Správa používateľov Zabezpečenie prístupu

Size: px
Start display at page:

Download "Správa používateľov Zabezpečenie prístupu"

Transcription

1 Správa používateľov Zabezpečenie prístupu k počítaču Proces zavádzania operačného systému Spôsob prihlasovania Vytváranie a mazanie používateľov Zmenu informácií Nastavovanie skupín používateľov Nastavovanie obmedzení Nastavovanie oprávnení Zabezpečenie prístupu Fyzická bezpečnosť o zabrániť prístupu k stroju (ale aj diskom a iným médiám). Boot-ovacie médium o nastaviť heslo do BIOS-u, zakázať bootovanie z vymeniteľných médií, o v prípade boot-ovania z flash alebo CDROM je možné získať prístup k súborovému systému (pokiaľ nie je šifrovaný) zrušiť/zmeniť heslá k boot-loaderu (/boot/grub/grub.conf: password), zmeniť heslo root-a. Boot-loader o boot-loader umožňuje odovzdávať parametre jadru, napríklad aj runlevel, o umožňuje teda získať administrátorský prístup cez Single-User mode, o nastaviť heslo boot-loadera. Heslo administrátora o má v systéme všetky práva. Šifrované disky Zabezpečená sieť, aktualizácie,... 1

2 Proces bootovania Po štarte počítača BIOS načíta a spustí z boot-sektoru boot-loader (lilo, grub,...) Boot-loader zavedie do pamäte a spustí jadro OS (prípadne ďalšie časti, napr. obraz ramdisku initrd). Jadro po inicializácii spustí proces init. boot-loader odovzdá jadru parametre, e.g. o nastavenia siete, o umiestnenie súborového systému / (root), o runlevel,... Runlevel Režim práce operačného systému. Je ich 7, sú definované v /etc/inittab a RC skriptami (/etc/rc[0-6].d), e.g. o 0, Halt o 1, Single-User mode o 3, Multi-User mode, textový režim o 5, Multi-User mode, grafický režim (X) o 6, Reboot Prepínanie runlevel-ov o runlevel, telinit SingleUser mode Režim poskytuje len jednu textovú konzolu pre administrátora (root). Nie sú spustené služby (démony), neumožňuje prihlásenie používateľov. Len pre údržbu, opravu, konfiguráciu. Umožňuje získať výlučný prístup k systému, za týchto predpokladov: o prístup ku konzole stroja po reštarte, o možnosť pridať boot-ovací parameter jadra single (poznať heslo boot-loadera). 2

3 Používateľ v Linuxe Používateľ je niekto, kto má oprávnenie používať daný systém Má priradené svoje meno - username Je identifikovaný jednoznačným UID Patrí do skupiny s jednoznačným GID Autentifikuje sa menom a heslom (typicky) Po prihlásení sa spustí shell (interpret príkazov, typicky /bin/bash) Prihlasovanie cez terminál 3

4 Čo sa stane init spustí fork a následne getty (prípadne agetty) /sbin/getty vypíše uvítaciu správu /etc/issue vyžiada prihlasovacie meno username spustí login /sbin/login získa username ako parameter vyžiada heslo vypíše /etc/motd (message of the day) vypíše kontrolu u Dôležité súbory pri prihlasovaní Zoznam aktuálnych prihlásení: /var/run/utmp Zoznam predchádzajúcich prihlásení: /var/run/wtmp Zoznam typov terminálov: /etc/ttytype Potlačenie výpisu systémových správ: $HOME/.hushlogin Databáza používateľov /etc/passwd Jednotlivé polia sú oddelené dvojbodkou : Prihlasovacie meno 1-32 znakov dlhé Heslo znak x znamená, že heslo je uložené zašifrované v /etc/shadow UID jedinečný identifikátor používateľa UID 0 rezervované pre používateľa root UID 1-99 rezervované pre preddefinovaných používateľov UID rezervované pre administráciu systému a systémové kontá GID Číslo skupiny, do ktorej používateľ primárne patrí Informácie o používateľovi Priestor na ďalšie doplňujúce informácie Domovský adresár absolútna cesta k adresáru, do ktorého bude používateľ prihlásený. Ak zadaný adresár neexistuje, stane sa domovským adresárom adresár / Príkazový interpret / príkaz absolútna cesta k príkazu alebo k interpretu príkazov, ktorý sa spustí po prihlásení (typicky /bin/bash) Pridanie používateľa do systému Pridanie používateľa s preddefinovanými nastaveniami pomocou useradd a useradd m username, prepínač -m zabezpečí vytvorenie domovského adresára 4

