NCSA Security R&D Last Updated: 11/03/2005

Size: px
Start display at page:

Download "NCSA Security R&D Last Updated: 11/03/2005"

Transcription

1 Stage Design Project: Community Accounts Stage #1: Accounts NCSA Security R&D Last Updated: 11/03/2005 Summary The Accounts stage of the Community Accounts project consists of creating all tools necessary for implementation of a community account on a UNIX-like system. These utilities will be highly configurable to facilitate a wide variety of possible implementation styles. This stage of the project does not encompass concerns such as long-term storage and job auditing. Please see the Community Accounts Stages document for an overview of all stages involved in this project. Deliverables 1. A suite of chroot environment management utilities 2. A community shell application 3. A community environment management utility 4. A combined package in source and binary formats 5. A GRAM patch to execute jobs through the user's shell People Von Welch <vwelch@ncsa.uiuc.edu> Kevin Price <kjprice@ncsa.uiuc.edu> Project Manager Designer; Programmer Deliverable #1: A suite of chroot environment management utilities. The chroot_jail suite of utilities can create, manipulate, and remove chroot jail environments. Also included will be an init.d-style script that can properly mount filesystems into jail environments (including special filesystems, such as proc, devfs, and devptsfs), as well as a daemon that can repeat a jail's /dev/log into the root /dev/log for proper syslog logging. See attachment #1: Detailed list of jail utilities and parameters. Jail creation and management utilities are necessary because creation of a properly configured jail environment is a non-trivial task. For example, shared libraries must be included correctly, the /etc of the jailed environment must be configured correctly, and certain shared libraries that are not specifically dependencies of any binaries must be included for some general UNIX functions to work correctly. Additionally, certain Project Deliverables 1 of 18

2 conditions (such as setuid root binaries) must be avoided in order to keep the jailed environment secure. See attachment #2: Required tasks and security concerns for jail creation. These utilities use a database to track dependencies so that files can be easily added and removed from the jail. The means of storing this database will be configurable. Commonly used SQL-driven database environments (such as MySQL, Postgres, and Oracle), as well as for DBM-style file-based databases will be supported. See attachment #3: Database structure for jail dependency management. Configuration files for all jails (as well as any global options) reside in /etc/jails by default, but a different location can be specified at compile-time. It should be noted that utilities already exist to generate jail environments, such as jailkit and vserver, however these applications do not allow for the wide variety of configuration and management options, nor are they as widely supported among UNX systems. The chroot_jail suite will function on any UNIX system with perl 5.8 installed. Deliverable #2: A community shell application. The commsh general-purpose community shell includes the abilities to perform a change root (chroot) operation upon startup; create a dynamic account (by setting the user's uid to a dynamically allocated uid); directly launch a command from a configurable list of valid commands; and launch a more conventional (or restricted) shell. Each of these options is fully configurable. All logging takes place using the syslog logging mechanism. See attachment #4: commsh flow diagram. Configuration takes place by parsing /etc/commsh.conf (although a different default configuration location can be specified at compile-time) for a set of configuration directives. Two of these directives allow you to load additional configuration files (optionally based on the community user running the shell.) If a directive that takes only one value appears twice, the latter value will overwrite any prior values. See attachment #5: commsh configuration directives. Of particular note are the dynamic account options. If enabled, commsh has the ability to manage a range of valid uid values that it will assign to sessions dynamically. Each dynamic account instantiation can create a copy of a template home directory, and will expire and be automatically removed after a configurable length of time has passed. Also, if configured a specific uid can be selected at login time, allowing a user to re-use a dynamic account for multiple sessions. Expired dynamic accounts can either be reaped on every run of commsh (if configured), or they can be reaped by running commsh --reap at any time (such as from a cron job). Certain options, such as changed root environments and dynamic accounts, are only available if the commsh binary is setuid root. If the binary is not setuid root, Project Deliverables 2 of 18

3 configuration directives related to these options will be ignored. The setuid root bit is dropped immediately after selecting a dynamic uid and changing to a new root directory. Deliverable #3: A community environment management utility A simple shell-script utility facilitates generation of community shell environments. This script will generate configuration files, use the chroot_jail suite of utilities to create jailed environments (if desired), and make appropriate additions to /etc/passwd and /etc/group. This utility can generate multiple community accounts, and can be used later to manage these accounts. Deliverable #4: A combined package in source and binary formats The above utilities will be packaged and available as a combined package. This package will be available both in source format as a tarball, and in binary format in a variety of UNIX package styles. A combination of configure scripts and Makefiles will allow the package to be generated with different features enabled and disabled. Deliverable #5: A GRAM patch to execute jobs through the user's shell. It is unclear at this point exactly how this patch will need to be constructed. The most likely candidate appears to be modifications to fork_starter.c coupled with a new configuration parameter for globus-fork.conf. This parameter should be of the form "use_user_shell=true", and if set it should force fork_starter to execute commands through the user's defined shell. Assuming that all job managers do (or can be made to) use fork_starter when they launch jobs, this should function as desired. Further research into the GRAM execution flow and how it interacts with existing and potential new job schedulers is required. Notes This document, and all attachments included, should be considered as works in progress. They are neither definitive nor complete, and may change with final implementation. Some of the functionality implemented by these deliverables is already partially available in existing software. Examples of such include jailkit ( Linux- VServer ( and chrsh ( However, these utilities do not meet all requirements of this stage of the Community Accounts project. Where possible, we will utilize already existent code and ideas (with proper permission and citation) in the development of these utilities. Project Deliverables 3 of 18

