Problem Set 2 Due: 11:59pm, Monday October 4

Size: px
Start display at page:

Download "Problem Set 2 Due: 11:59pm, Monday October 4"

Transcription

1 CS342 Computer Security Handout # 3 Prof. Lyn Turbak September 26, 2010 Wellesley College Important notes: Problem Set 2 Due: 11:59pm, Monday October 4 You can do Problem 1 on your own or together with your teammate from Problems 2 4. Problems 2 4 are team problems that you need to complete on your team Linux machine in the Security Lab (E125) by working in two-person teams. The Linux teammate you choose for this assignment will remain your teammate for the rest of the semester. Students with a strong systems background should not work with each other, but should choose partners with less systems background. In most cases, you are expected to work side-by-side on team problems, so choose teammates who have similar schedules to maximize potential meeting times. Form a team and pick your machine in E125 ASAP. If at all possible, you should complete Problems 2a d before this week s lab, so that you can use your team s machine in lab. Although E125 should be open 24/7, custodians sometime lock the room. Please inform me anytime you want to access the room but find it locked. Start Problem 3 on password cracking soon so that you have as many days as possible to run the cracker. PS3 (the treasure hunt ) will be posted on Fri Oct 1. and due on Fri. Oct. 8. Submission: Please submit a header sheet (indicating the amount of time you/your team spent on the problems) along with the following: 1. For Problem 1, each student/team should submit a written report. 2. For Problem 2, there is nothing to turn in. I will check to see that the accounts and web pages on your machine have been configured properly. 3. For Problem 3, turn in a brief report describing which passwords John was able to crack and which ones it wasn t able to crack. However, under no circumstances should you divulge your root password! If you did any experiments beyond the default cracking mode, describe them. 4. For Problem 4, in addition to the scripts and testing transcripts mentioned in the problem, you should submit a written explanation detailing the design of your solution to the problem, with particular emphasis on how you approached the parts that you found difficult. You should also describe any implementation details that are interesting, and your scripts should be commented to explain how they work. Also, please let me know anything that I could have told you or configured for you in advance that would have saved you time on this assignment. (Your feedback will help future CS342 students!) 1

2 Problem 1 [20]: Tanner Photo Contest Revisited (Do not begin this problem until Mon. Sep. 27) The official Tanner Photo Contest site is at tanner-photos/ cgi-bin/tanner-photos.cgi. I believe I have fixed most (but maybe not all) the security holes and usability issues students reported for the test site in PS1. In this problem, attempt as many exploits you can think of against the official site, including all you tried for PS1 and perhaps some more. Write a report summarizing your attacks and the extent to which they succeeded. (If you discover a serious vulnerability, please let me know ASAP!) Problem 2 [20]: Linux System Administration In this problem, you will choose a teammate and a Linux machine in the Security Lab (SCI E125) and become system administrators (sysadmins) of that machine. You and your teammate will own this Linux machine for the rest of the semester. There are six machines along the back wall of E125 that we will use in this class. jaguar.wellesley.edu ballroom.wellesley.edu bass.wellesley.edu gandhi.wellesley.edu sole.wellesley.edu salmon.wellesley.edu We will refer to this network of machines as the security lab network (SLN). We will use the SLN machines for most computer-based exercises in the course. For these exercises, the SLN machines have weaker security settings than our regular department machines. Currently, the SLN machines are connected to the campus network. So you can access the rest of the Internet from them and can access them remotely via ssh. However, later in the semester, we may experiment with some malware and network exploits on the SLN machines. In order to protect our department and campus machines at that time, we may isolate the SLN machines so that they can communicate with each other but not the outside world. During the semester, you will learn certain hacking techniques, such as packet sniffing, buffer overflows, faking headers, how to break into accounts, and so on. The SLN machines are a playground for experimenting with these techniques. However, you should not use these techniques on any machines other than those in the SLN network; the consequences of doing so could be severe. a: Choose a Teammate and Machine (complete this part ASAP) Choose a teammate and then choose one of the SLN machines listed above to be your machine for the semester. (There are 13 students and 6 machines, so there will need to be one 3-person team.) You should attach a note to the machine claiming it for your team, and post a note to CS F10 announcing your team members and the machine you own. b: Log into Your Machine You can log into your machine with username guest and password guest (or using another account you create in Part d). When you need superuser privileges, you can su to root using the password secs342curity. Note: as a default, logging directly into your machine as user root is disabled. You can enable it by following the instructions at com/2010/04/23/login-as-a-root-from-gui-fedora-13/ c: Change the Root Password You wouldn t want anyone else to log into your machine with superuser privileges, would you? The first thing you should do is change the root password using the passwd program. 1 1 Although Fedora 13 provides a GUI for changing user information and passwords, you should avoid this GUI in this assignment and become facile at accomplishing these tasks via commands in the shell. 2

3 Executing passwd username as root will prompt you for a new password for the account with name username. (Executing passwd without any arguments changes the password for root.) The passwd program will warn you about vulnerable passwords, such as those that are too short or are based on dictionary words. You may override such warnings to use a password anyway, but you do so at your peril! d: Create User Accounts Now you should create some user accounts for your machine. Every machine already has a guest account with password guest. You should not change this account or password. Throughout the semester, you will be able to log into any SLN machine using this account. You should create some additional accounts for your machine: create personal accounts for each teammate with your usual Wellesley account names. create the six accounts needed for Problem 4: fbar, bquux, stud1, stud2, cs1ta, and cs1. (As part of doing Problem 4, you will also want to create some new groups, but you should do that later.) To create these accounts you should use the useradd and passwd commands. 2 The useradd and other user management commands are described at 06/manage-users-from-the-command-line. For the purpose of the password-cracking exercise in Problem 3, you will want some of your accounts to have weak passwords (easily crackable ones, such as short ones and/or ones based on dictionary words), some to have strong passwords, and some to fall in between. e: Create Some Web Pages All the SLN machines are configured to run an HTTP server (httpd), which means that they can serve web pages that are viewable via web browsers running on the other SLN machines. Because some later exercises will involve web pages, you should get some experience early with creating (and protecting) some simple web pages. The focus here is not on HTML, CSS, or JavaScript (though you re welcome to use these if you want to), so your pages can be mostly plain text with a few links. Each machine already has (an extremely simple) home page for the guest user in/home/guest/public_html/ind You should create the following pages: For each team member and the cs1 account, create a world-viewable home page named index.html in a public_html folder for that user. (You ll need to create this folder). For each team member and the cs1 account, create an http-password-protected page private.html in a protected subfolder of public_html. For the team accounts, use the username team and the password private. For the cs1 account, use the username cs1 and the password cs1isfun!. Also, add a link to the protected page from the home page. Create a world-readable home page for your machine in /var/www/html/index.html that includes links to the home pages of your team members, the guest home page, and the cs1 home page. Create an http-password-protected page in /var/www/html/protected/index.html that includes links to the other protected pages you created above. This page should be unlockable by HTTP users team and cs1 (with the passwords given above) as well as by HTTP user guest with HTTP password guest. 2 Again, there is a GUI available from the menu path System>Administration>Users and Groups that you can use later in the semester for user management, but for now use shell commands. 3