5 Výpísanie preddefinovaných nastavení useradd -D Zmena preddefinovanej skupiny useradd -D g 3434 Pridanie pomocou skriptu (v niektorých distribúciach je to len symbolická linka na useradd) adduser Pridanie skupiny s GID 1234: groupadd -g 1234 studenti Pridanie používateľa student1 do skupiny studenti: useradd -g studenti student1 Pridanie používateľa ručne Pridanie používateľa do databázy používateľov. Treba si dať pozor na syntax! vipw student2:x: 1001:1234::/home/student2:/bin/bash Zosúladenie súborov /etc/passwd a /etc/shadow a /etc/group a /etc/gshadow, pwck, grpck Konvertovanie medzi jednotlivými súbormi pwconv, pwunconv, grpconv, grpunconv Vytvorenie skupiny ručne: vigr Vytvorenie domovského adresára používateľa: mkdir /home/student2 Skopírovanie prednastaveného obsahu domovského adresára: cp -r /etc/skel/* /home/student2/ Zmena vlastníka adresáru: chown R student2:studenti /home/student2 Nastavenie prístupových práv na adresár: chmod R 755 /home/student2 Nastavenie hesla používateľa: passwd student2 Otestovanie prihlásenia používateľa: su student2; ls la 5

6 Zmazanie používateľského konta Zmazanie používateľského konta userdel student2 vipw, vigr Zmazanie konta aj súborov v domovskom adresári userdel r student2 Vyhľadanie všetkých súborov patriacich používateľovi find / -user student2 Zmena používateľského konta Zmeny používateľského konta: usermod student2 (man usermod) Zmena informácií o používateľovi: chfn student2 Zmena prihlasovacieho shell-u : chsh student2 Zmena platnosti konta: chage student2 Zablokovanie konta: passwd l student2 Obmedzenie pihlasovania Zoznam terminálov, z ktorých sa môže prihlásiť root: /etc/securetty Zabránenie prihlásenia iných používateľov ako root (v prípade, ak existuje). Vytvára ho skript shutdown: /etc/nologin Nastavenie shell-u na nepovolený: /bin/false /sbin/nologin Zoznam povolených shell-ov: /etc/shells Nastavenie obmedzení Limity pre používateľov: /etc/security/limits.conf Syntax súboru: <domain> <type> <item> <value> Doménou môže byť: username groupname značka * pre default nastavenia Limity môžu byť dvoch typov soft mäkké limity. Tieto môže používateľ meniť hard pevné limity. Používateľ ich nemôže prekročit Hodnota limitu <value> závisí od konkrétneho atribútu 6

7 Nastavenie rôznych obmedzení, napríklad: core nastavuje veľkosť core súboru (KB) fsize maximálna veľkosť súboru (KB) memlock maximum alokovanej pamäte (KB) nofile maximálny počet otvorených súborov (KB) cpu maximálny pridelený čas CPU (KB) nproc maximálny počet procesov (KB) Linux PAM Pluggable Autentification Modules súbor knižníc umožňujúci administrátorovi nastaviť, akým spôsobom budú jednotlivé aplikácie autentizovať používateľov. Jednotlivé moduly sa nachádzajú v: /libs/security Konfiguračný súbor pre konkrétnu aplikáciu: /etc/pam.d/* napríklad pre sshd: /etc/pam.d/sshd Syntax <control> <module> <arguments> Príklad PAM V tomto príklade sú v systéme uchovávajúcom heslá v md5 povolené heslá minimálnej dĺžky 14 bytov, pričom za špeciálne znaky a číslice môže získať používateľ kredit 2 (v prípade ich použitia stačí kratšie heslo) password required pam_cracklib.so difok=3 minlen=15 dcredit= 2 ocredit=2 password required pam_unix.so use_authtok nullok md5 Kredit môže byť aj záporný, vtedy je požadovaný minimálny počet daných znakov password required pam_cracklib.so dcredit=1 ocredit=1 lcredit=0 minlen=8 retry=3 su vs. sudo Oba programy umožňujú vykonať príkaz (napríklad id) ako iný používateľ sudo u student2 id su student2 c id su slúži primárne na zmenu používateľa (switch user) pri prihlásení vyžiada heslo používateľa, na ktorého sa chceme zmeniť sudo slúži primárne na vykonanie príkazu ako iný používateľ (switch user and do) pri prihlásení vyžiada heslo používateľa, ktorý príkaz spúšťa 7

8 sudo Na konfiguráciu slúži súbor: /etc/sudoers Povolenie používateľovi student2 spustiť uvedený príkaz bez hesla, ak je prihlásený lokálne (z localhostu) student2 localhost=nopasswd:/sbin/halt Povolenie skupine studenti spustiť uvedené príkazy bez hesla %studenti ALL=NOPASSWD:/usr/local/bin/zisti_IP,/sbin/ifconfig,/usr/bin/kvm 8

10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3]

10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3] 1. Context 1.111.1 2 8 Deleting a group 8 1.111.1 Manage users and group accounts and related system files Weight 4 Outline Contents Linux Professional Institute Certification 102 Nick Urbanik

More information

NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1

NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration User accounts The /etc/passwd file The /etc/shadow file Root powers Ownership of files and processes The superuser The /etc/group file Adding users Removing users

More information

Redhat Basic. Need. Your. What. Operation G U I D E. Technical Hand Note template version

Redhat Basic. Need. Your. What. Operation G U I D E. Technical Hand Note template version Redhat Basic Operation G U I D E What Need Your www.next-asia.com Readhat Basic Operation Guide, Prepared by Nazmul Khan Page 1 of 43 Redhat Basic Operation Guide RedHat Installation Guide... 2 Installation...

