SlideShare a Scribd company logo
1 of 83
Download to read offline
Analysis Of Lan Performance And Support Issues, Viruses On...
MANAGEMENT OF ACCESS TO LAN, LAN PERFORMANCE AND SUPPORT ISSUES,
VIRUSES ON LAN
ASSESSMENT: 2
Date: 01–3–2015
Submitted by: Prashanth rao .S
Student ID: i145013
Tutor Name: Henry He
Cohort No: 70115
Word Count: 3,293
1. Introduction 4
2. Management of Access 4
2.1 Management of access to network resources 4
Printer: 4
Internet : 4
Database: 4
2.2 Level of Access: 5
User: 5
Operator: 5
Administrator: 5
2.3 Methods of Controlling Access: 5
Personal Identification 5
Directory (Folder) & File: 5
Temporal: 5
Location: 5
2.4 Purpose of Access Audit Trail: 6
3. Performance Issues 6
3.1 Effect of different factors on response time 6
Speed of devices: 6
Bandwidth of Transmission line: 6
Queuing at nodes: 6
Queuing at hosts: 6
Processing time: 7
Message size and overheads 7
Priority at nodes: 7
Quality of transmission: 7
3.2 Analysis of Data and Identification Problems 7
3.3 Diagnostic Tools to Collect Data 7
3.4 Methods for Improving the Performance of the Following: 8
Faster Chips: 8
Network Boards 8
Improved Protocols: 8
Hard Drive: 8
Media: 8
Memory: 8
4. Support Issues 8
4.1 Distinguishing Roles 8
Suppliers: 8
Third Party Professionals: 8
Local Expertise: 9
4.2 Expectations of Users 9
Suppliers: 9
Third Party Professionals: 9
Local Expertise: 9
Product Guarantees: 9
Software Tools: 9
5. Viruses on Local Area Network 10
5.1 Symptoms of Viruses 10
5.2 Transmission of Viruses 10
5.3 Methods of Virus Protection, detection and eradication. 10
6. Conclusion 11
7.
... Get more on HelpWriting.net ...
Similarities Between FAT32 And NTFS
NFTS vs FAT 32
New Technology File System is a proprietary file system, File Allocation Table 32 is a computer file
system architecture. These two are very alike in some ways and very different in others. NTFS is
newer and has a lot more storage but FAT32 is has better security and still works even if Windows is
opened incorrectly. The purpose of this essay is to compare and contrast FAT32 and NTFS.
NTFS is a proprietary file system which means it is a file format of a business or person that
contains data that is stored according to a certain encoding–scheme, designed by the business to be
secret, so that only the company that stored the data can see the data with software that they have
developed. NTFS has a max volume size of 264 clusters and the max number of files is
4,294,967,295 files. NTFS is used to store and retrieve files on a hard disk. NTFS offers
improvements from FAT and HPFS in performance, extendibility, and security.
FAT32 is an older file system so it isn't as efficient but it has more compatibility with other OS's. It
is the oldest of the three file systems available for Windows and most flash drives are formatted with
FAT32. FAT32 is used as a data recovery system and ... Show more content on Helpwriting.net ...
Some of the reasons that they are the same is they are both proprietary file systems. This means that
they both format files that contain encrypted data so that only the people that encrypted it can see it.
They both support Windows XP, Windows 2000, Windows 2003, Server, Windows Vista, and
Windows 7. They both have a limit of 255 characters for a file name. They also have many
differences including max volume size, max files on volume, max file size, max number of clusters,
etc. NTFS has many things that FAT32 doesn't, including alternate streams, compression,
encryption, object permissions, disk quotas, sparse files, reparse points, volume mount points, built
in security, and
... Get more on HelpWriting.net ...
Pos-335 Individual Assignment File Management Paper
Introduction
The task of implementing a protection scheme that will provide controlled access to specific files in
a system is not only an important but also a necessary task to ensure that the integrity as well as the
availability of that file is maintained throughout. This paper is designed to put into perspective a
protection scheme to facilitate the scenario where a system has 5000 user and 4990 of those users
will need to have access to a particular file within the system. It will also provide clarity on Access
control list (ACL's) their roles as well as the different flavors available. It will also try to prove that
proper implementation and utilizations of groups within a security scheme provides not only
organization and ... Show more content on Helpwriting.net ...
Access control list provides greater control over file permissions which traditional UNIX files
permissions falls short.
Groups
Creating and assigning users to groups in a protection scheme is not only a recommendation but also
a standard for control all modern operating system. Users and machines alike can be assigned to
groups and that group is then placed on ACLs as if they are individual users. Every group member
inherits all the permissions granted to that group on the ACL. This assignment of users and
machines to groups will solve many problems when addressing security issues, one such issue
would be the assignment of permissions to massive number of people rather than individually
Groups permissions are managed by the ACL that grants the user the permissions assigned by the
ACL to take actions on objects. These permissions can be assigned fixed actions for a given group.
For example, a User in the Accounts group could only submit, manage and view data pertaining to
the accounts department. Someone in the Sales group also would only be able to view customer
information, add or remove products or services from the customer account, etc. Permissions also
can be set where there is an all–or–nothing, parameter where a member of a group manages files
across multiple ACLs. For example the HR group can manage files associated with all employees
from every department. Actions and permissions assigned
... Get more on HelpWriting.net ...
Unix Pos420 Uop
UNIX, Linux, and Windows Servers
Security
When comparing Linux/Unix versus Windows platforms for security it is important to take into
account the security issues being addressed. The most common types of security breaches in today's
business world are based on social engineering attacks. These attacks are focused on bypassing
security measures by tricking users into accomplishing the tasks required by the malicious code.
These attacks can introduce numerous types of malicious code into the network ranging from
spyware up to and including viruses. When comparing Windows versus Linux/Unix it is important
to realize that more security features may be available depending on the exact operating system.
This comparison is not to compare ... Show more content on Helpwriting.net ...
A fundamental aspect of managing any computer system, UNIX or otherwise, is the backup of user
and system data for possible retrieval purposes in the case of system failure, data corruption, etc.
Users, both teacher, student, or counselor, expect and depend on the admin to recover files that have
been accidentally erased, or lost due to hardware problems. Backup devices may be locally
connected to a system or remotely accessible across a network. Typical backup media types include:
1/4" cartridge tape, 8mm cartridge tape (used infrequently today) DAT (very common) DLT (where
lots of data must be archived) Floptical, ZIP, JAZ, SyQuest (common for user–level backups)
Backup tapes, disks and other media should be well looked after in a secure location within the
university, primarily at a main office as a whole (ie. Arizona). Software tools for archiving data
include low–level format–independent tools, file and directory oriented tools such as tar, filesystem–
oriented tools, standard UNIX utilities, and high–level tools (normally commercial packages) such
as IRIS NetWorker. The most commonly used program is tar, which allows one to gather together a
number of files and directories into a single 'tar archive' file. Tar files can also be compressed and
some of the university's backup devices have built–in hardware compression abilities. Note that files
such as MPEG movies and JPEG images are already in a compressed format
... Get more on HelpWriting.net ...
Itech 1005
ITECH1002 Assignment 1
Lecturer's Name: Sanjay Jha
ATMC Sydney
Assignment has to be submitted online on Moodle on or before the due date.
SUBJECT CODE:
ITECH1004
SUBJECT TITLE:
NETWORK OPERATING SYSTEM
ASSIGNMENT
NUMBER AND TITILE:
1– NETWORKING ASSIGNMENT
WORD COUNT (IF
APPLICABLE):
3274
DUE WEEK:
WEEK–6
LAB/TUTORIAL
GROUP:
LAB 2
LECTURER:
SANJAY JHA
TUTOR:
SANJAY JHA
STUDENT ID (FedUni): 30314027
STUDENT FAMILY NAME: KIRAN
STUDENT GIVEN NAMES: RIJAL
I declare that this assignment is my individual work. I have not worked collaboratively nor have I
copied from any other student's work or from any other source except where due acknowledgement
is made explicitly in the text, nor has ... Show more content on Helpwriting.net ...
9
TOPIC 4: FILE SYSTEMS......................................................................................................... 9
4.1 BASIC TERMINOLOGY OF FILE SYSTEMS
................................................................................ 9
BIOS (BASIC INPUT OUTPUT SYSTEM:
.................................................................................................. 9
PARTITION:
........................................................................................................................................... 10
FILE SYSTEM:
........................................................................................................................................ 10
MOUNTING
............................................................................................................................................ 10
UMOUNTING:
......................................................................................................................................... 10
4.2 DIFFERENCE BETWEEN LINUX AND WINDOW FILE SYSTEM
.................................................... 10
BASH SHELL
.......................................................................................................................................... 11
4.3 ABSOLUTE AND RELATIVE LINUX FILE PATHS:
... Get more on HelpWriting.net ...
Linux And Windows And Linux
1. What are Linux distros? Mention the names of a few distros. Are all of the distros open source
and free?
Linux distros i.e. Linux distributions, is a merging of all the different parts and programs that is
created by different organizations.
Some of the Linux distros are Ubuntu, openSUSE, Debian, Slackware, Gentoo, Arch Linux.
Not all of the distros are open source and free.
2. What is the significance of file extensions (.txt, .pdf, .docx, .jpeg, etc) in Windows and Linux?
