Optional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07

Size: px
Start display at page:

Download "Optional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07"

Transcription

1 0Handouts:

2 Optional Lab 1-1: Understanding the /etc/securetty file In this lab, you will examine a PAM component, the /etc/securetty file. 1. Boot into Linux as root. Open a Telnet client and attempt to log on to your partner's system as root. This attempt should fail, because the /etc/securetty file disallows it. 2. Make a copy of the /etc/securetty file: host# cp /etc/securetty /etc/securetty.orig 3. Now, move the /etc/securetty file to the /root directory: host# mv /etc/securetty /root/securetty 4. Make sure that the /etc/securetty file no longer exists. 5. Have your partner log on to your system directly as root. Was he or she successful? 6. Now, move the /root/securetty file back to /etc/securetty.

3 Optional Lab 1-2: Denying Telnet access using the /etc/nologin file In this lab, you will use another PAM element, the /etc/nologin file, to deny Telnet access. 1. Use touch to create a file named /etc/nologin. 2. Enter the following text: ********************************************* Access denied. Contact your Security Manager. ********************************************* 3. Using a non-root account, try to access this system using Telnet. 4. Have your partner try to access your system. 5. With your /etc/nologin file still present, open an FTP session to your partner's server. 6. Notice that the session is successful because the nologin file applies only to Telnet-based logon sessions. 7. When you are finished experimenting, delete the /etc/nologin file.

4 Optional Lab 2-1: Pruning users and determining system state in Linux 1. Boot into Linux and log on as root. 2. Use the /usr/sbin/useradd program to add the following users: sales marketing1 marketing2 3. Use the passwd command to create passwords for each user. 4. Log in as root and change to the /etc/home directory. 5. Notice that home directories have been created for the sales and marketing users. 6. Log out as root and log in as these users. 7. Log out and log back in as root. 8. As root, use the /usr/sbin/userdel command to remove the sales user: /usr/sbin/userdel 9. The sales user has been removed. Change to the /home/ directory. You should still see the home directory for the sales user. Still in the /home/ directory, issue the following command: rm -fr sales Warning: Be extremely careful when using the -fr options with the rm command. These options cause the rm command to delete everything you specify. For example, rm will delete all files, directories and sub-directories. 10. Still as root, use the /usr/sbin/userdel -r command to remove the marketing1 and marketing2 users: /usr/sbin/userdel -r marketing1 /usr/sbin/userdel -r marketing2 11. List the /home/ directory. You will see that these user directories are no longer present.

5 12. Still as root, add a group: /usr/sbin/groupadd ciw 13. Delete this group: /usr/sbin/groupdel ciw 14. Now, read your hard drive s configuration: cat /etc/fstab 15. Consider saving this information so that you know the system s original state. 16. To discover the open processes on your system, issue the following command: ps aux > processes.txt 17. Use the less command to view this file: less processes.txt 18. Scroll up and down this file using the up and down arrow keys on your keyboard. When you are finished viewing these processes, press q. 19. Now, have a partner log in to your system and run the top command. 20. While your partner is logged in, issue the following command: ps aux > processes2.txt 21. You now have two files that are essentially snapshots of your system s state. The /usr/bin/diff command compares the contents of two files to determine the differences between the two. Issue the following command: /usr/bin/diff processes processes2 22. What do these files tell you about how your system state has changed? 23. System modules allow your Linux system to use NICs, sound cards, and other devices. You do not want anyone to install additional modules without your permission. The fact that additional modules have been installed could point to illicit activity. You should create a baseline that allows you to determine what modules are installed. Now, use the /sbin/lsmod command to view the modules currently installed on your system. Now, issue the following command to store this information: /sbin/lsmod > modules.info

6 24. Now you can run lsmod in the future and compare the output to this file. 25. Now, use the lsof command to list all open files on the system: /usr/sbin/lsof less 26. Because Linux treats everything as if it were a file, the lsof command lists open processes, files and even network connections. Scroll down the file by pressing the down arrow key. If you want to scan this list quickly, press the space bar to have the less command scroll down the information a screen at a time. 27. When you are finished, press q. 28. The lsof command is quite versatile. For example, you can list files opened by a specific user. Create an account named lsoftest, give it a password, and have your partner log in to your system using this account. After your partner has logged in, issue the following command: lsof ulsoftest less 29. You should see a list of all files (including modules, login files, and terminals) that this user has opened, simply because this user has logged in. 30. You can also see the activity associated with an IP address. For example, suppose your system s IP address is To view all activity emanating from , you would issue the following command: lsof -i@ Now, use this command to trace the changes your partner s connection makes to your system s state. Note: You can also check for Ipv6 addresses: lsof -i@[0:1:2:3:4:5:6:7] 31. You can also use lsof to see remote connections to a port on your host. Have your partner connect to your system using Telnet. Start the Telnet daemon, if necessary. When your partner has connected, issue the following command: lsof -i TCP@partner sipaddress The above lists all TCP-based connections from your partner's system to your own system.

