Computer forensic science
|
|
- Charla Cannon
- 6 years ago
- Views:
Transcription
1 Computer forensic science November 10, 2017 Administrative submittal instructions answer the lab assignment s questions in written report form, as a text, pdf, or Word document file (no obscure formats please) to csci530l@usc.edu exact subject title must be forensicslab deadline is start of your lab session the following week reports not accepted (zero for lab) if late you did not attend the lab (except DEN or prior arrangement) subject title deviates 1
2 Administrative employment CS530 will be next offered Fall 2018 lab graders will be needed you are the automatically ideal candidates you must remain a student in Fall 2018 contact me with expression of interest now, or subsequently hiring can only take place next August-September Details: Administrative this is our final lab 2
3 This drive has been victimized! Mallory CS530 students must help! CS530 students What happened?! 3
4 Every student gets a copy Forensic science it s detective work 4
5 Aspects of traditional forensics pathology handwriting fire scenes death scenes medical decomposition toxicology genetic signatures - DNA fingerprints firearms residues, casings document science forgery law Computer forensic science 5
6 Not enough drives for everybody would you accept a (large) file?* dd if=drive of=file drive.image * a file instead of a drive is realistic. Recovered drives are first imaged, the investigation works with that copy, never the original. This week s s exercise shared with us by UCLA professors Peter A. H. Peterson and Peter Reiher (for which, thanks!) they had a corrupted/hacked/victimized drive they dd ed it to a file they named that file act2.img every student gets a copy 6
7 disks Distinguish: disks, partition tables, partitions, filesystems,, files partition tables a virgin hard disk (maybe by Western Digital) filesystems a partition table written within an MBR or GPT (maybe by grub; on the disk) partitions a filesystem written (maybe by mkfs, in the partition) files a partition defined (maybe by fdisk/gdisk; in the partition table files created (maybe by vi, in the filesystem) (a) /dev/hda Naming of disks and partitions: as if devices ( /dev/ ) (b) disk (d) MBR/GPT (c) /dev/hda /dev/hda1 filesystem (e) partition files 7
8 Q. how can you use your files? A. mount their containing filesystem into a hierarchical file tree / mountpoint What does mount mount? mount mounts filesytesms mount does not mount anything else not disks not partitions not files give mount the name of the filesystem to mount but filesystems don t have their own names! so instead we give mount the name of a partition that contains the filesystem to mount 8
9 Q. how can you mount a filesystem? A. by referencing its containing partition* mount /dev/hda1 /mountpoint /dev/hda1 * Mount then understands a filesystem to be inside the partition, and that s what it s supposed to mount. It will a) do so if a filesystem is in there, or b) give an error message if not. The name of the partition is a surrogate for the (nonexistent) name of the filesystem. Beef Filesystems it s s what s s for dinner* it s s what mount mounts!! looks like mount mounts devices But: * widespread 1990s U.S. promotional ad slogan seeking to identify beef with dinner 9
10 little disk Copy/dd whole partition into a file partition copy lacks a device name to mount by give it one with losetup big disk File boundaries are dark blue rectangles File contents are rectangles interiors Copy/dd whole disk into a file (on a bigger disk) little disk disk copy lacks a device name give it one with losetup big disk File boundaries are dark blue rectangles File contents are rectangles interiors 10
