Správa používateľov Zabezpečenie prístupu
|
|
- Domenic Davidson
- 6 years ago
- Views:
Transcription
1 Správa používateľov Zabezpečenie prístupu k počítaču Proces zavádzania operačného systému Spôsob prihlasovania Vytváranie a mazanie používateľov Zmenu informácií Nastavovanie skupín používateľov Nastavovanie obmedzení Nastavovanie oprávnení Zabezpečenie prístupu Fyzická bezpečnosť o zabrániť prístupu k stroju (ale aj diskom a iným médiám). Boot-ovacie médium o nastaviť heslo do BIOS-u, zakázať bootovanie z vymeniteľných médií, o v prípade boot-ovania z flash alebo CDROM je možné získať prístup k súborovému systému (pokiaľ nie je šifrovaný) zrušiť/zmeniť heslá k boot-loaderu (/boot/grub/grub.conf: password), zmeniť heslo root-a. Boot-loader o boot-loader umožňuje odovzdávať parametre jadru, napríklad aj runlevel, o umožňuje teda získať administrátorský prístup cez Single-User mode, o nastaviť heslo boot-loadera. Heslo administrátora o má v systéme všetky práva. Šifrované disky Zabezpečená sieť, aktualizácie,... 1
2 Proces bootovania Po štarte počítača BIOS načíta a spustí z boot-sektoru boot-loader (lilo, grub,...) Boot-loader zavedie do pamäte a spustí jadro OS (prípadne ďalšie časti, napr. obraz ramdisku initrd). Jadro po inicializácii spustí proces init. boot-loader odovzdá jadru parametre, e.g. o nastavenia siete, o umiestnenie súborového systému / (root), o runlevel,... Runlevel Režim práce operačného systému. Je ich 7, sú definované v /etc/inittab a RC skriptami (/etc/rc[0-6].d), e.g. o 0, Halt o 1, Single-User mode o 3, Multi-User mode, textový režim o 5, Multi-User mode, grafický režim (X) o 6, Reboot Prepínanie runlevel-ov o runlevel, telinit SingleUser mode Režim poskytuje len jednu textovú konzolu pre administrátora (root). Nie sú spustené služby (démony), neumožňuje prihlásenie používateľov. Len pre údržbu, opravu, konfiguráciu. Umožňuje získať výlučný prístup k systému, za týchto predpokladov: o prístup ku konzole stroja po reštarte, o možnosť pridať boot-ovací parameter jadra single (poznať heslo boot-loadera). 2
3 Používateľ v Linuxe Používateľ je niekto, kto má oprávnenie používať daný systém Má priradené svoje meno - username Je identifikovaný jednoznačným UID Patrí do skupiny s jednoznačným GID Autentifikuje sa menom a heslom (typicky) Po prihlásení sa spustí shell (interpret príkazov, typicky /bin/bash) Prihlasovanie cez terminál 3
4 Čo sa stane init spustí fork a následne getty (prípadne agetty) /sbin/getty vypíše uvítaciu správu /etc/issue vyžiada prihlasovacie meno username spustí login /sbin/login získa username ako parameter vyžiada heslo vypíše /etc/motd (message of the day) vypíše kontrolu u Dôležité súbory pri prihlasovaní Zoznam aktuálnych prihlásení: /var/run/utmp Zoznam predchádzajúcich prihlásení: /var/run/wtmp Zoznam typov terminálov: /etc/ttytype Potlačenie výpisu systémových správ: $HOME/.hushlogin Databáza používateľov /etc/passwd Jednotlivé polia sú oddelené dvojbodkou : Prihlasovacie meno 1-32 znakov dlhé Heslo znak x znamená, že heslo je uložené zašifrované v /etc/shadow UID jedinečný identifikátor používateľa UID 0 rezervované pre používateľa root UID 1-99 rezervované pre preddefinovaných používateľov UID rezervované pre administráciu systému a systémové kontá GID Číslo skupiny, do ktorej používateľ primárne patrí Informácie o používateľovi Priestor na ďalšie doplňujúce informácie Domovský adresár absolútna cesta k adresáru, do ktorého bude používateľ prihlásený. Ak zadaný adresár neexistuje, stane sa domovským adresárom adresár / Príkazový interpret / príkaz absolútna cesta k príkazu alebo k interpretu príkazov, ktorý sa spustí po prihlásení (typicky /bin/bash) Pridanie používateľa do systému Pridanie používateľa s preddefinovanými nastaveniami pomocou useradd a useradd m username, prepínač -m zabezpečí vytvorenie domovského adresára 4