4 Problem 3 [15]: Password Cracking Note: installing and running the password cracker takes time (measured in days for running the cracker), so start this problem early. In this problem you will test how good your account passwords are by running a password cracker on them. You will use the John the Ripper password cracker, also known as John. Install this program from Read doc/install for how to install John (use the linux-x86-any target) and doc/examples for how to run John on the passwords on your machine. You should download the large all wordlist from and configure John to use this wordlist. (You can test that it s working by choosing one of your passwords to be a work in the all wordlist that s not in the smaller default wordlist.) John can do some very fancy things, but for this problem you should just use the default mode with the all word list. This can take a very long time. Even if you start this problem right away, it may not finish before your pset is due! Fortunately, it is easy to find the passwords that John has cracked so far. If you stop John, it s also easy to resume it from where it stopped, so you don t needlessly repeat any work. See doc/examples for details. If interested, you are encouraged to experiment with more sophisticated features in an attempt to crack passwords that weren t cracked by the default mode. You can find more information on password cracking at and in Chapter 9 of Hacking Linux Exposed. Please let Lyn know if you need help installing, configuring, or running John. Problem 4 [45]: Access Control The goal of this problem is to give you practical experience with Linux permissions and shell scripts. Professors Foo Bar and Baz Quux are co-teaching introductory course CS1. They and all of their students will be using your (one!) computer in E125 for all of their work. They have asked you to administer all of the accounts for their course on your CS342 machine (which you should assume they can all access). This includes the accounts of the two professors (fbar and bquux), as well as a course account (cs1), the accounts of all the students, and the accounts of the teaching assistants (TAs) for the course. For simplicity, assume that there are only two students (stud1 and stud2) and one TA (cs1ta). However, your approach should scale to an arbitrary number of students and TAs. Professors Bar and Quux have asked you to create a cs1 account with a home directory in /home/cs1. This home directory should have four subdirectories: download: this directory should be visible to everyone in the class (the course account, professors, TAs, and students) but not to any users outside of the class. private: this directory should be visible only to the course staff (i.e., the two professors, the TAs, and anyone logged into the cs1 account). drop: all the contents of this directory should be readable (but not writable) by the course staff. As we shall see below, individual students will own certain subdirectories within the drop directory, but no student should be able to examine the contents of the directories of any other student. public_html: the contents of this directory should be world-readable, except for a protected subdirectory that should readable only by the course staff and apache (the HTTP server). In addition to configuring the above directories, Professors Bar and Quux have asked you to implement the following Linux commands for their course. In all of the commands, you may assume that dir is a directory name (possibly containing slashes) not ending in a slash, and the name psname does not contain any slashes. Your commands should verify that dir is a valid directory (and give a meaningful error message if it isn t). But for simplicity, you are not required 4

5 to verify the assumptions about slashes. The behavior of these commands is unspecified when the slash assumptions aren t met. publish dir psname: The professors use this command to publish directories of code and instructions for their problem sets. Only the two professors (not even the TAs or someone logged into the cs1 account) should be able to execute this command. It copies the contents of the directory dir to the directory /home/cs1/download/psname, creating the latter if it does not already exist. It also creates the directory /home/cs1/drop/psname if it does not already exist. The whole class should be able to read each file within the directory /home/cs1/download, but no one (not even the course staff) should be able to edit such files. No one who is not associated with the course should be able to read or even list any of the files in /home/cs1/download. If the directory dir contains a subdirectory named public_html, the contents of this directory is copied to a world-readable subdirectory of the public_html directory of cs1 named psname. Only course staff should have write access to these files. The public_html subdirectory of dir should not appear in /home/cs1/download/psname. Calling publish with a psname that already exists as a directory name in /home/cs1/download or in /home/cs1/public_html should replace all the existing contents of these directories with the new contents. privish dir psname: The professors use this command to share directories of problem set solutions with each other. Only the two professors (not even the TAs or someone logged into the cs1 account) should be able to execute these commands. It copies the contents of the directory dir to the directory/home/cs1/private/psname, creating the latter if it does not already exist. Only the professors should be able to read and modify the files within /home/cs1/private that have been added by calling privish. If the directory dir contains a subdirectory named public_html, the contents of this directory is copied to the protected subdirectory of the public_html directory of cs1 named psname. Only the course staff (and web browser) should have read/write access to these files. (These files can also be accessed via a web browser by anyone knowing the HTTP password for this directory.) The public_html subdirectory of dir should not appear in /home/cs1/private/psname. Calling privish with a psname that already exists as a directory name in /home/cs1/download or in /home/cs1/public_html/protected should replace all the existing contents of these directories with the new contents. drop dir psname : This is a command that can be executed by any CS1 student, but by no one else (not even course staff). It makes a copy of the directory dir and stores it in the directory whose name is /home/cs1/drop/psname/username, where username is the name of the user executing the command. The command creates /home/cs1/drop/psname/username if it does not already exist. (It is an error if /home/cs1/drop/psname does not already exist.) If /home/cs1/drop/psname/username already exists, any existing files with the same names as in dir should be overwritten with new versions, but any other existing files should be left unchanged. A student should be able to read and write any directories/files that they have submitted via drop, but they should not have read or write access (or the ability to delete) any drop directory (or contents thereof) that they have not submitted. However, the course staff should have read (but not write) access to all subdirectories of the drop directory. All course members might be able to list the contents of /home/cs1/drop/psname, but only the owner of this directory and course staff members should be able to list the contents of any subdirectory of this directory. In Problem 2, you already created accounts for the professors, students, TA, and course. In this problem you should create any groups that you need and then should write bash shell scripts for the above three commands. You will need to think carefully about ownership, groups, permissions, and paths in order to implement the commands. Where should the commands live? What should 5