11 Obtaining your disk using losetup and mount associate /dev/loop0 with data now de-associate associate with other data Loop device boundaries are red rectangles Loop device contents are rectangles interiors on DETER ~ is persistent while associated, treat /dev/loop0 as if a device, holding the loop-associated data as the device s content First, fdisk worked with /dev/loop0 because the data associated with it was that of a disk, and fdisk works with disks Later, mount worked with /dev/loop0 when the data associated with it was that of a filesystem, and mount works with filesystems Distinguish among machines 3 computers workbench.cfs.usccsci530.isi.deterlab.net (yours) users.isi.deterlab.net (holds export-mounted parts of your filesystem) the one whose corrupted disk we re analyzing pathnames are confusing don t look at the logs in /var/log for example look at those in ~/sda1/var/log 11
12 Software tools Peterson & Reiher s instructions document numerous commands as potential tools I found these particularly useful/essential sudo history e2undel strings; xxd and hexedit sudo use liberally you can t but root can sudo s config file Everybody can do everything as root provided they do it through sudo 12
13 history use cat not history command Must be some sensitive data in here e2undel recover to a persistent place OK on mounted image, no need to umount try the different time periods when deletions may have occurred Chose something to recover Then look at it 13
14 Binary file contents strings, xxd strings extracts just ascii portions xxd and hexedit show each byte twice, as both hex and ascii symbol (if any,. otherwise) scp secure remote file copy no files start with pass on aludra we have one locally scp puts one there and now there it is 14
15 System log files start here The assignment write a report it was 15
16 USC s s #2 department: CS USC s s #1 department: Admissions! 16
17 Thank you I have enjoyed the opportunity to be the lab instructor for your class Applause I applaud your effort, interest, ability best of luck in your academic and career futures 17
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 4: System Level Disk Control Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Essential Linux for Forensics You will learn in this lecture: Command Summary:
More informationExercise 4: Access Control and Filesystem Security
Exercise 4: Access Control and Filesystem Security Introduction Duration: 90 min Maximum Points: 30 Note: The solutions of theorethical assignments should be handed out before the practical part in the
More informationNetwork sniffing packet capture and analysis
Network sniffing packet capture and analysis September 29, 2017 Administrative submittal instructions answer the lab assignment s 13 questions in numbered list form, in a Word document file. (13 th response
More informationThis is Worksheet and Assignment 12. Disks, Partitions, and File Systems
This is Worksheet and Assignment 12 This is a combined Worksheet and Assignment.. Quizzes and tests may refer to work done in this Worksheet and Assignment; save your answers. You will use a checking program
More informationCST8207: GNU/Linux Operating Systems I Lab Nine Disks, Partitions, and File Systems Part 2. Disks, Partitions, and File Systems - Part 2 of 2
Student Name: Lab Section: Disks, Partitions, and File Systems - Part 2 of 2 1 Due Date - Upload to Blackboard by 8:30am Monday April 9, 2012 Submit the completed lab to Blackboard following the Rules
More informationMINI-HOWTO backup and/or restore device or partition using zsplit/unzsplit
MINI-HOWTO backup and/or restore device or partition using zsplit/unzsplit Jurij Ivastsuk-Kienbaum jurij [at] device-image.de Revision History First draft March 14, 2006 This document describes a setup
More informationFOUNDATIONS OF INFORMATION SYSTEMS MIS 2749 COURSE SYLLABUS Fall, Course Title and Description
FOUNDATIONS OF INFORMATION SYSTEMS MIS 2749 COURSE SYLLABUS Fall, 2013 Instructor s Name: Vicki Robertson E-mail: vrobrtsn@memphis.edu Course Title and Description Foundations of Information Systems. (3
More informationFirewalls. October 13, 2017
Firewalls October 13, 2017 Administrative submittal instructions answer the lab assignment s questions in written report form, as a text, pdf, or Word document file (no obscure formats please) email to
More informationUsing grub to Boot various Operating Systems
Operating Systems and Systems Integration Using grub to Boot various Operating Systems Contents 1 Aim 2 2 What You Will Do 2 3 Background 2 3.1 Installing grub in MBR from a floppy, and from the OS........