More information

CIT 470: Advanced Network and System Administration. Topics. Namespaces. Accounts and Namespaces. 1. Namespaces 2. Policies

CIT 470: Advanced Network and System Administration. Topics. Namespaces. Accounts and Namespaces. 1. Namespaces 2. Policies CIT 470: Advanced Network and System Administration Accounts and Namespaces CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Namespaces 2. Policies 1. selection 2. lifetime 3. scope

More information

User & Group Administration

User & Group Administration User & Group Administration David Morgan Users useradd/userdel /home/ /etc/passwd is the user database /etc/shadow has passwords (relocated from passwd) /etc/group whoami su / sudo / SUID process

More information

Registrácia účtu Hik-Connect

Registrácia účtu Hik-Connect Registrácia účtu Hik-Connect Tento návod popisuje postup registrácie účtu služby Hik-Connect prostredníctvom mobilnej aplikácie a webového rozhrania na stránke www.hik-connect.comg contents in this document

More information

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management Student Name: YOUR NAME Lab Section: 011 012 013 or 014 Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following

More information

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management Student Name: Lab Section: Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online

More information

User Management. René Serral-Gracià Xavier Martorell-Bofill 1. May 26, Universitat Politècnica de Catalunya (UPC)

User Management. René Serral-Gracià Xavier Martorell-Bofill 1. May 26, Universitat Politècnica de Catalunya (UPC) User Management René Serral-Gracià Xavier Martorell-Bofill 1 1 Universitat Politècnica de Catalunya (UPC) May 26, 2014 Lectures 1 System administration introduction 2 Operating System installation 3 User

More information

System Administration

System Administration User and Group Management All processes on the system run under by a user. Users can be collected into groups which can be given common attributes Users and groups are represented by the system using unique

More information

NETW 110 Lab 3 Post-Installation Configuration Page 1

NETW 110 Lab 3 Post-Installation Configuration Page 1 NETW 110 Lab 3 Post-Installation Configuration Page 1 Objective At the conclusion of this lab, the student will learn some very basic functions of vi, use vi to perform some post-installation configuration

More information

OPERATING SYSTEMS LINUX

OPERATING SYSTEMS LINUX OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu Process management Linux operating systems work with processes. Basically a process consists of program code

More information

User accounts and authorization

User accounts and authorization User accounts and authorization Authentication vs authorization Authentication: proving the identity of someone Authorization: allowing a user to access certain resources 1 Government authorization documents

More information

Check List: Linux Machines

Check List: Linux Machines Check List: Linux Machines High Level Install and maintain malware protection software o Install MalWare (Defender) o Install AntiVirus (Microsoft Security Essentials) Account Management o Remove guest

More information

Advanced Linux System Administra3on

Advanced Linux System Administra3on Advanced Linux System Administra3on Topic 5. User management Pablo Abad Fidalgo José Ángel Herrero Velasco Departamento de Ingeniería Informá2ca y Electrónica Este tema se publica bajo Licencia: Crea2ve

More information

Everything about Linux User- and Filemanagement

Everything about Linux User- and Filemanagement Everything about Linux User- and Filemanagement Lukas Prokop 20. April 2009 Inhaltsverzeichnis 1 Who I am 2 1.1 whoami..................................... 3 1.2 passwd......................................

More information

Copyright 2016 by Martin Krug. All rights reserved.

Copyright 2016 by Martin Krug. All rights reserved. MS Managed Service Copyright 2016 by Martin Krug. All rights reserved. Reproduction, or translation of materials without the author's written permission is prohibited. No content may be reproduced without

More information

Recipient Configuration. Štefan Pataky MCP, MCTS, MCITP

Recipient Configuration. Štefan Pataky MCP, MCTS, MCITP Recipient Configuration Štefan Pataky MCP, MCTS, MCITP Agenda Mailbox Mail Contact Distribution Groups Disconnected Mailbox Mailbox (vytvorenie nového účtu) Exchange Management Console New User Exchange

More information

Computer Center, CS, NCTU

Computer Center, CS, NCTU User Management Adding New Users ID User ID, Group ID % id liuyh uid=10047(liuyh) gid=200(dcs) groups=200(dcs),0(wheel),700(ta),800(security),888(wwwadm) % id 10047 Super user root uid=10047(liuyh) gid=200(dcs)

More information

Lab 2A> ADDING USERS in Linux

Lab 2A> ADDING USERS in Linux Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.

