Sudo: Switch User Do. Administrative Privileges Delegation Campus-Booster ID : **XXXXX. Copyright SUPINFO. All rights reserved
|
|
- Leslie Houston
- 6 years ago
- Views:
Transcription
1 Sudo: Switch User Do Administrative Privileges Delegation Campus-Booster ID : **XXXXX Copyright SUPINFO. All rights reserved
2 Sudo: Switch User Do Your trainer Presenter s Name Title: **Enter title or job role. Accomplishments: **What makes the presenter qualified to present this course. Education: **List degrees if important. Publications: **Writings by the presenter on the subject of the course or presentation. Contact: **Campus-Booster ID: presenter@supinfo.com
3 Sudo: Switch User Do Course objectives By completing this course, you will: n Delegate privileges. Allow users to execute commands as root or another user. n Restricted delegation. Delegate only a command subset. n Password/Passwordless privilege granting. Control whether or not users will be prompted.
4 Sudo: Switch User Do Course topics Course s plan: n Unix privileges. Concept and limitations. n Using sudo. How to delegate privileges n Editing files as root: sudoedit. Wildcards and pitfalls.
5 Sudo: Switch User Do Unix privileges Concept and limitations
6 Unix privileges King and peasants Unix systems lacks granularity. n All or nothing model n Root user n Administrator n superuser n All-powerful n Regular user n (Very) limited n Helpless outside ~ n Rely on root
7 Unix privileges Peasants and Gentlefolks Power Users? n Service administrators n Need a subset of root privileges n Using su n Start/Stop daemon n Edit config files n Different physical users: Not a good idea. n Need to give root password away
8 Unix privileges Peasants and Gentlefolks Restricted su: sudo n Delegate only what s needed n Specific commands n Specific users n On specific hosts n Can log (almost) everything n Prompts for the sudoer password n Using sudo as a su is pointless
9 Unix privileges Stop-and-think Do you have any questions?
10 Unix privileges Stop-and-think Unix system have a privileged user group named Power Users. True False
11 Unix privileges Stop-and-think Unix system have a privileged user group named Power Users. True False
12 Sudo: Switch User Do Using sudo Delegating privileges
13 Using sudo Configuration Who s allowed to do what (and where). n Sudo config file n /etc/sudoers n Sensitive n Only writable as root n Never edit it directly n Use visudo n Checks syntax before overwriting n Uses $EDITOR
14 Using sudo Config file structure n Gobal format: login/group host = (can sudo as user) command(s) n Sarah can change the date: sarah ALL = (ALL) /bin/date n Bill can reboot without a password bill ALL = (ALL) NOPASSWD:/sbin/reboot n Members of the webadm group can control the service %webadmin ALL = (ALL) /etc/init.d/apache2 n Wheel members can execute all commands but su %wheel ALL = (ALL) ALL,!/bin/su
15 Using sudo Aliases Factoring elements. n Create lists of n Users, groups n Hosts, networks, n Binaries n Keywords: n User_Alias n Runas_Alias n Host_Alias n Cmnd_Alias
16 Using sudo Aliases Configuration Example: Cmnd_Alias BACKUPS = /usr/bin/tar, /usr/bin/rsync, \ /usr/bin/dump User_Alias BOPS = john, bill, sarah, %wheel BOPS ALL = (ALL) NOPASSWD: BACKUPS
17 Using sudo Sudo invocation Using sudo ~]$ sudo [options] command Options Definitions -i -u user -l Interactive session: Open a shell as the selected identity. Run the command as user. List available (delegated) actions for the currently logged user.
18 Using sudo Stop-and-think Do you have any questions?
19 Using sudo Stop-and-think Sudo options: Match options and their definition. -u -i -l List av. actions Select user Open a shell
20 Using sudo Stop-and-think Sudo options: Match options and their definition. -u -i -l List av. actions Select user Open a shell
21 Sudo: Switch User Do Editing files as root: sudoedit Wildcard and pitfalls
22 Editing files as root: sudoedit Sudoedit Why not using $EDITOR? n Security n Spawn shell from editor n $EDITOR is a shell n n Sudoedit n Copy the file as root n Run $EDITOR as yourself n Overwrite original as root
23 Editing files as root: sudoedit Wildcards and Pitfalls n What do you think about this? %webadmins ALL = (ALL) NOPASSWD: sudoedit /etc/httpd/*
24 Editing files as root: sudoedit Wildcards and Pitfalls n Now consider this: [user@linux ~]$ sudoedit /etc/httpd/../shadow n Wildcards are potentially dangerous n Use with caution n Consider using ACL s to delegate rights over these files