More informationLab 3. Getting Started with Outlook 2007 (Chapter 2) CS131 Software for Personal Computing Estimated Time: 1 2 hours
Lab 3 Getting Started with Outlook 2007 (Chapter 2) CS131 Software for Personal Computing Estimated Time: 1 2 hours Notes: 1. If you are using a University computer, you will need to complete this lab
More informationMarketing Research Participation for BUAD 307
Marketing Research Participation for BUAD 307 Note that this handout amends your syllabus regarding the Market Research Participation Questions about registering and participating: mkt.sona@marshall.usc.edu
More informationDigital Forensics ITP 375 (3 Units)
Digital Forensics ITP 375 (3 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming more of
More informationProgram Approval Form
For approval of new programs and deletions or X Program Approval Form modifications to an existing program. Action Requested: Type (Check one): Create New (SCHEV approval required except for minors) B.A.
More informationOperating Systems Design 12a. Special File Systems
Operating Systems Design 12a. Special File Systems Paul Krzyzanowski pxk@cs.rutgers.edu 3/26/2011 1 Generic Interfaces via VFS VFS gives us a generic interface to file operations We don t need to have
More information24) Type a note then click the OK button to save the note. This is a good way to keep notes on items of interest.
23) Click File Analysis Tab - This allows forensic investigators to look for files on the system as they would on a regular system. Key file attributes are provided to assist the investigator (file size,
More informationUNI Study Abroad Center
How to Apply to a Study Abroad Program Open the UNI Study Abroad Webpage at: https://studyabroad.uni.edu/ Contents STEP 1: Attend an ABROAD101 information session (mandatory).... 2 STEP 2: Attend a Pick-A-Program
More informationProgramming Standards: You must conform to good programming/documentation standards. Some specifics:
CS3114 (Spring 2011) PROGRAMMING ASSIGNMENT #3 Due Thursday, April 7 @ 11:00 PM for 100 points Early bonus date: Wednesday, April 6 @ 11:00 PM for a 10 point bonus Initial Schedule due Thursday, March
More informationProject 3: An Introduction to File Systems. COP 4610 / CGS 5765 Principles of Operating Systems
Project 3: An Introduction to File Systems COP 4610 / CGS 5765 Principles of Operating Systems Introduction Project 3 learning objectives File system design and implementation File system testing Data
More informationHOW TO CLONE A LARGE NUMBER OF PCs
HOW TO CLONE A LARGE NUMBER OF PCs András Keszthelyi (Budapest Tech Polytechnical Institution) kea@turul.banki.hu Computer sciences are taught in all kinds of schools from elementary grade to universities
More informationTHOMAS RUSSELL, Information Technology Teacher
THOMAS RUSSELL, Information Technology Teacher Historical/Conceptual After installing the hard drive it needs to be partitioned. Partitioning is the process of electronically subdividing the physical hard
More informationAdding a block devices and extending file systems in Linux environments
Adding a block devices and extending file systems in Linux environments In this exercise we simulate situation where user files partition /home fills up and needs to be extended. Also we migrate from static
More informationA GUIDE TO THE GRIEVANCE PROCESS IN THE DISTRICT OF COLUMBIA JAIL
A GUIDE TO THE GRIEVANCE PROCESS IN THE DISTRICT OF COLUMBIA JAIL The grievance process is complicated, so don t get frustrated, just read through this guide several times, and if you still don t understand
More informationSANOG VI IP Services Workshop: FreeBSD Install
SANOG VI IP Services Workshop: FreeBSD Install FreeBSD is designed to be a server operating system. This becomes apparent during the installation process. The FreeBSD installer is a console-based (not
More informationin-the-middle attack
ARP* man-in in-the-middle attack David Morgan October 27, 2017 *address resolution protocol rfc 826 Administrative submittal instructions answer the lab assignment s questions in written report form, as
More informationMidterm spring. CSC228H University of Toronto
Midterm 2002 - spring CSC228H University of Toronto Duration 50 minutes Aids Allowed: none. No calculators. Student Number: Last Name: First Name: Instructor: TA: Do not turn this page until you have received
More informationManage Directories and Files in Linux. Objectives. Understand the Filesystem Hierarchy Standard (FHS)
Manage Directories and Files in Linux Objectives Understand the Filesystem Hierarchy Standard (FHS) Identify File Types in the Linux System Change Directories and List Directory Contents Create and View
More informationSymplicity Career Services Manager Student User Reference Guide
Symplicity Career Services Manager Student User Reference Guide WELCOME TO SYMPLICITY! Wayne State University Law School Career Services Office Symplicity is the new web-based career management system
More informationPreview. COSC350 System Software, Fall
Preview File System File Name, File Structure, File Types, File Access, File Attributes, File Operation Directories Directory Operations File System Layout Implementing File Contiguous Allocation Linked
More informationComputer System Management - Unix/Linux
Computer System Management - Unix/Linux Amarjeet Singh August 30, 2011 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Learn-it-yourself topic assignment Many students
More informationYou must pass the final exam to pass the course.
