CIT 480: Securing Computer Systems

Size: px
Start display at page:

Download "CIT 480: Securing Computer Systems"

Transcription

1 CIT 480: Securing Computer Systems Operating System Security CIT 480: Securing Computer Systems Slide #1

2 Topics 1. OS Security Features 2. Bypassing OS Security 1. Boot time security 2. BIOS security 3. System Logs CIT 480: Securing Computer Systems Slide #2

3 OS Security Features 1. Authentication 2. Access Control 3. Auditing (Logging) 4. Encryption (Filesystems) 5. Isolation (VM) 6. Patching (Updates) CIT 480: Securing Computer Systems Slide #3

4 The Boot Sequence The action of loading an operating system into memory from a poweredoff state is known as booting or bootstrapping. When a computer is turned on, it first executes code stored in a firmware component known as the BIOS (basic input/output system). On modern systems, the BIOS loads into memory the second-stage boot loader, which handles loading the rest of the operating system into memory and then passes control of execution to the operating system. Slide #4

5 Boot Process Detail CIT 480: Securing Computer Systems Slide #5

6 BIOS CIT 480: Securing Computer Systems Slide #6

7 Reconfiguring Boot Media Attacker boots with their OS that ignores your ACLs CIT 480: Securing Computer Systems Slide #7

8 BIOS Passwords CIT 480: Securing Computer Systems Slide #8

9 Removing the BIOS Password CIT 480: Securing Computer Systems Slide #9

10 Protecting the BIOS Password CIT 480: Securing Computer Systems Slide #10

11 Bootloader CIT 480: Securing Computer Systems Slide #11

12 Reconfiguring the Bootloader CIT 480: Securing Computer Systems Slide #12

13 Single User Mode CIT 480: Securing Computer Systems Slide #13

14 Single User Mode Password CIT 480: Securing Computer Systems Slide #14

15 Changing init CIT 480: Securing Computer Systems Slide #15

16 GRUB Password CIT 480: Securing Computer Systems Slide #16

17 Hibernation Modern machines have the ability to go into a powered-off state known as hibernation. While going into hibernation, the OS stores the contents of machine s memory into a hibernation file (such as hiberfil.sys) on disk so the computer can be quickly restored later. 1. User closes a laptop computer, putting it into hibernation. 2. Attacker copies the hiberfil.sys file to discover any unencrypted passwords that were stored in memory when the computer was put into hibernation. Slide #17

18 Cold Memory Attack CIT 480: Securing Computer Systems Slide #18

19 Startup Processes: Windows CIT 480: Securing Computer Systems Slide #19

20 Startup Services: Linux CIT 480: Securing Computer Systems Slide #20

21 System Logs Logs record status and error conditions. Where do log messages come from? Kernel Accounting system System services Logging methods: Service records own logs (apache, cron). Service uses system service to manage logs. CIT 480: Securing Computer Systems Slide #21

22 Windows Event Log CIT 480: Securing Computer Systems Slide #22

23 Finding UNIX Logs Most logs are stored under /var/log /var/adm Check syslog's configuration /etc/syslog.conf To find other logs, read startup scripts /etc/init.d/* and manuals for services started by scripts. CIT 480: Securing Computer Systems Slide #23

24 Finding Logs Log file Program Contents messages syslog Various program/kernel logs. syslog syslog Various program/kernel logs. auth.log su, ssh, login Authorization fail/success. lastlog login, xdm Logins, commands. wtmp login Login accounting data. acct/pacct kernel UNIX process accounting. Xorg.log X-Windows X-Windows failures/info. CIT 480: Securing Computer Systems Slide #24

25 Example Syslog Messages Feb 11 10:17:01 localhost /USR/SBIN/CRON[1971]: (root) CMD ( run-parts --report /etc/cron.hourly) Feb 11 10:37:22 localhost -- MARK -- Feb 11 10:51:11 localhost dhclient: DHCPREQUEST on eth1 to port 67 Feb 11 10:51:11 localhost dhclient: DHCPACK from Feb 11 10:51:11 localhost dhclient: bound to renewal in seconds. Feb 11 14:37:22 localhost -- MARK -- Feb 11 14:44:21 localhost mysqld[7340]: :44:21 /usr/sbin/mysqld: Normal shutdown Feb 12 04:46:42 localhost sshd[29093]: Address maps to ns.thundernet.co.kr, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT! Feb 12 04:46:44 localhost sshd[29097]: Invalid user matt from ::ffff: CIT 480: Securing Computer Systems Slide #25