5 Výpísanie preddefinovaných nastavení useradd -D Zmena preddefinovanej skupiny useradd -D g 3434 Pridanie pomocou skriptu (v niektorých distribúciach je to len symbolická linka na useradd) adduser Pridanie skupiny s GID 1234: groupadd -g 1234 studenti Pridanie používateľa student1 do skupiny studenti: useradd -g studenti student1 Pridanie používateľa ručne Pridanie používateľa do databázy používateľov. Treba si dať pozor na syntax! vipw student2:x: 1001:1234::/home/student2:/bin/bash Zosúladenie súborov /etc/passwd a /etc/shadow a /etc/group a /etc/gshadow, pwck, grpck Konvertovanie medzi jednotlivými súbormi pwconv, pwunconv, grpconv, grpunconv Vytvorenie skupiny ručne: vigr Vytvorenie domovského adresára používateľa: mkdir /home/student2 Skopírovanie prednastaveného obsahu domovského adresára: cp -r /etc/skel/* /home/student2/ Zmena vlastníka adresáru: chown R student2:studenti /home/student2 Nastavenie prístupových práv na adresár: chmod R 755 /home/student2 Nastavenie hesla používateľa: passwd student2 Otestovanie prihlásenia používateľa: su student2; ls la 5
6 Zmazanie používateľského konta Zmazanie používateľského konta userdel student2 vipw, vigr Zmazanie konta aj súborov v domovskom adresári userdel r student2 Vyhľadanie všetkých súborov patriacich používateľovi find / -user student2 Zmena používateľského konta Zmeny používateľského konta: usermod student2 (man usermod) Zmena informácií o používateľovi: chfn student2 Zmena prihlasovacieho shell-u : chsh student2 Zmena platnosti konta: chage student2 Zablokovanie konta: passwd l student2 Obmedzenie pihlasovania Zoznam terminálov, z ktorých sa môže prihlásiť root: /etc/securetty Zabránenie prihlásenia iných používateľov ako root (v prípade, ak existuje). Vytvára ho skript shutdown: /etc/nologin Nastavenie shell-u na nepovolený: /bin/false /sbin/nologin Zoznam povolených shell-ov: /etc/shells Nastavenie obmedzení Limity pre používateľov: /etc/security/limits.conf Syntax súboru: <domain> <type> <item> <value> Doménou môže byť: username groupname značka * pre default nastavenia Limity môžu byť dvoch typov soft mäkké limity. Tieto môže používateľ meniť hard pevné limity. Používateľ ich nemôže prekročit Hodnota limitu <value> závisí od konkrétneho atribútu 6
7 Nastavenie rôznych obmedzení, napríklad: core nastavuje veľkosť core súboru (KB) fsize maximálna veľkosť súboru (KB) memlock maximum alokovanej pamäte (KB) nofile maximálny počet otvorených súborov (KB) cpu maximálny pridelený čas CPU (KB) nproc maximálny počet procesov (KB) Linux PAM Pluggable Autentification Modules súbor knižníc umožňujúci administrátorovi nastaviť, akým spôsobom budú jednotlivé aplikácie autentizovať používateľov. Jednotlivé moduly sa nachádzajú v: /libs/security Konfiguračný súbor pre konkrétnu aplikáciu: /etc/pam.d/* napríklad pre sshd: /etc/pam.d/sshd Syntax <control> <module> <arguments> Príklad PAM V tomto príklade sú v systéme uchovávajúcom heslá v md5 povolené heslá minimálnej dĺžky 14 bytov, pričom za špeciálne znaky a číslice môže získať používateľ kredit 2 (v prípade ich použitia stačí kratšie heslo) password required pam_cracklib.so difok=3 minlen=15 dcredit= 2 ocredit=2 password required pam_unix.so use_authtok nullok md5 Kredit môže byť aj záporný, vtedy je požadovaný minimálny počet daných znakov password required pam_cracklib.so dcredit=1 ocredit=1 lcredit=0 minlen=8 retry=3 su vs. sudo Oba programy umožňujú vykonať príkaz (napríklad id) ako iný používateľ sudo u student2 id su student2 c id su slúži primárne na zmenu používateľa (switch user) pri prihlásení vyžiada heslo používateľa, na ktorého sa chceme zmeniť sudo slúži primárne na vykonanie príkazu ako iný používateľ (switch user and do) pri prihlásení vyžiada heslo používateľa, ktorý príkaz spúšťa 7
8 sudo Na konfiguráciu slúži súbor: /etc/sudoers Povolenie používateľovi student2 spustiť uvedený príkaz bez hesla, ak je prihlásený lokálne (z localhostu) student2 localhost=nopasswd:/sbin/halt Povolenie skupine studenti spustiť uvedené príkazy bez hesla %studenti ALL=NOPASSWD:/usr/local/bin/zisti_IP,/sbin/ifconfig,/usr/bin/kvm 8
10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3]