6 be the permissions on the commands? What should be the permissions on the directories and files created by these commands? In addition to submitting a written description of your solution, you should turn in copies of your shell scripts (along with their permissions) and testing transcripts that show your commands work as specified. I.e.: the commands have the right behavior; all relevant parties can execute only the commands and read/write only the files to which they should have access. This is a challenging problem, and requires careful thought. Here are some notes you may find helpful (see Linux documentation for more details): You may want to make some of the commands setuid and/or setgid. As explained in lecture, Linux does not permit plain scripts to be executed setuid/setgid, but this restriction can be circumvented by creating a C program that invokes the script. For example, to make the publish command setuid, write the script in a file named publish_script (beginning with #!/bin/bash -p) and then write the following C program: int main (int argc, char* argv) { execv("publish_script", argv); } Within a shell script, any text delimited by single backquotes indicates a command that should be executed and replaced by its result. For example, if stud1 executes a script containing the filename /home/ whoami /stuff, this filename expands to /home/stud1/stuff. But be careful: if the program is setuid, then whoami will return the name of the effective user, not the real user. To get the real user name, see the next note. Within a script that is running setuid, you may want to distinguish the real user id (or name) from the effective user id (or name). The bash id command (and the bash variables UID and EUID) can be used for this purpose, as illustrated in the following script: #!/bin/bash -p REALUSERID= id -ur REALUSERNAME= id -urn EFFECTIVEUSERID= id -u EFFECTIVEUSERNAME= id -un EFFECTIVEGROUPID= id -g EFFECTIVEGROUPNAME= id -gn echo "Real user id = $UID ($REALUSERID)" echo "Real user name = $REALUSERNAME" echo "Effective user id = $EUID ($EFFECTIVEUSERID)" echo "Effective user name = $EFFECTIVEUSERNAME" echo "Effective group id = $EFFECTIVEGROUPID" echo "Effective group name = $EFFECTIVEGROUPNAME" echo -n "All id info: " id #prints all id info The -e (resp. -d) tests can be used in a conditional to determine if a file (resp. directory) exists. E.g. if [[ -e $FILENAME ]]; then... else... fi # IF $FILENAME exists... if [[!(-d $DIRNAME) ]]; then... else... fi # IF $DIRNAME doesn t exist... Many other tests for files and directories are listed in the bash shell documentation. 6

7 You may find a for loop helpful for iterating through the contents of a directory. By default, expansion of filenames including * does not include filenames beginning with a dot (. ). For example, cp -R foo/* bar will copy all files in foo to bar except those whose name begins with a dot. This default can be overridden in a shell script with the magical incantation shopt -s dotglob. To enable the printing of debugging information for a script, supply the options -vx to the script (i.e., begin the script with #!/bin/bash -vx). Changes made to group membership aren t noticed in an already-logged-in user. To see the changes, log out and log back in again. You can view HTTP server errors in /etc/httpd/logs/error_log. Be proactive about consulting Lyn with any questions you have about the problem specification. 7

8 Group Problem Header Page Please make this the first page of your hardcopy submission for group problems. CS342 Problem Set 1 Group Problems Due 11:59pm Monday, October 4 Names of Team Members: Date & Time Submitted: Collaborators (anyone you or your team collaborated with): By signing below, I/we attest that I/we have followed the collaboration policy as specified in the Course Information handout. Signature(s): In the Time column, please estimate the time you or your team spent on the parts of this problem set. Team members should be working closely together, so it will be assumed that the time reported is the time for each team member. Please try to be as accurate as possible; this information will help me design future problem sets. I will fill out the Score column when grading you problem set. Part Time Score General Reading Problem 1 [20] Problem 2 [20] Problem 3 [15] Problem 4 [45] Total 8

Problem Set 1 Due: 11:59pm Wednesday, February 7

Problem Set 1 Due: 11:59pm Wednesday, February 7 CS251 Programming Languages Handout # 13 Prof. Lyn Turbak January 31, 2007 Wellesley College Reading: Problem Set 1 Due: 11:59pm Wednesday, February 7 Handouts #1 #12 (only Chapters 1 5 of Handout #9 =

More information

CSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209

CSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209 CSC209 Software Tools and Systems Programming https://mcs.utm.utoronto.ca/~209 What is this Course About? Software Tools Using them Building them Systems Programming Quirks of C The file system System

More information

CSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209

CSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209 CSC209 Software Tools and Systems Programming https://mcs.utm.utoronto.ca/~209 What is this Course About? Software Tools Using them Building them Systems Programming Quirks of C The file system System

More information

CS Programming Languages Fall Homework #2

CS Programming Languages Fall Homework #2 CS 345 - Programming Languages Fall 2010 Homework #2 Due: 2pm CDT (in class), September 30, 2010 Collaboration policy This assignment can be done in teams at most two students. Any cheating (e.g., submitting

More information

Web Servers and Security

Web Servers and Security Web Servers and Security The Web is the most visible part of the net Two web servers Apache (open source) and Microsoft s IIS dominate the market Apache has 49%; IIS has 36% (source: http://news.netcraft.com/archives/2008/09/30/

More information

Web Servers and Security

Web Servers and Security Web Servers and Security The Web is the most visible part of the net Two web servers Apache (open source) and Microsoft s IIS dominate the market (Apache has 70%; IIS has 20%) Both major servers have lots