26 References 1. Anderson, Security Engineering 2 nd Edition, Wiley, Goodrich and Tammasia, Introduction to Computer Security, Pearson, CIT 480: Securing Computer Systems Slide #26

CIT 470: Advanced Network and System Administration. Topics. System Logs. Logging

CIT 470: Advanced Network and System Administration. Topics. System Logs. Logging CIT 470: Advanced Network and System Administration Logging CIT 470: Advanced Network and System Administration Slide #1 1. System logs 2. Logging policies 3. Finding logs 4. Syslog 5. Syslog servers 6.

More information

University of Pennsylvania Zachary Goldberg. CIS c. More Kernel Bits. 10/03/09 Slide 1

University of Pennsylvania Zachary Goldberg. CIS c. More Kernel Bits. 10/03/09 Slide 1 More Kernel Bits 10/03/09 Slide 1 Rebooting Why would one ever need to reboot on Linux? Installing new driver?... (No) Installing new applications?... (No) Installing new... Anything?... (No) Reconfiguring...

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,

More information

Advanced Operating Systems and Virtualization. Alessandro Pellegrini A.Y. 2017/2018

Advanced Operating Systems and Virtualization. Alessandro Pellegrini A.Y. 2017/2018 Advanced Operating Systems and Virtualization Alessandro Pellegrini A.Y. 2017/2018 Basic Information Lecture Schedule: Course begins today! Course ends on June 1 st Lecture slots: Tuesday, 08.00 am 10.00

More information

Linux Systems Security. Security Design NETS Fall 2016

Linux Systems Security. Security Design NETS Fall 2016 Linux Systems Security Security Design NETS1028 - Fall 2016 Designing a Security Approach Physical access Boot control Service availability and control User access Change control Data protection and backup

More information

The Early System Start-Up Process. Group Presentation by: Tianyuan Liu, Caiwei He, Krishna Parasuram Srinivasan, Wenbin Xu

The Early System Start-Up Process. Group Presentation by: Tianyuan Liu, Caiwei He, Krishna Parasuram Srinivasan, Wenbin Xu The Early System Start-Up Process Group Presentation by: Tianyuan Liu, Caiwei He, Krishna Parasuram Srinivasan, Wenbin Xu 1 Boot Process Booting is the initialization of a computerized system In Linux,

More information

CIT 480: Securing Computer Systems. Operating System Concepts

CIT 480: Securing Computer Systems. Operating System Concepts CIT 480: Securing Computer Systems Operating System Concepts Topics 1. What is an OS? 2. Processes 3. Memory management 4. Filesystems 5. Virtual machines A Computer Model An operating system has to deal

More information

Linux+ Guide to Linux Certification, Third Edition. Chapter 2 Linux Installation and Usage

Linux+ Guide to Linux Certification, Third Edition. Chapter 2 Linux Installation and Usage Linux+ Guide to Linux Certification, Third Edition Chapter 2 Linux Installation and Usage Objectives Install Red Hat Fedora Linux using good practices Outline the structure of the Linux interface Enter

More information

Thousands of Linux Installations (and only one administrator)

Thousands of Linux Installations (and only one administrator) Thousands of Linux Installations (and only one administrator) A Linux cluster client for the University of Manchester A V Le Blanc I T Services University of Manchester LeBlanc@man.ac.uk Overview Environment

More information

Computers Are Your Future Chapter 4

Computers Are Your Future Chapter 4 INTRODUCTION TO IT WEEK4 CHAPTER4 LECTURE1 Faculty of Computing and Information Technology.Rabigh System Software Slide 2 What You Will Learn... The two major components of operating system software Why

More information

Basic Linux Security. Roman Bohuk University of Virginia

Basic Linux Security. Roman Bohuk University of Virginia Basic Linux Security Roman Bohuk University of Virginia What is Linux? An open source operating system Project started by Linus Torvalds kernel Kernel: core program that controls everything else (controls

More information

Introduction to UNIX/LINUX Security. Hu Weiwei

Introduction to UNIX/LINUX Security. Hu Weiwei Introduction to UNIX/LINUX Security Hu Weiwei Operation System Security The Security Problems in Operation Systems become more and more important The Security techniques improved rapidly The number of

More information

CIT 480: Securing Computer Systems

CIT 480: Securing Computer Systems CIT 480: Securing Computer Systems Tunneling and VPNs CIT 480: Securing Computer Systems Slide #1 Topics 1. Tunneling 1. Encapsulation 2. Security 3. SSH 2. Virtual Private Networks 1. Site-to-site 2.