For example, there is a file named as "hello.mp3" in windows and Linux. What type of file will it be
in Windows and Linux? Briefly explain.
In windows almost every file require the use of extension in order for the system to function.
In Linux operating system they do not require the use of extension.
In Linux, the extensions are used only to make the user understand the type of file.
TYPE OF FILE: o In windows: hello.mp3 will be a mp3 file only and the extension is important to
be specified. o In Linux: hello.mp3 is considered as a normal file which can be used for texts, video
etc
3. Briefly explain metacharacter ">" and ">>" in Linux with an example
Special character in data field or program that provides information about other character.
">" this metacharacter is basically used as 'command > filename' .Sends the output of the command
on the left into the file named on the right of this symbol. If the file does not exist, create it and if
does exist, overwrite it eg. cal >
... Get more on HelpWriting.net ...
Questions On Http And Ftp
Q).HTTP and FTP?
HTTP :–
HTTP is short for Hypertext Transfer Protocol, and includes the basic rules for displaying a web
page on the screen of a computer, smart phone, tablet, or any mobile device.
FTP :–
FTP is short for File Transport Protocol a program that allows users and computers to send and
receive large portions of data through a private or public network. It can also be used to send
configuration files to network devices, such as switches and routers.
File Transport Protocol, or FTP, is an open protocol standard that is widely used to transport and
receive large files. FTP can be used to send and receive large files. FTP can also be used to send
configuration files and software updates for network switches and routers. It uses ports for
communications and also uses encryption to protect the information being received and sent.
Differences between HTTP and FTP :–
The difference between the two is that
HTTP is a protocol used by the World Wide Web that allows the transfer of files from a web server
to a user's web browser for viewing web pages on the Internet, while the FTP protocol is used to
transfer files from a computer to and from an FTP server. FTP facilitates the transfer of files from
one computer to another.
HTTP transfers only web page content to the browser so as to view it. The transferred file is not
saved in the memory space. FTP, on the other hand, transfers the whole file to the another computer,
and the file is saved in memory.
HTTP does not
... Get more on HelpWriting.net ...
Guide to Unix Chapter 2 Essay
Andrew Cortino April 9th Chapter 2 ?'s 1. Your company is discussing plans to migrate desktop and
laptop users to Linux. One concern raised by the users is whether Linux supports the use of CDs and
DVDs for both work files and for listening to music. Which of the following is an appropriate
answer? c. Linux supports both the UDF and iso9660 file systems for CD and DVD use. 2. You
receive a message that you've successfully backed up hda2 on your Linux system. What is hda2? b.
the second partition on your main hard disk 3. You have purchased a special monitor for your
computer and the instructions tell you to make a minor modification to the inittab file. Where would
you locate this file on a typical Linux system? ... Show more content on Helpwriting.net ...
a. /var 18. A friend of yours is trying to make more space on his hard disk drive and is considering
deleting the /lib directory because he has heard it mostly contains games that he doesn't use. What is
your recommendation? d. Keep the /lib directory because it holds security information, shared
library images, kernel modules and other important files. 19. Which of the following are permissions
that can be granted to a file? (Choose all that apply.) b. write c. execute e. read 20. Which of the
following commands enable(s) you to set permissions on a directory after you create it? (Choose all
that apply.) c. chmod 21. You have created many notes to yourself that end in .txt. Which of the
following commands enables you to list all of the .txt files in your home directory while you are in
the Bash shell? b. ls *.txt 22. Where is virtual memory located? disk, like swap space 23. When you
see the permissions rwx––x––x associated with a file, what permissions are granted? owner has
read, write, and execute: Group has execute: other has execute 24. Your boss wants to use the
command to view hidden files and also wants to know how to find them among other files. What do
you tell her? /s is to view hidden files, hidden files begin with a dot 25. You have many files that
begin with the word "account" and that end with two digits to designate a year, such as account00,
account 01, and so on. What is the command that
... Get more on HelpWriting.net ...
Essay It250 Exam Review
amIT250– Linux Operating Sytem
FINAL EXAM REVIEW 1. (Page 1)Who developed Linux? Linus Torvalds , What year was it
released? September 1991 2. (Page 232)Sends info from one point to another point? > 3. (Page
243)Matches any single character in the name of an existing file? ? 4. (Page 14–15)Component of X
Windows that will allow you to customize the user interface? Window Manager 5. (Page 34)Where
are programs and data temporarily stored when there is not enough RAM to hold all the information
it is processing? Swap file 6. (Page 38)Logical Volume Manager(know what this is used for)Allows
you to change the size of logical volumes (partitions) 7. (Page 888)What is the common C Compiler
for Linux? GNU ... Show more content on Helpwriting.net ...
ls to see files and permissions? ls–l 23. (Page 152)What command do you use to change the name of
a file? mv (THROWN OUT) 24. (Page 180)In vi, what takes you to the top? 1 shift G to the bottom?
Shift G How do you delete a single character? X 25. (Page 887)Any C program has to end with this
extension. .c 26. (Page 154)What command is used to show the last ten lines of a file? tail 27. (Page
169)What command is used to list users that are logged into the system? who 28. (Pages 606–
607)What program allows files to be shared? Samba 29. (Page 181)What command is used to exit vi
and save? zz and esc :wq 30. (Page 196)What command takes you to your home directory? cd 31.
(Page 498)Which utility helps you update packages? Yum (installed by default) 32. (Page
193)Absolute pathnames: starts at root and has nothing to do with your home directory 33. (Pages
241–242)What command moves a command from the background to the foreground? fg 34. (Page
288)How do you give users permission to execute? ch mod u+x 35. (Page 216)Hard links and
symbolic links... If you delete a hard link the symbolic(soft) link will not work. 36. (Page
192)Which utility displays the pathname of the working directory? pwd 37. (Page 505)What is used
to graphically add and remove software packages? pirut 38. 39. (Page 150)How do you see one page
at a time? (pipe less) | less 40.
... Get more on HelpWriting.net ...
Assignment : Questions And Answers On The Computer System
plain the following unexpected result: $ whereis date tell you where is the executable file date is
located. date: /bin/date ...$ echo $PATH  this command tell you what is the content in path
environment .:/usr/local/bin:/usr/bin:/bin  this command gives the list of directories are shared by
the shell when the command is given. $ cat > dateecho "This is my own version of date." this will
this message into file named date.$ ./date this is not executable.Tue May 21 11:45:49 PDT 2013 2.
What are two ways you can execute a shell script when you do not have execute permission for the
file containing the script? Can you execute a shell script if you do not have read permission for the
file containing the script? 1– In bash you can use ... Show more content on Helpwriting.net ...
This script helps you keep track of phone conversations and meetings. $ cat journal# journal: add
journal entries to the file# $HOME/journal–filefile=$HOME/journal–filedate >> $fileecho –n
"Enter name of person or group: "read nameecho "$name" >> $fileecho >> $filecat >> $fileecho
"––––––––––––––––––––––––––––––––––––––––––––––––––––" >>$fileecho >> $file a. What do
you have to do to the script to be able to execute it? We need to use $ chmod +x journal b. Why does
the script use the read builtin the first time it accepts input from the terminal and the cat utility the
second time? Because its read the name from stdin, cats instead of stdout. 6. Assume the
/home/zach/grants/biblios and /home/zach/biblios directories exist. Specify Zach's working directory
after he executes each sequence of commands. Explain what happens in each case. a. $
pwd/home/zach/grants$ CDPATH=$(pwd)$ cd$ cd biblios after the executing the preceding
command. Zach's working directory is /home/zach/grants/biblios. b. $ pwd/home/zach/grants$
CDPATH=$(pwd)$ cd $HOME/biblios After cdPath was set and the working directory specified in
CdPath. Cd is searches working directory just in one case which is after it search the directories
specified by cdpath. 7. Name two ways you can identify the PID number of the login shell. Ps ,
echo$$ 8. Enter the following command: $ sleep 30 | cat /etc/services Is there any output from
sleep? Where does cat get its input from? What
... Get more on HelpWriting.net ...
Unix Linux Research Paper
unix linux
Unix has different costs and its not freely accessible linux can be freely downloaded, There are
priced versions for Linux also, but windows normally costs a lot more cost
unix linux on the other side unix operating system is used in internet servers, workstations &
personal computers.Backbone of the majority of finance infastructure and many 24x365 high
availability solutions. linux is a great example of an open source software development and free
operating system,linux can be installed on many devices ranging from mobile phones to
computers,mainframes and upper computers usage
Unix Linux whereas the Unix users have to wait weeks for a bug removal patch due to it going
through an endless development cycles . both operating systems are vulnerable to bugs and threats
,yet Linux is way better in dealing with bugs and threats as it's an open operating system ,bugs can
be reported by anyone in the user/developer forum ,and it gets fixed within few days Threat
detection
A rough estimate of UNIX viruses is between 85 and 120 viruses reported till now. Linux has had
about 60 to 100 viruses listed till date. None ... Show more content on Helpwriting.net ...
It was written in the C language and was designed to be a portable and multi–user system in a time–
sharing configuration. the inventor of Linus OS is Linus travolds,he always wanted to call his