More information

Architecture. Steven M. Bellovin October 31,

Architecture. Steven M. Bellovin October 31, Architecture Steven M. Bellovin October 31, 2016 1 Web Servers and Security The Web is the most visible part of the net Two web servers Apache (open source) and Microsoft s IIS dominate the market Apache

More information

Simple Exploits. Thursday, September 23, 2010 Reading: Hacking Linux Exposed. CS342 Computer Security

Simple Exploits. Thursday, September 23, 2010 Reading: Hacking Linux Exposed. CS342 Computer Security Thursday, September 23, 2010 Reading: Hacking Linux Exposed CS342 Computer Security Department of Computer Science Wellesley College What do Hackers Want? o Your data: credit card number, financial information,

More information

Lecture 3: Web Servers / PHP and Apache. CS 383 Web Development II Monday, January 29, 2018

Lecture 3: Web Servers / PHP and Apache. CS 383 Web Development II Monday, January 29, 2018 Lecture 3: Web Servers / PHP and Apache CS 383 Web Development II Monday, January 29, 2018 Server Configuration One of the most common configurations of servers meant for web development is called a LAMP

More information

CSCU9B2 Practical 1: Introduction to HTML 5

CSCU9B2 Practical 1: Introduction to HTML 5 CSCU9B2 Practical 1: Introduction to HTML 5 Aim: To learn the basics of creating web pages with HTML5. Please register your practical attendance: Go to the GROUPS\CSCU9B2 folder in your Computer folder

More information

CS 642 Homework #4. Due Date: 11:59 p.m. on Tuesday, May 1, Warning!

CS 642 Homework #4. Due Date: 11:59 p.m. on Tuesday, May 1, Warning! CS 642 Homework #4 Due Date: 11:59 p.m. on Tuesday, May 1, 2007 Warning! In this assignment, you will construct and launch attacks against a vulnerable computer on the CS network. The network administrators

More information

(Worth 50% of overall Project 1 grade)

(Worth 50% of overall Project 1 grade) 第 1 页共 8 页 2011/11/8 22:18 (Worth 50% of overall Project 1 grade) You will do Part 3 (the final part) of Project 1 with the same team as for Parts 1 and 2. If your team partner dropped the class and you

More information

Introduction. Overview and Getting Started. CS 161 Computer Security Lab 1 Buffer Overflows v.01 Due Date: September 17, 2012 by 11:59pm

Introduction. Overview and Getting Started. CS 161 Computer Security Lab 1 Buffer Overflows v.01 Due Date: September 17, 2012 by 11:59pm Dawn Song Fall 2012 CS 161 Computer Security Lab 1 Buffer Overflows v.01 Due Date: September 17, 2012 by 11:59pm Introduction In this lab, you will get a hands-on approach to circumventing user permissions

More information

CS 1301 Fall 2008 Lab 2 Introduction to UNIX

CS 1301 Fall 2008 Lab 2 Introduction to UNIX CS 1301 Fall 2008 Lab 2 Introduction to UNIX Due: Friday, September 19 th, at 6 PM (Monday, September 22 nd for 10% off) Notes: Do not wait until the last minute to do this assignment in case you run into

More information

Architecture. Steven M. Bellovin October 27,

Architecture. Steven M. Bellovin October 27, Architecture Steven M. Bellovin October 27, 2015 1 Web Servers and Security The Web is the most visible part of the net Two web servers Apache (open source) and Microsoft s IIS dominate the market Apache

More information

Problem Set 6 Due: 11:59 Sunday, April 29

Problem Set 6 Due: 11:59 Sunday, April 29 CS230 Data Structures Handout # 36 Prof. Lyn Turbak Monday, April 23 Wellesley College Problem Set 6 Due: 11:59 Sunday, April 29 Reading: You are expected to read and understand all of the following handouts,

More information

:

: CS200 Assignment 5 HTML and CSS Due Monday February 11th 2019, 11:59 pm Readings and Resources On the web: http://validator.w3.org/ : a site that will check a web page for faulty HTML tags http://jigsaw.w3.org/css-validator/

More information

Open up a terminal, make sure you are in your home directory, and run the command.

Open up a terminal, make sure you are in your home directory, and run the command. More Linux Commands 0.1 wc The Linux command for acquiring size statistics on a file is wc. This command can provide information from line count, to bytes in a file. Open up a terminal, make sure you are

More information

How to Create a NetBeans PHP Project

How to Create a NetBeans PHP Project How to Create a NetBeans PHP Project 1. SET UP PERMISSIONS FOR YOUR PHP WEB SITE... 2 2. CREATE NEW PROJECT ("PHP APPLICATION FROM REMOTE SERVER")... 2 3. SPECIFY PROJECT NAME AND LOCATION... 2 4. SPECIFY

More information

CS 1653: Applied Cryptography and Network Security Fall Term Project, Phase 2

CS 1653: Applied Cryptography and Network Security Fall Term Project, Phase 2 CS 1653: Applied Cryptography and Network Security Fall 2017 Term Project, Phase 2 Assigned: Tuesday, September 12 Due: Tuesday, October 3, 11:59 PM 1 Background Over the course of this semester, we will

More information

Announcements. is due Monday April 1 needs to include a paragraph write-up about the results of using the two different scheduling algorithms

Announcements. is due Monday April 1 needs to include a paragraph write-up about the results of using the two different scheduling algorithms Announcements Reading Chapter 11 (11.1-11.5) Programming Project #3 is due Monday April 1 needs to include a paragraph write-up about the results of using the two different scheduling algorithms Midterm

More information

CS 361S - Network Security and Privacy Spring Project #2

CS 361S - Network Security and Privacy Spring Project #2 CS 361S - Network Security and Privacy Spring 2017 Project #2 Part 1 due: 11:00, April 3, 2017 Part 2 due: 11:00, April 10, 2017 Submission instructions Follow the submission instructions in the Deliverables

More information

CS Fundamentals of Programming II Fall Very Basic UNIX

CS Fundamentals of Programming II Fall Very Basic UNIX CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)

More information

Shellbased Wargaming

Shellbased Wargaming Shellbased Wargaming Abstract Wargaming is a hands-on way to learn about computer security and common programming mistakes. This document is intended for readers new to the subject and who are interested

More information

CS 3030 Scripting Languages Syllabus

CS 3030 Scripting Languages Syllabus General Information CS 3030 Scripting Languages Semester: Fall 2017 Textbook: Location: Instructor Info: None. We will use freely available resources from the Internet. Online Ted Cowan tedcowan@weber.edu

More information

This assignment requires that you complete the following tasks (in no particular order).