Computer Science Technology Department Houston Community College System Department Website: http://csci.hccs.cc.tx.us CRN: 46876 978-1-4239-0146-4 1-4239-0146-0 Semester: Fall 2010 Campus and Room: Stafford
More informationCIS 191A Final Exam. Fall CIS 191 Final Exam
CIS 191A Final Exam Fall 2008 CIS 191 Final Exam The final for CIS 191A is composed several parts: A. (10 points) Questions B. (5 points) Checklist C. (10 points) Troubleshooting D. (35 points) Building
More informationCSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209
CSC209 Software Tools and Systems Programming https://mcs.utm.utoronto.ca/~209 What is this Course About? Software Tools Using them Building them Systems Programming Quirks of C The file system System
More informationComputer Science 62 Lab 8
Computer Science 62 Lab 8 Wednesday, March 26, 2014 Today s lab has two purposes: it is a continuation of the binary tree experiments from last lab and an introduction to some command-line tools. The Java
More informationExploring the file system. Johan Montelius HT2016
1 Introduction Exploring the file system Johan Montelius HT2016 This is a quite easy exercise but you will learn a lot about how files are represented. We will not look to the actual content of the files
More informationWeek 10 Project 3: An Introduction to File Systems. Classes COP4610 / CGS5765 Florida State University
Week 10 Project 3: An Introduction to File Systems Classes COP4610 / CGS5765 Florida State University 1 Introduction The goal of project 3 is to understand basic file system design and implementation file
More informationUpgrade Cisco Interface Module for LoRaWAN IXM using the Console
Upgrade Cisco Interface Module for LoRaWAN IXM using the Console Contents Introduction Prerequisites Requirements Components Used Background Information Configure Step 1. Prepare the firmware images (and
More informationFile System. Preview. File Name. File Structure. File Types. File Structure. Three essential requirements for long term information storage
Preview File System File System File Name, File Structure, File Types, File Access, File Attributes, File Operation Directories Directory Operations Contiguous Allocation Linked List Allocation Linked
More informationStructural and Syntactic Pattern Recognition
Structural and Syntactic Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Fall 2017 CS 551, Fall 2017 c 2017, Selim Aksoy (Bilkent
More informationTO: Doctoral Students Expected to Register in EDD 1006 for Spring FROM: R. H. Red Owl, Ph.D., Professor
TO: Doctoral Students Expected to Register in EDD 1006 for Spring 2015 FROM: R. H. Red Owl, Ph.D., Professor (redowl@liu.edu) SUBJECT: EDD 1006 Free Statistics Webinar and Webinar Preparation Session DATE:
More informationCAREER SERVICES MANAGER, Powered by Symplicity STUDENT AND ALUMNI INSTRUCTION MANUAL
CAREER SERVICES MANAGER, Powered by Symplicity STUDENT AND ALUMNI INSTRUCTION MANUAL HOME TAB Log in at https://law-hamline-csm.symplicity.com/students/. Students For students, your login is your email
More informationAdobe Illustrator CS4
Adobe Illustrator CS4 COURSE DESCRIPTION This course examines the basic features that have made Adobe Illustrator virtually Indispensable to today's graphics designer. Topics include drawing and shape
More informationECE646 Fall Lab 1: Pretty Good Privacy. Instruction
ECE646 Fall 2012 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All
More informationCourse Syllabus - CNT 4703 Design and Implementation of Computer Communication Networks Fall 2011
Course Syllabus - CNT 4703 Design and Implementation of Computer Communication Networks Fall 2011 Credits: 3 Course Meets: Tuesday and Thursday 4:00 pm to 5:15 pm in HEC 104 Lab Hours: HEC 322 we will
More informationProject 3: An Introduction to File Systems. COP4610 Florida State University