More information

System Administration. Startup Process

System Administration. Startup Process System Administration Startup Process Why Care? Every process on your system comes about by following a specific chain of events from the machine startup You may want to disable processes You may want

More information

Booting up and Shutting down A primer for troubleshooting

Booting up and Shutting down A primer for troubleshooting Booting up and Shutting down A primer for troubleshooting In this section, we touch upon the startup and shutdown process on Linux. It is beyond the scope of this course to cover this topic in depth and

More information

Nexpose. Hardening Guide. Product version: 6.0

Nexpose. Hardening Guide. Product version: 6.0 Nexpose Hardening Guide Product version: 6.0 Table of contents Table of contents 2 Revision history 3 File System 4 Installation 5 Configuration 6 Users 6 Services 6 Kernel Settings 6 CIS Benchmarks 8

More information

Certification. System Initialization and Services

Certification. System Initialization and Services Certification System Initialization and Services UNIT 3 System Initialization and Services UNIT 3: Objectives Upon completion of this unit the student should be able to: Describe BIOS functions with respect

More information

Basic UNIX system administration

Basic UNIX system administration Basic UNIX system administration CS 2204 Class meeting 14 *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright 2001-2003. System administration Thus far, we ve only discussed:

More information

RHCE BOOT CAMP. The Boot Process. Wednesday, November 28, 12

RHCE BOOT CAMP. The Boot Process. Wednesday, November 28, 12 RHCE BOOT CAMP The Boot Process OVERVIEW The boot process gets a machine from the useless off state to the feature rich operating system we all know and love Requires cooperation between hardware and software

More information

HP-UX System Administration Course Overview. Skills Gained. Who will the Course Benefit?

HP-UX System Administration Course Overview. Skills Gained. Who will the Course Benefit? HP-UX System Administration Course Overview This Hewlett Packard HP-UX System Administration training course is designed to give delegates practical experience in the administration of an HP-UX UNIX System.

More information

PL-I Assignment Broup B-Ass 5 BIOS & UEFI

PL-I Assignment Broup B-Ass 5 BIOS & UEFI PL-I Assignment Broup B-Ass 5 BIOS & UEFI Vocabulary BIOS = Basic Input Output System UEFI = Unified Extensible Firmware Interface POST= Power On Self Test BR = Boot Record (aka MBR) BC =Boot Code (aka

More information

1Z Oracle Solaris 11 System Administration Exam Summary Syllabus Questions

1Z Oracle Solaris 11 System Administration Exam Summary Syllabus Questions 1Z0-821 Oracle Solaris 11 System Administration Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-821 Exam on Oracle Solaris 11 System Administration... 2 Oracle 1Z0-821 Certification

More information

ITDUMPS QUESTION & ANSWER. Accurate study guides, High passing rate! IT dumps provides update free of charge in one year!

ITDUMPS QUESTION & ANSWER. Accurate study guides, High passing rate! IT dumps provides update free of charge in one year! ITDUMPS QUESTION & ANSWER Accurate study guides, High passing rate! IT dumps provides update free of charge in one year! HTTP://WWW.ITDUMPS.COM Exam : 1Z0-100 Title : Oracle Linux 5 and 6 System Administration

More information

Backup, File Backup copies of individual files made in order to replace the original file(s) in case it is damaged or lost.

Backup, File Backup copies of individual files made in order to replace the original file(s) in case it is damaged or lost. Glossary A Active Directory a directory service that inventories, secures and manages the users, computers, rules and other components of a Microsoft Windows network. This service is typically deployed

More information

CIT 470: Advanced Network and System Administration. Topics. Workstation Management. Workstations

CIT 470: Advanced Network and System Administration. Topics. Workstation Management. Workstations CIT 470: Advanced Network and System Administration Workstations CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Machine Lifecycle 2. Automated Installs 3. Updates 4. Network Configuration

More information

CIT 380: Securing Computer Systems. Network Security Concepts

CIT 380: Securing Computer Systems. Network Security Concepts CIT 380: Securing Computer Systems Network Security Concepts Topics 1. Protocols and Layers 2. Layer 2 Network Concepts 3. MAC Spoofing 4. ARP 5. ARP Spoofing 6. Network Sniffing Protocols A protocol defines

More information

Linux Class 2. Debian file system, superuser, editing text files, executing comands in the shell, configuring, installing and uninstalling packages.