1. Context 1.111.1 2 8 Deleting a group 8 1.111.1 Manage users and group accounts and related system files Weight 4 Outline Contents Linux Professional Institute Certification 102 Nick Urbanik
More informationNETW 110 Lab 5 Creating and Assigning Users and Groups Page 1
NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration User accounts The /etc/passwd file The /etc/shadow file Root powers Ownership of files and processes The superuser The /etc/group file Adding users Removing users
More informationRedhat Basic. Need. Your. What. Operation G U I D E. Technical Hand Note template version
Redhat Basic Operation G U I D E What Need Your www.next-asia.com Readhat Basic Operation Guide, Prepared by Nazmul Khan Page 1 of 43 Redhat Basic Operation Guide RedHat Installation Guide... 2 Installation...
More informationCIT 470: Advanced Network and System Administration. Topics. Namespaces. Accounts and Namespaces. 1. Namespaces 2. Policies
CIT 470: Advanced Network and System Administration Accounts and Namespaces CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Namespaces 2. Policies 1. selection 2. lifetime 3. scope
More informationUser & Group Administration
User & Group Administration David Morgan Users useradd/userdel /home/ /etc/passwd is the user database /etc/shadow has passwords (relocated from passwd) /etc/group whoami su / sudo / SUID process
More informationRegistrácia účtu Hik-Connect
Registrácia účtu Hik-Connect Tento návod popisuje postup registrácie účtu služby Hik-Connect prostredníctvom mobilnej aplikácie a webového rozhrania na stránke www.hik-connect.comg contents in this document
More informationCST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management
Student Name: YOUR NAME Lab Section: 011 012 013 or 014 Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following
More informationCST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management
Student Name: Lab Section: Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online
More informationUser Management. René Serral-Gracià Xavier Martorell-Bofill 1. May 26, Universitat Politècnica de Catalunya (UPC)
User Management René Serral-Gracià Xavier Martorell-Bofill 1 1 Universitat Politècnica de Catalunya (UPC) May 26, 2014 Lectures 1 System administration introduction 2 Operating System installation 3 User
More informationSystem Administration
User and Group Management All processes on the system run under by a user. Users can be collected into groups which can be given common attributes Users and groups are represented by the system using unique
More informationNETW 110 Lab 3 Post-Installation Configuration Page 1
NETW 110 Lab 3 Post-Installation Configuration Page 1 Objective At the conclusion of this lab, the student will learn some very basic functions of vi, use vi to perform some post-installation configuration
More informationOPERATING SYSTEMS LINUX
OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu Process management Linux operating systems work with processes. Basically a process consists of program code
More informationUser accounts and authorization
User accounts and authorization Authentication vs authorization Authentication: proving the identity of someone Authorization: allowing a user to access certain resources 1 Government authorization documents
More informationCheck List: Linux Machines
Check List: Linux Machines High Level Install and maintain malware protection software o Install MalWare (Defender) o Install AntiVirus (Microsoft Security Essentials) Account Management o Remove guest
More informationAdvanced Linux System Administra3on
Advanced Linux System Administra3on Topic 5. User management Pablo Abad Fidalgo José Ángel Herrero Velasco Departamento de Ingeniería Informá2ca y Electrónica Este tema se publica bajo Licencia: Crea2ve
More informationEverything about Linux User- and Filemanagement
Everything about Linux User- and Filemanagement Lukas Prokop 20. April 2009 Inhaltsverzeichnis 1 Who I am 2 1.1 whoami..................................... 3 1.2 passwd......................................