Project 3: An Introduction to File Systems COP4610 Florida State University 1 Introduction The goal of project 3 is to understand basic file system design and implementation file system testing data serialization/de-serialization
More informationCS15100 Lab 7: File compression
C151 Lab 7: File compression Fall 26 November 14, 26 Complete the first 3 chapters (through the build-huffman-tree function) in lab (optionally) with a partner. The rest you must do by yourself. Write
More informationComputer Forensics: Investigating Data and Image Files, 2nd Edition. Chapter 3 Forensic Investigations Using EnCase
Computer Forensics: Investigating Data and Image Files, 2nd Edition Chapter 3 Forensic Investigations Using EnCase Objectives After completing this chapter, you should be able to: Understand evidence files
More informationEDIT571-5T1 Fireworks CRN Credits 2 Online August 30 November 6
EDIT 571 - Fireworks Fall 209 p. 1 EDIT571-5T1 Fireworks CRN 72324 Credits 2 Online August 30 November 6 Instructor Heather Tillberg-Webb, PhD Blackboard Login Page http://courses.gmu.edu/ Stay Connected
More informationIntrusion Detection. October 19, 2018
Intrusion Detection October 19, 2018 Administrative submittal instructions answer the lab assignment s questions in written report form, as a text, pdf, or Word document file (no obscure formats please)
More informationDeVry University Houston
DeVry University Houston Faculty Orientation Manual IN THIS SECTION: Teaching Contracts & Payment Teaching Contracts Payment Terms Change of Address or Contact Information Section 2 Tax Information TEACHING
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning
More informationECE646 Fall Lab 1: Pretty Good Privacy. Instruction
ECE646 Fall 2015 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All
More informationSMD149 - Operating Systems - File systems
SMD149 - Operating Systems - File systems Roland Parviainen November 21, 2005 1 / 59 Outline Overview Files, directories Data integrity Transaction based file systems 2 / 59 Files Overview Named collection
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationRHCE BOOT CAMP. Filesystem Administration. Wednesday, November 28, 12
RHCE BOOT CAMP Filesystem Administration PARTITIONING What is partitioning? Splitting up a hard drive into organizable chunks Why? Isolates filesystem corruption Simplifies/speeds backups Allows optimizing
More informationCourse Syllabus: Linux Essentials
Course Syllabus: Linux Essentials Instructor: Roger Elliott Email: rlelliott@c-tec.edu Phone: Office: (740) 364-2299 Cell: (740) 814-7504 Course text Course #: Hours: Meeting Days & Times: Location Linux
More informationHow To Resize ext3 Partitions Without Losing Data
By Falko Timme Published: 2007-01-07 17:12 How To Resize ext3 Partitions Without Losing Data Version 1.0 Author: Falko Timme Last edited 12/31/2006 This article is about
More informationCSE 101 Introduction to Computers Development / Tutorial / Lab Environment Setup
CSE 101 Introduction to Computers Development / Tutorial / Lab Environment Setup Purpose: The purpose of this lab is to setup software that you will be using throughout the term for learning about Python
More informationLinux Systems Security. Backup and Change Management NETS Fall 2016
Linux Systems Security Backup and Change Management NETS1028 - Fall 2016 Backup Security breaches can cast doubt on entire installations or render them corrupt Files or entire systems may have to be recovered
More informationCIS UNIX System Administration
Lab 11: Lab notes: - Lab 10 successful completion is a prerequisite for this lab - The sda8, sda9 partitions below may change based on current disk partition. See instructor for current # s. - After the
More informationCSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209