This assignment requires that you complete the following tasks (in no particular order). Construction Objectives The objectives of this assignment are: (1) Implement your FCS design with high-quality code and thorough unit tests (2) Gain experience doing a task breakdown (3) Gain experience

More information

1. What statistic did the wc -l command show? (do man wc to get the answer) A. The number of bytes B. The number of lines C. The number of words

1. What statistic did the wc -l command show? (do man wc to get the answer) A. The number of bytes B. The number of lines C. The number of words More Linux Commands 1 wc The Linux command for acquiring size statistics on a file is wc. This command provides the line count, word count and number of bytes in a file. Open up a terminal, make sure you

More information

CS155: Computer Security Spring Project #1. Due: Part 1: Thursday, April pm, Part 2: Monday, April pm.

CS155: Computer Security Spring Project #1. Due: Part 1: Thursday, April pm, Part 2: Monday, April pm. CS155: Computer Security Spring 2008 Project #1 Due: Part 1: Thursday, April 17-1159 pm, Part 2: Monday, April 21-1159 pm. Goal 1. The goal of this assignment is to gain hands-on experience with the effect

More information

The print queue was too long. The print queue is always too long shortly before assignments are due. Print your documentation

The print queue was too long. The print queue is always too long shortly before assignments are due. Print your documentation Chapter 1 CS488/688 F17 Assignment Format I take off marks for anything... A CS488 TA Assignments are due at the beginning of lecture on the due date specified. More precisely, all the files in your assignment

More information

Case Study: Access Control. Steven M. Bellovin October 4,

Case Study: Access Control. Steven M. Bellovin October 4, Case Study: Access Control Steven M. Bellovin October 4, 2015 1 Case Studies in Access Control Joint software development Mail Steven M. Bellovin October 4, 2015 2 Situations Small team on a single machine

More information

TA hours and labs start today. First lab is out and due next Wednesday, 1/31. Getting started lab is also out

TA hours and labs start today. First lab is out and due next Wednesday, 1/31. Getting started lab is also out Announcements TA hours and labs start today. First lab is out and due next Wednesday, 1/31. Getting started lab is also out Get you setup for project/lab work. We ll check it with the first lab. Stars

More information

Capability and System Hardening

Capability and System Hardening P a g e 1 Date Assigned: mm/dd/yyyy Date Due: mm/dd/yyyy by hh:mm Educational Objectives Capability and System Hardening This lab is designed to help you gain a better understanding of system hardening

More information

CSC209H Lecture 1. Dan Zingaro. January 7, 2015

CSC209H Lecture 1. Dan Zingaro. January 7, 2015 CSC209H Lecture 1 Dan Zingaro January 7, 2015 Welcome! Welcome to CSC209 Comments or questions during class? Let me know! Topics: shell and Unix, pipes and filters, C programming, processes, system calls,

More information

CS342 Computer Security Handout # 10 Prof. Lyn Turbak October 7, 2014 Wellesley College. Lab 6: strace

CS342 Computer Security Handout # 10 Prof. Lyn Turbak October 7, 2014 Wellesley College. Lab 6: strace CS342 Computer Security Handout # 10 Prof. Lyn Turbak October 7, 2014 Wellesley College Lab 6: strace Overview The purpose of today s lab is to become familiar with the Linux stracecommand, a tool which

More information

Project 3 Students Choice of Native Apps. each milestone s deadline is noon see cs164.net/expectations for each milestone s expectations

Project 3 Students Choice of Native Apps. each milestone s deadline is noon see cs164.net/expectations for each milestone s expectations Project 3 Students Choice of Native Apps each milestone s deadline is noon see cs164.net/expectations for each milestone s expectations Mon Tue Wed Thu Fri 4/10 Proposal 4/17 Design Doc, Style Guide 4/24

More information

Dirty COW Attack Lab

Dirty COW Attack Lab SEED Labs Dirty COW Attack Lab 1 Dirty COW Attack Lab Copyright 2017 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation under Award

More information

CS251 Programming Languages Handout # 3 Wellesley College 30 January Linux, X, and Emacs

CS251 Programming Languages Handout # 3 Wellesley College 30 January Linux, X, and Emacs CS251 Programming Languages Handout # 3 Wellesley College 30 January 2006 1 Welcome to the Zoo Linux, X, and Emacs We will be using the CS department s Linux workstations for all programming in CS251.

More information

Important Project Dates

Important Project Dates Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.035, Fall 2002 Handout 4 Project Overview Wednesday, September 4 This is an overview of the course project

More information

CMSC 201 Spring 2017 Project 1 Number Classifier

CMSC 201 Spring 2017 Project 1 Number Classifier CMSC 201 Spring 2017 Project 1 Number Classifier Assignment: Project 1 Number Classifier Due Date: Design Document: Saturday, March 11th, 2017 by 8:59:59 PM Project: Friday, March 17th, 2017 by 8:59:59

More information

Linux File System and Basic Commands

Linux File System and Basic Commands Linux File System and Basic Commands 0.1 Files, directories, and pwd The GNU/Linux operating system is much different from your typical Microsoft Windows PC, and probably looks different from Apple OS

More information

Outline. UNIX security ideas Users and groups File protection Setting temporary privileges. Examples. Permission bits Program language components

Outline. UNIX security ideas Users and groups File protection Setting temporary privileges. Examples. Permission bits Program language components UNIX security Ulf Larson (modified by Erland Jonsson/Magnus Almgren) Computer security group Dept. of Computer Science and Engineering Chalmers University of Technology, Sweden Outline UNIX security ideas

More information

Problem Set 1 Due: 1:30pm Tuesday, February 13

Problem Set 1 Due: 1:30pm Tuesday, February 13 CS230 Data Structures Handout # 8 Prof. Lyn Turbak January 30, 2007 Wellesley College Problem Set 1 Due: 1:30pm Tuesday, February 13 Note: This assignments is due at the beginning of the first CS230 lab