Linux Class 2. Debian file system, superuser, editing text files, executing comands in the shell, configuring, installing and uninstalling packages. Linux Class 2 Debian file system, superuser, editing text files, executing comands in the shell, configuring, installing and uninstalling packages. Abel Guzman sanchez Systems and networks Engineer Www.abelworld.com

More information

Linux+ Guide to Linux Certification, Third Edition

Linux+ Guide to Linux Certification, Third Edition Linux+ Guide to Linux Certification, Third Edition Chapter 14 Troubleshooting, Performance, and Security Objectives Describe and outline good troubleshooting practices Effectively troubleshoot common hardware-

More information

Lab E2: bypassing authentication and resetting passwords

Lab E2: bypassing authentication and resetting passwords Lab E2: bypassing authentication and resetting passwords TTM4175 September 7, 2015 The purpose of this lab is to learn about techniques for bypassing the authentication and access control of Windows and

More information

Operating system hardening

Operating system hardening Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications

More information

Advanced Linux System Administra3on

Advanced Linux System Administra3on Advanced Linux System Administra3on Subject 9. Logging Pablo Abad Fidalgo José Ángel Herrero Velasco Departamento de Ingeniería Informá2ca y Electrónica Este tema se publica bajo Licencia: Crea2ve Commons

More information

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year! EXAMGOOD QUESTION & ANSWER Exam Good provides update free of charge in one year! Accurate study guides High passing rate! http://www.examgood.com Exam : HP0-601 Title : Tru64 UNIX V5.0 System Admin. Support

More information

File System Hierarchy Standard (FHS)

File System Hierarchy Standard (FHS) File System Hierarchy Standard (FHS) Filesystem hierarchy standard describes directory structure and its content in Unix and Unix like operating system. It explains where files and directories should be

More information

SYSLOG. Vladislav Marinov. February 18th, Jacobs University Bremen. Vladislav Marinov SYSLOG 1

SYSLOG. Vladislav Marinov. February 18th, Jacobs University Bremen. Vladislav Marinov SYSLOG 1 SYSLOG Vladislav Marinov Jacobs University Bremen February 18th, 2008 Vladislav Marinov SYSLOG 1 Have You Seen This? Feb 17 07:38:18 aerztin syslogd 1.4.1#21ubuntu3: restart. Feb 17 07:38:18 aerztin anacron[23256]:

More information

Booting Up and Shutting Down. lctseng / Liang-Chi Tseng

Booting Up and Shutting Down. lctseng / Liang-Chi Tseng Booting Up and Shutting Down lctseng / Liang-Chi Tseng Booting Up Starting up a computer Load kernel into memory and execute it. (1) BIOS load and run the MBR (Master Boot Record) (2) MBR searches for

More information

Initialization: runlevels

Initialization: runlevels Initialization: init The init process is always the first started (has a PID of 1) and will remain running until the system is shut down With init running, the kernel moves to the background awaiting system

More information

Embedded lightweight unix

Embedded lightweight unix Embedded lightweight unix ELWIX its free now! Universal embedded system http://www.elwix.org/ Michael Pounov Since 2004 like propriatary OS Give best practices and features from *BSD

More information

Quick Start Guide to Compute Canada Cloud Service

Quick Start Guide to Compute Canada Cloud Service Quick Start Guide to Compute Canada Cloud Service Launching your first instance (VM) Login to the East or West cloud Dashboard SSH key pair Importing an existing key pair Creating a new key pair Launching

More information

Chapter 2 Booting Up and Shutting Down

Chapter 2 Booting Up and Shutting Down Chapter 2 Booting Up and Shutting Down Boot Up? 2 Shut Down? 3 Booting Up Starting up a computer Load kernel into memory and execute it. (1) BIOS load and run the MBR (Master Boot Record) (2) MBR searches