4

5 Attachment #1: Detailed list of jail utilities: jail_create [-nedpl] [-fc FLATFILE] PATH NAME Create a fresh jail at the specified PATH, and give it the specified NAME. A database for this jail will be initialized. -n Add login library files (typically libnss) -e Add /etc login files (nsswitch.conf, passwd, shadow, group) -d Add common device (/dev/tty, /dev/null, et cetera) -l Use hard links if possible -p Preserve original owner and permissions if possible -f Create the jail using FLATFILE, which should be the same format saved by jail_archive or jail_destroy. If used in conjunction with -n or -d, the login libraries and/or devices take precedence over FLATFILE -c Check for any addition dependencies for files added with -f. Without this option, it is assumed that the dependency information contained by FLATFILE is completely correct jail_add [-qlrp] NAME/PATH FILE/PATH [FILE/PATH...] jail_add [-qlrp] NAME/PATH --manifest MANIFEST jail_add [-qlp] NAME/PATH FILE/PATH --depend FILE... Add one or more files to a given jail, specified either by NAME or by PATH. -q Do not add dependencies -l Use hard links if possible -p Preserve original owner and permissions if possible -r If any of the arguments are a path, add them recursively --manifest Specifies a manifest file that contains a list of files and paths to add. --depend Force dependencies on a file. This can also be used to add a dependency to a file that already exists within the jail. These dependencies will be added even if -q is specified. Attachment #1: Detailed list of jail utilities 5 of 18

6 jail_rm [-qr] NAME/PATH FILE/PATH [FILE/PATH...] jail_rm [-qr] NAME/PATH --manifest MANIFEST Works as jail_add, but instead removes files from the given jail. By default, dependencies that are no longer necessary are also removed from the jail. -q Do not remove any dependencies -r Recursively remove subdirectories of non-empty directories --manifest Specifies a manifest file that contains a list of files and paths to remove. jail_destroy [-k] [-d FLATFILE] [-tzb TARBALL] NAME/PATH Completely remove a jail from the system. By default, all files will be deleted, the database tables will be dropped, and all metadata will be removed. -k Do not delete physical files -d Save a copy of the database in FLATFILE -t Archive all files to TARBALL before deleting -z Compress the tarball using gzip if available -b Compress the tarball using bzip2 if available, defaults to -z if not jail_archive [-zb] NAME/PATH FLATFILE TARBALL Archive a jail. The dependency database will be written to FLATFILE, and the physical files will be tarred up and saved as TARBALL. -z Compress the tarball using gzip if available -b Compress the tarball using bzip2 if available, defaults to -z if not jail_restore NAME/PATH FLATFILE TARBALL Restore an archived database. If the database exists, it will be emptied and then restored from the saved copy. If the database does not exist, it will be initialized and then restored. FLATFILE and TARBALL should both be in the same format created by jail_archive or jail_destroy. Compression of the tarball is automatically detected. Attachment #1: Detailed list of jail utilities 6 of 18

7 jail_mount [-u] [NAME/PATH [NAME/PATH...]] Mount all mount points listed in the /etc/mtab files of the specified jails. If no jails are listed, this action will be performed on all jails. This is especially useful in mounting special dev and proc file systems. -u Unmount all mount points instead jail_syslogd [-l LOG] [-r RLOG] [NAME/PATH [NAME/PATH...]] jail_syslogd [-h -k] Launch a daemon that listens to /dev/log on the specified jails (or all jails, if no list is given) and repeats what it hears to the root /dev/log. It should be noted that most syslogd daemons could be configured directly to listen to all of these /dev/log files simultaneously, so this utility is not strictly needed in all environments. -l Listen to LOG inside of the specified jails -r Repeat to RLOG in the root file system -h Send all jail_syslogd processes the HUP (restart) signal -k Send all jail_syslogd processes the TERM (terminate) signal Attachment #1: Detailed list of jail utilities 7 of 18

8

9 Attachment #2: Required tasks and security concerns for jail creation: Required tasks: A new directory structure must be created, including (at a minimum) /bin, /lib, /etc and other such directories. Certain /etc files must be created or copied into the jail for authentication to be successful. Exactly which files depend on the platform, but typically nsswitch.conf, passwd, group and shadow are minimally required. Other possible files include host and mtab. Certain shared libraries must be copied into the jail for authentication to be successful. Exactly which files depend on the platform, but typically libnss is minimally required. All desired applications must be copied into the directory structure. Dependency information must be determined for these applications, and all dependencies must also be copied o Types of dependencies include: Shared libraries (determined by ld.so or equivalent) Interpreters/shells (determined by #! at start of application) If the jail includes any mounts (such as special dev or proc file systems), an init script must be added to the startup scripts that mounts these devices/shares. Either the system's syslog daemon must be configured to read from the jail's /dev/log, or a log repeater daemon must be configured and set to run at system boot Security concerns: There must be no setuid root binaries within the jailed directory. Libraries and binaries (especially libc) should be owned by root with permissions set so that no other user can modify them. There should be no devices allowing a user within the jailed environment direct access to memory or any hard drive, especially the root partition. Compilers should not be included within the jailed directory unless absolutely necessary. Likewise, powerful scripting languages (such as perl) should be avoided unless necessary. Attachment #2: Required tasks and security concerns for jail creation 9 of 18

10

11 Attachment #3: Database structure for jail dependency management: // An entry in this table represents a file included in the // jail. Also recorded is whether or not the file was // included explicitly or is only a dependency for another // file. (This information is used to intelligently remove // dependencies as appropriate.) TABLE files { integer id primary key, } varchar(1024) file_name, bool explicit // root-system path to file // included explicitly or as // a dependency? // Each entry in this table represents the dependency of // one file upon another. If nothing depends on a file that // was not included explicitly, then it should be removed // from the jail. TABLE dependencies { integer id primary key, } integer file_id references files.id, integer depends_on reference files.id // depender // dependee Attachment #3: Database structure for jail dependency management 11 of 18