More informationCopyright 2016 by Martin Krug. All rights reserved.
MS Managed Service Copyright 2016 by Martin Krug. All rights reserved. Reproduction, or translation of materials without the author's written permission is prohibited. No content may be reproduced without
More informationRecipient Configuration. Štefan Pataky MCP, MCTS, MCITP
Recipient Configuration Štefan Pataky MCP, MCTS, MCITP Agenda Mailbox Mail Contact Distribution Groups Disconnected Mailbox Mailbox (vytvorenie nového účtu) Exchange Management Console New User Exchange
More informationComputer Center, CS, NCTU
User Management Adding New Users ID User ID, Group ID % id liuyh uid=10047(liuyh) gid=200(dcs) groups=200(dcs),0(wheel),700(ta),800(security),888(wwwadm) % id 10047 Super user root uid=10047(liuyh) gid=200(dcs)
More informationLab 2A> ADDING USERS in Linux
Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.
More informationThe kernel is the low-level software that manages hardware, multitasks programs, etc.
November 2011 1 Why Use Linux? Save Money Initial purchase and maintenance Resume Linux is used by MANY organizations More choices Tons of Linux operating systems November 2011 2 What is Linux? 1. Contains
More informationDatabázy (1) Prednáška 11. Alexander Šimko
Databázy (1) Prednáška 11 Alexander Šimko simko@fmph.uniba.sk Contents I Aktualizovanie štruktúry databázy Section 1 Aktualizovanie štruktúry databázy Aktualizácia štruktúry databázy Štruktúra databázy
More informationUser Management. lctseng
User Management lctseng ID User ID, Group ID % id lctseng uid=10554(lctseng) gid=1130(cs) groups=1130(cs),0(wheel),2000(taever),2012(security) % id 10047 Same as above Super user (defined by uid = 0) root
More informationChapter 6 Adding New Users
Chapter 6 Adding New Users Steps to add a new user 1. Edit the password and group files > vipw 2. Set an initial password > passwd chwong 3. Set quota > edquota [ u] chwong 4. Create user home directory
More informationCommands are in black
Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin
More informationChapter 5: User Management. Chapter 5 User Management
Chapter 5: User Management Chapter 5 User Management Last revised: 20/6/2004 Chapter 5 Outline In this chapter we will learn Where user and group account information is stored How to manage user accounts
More information8 User Administration
8 User Administration CERTIFICATION OBJECTIVES 8.01 User Account Management 8.02 Administrative Control 8.03 User and Shell Configuration 8.04 Users and Network Authentication 8.05 Special Groups Two-Minute
More informationkucharka exportu pro 9FFFIMU
požiadavky na export kodek : Xvid 1.2.1 stable (MPEG-4 ASP) // výnimočne MPEG-2 bitrate : max. 10 Mbps pixely : štvorcové (Square pixels) rozlíšenie : 1920x1080, 768x432 pre 16:9 // výnimočne 1440x1080,
More informationOchrana proti DDoS za použitia open-source software. Katarína Ďurechová
Ochrana proti DDoS za použitia open-source software Katarína Ďurechová katarina.durechova@nic.cz 30.11.2013 Distributed Denial of Service odopretie služby dosiahnutím limitu pripojenia sieťovej karty CPU
More informationLab Authentication, Authorization, and Accounting
Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices
More informationMANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG
MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG Terminals and keyboards have no uniform behavioral pattern. Terminal settings directly impact the keyboard operation.