More information

CompTIA Linux+/LPIC-1 COPYRIGHTED MATERIAL

CompTIA Linux+/LPIC-1 COPYRIGHTED MATERIAL CompTIA Linux+/LPIC-1 COPYRIGHTED MATERIAL Chapter System Architecture (Domain 101) THE FOLLOWING COMPTIA LINUX+/LPIC-1 EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER: 101.1 Determine and Configure hardware

More information

OS security mechanisms:

OS security mechanisms: OS security mechanisms: Memory Protection: One of the important aspects of Operating system security is Memory Protection. Memory provides powerful indirect way for an attacker to circumvent security mechanism,

More information

Certifying Program Execution with Secure Processors. Benjie Chen Robert Morris Laboratory for Computer Science Massachusetts Institute of Technology

Certifying Program Execution with Secure Processors. Benjie Chen Robert Morris Laboratory for Computer Science Massachusetts Institute of Technology Certifying Program Execution with Secure Processors Benjie Chen Robert Morris Laboratory for Computer Science Massachusetts Institute of Technology Motivation All PCs may soon include trusted computing

More information

Installing Cisco StadiumVision Director Software from a DVD

Installing Cisco StadiumVision Director Software from a DVD Installing Cisco StadiumVision Director Software from a DVD First Published: May 29, 2012 Revised: August 2, 2012 This module describes how to install the Cisco StadiumVision Director Release 3.0 software

More information

"Charting the Course... MOC B: Linux System Administration. Course Summary

Charting the Course... MOC B: Linux System Administration. Course Summary Description Course Summary This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional Linux system administrator. The course covers

More information

Course 55187B Linux System Administration

Course 55187B Linux System Administration Course Outline Module 1: System Startup and Shutdown This module explains how to manage startup and shutdown processes in Linux. Understanding the Boot Sequence The Grand Unified Boot Loader GRUB Configuration

More information

The Wonderful World of Services VINCE

The Wonderful World of Services VINCE The Wonderful World of Services VINCE Agenda definitions services for Windows and Linux breaks? auditing Linux logs for Linux useful tools Goals develop a better understanding of Linux and Windows services

More information

Display Modules (DL-DM) Application Developer's Guide

Display Modules (DL-DM) Application Developer's Guide Display Modules (DL-DM) Application Developer's Guide PART NUMBER: 101198 VERSION: 3.0 P Page 1 of 11 Revision Status Revision Date Part Number Description 1.0 2011-08-31 DL-DM700-DGAPPL Initial release

More information

ECE 550D Fundamentals of Computer Systems and Engineering. Fall 2017

ECE 550D Fundamentals of Computer Systems and Engineering. Fall 2017 ECE 550D Fundamentals of Computer Systems and Engineering Fall 2017 The Operating System (OS) Prof. John Board Duke University Slides are derived from work by Profs. Tyler Bletsch and Andrew Hilton (Duke)

More information

Linux/Citrix Virtual Environment Documentation

Linux/Citrix Virtual Environment Documentation Linux/Citrix Virtual Environment Documentation Purpose This document provides information on creating a bootable Ubuntu flash drive, customizing the interface, and using basic commands. Contents Bootable

More information

Technology in Action. Chapter 5 System Software: The Operating System, Utility Programs, and File Management

Technology in Action. Chapter 5 System Software: The Operating System, Utility Programs, and File Management Technology in Action Chapter 5 System Software: The Operating System, Utility Programs, and File Management Chapter Topics Operating System Fundamentals What the Operating System Does The Boot Process:

More information

NI Linux Real-Time. Fanie Coetzer. Field Sales Engineer SA North. ni.com

NI Linux Real-Time. Fanie Coetzer. Field Sales Engineer SA North. ni.com 1 NI Linux Real-Time Fanie Coetzer Field Sales Engineer SA North Agenda 1. Hardware Overview 2. Introduction to NI Linux Real-Time OS Background & Core Technology Filesystem Connectivity and Security 3.

More information

SSH Product Overview

SSH Product Overview SSH Product Overview SSH Product Overview Understanding SSH SSH Discovery and Remediation Agentless SSH Agent Based SSH 2018 Venafi. All Rights Reserved. 2 Where is SSH used? File Transfer & Remote Script

More information

vcenter CapacityIQ Installation Guide

vcenter CapacityIQ Installation Guide vcenter CapacityIQ 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

The kernel is not to be confused with the Basic Input/Output System (BIOS).