12

13 Attachment #4: commsh flow diagram: Attachment #4: commsh flow diagram 13 of 18

14

15 Attachment #5: commssh configuration directives: Configuration will be read from /etc/commsh.conf by default, but this can be changed at compile time. Lines in the configuration file will be of the form: Directive PARAMETER PARAMETER... Blank lines and comments (lines beginning with a hash (#)) will be ignored. For each path, file or shell parameter, a tilde (~) will expand to the home path of the user as defined in /etc/passwd (or other authoritative user information repository). The following configuration directives will be supported: General ReadConfig FILE Reads the configuration file found at FILE. Note that tildes in FILE are expanded. ReadUserConfig UID/USERNAME FILE Read the configuration file found at FILE, but only if the real uid or user name matches UID/USERNAME. As above, tildes in FILE are expanded. CacheInformation PATH Specifies the location used to store management information for temporary user IDs and other shell extensions. By default, /var/cache/commsh/ is used. Change Root ChangeRoot [PATH] Change root to PATH before proceeding. If PATH is not specified, ~ is assumed. CheckRootSecurity LEVEL Specify the level of security checking performed before changing root to a new path. LEVEL is a numeric value that indicates the degree of checking, with lower numbers being less secure. By default, this is set to 2, and can range from 0 (no checking) to 4 (complete checking). If ChangeRoot is enabled and the path specified does not pass this security check, the login will fail. Attachment #5: commsh configuration directives 15 of 18

16 Dynamic Accounts AssignDynamicUID MIN MAX Enable assignment of a dynamic uid to the user. The range of allowed uids is [MIN, MAX] (inclusive). If you begin either MIN or MAX with a + or sign, then the uid range will be determined by adding MIN or MAX to the actual uid of the user. For example, if the community account has uid 10000, then a range of [+1, +1000] would correlate to [10001, 11000]. If all dynamic uids are assigned, then further login attempts will fail until a uid is freed up. DynamicHome PATH Set the path to use as the home directory for a temporary account. A hash (#) character within the path will be replaced by the temporary uid assigned. PATH is relative to the new root, if the root was changed. DynamicTemplateHome PATH Set the path used as a template for the home directory of a dynamic account. This parameter has no effect unless DynamicHome has been set. If no template directory is specified, a dynamically generated home directory will be empty. DynamicShell SHELL Set the shell to launch when using a dynamic account. If this option is not specified, the shell of the original account will be used. Note that in the default case, the shell must be specified correctly within the new root path's /etc/passwd. If no shell can be determined, the login will fail. This directive has no effect if LaunchShell is not enabled. DynamicExpiration TIMESPAN Set the length of time until a dynamic account is deleted and the temporary uid is reclaimed. This is measured from logout. Accounts are not guaranteed to be deleted at this exact time, but they will be cleaned up on the next run of commsh --reap, or the next run of commsh if DynamicAutoReap is enabled. (See below: TIMESPANS) DynamicAutoReap [On/Off] Enable (or disable) automatic reaping of dynamic accounts. If enabled, commsh will try to reclaim any expired dynamic accounts every time it is run. If disabled, accounts will be reclaimed only when commsh --reap is run, or when no more dynamic accounts are available. By default, this directive will enable automatic reaping. Attachment #5: commsh configuration directives 16 of 18

17 AllowSpecificUID Allow assignment of a specific dynamic uid that may or may not already exist. If enabled, this allows for multiple connections to use the same dynamic account by specifying the uid at the beginning of the passed command line (preceded by a hash (#)). The uid specified is still required to fall within the range of allowed dynamic uids. This option has no effect of AssignTempUID is not enabled. SECURITY NOTE: This option, if enabled, poses a significant security risk if a gateway application allows an end-user to pass through an arbitrary command string. Gateway servers must be intelligent enough to strip a leading hash character off the start of a user-issued command. Access Methods DirectAccess CMD Grant direct access to a given CMD. This option has no effect if LaunchShell is enabled. (See below: COMMAND PARAMETERS) AllowSftp Allow access to files via sftp. The sftp subsystem will not be launched until after the root has been changed and the temporary UID has been assigned. It is therefore required that the sftp subsystem be installed inside of the new root path, if ChangeRoot is enabled. LaunchShell Enable execution of another shell. If enabled, after all authentication is completed the new user's shell will be launched. If disabled, only DirectAccess commands will be allowed. If LaunchShell is not enabled and no command is given, login will fail. The external shell must be listed in /etc/shells. PassCommandToShell Enable passing of commands to an external shell. If disabled, any commands passed to commsh will be discarded when another shell is launched. This has no effect if LaunchShell is not enabled. Attachment #5: commsh configuration directives 17 of 18

18 NOTES: TIMESPANS: A timespan can either be an English-style time span ("2 days"), or can be a number of minutes ("1440" would equate to "1 day"). COMMAND PARAMETERS: The command parameters used by the DirectAccess parameter conform to the following specifications: The command issued must match the specified command exactly. If command parameters are expected, they must be included explicitly in the format of the command. Wildcard matching is included, but wildcards will not match spaces. Optional parameters can be specified by enclosing them in brackets ([]). If a wildcarded parameter is preceded by a tilde (~), then only files in the user's home directory can be specified. A final parameter of ** specifies that the user can add any number of additional parameters to the end of the command. Examples: DirectAccess /bin/rbash Allow the user to launch a restricted bash environment without parameters DirectAccess /usr/bin/whoami [--*] Allow the user to execute whoami with an optional -- option DirectAccess /bin/cat ~* Allow the user to execute cat on any file in the user's home directory DirectAccess /usr/bin/jobmanager ** Allow the user to execute jobmanager with any parameters Attachment #5: commsh configuration directives 18 of 18

1Z Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions

1Z Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions 1Z0-100 Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-100 Exam on Oracle Linux 5 and 6 System Administration2 Oracle 1Z0-100 Certification

More information

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories Chapter Two Exploring the UNIX File System and File Security Lesson A Understanding Files and Directories 2 Objectives Discuss and explain the UNIX file system Define a UNIX file system partition Use the

More information

System Administration for Beginners

System Administration for Beginners System Administration for Beginners Week 5 Notes March 16, 2009 1 Introduction In the previous weeks, we have covered much of the basic groundwork needed in a UNIX environment. In the upcoming weeks, we

More information

Please choose the best answer. More than one answer might be true, but choose the one that is best.