More information

CS 361S - Network Security and Privacy Spring Project #2

CS 361S - Network Security and Privacy Spring Project #2 CS 361S - Network Security and Privacy Spring 2014 Project #2 Part 1 due: 11am CDT, March 25, 2014 Part 2 due: 11am CDT, April 3, 2014 Submission instructions Follow the submission instructions in the

More information

COSC 115A: Introduction to Web Authoring Fall 2014

COSC 115A: Introduction to Web Authoring Fall 2014 COSC 115A: Introduction to Web Authoring Fall 2014 Instructor: David. A. Sykes Class meetings: TR 1:00-2:20PM in Daniel Building, Room 102 Office / Hours: Olin 204E / TR 8:00-10:45AM, MWF 9:00 10:20AM,

More information

One of the fundamental kinds of websites that SharePoint 2010 allows

One of the fundamental kinds of websites that SharePoint 2010 allows Chapter 1 Getting to Know Your Team Site In This Chapter Requesting a new team site and opening it in the browser Participating in a team site Changing your team site s home page One of the fundamental

More information

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot

More information

Network Administration/System Administration (NTU CSIE, Spring 2018) Homework #1. Homework #1

Network Administration/System Administration (NTU CSIE, Spring 2018) Homework #1. Homework #1 Submission Homework #1 Due Time: 2018/3/11 (Sun.) 22:00 Contact TAs: vegetable@csie.ntu.edu.tw Compress all your files into a file named HW1_[studentID].zip (e.g. HW1_bxx902xxx.zip), which contains two

More information

CST8207: GNU/Linux Operating Systems I Lab Six Linux File System Permissions. Linux File System Permissions (modes) - Part 1

CST8207: GNU/Linux Operating Systems I Lab Six Linux File System Permissions. Linux File System Permissions (modes) - Part 1 Student Name: Lab Section: Linux File System Permissions (modes) - Part 1 Due Date - Upload to Blackboard by 8:30am Monday March 12, 2012 Submit the completed lab to Blackboard following the Rules for

More information

CS 200. User IDs, Passwords, Permissions & Groups. User IDs, Passwords, Permissions & Groups. CS 200 Spring 2017

CS 200. User IDs, Passwords, Permissions & Groups. User IDs, Passwords, Permissions & Groups. CS 200 Spring 2017 CS 200 User IDs, Passwords, Permissions & Groups 1 Needed to control access to sharepoints and their contents Because Macs & PCs now support multiple accounts, user IDs and passwords are also needed on

More information

CS 1110, LAB 3: STRINGS; TESTING

CS 1110, LAB 3: STRINGS; TESTING CS 1110, LAB 3: STRINGS; TESTING http://www.cs.cornell.edu/courses/cs1110/2017sp/labs/lab03.pdf First Name: Last Name: NetID: Getting Credit: Deadline: the first 10 minutes of (your) lab two weeks from

More information

A Guide to Condor. Joe Antognini. October 25, Condor is on Our Network What is an Our Network?

A Guide to Condor. Joe Antognini. October 25, Condor is on Our Network What is an Our Network? A Guide to Condor Joe Antognini October 25, 2013 1 Condor is on Our Network What is an Our Network? The computers in the OSU astronomy department are all networked together. In fact, they re networked

More information

CpSc 1111 Lab 9 2-D Arrays

CpSc 1111 Lab 9 2-D Arrays CpSc 1111 Lab 9 2-D Arrays Overview This week, you will gain some experience with 2-dimensional arrays, using loops to do the following: initialize a 2-D array with data from an input file print out the

More information

Keys and Passwords. Steven M. Bellovin October 17,

Keys and Passwords. Steven M. Bellovin October 17, Keys and Passwords Steven M. Bellovin October 17, 2010 1 Handling Long-Term Keys Where do cryptographic keys come from? How should they be handled? What are the risks? As always, there are tradeoffs Steven

More information

This lab exercise is to be submitted at the end of the lab session! passwd [That is the command to change your current password to a new one]

This lab exercise is to be submitted at the end of the lab session! passwd [That is the command to change your current password to a new one] Data and Computer Security (CMPD414) Lab II Topics: secure login, moving into HOME-directory, navigation on Unix, basic commands for vi, Message Digest This lab exercise is to be submitted at the end of

More information

5 MANAGING USER ACCOUNTS AND GROUPS

5 MANAGING USER ACCOUNTS AND GROUPS MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content

More information

STAT 625: Statistical Case Studies

STAT 625: Statistical Case Studies John W. Emerson, Department of Statistics, Yale University 2013 1 STAT 625: Statistical Case Studies John W. Emerson Yale University Abstract This term, I ll generally present brief class notes and scripts,

More information

LAB #7 Linux Tutorial

LAB #7 Linux Tutorial Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing

More information

Outline. Operating System Security CS 239 Computer Security February 23, Introduction. Server Machines Vs. General Purpose Machines

Outline. Operating System Security CS 239 Computer Security February 23, Introduction. Server Machines Vs. General Purpose Machines Outline Operating System Security CS 239 Computer Security February 23, 2004 Introduction Memory protection Interprocess communications protection File protection Page 1 Page 2 Introduction Why Is OS Security

More information

Case Studies in Access Control

Case Studies in Access Control Joint software development Mail 1 / 38 Situations Roles Permissions Why Enforce Access Controls? Unix Setup Windows ACL Setup Reviewer/Tester Access Medium-Size Group Basic Structure Version Control Systems

More information

Optional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07

Optional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07 0Handouts: Optional Lab 1-1: Understanding the /etc/securetty file In this lab, you will examine a PAM component, the /etc/securetty file. 1. Boot into Linux as root. Open a Telnet client and attempt to

More information

CIS 5373 Systems Security

CIS 5373 Systems Security CIS 5373 Systems Security Topic 3.2: OS Security Access Control Endadul Hoque Slide Acknowledgment Contents are based on slides from Ninghui Li (Purdue), John Mitchell (Stanford), Bogdan Carbunar (FIU)

