
Purpose This document is meant to show a step-by-step guide for offloading the NDO2DB daemon from the central server to an external, remote server. NDO2DB is an acronym of "Nagios Data Output To Database"
More informationManaging User Accounts
Configuring Guest User Accounts, page 1 Configuring Administrator Usernames and Passwords, page 4 Changing the Default Values for SNMP v3 Users, page 6 Generating a Certificate Signing Request, page 7
More informationCS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX
CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot
More informationLAB #7 Linux Tutorial
Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing
More information8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista
8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista Introduction If Vista is not available in your classroom, you may complete this lab by viewing the figures in this document. Print and
More informationBitnami Piwik for Huawei Enterprise Cloud
Bitnami Piwik for Huawei Enterprise Cloud Description Piwik is a real time web analytics software program. It provides detailed reports on website visitors: the search engines and keywords they used, the
More informationInstallation Manual. Universitätsstraße Koblenz Germany. VERSION: 11.x
Installation Manual DOCUMENT: TYPE: Installation Manual Manual PUBLISHED BY: nova ratio AG Universitätsstraße 3 56070 Koblenz Germany VERSION: 11.x RELEASE DATE: December 19, 2017 Table of content 1 Foreword...1
More informationLab - Examining Telnet and SSH in Wireshark
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 Part 1: Configure the Devices
More informationWEM Installation Manual Version 1.0. Samsung Wireless Enterprise Manager (WEM) Installation Manual
Samsung Wireless Enterprise Manager (WEM) Installation Manual COPYRIGHT This manual is proprietary to SAMSUNG Electronics America, and is protected by copyright. No information contained herein may be
More informationDue: February 26, 2014, 7.30 PM
Jackson State University Department of Computer Science CSC 438-01/539-01 Systems and Software Security, Spring 2014 Instructor: Dr. Natarajan Meghanathan Project 1: Exploring UNIX Access Control in a
More informationNETW 110 Lab 3 Post-Installation Configuration Page 1
NETW 110 Lab 3 Post-Installation Configuration Page 1 Objective At the conclusion of this lab, the student will learn some very basic functions of vi, use vi to perform some post-installation configuration
More informationUsing Cisco IOS XE Software
This chapter describes the basics of using the Cisco IOS XE software and includes the following section: Accessing the CLI Using a Router Console, on page 1 Accessing the CLI Using a Router Console Before
More informationBitnami Dolibarr for Huawei Enterprise Cloud
Bitnami Dolibarr for Huawei Enterprise Cloud Description Dolibarr is an open source, free software package for small and medium companies, foundations or freelancers. It includes different features for
More informationCS/CIS 249 SP18 - Intro to Information Security
Lab assignment CS/CIS 249 SP18 - Intro to Information Security Lab #2 - UNIX/Linux Access Controls, version 1.2 A typed document is required for this assignment. You must type the questions and your responses
More information