More informationProject #3: Implementing NIS
Project #3: Implementing NIS NIS Daemons Limitations of NIS How We Will Use NIS NIS Domain Name NIS Software Setting Up NIS on it20 /etc/nsswitch.conf Creating New Accounts on Ubuntu /etc/passwd /etc/shadow
More informationAplikačný dizajn manuál
Aplikačný dizajn manuál Úvod Aplikačný dizajn manuál je súbor pravidiel vizuálnej komunikácie. Dodržiavaním jednotných štandardov, aplikácií loga, písma a farieb pri prezentácii sa vytvára jednotný dizajn,
More informationCourse 144 Supplementary Materials. UNIX Fundamentals
Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should
More informationRHCE BOOT CAMP. The Boot Process. Wednesday, November 28, 12
RHCE BOOT CAMP The Boot Process OVERVIEW The boot process gets a machine from the useless off state to the feature rich operating system we all know and love Requires cooperation between hardware and software
More informationLinux Essentials Objectives Topics:
Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives
More informationQ) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system...
Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is the difference between home directory and working directory? Answer
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,
More informationBooting up and Shutting down A primer for troubleshooting
Booting up and Shutting down A primer for troubleshooting In this section, we touch upon the startup and shutdown process on Linux. It is beyond the scope of this course to cover this topic in depth and
More informationRedHat. Rh202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)
RedHat Rh202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) http://killexams.com/exam-detail/rh202 QUESTION: 156 Who ever creates the files/directories on /data group owner should be automatically
More informationSúborový systém. Základné pojmy Prístupové práva Atribúty Kvóty ACL Kryptografia Diskové oddiely
Súborový systém Základné pojmy Prístupové práva Atribúty Kvóty ACL Kryptografia Diskové oddiely Bezpečnosť počítačových systémov / Súborový systém DB, FIIT STU BA, 2009 2011 1 Súborový systém Poskytuje
More informationLinux Kung Fu. Ross Ventresca UBNetDef, Fall 2017
Linux Kung Fu Ross Ventresca UBNetDef, Fall 2017 GOTO: https://apps.ubnetdef.org/ What is Linux? Linux generally refers to a group of Unix-like free and open source operating system distributions built
More informationSystem Administration. Startup Process
System Administration Startup Process Why Care? Every process on your system comes about by following a specific chain of events from the machine startup You may want to disable processes You may want
More informationRH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)
RedHat RH-202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Download Full Version : https://killexams.com/pass4sure/exam-detail/rh-202 QUESTION: 159 Install the dialog-* Questions asking
More informationExam Linux-Praxis - 1 ( From )
Exam Linux-Praxis - 1 ( From http://www.linux-praxis.de ) (1)Which of the following commands results in mailing the content of the current directory to Bob? A. mail Bob < ls B. ls > mail Bob C. ls mail
More informationPlease choose the best answer. More than one answer might be true, but choose the one that is best.
Introduction to Linux and Unix - endterm Please choose the best answer. More than one answer might be true, but choose the one that is best. SYSTEM STARTUP 1. A hard disk master boot record is located:
More informationTP-LINK 150Mbps Wireless AP/Client Router Model TL-WR743ND Rýchly inštalačný sprievodca
TP-LINK 150Mbps Wireless AP/Client Router Model TL-WR743ND Rýchly inštalačný sprievodca Obsah balenia TL-WR743ND Rýchly inštalačný sprievodca PoE injektor Napájací adaptér CD Ethernet kábel Systémové požiadavky
More informationLinux Kung-Fu. James Droste UBNetDef Fall 2016
Linux Kung-Fu James Droste UBNetDef Fall 2016 $ init 1 GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org
More informationUNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan
UNIT V UNIX SYSTEM COMMUNICATION Dr.T.Logeswari 1 Electronic mail or email is easiest way of communication on unix. Fast and cheap Used to exchange graphics, sound and video files 2 3 Elements of a communication
More informationUsing grub to Boot various Operating Systems
Operating Systems and Systems Integration Using grub to Boot various Operating Systems Contents 1 Aim 2 2 What You Will Do 2 3 Background 2 3.1 Installing grub in MBR from a floppy, and from the OS........
More informationUser Accounts. The Passwd, Group, and Shadow Files
User Accounts The Passwd, Group, and Shadow Files We'll start with the passwd (pronounced "password") file, located at /etc/passwd. This file holds information about all of the user accounts on the system.