7 32. To terminate any connection to an IP address, you can use lsof in conjunction with the kill command to instantly log off any user. Make sure your partner is logged on, then try the following command: kill -9 `/usr/sbin/lsof Note: You must use the backtic character (`) and not the apostrophe character. The backtic character is above the TAB key. This command will terminate all logged-in users from the remote system with the IP address of You can learn more about how to create additional lsof commands by consulting its man page. 33. Now, use the find command to search and list the writeable files on your system: find /! -type l \( -perm \) -exec ls -l {} \; Note: This command has find search the root directory (/) for all files that are world-readable and -writeable (i.e., any file that has both the read and write bit set for all users). It then lists those files (-exec ls). The final expressions are essential to the exec option. Issue the man find command for additional information. 34. To list only files in the /root/ directory, you can modify the command as follows: find /root/! -type l \( -perm \) -exec ls -l {} \; 35. To save this information to a file, you would issue the following command: find /root/! -type l \( -perm \) -fls save.txt In this lab, you learned how to prune users and groups, as well as how to document the state of your Linux system.

8 Optional Lab 2-2: Renaming default Windows 2000 accounts 1. Log on to Windows Open the Local Security Policy snap-in. 3. In the Security Settings Local Policies Security Options section, select the Rename administrator account value. 4. Enter root into the Local policy setting dialog box, then click OK. 5. Log off and try to log back on as administrator. You will not be able to do so. Log on as root, then open the Computer Management snap-in to verify that the administrator account has been completely renamed. 6. When you are finished, change the Rename administrator account value to administrator, so that the system is back to its default. This step is necessary to prevent confusion in future labs. 7. Using the Security Policy snap-in, rename the guest account.

9 Optional Lab 2-3: Creating a second root account in Linux In this lab, you will create a second account that has root privileges. You cannot completely remove the root account without affecting the daemons that run on the system. However, you can create a second root account for login purposes. 1. Boot into Linux and log in as root. 2. Make a copy of the /etc/passwd file and name it /etc/passwd.orig. This step is necessary in case something goes wrong, and also because you will need to return your system to its default to avoid problems in future labs: host# cp /etc/passwd /etc/passwd.orig 3. Use the /usr/sbin/useradd and /usr/bin/passwd commands to create a new user named administrator: /usr/sbin/useradd administrator /usr/bin/passwd administrator 4. Now, edit the /etc/passwd file so that the root entry reads as follows: root:x:0:0:root:/root:/bin/false 5. Edit the administrator entry so that it reads as follows: administrator:x:0:0::/home/administrator:/bin/bash 6. Close the /etc/passwd file, making sure to save your changes. 7. Log out and try to log back in as root. You will not be able to do so. However, all system daemons can still use the root account. You have simply disabled all terminal access to the root account. 8. Log in as administrator. Stop a few services and add a few users. You will be able to do so, because your administrator account is now defined as the "root" account. Remember, daemons do not look for the text string of "root." They look for the UID of the user who is administering the service. Note: For the sake of convenience, you may want to modify the environment of this new account so that it behaves like that of the root account. For example, compare the.bashrc and.bash_profile files for each account to see the changes you will have to make. Note also that if you want to use the su command, you will have to specify the new root account. For example, type su administrator, instead of just su.

10 9. To avoid confusion in future labs, replace the existing /etc/passwd file with the original: host# cp /etc/passwd.orig /etc/passwd Note: Failure to perform this last step may cause problems in future labs.

11 Optional Lab 3-1: Copying and moving files In this lab, you will move and copy files between two Windows 2000 partitions. After the files are copied or moved, you will determine how these changes affect the files' security settings. Note: To perform this lab, you must have two partitions on your hard drive. 1. Log on as administrator. Note: If you have renamed the administrator account earlier and not changed this value back to the default, then log on using the proper account name. 2. Using Windows Explorer, create a folder called Source in the C:\ folder. 3. Create a folder called Dest1 in the C:\ folder. 4. Create a folder called Dest2 in the D:\ folder. 5. Assign Full Control access of C:\Source to Group1. 6. Remove the Everyone group access from C:\Source. 7. Assign Full Control access of C:\Dest1 to Group2. 8. Remove the Everyone group access from C:\Dest1. 9. Assign Read access of D:\Dest2 to Group Remove the Everyone group access from D:\Dest Create a file called Test1.Txt in C:\Source. 12. Create a file called Test2.Txt in C:\Source. 13. Create a file called Test3.Txt in C:\Source. 14. Create a file called Test4.Txt in C:\Source. 15. Examine the permissions for all of the test files in C:\Source. 16. Open a Command Prompt. 17. Using your command prompt, access the C:\Source directory. 18. Copy Test1.Txt to C:\Dest1.

12 19. Move Test2.Txt to C:\Dest Copy Test3.Txt to D:\Dest Move Test4.Txt to D:\Dest2 using the following command: move test4.txt d:\dest2 22. Using Windows Explorer, note the permissions on each test file in C:\Dest1 and D:\Dest2.