More information

The kernel is the low-level software that manages hardware, multitasks programs, etc.

The kernel is the low-level software that manages hardware, multitasks programs, etc. November 2011 1 Why Use Linux? Save Money Initial purchase and maintenance Resume Linux is used by MANY organizations More choices Tons of Linux operating systems November 2011 2 What is Linux? 1. Contains

More information

Databázy (1) Prednáška 11. Alexander Šimko

Databázy (1) Prednáška 11. Alexander Šimko Databázy (1) Prednáška 11 Alexander Šimko simko@fmph.uniba.sk Contents I Aktualizovanie štruktúry databázy Section 1 Aktualizovanie štruktúry databázy Aktualizácia štruktúry databázy Štruktúra databázy

More information

User Management. lctseng

User Management. lctseng User Management lctseng ID User ID, Group ID % id lctseng uid=10554(lctseng) gid=1130(cs) groups=1130(cs),0(wheel),2000(taever),2012(security) % id 10047 Same as above Super user (defined by uid = 0) root

More information

Chapter 6 Adding New Users

Chapter 6 Adding New Users Chapter 6 Adding New Users Steps to add a new user 1. Edit the password and group files > vipw 2. Set an initial password > passwd chwong 3. Set quota > edquota [ u] chwong 4. Create user home directory

More information

Commands are in black

Commands are in black Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin

More information

Chapter 5: User Management. Chapter 5 User Management

Chapter 5: User Management. Chapter 5 User Management Chapter 5: User Management Chapter 5 User Management Last revised: 20/6/2004 Chapter 5 Outline In this chapter we will learn Where user and group account information is stored How to manage user accounts

More information

8 User Administration

8 User Administration 8 User Administration CERTIFICATION OBJECTIVES 8.01 User Account Management 8.02 Administrative Control 8.03 User and Shell Configuration 8.04 Users and Network Authentication 8.05 Special Groups Two-Minute

More information

kucharka exportu pro 9FFFIMU

kucharka exportu pro 9FFFIMU požiadavky na export kodek : Xvid 1.2.1 stable (MPEG-4 ASP) // výnimočne MPEG-2 bitrate : max. 10 Mbps pixely : štvorcové (Square pixels) rozlíšenie : 1920x1080, 768x432 pre 16:9 // výnimočne 1440x1080,

More information

Ochrana proti DDoS za použitia open-source software. Katarína Ďurechová

Ochrana proti DDoS za použitia open-source software. Katarína Ďurechová Ochrana proti DDoS za použitia open-source software Katarína Ďurechová katarina.durechova@nic.cz 30.11.2013 Distributed Denial of Service odopretie služby dosiahnutím limitu pripojenia sieťovej karty CPU

More information

Lab Authentication, Authorization, and Accounting

Lab Authentication, Authorization, and Accounting Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices

More information

MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG

MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG Terminals and keyboards have no uniform behavioral pattern. Terminal settings directly impact the keyboard operation.

More information

Project #3: Implementing NIS

Project #3: Implementing NIS Project #3: Implementing NIS NIS Daemons Limitations of NIS How We Will Use NIS NIS Domain Name NIS Software Setting Up NIS on it20 /etc/nsswitch.conf Creating New Accounts on Ubuntu /etc/passwd /etc/shadow

More information

Aplikačný dizajn manuál

Aplikačný dizajn manuál Aplikačný dizajn manuál Úvod Aplikačný dizajn manuál je súbor pravidiel vizuálnej komunikácie. Dodržiavaním jednotných štandardov, aplikácií loga, písma a farieb pri prezentácii sa vytvára jednotný dizajn,

More information

Course 144 Supplementary Materials. UNIX Fundamentals

Course 144 Supplementary Materials. UNIX Fundamentals Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should

More information

RHCE BOOT CAMP. The Boot Process. Wednesday, November 28, 12

RHCE BOOT CAMP. The Boot Process. Wednesday, November 28, 12 RHCE BOOT CAMP The Boot Process OVERVIEW The boot process gets a machine from the useless off state to the feature rich operating system we all know and love Requires cooperation between hardware and software

More information

Linux Essentials Objectives Topics:

Linux Essentials Objectives Topics: Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives

More information

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system...