CSC209 Software Tools and Systems Programming https://mcs.utm.utoronto.ca/~209 What is this Course About? Software Tools Using them Building them Systems Programming Quirks of C The file system System
More informationNASA Lab. Partition/Filesystem/Bootloader. TinRay, Yu-Chuan
NASA Lab Partition/Filesystem/Bootloader TinRay, Yu-Chuan Agenda Conceptual Storage Structure Bootloader Practical & \Exercise/ Linux Device File Storage Related Commands Boot Related Commands 2 Before
More informationComputer Information Technology 240 Networking Fall 2013 Sections 1 & 2
Computer Information Technology 240 Networking Fall 2013 Sections 1 & 2 Instructor: Textbook: Bradley J. Armstrong CCNA Guide to Cisco Networking, Fourth Edition Office Information: Smith 407 Phone 496-3766
More information1 Background and Introduction 2. 2 Assessment 2
Luleå University of Technology Matthew Thurley Last revision: October 27, 2011 Industrial Image Analysis E0005E Product Development Phase 4 Binary Morphological Image Processing Contents 1 Background and
More informationTinyNet. Creating Virtual Machines
TinyNet Creating Virtual Machines VirtualBox is a little funny about its configuration files, so we need a separate utility to run VirtualBox using non-standard locations for our virtual machines (VMs)
More informationAt course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B::
Module Title Duration : 55187B: Linux System Administration : 4 days Overview This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional
More informationChapter 6. Linux File System
Chapter 6 Linux File System 1 File System File System management how to store informations on storage devices The Hierarchical Structure Types of file Common File system Tasks 2 The Hierarchical Structure
More informationInstructor: Anna Miller
Media Graphics ADV 3203 Fall 2016 Advertising Media Graphics - 81584 - ADV 3203 Mondays and Wednesdays 12:15 PM - 1:30 PM room 1011 And Advertising Media Graphics - 82354 - ADV 3203 Mondays and Wednesdays
More informationCS 241 Data Organization using C
CS 241 Data Organization using C Fall 2018 Instructor Name: Dr. Marie Vasek Contact: Private message me on the course Piazza page. Office: Farris 2120 Office Hours: Tuesday 2-4pm and Thursday 9:30-11am
More informationSyllabus Course: MIS Foundation of Information Systems Fall Semester, Credit Hours
Syllabus Course: MIS 2749-001 Foundation of Information Systems Fall Semester, 2015 3.0 Credit Hours Instructor: Cindricka L. Arrington Phone: 901-598-3093 E-mail: carrngtn@memphis.edu Office: Virtual
More informationCOMP 3500 Introduction to Operating Systems Project 5 Virtual Memory Manager
COMP 3500 Introduction to Operating Systems Project 5 Virtual Memory Manager Points Possible: 100 Submission via Canvas No collaboration among groups. Students in one group should NOT share any project
More informationCourse 55187B Linux System Administration
Course Outline Module 1: System Startup and Shutdown This module explains how to manage startup and shutdown processes in Linux. Understanding the Boot Sequence The Grand Unified Boot Loader GRUB Configuration
More informationCIS 101 Orientation Document Fall 2017
CIS 101 Orientation Document Fall 2017 Fall 2017 ONLINE section 23989 To be successful in an online section you must be motivated, disciplined, and able to read and understand the material in the books
More informationCS435 Introduction to Big Data FALL 2018 Colorado State University. 11/7/2018 Week 12-B Sangmi Lee Pallickara. FAQs
11/7/2018 CS435 Introduction to Big Data - FALL 2018 W12.B.0.0 CS435 Introduction to Big Data 11/7/2018 CS435 Introduction to Big Data - FALL 2018 W12.B.1 FAQs Deadline of the Programming Assignment 3
More informationSIS STUDENT INFORMATION CENTER