More information

EDURange Student s Manual. September 14, 2015

EDURange Student s Manual. September 14, 2015 EDURange Student s Manual September 14, 2015 A Introduction This document will be updated as changes are made. EDURange is both a collection of interactive, collaborative cybersecurity exercises and a

More information

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team Kennesaw State University Information Technology Services Introduces Files.Kennesaw.Edu Presented by the ITS Technology Outreach Team Last Updated 08/12/13 Powered by Xythos Copyright 2006, Xythos Software

More information

(Refer Slide Time: 1:26)

(Refer Slide Time: 1:26) Information Security-3 Prof. V Kamakoti Department of Computer science and Engineering Indian Institute of Technology Madras Basics of Unix and Network Administration Operating Systems Introduction Mod01,

More information

CSE 336. Introduction to Programming. for Electronic Commerce. Why You Need CSE336

CSE 336. Introduction to Programming. for Electronic Commerce. Why You Need CSE336 CSE 336 Introduction to Programming for Electronic Commerce Why You Need CSE336 Concepts like bits and bytes, domain names, ISPs, IPAs, RPCs, P2P protocols, infinite loops, and cloud computing are strictly

More information

CS101 Lecture 04: How the Web Works Publishing Web pages. What You ll Learn Today

CS101 Lecture 04: How the Web Works Publishing Web pages. What You ll Learn Today CS101 Lecture 04: How the Web Works Publishing Web pages Aaron Stevens 28 January 2011 1 What You ll Learn Today How does the WWW work? What are web servers, anyway? So I got some HTML pages and stuff.

More information

CSCI544, Fall 2016: Assignment 1

CSCI544, Fall 2016: Assignment 1 CSCI544, Fall 2016: Assignment 1 Due Date: September 23 rd, 4pm. Introduction The goal of this assignment is to get some experience implementing the simple but effective machine learning technique, Naïve

More information

CS 161 Computer Security

CS 161 Computer Security Raluca Popa Spring 2018 CS 161 Computer Security Homework 1 Due: Monday, January 29th, at 11:59pm Instructions. This homework is due Monday, January 29th, at 11:59pm. No late homeworks will be accepted

More information

Processes are subjects.

Processes are subjects. Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path Race conditions NOTE: filenames may differ between OS/distributions Principals

More information

Using the Zoo Workstations

Using the Zoo Workstations Using the Zoo Workstations Version 1.86: January 16, 2014 If you ve used Linux before, you can probably skip many of these instructions, but skim just in case. Please direct corrections and suggestions

More information

CS 375 UNIX System Programming Spring 2014 Syllabus

CS 375 UNIX System Programming Spring 2014 Syllabus CS 375 UNIX System Programming Spring 2014 Syllabus Instructor Dr. Deborah Hwang KC 264, 488 2193, hwang@evansville.edu Home page: http://csserver.evansville.edu/~hwang Office Hours: See instructor's home

More information

ENCM 339 Fall 2017: Editing and Running Programs in the Lab

ENCM 339 Fall 2017: Editing and Running Programs in the Lab page 1 of 8 ENCM 339 Fall 2017: Editing and Running Programs in the Lab Steve Norman Department of Electrical & Computer Engineering University of Calgary September 2017 Introduction This document is a

More information

Lab 5: Dreamweaver CS5, Uploading your Web site

Lab 5: Dreamweaver CS5, Uploading your Web site Lab 5: Dreamweaver CS5, Uploading your Web site Setting up Local and Remote Information: 1. Launch Dreamweaver 2. Choose site->new site 3. By Site Name give your site a name. Make sure the name has no

More information

cs642 /introduction computer security adam everspaugh

cs642 /introduction computer security adam everspaugh cs642 computer security /introduction adam everspaugh ace@cs.wisc.edu definition Computer Security := understanding and improving the behavior of computing systems in the presence of adversaries adversaries

More information

CSCI544, Fall 2016: Assignment 2

CSCI544, Fall 2016: Assignment 2 CSCI544, Fall 2016: Assignment 2 Due Date: October 28 st, before 4pm. Introduction The goal of this assignment is to get some experience implementing the simple but effective machine learning model, the

More information

Lab 2A> ADDING USERS in Linux

Lab 2A> ADDING USERS in Linux Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.

More information

Project #1 rev 2 Computer Science 2334 Fall 2013 This project is individual work. Each student must complete this assignment independently.

Project #1 rev 2 Computer Science 2334 Fall 2013 This project is individual work. Each student must complete this assignment independently. Project #1 rev 2 Computer Science 2334 Fall 2013 This project is individual work. Each student must complete this assignment independently. User Request: Create a simple magazine data system. Milestones:

More information

Class Scheduling- Basics

Class Scheduling- Basics Class Scheduling- Basics Oct 2006 Rev 2 Maintain Schedule of Classes Class Scheduling - Basics Class Scheduling- Basics This course explains how to maintain a schedule of classes in PeopleSoft 8.9 Student

More information

Course Wiki. Today s Topics. Web Resources. Amazon EC2. Linux. Apache PHP. Workflow and Tools. Extensible Networking Platform 1

Course Wiki. Today s Topics. Web Resources. Amazon EC2. Linux. Apache PHP. Workflow and Tools. Extensible Networking Platform 1 Today s Topics Web Resources Amazon EC2 Linux Apache PHP Workflow and Tools Extensible Networking Platform 1 1 - CSE 330 Creative Programming and Rapid Prototyping Course Wiki Extensible Networking Platform

More information

27-Sep CSCI 2132 Software Development Lab 4: Exploring bash and C Compilation. Faculty of Computer Science, Dalhousie University

27-Sep CSCI 2132 Software Development Lab 4: Exploring bash and C Compilation. Faculty of Computer Science, Dalhousie University Lecture 4 p.1 Faculty of Computer Science, Dalhousie University CSCI 2132 Software Development Lab 4: Exploring bash and C Compilation 27-Sep-2017 Location: Goldberg CS Building Time: Wednesday, 16:05