invention 'Freax'.at the beginning , he used to store files under the name 'Freax' for about 12
months.in 1991,travolds became curious about operating systems so he thought of creating his own
while attending to his university and he was frustrated by the licensing of Minix ,which at the time
limited it to educational use only ,so he began to work on his own operating system kernel ,which
became the Linux kernel operating system ,he then began to develop his operating system on Minix
and the applications used on minix were also used on the Linux later.
... Get more on HelpWriting.net ...
Operating System Comparisons
Operating System Comparisons PRG/355 February 4, 2013 Operating System Comparisons Table of
Contents Introduction 3 Memory Management 3 Process Management 6 File Management 7
Security 8 Conclusion 9 References 11 Introduction An operating system (OS) is software that
manages the hardware and software resources of a computer system. Basically an OS is a set of
libraries or functions which programs may use to perform specific tasks relating to interfacing with
computer system components (The Computer Technology Documentation Project, n.d.). Advantages
and disadvantages exist in every operating system. Reviewed in this paper is a comparison of some
of the primary responsibilities of popular operating ... Show more content on Helpwriting.net ...
The kernel maintains a list of free pages for each zone. Each zone has its own page allocator that
allocates and frees memory as needed. Mac OS X is a little different as compared to the older MAC
OS virtual memory. Similar to Windows OS, when Mac OS X needs memory it pushes something
currently not needed into a swap file for temporary storage (OSX Daily, 2010). The swap file
concept is also known as virtual memory. Mac OS X, because it is built on the UNIX core, relies
heavily on swap files and paging for general memory and cache management. Virtual memory, also
known as secondary memory or secondary storage, typically refers to hard disk storage and is much
slower than main memory. Advantages of virtual memory include; running more than one
application at a time, the ability to run larger programs with less RAM, applications may launch
faster because of file mapping, and the user does not have to buy more main memory (RAM).
Disadvantages of virtual memory include; applications run slower than if loaded into main memory,
increased time to switch between applications, less hard drive space for the users use, and some may
argue reduced system stability is inherent to virtual memory. Linux's virtual memory system is
responsible for the memory visible to each process. The memory system creates virtual memory on
demand and swaps pages in and out of main memory to the disk as needed. Virtual memory is
divided into regions called backing. Backing is
... Get more on HelpWriting.net ...
Questions On Operating Systems And Security
Coursework Assignment
Operating Systems and Security
(M2G421117)
Adam Shanks – S1436559
12–12–2014
Contents
Page 1 – Contents
Page 2 – Introduction and Linux Security
Page 3 – Linux Security
Pages 4–13 – Lab Work
Page 14 – Conclusion
Page 15 – Copy of BASH Shell Script
Page 16 – References
Introduction
This Report will give an overview of Linux security and the features of SELinux (Security
Enhanced Linux). This report will be split into 4 sections, Section 1 will be the introduction that will
describe what I am being asked to undertake for this coursework. Section 2 will be on Linux
security that will have a description of a Discretionary Access Control (DAC) and Mandatory
Access Control, along with a comparison of them both. Section 3 will be the Apache server
directory configuration and shell script, this will show an account of my work on the configuration
of the serving directory in order to allow pages to be served using the apache web server while
SELinux is enabled and in enforcing mode. This section will also include an account of a bash script
shell that will test the security configurations. This section will be presented in the report with the
use of screenshots along with a detailed description of the commands performed and what the
screenshots show. Section 4 will contain the conclusion and this will include my thoughts on the
work that I have undertaken and on the capabilities of SELinux.
Linux Security
Security Enhanced Linux is an advanced access
... Get more on HelpWriting.net ...
The Linux File System For A Structured Hierarchically Tree
The Linux file system is ordered in a structured hierarchically tree. This file system is a tree shaped
structure, where the root of the tree is called the file system root and beneath the root are directories.
The root of the file system is usually stored on the partition of a disk and combing one partition with
the file system is known as mounting a file system. ........ The Linux architecture handles all of the
types of files by hiding the implementation details of any single file type behind a certain layer of
software, which is called the VFS or virtual file system. The standard file system that is on–disk is
called ext3. The ext3 file system is partitioned into multiple segments that are termed block groups.
Ext3 first selects the block group for the file when it starts allocating. Within each block group it
tries to keep allocations physically contiguous and reduces fragmentation if possible. It also
maintain a bitmap of all free blocks within a certain block group. Whenever a free block is
identified, the search is extended backwards until an allocated block is found.
The Windows operating system uses NTFS, which stands for New Technology File System for the
management of its file systems. This manager allows for larger individual files to be handles without
any problems. NTFS also allows an enhanced error recovery, more efficient file storage system, and
also an increase in the security of the files. File Explorer is used to allow users to search for
... Get more on HelpWriting.net ...
Description Of A Network Administrator
User: User is a part of machine or operating system. Every user has a unique user id as well as the
passwords. Mostly on the network user have some limited access like user have only read
permissions and user also have shared printer access. They can give only prints. And also they can
use shared files and folders. USER: Operator: Operator Means in the any organization unit or in our
home unit who have responsible for the controlling, maintaining (taking backup) and monitoring the
machine it's called operator. in the organization operator have only read only access. They can't do
modify or edit. Operator can work on different different operating systems and software as well as
on applications. And restriction only will applied by the network administrator if operator is member
of that particular network. OPERATOR Administrator: In any organization unit have at list one
administrator. Administrators have all the authority in his/her network. They can create user and as
well as they can create new users and they can modify all the LAN setting. As well as they can
install the application/software on the network. Only Administrator has permissions to give the
access to the all network users or one particular user. If administrator wants to give rights to
... Get more on HelpWriting.net ...
Application Software And File Management System
input or retrieval of the data would be required, as the student can then access the data and retrieve it
from a school computer for use. The compatibility of a wide range of devices connected to the
network needs to be taken into consideration due to the broad range of operating systems,
application software and file management systems available. For instance, a word processed
document generated on a MacBook laptop running a variant of Mac OS X would need to be
compatible with word processing applications used on the school network system that runs on
Microsoft Windows. In the event which it is not, the file would need to be converted into a
compatible file type in order to be accessed on school devices. Access to a file management system
that is linked to the student's school login would also be crucial, as the documents can then be
manipulated, whether they are uploaded, retrieved or stored. This offers the student a wide range of
options in which they can access their own files, as well as many forms of shared information placed
on the system that include school research resources. The usage of cloud services such as Google
Drive or Microsoft OneDrive would need to be universal for all platforms connected to the server
for file management.
There are also many risks to be had with implementing the BYOD system in our school. One of
which is with the volume of students at the school at present, there is a risk to be had in which the
school server system could not physically
... Get more on HelpWriting.net ...
Advantages And Disadvantages Of Hadoop Distributed File...
Chapter 7
IMPLEMENTATION
The implementation phase of the project is where the detailed design is actually transformed into
working code. Aim of the phase is to translate the design into a best possible solution in a suitable
programming language. This chapter covers the implementation aspects of the project, giving details
of the programming language and development environment used. It also gives an overview of the
core modules of the project with their step by step flow.
The implementation stage requires the following tasks.
Planning has to be done carefully.
Examination of system and the constraints.
Design of methods.
Evaluation of the method.
Correct decisions regarding selection of the platform.
Appropriate language selection ... Show more content on Helpwriting.net ...
The file system that manages the storage across network of machines is called distributed file
systems. Hadoop mainly comes with the distributed file system called HDFS (Hadoop distributed
file system).
HDFS Design: The HDFS file system is designed for storing files which are very large means files
that are hundreds of megabytes, gigabytes and terabytes in size, with streaming data access patterns,
running on commodity hardware clusters. HDFS has a idea of write once read many times pattern. A
dataset is typically generated or copied from the source and various analyses are performed on that
dataset. And hadoop does not need expensive hardware. It is designed to run on commodity
hardware.
7.1.1 Basic Architecture of HDFS
Figure 7.1.1 shows the basic architecture of NS2. NS2 provides users with executable command ns
which take on input argument, the name of a Tcl simulation scripting file. Users are feeding the