13 Optional Lab 3-2: Finding setuid and setgid programs in your Linux system 1. Try the following command and search for setuid/setgid commands available on your system: host# find / \( -perm \) -exec ls -l {} \; Note: In the preceding command, the find command is told to search the root directory (i.e., the entire hard drive), which is known in UNIX systems as /. The first \ and / characters escape the -perm from the shell. The + sign has the find function search for files that have setuid permissions or higher. If these characters were not present, the find command would fail. The -exe command has find then use the ls -l command. The {} \; characters tell find to use the ls -l command to provide a long listing of the files that it finds. 2. If you want to discover both setuid/setgid and files that have at least read permission bits set in the Other field, you would enter the following command: host# find / \( -perm o -perm \) -exec ls -l {} \; Note: The preceding command is similar to that in Step 1, except that it uses the -o command, which searches for permissions of 4000 or greater (setuid/setgid) or 2000 or greater. As a result, you will see files that have bits set in the Other field, as well as any setuid or setgid bits. 3. Graphical Linux tools exist to help you issue some simplified find commands. One is called kfind, and is part of the KDE desktop. If you have the KDE desktop installed, open a terminal in the X Window environment and issue the following command: kfind &

14 4. When the kfind GUI appears, have kfind search all files on the system. Make sure the Name&Location is selected, enter an asterisk in the Named field, and a forward slash in the Look in field, as shown in Figure OL3-1. Figure OL3-1: Selecting all system files in kfind 5. Select the Advanced tab and select the SUID executable files option. 6. Click the start button ( ). 7. After the search is complete, you will see a list of SUID executable files, as shown in Figure OL3-2. Figure OL3-2: Listing suid executable files in kfind

15 Optional Lab 4-1: Installing setup files for the Linux Security Analyzer agent on Windows 2000 In this lab, you will install the Linux Red Hat 7.0 agent setup files on Windows Although the agents appear to be written for Linux 6.0, they will work for any version of Red Hat between 6.0 and 7.0. After you install the agent setup files on Windows 2000, you will install them on your partner's Linux system in the next lab. Note: One partner in each group should complete this lab. The system must have the FTP service running. If you were using Windows NT 4.0, you would also need the Windows NT 4.0 Option Pack, because an FTP server is the most convenient way to transfer files between your NT and Linux systems. 1. Desktop: Open Windows Explorer. Access the WebTrends Security Analyzer Agent for Red Hat Linux installation file (AgentLinux60.exe) from your instructor or download it from To install the Linux agent, double-click the AgentLinux60.exe file. 2. Select OK at the Linux Agent Setup Install window to begin the process. The Linux agent setup files will install on Windows Note: In the next part of this lab, you will copy the Linux agent setup files to your FTP server. 3. Open Windows Explorer, if necessary. 4. Copy the file wsa_agent-3.5.linux60.i586.rpm from the default installation directory: C:\Program Files\WebTrends Security Analyzer\wsa_agents\Linux60\ to the following directory: C:\Inetpub\ftproot\ 5. Close Windows Explorer.

16 Optional Lab 4-2: Installing and configuring a Security Analyzer Linux Agent In this lab, you will install and configure a Security Analyzer Linux Agent on your partner's system. Note: One partner in each group should complete this lab in Linux. The Linux system will access the agent setup files from the Windows 2000 system's FTP service. 1. Linux: Log on as root. 2. Linux: At the prompt, enter the following commands: Host# ftp [partner's IP address] Name: anonymous Password: ftp ftp> bi ftp> get wsa_agent-3.5.linux60.i586.rpm ftp> bye 3. Linux: Enter the following command in the same directory as the WebTrends agent you just downloaded. Verify that the file exists in the current directory by entering: Host# ls You will see the following file among several others: wsa_agent-3.5.linux60.i586.rpm 4. Linux: Enter the command: Host# rpm -ivh wsa_agent-3.5.linux60.i586.rpm

17 You will receive a message to run the configure.sh command in the /usr/local/wsa directory. However, you must first create an agent.dat file. To accomplish these procedures, run the commands: Host# cd /usr/local/wsa Host# touch agent.dat Host#./configure.sh 5. Enter Y to start the server at system startup. Enter Y to start the agent now.

18 Optional Lab 4-3: Scanning a Linux system from Windows Console In this lab, you will scan the Linux agent from the Security Analyzer Console. 1. Add a new profile by selecting File New profile. Note: If you are using the demo version, you should delete the "Intermediate Security Analysis" profile because the demo version allows only six profiles. 2. In the Profile Description field, enter Partner Computer. In the Security Test Policy section, select Critical Security Analysis, as shown in Figure OL4-1. Figure OL4-1: Adding new profile 3. Select Next. In the Hosts To Scan section, click the Add button. Enter your partner's IP address (the system with the Linux agent installed) in the Starting address field. Click OK. You will scan only one host in this lab. 4. Click Finish. The Partner Computer profile you have created will appear in the Security Analyzer window. 5. Select the Partner Computer profile and click Scan. Choose the New Scan radio button and select OK. The scan will take several minutes. A new window titled WSA Partner Computer will display the results. 6. Select the Vulnerabilities tab, which will display the security risks on your partner's Linux system. Scroll through the high-risk vulnerabilities on your

19 partner's system. If none exist, open the medium- and low-risk vulnerabilities. In some cases, you may receive only one risk: the low-risk vulnerability SMTP service enabled. 7. Select the Fixes Needed tab. A list of recommendations to secure your system from high-risk vulnerabilities appears. You may receive only one fix: Remove Unnecessary Services: SMTP. In the next lesson, you will implement this fix and other recommendations to secure Linux systems. 8. Close the WSA Partner Computer window. 9. Create a report and analyze the results. 10. When you are finished, exit the WebTrends Security Analyzer.