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is the difference between home directory and working directory? Answer

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,

More information

Booting up and Shutting down A primer for troubleshooting

Booting up and Shutting down A primer for troubleshooting Booting up and Shutting down A primer for troubleshooting In this section, we touch upon the startup and shutdown process on Linux. It is beyond the scope of this course to cover this topic in depth and

More information

RedHat. Rh202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)

RedHat. Rh202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) RedHat Rh202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) http://killexams.com/exam-detail/rh202 QUESTION: 156 Who ever creates the files/directories on /data group owner should be automatically

More information

Súborový systém. Základné pojmy Prístupové práva Atribúty Kvóty ACL Kryptografia Diskové oddiely

Súborový systém. Základné pojmy Prístupové práva Atribúty Kvóty ACL Kryptografia Diskové oddiely Súborový systém Základné pojmy Prístupové práva Atribúty Kvóty ACL Kryptografia Diskové oddiely Bezpečnosť počítačových systémov / Súborový systém DB, FIIT STU BA, 2009 2011 1 Súborový systém Poskytuje

More information

Linux Kung Fu. Ross Ventresca UBNetDef, Fall 2017

Linux Kung Fu. Ross Ventresca UBNetDef, Fall 2017 Linux Kung Fu Ross Ventresca UBNetDef, Fall 2017 GOTO: https://apps.ubnetdef.org/ What is Linux? Linux generally refers to a group of Unix-like free and open source operating system distributions built

More information

System Administration. Startup Process

System Administration. Startup Process System Administration Startup Process Why Care? Every process on your system comes about by following a specific chain of events from the machine startup You may want to disable processes You may want

More information

RH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)

RH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) RedHat RH-202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Download Full Version : https://killexams.com/pass4sure/exam-detail/rh-202 QUESTION: 159 Install the dialog-* Questions asking

More information

Exam Linux-Praxis - 1 ( From )

Exam Linux-Praxis - 1 ( From  ) Exam Linux-Praxis - 1 ( From http://www.linux-praxis.de ) (1)Which of the following commands results in mailing the content of the current directory to Bob? A. mail Bob < ls B. ls > mail Bob C. ls mail

More information

Please choose the best answer. More than one answer might be true, but choose the one that is best.

Please choose the best answer. More than one answer might be true, but choose the one that is best. Introduction to Linux and Unix - endterm Please choose the best answer. More than one answer might be true, but choose the one that is best. SYSTEM STARTUP 1. A hard disk master boot record is located:

More information

TP-LINK 150Mbps Wireless AP/Client Router Model TL-WR743ND Rýchly inštalačný sprievodca

TP-LINK 150Mbps Wireless AP/Client Router Model TL-WR743ND Rýchly inštalačný sprievodca TP-LINK 150Mbps Wireless AP/Client Router Model TL-WR743ND Rýchly inštalačný sprievodca Obsah balenia TL-WR743ND Rýchly inštalačný sprievodca PoE injektor Napájací adaptér CD Ethernet kábel Systémové požiadavky

More information

Linux Kung-Fu. James Droste UBNetDef Fall 2016

Linux Kung-Fu. James Droste UBNetDef Fall 2016 Linux Kung-Fu James Droste UBNetDef Fall 2016 $ init 1 GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org

More information

UNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan

UNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan UNIT V UNIX SYSTEM COMMUNICATION Dr.T.Logeswari 1 Electronic mail or email is easiest way of communication on unix. Fast and cheap Used to exchange graphics, sound and video files 2 3 Elements of a communication

More information

Using grub to Boot various Operating Systems

Using grub to Boot various Operating Systems Operating Systems and Systems Integration Using grub to Boot various Operating Systems Contents 1 Aim 2 2 What You Will Do 2 3 Background 2 3.1 Installing grub in MBR from a floppy, and from the OS........

More information

User Accounts. The Passwd, Group, and Shadow Files

User Accounts. The Passwd, Group, and Shadow Files User Accounts The Passwd, Group, and Shadow Files We'll start with the passwd (pronounced "password") file, located at /etc/passwd. This file holds information about all of the user accounts on the system.

More information

How to Secure RHEL 6.2 Part 1

How to Secure RHEL 6.2 Part 1 How to Secure RHEL 6.2 Part 1 Motivation This paper will be a multi-part series on securing Redhat Enterprise Linux 6.2. This idea has been toiling around my head for almost a year and now is the time

More information

UNIT 10 Ubuntu Security

UNIT 10 Ubuntu Security AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT 10 Ubuntu Security Learning Objectives Participants will understand how to configure major components of Linux/Ubuntu Account

More information

CSE/ISE 311: Systems Administra5on Managing Users and Groups

CSE/ISE 311: Systems Administra5on Managing Users and Groups Managing Users and Groups Por$ons courtesy Ellen Liu Outline What cons$tutes a user? /etc/passwd, /etc/shadow, /etc/group files User management tools Adding users: basic steps, automa$on, bulk Removing

More information

LDAP Authentication In Linux

LDAP Authentication In Linux By Dariusz Dwornikowski Published: 2006-08-24 12:02 LDAP Authentication In Linux This howto will show you howto store your users in LDAP and authenticate some of the services against it. I will not show

More information

Spôsoby zistenia ID KEP

Spôsoby zistenia ID KEP Spôsoby zistenia ID KEP ID KEP (kvalifikovaný elektronický podpis) je možné zistiť pomocou napr. ovládacieho panela, prostredíctvom prehliadača Internet Expolrer, Google Chrome alebo Mozilla Firefox. Popstup