More information

CSCI 1100L: Topics in Computing Lab Lab 1: Introduction to the Lab! Part I

CSCI 1100L: Topics in Computing Lab Lab 1: Introduction to the Lab! Part I CSCI 1100L: Topics in Computing Lab Lab 1: Introduction to the Lab! Part I Welcome to your CSCI-1100 Lab! In the fine tradition of the CSCI-1100 course, we ll start off the lab with the classic bad joke

More information

INFS 2150 (Section A) Fall 2018

INFS 2150 (Section A) Fall 2018 INFS 2150 (Section A) Fall 2018 Introduction to Web Development Class meets TUE & THU: 12:30am-1:45pm: in Wheatley 114 Instructor: Peter Y. Wu Office: Wheatley 309 Office Hours: Tuesday 9:00 am-12:00 noon;

More information

Welcome to CS61A! Last modified: Thu Jan 23 03:58: CS61A: Lecture #1 1

Welcome to CS61A! Last modified: Thu Jan 23 03:58: CS61A: Lecture #1 1 Welcome to CS61A! This is a course about programming, which is the art and science of constructing artifacts ( programs ) that perform computations or interact with the physical world. To do this, we have

More information

CSE 390a Lecture 3. Multi-user systems; remote login; editors; users/groups; permissions

CSE 390a Lecture 3. Multi-user systems; remote login; editors; users/groups; permissions CSE 390a Lecture 3 Multi-user systems; remote login; editors; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/390a/ 1

More information

Review of Fundamentals. Todd Kelley CST8207 Todd Kelley 1

Review of Fundamentals. Todd Kelley CST8207 Todd Kelley 1 Review of Fundamentals Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 GPL the shell SSH (secure shell) the Course Linux Server RTFM vi general shell review 2 These notes are available on

More information

CS240: Programming in C

CS240: Programming in C CS240: Programming in C Lecture 1: Class overview. Cristina Nita-Rotaru Lecture 1/ Fall 2013 1 WELCOME to CS240 Cristina Nita-Rotaru Lecture 1/ Fall 2013 2 240 Team Instructor: Cristina Nita-Rotaru Special

More information

CIS 101 Orientation Document Fall 2017

CIS 101 Orientation Document Fall 2017 CIS 101 Orientation Document Fall 2017 Fall 2017 ONLINE section 23989 To be successful in an online section you must be motivated, disciplined, and able to read and understand the material in the books

More information

CS 241 Data Organization using C

CS 241 Data Organization using C CS 241 Data Organization using C Fall 2018 Instructor Name: Dr. Marie Vasek Contact: Private message me on the course Piazza page. Office: Farris 2120 Office Hours: Tuesday 2-4pm and Thursday 9:30-11am

More information

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING WITH WEBSITE DEVELOPMENT SEMESTER ONE EXAMINATIONS 2018/2019 UNIX MODULE NO: CPU5003

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING WITH WEBSITE DEVELOPMENT SEMESTER ONE EXAMINATIONS 2018/2019 UNIX MODULE NO: CPU5003 [CRT08] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING WITH WEBSITE DEVELOPMENT SEMESTER ONE EXAMINATIONS 2018/2019 UNIX MODULE NO: CPU5003 Date: Wednesday 16 th January 2019 Time: 10:00 12:00 INSTRUCTIONS

More information

BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus

BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus 1. Course Objectives Welcome to MET CS342 Data Structures with Java. The intent of this

More information

bash Tests and Looping Administrative Shell Scripting COMP2101 Fall 2017

bash Tests and Looping Administrative Shell Scripting COMP2101 Fall 2017 bash Tests and Looping Administrative Shell Scripting COMP2101 Fall 2017 Command Lists A command is a sequence of commands separated by the operators ; & && and ; is used to simply execute commands in

More information

User Accounts. The Passwd, Group, and Shadow Files

User Accounts. The Passwd, Group, and Shadow Files User Accounts The Passwd, Group, and Shadow Files We'll start with the passwd (pronounced "password") file, located at /etc/passwd. This file holds information about all of the user accounts on the system.

More information

Commands are in black

Commands are in black Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin

More information

CS 4349 Lecture August 21st, 2017

CS 4349 Lecture August 21st, 2017 CS 4349 Lecture August 21st, 2017 Main topics for #lecture include #administrivia, #algorithms, #asymptotic_notation. Welcome and Administrivia Hi, I m Kyle! Welcome to CS 4349. This a class about algorithms.

More information

Race Condition Vulnerability Lab

Race Condition Vulnerability Lab Concordia Institute for Information Systems Engineering - INSE 6130 1 Race Condition Vulnerability Lab Copyright c 2006-2012 Wenliang Du, Syracuse University. The development of this document is funded

More information

Bengal Success Portal

Bengal Success Portal Bengal Success Portal Adviser Guide Welcome to the Bengal Success Portal! The Bengal Success Portal gives you a convenient way to keep track of your students and ensure timely intervention with instructors,

More information

CMSC 201 Spring 2018 Project 3 Minesweeper

CMSC 201 Spring 2018 Project 3 Minesweeper CMSC 201 Spring 2018 Project 3 Minesweeper Assignment: Project 3 Minesweeper Due Date: Design Document: Friday, May 4th, 2018 by 8:59:59 PM Project: Friday, May 11th, 2018 by 8:59:59 PM Value: 80 points

More information

Lab 1: Accessing the Linux Operating System Spring 2009

Lab 1: Accessing the Linux Operating System Spring 2009 CIS 90 Linux Lab Exercise Lab 1: Accessing the Linux Operating System Spring 2009 Lab 1: Accessing the Linux Operating System This lab takes a look at UNIX through an online experience on an Ubuntu Linux

More information

Security Architecture

Security Architecture Security Architecture We ve been looking at how particular applications are secured We need to secure not just a few particular applications, but many applications, running on separate machines We need

More information

Recitation # Embedded System Engineering Friday 16-Oct-2015

Recitation # Embedded System Engineering Friday 16-Oct-2015 Recitation #7 18-649 Embedded System Engineering Friday 16-Oct-2015 Note: Course slides shamelessly stolen from lecture All course notes Copyright 2006-2011, Philip Koopman, All Rights Reserved Announcements

More information