20 Optional Lab 5-1: Using Bastille In this lab, you will use the latest version of Bastille appropriate to your version of Linux. This lab assumes the use of the X-Window version of Bastille. If you prefer, you can install the text-only version. 1. Log on as root and enter X-Windows by entering startx at the command prompt. If your system defaults to an X-Window interface, log on directly as root. 2. Obtain the Bastille RPM or tarball as well as all supporting files. If your instructor does not have the files, go to the following sites: Using Bastille, make the following changes to your system: Using the FilePermissions module, disable the r-tools, and configure your system so that ping and traceroute are available only to root. Using the BootSecurity module, take the necessary steps to enhance your server's physical security. Use the SecureInetd module to create a consistent policy for your Xinetd daemons. When you are finished, click the EndScreen menu, click the Yes radio button, and begin writing these changes to your system Using the Logging module, configure additional logging modules. 4. After you have made these settings, test them by logging on as a non-root user. See if you can use ping and traceroute. 5. Reboot the system and experiment with the Linux single-user mode. In this lab, you have experimented with the Bastille application. You now have used a tool that can help you apply standard policies to all of your Linux systems.

21 Optional Lab 5-2: Exercising granular authentication control in Linux In this lab, you and a partner will edit the /etc/pam.d/login file to invoke the /lib/security/pam_access.so module. You will then edit the /etc/security/access.conf file to limit access to the system based on user and location. 1. Make a copy of the /etc/pam.d/login file and name it /etc/pam.d/login.orig. 2. Make a copy of the /etc/security/access.conf file and name it /etc/security/access.conf.orig. Note: Failure to make these copies can result in difficulties later. 3. Using a text editor, open the /etc/pam.d/login file. 4. Enter the following line, if it is not already present: account required /lib/security/pam_access.so 5. Now that you have enabled the loading of the /lib/security/pam_access.so module, you can edit the /etc/security/access.conf file. (Open this file with a text editor.) 6. Enter the following line at the bottom of the file: -:ALL:ALL EXCEPT LOCAL 7. Have your partner try to access your system using Telnet. 8. This connection should fail because you have denied logon access to all users from all remote locations. Note: If you were to enter -:ALL:ALL and log off, all accounts, including root, would be denied access to the entire system. The only remedy for this lockout is to boot into single-user mode, or use an X-Windows login, then edit the file so that at least root can access the console. 9. Place a comment in front of the -:ALL:ALL EXCEPT LOCAL entry (use the # character). 10. Create two new user accounts named access1 and access2. Make sure you give each account the password password.

22 11. Now, enter a new line in /etc/security/access.conf that reads as follows: -:ALL EXCEPT access1 root:all 12. Have your partner log on as access1. Your partner should be successful. 13. Now, have your partner log on as access2. Note that your partner can log on as access1, but not as access2, or as any other user name except root. 14. Alter the entry in /etc/security/access.conf as follows: -:ALL EXCEPT access1 access2 root:all 15. Test this entry by having your partner log on as access1 and access2. Both accounts should now be able to log on. 16. If time permits: Edit the entry so that only access1 and access2 can remotely log on from your domain: -:ALL EXCEPT access1 access2:your_dns_domain_name 17. When you are finished experimenting, either edit the existing file to comment out all lines, or copy access.conf.orig so that it becomes access.conf.

LAB #7 Linux Tutorial

LAB #7 Linux Tutorial Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing

More information

NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1

NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users

More information

CS Fundamentals of Programming II Fall Very Basic UNIX

CS Fundamentals of Programming II Fall Very Basic UNIX CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)

More information

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot

More information

14. Configuring Telnet in Knoppix

14. Configuring Telnet in Knoppix 14. Configuring Telnet in Knoppix Estimated Time: 45 Minutes Objective In this lab, the student will learn how to configure the Telnet service on a system so that the user can remotely administer a Knoppix

More information

SANOG VI IP Services Workshop: FreeBSD Install

SANOG VI IP Services Workshop: FreeBSD Install SANOG VI IP Services Workshop: FreeBSD Install FreeBSD is designed to be a server operating system. This becomes apparent during the installation process. The FreeBSD installer is a console-based (not

More information

UNIT 9 Introduction to Linux and Ubuntu

UNIT 9 Introduction to Linux and Ubuntu AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT 9 Introduction to Linux and Ubuntu Learning Objectives Participants will understand the basics of Linux, including the nature,

More information

Linux Survival Guide

Linux Survival Guide Linux Survival Guide Introduction: This guide is intended for use with classes at DACC that use a Linux operating system as the platform for students. It provides a quick summary and examples of how to

More information

NETW 110 Lab 3 Post-Installation Configuration Page 1

NETW 110 Lab 3 Post-Installation Configuration Page 1 NETW 110 Lab 3 Post-Installation Configuration Page 1 Objective At the conclusion of this lab, the student will learn some very basic functions of vi, use vi to perform some post-installation configuration

More information

Find out where you currently are in the path Change directories to be at the root of your home directory (/home/username) cd ~

Find out where you currently are in the path Change directories to be at the root of your home directory (/home/username) cd ~ CIS 105 Working with directories You have using directories in a Windows environment extensively. Often in Windows we are calling them folders. They are important in order to organize our files. It is

More information

Operating System Security. 0Handouts: Quizzes ProsoftTraining All Rights Reserved. Version 3.07

Operating System Security. 0Handouts: Quizzes ProsoftTraining All Rights Reserved. Version 3.07 0Handouts: Lesson 1 Quiz 1. What is the working definition of authentication? a. The ability for a person or system to prove identity. b. Protection of data on a system or host from unauthorized access.