name of a Tcl simulation script (which sets up a simulation) as an input argument of an NS2
executable command ns. In most cases, a simulation trace file is created, and is used to plot graph
and/or to create animation. Fig 7.1.1: Basic Architecture of
... Get more on HelpWriting.net ...
Questions On Database Management System
1. Interpreting language:
Since the file–processing system can be built on any of the programming languages, this will be a
tedious task for other language developers to understand the actual logic behind the data storage and
build a new requirement. But Database Management System (DBMS) uses a Structured Query
Language (SQL) which will be used universally to insert, update or delete the data by all the
developers and this will act as a common language for all the developers/ end users to work with the
data.
2. Data redundancy and inconsistency.
In file processing system, many files are generated or created using different programming
languages by different developers in one particular project.
For example, let us consider the example of a Software project which consists of various teams/
developer teams.
a. Duplicate data:
In our software project example, if we have a particular person working on two technologies namely
.NET developer and as an Automation test developer, then the same person information (namely
employee id, email id, phone number) will be stored in both the files(namely .NET team file and the
Automation test developer file)
In DBMS, by using the normalization concepts on tables, we design the database in such a way that
the data is not duplicated.
b. Data Redundancy leads to higher storage and access cost.
As the same employee's data is stored in two different files, this leads to unnecessary usage of disk
space for the same employee data which will
... Get more on HelpWriting.net ...
Switch From Windows For Linux
Switch from WINDOWS to LINUX
Prepared for
CEO HACKD, LLC
Prepared by
Joseph Wangombe
Student
UNIVERSITY OF MARYLAND UNIVERSITY COLLEGE.
December 03, 2014
Switch from Windows to Linux
Introduction
The switch from Windows to Linux is something that many organizations contemplate doing but
many tread this route with much care. In recent years management has been concerned with the
rising cost of doing business; the security of their patents and customer information were their major
concerns. While most agree that these issues deserve attention, consensus dissolves on how to solve
the concern. This proposal is to elaborate to the process to switch from Windows to Linux. It has
long been thought by many people here in the ... Show more content on Helpwriting.net ...
Hardware and Installation Options
3. The way users will log in to systems
4. How systems will get their IP Address
5. How the DNS will be accessed by the LSDG systems
6. How files may be accessed by the LSDG
7. How to share files securely
8. How printing will be handled.
9. Data encryption.
Plan for Migration from Windows to Linux
The transition from Windows to Linux can be long and take months to achieve, the moving of data
setting the installations of the servers and clients is time consuming and need professionals to handle
it, however the transition is more than worth it. A good transition to take place would require
extensive planning of resources, time and expertise. The best approach to deal with migrate from
Windows to Linux is gradual, one department after another. The service of servers is the most
critical phase to start with. A typical office uses shared resources to maximize on the resource hence
it is critical to start with the services that are shared the most and change those first. Printing,
Storage and application servers are some of the critical areas that any organization's IT want to see
go as smooth as possible. Linux can be configured from installation to be a server or just a regular
desktop client. Once the servers have been installed in place then the clients that are going to be
pulling the resources from it can be installed and integrated gradually to avoid disruption of services
to the workers.
It is important to educate the
... Get more on HelpWriting.net ...
Essay on UNIX&Linux
UNIX AND LINUX
Two Powerful Systems That Are Often Misunderstood
Unix and Linux
There have been many–recorded eras throughout man's history. There was the Ice Age (BURR), the
Stone Age, the Bronze Age, and the Industrial Age (revolution) just to name a few. Each of these
eras marks pivotal advances in humankind. Here are some examples of our advancements, during
the Ice Age, one of nature's first demonstrations of her power in population control, man presents his
first fashion show focusing on the elegant features of Fur clothing and accessories. The Industrial
Revolution mans first experience with assembly line manufacturing. It ... Show more content on
Helpwriting.net ...
There are many operating systems in use today, a few examples are Windows 95/98, Windows NT,
MS–DOS, UNIX and one you may not have heard of, LINUX. The focuses of this report are the
operating systems UNIX and LINUX, two very interesting and powerful systems. The first is often
labeled as too confusing and unfriendly, the later is relatively unknown to the novice user, but
surprisingly they are very similar in design. A short history of the two operating systems may
explain why they are so similar.
UNIX is a creation out of Bell Labs in the 1960's, in a project headed by Stephen Bourne. The idea
was to create an operating system whose kernel (core part) was as tiny as possible. The main driving
force, the small UNIX kernel, was that the developers were doing their work on what were
considered in that day to be tiny computers. The severe limitation on RAM resulted in a small kernel
with all the utilities implemented as separate, stand–alone programs. Each was itself tiny, and
designed to accept input from the preceding program as well as provide output to succeeding
programs. This process of using output from one program as input into another is referred to as
piping and is central to UNIX operating systems today (UNIX & LINUX Answers! Certified
Tech Support © 1998).
LINUX is a creation of Linus
... Get more on HelpWriting.net ...
Social Media And Its Effects On The World Today Without...
You have to admit – it's hard to imagine the world today without the Internet. However, it seems it's
hard just for some us. A recent study from the B2B research firm Clutch, revealed that more than
46% of small businesses in the United States still don't have a website for their company. Numerous
reasons were listed for not having an online presence, for instance, around 12% of small business
representatives said that they use social media networks in place of static site. But the most popular
reason by far was the cost of maintaining a site.
Now, while starting and maintaining a website will definitely cost you, in reality, you don't have to
spend a ton of money in order to have a fully–functional, modern site and keep up with the
competition. On the other hand, there are some things you cannot ignore if you want to save as
much money as you can, and unfortunately, one of the biggest issues many companies don't pay
much attention is cybersecurity. These days, hackers and other cyber criminals are pocketing a
staggering amount of data and money from small business around the globe.
The State of Cybersecurity
When you consider the costs that companies suffering as a result of cybercrime – "crime wave" is an
understatement to say the least, as a matter of fact, "epidemic" is more like it. Just consider this,
three years ago, according to the Wall Street Journal, the cost of cybercrime in America was around
$100 billion. Last year, however, insurance company Lloyd's
... Get more on HelpWriting.net ...
Microsoft 's System Preparation Utility
You may come across a situation where you have a computer that does not support a PXE boot. For
these cases you can boot the computer from disk using a discover image. A discover image is an
image file that you can burn to a CD–ROM or other boot medium(s). When you boot the client
computer using the discover image disk, the computer loads Windows PE, connects to a specified
WDS server, and proceeds with the operating system installation process. Before capturing a
computer with WDS, you must prepare a master or reference computer with the Sysprep.exe utility
and reboot the computer using the capture image. Microsoft's System Preparation Utility
(Sysprep.exe) prepares a Windows computer for cloning by removing specific computer information
such as the computer name and Security Identifier (SID). On Windows Server 2012, the Sysprep.exe
is located in the following folder: We studied in the above topic about the minimum requirements to
boot the WDS server and deploy an image to a client computer which are a boot image and an install
image. However, you can also create two additional types of boot images in order to boot the WDS
server. These are capture and discover images and are explained below: In addition, the boot image
starts the operating system installation. The install image on the other hand contains the operating
system that WDS installs.The boot images and the install images use the WIM, a file format that
allows a file structure (folders and files) to be stored
... Get more on HelpWriting.net ...
Application Of An Organization Store And Shares Its Data...
NSN: 128098762 Achievement Standard 91367 Digital Technologies 2.40 Contents Introduction
.............................................. 3 File Management ..................................... 4 Input, Output, Storage,
Retrieval and Manipulation ............................................ 7 Ethical and Legal Issues ...........................
8 Backup Procedures and Conventions ... 10 The Role of Information Systems .......... 12
Bibliography ........................................... 13 Introduction This report involves how an organisation
stores and shares its data securely but makes it available to those who have the right to see it. The
organisation I have chosen is Otumoetai College. This organisation is large and handles data for
over 2000 students, which relies heavily on sharing data securely. There are 4 main different sets of
people who require access to data pertaining to the college, each of these sets have their own needs
and different levels of access. 1. Administrators – These people securely manage the data for the
other three groups below. Admins manage the data tracking for student's data, including their
progress, finances/school transactions, attendance and also supply student's results to the New
Zealand education department. 2. Teachers – Teachers have multiple roles and needs for access to