Using the Self Service Student Center As a student you can: 1. Log Into the System 2. Navigate 3. Add Favorites 4. Add, Drop, or Swap Classes 5. View Your Class Schedule 6. View Grades 7. View Degree Progress
More informationFile System: Interface and Implmentation
File System: Interface and Implmentation Two Parts Filesystem Interface Interface the user sees Organization of the files as seen by the user Operations defined on files Properties that can be read/modified
More informationHomework: More Abstraction, Trees, and Lists
Homework: More Abstraction, Trees, and Lists COMP 50 Fall 2013 This homework is due at 11:59PM on Monday, November 18. Submit your solutions in a single file using the COMP 50 Handin button on DrRacket;
More informationExam LFCS/Course 55187B Linux System Administration
Exam LFCS/Course 55187B Linux System Administration About this course This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional
More informationAdobe Dreamweaver CS3 English 510 Fall 2007
Adobe Dreamweaver CS3 English 510 Fall 2007 Important: Before going through this handout, you should create a WWW directory on your ISU e-mail account. Otherwise, you will not be able to upload and view
More informationDisks, Filesystems 1
Disks, Filesystems 1 sudo and PATH (environment) disks partitioning formatting file systems: mkfs command checking file system integrity: fsck command /etc/fstab mounting file systems: mount command unmounting
More informationDirectory. File. Chunk. Disk
SIFS Phase 1 Due: October 14, 2007 at midnight Phase 2 Due: December 5, 2007 at midnight 1. Overview This semester you will implement a single-instance file system (SIFS) that stores only one copy of data,
More informationSabre Guide. Account login instructions
Sabre Guide Account login instructions Portal Guard MyMarian Marian Email SabreNet Marian Online 2 Mobile App Cardinal Meyer Library Calendar App Marian Wifi PORTAL GUARD Portal Guard will allow you to
More informationMotivation. Operating Systems. File Systems. Outline. Files: The User s Point of View. File System Concepts. Solution? Files!
Motivation Operating Systems Process store, retrieve information Process capacity restricted to vmem size When process terminates, memory lost Multiple processes share information Systems (Ch 0.-0.4, Ch.-.5)
More informationVERSION Lab 3: Link Layer
Lab 3: Link Layer Objective In this lab, you will investigate Ethernet and the ARP protocol. You will also prove you are a Wireshark Ninja by dissecting an unknown protocol. Knowledge from Lecture 20 and
More informationSAULTCOLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE
SAULTCOLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: CODE NO. : SEMESTER: 3 PROGRAM: AUTHOR: Computer Programmer Fred Carella DATE: Fall 2013 PREVIOUS OUTLINE
More informationDisks, Filesystems, Booting Todd Kelley CST8177 Todd Kelley 1
Disks, Filesystems, Booting Todd Kelley kelleyt@algonquincollege.com CST8177 Todd Kelley 1 sudo and PATH (environment) disks partitioning formatting file systems: mkfs command checking file system integrity:
More informationNote: Review pre-course content, Before the Course Begins section, starting August 14, 07:00 UTC. Course Element
Course Schedule: Introduction to Engineering: Imagine. Design. Engineer! Fall 2017 Items are listed in UTC. Please calculate equivalents for your time zone. (07:00 UTC is 7am UTC.) Note: Review pre-course
More informationIntroduction to Information Technology ITP 101x (4 Units)
Objective Concepts Introduction to Information Technology ITP 101x (4 Units) Upon completing this course, students will: - Understand the fundamentals of information technology - Learn core concepts of
More informationCISC 3130 Data Structures Fall 2018
CISC 3130 Data Structures Fall 2018 Instructor: Ari Mermelstein Email address for questions: mermelstein AT sci DOT brooklyn DOT cuny DOT edu Email address for homework submissions: mermelstein DOT homework