More information

Lab 1: Accessing the Linux Operating System Spring 2009

Lab 1: Accessing the Linux Operating System Spring 2009 CIS 90 Linux Lab Exercise Lab 1: Accessing the Linux Operating System Spring 2009 Lab 1: Accessing the Linux Operating System This lab takes a look at UNIX through an online experience on an Ubuntu Linux

More information

CS/CIS 249 SP18 - Intro to Information Security

CS/CIS 249 SP18 - Intro to Information Security Lab assignment CS/CIS 249 SP18 - Intro to Information Security Lab #2 - UNIX/Linux Access Controls, version 1.2 A typed document is required for this assignment. You must type the questions and your responses

More information

Operating Systems. Copyleft 2005, Binnur Kurt

Operating Systems. Copyleft 2005, Binnur Kurt 3 Operating Systems Copyleft 2005, Binnur Kurt Content The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail.

More information

Operating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing

Operating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing Content 3 Operating Systems The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail. How to log into (and out

More information

8 Administering Groups

8 Administering Groups 8 Administering Groups Exam Objectives in this Chapter: Plan a security group hierarchy based on delegation requirements. Plan a security group strategy. Why This Chapter Matters As an administrator, you

More information

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG224 Information Technology Part I: Computers and the Internet Laboratory 2 Linux Shell Commands and vi Editor

More information

Lab 4: Protocols and Default Network Ports - Connecting to a Remote System

Lab 4: Protocols and Default Network Ports - Connecting to a Remote System CompTIA Security+ Lab Series Lab 4: Protocols and Default Network Ports - Connecting to a Remote System CompTIA Security+ Domain 1 - Network Security Objective 1.4: Implement and use common protocols Objective

More information

Part I. Introduction to Linux

Part I. Introduction to Linux Part I Introduction to Linux 7 Chapter 1 Linux operating system Goal-of-the-Day Familiarisation with basic Linux commands and creation of data plots. 1.1 What is Linux? All astronomical data processing

More information

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical

More information

CIS 192 Linux Lab Exercise

CIS 192 Linux Lab Exercise CIS 192 Linux Lab Exercise Lab 8: Samba Spring 2009 Lab 8: Samba The purpose of this lab is to share files among Windows and Linux hosts on a common network. The goal is to browse directories on the Linux

More information

Network Monitoring & Management. A few Linux basics

Network Monitoring & Management. A few Linux basics Network Monitoring & Management A few Linux basics Our chosen platform Ubuntu Linux 14.04.3 LTS 64-bit LTS = Long Term Support no GUI, we administer using ssh Ubuntu is Debian underneath There are other

More information

Sysinstall main menu. Move the cursor down by using the DOWN-ARROW and select Standard.

Sysinstall main menu. Move the cursor down by using the DOWN-ARROW and select Standard. Initial Boot from Install Disc 1 Turn on the power for your machine. Sysinstall main menu Immediately place the first CD-ROM of the FreeBSD 5.3 install set in your machine's CD-ROM drive. You'll see an

More information

1. Open VirtualBox and start your linux VM. Boot the machine and log in with the user account you created in Lab #1. Open the Terminal application.

1. Open VirtualBox and start your linux VM. Boot the machine and log in with the user account you created in Lab #1. Open the Terminal application. CIT 210L Name: Lab #2 1. Open VirtualBox and start your linux VM. Boot the machine and log in with the user account you created in Lab #1. Open the Terminal application. 2. Listing installed packages -

More information

Operating Systems Linux 1-2 Measurements Background material

Operating Systems Linux 1-2 Measurements Background material Operating Systems Linux 1-2 Measurements Background material Introduction The Linux measurements were designed to allow you to have an impression about the administration of Linux severs along with providing

More information

commands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes

commands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes * Commands preceded with "$" imply that you should execute the command as a general user not as root. * Commands preceded with

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

Capability and System Hardening

Capability and System Hardening P a g e 1 Date Assigned: mm/dd/yyyy Date Due: mm/dd/yyyy by hh:mm Educational Objectives Capability and System Hardening This lab is designed to help you gain a better understanding of system hardening

More information

Chapter. Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER

Chapter. Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Chapter 10 Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Monitor, manage, and troubleshoot access to files and folders. Configure, manage, and troubleshoot file compression

More information

Getting Started With UNIX Lab Exercises

Getting Started With UNIX Lab Exercises Getting Started With UNIX Lab Exercises This is the lab exercise handout for the Getting Started with UNIX tutorial. The exercises provide hands-on experience with the topics discussed in the tutorial.

More information

Lab 3a Using the vi editor

Lab 3a Using the vi editor Lab 3a Using the vi editor Objectives: Become familiar with the vi Editor Review the three vi Modes Review keystrokes to move between vi modes Create a new file with vi Editor Invoke vi with show mode

More information

ETHICAL HACKING LAB SERIES. Lab 3: Using the SYSTEM Account

ETHICAL HACKING LAB SERIES. Lab 3: Using the SYSTEM Account ETHICAL HACKING LAB SERIES Lab 3: Using the SYSTEM Account Certified Ethical Hacking Domain: System Hacking Document Version: 2015-08-14 otherwise noted, is licensed under the Creative Commons Attribution

More information

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system...