Please choose the best answer. More than one answer might be true, but choose the one that is best. Introduction to Linux and Unix - endterm Please choose the best answer. More than one answer might be true, but choose the one that is best. SYSTEM STARTUP 1. A hard disk master boot record is located:

More information

5/8/2012. Creating and Changing Directories Chapter 7

5/8/2012. Creating and Changing Directories Chapter 7 Creating and Changing Directories Chapter 7 Types of files File systems concepts Using directories to create order. Managing files in directories. Using pathnames to manage files in directories. Managing

More information

Getting Started with Linux

Getting Started with Linux Getting Started with Linux For those with experience using Microsoft Windows there will be many familiar ways of operating in a Linux environment. There are also a few key differences. The main differences

More information

Linux Essentials Objectives Topics:

Linux Essentials Objectives Topics: Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives

More information

1Z Oracle Linux Fundamentals (Oracle Partner Network) Exam Summary Syllabus Questions

1Z Oracle Linux Fundamentals (Oracle Partner Network) Exam Summary Syllabus Questions 1Z0-409 Oracle Linux Fundamentals (Oracle Partner Network) Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-409 Exam on Oracle Linux Fundamentals (Oracle Partner Network)... 2 Oracle

More information

02. At the command prompt, type usermod -l bozo bozo2 and press Enter to change the login name for the user bozo2 back to bozo. => steps 03.

02. At the command prompt, type usermod -l bozo bozo2 and press Enter to change the login name for the user bozo2 back to bozo. => steps 03. Laboratory Exercises: ===================== Complete the following laboratory exercises. All steps are numbered but not every step includes a question. You only need to record answers for those steps that

More information

Course 55187B Linux System Administration

Course 55187B Linux System Administration Course Outline Module 1: System Startup and Shutdown This module explains how to manage startup and shutdown processes in Linux. Understanding the Boot Sequence The Grand Unified Boot Loader GRUB Configuration

More information

Contents in Detail. Acknowledgments

Contents in Detail. Acknowledgments Acknowledgments xix Introduction What s in This Book... xxii What Is Ethical Hacking?... xxiii Penetration Testing... xxiii Military and Espionage... xxiii Why Hackers Use Linux... xxiv Linux Is Open Source....

More information

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups. cameron.book Page 19 Monday, June 30, 2003 8:51 AM C H A P T E R 4 Users and Groups T his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and

More information

HP-UX System Administration Course Overview. Skills Gained. Who will the Course Benefit?

HP-UX System Administration Course Overview. Skills Gained. Who will the Course Benefit? HP-UX System Administration Course Overview This Hewlett Packard HP-UX System Administration training course is designed to give delegates practical experience in the administration of an HP-UX UNIX System.

More information

Manage Directories and Files in Linux. Objectives. Understand the Filesystem Hierarchy Standard (FHS)

Manage Directories and Files in Linux. Objectives. Understand the Filesystem Hierarchy Standard (FHS) Manage Directories and Files in Linux Objectives Understand the Filesystem Hierarchy Standard (FHS) Identify File Types in the Linux System Change Directories and List Directory Contents Create and View

More information

The Linux IPL Procedure

The Linux IPL Procedure The Linux IPL Procedure SHARE - Tampa February 13, 2007 Session 9274 Edmund MacKenty Rocket Software, Inc. Purpose De-mystify the Linux boot sequence Explain what happens each step of the way Describe

More information

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B::

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B:: Module Title Duration : 55187B: Linux System Administration : 4 days Overview This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional

More information

Basic UNIX system administration

Basic UNIX system administration Basic UNIX system administration CS 2204 Class meeting 14 *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright 2001-2003. System administration Thus far, we ve only discussed:

More information

Scratchbox Remote Shell

Scratchbox Remote Shell Scratchbox Remote Shell Timo Savola tsavola@movial.fi Scratchbox Remote Shell by Timo Savola Copyright 2004, 2005 Nokia Revision history Version: Author: Description: 2005-02-08 Savola Based on Device

More information

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions Welcome to getting started with Ubuntu 12.04 Server. This System Administrator Manual guide to be simple to follow, with step by step instructions with screenshots INDEX 1.Installation of Ubuntu 12.04

More information

client X11 Linux workstation

client X11 Linux workstation LPIC1 LPIC Linux: System Administrator LPIC 1 LPI command line LPIC-1 Linux LPIC-1 client X11 Linux workstation Unix GNU Linux Fundamentals Unix and its Design Principles FSF and GNU GPL - General Public

More information

CS Fundamentals of Programming II Fall Very Basic UNIX

CS Fundamentals of Programming II Fall Very Basic UNIX CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)

More information

RSYSLOGD(8) Linux System Administration RSYSLOGD(8)

RSYSLOGD(8) Linux System Administration RSYSLOGD(8) NAME rsyslogd reliable and extended syslogd SYNOPSIS rsyslogd [ 4 ][ 6 ][ A ][ d ][ D ][ f config file ] [ i pid file ][ l hostlist ][ n ][ N level ] [ q ][ Q ][ s domainlist ][ u userlevel ][ v ][ w ][

More information

Manual Shell Script Linux If File Exists Wildcard

Manual Shell Script Linux If File Exists Wildcard Manual Shell Script Linux If File Exists Wildcard This page shows common errors that Bash programmers make. If $file has wildcards in it (* or? or (), they will be expanded if there are files that match

More information

Herding Clones. Mike Kershaw August 17, urmk/

Herding Clones. Mike Kershaw August 17, urmk/ Herding Clones Mike Kershaw Michael.Kershaw@marist.edu August 17, 2004 1 Why? Computer Science department wanted to offer students their own servers for classwork which would be available for the entire

More information

"Charting the Course... MOC B: Linux System Administration. Course Summary

Charting the Course... MOC B: Linux System Administration. Course Summary Description Course Summary This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional Linux system administrator. The course covers

More information

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity

More information

Embedded System Design

Embedded System Design Embedded System Design Lecture 10 Jaeyong Chung Systems-on-Chips (SoC) Laboratory Incheon National University Environment Variables Environment variables are a set of dynamic named values that can affect

More information

The landscape. File hierarchy overview. A tree structure of directories The directory tree is standardized. But varies slightly among distributions

The landscape. File hierarchy overview. A tree structure of directories The directory tree is standardized. But varies slightly among distributions The landscape David Morgan File hierarchy overview A tree structure of directories The directory tree is standardized But varies slightly among distributions portions can spread across different partitions

More information

UNIX/Linux Auditing. Baccam Consulting, LLC Training Events

UNIX/Linux Auditing. Baccam Consulting, LLC Training Events UNIX/Linux Auditing Baccam Consulting, LLC tanya@securityaudits.org Training Events www.securityaudits.org/events.html ***CISSP Course being offered April 25-April 29, 2016 Copyright 2005-2016, Baccam

More information

UNIX System Administration

UNIX System Administration $!... 14:13 $$... 14:13.netrc...12:27-28 /etc/fstab... 6:25 /etc/hosts.equiv... 8:23 /etc/inittab Entries... 4:8 /etc/netmasks... 8:22 /etc/shells... 12:25 /home... 6:69 /tmp...6:61-67 /usr... 6:70 /var...