More information

Outline. UNIX security ideas Users and groups File protection Setting temporary privileges. Examples. Permission bits Program language components

Outline. UNIX security ideas Users and groups File protection Setting temporary privileges. Examples. Permission bits Program language components UNIX security Ulf Larson (modified by Erland Jonsson/Magnus Almgren) Computer security group Dept. of Computer Science and Engineering Chalmers University of Technology, Sweden Outline UNIX security ideas

More information

Linux Kung Fu. Stephen James UBNetDef, Spring 2017

Linux Kung Fu. Stephen James UBNetDef, Spring 2017 Linux Kung Fu Stephen James UBNetDef, Spring 2017 Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and

More information

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions Welcome to getting started with Ubuntu 12.04 Server. This System Administrator Manual guide to be simple to follow, with step by step instructions with screenshots INDEX 1.Installation of Ubuntu 12.04

More information

Základy Linuxu -1- Používateľské prostredia operačných systémov - Linux (prednášky)

Základy Linuxu -1- Používateľské prostredia operačných systémov - Linux (prednášky) Základy Linuxu -1- Používateľské prostredia operačných systémov - Linux (prednášky) Obsah Základy Linuxu -2- Obsah 1. Úvod do používateľských rozhraní operačných systémov... 7 1.1. Vývoj operačných systémov...

More information

1Z Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions

1Z Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions 1Z0-100 Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-100 Exam on Oracle Linux 5 and 6 System Administration2 Oracle 1Z0-100 Certification

More information

Basic Linux Security. Roman Bohuk University of Virginia

Basic Linux Security. Roman Bohuk University of Virginia Basic Linux Security Roman Bohuk University of Virginia What is Linux? An open source operating system Project started by Linus Torvalds kernel Kernel: core program that controls everything else (controls

More information

OS Security. Authentication. Radboud University Nijmegen, The Netherlands. Winter 2014/2015

OS Security. Authentication. Radboud University Nijmegen, The Netherlands. Winter 2014/2015 OS Security Authentication Radboud University Nijmegen, The Netherlands Winter 2014/2015 What does an OS do? Definition An operating system (OS) is a computer program that manages access of processes (programs)

More information

Presented by Bill Genske Gary Jackson

Presented by Bill Genske Gary Jackson Quintessential School Systems Session C Linux Presented by Bill Genske Gary Jackson Copyright Quintessential School Systems, 2009 All Rights Reserved 867 American Street --- Second Floor --- San Carlos,

More information

Runlevels, System Shutdown and Reboot

Runlevels, System Shutdown and Reboot Information These notes were originally written in the year 2000 as part of a set of LPI Exam 101 training materials. The LPI training course at Bromley College was subsequently discontinued and some of

More information

Introduction. What is Linux? What is the difference between a client and a server?

Introduction. What is Linux? What is the difference between a client and a server? Linux Kung Fu Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and open-source operating system distributions

More information

Oracle 1Z Enterprise Linux System Administration. Download Full Version :

Oracle 1Z Enterprise Linux System Administration. Download Full Version : Oracle 1Z0-403 Enterprise Linux System Administration Download Full Version : http://killexams.com/pass4sure/exam-detail/1z0-403 B. It does not provide any protection to remote X connections. C. It allows

More information

CS/CIS 249 SP18 - Intro to Information Security

CS/CIS 249 SP18 - Intro to Information Security Lab assignment CS/CIS 249 SP18 - Intro to Information Security Lab #2 - UNIX/Linux Access Controls, version 1.2 A typed document is required for this assignment. You must type the questions and your responses

More information

Databázové systémy. SQL Window functions

Databázové systémy. SQL Window functions Databázové systémy SQL Window functions Scores Tabuľka s bodmi pre jednotlivých študentov id, name, score Chceme ku každému doplniť rozdiel voči priemeru 2 Demo data SELECT * FROM scores ORDER BY score

More information

University of Pennsylvania Zachary Goldberg. CIS c. More Kernel Bits. 10/03/09 Slide 1

University of Pennsylvania Zachary Goldberg. CIS c. More Kernel Bits. 10/03/09 Slide 1 More Kernel Bits 10/03/09 Slide 1 Rebooting Why would one ever need to reboot on Linux? Installing new driver?... (No) Installing new applications?... (No) Installing new... Anything?... (No) Reconfiguring...