the school database. This group may require access to student progress, attendance and other
learning materials. 3. Students –
... Get more on HelpWriting.net ...
Programming Proposal Sample
Programming Solution Proposal
Crystal Wright
PRG/210
September 19, 2011
Christopher Stott
Programming Solution Proposal
"New York Freelance Technology is a web based organization affiliated with Montana Freelance
Technology and GMR Web Services that continues to give you quality hosting at an affordable
cost." (New York Freelance Technology, 2011) Not only does NY Freetech perform web specific
tasks, they also handle numerous person to person tasks such as custom computer building,
videography and DVD authoring. Their web related tasks include web design, web development,
graphics design, web hosting and DNS (domain name system). One thing NY Freetech does not
have is a support forum for their customers. To contact customer ... Show more content on
Helpwriting.net ...
Write down the database name because it will be needed by the web developer. After creating the
database, click on it choose set database permissions and choose a user for that database and set the
permissions for that database user for that database. Make note of the user name and password for
that user to pass to the developer as well. That will all be needed for the forum install. For the file
permissions, in webmin choose the others tab and click file manager. Navigate to the forum folder
and set the permissions for the files stated in the readme section of the forum software. When this is
done, the web developer can create a link on the main page to the forum. When this is done the
developer can then navigate in their browser to the location of the forum as noted in the forum
software readme. The install page will come up and ask for the database name user and password.
After that it will ask a few questions so it can run its install script to configure everything. When it is
done it will ask for a forum administrator username and password. At this stage the developer can
test the forum and code the theme files of the forum to make it match the look and feel of the
website. Now that the roles of the personnel involved must play, we can go over the steps of the
development cycle to make sure everything is done in a modular fashion.
The first part of the program development cycle has been done. We have already
... Get more on HelpWriting.net ...
Installation Of An Iso Image Dvd
The installation will be performed using an ISO image DVD that contains the SUSE installation.
The installation process will configure language, keyboard, license, partitioning, time settings, and
desktop selection. A graphical interface will be used for end users in order to provide an easier
transition from Windows to SUSE. Command line interface configurations will be selected for
servers and administrative systems in order to provide better performance (opensSUSE). Users will
logon to the systems using the KDE desktop environment. The KDE environment will provide a
familiar look for users migrating from Windows systems. KDE replicates most preferred functions
used in Windows (Beginning SUSE Linux, 2006). User's logon to ... Show more content on
Helpwriting.net ...
During account and group migrations, all accounts will be reviewed to ensure access only to users
that are still within the organization. This will be an opportunity to HACKD, LLC to remove old and
expired accounts from the infrastructure. Password age and expiration will be configured within the
/etc/shadow file (User and Group Overview LabSim, 2015). The IP Address configuration
implemented will be a mixture of Static and Dynamic IPs. Static addresses will be assigned to
servers, network devices and other peripherals such as printers. Desktops and laptops will be
configured to use dynamic IP addressing through a DHCP lease that will last 12 hours. In order to
manage dynamic host configuration protocol (DHCP) requests a DHCP virtual server will be
configured. This server will have appropriate services enabled including "dhcpd". Configuration
changes will be saved at the dhcp.conf file. Static IP addresses will be configured in the
/etc/sysconfig/network–scripts file. DHCP lease settings are defined within the /etc/dhcpd.conf file.
The system domain name service (DNS) will be handled by a virtual DNS server. Desktop and
laptops will have an entry indicating the DNS server within /etc/resolv.conf. Systems will be
configured to use the domain name service with the /etc/hosts file as a backup. For name resolution
Linux can use a range entry located in the /etc/nsswitch.conf file. The file is
... Get more on HelpWriting.net ...
Legal And Regulatory Framework Essay
NEW ZEALAND SCHOOL OF EDUCATION
LAN– LOCAL AREA NETWORK
MANAGEMENT/ PERFORMANCE/ SUPPORT/ DETECTION AND PREVENTION OF VIRUS
ASSESSMENT REPORT SUBMITTED
TO ¬– VIDHYA DESAI STUDENT ID: 145177
BATCH NO: 70714 BY: YUGANDHAR KAMBAPATI
Contents
Introduction 3
1. MANAGING THE ACCESS 3
1.1 IDENTIFYING THE RESOURCES 3
1.2 Access Levels 4
1.3 Methods to Control Access 5
1.4 Purpose of Audit Trial 6
2. PERFORMANCE ISSUES ON LAN 7
2.1 Data Analysis and Identifying Problem 7
2.2 Response Time Analysis 7
2.3 DIAGNOSTIC TOOLS 8
2.4 METHODS IMPROVING LAN PERFORMANCE 9
3. LAN SUPPORT ISSUES 10
3.1 Local expertise: 10
3.2 User expectations 10
3.3 Role of Suppliers 10
3.4 Third party professionals 11
4. VIRUSES ON LOCAL AREA NETWORK 11
4.1 Symptoms and transmission of viruses: 12
4.2 Method for prevention, detection and eradication of viruses: 14
CONCLUSION 16
REFERENCES 17
Introduction A local area network (LAN) is a computer network that interconnects computers within
a limited area such as a home, school, computer laboratory, or office building, using network media.
The defining characteristics of LANs, in contrast to Wide Area Networks (WANs), include their
smaller geographic area, and non–inclusion of leased communication networks
ARC NET, Token Ring and other technology standards have been used in the past, but Ethernet over
twisted pair cabling, and Wi–Fi are the two most common technologies currently used to build
... Get more on HelpWriting.net ...
Purpose Of Operating Systems For Computer Programs
Purpose of operating systems An operating system is known to be a software which lets the person
to manage computer hardware an also software resources and provides common services for
computer programmes. The most important part when it comes to the computer system is the
operating part of the system software. Most application programs need an operating system to be
able to run. Interactions between things such as keyboard and CPU are also controlled by the
operating systems and this is one of the reason why we use operating systems as they tell the
components what to do and how to communicate with the user and without the operating system the
user would not be able to use the computer or the components with ease. Machine management ...
Show more content on Helpwriting.net ...
Task manager is what shows the user the programmes that the operating system is running and how
much each programme uses up in the terms of memory. Programmes can only be loaded or copied
from the hard drive into memory for the programme to work and be able to run. There is a limit on
how much RAM to be able to run these programmes. After the programme is shut it has to be
removed from the memory (ram) for there to be more space free for other programmes that you may
want to open up and run. The hard drive however the hard drive is able to store information for a
longer period of time. Processor management is where time is given to applications and processes
via the processor so that they are able to work as well as they can. Processors cycles are also taken
advantage of so that everything is able to function together without any problems. Small coding
which is called threading which is controlled by scheduling is a way that threads gets information
about computer systems. Processor management is where time is given to applications and processes
via the processor so that they are able to work as well as they can. Processors cycles are also taken
advantage of so that everything is able to function together without any problems. Small coding
which is called threading which is controlled by scheduling is a way that threads gets information
about
... Get more on HelpWriting.net ...
Sandbox Vs Android Security Essay
The kernel enforces security between applications and the system at the process level through
standard Linux facilities, such as user and group IDs that are assigned to applications. By default,
applications cannot interact with each other and applications have limited access to the Operating
System. If application A tries to do something malicious like read application B 's data or dial the
phone without permission (a separate application), then the Operating System protects against this,
because application A does not have the appropriate user privileges. All these features together are
called the sandbox that jails the actions done by applications: the sandbox is simple, auditable, and
based on decades–old UNIX–style user separation of ... Show more content on Helpwriting.net ...
When the user continues with the installation the system assumes that all the permissions where
granted. The system accepts all the permissions listed in the AndroidManifest.xml, and is not
possible to select which permissions to allow and which not. [4] [8]
In the next section are described the mayor security threats found in Android.
III. ANDROID SECURITY THREADS AND LACKS
Android, as other smartphone Operating System, considers the security as integral part in its design.
[4] However it has presented vulnerabilities that had been found and demonstrated by researchers
and others that have been exploited by attackers. [2][8][9]. The same threats found in the modern
SO can be applied to Android.
For each security level in Android's architecture exists the possibility of any of the following types
of attacks [9]:
user 's information subtract
information eavesdropping
Unavailability of device 's services and resources
spyware and malware execution
Android threats can be classified in three mayor groups
[10] based on where the threat is located: in an application, website, or network.
C.
Application Communication
Processes can communicate using any of the traditional UNIX–type mechanisms, where, the Linux
permissions still apply. Android also provides Inter Process Communication (IPC) mechanisms: [4]
D.
Binder: A lightweight capability–based remote procedure call mechanism designed for high
performance for
... Get more on HelpWriting.net ...
Differences And Disadvantages Of The Evolution Of Database...