The kernel is not to be confused with the Basic Input/Output System (BIOS). Linux Kernel The kernel is the essential center of a computer operating system, the core that provides basic services for all other parts of the operating system. A kernel can be contrasted with a shell,

More information

Installation of the OS

Installation of the OS Lab 1 Installation of the OS 1.1 Objectives The goal of this first session is to install a Debian/Linux operating system from scratch on a Intel x86- based computer. The installation will be made on a

More information

Installation of Fedora 12 with CD

Installation of Fedora 12 with CD Prepared by investech.wordpress.com Installation of Fedora 12 with Net Install CD Version 1.0 investech.wordpress.com 07-12-09 This document is produced under Creative Common License (Attribution No Derivatives).

More information

SUN SOLARIS. Course Catalog

SUN SOLARIS. Course Catalog SUN SOLARIS Course Catalog 2012-2013 System & Network Administration using Sun Solaris 10 System & Network Administration using Sun Solaris will cover all aspects of SA1, SA2 certi ication and the basics

More information

Inexpensive Firewalls

Inexpensive Firewalls Inexpensive Firewalls Simon Cooper Lisa 1999 11 November 1999 http://reality.sgi.com/sc/papers/lisa-1999.pdf - or - http://www.sfik.com/papers/lisa-1999.pdf 1 of 37 A Firewall? 2 of 37 What

More information

Linux Systems Security. Logging and Network Monitoring NETS1028 Fall 2016

Linux Systems Security. Logging and Network Monitoring NETS1028 Fall 2016 Linux Systems Security Logging and Network Monitoring NETS1028 Fall 2016 Monitoring Monitoring can take many forms, from passive periodic inspection to realtime intrusion detection For this unit, we will

More information

FastTrack to Red Hat Linux System Administrator Course Overview

FastTrack to Red Hat Linux System Administrator Course Overview Course Overview This highly practical instructor led training course is designed to give experienced LINUX/UNIX administrators practical experience in the administration of a LINUX system to a level required

More information

Guideline for the installation of C-MOR Video Surveillance Virtual Machine on VMware ESX Server

Guideline for the installation of C-MOR Video Surveillance Virtual Machine on VMware ESX Server This guideline illustrates the installation of the C-MOR Video Surveillance Virtual Machine on VMware ESX Server. This manual applies to C-MOR version 4 with 64 bit operating system. First download the

More information

"Charting the Course... Enterprise Linux System Administration Course Summary

Charting the Course... Enterprise Linux System Administration Course Summary Course Summary Description This is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal to every workstation and server.

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM

More information

Deploying Cisco UCS Central

Deploying Cisco UCS Central This chapter includes the following sections: Obtaining the Cisco UCS Central Software from Cisco, page 1 Using the Cisco UCS Central OVA File, page 2 Using the Cisco UCS Central ISO File, page 4 Logging

More information

Boot Process in details for (X86) Computers

Boot Process in details for (X86) Computers Boot Process in details for (X86) Computers Hello,,, Let's discuss what happens between the time that you power up your PC and when the desktop appears. In fact we should know that the boot process differs

More information

Fedora 12 Essentials

Fedora 12 Essentials Fedora 12 Essentials 2 Fedora 12 Essentials First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights

More information

Software Vulnerability Assessment & Secure Storage

Software Vulnerability Assessment & Secure Storage Software Vulnerability Assessment & Secure Storage 1 Software Vulnerability Assessment Vulnerability assessment is the process of identifying flaws that reside in an OS, application software or devices

More information

Design Patterns for modular services, drivers and user land

Design Patterns for modular services, drivers and user land Design Patterns for modular services, drivers and user land Bernd Onasch diecobol.de GmbH 2016-02-01 MINIXCON 2016 Amsterdam Abstract While porting MINIX to specific hardware the requirement of highly

More information

Lenovo NE1032 and NE1032T Switch

Lenovo NE1032 and NE1032T Switch Lenovo NE1032 and NE1032T Switch Quickstart Guide Document Version 1.0: 10/2018 Scale Computing 2018 1 Table of Contents Introduction 3 Requirements 3 Connect to the Switch 4 Over the Network 4 Console

More information

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B::

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B:: Module Title Duration : 55187B: Linux System Administration : 4 days Overview This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional

More information

Please choose the best answer. More than one answer might be true, but choose the one that is best.