More informationHow to Secure RHEL 6.2 Part 1
How to Secure RHEL 6.2 Part 1 Motivation This paper will be a multi-part series on securing Redhat Enterprise Linux 6.2. This idea has been toiling around my head for almost a year and now is the time
More informationUNIT 10 Ubuntu Security
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT 10 Ubuntu Security Learning Objectives Participants will understand how to configure major components of Linux/Ubuntu Account
More informationCSE/ISE 311: Systems Administra5on Managing Users and Groups
Managing Users and Groups Por$ons courtesy Ellen Liu Outline What cons$tutes a user? /etc/passwd, /etc/shadow, /etc/group files User management tools Adding users: basic steps, automa$on, bulk Removing
More informationLDAP Authentication In Linux
By Dariusz Dwornikowski Published: 2006-08-24 12:02 LDAP Authentication In Linux This howto will show you howto store your users in LDAP and authenticate some of the services against it. I will not show
More informationSpôsoby zistenia ID KEP
Spôsoby zistenia ID KEP ID KEP (kvalifikovaný elektronický podpis) je možné zistiť pomocou napr. ovládacieho panela, prostredíctvom prehliadača Internet Expolrer, Google Chrome alebo Mozilla Firefox. Popstup
More informationOutline. UNIX security ideas Users and groups File protection Setting temporary privileges. Examples. Permission bits Program language components
UNIX security Ulf Larson (modified by Erland Jonsson/Magnus Almgren) Computer security group Dept. of Computer Science and Engineering Chalmers University of Technology, Sweden Outline UNIX security ideas
More informationLinux Kung Fu. Stephen James UBNetDef, Spring 2017
Linux Kung Fu Stephen James UBNetDef, Spring 2017 Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and
More informationWelcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions
Welcome to getting started with Ubuntu 12.04 Server. This System Administrator Manual guide to be simple to follow, with step by step instructions with screenshots INDEX 1.Installation of Ubuntu 12.04
More informationZáklady Linuxu -1- Používateľské prostredia operačných systémov - Linux (prednášky)
Základy Linuxu -1- Používateľské prostredia operačných systémov - Linux (prednášky) Obsah Základy Linuxu -2- Obsah 1. Úvod do používateľských rozhraní operačných systémov... 7 1.1. Vývoj operačných systémov...
More information1Z Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions
1Z0-100 Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-100 Exam on Oracle Linux 5 and 6 System Administration2 Oracle 1Z0-100 Certification
More informationBasic Linux Security. Roman Bohuk University of Virginia
Basic Linux Security Roman Bohuk University of Virginia What is Linux? An open source operating system Project started by Linus Torvalds kernel Kernel: core program that controls everything else (controls
More informationOS Security. Authentication. Radboud University Nijmegen, The Netherlands. Winter 2014/2015
OS Security Authentication Radboud University Nijmegen, The Netherlands Winter 2014/2015 What does an OS do? Definition An operating system (OS) is a computer program that manages access of processes (programs)
More informationPresented by Bill Genske Gary Jackson
Quintessential School Systems Session C Linux Presented by Bill Genske Gary Jackson Copyright Quintessential School Systems, 2009 All Rights Reserved 867 American Street --- Second Floor --- San Carlos,
More informationRunlevels, System Shutdown and Reboot
Information These notes were originally written in the year 2000 as part of a set of LPI Exam 101 training materials. The LPI training course at Bromley College was subsequently discontinued and some of
More informationIntroduction. What is Linux? What is the difference between a client and a server?
Linux Kung Fu Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and open-source operating system distributions
More informationOracle 1Z Enterprise Linux System Administration. Download Full Version :
Oracle 1Z0-403 Enterprise Linux System Administration Download Full Version : http://killexams.com/pass4sure/exam-detail/1z0-403 B. It does not provide any protection to remote X connections. C. It allows
More informationCS/CIS 249 SP18 - Intro to Information Security
Lab assignment CS/CIS 249 SP18 - Intro to Information Security Lab #2 - UNIX/Linux Access Controls, version 1.2 A typed document is required for this assignment. You must type the questions and your responses
More informationDatabázové systémy. SQL Window functions
Databázové systémy SQL Window functions Scores Tabuľka s bodmi pre jednotlivých študentov id, name, score Chceme ku každému doplniť rozdiel voči priemeru 2 Demo data SELECT * FROM scores ORDER BY score
More informationUniversity of Pennsylvania Zachary Goldberg. CIS c. More Kernel Bits. 10/03/09 Slide 1
More Kernel Bits 10/03/09 Slide 1 Rebooting Why would one ever need to reboot on Linux? Installing new driver?... (No) Installing new applications?... (No) Installing new... Anything?... (No) Reconfiguring...