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is the difference between home directory and working directory? Answer

More information

Parallel Programming Pre-Assignment. Setting up the Software Environment

Parallel Programming Pre-Assignment. Setting up the Software Environment Parallel Programming Pre-Assignment Setting up the Software Environment Authors: B. Wilkinson and C. Ferner. Modification date: Aug 21, 2014 (Minor correction Aug 27, 2014.) Software The purpose of this

More information

Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12)

Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Objective: Learn some basic aspects of the UNIX operating system and how to use it. What is UNIX? UNIX is the operating system used by most computers

More information

UNIT 10 Ubuntu Security

UNIT 10 Ubuntu Security AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT 10 Ubuntu Security Learning Objectives Participants will understand how to configure major components of Linux/Ubuntu Account

More information

Session 1: Accessing MUGrid and Command Line Basics

Session 1: Accessing MUGrid and Command Line Basics Session 1: Accessing MUGrid and Command Line Basics Craig A. Struble, Ph.D. July 14, 2010 1 Introduction The Marquette University Grid (MUGrid) is a collection of dedicated and opportunistic resources

More information

User Guide Version 2.0

User Guide Version 2.0 User Guide Version 2.0 Page 2 of 8 Summary Contents 1 INTRODUCTION... 3 2 SECURESHELL (SSH)... 4 2.1 ENABLING SSH... 4 2.2 DISABLING SSH... 4 2.2.1 Change Password... 4 2.2.2 Secure Shell Connection Information...

More information

Introduction to Linux

Introduction to Linux Introduction to Linux The command-line interface A command-line interface (CLI) is a type of interface, that is, a way to interact with a computer. Window systems, punched cards or a bunch of dials, buttons

More information

Unix Tutorial Haverford Astronomy 2014/2015

Unix Tutorial Haverford Astronomy 2014/2015 Unix Tutorial Haverford Astronomy 2014/2015 Overview of Haverford astronomy computing resources This tutorial is intended for use on computers running the Linux operating system, including those in the

More information

Please note that CNE 216 is a brand new course that has never been taught on the George campus; it will be taught for the first time in the fall of

Please note that CNE 216 is a brand new course that has never been taught on the George campus; it will be taught for the first time in the fall of Please note that CNE 216 is a brand new course that has never been taught on the George campus; it will be taught for the first time in the fall of 2015. The materials for this course are still being developed.

More information

Lab 2A> ADDING USERS in Linux

Lab 2A> ADDING USERS in Linux Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.

More information

Intermediate Programming, Spring Misha Kazhdan

Intermediate Programming, Spring Misha Kazhdan 600.120 Intermediate Programming, Spring 2017 Misha Kazhdan Outline Unix/Linux command line Basics of the Emacs editor Compiling and running a simple C program Cloning a repository Connecting to ugrad

More information

TJU Syllabus for Linux Fundamentals and Applications

TJU Syllabus for Linux Fundamentals and Applications TJU Syllabus for Linux Fundamentals and Applications Code: 2160281 Title: Linux Fundamentals and Applications Semester Hours: 40 Credits: 2 Semester Structure Offered by: for: Prerequisite: Hour Lecture:24

More information

Some Ubuntu Practice...

Some Ubuntu Practice... Some Ubuntu Practice... SANOG 10 August 29 New Delhi, India 1. Get used to using sudo 2. Create an inst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control services

More information

Command-Line Interface (CLI) Basics

Command-Line Interface (CLI) Basics 4 CHAPTER This chapter is intended as a quick reference, not as a step-by-step explanation of the Cisco IOS. The chapter describes basic Cisco IOS software command-line interfaces that you may need to

More information

CCNA Discovery Server Live CD v2.0

CCNA Discovery Server Live CD v2.0 CCNA Discovery Overview CCNA Discovery Server Live CD v2.0 Information and Installation Instructions The Discovery Server Live CD provides all of the network services necessary to support the CCNA Discovery

More information

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs

More information

Unix/Linux Basics. Cpt S 223, Fall 2007 Copyright: Washington State University

Unix/Linux Basics. Cpt S 223, Fall 2007 Copyright: Washington State University Unix/Linux Basics 1 Some basics to remember Everything is case sensitive Eg., you can have two different files of the same name but different case in the same folder Console-driven (same as terminal )

More information

Activity 1: Using Windows XP Professional Security Checklist

Activity 1: Using Windows XP Professional Security Checklist Activity 1: Using Windows XP Professional Security Checklist Verify that all Disk partitions are Formatted with NTFS NTFS partitions offer access controls and protections that aren't available with the

More information

Programming Project # 2. cs155 Due 5/5/05, 11:59 pm Elizabeth Stinson (Some material from Priyank Patel)

Programming Project # 2. cs155 Due 5/5/05, 11:59 pm Elizabeth Stinson (Some material from Priyank Patel) Programming Project # 2 cs155 Due 5/5/05, 11:59 pm Elizabeth Stinson (Some material from Priyank Patel) Background context Unix permissions model Prof Mitchell will cover during OS security (next week

More information

Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit

Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit Contents 1 An Introduction to C++, Unix, SSH and Komodo Edit 1.1 Introduction 1.2 The C++ Language 1.2.1 A Brief Introduction 1.2.1.1 Recommended