25 Editing files as root: sudoedit Stop-and-think Do you have any questions?
26 Editing files as root: sudoedit Stop-and-think To allow users to edit a config file set, you will: Use sudoedit and a wildcard Use sudoedit, one command per file Use ACL s
27 Editing files as root: sudoedit Stop-and-think To allow users to edit a config file set, you will: Use sudoedit and a wildcard Use sudoedit, one command per file Use ACL s
28 Sudo: Switch User Do Course summary Sudoedit Unix privileges Wildcards Privileges delegation Using Aliases
29 Sudo: Switch User Do For more If you want to go into these subjects more deeply, Publications Courses Linux Technologies: Edge Computing Linux system administration Web sites Conferences FOSDEM RMLL Solutions Linux
30 Congratulations You have successfully completed the SUPINFO course module n 07 Sudo: Switch User Do
31 Sudo: Switch User Do The end n Delegate only required privileges n Use sudo rather than sharing a single root account
Access Control Lists. Beyond POSIX permissions Campus-Booster ID : **XXXXX. Copyright SUPINFO. All rights reserved
Access Control Lists Beyond POSIX permissions Campus-Booster ID : **XXXXX www.supinfo.com Copyright SUPINFO. All rights reserved Access Control Lists Your trainer Presenter s Name Title: **Enter title
More informationProcesses. System tasks Campus-Booster ID : **XXXXX. Copyright SUPINFO. All rights reserved
Processes System tasks Campus-Booster ID : **XXXXX www.supinfo.com Copyright SUPINFO. All rights reserved Processes Your trainer Presenter s Name Title: **Enter title or job role. Accomplishments: **What
More informationFilesystem and common commands
Filesystem and common commands Unix computing basics Campus-Booster ID : **XXXXX www.supinfo.com Copyright SUPINFO. All rights reserved Filesystem and common commands Your trainer Presenter s Name Title:
More informationArchives. Gather and compress Campus-Booster ID : **XXXXX. Copyright SUPINFO. All rights reserved
Archives Gather and compress Campus-Booster ID : **XXXXX www.supinfo.com Copyright SUPINFO. All rights reserved Archives Your trainer Presenter s Name Title: **Enter title or job role. Accomplishments:
More informationYour daily cup of CLI
Your daily cup of CLI Powerful Unix tools Campus-Booster ID : **XXXXX www.supinfo.com Copyright SUPINFO. All rights reserved Your daily cup of CLI Your trainer Presenter s Name Title: **Enter title or
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration User accounts The /etc/passwd file The /etc/shadow file Root powers Ownership of files and processes The superuser The /etc/group file Adding users Removing users
More informationUser Management. lctseng
User Management lctseng ID User ID, Group ID % id lctseng uid=10554(lctseng) gid=1130(cs) groups=1130(cs),0(wheel),2000(taever),2012(security) % id 10047 Same as above Super user (defined by uid = 0) root
More informationLinuxing In London - 19/10/2016. session 1: root, su or sudo? ALINA ŚWIĘTOCHOWSKA PRINCIPAL TECHNOLOGIST UNIX/LINUX
Linuxing In London - 19/10/2016 session 1: root, su or sudo? ALINA ŚWIĘTOCHOWSKA PRINCIPAL TECHNOLOGIST UNIX/LINUX root, su or sudo? What is superuser? Using root and its password (or not) Using su (or
More informationThere are two tools with which you should be familiar: the program su, and more importantly, sudo. Here we see how to use them.