More information

CS 486 Capstone Project Software Design Specification (Revision 1.0) Submitted to Dr. Doerry

CS 486 Capstone Project Software Design Specification (Revision 1.0) Submitted to Dr. Doerry CS 486 Capstone Project Software Design Specification (Revision 1.0) Submitted to Dr. Doerry By Team Fugu: Erik Wilson Ben Atkin Nauman Qureshi Thad Boyd On March 15, 2004 Table of Contents 1. Introduction...1

More information

Paranoid Penguin rsync, Part I

Paranoid Penguin rsync, Part I Paranoid Penguin rsync, Part I rsync makes efficient use of the network by only transferring the parts of files that are different from one host to the next. Here's how to use it securely. by Mick Bauer

More information

Unix System Architecture, File System, and Shell Commands

Unix System Architecture, File System, and Shell Commands Unix System Architecture, File System, and Shell Commands Prof. (Dr.) K.R. Chowdhary, Director COE Email: kr.chowdhary@iitj.ac.in webpage: http://www.krchowdhary.com JIET College of Engineering August

More information

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot

More information

An Overview of Security in the FreeBSD Kernel. Brought to you by. Dr. Marshall Kirk McKusick

An Overview of Security in the FreeBSD Kernel. Brought to you by. Dr. Marshall Kirk McKusick An Overview of Security in the FreeBSD Kernel Brought to you by Dr. Marshall Kirk McKusick 2013 BSDCan Conference May 17, 2013 University of Ottawa Ottawa, Canada Copyright 2013 Marshall Kirk McKusick.

More information

CS 642 Homework #4. Due Date: 11:59 p.m. on Tuesday, May 1, Warning!

CS 642 Homework #4. Due Date: 11:59 p.m. on Tuesday, May 1, Warning! CS 642 Homework #4 Due Date: 11:59 p.m. on Tuesday, May 1, 2007 Warning! In this assignment, you will construct and launch attacks against a vulnerable computer on the CS network. The network administrators

More information

Creating Domain Templates Using the Domain Template Builder 11g Release 1 (10.3.6)

Creating Domain Templates Using the Domain Template Builder 11g Release 1 (10.3.6) [1]Oracle Fusion Middleware Creating Domain Templates Using the Domain Template Builder 11g Release 1 (10.3.6) E14139-06 April 2015 This document describes how to use the Domain Template Builder to create

More information

LINUX FUNDAMENTALS. Supported Distributions: Red Hat Enterprise Linux 6 SUSE Linux Enterprise 11 Ubuntu LTS. Recommended Class Length: 5 days

LINUX FUNDAMENTALS. Supported Distributions: Red Hat Enterprise Linux 6 SUSE Linux Enterprise 11 Ubuntu LTS. Recommended Class Length: 5 days LINUX FUNDAMENTALS The course is a challenging course that focuses on the fundamental tools and concepts of Linux and Unix. Students gain proficiency using the command line. Beginners develop a solid foundation

More information

bash Cookbook Carl Albing, JP Vossen, and Cameron Newham O'REILLY* ULB Darmstadt Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo

bash Cookbook Carl Albing, JP Vossen, and Cameron Newham O'REILLY* ULB Darmstadt Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo bash Cookbook Carl Albing, JP Vossen, and Cameron Newham ULB Darmstadt 16698210 O'REILLY* Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Preface 1. Beginnina bash 1.1 1.2 1.3 1.4 1.5 1.6

More information

Answers to Even- Numbered Exercises

Answers to Even- Numbered Exercises Answers to Even- 17 Numbered Exercises from page 1077 1. What option should you use with fsck if you want to review the status of your filesystems without making any changes to them? How does fsck determine

More information

22-Sep CSCI 2132 Software Development Lecture 8: Shells, Processes, and Job Control. Faculty of Computer Science, Dalhousie University

22-Sep CSCI 2132 Software Development Lecture 8: Shells, Processes, and Job Control. Faculty of Computer Science, Dalhousie University Lecture 8 p.1 Faculty of Computer Science, Dalhousie University CSCI 2132 Software Development Lecture 8: Shells, Processes, and Job Control 22-Sep-2017 Location: Goldberg CS 127 Time: 14:35 15:25 Instructor:

More information

Operating Systems. Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) alphapeeler.sf.net/pubkeys/pkey.htm

Operating Systems. Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) alphapeeler.sf.net/pubkeys/pkey.htm Operating Systems Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) armahmood786@yahoo.com alphasecure@gmail.com alphapeeler.sf.net/pubkeys/pkey.htm http://alphapeeler.sourceforge.net pk.linkedin.com/in/armahmood

More information

Linux & Shell Programming 2014

Linux & Shell Programming 2014 Unit -1: Introduction to UNIX/LINUX Operating System Practical Practice Questions: Find errors (if any) otherwise write output or interpretation of following commands. (Consider default shell is bash shell.)

More information

ADVANCED LINUX SYSTEM ADMINISTRATION

ADVANCED LINUX SYSTEM ADMINISTRATION Lab Assignment 1 Corresponding to Topic 2, The Command Line L1 Main goals To get used to the command line. To gain basic skills with the system shell. To understand some of the basic tools of system administration.