More informationBezpečnosť webovských aplikácií (2. časť)
Bezpečnosť webovských aplikácií (2. časť) Richard Ostertág Katedra informatiky FMFI UK, Bratislava ostertag@dcs.fmph.uniba.sk 2011/12 R. Ostertág (KI FMFI UK) Bezpečnosť webovských aplikácií (2) 1 / 14
More informationCST8177 Linux II. Linux Boot Process
CST8177 Linux II Linux Boot Process Reference information from the text, http://www.linuxdoc.org and several other web sites Linux Boot Process Topics covered in this slide-set Basic definition of the
More informationCompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ]
s@lm@n CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ] CompTIA LX0-102 : Practice Test Topic break down Topic No. of Questions Topic 1: Volume A 60 Topic 2: Volume B 59 Topic 3:
More informationHands-on Keyboard: Cyber Experiments for Strategists and Policy Makers
Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity
More informationPL-I Assignment Broup B-Ass 5 BIOS & UEFI
PL-I Assignment Broup B-Ass 5 BIOS & UEFI Vocabulary BIOS = Basic Input Output System UEFI = Unified Extensible Firmware Interface POST= Power On Self Test BR = Boot Record (aka MBR) BC =Boot Code (aka
More informationSúborový systém. Ing. Viliam Solčány, PhD. ZS 2011/2012. Viliam Solčány, FIIT STU Bratislava Operačné systémy 2011/12 Predn.
Súborový systém Ing. Viliam Solčány, PhD. ÓÐ ÒÝ Øº ØÙ º ZS 2011/2012 Viliam Solčány, FIIT STU Bratislava Operačné systémy 2011/12 Predn. 12 1 / 42 Osnova Viliam Solčány, FIIT STU Bratislava Operačné systémy
More informationOperating Systems Lab 1 (Users, Groups, and Security)
Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,
More information02. At the command prompt, type usermod -l bozo bozo2 and press Enter to change the login name for the user bozo2 back to bozo. => steps 03.
Laboratory Exercises: ===================== Complete the following laboratory exercises. All steps are numbered but not every step includes a question. You only need to record answers for those steps that
More informationSLES High Level Design. Version 1.10
SLES High Level Design Version 1.10 1 SuSE and its logo are registered trademarks of SuSE AG. IBM, the IBM logo, and xseries are trademarks or registered trademarks of International Business Machines Corporation
More informationOracle. Oracle Solaris 11 System Administration. 1z Version: Demo. [ Total Questions: 10] Web:
Oracle 1z0-821 Oracle Solaris 11 System Administration Version: Demo [ Total Questions: 10] Web: www.marks4sure.com Email: support@marks4sure.com IMPORTANT NOTICE Feedback We have developed quality product
More informationCertification. System Initialization and Services
Certification System Initialization and Services UNIT 3 System Initialization and Services UNIT 3: Objectives Upon completion of this unit the student should be able to: Describe BIOS functions with respect
More informationVYLEPŠOVANIE KONCEPTU TRIEDY
VYLEPŠOVANIE KONCEPTU TRIEDY Typy tried class - definuje premenné a metódy (funkcie). Ak nie je špecifikovaná inak, viditeľnosť členov je private. struct - definuje premenné a metódy (funkcie). Ak nie
More informationUser Management. Lctseng, arr. by pschiu
User Management Lctseng, arr. by pschiu ID q User ID, Group ID % id lctseng (ID Name) Ø uid=10554(lctseng) gid=1130(cs) groups=1130(cs),0(wheel),2000(taever),2012(security) % id 10047 (UID) Ø Same as above
More information[ Terminal ] [ Users management ] Alt +F6 = Terminal switcher. useradd [option] JohnG
[ Terminal ] Alt +F6 = Terminal switcher [ Users management ] useradd [option] JohnG -d : to assign homedirectory -u : to assign UID -s : to set shell -g : to assign group ID ex) Linux# useradd JohnG -d
More informationMore on file systems, Booting Todd Kelley CST8177 Todd Kelley 1