Evolution of Database Management Systems What is Database :
Database is a set of data. It has a regular structure and that is organized in such a way that a
computer can easily find the desired information.
What is Data :
Data is a collection of distinct pieces of information, particularly information that has been in some
specific way for use in analysis or making decisions.
What is Database Management Systems :
A collection of programs that manages the database structure and controls access to the data stored
in the database.
Evolution of Database Management Systems
Now we should talk about these 4 topics,
File Management System
Hierarchical database System
Network Database System
Relational Database System
File Management System ... Show more content on Helpwriting.net ...
Data Security: Traditional file organization has security advantages over electronic filing, but it also
has its disadvantages. Electronic files are usually accessible on a network, which means it's possible
for an unauthorized person to gain access to electronic data over the Internet through hacking
methods.
Access time: One of the primary disadvantages of traditional file systems is the time it takes to
access data. It can take minutes if not hours to locate a few files in a large paper filing system.
Electronic databases allow for almost instantaneous access to information
Editing and communication: Traditional file systems are cumbersome in that they do not allow users
to easily edit files or send information to others. Paper files often cannot be edited directly, forcing
users to make new copies to update old files.
Order of data: Data can get out of order in traditional filing systems. If someone accidentally puts a
file in the wrong place, or takes a file out of a cabinet and forgets to put it back, it can lead to lost
data or the creation of additional copies of files. Electronic filing systems allow users to quickly
check whether information already exists somewhere in the system, which helps avoid problems like
redundant files and data
... Get more on HelpWriting.net ...
File Management Paper
File Management Paper – Unix® File Permissions Joe Guckiean POS/355 April 15, 2013 Bob
O'Connor File Management Paper – Unix® File Permissions The name Unix® refers to a play on
words rather than being an acronym. During the mid–1960 an operating system was developed at
MIT that allowed multiple users to work on a system at any one time. It was called Multiplexed
Information and Computing System (MULTICS). In the late 1960s, closer to 1970, a couple
programmers at Bell Laboratories wrote an assembler to interface with a DEC PDP–7. Unlike
MULTICS, this version allowed only one user to access it at a time. One of the programmers
kiddingly called it Uniplexed Information and Computing System (UNICS) pronounced Unix. In the
... Show more content on Helpwriting.net ...
In Unix® there are three sets of permissions that can be modified at the folder and file level; user,
group, and the world. In this illustration, user and group permissions will be discussed. To begin, a
command at the console must be executed to create the user group. The syntax is: groupadd [g– gid
[–o]] [–r] [–f] groupname. Simply typing in: groupadd group_name will suffice. Groupname is
where you put in the specific name of the group. If you don't specify additional parameters, the
system will use the defaults. Following the creation of the group, the users must be added into it.
Execute this command to add the existing users to the new group, Usermod –G <newgroup>
<user>. Since there are 4990 user, a script would come in handy adding the users to the group.
The VI editor is a built in tool that allows the building of scripts. Now the real work begins, defining
the permissions for the file. From the console, navigate to the directory that contains the file that is
to be shared. Type in this command to view the current permissions on the file, ls –l (those are
lowercase L's). This command will allow the changing of permissions either at a user, group or
global level. Chmod {a,u,g,o} {+,–} {r,w,x} files a = all user u = the owner g = group o = others
(neither u or g) | Plus (+) =give permissionMinus(–) = remove permission | r = Read–onlyw =
Read/Writex = Execute | Files = single or multiple files |
... Get more on HelpWriting.net ...
Analysis Of Jacket X 's Payroll Processing System
Payroll Process: During an initial review of data for Jacket–X from last year, several potential
threats and vulnerabilities were identified. Specifically, the payroll business process was highlighted
as containing threats and vulnerabilities requiring immediate attention from management in order to
prevent a data breach. Recall threats and vulnerabilities, although often utilized together in
discussing cybersecurity risks, are two separate concepts. To review, a threat is defined as an
undesirable event that can cause harm". It is also important to note that threats can be internal or
external to an organization (Valacich). Alternately, a vulnerability is defined as a "weakness in an
organization's systems or security policies that ... Show more content on Helpwriting.net ...
This would allow supervisors to create a bogus employee, place them on the payroll master file, edit
their hours, and supply their own banking information for direct deposit purposes. As this would
initially cause a relatively small loss to Jacket–X, it may not be noticed for a while. In order to
mitigate this vulnerability, supervisors should only have access to their own employees and any
changes should create an audit trail. Also, for independent contractors, the payroll specialists have
permission to alter payroll details during validation. Although these permissions allow for more
productivity time by creating less personnel in the validation chain, it is counterproductive as it
creates a vulnerability wherein the validator is not independent and free to edit contractors' time and
attendance. Additionally, this vulnerability can be exploited during the paycheck generation process
wherein falsified checks can be created for the bogus contractors. In order to overcome this
vulnerability, Jacket–X should separate the payroll specialists and validators in order to create a
more secure validation process.
Additionally, there is a major flaw with the direct deposit system in that it does not communicate
with the paycheck generation process. This can cause paper checks to be issued to those employees
who already receive direct deposit. Linking these two
... Get more on HelpWriting.net ...
A Large International Purchasing Company
A large international purchasing company is further expanding by buying out a growling local
company that manufactures western wear at several locations. They are known as the cottage
industries. Sam Yosemite the previous owner of the cottage industries with eight satellite offices
four large and four small is helping with the transition of the company since its acquisition to make
sure that the "Wild Frontier" network is merged with the new domain "Foghorn Leghorn" and
migration of the current standards are put into place. The acquisition allows the existing employees
to remain in place of their designations. Several changes will be taking place in terms of a larger
budget for the creation and maintenance of the new network that ... Show more content on
Helpwriting.net ...
The TSL is a very low impact service and it requires very little COU or memory for regular
operations and its hard disk requirements are small even for a great deal of clients like the ones seen
in this company. The idle activities are negligible and the memory used is less than 10 MB. It will
allow access from any computing device that is running the Windows–based program or even a full
Windows desktop. The employees will be able to connect to terminal server to run programs and use
network resources on that server. Windows Terminal Services have the ability to meet with many of
the criteria for applications for remote officers. Terminal services with Windows NT the server
hardware was hard pressed to support multiple server sessions. Additionally, 10 Mbps networks are
considered the standard for the terminal services and have the ability to be easily saturated by
network intensive applications. Also, Windows Server 2008 R2 with the terminal services allows
administrators of the networks to deploy a full virtual desktop infrastructure solution. This means
that the terminal server can be configured to host virtual desktop operating systems. For example, if
the user logs off, any changes they made are rolled back and the virtual hard drive is left in a more
pristine condition which is ready to use for the next user. With the terminal services the new
RemoteApp allows the user to virtualize individual applications instead of
... Get more on HelpWriting.net ...
Cs 315 Lab2
CS 315 Lab 02
A. Try to find the proper Linux commands that will answer the following questions. Hint: You can
either find the answer from the textbook or from the Internet.
*You need to write the procedure that is necessary to accomplish the tasks listed below. Test to see if
your answers are correct and type your correct answer under each question. Upload your finished
lab document to the dropbox.
1. Use the ls command to list the contents of the root file system directory (/) on your system. ls /
2. Use the ls –l command to view the contents of the root file system directory (/). ls –l /
3. Determine the inode value for the /etc directory.
ls –i /
4. Make /etc your current working directory and then ... Show more content on Helpwriting.net ...
11. With your home directory as your current directory, use the command to remove read, write, and
execute permissions from group and others for the spreadsheets directory. Next, verify that your
change has taken place. cd documents ls –l chmod 700 spreadsheets ls –l
12. Use the cat command to create a two–line file in your home directory called datainfo. On the
first line enter 144 and on the second line enter 288. After the file is created, copy it from your home
directory to the spreadsheets directory you created. cat >datainfo
144
288 cp datainfo documents/spreadsheets
13. Determine the default permissions on the datainfo file your created. Next, set the permissions on
the datainfo file so that the owner, group, and others can read and execute the file (otherwise leave
the default settings as is). cd docments cd spreadsheets ls –l chmod ugo+x datainfo
14. Append the current month's calendar to the datainfo file that is in your home directory. Next
copy your changed datainfo file over the older datainfo file in the spreadsheets directory, but use the