More information

PESIT Bangalore South Campus

PESIT Bangalore South Campus INTERNAL ASSESSMENT TEST - 2 Date : 20/09/2016 Max Marks : 0 Subject & Code : Unix Shell Programming (15CS36) Section : 3 rd Sem ISE/CSE Name of faculty : Prof Ajoy Time : 11:30am to 1:00pm SOLUTIONS 1

More information

Prerequisites: Students should be comfortable with computers. No familiarity with Linux or other Unix operating systems is required.

Prerequisites: Students should be comfortable with computers. No familiarity with Linux or other Unix operating systems is required. GL-120: Linux Fundamentals Course Length: 4 days Course Description: The GL120 is a challenging course that focuses on the fundamental tools and concepts of Linux and Unix. Students gain proficiency using

More information

Installation Instructions for SAS Foundation for UNIX Environments

Installation Instructions for SAS Foundation for UNIX Environments Installation Instructions for SAS 9.1.3 Foundation for UNIX Environments Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Installation Instructions

More information

Exam LFCS/Course 55187B Linux System Administration

Exam LFCS/Course 55187B Linux System Administration Exam LFCS/Course 55187B Linux System Administration About this course This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional

More information

Unix File System. Class Meeting 2. * Notes adapted by Joy Mukherjee from previous work by other members of the CS faculty at Virginia Tech

Unix File System. Class Meeting 2. * Notes adapted by Joy Mukherjee from previous work by other members of the CS faculty at Virginia Tech Unix File System Class Meeting 2 * Notes adapted by Joy Mukherjee from previous work by other members of the CS faculty at Virginia Tech Unix File System The file system is your interface to: physical

More information

Commands are in black

Commands are in black Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin

More information

Textual Description of webbioc

Textual Description of webbioc Textual Description of webbioc Colin A. Smith October 13, 2014 Introduction webbioc is a web interface for some of the Bioconductor microarray analysis packages. It is designed to be installed at local

More information

Operating Systems 2014 Assignment 4: File Systems

Operating Systems 2014 Assignment 4: File Systems Operating Systems 2014 Assignment 4: File Systems Deadline: Sunday, May 25 before 23:59 hours. 1 Introduction A disk can be accessed as an array of disk blocks, often each block is 512 bytes in length.

More information

Linux Interview Questions and Answers

Linux Interview Questions and Answers Linux Interview Questions and Answers You need to see the last fifteen lines of the files dog, cat and horse. What command should you use? tail -15 dog cat horse The tail utility displays the end of a

More information

3. When you process a largest recent earthquake query, you should print out:

3. When you process a largest recent earthquake query, you should print out: CS3114 (Fall 2013) PROGRAMMING ASSIGNMENT #1 Due Wednesday, September 18 @ 11:00 PM for 100 points Due Tuesday, September 17 @ 11:00 PM for 10 point bonus Updated: 9/11/2013 Assignment: This is the first

More information

Abstract. This is the MySQL OS X extract from the MySQL 5.6 Reference Manual. For legal information, see the Legal Notices.

Abstract. This is the MySQL OS X extract from the MySQL 5.6 Reference Manual. For legal information, see the Legal Notices. MySQL and OS X Abstract This is the MySQL OS X extract from the MySQL 5.6 Reference Manual. For legal information, see the Legal Notices. For help with using MySQL, please visit either the MySQL Forums

More information

Unix Filesystem. January 26 th, 2004 Class Meeting 2

Unix Filesystem. January 26 th, 2004 Class Meeting 2 Unix Filesystem January 26 th, 2004 Class Meeting 2 * Notes adapted by Christian Allgood from previous work by other members of the CS faculty at Virginia Tech Unix Filesystem! The filesystem is your interface

More information

Introduction. Secondary Storage. File concept. File attributes

Introduction. Secondary Storage. File concept. File attributes Introduction Secondary storage is the non-volatile repository for (both user and system) data and programs As (integral or separate) part of an operating system, the file system manages this information

More information

ENGR 3950U / CSCI 3020U (Operating Systems) Simulated UNIX File System Project Instructor: Dr. Kamran Sartipi

ENGR 3950U / CSCI 3020U (Operating Systems) Simulated UNIX File System Project Instructor: Dr. Kamran Sartipi ENGR 3950U / CSCI 3020U (Operating Systems) Simulated UNIX File System Project Instructor: Dr. Kamran Sartipi Your project is to implement a simple file system using C language. The final version of your

More information

G54ADM Sample Exam Questions and Answers

G54ADM Sample Exam Questions and Answers G54ADM Sample Exam Questions and Answers Question 1 Compulsory Question (34 marks) (a) i. Explain the purpose of the UNIX password file. (2 marks) ii. Why doesn t the password file contain passwords? (2

More information

UNIX files searching, and other interrogation techniques

UNIX files searching, and other interrogation techniques UNIX files searching, and other interrogation techniques Ways to examine the contents of files. How to find files when you don't know how their exact location. Ways of searching files for text patterns.

More information

Programming Standards: You must conform to good programming/documentation standards. Some specifics:

Programming Standards: You must conform to good programming/documentation standards. Some specifics: CS3114 (Spring 2011) PROGRAMMING ASSIGNMENT #3 Due Thursday, April 7 @ 11:00 PM for 100 points Early bonus date: Wednesday, April 6 @ 11:00 PM for a 10 point bonus Initial Schedule due Thursday, March

More information

Prerequisites: General computing knowledge and experience. No prior knowledge with Linux is required. Supported Distributions:

Prerequisites: General computing knowledge and experience. No prior knowledge with Linux is required. Supported Distributions: This course prepares students to take the 101 exam of the LPI level 1 certification. The Linux Professional Institute (LPI) is the go to certification body for vendor independent Linux certifications.

More information

Abstract. This is the MySQL OS X extract from the MySQL 5.7 Reference Manual. For legal information, see the Legal Notices.