Operating Systems and Systems Integration Administration, the root User and Configuring sudo 1 Aim The aim of this activity is to understand the purpose of the root account, and the security risks of logging
More informationComputer Center, CS, NCTU
User Management Adding New Users ID User ID, Group ID % id liuyh uid=10047(liuyh) gid=200(dcs) groups=200(dcs),0(wheel),700(ta),800(security),888(wwwadm) % id 10047 Super user root uid=10047(liuyh) gid=200(dcs)
More informationHANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS. Or something broke
HANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS Or something broke Securing your VM 101 Getting Comfy in Linux -> Comfort ++ You After This Talk Quick recap from last week. Setup
More informationSUDO(8) System Manager s Manual SUDO(8)
NAME sudo, sudoedit - execute a command as another user SYNOPSIS sudo -h -K -k -V sudo -v [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-u user] sudo -l [-AknS] [-a type] [-g group] [-h host] [-p
More informationNETW 110 Lab 3 Post-Installation Configuration Page 1
NETW 110 Lab 3 Post-Installation Configuration Page 1 Objective At the conclusion of this lab, the student will learn some very basic functions of vi, use vi to perform some post-installation configuration
More informationSUDO(8) System Manager s Manual SUDO(8)
NAME sudo, sudoedit - execute a command as another user SYNOPSIS sudo -h -K -k -V sudo -v [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-u user] sudo -l [-AknS] [-a type] [-g group] [-h host] [-p
More informationConfiguring TACACS+ Finding Feature Information. Prerequisites for TACACS+
Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software
More informationInterested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without
More informationVisara Master Console Center. Software Installation P/N
Visara Master Console Center Software Installation P/N 707133-001 Visara Master Console Center Technical Support Contacting the Visara Intellicenter For US domestic customers, Visara provides technical
More informationCommand-Line Interface (CLI) Basics
4 CHAPTER This chapter is intended as a quick reference, not as a step-by-step explanation of the Cisco IOS. The chapter describes basic Cisco IOS software command-line interfaces that you may need to
More informationSUDO(5) File Formats Manual SUDO(5)
NAME sudo.conf - configuration for sudo front end DESCRIPTION The sudo.conf file is used to configure the sudo front end. It specifies the security policy and I/O logging plugins, debug flags as well as
More informationSUDO(8) System Manager s Manual SUDO(8)
NAME sudo, sudoedit - execute a command as another user SYNOPSIS sudo -h -K -k -V sudo -v [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-u user] sudo -l [-AknS] [-a type] [-g group] [-h host] [-p
More informationCross-Platform Management
Cross-Platform Management with MS Operations Management Suite Pete Zerger @pzerger pete.zerger@gmail.com Lee Berg @LeeAlanBerg LeeAlanBerg@gmail.com Lee Berg Madison, WI Madison, Wi @LeeAlanBerg Consultant
More informationOracle 1Z Enterprise Linux System Administration. Download Full Version :
Oracle 1Z0-403 Enterprise Linux System Administration Download Full Version : http://killexams.com/pass4sure/exam-detail/1z0-403 B. It does not provide any protection to remote X connections. C. It allows
More informationConfiguring Security for the ML-Series Card
19 CHAPTER Configuring Security for the ML-Series Card This chapter describes the security features of the ML-Series card. This chapter includes the following major sections: Understanding Security, page
More informationGNU/Linux: An Essential Guide for Students Undertaking BLOSSOM
Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative
More informationPrerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)
Finding Feature Information, page 1 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), page 1 Information About TACACS+, page 3 How to Configure
More informationTECH 4272 Operating Systems
TECH 4272 Lecture 3 2 Todd S. Canaday Adjunct Professor Herff College of Engineering sudo sudo is a program for Unix like computer operating systems that allows users to run programs with the security
More information5 Managing Logins. For Help. In this Chapter... Login Account Concepts, 5-2
5 Managing Logins In this Chapter... Login Account Concepts, 5-2 The root Login Account, 5-3 Managing User Login Accounts, 5-5 Customizing Login Account Environments, 5-6 Passwords, 5-10 For Help HP-UX
More informationSUDO.CONF(5) File Formats Manual SUDO.CONF(5)
NAME sudo.conf - configuration for sudo front end DESCRIPTION The sudo.conf file is used to configure the sudo front end. It specifies the security policy and I/O logging plugins, debug flags as well as
More informationManaging GSS User Accounts Through a TACACS+ Server
CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System
More informationManaging Users, Managing Security
CHAPTER 19 Managing Users, Managing Security The heart of Linux security is determining who can use what file and what kind of use is permitted. This is not all there is to making Linux a more secure system,
More informationOBSERVEIT CLOUDTHREAT GUIDE
OBSERVEIT CLOUDTHREAT GUIDE Contents 1 About This Document... 2 1.1 Intended Audience... 2 1.2 Related ObserveIT Software and Documentation... 2 1.3 Support... 2 2 Product Overview... 3 3 Installing the
More informationThe kernel is the low-level software that manages hardware, multitasks programs, etc.