More information

Bezpečnosť webovských aplikácií (2. časť)

Bezpečnosť webovských aplikácií (2. časť) Bezpečnosť webovských aplikácií (2. časť) Richard Ostertág Katedra informatiky FMFI UK, Bratislava ostertag@dcs.fmph.uniba.sk 2011/12 R. Ostertág (KI FMFI UK) Bezpečnosť webovských aplikácií (2) 1 / 14

More information

CST8177 Linux II. Linux Boot Process

CST8177 Linux II. Linux Boot Process CST8177 Linux II Linux Boot Process Reference information from the text, http://www.linuxdoc.org and several other web sites Linux Boot Process Topics covered in this slide-set Basic definition of the

More information

CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ]

CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ] s@lm@n CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ] CompTIA LX0-102 : Practice Test Topic break down Topic No. of Questions Topic 1: Volume A 60 Topic 2: Volume B 59 Topic 3:

More information

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity

More information

PL-I Assignment Broup B-Ass 5 BIOS & UEFI

PL-I Assignment Broup B-Ass 5 BIOS & UEFI PL-I Assignment Broup B-Ass 5 BIOS & UEFI Vocabulary BIOS = Basic Input Output System UEFI = Unified Extensible Firmware Interface POST= Power On Self Test BR = Boot Record (aka MBR) BC =Boot Code (aka

More information

Súborový systém. Ing. Viliam Solčány, PhD. ZS 2011/2012. Viliam Solčány, FIIT STU Bratislava Operačné systémy 2011/12 Predn.

Súborový systém. Ing. Viliam Solčány, PhD. ZS 2011/2012. Viliam Solčány, FIIT STU Bratislava Operačné systémy 2011/12 Predn. Súborový systém Ing. Viliam Solčány, PhD. ÓÐ ÒÝ Øº ØÙ º ZS 2011/2012 Viliam Solčány, FIIT STU Bratislava Operačné systémy 2011/12 Predn. 12 1 / 42 Osnova Viliam Solčány, FIIT STU Bratislava Operačné systémy

More information

Operating Systems Lab 1 (Users, Groups, and Security)

Operating Systems Lab 1 (Users, Groups, and Security) Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,

More information

02. At the command prompt, type usermod -l bozo bozo2 and press Enter to change the login name for the user bozo2 back to bozo. => steps 03.

02. At the command prompt, type usermod -l bozo bozo2 and press Enter to change the login name for the user bozo2 back to bozo. => steps 03. Laboratory Exercises: ===================== Complete the following laboratory exercises. All steps are numbered but not every step includes a question. You only need to record answers for those steps that

More information

SLES High Level Design. Version 1.10

SLES High Level Design. Version 1.10 SLES High Level Design Version 1.10 1 SuSE and its logo are registered trademarks of SuSE AG. IBM, the IBM logo, and xseries are trademarks or registered trademarks of International Business Machines Corporation

More information

Oracle. Oracle Solaris 11 System Administration. 1z Version: Demo. [ Total Questions: 10] Web:

Oracle. Oracle Solaris 11 System Administration. 1z Version: Demo. [ Total Questions: 10] Web: Oracle 1z0-821 Oracle Solaris 11 System Administration Version: Demo [ Total Questions: 10] Web: www.marks4sure.com Email: support@marks4sure.com IMPORTANT NOTICE Feedback We have developed quality product

More information

Certification. System Initialization and Services

Certification. System Initialization and Services Certification System Initialization and Services UNIT 3 System Initialization and Services UNIT 3: Objectives Upon completion of this unit the student should be able to: Describe BIOS functions with respect

More information

VYLEPŠOVANIE KONCEPTU TRIEDY

VYLEPŠOVANIE KONCEPTU TRIEDY VYLEPŠOVANIE KONCEPTU TRIEDY Typy tried class - definuje premenné a metódy (funkcie). Ak nie je špecifikovaná inak, viditeľnosť členov je private. struct - definuje premenné a metódy (funkcie). Ak nie

More information

User Management. Lctseng, arr. by pschiu

User Management. Lctseng, arr. by pschiu User Management Lctseng, arr. by pschiu ID q User ID, Group ID % id lctseng (ID Name) Ø uid=10554(lctseng) gid=1130(cs) groups=1130(cs),0(wheel),2000(taever),2012(security) % id 10047 (UID) Ø Same as above

More information

[ Terminal ] [ Users management ] Alt +F6 = Terminal switcher. useradd [option] JohnG

[ Terminal ] [ Users management ] Alt +F6 = Terminal switcher. useradd [option] JohnG [ Terminal ] Alt +F6 = Terminal switcher [ Users management ] useradd [option] JohnG -d : to assign homedirectory -u : to assign UID -s : to set shell -g : to assign group ID ex) Linux# useradd JohnG -d

More information

More on file systems, Booting Todd Kelley CST8177 Todd Kelley 1

More on file systems, Booting Todd Kelley CST8177 Todd Kelley 1 More on file systems, Booting Todd Kelley kelleyt@algonquincollege.com CST8177 Todd Kelley 1 bind mounts quotas Booting process and SysVinit Installation Disk rescue mode 2 A bind mount is used to mount