Abstract. This is the MySQL OS X extract from the MySQL 5.7 Reference Manual. For legal information, see the Legal Notices. MySQL and OS X Abstract This is the MySQL OS X extract from the MySQL 5.7 Reference Manual. For legal information, see the Legal Notices. For help with using MySQL, please visit either the MySQL Forums

More information

5/20/2007. Touring Essential Programs

5/20/2007. Touring Essential Programs Touring Essential Programs Employing fundamental utilities. Managing input and output. Using special characters in the command-line. Managing user environment. Surveying elements of a functioning system.

More information

HP-UX System Administration

HP-UX System Administration HP-UX System Administration This intensive course is designed for experienced UNIX administrators who like to understand the differences between HP-UX and standard UNIX. It is essential that students have

More information

Server Edition. V8 Peregrine User Manual. for Linux and Unix operating systems

Server Edition. V8 Peregrine User Manual. for Linux and Unix operating systems Server Edition V8 Peregrine User Manual for Linux and Unix operating systems Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Red Hat is a registered trademark

More information

Essential Unix (and Linux) for the Oracle DBA. Revision no.: PPT/2K403/02

Essential Unix (and Linux) for the Oracle DBA. Revision no.: PPT/2K403/02 Essential Unix (and Linux) for the Oracle DBA Revision no.: PPT/2K403/02 Architecture of UNIX Systems 2 UNIX System Structure 3 Operating system interacts directly with Hardware Provides common services

More information

Chapter-3. Introduction to Unix: Fundamental Commands

Chapter-3. Introduction to Unix: Fundamental Commands Chapter-3 Introduction to Unix: Fundamental Commands What You Will Learn The fundamental commands of the Unix operating system. Everything told for Unix here is applicable to the Linux operating system

More information

GNU/Linux 101. Casey McLaughlin. Research Computing Center Spring Workshop Series 2018

GNU/Linux 101. Casey McLaughlin. Research Computing Center Spring Workshop Series 2018 GNU/Linux 101 Casey McLaughlin Research Computing Center Spring Workshop Series 2018 rccworkshop IC;3df4mu bash-2.1~# man workshop Linux101 RCC Workshop L101 OBJECTIVES - Operating system concepts - Linux

More information

Operating Systems 2015 Assignment 4: File Systems

Operating Systems 2015 Assignment 4: File Systems Operating Systems 2015 Assignment 4: File Systems Deadline: Tuesday, May 26 before 23:59 hours. 1 Introduction A disk can be accessed as an array of disk blocks, often each block is 512 bytes in length.

More information

IBM z Systems Development and Test Environment Tools User's Guide IBM

IBM z Systems Development and Test Environment Tools User's Guide IBM IBM z Systems Development and Test Environment Tools User's Guide IBM ii IBM z Systems Development and Test Environment Tools User's Guide Contents Chapter 1. Overview......... 1 Introduction..............

More information

Least-Privilege Isolation: The OKWS Web Server

Least-Privilege Isolation: The OKWS Web Server Least-Privilege Isolation: The OKWS Web Server Brad Karp UCL Computer Science CS GZ03 / M030 14 th December 2015 Can We Prevent All Exploits? Many varieties of exploits Stack smashing, format strings,

More information

Project #3: Implementing NIS

Project #3: Implementing NIS Project #3: Implementing NIS NIS Daemons Limitations of NIS How We Will Use NIS NIS Domain Name NIS Software Setting Up NIS on it20 /etc/nsswitch.conf Creating New Accounts on Ubuntu /etc/passwd /etc/shadow

More information

7. Archiving and compressing 7.1 Introduction

7. Archiving and compressing 7.1 Introduction 7. Archiving and compressing 7.1 Introduction In this chapter, we discuss how to manage archive files at the command line. File archiving is used when one or more files need to be transmitted or stored

More information

CS3114 (Fall 2013) PROGRAMMING ASSIGNMENT #2 Due Tuesday, October 11:00 PM for 100 points Due Monday, October 11:00 PM for 10 point bonus

CS3114 (Fall 2013) PROGRAMMING ASSIGNMENT #2 Due Tuesday, October 11:00 PM for 100 points Due Monday, October 11:00 PM for 10 point bonus CS3114 (Fall 2013) PROGRAMMING ASSIGNMENT #2 Due Tuesday, October 15 @ 11:00 PM for 100 points Due Monday, October 14 @ 11:00 PM for 10 point bonus Updated: 10/10/2013 Assignment: This project continues

More information

CNIT 121: Computer Forensics. 13 Investigating Mac OS X Systems

CNIT 121: Computer Forensics. 13 Investigating Mac OS X Systems CNIT 121: Computer Forensics 13 Investigating Mac OS X Systems Topics HFS+ and File System Analysis Hierarchical File System features: Nine Structures 1. Boot blocks 2. Volume header 3. Allocation file

More information

GNU CPIO September by Robert Carleton and Sergey Poznyakoff

GNU CPIO September by Robert Carleton and Sergey Poznyakoff GNU CPIO 2.12 12 September 2015 by Robert Carleton and Sergey Poznyakoff This manual documents GNU cpio (version 2.12, 12 September 2015). Copyright c 1995, 2001-2002, 2004, 2010, 2014-2015 Free Software

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 3: UNIX Operating System Organization Tian Guo CICS, Umass Amherst 1 Reminders Assignment 2 is due THURSDAY 09/24 at 3:45 pm Directions are on the website

More information

Chapter 8: Security under Linux

Chapter 8: Security under Linux Chapter 8: Security under Linux 8.1 File and Password security Linux security may be divided into two major parts: a) Password security b) File security 8.1.1 Password security To connect to a Linux system

More information

Step by Step Installation of CentOS Linux 7 and Active Circle

Step by Step Installation of CentOS Linux 7 and Active Circle Step by Step Installation of CentOS Linux 7 and Active Circle Active Circle Storage System Abstract This document describes the step-by-step procedures for installing and configuring the CentOS Linux 7

More information

Abstract. This is the MySQL OS X extract from the MySQL 5.5 Reference Manual. For legal information, see the Legal Notices.