copy option that prompts you before you overwrite the file in the spreadsheets directory. Check the
contents of the datainfo file in the spreadsheets directory to make certain your copy was successful.
cal >> datainfo cp –i datainfo documents/spreadsheets y cd documents cd spreadsheets cat
datainfo
15. Make the spreadsheets
... Get more on HelpWriting.net ...
Taking a Look at Virtualization
VIRTUALIZATION Virtualization is a concept in which access to a single underlying piece of
hardware, like a server ,is coordinated so that multiple guest operating systems can share that single
piece of hardware ,with no guest operating system being aware that it is actually sharing anything at
all. Working mechanism–Virtualization software tackles the issue by empowering many operating
systems and applications to run on one physical server or "host." Each independent "virtual
machine" is secluded from the others, and uses as a great part the host's computing resources.
Contrast b/w (OS) & the Guest OS–The host is the virtual machine host server; the underlying
hardware that gives computing resources, for example processing power, memory, disk and network
I/O etc. The guest is a totally separate and independent instance of an operating system and
application software. Guests are the virtual workloads that dwell on a host virtual machine and
contribute in that server's computing resources. Packages–Hardware virtualization alludes to the
production of a virtual machine that demonstrations like a true computer with an operating system.
Software executed on these virtual machines is divided from the underlying hardware resources.
Desktop virtualization is the idea of differentiating the logical desktop from the physical machine
.One type of desktop virtualization, virtual desktop infrastructure (VDI), could be thought as a more
advanced form of hardware virtualization.
... Get more on HelpWriting.net ...
How The Cloud Is A Time Consuming And Ultimately...
wanting to send folders and multiple documents this method can become time consuming and
ultimately inefficient. There is an option to zip files when emailing however this only compresses
files to a point, some are still too big. An alternate way to saving on the cloud is using Google Drive,
which in reality, most students at John Paul II (or at least in my year) do not have a lot of experience
with, so generally do not use it. This would be able to securely store larger files. Since we cannot
work on some files within the Google interface it would require the file to be downloaded each time
it needs to be updated on a different computer. This is one disadvantage which is inefficient but as
Google continues to develop more file types may be editable reducing this problem. Personally I
prefer the USB for larger files and transferring files in general. However an issue at our school
especially within the main computing room there are issues with USB's connecting so whenever
attempting to transfer data onto the school computer to work on it there is an uncertainty whether it
will successfully connect or not. The benefits as mentioned above are the USB can transfer large
files and load them quickly when USB is connected. An example of this is when working on the
internal assessments for digital media or digital information. When working on these assignments
there is often a main folder containing many sub–folders with multiple files contained within them.
This type of data
... Get more on HelpWriting.net ...
Essay about Security Enhanced Linux (Selinux), Chroot...
Security Enhanced Linux (Selinux), Chroot Jail, and Iptables
Security Enhanced Linux (Selinux), Chroot Jail, and Iptables
Three of the most important types of Linux security technologies are Security Enhanced Linux
(SELinux), chroot jail, and iptables. This security measures aide in the subversion of theft and
malicious activity. We will discuss these items in depth to address who created them and for what
reason. Along with how these technologies changed the operating system to enforce security, and the
types of threats that these security systems are design to eliminate.
Security Enhanced Linux was released in December of 2000 from the National Security Agency
(NSA), under the GNU general public license. SELinux is not a Linux ... Show more content on
Helpwriting.net ...
This user has root privileges for his or her own account, but can't access higher directories or be
aware of their existence. Virtualization is great for test environment that can be set up in the chroot
for software that might be too risky to deploy on a production system. Virtual environments are
often used for compatibility issues. Legacy software or software using a different interface must
sometimes be run in a chroot because their supporting libraries or files may otherwise clash with
those of the host system. Also chroot is often used for recovery purposes. A chroot can be used to
move back into a damaged environment after bootstrapping from an alternate root file system.
Elevated Privileges in iptables are required for operation, and root user must be used or iptables will
not function. With most Linux systems, iptables is installed as /usr/sbin/iptables and documented in
its man page, which can be opened using man iptables. There is a set of user interface tools that can
be used to manage your system's security profile in a more user friendly manner. The user interface
firewall management tools include Bastille, and GUI tools with like KDE's Guard dog. There are
Linux distributions whose main purpose is to provide a GUI front end to iptables with a variety of
configurations.
Iptables allows the system administrator to define tables containing chains of rules for the treatment
of packets. Each table is associated with a
... Get more on HelpWriting.net ...
Maintaining Information Stored On A User Freedom Without...
Operating systems have to provide a level of security to allow a user freedom without someone
seeing them making a purchase online. An attacker would find that purchase made very valuable,
they can acquire that information. From threats and attacks which could allow sensitive information
to be looked at or taken. The idea of an OS having a built in security levels is now a very crucial
task. This helps to secure information to not be looked at. Securing information stored and allowing
only certain users to look at it are the main components to protect. Now, computers and technology
are a part of our everyday life that we do not see the protection happening in the background. To
understand this more, information that is stored in a database, on a computer, through emails and
websites are all examples of secure information. An OS needs to have different levels of security
built in that helps protect this sensitive information. For some users and companies, they have very
personal information stored on their computer. Even for a regular user, an email should not be read
when it is sent to someone. A computer stores what is sent, if an attacker was able to get past the
password they would get that information. Making purchases online with a credit card should not be
found or easily accessible. On a company's side, they could hold up to millions of user's personal
information such as social security numbers, and information about you. This paper will explore the
Windows
... Get more on HelpWriting.net ...
Unix Security Essay
An Overview of UNIX Security
The purpose of this paper is to analyze the security of UNIX. Considerations shall be given
regarding generalized security aspects of a typical UNIX system. The ultimate scope of the
following presentation shall remain within the boundaries of a few of the more critical UNIX
security aspects. Of particular note will be discussion regarding standard user access, root access,
file system security, and internet access precautions. This will not focus on specific measures used to
implement security, but rather will investigate both pros and cons typical of a UNIX installation.
Finally, a brief description of UNIX security versus other operating systems will be noted. Since no
two UNIX–based operating ... Show more content on Helpwriting.net ...
Of the utmost security concern is the protection of the root account. The root account allows a user
absolute control of the system, including the ability to alter practically every aspect of the systems,
from individual files to installed programs. Indeed, an entry in Wikipedia.com notes, that a UNIX
administrator should be much like Clark Kent, only using the root account, or becoming Superman,
when absolutely necessary, lest the security of the account be compromised (2006). Ultimately, this
implementation represents a near surefire way to protect the system against many internal and
external threats. By ensuring regularly scheduled root account password changes and ensuring the
passwords are strong, the cons noted previously should be relatively easy to avoid. File system
security is also very important regardless of the UNIX implementation. UNIX files system security
generally allows access permissions to be granted to various defined users and groups. UNIX also
contains an access right flag know as the "sticky bit". The sticky bit can be used to allow users and
groups write access to certain directories within the system. Similarly, the sticky bit can be used by a
user to disallow other users with access to the same directory to alter the contents of the file. The file
can only be altered by the file owner, the directory owner, and the root account (linuxdevcenter.com,
2006). This particular element allows for a great deal of control
... Get more on HelpWriting.net ...
It240 Appendix F Essay
Associate Level Material
Appendix F
Vocabulary Table
Define five of the key terms listed in the Vocabulary Table.
|Term |Definition |
|Windows |Whichever of several microcomputer operating systems or environments presenting a|
| |graphical user interface |
|Processor |A piece of a computer, such as the central processing unit, that preforms |
| |calculations or other ... Show more content on Helpwriting.net ...
|
|Windows manager |is system software that controls the placement and appearance of windows
within a|
| |windowing system in a graphical user interface. |
|Object manager |is a subsystem implemented as part of the Windows Executive which manages
Windows|
| |resources |
|Device driver |In computing, a device driver or software driver is a computer program allowing |
| |higher–level computer programs to interact with a hardware device. |
|FAT |is a computer file system architecture now widely used on many computer systems |
| |and most memory cards, such as those used with digital camera |
|FAT32 |In order to overcome
... Get more on HelpWriting.net ...