More information

Group Editing of Files and Web Sites

Group Editing of Files and Web Sites Introduction Some research groups like to maintain a project/research group web page. We recommend that a single individual perform this task. Any member of the group may contribute and provide edits for

More information

15. Creating a Samba Server in Knoppix v.3

15. Creating a Samba Server in Knoppix v.3 15. Creating a Samba Server in Knoppix v.3 Estimated Time: 60 minutes Objective In this lab, the student will start the samba service in Knoppix, allowing transfer of files to and from a indows XP computer

More information

This is Worksheet and Assignment 12. Disks, Partitions, and File Systems

This is Worksheet and Assignment 12. Disks, Partitions, and File Systems This is Worksheet and Assignment 12 This is a combined Worksheet and Assignment.. Quizzes and tests may refer to work done in this Worksheet and Assignment; save your answers. You will use a checking program

More information

Post Ubuntu Install Exercises

Post Ubuntu Install Exercises Post Ubuntu Install Exercises PacNOG 3 June 18 Rarotonga, Cook Islands 1. Get used to using sudo 2. Create an ainst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control

More information

Introduction to Unix May 24, 2008

Introduction to Unix May 24, 2008 Introduction to Unix May 24, 2008 Exercises: Privileges REFERENCE Reference: Shah, Steve, "Linux Administration: A Beginner's Guide", 2nd. ed., Osborne press, New York, NY. If you look at files in a directory

More information

Course 144 Supplementary Materials. UNIX Fundamentals

Course 144 Supplementary Materials. UNIX Fundamentals Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should

More information

Perl and R Scripting for Biologists

Perl and R Scripting for Biologists Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications

More information

Linux Kung Fu. Stephen James UBNetDef, Spring 2017

Linux Kung Fu. Stephen James UBNetDef, Spring 2017 Linux Kung Fu Stephen James UBNetDef, Spring 2017 Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and

More information

Downloading and installing Db2 Developer Community Edition on Red Hat Enterprise Linux Roger E. Sanders Yujing Ke Published on October 24, 2018

Downloading and installing Db2 Developer Community Edition on Red Hat Enterprise Linux Roger E. Sanders Yujing Ke Published on October 24, 2018 Downloading and installing Db2 Developer Community Edition on Red Hat Enterprise Linux Roger E. Sanders Yujing Ke Published on October 24, 2018 This guide will help you download and install IBM Db2 software,

More information

Exercise Sheet 2. (Classifications of Operating Systems)

Exercise Sheet 2. (Classifications of Operating Systems) Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user

More information

EMS Installation. Workstation Requirements CHAPTER. EMS Lite (Windows 95/98) EMS NT (Windows NT 4.0)

EMS Installation. Workstation Requirements CHAPTER. EMS Lite (Windows 95/98) EMS NT (Windows NT 4.0) CHAPTER 2 EMS Installation This chapter provides instructions for installing the Element Management System (EMS) software on a user workstation. Workstation Requirements The following sections list the

More information

Global Array Manager

Global Array Manager NEC Express Server Express5800 series NEC Express5800/100,ft Series Global Array Manager Ver. 5.00 Installation Manual [Linux Server Edition] Trademarks Microsoft, Windows and Windows NT are registered

More information

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 1.0, Last Edited 09/20/2005 Name of Students: Date of Experiment: Part I: Objective The objective of the exercises

More information

EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices

EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices Hands-On Lab Description Most corporations today have some form of patch process in place. In this session, you will learn

More information

Lab Working with Linux Command Line

Lab Working with Linux Command Line Introduction In this lab, you will use the Linux command line to manage files and folders and perform some basic administrative tasks. Recommended Equipment A computer with a Linux OS, either installed

More information

This is Lab Worksheet 3 - not an Assignment

This is Lab Worksheet 3 - not an Assignment This is Lab Worksheet 3 - not an Assignment This Lab Worksheet contains some practical examples that will prepare you to complete your Assignments. You do not have to hand in this Lab Worksheet. Make sure

More information

Commands are in black

Commands are in black Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin

More information

RFC RFC. Configuring FTP Server. FTP Clients

RFC RFC. Configuring FTP Server. FTP Clients RFC slide 1 RFC slide 2 as a network manager it is important to understand some of the subtle issues within networking within the TCP/IP suite of protocols including: TCP, UDP, IP, SNMP, ICMP, SMTP, FTP,

More information

Lab Authentication, Authorization, and Accounting

Lab Authentication, Authorization, and Accounting Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,

More information

Processes are subjects.

Processes are subjects. Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path TCP wrappers Race conditions NOTE: filenames may differ between OS/distributions

More information

Tivoli Provisioning Manager for OS Deployment Installation on W2003R2-NFS-MySQL

Tivoli Provisioning Manager for OS Deployment Installation on W2003R2-NFS-MySQL This post is about the installation of IBM Tivoli Provisioning Manager for OS Deployment (TPMfOSD). Although the potential audience is small, I am sure that those who want to switch to use a MySQL database

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Operating System Interaction via bash

Operating System Interaction via bash Operating System Interaction via bash bash, or the Bourne-Again Shell, is a popular operating system shell that is used by many platforms bash uses the command line interaction style generally accepted

More information

Introduction. What is Linux? What is the difference between a client and a server?