November 2011 1 Why Use Linux? Save Money Initial purchase and maintenance Resume Linux is used by MANY organizations More choices Tons of Linux operating systems November 2011 2 What is Linux? 1. Contains
More informationLinux Kung Fu. Ross Ventresca UBNetDef, Fall 2017
Linux Kung Fu Ross Ventresca UBNetDef, Fall 2017 GOTO: https://apps.ubnetdef.org/ What is Linux? Linux generally refers to a group of Unix-like free and open source operating system distributions built
More informationConfiguring Authorization
Configuring Authorization AAA authorization enables you to limit the services available to a user. When AAA authorization is enabled, the network access server uses information retrieved from the user
More informationInterested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without
More informationConfiguring the Management Interface and Security
CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various
More informationOne Identity Manager 8.0. Administration Guide for Connecting Unix-Based Target Systems
One Identity Manager 8.0 Administration Guide for Connecting Unix- Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationWorking with Basic Linux. Daniel Balagué
Working with Basic Linux Daniel Balagué How Linux Works? Everything in Linux is either a file or a process. A process is an executing program identified with a PID number. It runs in short or long duration
More informationAnswers to Even- Numbered Exercises
Answers to Even- 17 Numbered Exercises from page 1077 1. What option should you use with fsck if you want to review the status of your filesystems without making any changes to them? How does fsck determine
More informationRestrictions for Secure Copy Performance Improvement
The Protocol (SCP) feature provides a secure and authenticated method for copying router configuration or router image files. SCP relies on Secure Shell (SSH), an application and a protocol that provide
More informationControlled Privilege Escalation in Linux/UNIX Environments
Controlled Privilege Escalation in Linux/UNIX Environments by David Bank CCNA, CNE, CCSE, CNA v1.50 (2007 Jul 18) 2006 2007 David Bank Why is there a need for controlled privilege escalation? The Linux/UNIX
More informationManaging GSS User Accounts Through a TACACS+ Server
4 CHAPTER Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System
More informationLinux Command Line Interface. December 27, 2017
Linux Command Line Interface December 27, 2017 Foreword It is supposed to be a refresher (?!) If you are familiar with UNIX/Linux/MacOS X CLI, this is going to be boring... I will not talk about editors
More informationLinux OS Fundamentals for the SQL Admin. Anthony E. Nocentino
Linux OS Fundamentals for the SQL Admin Anthony E. Nocentino aen@centinosystems.com Anthony E. Nocentino Consultant and Trainer Founder and President of Centino Systems Specialize in system architecture
More informationCSE 390a Lecture 4. Persistent shell settings; users/groups; permissions
CSE 390a Lecture 4 Persistent shell settings; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/390a/ 1 2 Lecture summary
More informationINSE 6130 Operating System Security
INSE 6130 Operating System Security Access Control Mechanisms Prof. Lingyu Wang 1 Recap ACM: modeling access control in any system Who can do what to whom 6 primitive operations Commands, special ones
More informationDefinition Center Installation for Linux
Definition Center 10.2.0 - Installation for Linux These are instructions to install, configure, upgrade, start, stop and uninstall Definition Center 10.2.0 (DC) on a Linux system. In this installation,
More informationSystem Configuration as a Privilege
System Configuration as a Privilege Glenn Wurster, Paul C. van Oorschot School of Computer Science Carleton University, Canada HotSec 2009 11 Aug 2009 Glenn Wurster, Paul C. van Oorschot System Config
More information5. Easy Installation and Management
5. Easy Installation and Management 5.1. Provided as Software Programs SoftEther VPN is not a hardware VPN product. You can download it and install it today on your computer. If you want to try SoftEther
More informationSUDOERS(5) File Formats Manual SUDOERS(5)
NAME sudoers - default sudo security policy plugin DESCRIPTION The sudoers policy plugin determines a user s sudo privileges. It is the default sudo policy plugin. The policy is driven by the /etc/sudoers
More informationInformation System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000)
Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) armahmood786@yahoo.com alphasecure@gmail.com alphapeeler.sf.net/pubkeys/pkey.htm http://alphapeeler.sourceforge.net pk.linkedin.com/in/armahmood
More informationConfiguring Switch-Based Authentication
CHAPTER 7 This chapter describes how to configure switch-based authentication on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. This chapter consists
More informationBPPM Patrol Agent Installation Steps on Linux and Automation Integration
BPPM Patrol Agent Installation Steps on Linux and Automation Integration Author: Karlis Peterson, Software Consultant, BMC Software Version: 1.0 Date: May 12, 2013 DISCLAIMER NOTICE This is Field Developed
More informationAutomatically Logging on a User at Linux System Boot time for Console Management
Automatically Logging on a User at Linux System Boot time for Console Management This document can be found on the web at www.ibm.com/support/techdocs Search for author s name under the category of White
More informationReview of Fundamentals. Todd Kelley CST8207 Todd Kelley 1
Review of Fundamentals Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 GPL the shell SSH (secure shell) the Course Linux Server RTFM vi general shell review 2 These notes are available on
More informationInstalling Applications in FreeBSD. wengyc
Installing Applications in FreeBSD wengyc Before we start Permission issue root: the superuser In Unix-like system, root is the conventional name of the user who has all rights or permissions (to all files
More informationThese instructions describe the system requirements and process for installing and initial configuration of jbase on Linux operating systems.
DOCUMENT SCOPE These instructions describe the system requirements and process for installing and initial configuration of jbase 5.5.1 on Linux operating systems. ABOUT THE JBASE DATABASE MANAGEMENT SYSTEM
More informationOutline. UNIX security ideas Users and groups File protection Setting temporary privileges. Examples. Permission bits Program language components
UNIX security Ulf Larson (modified by Erland Jonsson/Magnus Almgren) Computer security group Dept. of Computer Science and Engineering Chalmers University of Technology, Sweden Outline UNIX security ideas
More informationAutomic Agent Deployment and Upgrade Toolkit. How-To Documentation
Automic Agent Deployment and Upgrade Toolkit How-To Documentation Table of Contents AUTOMIC AGENT DEPLOYMENT AND UPGRADE TOOLKIT... 4 Introduction... 4 Overview... 4 Benefits... 4 Compatibility... 5 Key
More informationOperating system security
Operating system security Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Outline Access control models in operating systems: 1. Unix 2. Windows Acknowledgements: This
More informationHP-UX System Administration Course Overview. Skills Gained. Who will the Course Benefit?
HP-UX System Administration Course Overview This Hewlett Packard HP-UX System Administration training course is designed to give delegates practical experience in the administration of an HP-UX UNIX System.
More informationManaging Xen With Xen-Tools, Xen-Shell, And Argo
By Falko Timme Published: 2006-10-21 20:35 Managing Xen With Xen-Tools, Xen-Shell, And Argo Version 1.0 Author: Falko Timme Last edited 10/21/2006 This guide describes how
More informationAAA Authorization and Authentication Cache
AAA Authorization and Authentication Cache First Published: March 16, 2006 Last Updated: March 1, 2006 The AAA Authorization and Authentication Cache feature allows you to cache authorization and authentication
More informationSUDOERS(5) File Formats Manual SUDOERS(5)
NAME sudoers - default sudo security policy plugin DESCRIPTION The sudoers policy plugin determines a user s sudo privileges. It is the default sudo policy plugin. The policy is driven by the /etc/sudoers
More informationLINUX OS FUNDAMENTALS FOR THE SQL ADMIN
LINUX OS FUNDAMENTALS FOR THE SQL ADMIN Anthony E. Nocentino aen@centinosystems.com ANTHONY E. NOCENTINO! Consultant and Trainer! Founder and President of Centino Systems! Specialize in system architecture
More informationCSE 390a Lecture 4. Persistent shell settings; users/groups; permissions
CSE 390a Lecture 4 Persistent shell settings; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/390a/ 1 2 Lecture summary
More informationAccess Control. CMPSC Spring 2012 Introduction Computer and Network Security Professor Jaeger.