More on file systems, Booting Todd Kelley kelleyt@algonquincollege.com CST8177 Todd Kelley 1 bind mounts quotas Booting process and SysVinit Installation Disk rescue mode 2 A bind mount is used to mount
More informationThe Samba-3: Overview, Authentication, Integration
The Samba-3: Overview, Authentication, Integration John H Terpstra, CTO PrimaStasys Inc. jht@primastasys.com or jht@samba.org Slide 1 About the speaker Long term Samba-Team member Author of official Samba
More informationRiešenia a technológie pre jednotnú správu používateľov
Riešenia a technológie pre jednotnú správu používateľov Radovan Semančík Agenda Úvod: Identity Crisis Technológie správy používateľov Postup nasadenia Záver Súčasný stav IT Security Nekonzistentné bezpečnostné
More informationInformation System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000)
Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) armahmood786@yahoo.com alphasecure@gmail.com alphapeeler.sf.net/pubkeys/pkey.htm http://alphapeeler.sourceforge.net pk.linkedin.com/in/armahmood
More informationLab 3a Using the vi editor
Lab 3a Using the vi editor Objectives: Become familiar with the vi Editor Review the three vi Modes Review keystrokes to move between vi modes Create a new file with vi Editor Invoke vi with show mode
More informationDirectControl and RSA SecurID
WHITE PAPER CENTRIFY CORP. DirectControl and RSA SecurID NOV 2010 Enabling Active Directory users to authenticate to Unix/Linux using SecurID tokens ABSTRACT This document describes the steps necessary
More informationThe Linux IPL Procedure
The Linux IPL Procedure SHARE - Tampa February 13, 2007 Session 9274 Edmund MacKenty Rocket Software, Inc. Purpose De-mystify the Linux boot sequence Explain what happens each step of the way Describe
More informationRýchlosť Mbit/s (download/upload) 15 Mbit / 1 Mbit. 50 Mbit / 8 Mbit. 80 Mbit / 10 Mbit. 10 Mbit / 1 Mbit. 12 Mbit / 2 Mbit.
Fiber 5 Mbit ** 5 Mbit / Mbit 5,90 Fiber 50 Mbit * 50 Mbit / 8 Mbit 9,90 Fiber 80 Mbit * 80 Mbit / Mbit 5,90 Mini Mbit* Mbit / Mbit 9,90 Klasik 2 Mbit* 2 Mbit / 2 Mbit Standard 8 Mbit* 8 Mbit / 3Mbit Expert
More informationAccurate study guides, High passing rate! IT TEST BOOK QUESTION & ANSWER. Ittestbook provides update free of charge in one year!
IT TEST BOOK QUESTION & ANSWER Ittestbook provides update free of charge in one year! Accurate study guides, High passing rate! Exam : RH133 Title : Red Hat Linux System Administration Version : Demo 1
More informationMIS Week 10. Operating System Security. Unix/Linux basics
MIS 5170 Operating System Security Week 10 Unix/Linux basics Tonight s Plan 2 Questions from Last Week Review on-line posts In The News Download Kali Install Kali Unix/Linux Basics Scripting Appropriate
More informationRH133. Red Hat Linux System Administration
RH133 Red Hat Linux System Administration Version 3.5 QUESTION NO: 1 RH133 John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root
More informationgrub-md5-crypt --help Usage: grub-md5-crypt [OPTION] Encrypt a password in MD5 format.
(OS Hardening). Minimal.1. grub.2..3. DVD Update.4. root ssh.5 kernel grub kernel.6. comment vi /etc/grub.conf # grub.conf generated by anaconda # # Note that you do not have to rerun grub after making
More informationManuál k programu FileZilla
Manuál k programu FileZilla EXO TECHNOLOGIES spol. s.r.o. Garbiarska 3 Stará Ľubovňa 064 01 IČO: 36 485 161 IČ DPH: SK2020004503 support@exohosting.sk www.exohosting.sk 1 Úvod EXO HOSTING tím pre Vás pripravil
More informationOS Security. Authentication. Radboud University Nijmegen, The Netherlands. Winter 2014/2015
OS Security Authentication Radboud University Nijmegen, The Netherlands Winter 2014/2015 What does an OS do? Definition An operating system (OS) is a computer program that manages access of processes (programs)
More information