Please choose the best answer. More than one answer might be true, but choose the one that is best. Introduction to Linux and Unix - endterm Please choose the best answer. More than one answer might be true, but choose the one that is best. SYSTEM STARTUP 1. A hard disk master boot record is located:

More information

Securing Linux Systems Before Deployment

Securing Linux Systems Before Deployment Securing Linux Systems Before Deployment Richard Williams Senior Support Services Specialist Symark Why secure Linux systems? Your Linux enterprise installation is growing Assets on Linux systems are becoming

More information

Services, logging, accounting Todd Kelley CST8177 Todd Kelley 1

Services, logging, accounting Todd Kelley CST8177 Todd Kelley 1 Services, logging, accounting Todd Kelley kelleyt@algonquincollege.com CST8177 Todd Kelley 1 services syslog logger command line utility psacct lastcomm ac, last, lastlog 2 chkconfig vs service (review)

More information

Hardened Virtual Appliance Operations Guide

Hardened Virtual Appliance Operations Guide Hardened Virtual Appliance Operations Guide Securing the Appliance Base Platform to Meet High Governance Requirements VMWARE WHITEPAPER Table of Contents Introduction... 3 Purpose... 4 Root password...

More information

Hardening servers for the modern internet

Hardening servers for the modern internet Hardening servers for the modern internet Philip Paeps The FreeBSD Foundation SANOG32 7 August 2018 Dhaka, Bangladesh Session 1 (09:00 11:00) 1. Presentation: Introduction to the FreeBSD project (30 minutes)

More information

Sentry Power Manager (SPM) Software Security

Sentry Power Manager (SPM) Software Security Sentry Power Manager (SPM) Software Security Purpose This technical note is a detailed review of the security areas of the SPM enterprise software product, version 6.0 and greater, and provides a brief

More information

Bitnami MariaDB for Huawei Enterprise Cloud

Bitnami MariaDB for Huawei Enterprise Cloud Bitnami MariaDB for Huawei Enterprise Cloud First steps with the Bitnami MariaDB Stack Welcome to your new Bitnami application running on Huawei Enterprise Cloud! Here are a few questions (and answers!)

More information

Booting Up and Shutting Down

Booting Up and Shutting Down Booting Up and Shutting Down Booting Up Starting up a computer Load kernel into memory and execute it. (1) BIOS load and run the MBR (Master Boot Record) (2) MBR searches for the bootable slice (partition)

More information

Computers: Tools for an Information Age. System Software

Computers: Tools for an Information Age. System Software Computers: Tools for an Information Age System Software Objectives System Software Operating system (OS) Popular Operating Systems System Utilities 2 System Software 3 System Software System software includes

More information

Remote power and console management in large datacenters

Remote power and console management in large datacenters Remote power and console management in large datacenters A Horváth IT department, CERN, CH-1211 Genève 23, Switzerland E-mail: Andras.Horvath@cern.ch Abstract. Today s datacenters are often built of a

More information

Herding Clones. Mike Kershaw August 17, urmk/

Herding Clones. Mike Kershaw August 17, urmk/ Herding Clones Mike Kershaw Michael.Kershaw@marist.edu August 17, 2004 1 Why? Computer Science department wanted to offer students their own servers for classwork which would be available for the entire

More information

Welcome to Rootkit Country

Welcome to Rootkit Country Welcome to Rootkit Country CanSecWest 03/2011 Graeme Neilson Security Consultant & Researcher Aura Software Security graeme@aurasoftwaresecurity.co.nz Rootkit == cancerous software A rootkit is software

More information

Unicorn: Two- Factor Attestation for Data Security

Unicorn: Two- Factor Attestation for Data Security ACM CCS - Oct. 18, 2011 Unicorn: Two- Factor Attestation for Data Security M. Mannan Concordia University, Canada B. Kim, A. Ganjali & D. Lie University of Toronto, Canada 1 Unicorn target systems q High

More information

Discovering Computers 2016

Discovering Computers 2016 Discovering Computers 2016 Tools, Apps, Devices, and the Impact of Technology Chapter 9 Operating Systems Objectives Overview Explain the purpose of an operating system Describe the start-up process and