More information

The Samba-3: Overview, Authentication, Integration

The Samba-3: Overview, Authentication, Integration The Samba-3: Overview, Authentication, Integration John H Terpstra, CTO PrimaStasys Inc. jht@primastasys.com or jht@samba.org Slide 1 About the speaker Long term Samba-Team member Author of official Samba

More information

Riešenia a technológie pre jednotnú správu používateľov

Riešenia a technológie pre jednotnú správu používateľov Riešenia a technológie pre jednotnú správu používateľov Radovan Semančík Agenda Úvod: Identity Crisis Technológie správy používateľov Postup nasadenia Záver Súčasný stav IT Security Nekonzistentné bezpečnostné

More information

Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000)

Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) armahmood786@yahoo.com alphasecure@gmail.com alphapeeler.sf.net/pubkeys/pkey.htm http://alphapeeler.sourceforge.net pk.linkedin.com/in/armahmood

More information

Lab 3a Using the vi editor

Lab 3a Using the vi editor Lab 3a Using the vi editor Objectives: Become familiar with the vi Editor Review the three vi Modes Review keystrokes to move between vi modes Create a new file with vi Editor Invoke vi with show mode

More information

DirectControl and RSA SecurID

DirectControl and RSA SecurID WHITE PAPER CENTRIFY CORP. DirectControl and RSA SecurID NOV 2010 Enabling Active Directory users to authenticate to Unix/Linux using SecurID tokens ABSTRACT This document describes the steps necessary

More information

The Linux IPL Procedure

The Linux IPL Procedure The Linux IPL Procedure SHARE - Tampa February 13, 2007 Session 9274 Edmund MacKenty Rocket Software, Inc. Purpose De-mystify the Linux boot sequence Explain what happens each step of the way Describe

More information

Rýchlosť Mbit/s (download/upload) 15 Mbit / 1 Mbit. 50 Mbit / 8 Mbit. 80 Mbit / 10 Mbit. 10 Mbit / 1 Mbit. 12 Mbit / 2 Mbit.

Rýchlosť Mbit/s (download/upload) 15 Mbit / 1 Mbit. 50 Mbit / 8 Mbit. 80 Mbit / 10 Mbit. 10 Mbit / 1 Mbit. 12 Mbit / 2 Mbit. Fiber 5 Mbit ** 5 Mbit / Mbit 5,90 Fiber 50 Mbit * 50 Mbit / 8 Mbit 9,90 Fiber 80 Mbit * 80 Mbit / Mbit 5,90 Mini Mbit* Mbit / Mbit 9,90 Klasik 2 Mbit* 2 Mbit / 2 Mbit Standard 8 Mbit* 8 Mbit / 3Mbit Expert

More information

Accurate study guides, High passing rate! IT TEST BOOK QUESTION & ANSWER. Ittestbook provides update free of charge in one year!

Accurate study guides, High passing rate! IT TEST BOOK QUESTION & ANSWER. Ittestbook provides update free of charge in one year! IT TEST BOOK QUESTION & ANSWER Ittestbook provides update free of charge in one year! Accurate study guides, High passing rate! Exam : RH133 Title : Red Hat Linux System Administration Version : Demo 1

More information

MIS Week 10. Operating System Security. Unix/Linux basics

MIS Week 10. Operating System Security. Unix/Linux basics MIS 5170 Operating System Security Week 10 Unix/Linux basics Tonight s Plan 2 Questions from Last Week Review on-line posts In The News Download Kali Install Kali Unix/Linux Basics Scripting Appropriate

More information

RH133. Red Hat Linux System Administration

RH133. Red Hat Linux System Administration RH133 Red Hat Linux System Administration Version 3.5 QUESTION NO: 1 RH133 John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root

More information

grub-md5-crypt --help Usage: grub-md5-crypt [OPTION] Encrypt a password in MD5 format.

grub-md5-crypt --help Usage: grub-md5-crypt [OPTION] Encrypt a password in MD5 format. (OS Hardening). Minimal.1. grub.2..3. DVD Update.4. root ssh.5 kernel grub kernel.6. comment vi /etc/grub.conf # grub.conf generated by anaconda # # Note that you do not have to rerun grub after making

More information

Manuál k programu FileZilla

Manuál k programu FileZilla Manuál k programu FileZilla EXO TECHNOLOGIES spol. s.r.o. Garbiarska 3 Stará Ľubovňa 064 01 IČO: 36 485 161 IČ DPH: SK2020004503 support@exohosting.sk www.exohosting.sk 1 Úvod EXO HOSTING tím pre Vás pripravil

More information

OS Security. Authentication. Radboud University Nijmegen, The Netherlands. Winter 2014/2015

OS Security. Authentication. Radboud University Nijmegen, The Netherlands. Winter 2014/2015 OS Security Authentication Radboud University Nijmegen, The Netherlands Winter 2014/2015 What does an OS do? Definition An operating system (OS) is a computer program that manages access of processes (programs)

More information