Abstract. This is the MySQL OS X extract from the MySQL 5.5 Reference Manual. For legal information, see the Legal Notices. MySQL and OS X Abstract This is the MySQL OS X extract from the MySQL 5.5 Reference Manual. For legal information, see the Legal Notices. For help with using MySQL, please visit either the MySQL Forums

More information

Chapter 1 - Introduction. September 8, 2016

Chapter 1 - Introduction. September 8, 2016 Chapter 1 - Introduction September 8, 2016 Introduction Overview of Linux/Unix Shells Commands: built-in, aliases, program invocations, alternation and iteration Finding more information: man, info Help

More information

Secondary Storage (Chp. 5.4 disk hardware, Chp. 6 File Systems, Tanenbaum)

Secondary Storage (Chp. 5.4 disk hardware, Chp. 6 File Systems, Tanenbaum) Secondary Storage (Chp. 5.4 disk hardware, Chp. 6 File Systems, Tanenbaum) Secondary Stora Introduction Secondary storage is the non volatile repository for (both user and system) data and programs. As

More information

Filesystem Hierarchy and Permissions

Filesystem Hierarchy and Permissions and Linux Prepared by Steven Gordon on 19 April 2017 Common/Reports/linux-file-permissions.tex, r1417 1/15 Multiuser and Server Operating System Linux systems are commonly used as a multi-user system E.g.

More information

412 Notes: Filesystem

412 Notes: Filesystem 412 Notes: Filesystem A. Udaya Shankar shankar@cs.umd.edu December 5, 2012 Contents 1 Filesystem interface 2 2 Filesystem implementation 3 3 FAT (mostly from Wikepedia) 5 4 UFS (mostly from Wikepedia)

More information

CSC UNIX System, Spring 2015

CSC UNIX System, Spring 2015 CSC 352 - UNIX System, Spring 2015 Study guide for the CSC352 midterm exam (20% of grade). Dr. Dale E. Parson, http://faculty.kutztown.edu/parson We will have a midterm on March 19 on material we have

More information

M.C.A. (Sem.-lll) (CBCS) Examination November CCA-3003 Operating System and LinuxlUnix programming

M.C.A. (Sem.-lll) (CBCS) Examination November CCA-3003 Operating System and LinuxlUnix programming IIMII 003-007303 M.C.A. (Sem.-lll) (CBCS) Examination November-20 13 CCA-3003 Operating System and LinuxlUnix programming Faculty Code: 003 Subject Code: 007303 Time: 2'/' Hoursl ITotal Marks: 70 I. Attempt

More information

Unzip command in unix

Unzip command in unix Unzip command in unix Search 24-4-2015 Howto Extract Zip Files in a Linux and. You need to use the unzip command on a Linux or Unix like system. The nixcraft takes a lot of my time and. 16-4-2010 Howto:

More information

LINUX FUNDAMENTALS (5 Day)

LINUX FUNDAMENTALS (5 Day) www.peaklearningllc.com LINUX FUNDAMENTALS (5 Day) Designed to provide the essential skills needed to be proficient at the Unix or Linux command line. This challenging course focuses on the fundamental

More information

The KBackup Handbook. Martin Koller

The KBackup Handbook. Martin Koller Martin Koller 2 Contents 1 Introduction 5 2 Using KBackup 6 2.1 Using profiles........................................ 6 2.2 Archive slices........................................ 7 2.3 Incremental Backup.....................................

More information

Linux Nuts and Bolts

Linux Nuts and Bolts Linux Nuts and Bolts David Morgan At the command line Cursor control type to insert del/ctrl-d to delete home/end for endpoints Filename completion tab after initial characters Command repetition uparrow

More information

Linux Fundamentals (L-120)

Linux Fundamentals (L-120) Linux Fundamentals (L-120) Modality: Virtual Classroom Duration: 5 Days SUBSCRIPTION: Master, Master Plus About this course: This is a challenging course that focuses on the fundamental tools and concepts

More information

Unix Processes. What is a Process?

Unix Processes. What is a Process? Unix Processes Process -- program in execution shell spawns a process for each command and terminates it when the command completes Many processes all multiplexed to a single processor (or a small number

More information

RH033 Red Hat Linux Essentials

RH033 Red Hat Linux Essentials RH033 Red Hat Linux Essentials Version 3.5 QUESTION NO: 1 You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. A printer is configured on the network. You want to

More information

BIG-IP Access Policy Manager : Portal Access. Version 12.1

BIG-IP Access Policy Manager : Portal Access. Version 12.1 BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7

More information

Linux Kung Fu. Stephen James UBNetDef, Spring 2017

Linux Kung Fu. Stephen James UBNetDef, Spring 2017 Linux Kung Fu Stephen James UBNetDef, Spring 2017 Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and

More information

BACKING UP LINUX AND OTHER UNIX(- LIKE) SYSTEMS

BACKING UP LINUX AND OTHER UNIX(- LIKE) SYSTEMS BACKING UP LINUX AND OTHER UNIX(- LIKE) SYSTEMS There are two kinds of people: those who do regular backups and those who never had a hard drive failure Unknown. 1. Introduction The topic of doing backups

More information

Case Study: Access Control. Steven M. Bellovin October 4,

Case Study: Access Control. Steven M. Bellovin October 4, Case Study: Access Control Steven M. Bellovin October 4, 2015 1 Case Studies in Access Control Joint software development Mail Steven M. Bellovin October 4, 2015 2 Situations Small team on a single machine

More information

Linux Essentials. Smith, Roderick W. Table of Contents ISBN-13: Introduction xvii. Chapter 1 Selecting an Operating System 1

Linux Essentials. Smith, Roderick W. Table of Contents ISBN-13: Introduction xvii. Chapter 1 Selecting an Operating System 1 Linux Essentials Smith, Roderick W. ISBN-13: 9781118106792 Table of Contents Introduction xvii Chapter 1 Selecting an Operating System 1 What Is an OS? 1 What Is a Kernel? 1 What Else Identifies an OS?

More information

The student will have the essential skills needed to be proficient at the Unix or Linux command line.

The student will have the essential skills needed to be proficient at the Unix or Linux command line. Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This challenging course focuses on the fundamental

More information