More information

ENTERPRISE LINUX SYSTEM ADMINISTRATION

ENTERPRISE LINUX SYSTEM ADMINISTRATION ENTERPRISE LINUX SYSTEM ADMINISTRATION COURSE DESCRIPTION: The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal

More information

Advanced Unix System Administration

Advanced Unix System Administration Advanced Unix System Administration Lecture 5 February 14, 2007 Steven Luo Shared Libraries The dynamic linker Binaries have a symbol table containing functions, etc. and

More information

Exam LFCS/Course 55187B Linux System Administration

Exam LFCS/Course 55187B Linux System Administration Exam LFCS/Course 55187B Linux System Administration About this course This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional

More information

IPBRICK Installation Manual

IPBRICK Installation Manual IPBRICK Installation Manual February 2006 2 Copyright c iportalmais All rights reserved. February 2006. The information in this document could be change without further notice. The declarations, technical

More information

1Z Oracle Certified Professional Oracle Solaris 10 System Administrator Exam Summary Syllabus Questions

1Z Oracle Certified Professional Oracle Solaris 10 System Administrator Exam Summary Syllabus Questions 1Z0-879 Oracle Certified Professional Oracle Solaris 10 System Administrator Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-879 Exam on Oracle Certified Professional Oracle Solaris

More information

Configuring the Cisco NAM 2220 Appliance

Configuring the Cisco NAM 2220 Appliance CHAPTER 5 This section describes how to configure the Cisco NAM 2220 appliance to establish network connectivity, configure IP parameters, and how to perform other required administrative tasks using the

More information

Exam Questions Demo LPI. Exam Questions Linux Networking Administration.

Exam Questions Demo   LPI. Exam Questions Linux Networking Administration. LPI Exam Questions 117-202 Linux Networking Administration Version:Demo 1.Given this excerpt from an Apache configuration file, which of the numbered lines has INCORRECT syntax? 1: 2:

More information

Different ways to use Kon-Boot

Different ways to use Kon-Boot Robert Alaniz 28 July 2014 Different ways to use Kon-Boot This project consists of different ways of using Kon-Boot to bypass authentication on a windows machine. Kon-Boot is a toll that can bypass the

More information

TPM v.s. Embedded Board. James Y

TPM v.s. Embedded Board. James Y TPM v.s. Embedded Board James Y What Is A Trusted Platform Module? (TPM 1.2) TPM 1.2 on the Enano-8523 that: How Safe is your INFORMATION? Protects secrets from attackers Performs cryptographic functions

More information

Introduction to Configuration. Chapter 4

Introduction to Configuration. Chapter 4 Introduction to Configuration Chapter 4 This presentation covers: > Qualities of a Good Technician > Configuration Overview > Motherboard Battery > Hardware Configuration Overview > Troubleshooting Configurations

More information

OPERATING SYSTEMS & UTILITY PROGRAMS

OPERATING SYSTEMS & UTILITY PROGRAMS OPERATING SYSTEMS & UTILITY PROGRAMS System Software System software consists of the programs that control the operations of the computer and its devices. Functions that system software performs include:

More information

Ubuntu installation alongside windows 8/8.1 and 10

Ubuntu installation alongside windows 8/8.1 and 10 Ubuntu installation alongside windows 8/8.1 and 10 Important safety precautions in windows - Before starting the installation process NOTE:1. If you are already using Windows OS in your computer, take

More information

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide The Balabit s Privileged Session Management 5 F5 Azure Reference Guide March 12, 2018 Abstract Administrator Guide for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a One Identity

More information

TimeIPS Server. IPS256T Virtual Machine. Installation Guide

TimeIPS Server. IPS256T Virtual Machine. Installation Guide TimeIPS Server IPS256T Virtual Machine Installation Guide TimeIPS License Notification The terms and conditions applicable to the license of the TimeIPS software, sale of TimeIPS hardware and the provision

More information

EMBEDDED LINUX ON ARM9 Weekend Workshop

EMBEDDED LINUX ON ARM9 Weekend Workshop Here to take you beyond EMBEDDED LINUX ON ARM9 Weekend Workshop Embedded Linux on ARM9 Weekend workshop Objectives: Get you exposed with various trends in Embedded OS Leverage Opensource tools to build

More information