Access Control CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Access Control Describe the permissions available to computing processes
More informationUser Management. Lctseng, arr. by pschiu
User Management Lctseng, arr. by pschiu ID q User ID, Group ID % id lctseng (ID Name) Ø uid=10554(lctseng) gid=1130(cs) groups=1130(cs),0(wheel),2000(taever),2012(security) % id 10047 (UID) Ø Same as above
More informationVISUDO(8) System Manager s Manual VISUDO(8)
NAME visudo - edit the sudoers file SYNOPSIS visudo [-chqsv] [-f sudoers] [-x output_file] DESCRIPTION visudo edits the sudoers file in a safe fashion, analogous to vipw(8). visudo locks the sudoers file
More informationIBM Ported Tools for z/os Latest Status and New Features
IBM Ported Tools for z/os Latest Status and New Features C.T. Ware ctware@us.ibm.com IBM Poughkeepsie, NY February 4, 2013 Session 12729 Trademarks and Disclaimers See http://www.ibm.com/legal/copytrade.shtml
More informationExercise Sheet 2. (Classifications of Operating Systems)
Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user
More informationLesson 3 Transcript: Part 2 of 2 Tools & Scripting
Lesson 3 Transcript: Part 2 of 2 Tools & Scripting Slide 1: Cover Welcome to lesson 3 of the DB2 on Campus Lecture Series. Today we are going to talk about tools and scripting. And this is part 2 of 2
More informationEMS Installation. Workstation Requirements CHAPTER. EMS Lite (Windows 95/98) EMS NT (Windows NT 4.0)
CHAPTER 2 EMS Installation This chapter provides instructions for installing the Element Management System (EMS) software on a user workstation. Workstation Requirements The following sections list the
More informationCrontab To Run Every 5 Minutes In Hp-ux
Crontab To Run Every 5 Minutes In Hp-ux bin/sh in HP-UX) on exact times(hh:mm:ss) hh:05:00. hh:10:00. hh:15:00 To run every five minutes, you can consider that the seconds returned by date will. How to
More informationCPS221 Lecture: Operating System Protection
Objectives CPS221 Lecture: Operating System Protection last revised 9/5/12 1. To explain the use of two CPU modes as the basis for protecting privileged instructions and memory 2. To introduce basic protection
More informationLinux Kung Fu. Stephen James UBNetDef, Spring 2017
Linux Kung Fu Stephen James UBNetDef, Spring 2017 Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and
More informationConfiguring Authorization
The AAA authorization feature is used to determine what a user can and cannot do. When AAA authorization is enabled, the network access server uses information retrieved from the user s profile, which
More informationUBUNTU OPENSTACK. Ubuntu Server Administration Training
UBUNTU OPENSTACK Ubuntu Server Administration Training Learn from the best You've decided to install the most widely deployed guest operating system in most public clouds and now you need to learn how
More informationOracle Hierarchical Storage Manager and StorageTek QFS Software
Oracle Hierarchical Storage Manager and StorageTek QFS Software Security Guide Release 6.0 E61675-01 March 2015 Oracle Hierarchical Storage Manager and StorageTek QFS Software Security Guide, Release 6.0
More informationReview of Fundamentals
Review of Fundamentals 1 The shell vi General shell review 2 http://teaching.idallen.com/cst8207/14f/notes/120_shell_basics.html The shell is a program that is executed for us automatically when we log
More informationReview of Fundamentals. Todd Kelley CST8207 Todd Kelley 1
Review of Fundamentals Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 The CST8207 course notes GPL the shell SSH (secure shell) the Course Linux Server RTFM vi general shell review 2 Linux
More informationProtection. CSE473 - Spring Professor Jaeger. CSE473 Operating Systems - Spring Professor Jaeger
Protection CSE473 - Spring 2008 Professor Jaeger www.cse.psu.edu/~tjaeger/cse473-s08/ Protection Protect yourself from untrustworthy users in a common space They may try to access your resources Or modify
More informationCLI users are not listed on the Cisco Prime Collaboration User Management page.
Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator
More informationManual Shell Script Linux If File Exists Wildcard
Manual Shell Script Linux If File Exists Wildcard This page shows common errors that Bash programmers make. If $file has wildcards in it (* or? or (), they will be expanded if there are files that match
More informationLinux OS Fundamentals for the SQL Admin. Anthony E. Nocentino
Linux OS Fundamentals for the SQL Admin Anthony E. Nocentino aen@centinosystems.com Anthony E. Nocentino Consultant and Trainer Founder and President of Centino Systems Specialize in system architecture
More information9.2 Linux Essentials Exam Objectives
9.2 Linux Essentials Exam Objectives This chapter will cover the topics for the following Linux Essentials exam objectives: Topic 3: The Power of the Command Line (weight: 10) 3.3: Turning Commands into
More informationProgramming Project # 2. cs155 Due 5/5/05, 11:59 pm Elizabeth Stinson (Some material from Priyank Patel)
Programming Project # 2 cs155 Due 5/5/05, 11:59 pm Elizabeth Stinson (Some material from Priyank Patel) Background context Unix permissions model Prof Mitchell will cover during OS security (next week
More informationManaging the Risk of Privileged Accounts and Passwords
Managing the Risk of Privileged Accounts and Passwords Definition: Privileged Account Privileged Management Obviously accounts with special or elevated permissions Windows Every workstation and server
More informationclient X11 Linux workstation
LPIC1 LPIC Linux: System Administrator LPIC 1 LPI command line LPIC-1 Linux LPIC-1 client X11 Linux workstation Unix GNU Linux Fundamentals Unix and its Design Principles FSF and GNU GPL - General Public
More informationCOMP 4/6262: Programming UNIX
COMP 4/6262: Programming UNIX Lecture 12 shells, shell programming: passing arguments, if, debug March 13, 2006 Outline shells shell programming passing arguments (KW Ch.7) exit status if (KW Ch.8) test
More informationManual Shell Script Linux If File Exists And
Manual Shell Script Linux If File Exists And Is Not Empty read Bash Conditional Expressions in the manual, and use the -r and -w operators glenn jackman Dec 10 '14 at -s FILE True if file exists and is
More informationTABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS GETTING STARTED - DEPLOYMENT GETTING STARTED - DEPLOYMENT ON A CLUSTER GETTING STARTED CONFIGURATION
Page 1 of 18 Quick Start - Tru64 File System idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS GETTING STARTED - DEPLOYMENT Where to Install
More informationIntroduction to Unix May 24, 2008
Introduction to Unix May 24, 2008 Exercises: Privileges REFERENCE Reference: Shah, Steve, "Linux Administration: A Beginner's Guide", 2nd. ed., Osborne press, New York, NY. If you look at files in a directory
More informationEquitrac Office and Express 5.5 SUSE Linux iprint Server Guide
Equitrac Office and Express 5.5 SUSE Linux iprint Server Guide 2015 Equitrac Office/Express 5.5 SUSE Linux iprint Server Guide Document History Revision Date Revision List June 03, 2015 Updated for Equitrac
More informationDownload and install MySQL server 8 in Windows. Step1: Download windows installer
Download and install MySQL server 8 in Windows Step1: Download windows installer Step 2: Select Developer Default setup type Step 3: Installation Choose Legacy Authentication Method Step 4: Configuration
More informationCase Studies in Access Control
Joint software development Mail 1 / 38 Situations Roles Permissions Why Enforce Access Controls? Unix Setup Windows ACL Setup Reviewer/Tester Access Medium-Size Group Basic Structure Version Control Systems
More informationPXM45 Backup Boot Procedures
APPENDIX B 2 When a PXM45 card starts up, it first loads the boot software on the card. If the PXM45 cannot load the runtime firmware, the card continues to run the boot software in what is called backup
More informationAutomic Agent Deployment and Upgrade Toolkit. How-To Documentation
Automic Agent Deployment and Upgrade Toolkit How-To Documentation 1 AUTOMIC AGENT DEPLOYMENT AND UPGRADE TOOLKIT 1.1 Introduction Deploying Automic agents has always been a manual process for customers.
More informationINTRODUCTION TO LINUX
INTRODUCTION TO LINUX REALLY SHORT HISTORY Before GNU/Linux there were DOS, MAC and UNIX. All systems were proprietary. The GNU project started in the early 80s by Richard Stallman Goal to make a free
More informationEquitrac Office/Express. SUSE Linux OES2 iprint Server Guide Equitrac Corporation
Equitrac Office/Express 4.2.5 SUSE Linux OES2 iprint Server Guide 2012 Equitrac Corporation Equitrac Office/Express SUSE Linux OES2 iprint Server Guide Document History Revision Date Revision List November
More information