More informationTo understand this, let's build a layered model from the bottom up. Layers include: device driver filesystem file
Disks_and_Layers Page 1 So what is a file? Tuesday, November 17, 2015 1:23 PM This is a difficult question. To understand this, let's build a layered model from the bottom up. Layers include: device driver
More informationWriteup for first project of CMSC 420: Data Structures Section 0102, Summer Theme: Threaded AVL Trees
Writeup for first project of CMSC 420: Data Structures Section 0102, Summer 2017 Theme: Threaded AVL Trees Handout date: 06-01 On-time deadline: 06-09, 11:59pm Late deadline (30% penalty): 06-11, 11:59pm
More informationE-cash. Cryptography. Professor: Marius Zimand. e-cash. Benefits of cash: anonymous. difficult to copy. divisible (you can get change)
Cryptography E-cash Professor: Marius Zimand e-cash Benefits of cash: anonymous difficult to copy divisible (you can get change) easily transferable There are several protocols for e-cash. We will discuss
More informationDisks, Filesystems Todd Kelley CST8177 Todd Kelley 1
Disks, Filesystems Todd Kelley kelleyt@algonquincollege.com CST8177 Todd Kelley 1 sudo and PATH (environment) disks partitioning formatting file systems: mkfs command checking file system integrity: fsck
More informationCandidate Brochure. V15.1a. American Society of Professional Estimators 2525 Perimeter Place Dr., Ste. 103 Nashville, TN 37214
Candidate Brochure American Society of Professional Estimators 2525 Perimeter Place Dr., Ste. 103 Nashville, TN 37214 615.316.9200 Fax 615.316.9800 ACCE Recognized Program V15.1a Revised V15.1a May 2017
More informationCS 171: Introduction to Computer Science II. Quicksort
CS 171: Introduction to Computer Science II Quicksort Roadmap MergeSort Recursive Algorithm (top-down) Practical Improvements Non-recursive algorithm (bottom-up) Analysis QuickSort Algorithm Analysis Practical
More informationLinux Hardware Management. Linux System Administration COMP2018 Summer 2017
Linux Hardware Management Linux System Administration COMP2018 Summer 2017 Hardware Resources CPU refers to the primary computing resource and is measured in processor cores RAM refers to the volatile
More informationRHCSA BOOT CAMP. Filesystem Administration
RHCSA BOOT CAMP Filesystem Administration PARTITIONING What is partitioning? Splitting up a hard drive into organizable chunks Why? Isolates filesystem corruption Simplifies/speeds backups Allows optimizing
More informationOperating System. Hanyang University. Hyunmin Yoon Operating System Hanyang University
Hyunmin Yoon (fulcanelli86@gmail.com) 2 ubuntu Linux Download https://www.ubuntu.com/download/desktop http://gofile.me/3qiyp/pj6fzmojf 2 3 VMware Workstation Player (optional) Download https://www.vmware.com/products/workstation-player/workstation-player-evaluation.html
More informationCOURSE OUTLINE. School of Engineering Technology and Applied Science. Computer Systems and Networks Technology (CSNT) PRE-REQUISITES/CO-REQUISITES:
COURSE OUTLINE SCHOOL: School of Engineering Technology and Applied Science DEPARTMENT: Information and Communication Engineering Technology (ICET) PROGRAM: COURSE TITLE: Computer Systems and Networks
More informationPredicting the Types of File Fragments
Predicting the Types of File Fragments William C. Calhoun and Drue Coles Department of Mathematics, Computer Science and Statistics Bloomsburg, University of Pennsylvania Bloomsburg, PA 17815 Thanks to
More informationCSE 120 Principles of Operating Systems
CSE 120 Principles of Operating Systems Fall 2016 Lecture 11: Page Replacement Geoffrey M. Voelker Administrivia Lab time This week: Thu 4pm, Sat 2pm Next week: Tue, Wed At Washington University in St.
More information