Introduction. What is Linux? What is the difference between a client and a server? Linux Kung Fu Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and open-source operating system distributions

More information

EKT332 COMPUTER NETWORK

EKT332 COMPUTER NETWORK EKT332 COMPUTER NETWORK LAB 1 INTRODUCTION TO GNU/LINUX OS Lab #1 : Introduction to GNU/Linux OS Objectives 1. Introduction to Linux File System (Red Hat Distribution). 2. Introduction to various packages

More information

Unix Basics. UNIX Introduction. Lecture 14

Unix Basics. UNIX Introduction. Lecture 14 Unix Basics Lecture 14 UNIX Introduction The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the hub of the operating system: it allocates

More information

Extended Search Administration

Extended Search Administration IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using

More information

Basic Linux Security. Roman Bohuk University of Virginia

Basic Linux Security. Roman Bohuk University of Virginia Basic Linux Security Roman Bohuk University of Virginia What is Linux? An open source operating system Project started by Linus Torvalds kernel Kernel: core program that controls everything else (controls

More information

Embedded Linux Systems. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island

Embedded Linux Systems. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Embedded Linux Systems Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Generic Embedded Systems Structure User Sensors ADC microcontroller

More information

Getting Started with UNIX

Getting Started with UNIX Getting Started with UNIX What is UNIX? Boston University Information Services & Technology Course Number: 4000 Course Instructor: Kenny Burns Operating System Interface between a user and the computer

More information

Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit

Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit A portion of this lab is to be done during the scheduled lab time. The take-home programming assignment is to be turned in before the next lab;

More information

Enabling Smart Card Logon for Linux Using Centrify Suite

Enabling Smart Card Logon for Linux Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Linux Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

When talking about how to launch commands and other things that is to be typed into the terminal, the following syntax is used:

When talking about how to launch commands and other things that is to be typed into the terminal, the following syntax is used: Linux Tutorial How to read the examples When talking about how to launch commands and other things that is to be typed into the terminal, the following syntax is used: $ application file.txt

More information

Introduction to Linux. Fundamentals of Computer Science

Introduction to Linux. Fundamentals of Computer Science Introduction to Linux Fundamentals of Computer Science Outline Operating Systems Linux History Linux Architecture Logging in to Linux Command Format Linux Filesystem Directory and File Commands Wildcard

More information

Installing and Upgrading Cisco Network Registrar Virtual Appliance

Installing and Upgrading Cisco Network Registrar Virtual Appliance CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar

More information

Brief Linux Presentation. July 10th, 2006 Elan Borenstein

Brief Linux Presentation. July 10th, 2006 Elan Borenstein Brief Linux Presentation July 10th, 2006 Elan Borenstein History 1965 - Bell Labs (AT&T), GE and MIT Project to develop a new (multiuser, multitasking) operating system - MULTICS. (not successful) History

More information

CounterACT Macintosh/Linux Property Scanner Plugin

CounterACT Macintosh/Linux Property Scanner Plugin CounterACT Macintosh/Linux Property Scanner Plugin Version 7.0.1 and Above Table of Contents About the Macintosh/Linux Property Scanner Plugin... 4 Requirements... 4 Supported Operating Systems... 4 Accessing

More information

Basic Linux Command Line Interface Guide

Basic Linux Command Line Interface Guide This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting

More information

Monitoring Windows Systems with WMI

Monitoring Windows Systems with WMI Monitoring Windows Systems with WMI ScienceLogic version 8.8.1 Table of Contents Introduction 4 Monitoring Windows Devices in the ScienceLogic Platform 5 What is SNMP? 5 What is WMI? 5 PowerPacks 5 Configuring

More information

Linux Kung Fu. Ross Ventresca UBNetDef, Fall 2017

Linux Kung Fu. Ross Ventresca UBNetDef, Fall 2017 Linux Kung Fu Ross Ventresca UBNetDef, Fall 2017 GOTO: https://apps.ubnetdef.org/ What is Linux? Linux generally refers to a group of Unix-like free and open source operating system distributions built

More information

RedHat. Rh202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)

RedHat. Rh202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) RedHat Rh202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) http://killexams.com/exam-detail/rh202 QUESTION: 156 Who ever creates the files/directories on /data group owner should be automatically

More information

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University Introduction to Linux Woo-Yeong Jeong (wooyeong@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating system of a computer What is an

More information

CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists

CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists Name: In this lab you will learn: PartA Cisco 2600 Router Configuration Static Routing PartB 20 min Dynamic

More information

The kernel is the low-level software that manages hardware, multitasks programs, etc.

The kernel is the low-level software that manages hardware, multitasks programs, etc. November 2011 1 Why Use Linux? Save Money Initial purchase and maintenance Resume Linux is used by MANY organizations More choices Tons of Linux operating systems November 2011 2 What is Linux? 1. Contains

More information

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 2.0, Last Edited 10/1/2006 Students Name: Date of Experiment: Part I: Objective The objective of the exercises

More information

Hitchhiker s Guide to VLSI Design with Cadence & Synopsys

Hitchhiker s Guide to VLSI Design with Cadence & Synopsys Hitchhiker s Guide to VLSI Design with Cadence & Synopsys David Money Harris 17 January 2009 The VLSI design tools at Harvey Mudd College are hosted on a Linux server named chips. This document introduces

More information

RH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)

RH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) RedHat RH-202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Download Full Version : https://killexams.com/pass4sure/exam-detail/rh-202 QUESTION: 159 Install the dialog-* Questions asking

More information