More Related Content

Similar to LAN Performance Analysis, Access Management, and Virus Protection

01. english version operating system
01. english version   operating system01. english version   operating system
01. english version operating systemJimmi Sitorus
 
Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profitssusera432ea1
 
Introduction to Unix Concets.pptx
Introduction to Unix Concets.pptxIntroduction to Unix Concets.pptx
Introduction to Unix Concets.pptxHarsha Patel
 
Introduction to Unix Concets.pptx
Introduction to Unix Concets.pptxIntroduction to Unix Concets.pptx
Introduction to Unix Concets.pptxHarsha Patel
 
The Storage Systems
The Storage Systems The Storage Systems
The Storage Systems Dhaivat Zala
 
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxEvaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxSANSKAR20
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The SecurityRachel Phillips
 

Similar to LAN Performance Analysis, Access Management, and Virus Protection (13)

01. english version operating system
01. english version   operating system01. english version   operating system
01. english version operating system
 
file management
 file management file management
file management
 
Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profit
 
Ch11
Ch11Ch11
Ch11
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Introduction to Unix Concets.pptx
Introduction to Unix Concets.pptxIntroduction to Unix Concets.pptx
Introduction to Unix Concets.pptx
 
Introduction to Unix Concets.pptx
Introduction to Unix Concets.pptxIntroduction to Unix Concets.pptx
Introduction to Unix Concets.pptx
 
The Storage Systems
The Storage Systems The Storage Systems
The Storage Systems
 
INTRODUCTION
INTRODUCTIONINTRODUCTION
INTRODUCTION
 
LEC 2.pptx
LEC 2.pptxLEC 2.pptx
LEC 2.pptx
 
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxEvaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docx
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
Dos unit 4
Dos unit 4Dos unit 4
Dos unit 4
 

More from Angilina Jones

Moduladmission Essay Essay For University Appli
Moduladmission Essay Essay For University AppliModuladmission Essay Essay For University Appli
Moduladmission Essay Essay For University AppliAngilina Jones
 
Compare Contrast Essays Example Of A Compar
Compare Contrast Essays Example Of A ComparCompare Contrast Essays Example Of A Compar
Compare Contrast Essays Example Of A ComparAngilina Jones
 
Guidelines For Writing A Research Paper -Headsom
Guidelines For Writing A Research Paper -HeadsomGuidelines For Writing A Research Paper -Headsom
Guidelines For Writing A Research Paper -HeadsomAngilina Jones
 
Find Cheap And Affordable Essay. Online assignment writing service.
Find Cheap And Affordable Essay. Online assignment writing service.Find Cheap And Affordable Essay. Online assignment writing service.
Find Cheap And Affordable Essay. Online assignment writing service.Angilina Jones
 
Writing Paper Background - Free Download Lined Pape
Writing Paper Background - Free Download Lined PapeWriting Paper Background - Free Download Lined Pape
Writing Paper Background - Free Download Lined PapeAngilina Jones
 
Nyu College Essay - The Best Place To Buy Same Day Es
Nyu College Essay - The Best Place To Buy Same Day EsNyu College Essay - The Best Place To Buy Same Day Es
Nyu College Essay - The Best Place To Buy Same Day EsAngilina Jones
 
Essay Writing Posters Teaching Resources
Essay Writing Posters Teaching ResourcesEssay Writing Posters Teaching Resources
Essay Writing Posters Teaching ResourcesAngilina Jones
 
Some Time Ago I Challenged Myself To Create An Origa
Some Time Ago I Challenged Myself To Create An OrigaSome Time Ago I Challenged Myself To Create An Origa
Some Time Ago I Challenged Myself To Create An OrigaAngilina Jones
 
10Cc - Paperback Writer Lyrics. Online assignment writing service.
10Cc - Paperback Writer Lyrics. Online assignment writing service.10Cc - Paperback Writer Lyrics. Online assignment writing service.
10Cc - Paperback Writer Lyrics. Online assignment writing service.Angilina Jones
 
How To Write A Video Essay A Step-By-Step Guide And
How To Write A Video Essay A Step-By-Step Guide AndHow To Write A Video Essay A Step-By-Step Guide And
How To Write A Video Essay A Step-By-Step Guide AndAngilina Jones
 
Learn How To Write An Editorial Easy Guide Wit
Learn How To Write An Editorial  Easy Guide WitLearn How To Write An Editorial  Easy Guide Wit
Learn How To Write An Editorial Easy Guide WitAngilina Jones
 
Abstract Paper Sample Format. Online assignment writing service.
Abstract Paper Sample Format. Online assignment writing service.Abstract Paper Sample Format. Online assignment writing service.
Abstract Paper Sample Format. Online assignment writing service.Angilina Jones
 
My Best Friend Essay Examples Sitedoct.Org
My Best Friend Essay Examples  Sitedoct.OrgMy Best Friend Essay Examples  Sitedoct.Org
My Best Friend Essay Examples Sitedoct.OrgAngilina Jones
 
How To Write A Research Essay. Online assignment writing service.
How To Write A Research Essay. Online assignment writing service.How To Write A Research Essay. Online assignment writing service.
How To Write A Research Essay. Online assignment writing service.Angilina Jones
 
Free Downloadable Templates For Programs For
Free Downloadable Templates For Programs ForFree Downloadable Templates For Programs For
Free Downloadable Templates For Programs ForAngilina Jones
 
019 Why Nyu Essay Sample Example College Transfer
019 Why Nyu Essay Sample Example College Transfer019 Why Nyu Essay Sample Example College Transfer
019 Why Nyu Essay Sample Example College TransferAngilina Jones
 
Admission Essay Columbia Supplemental Essays Exam
Admission Essay Columbia Supplemental Essays ExamAdmission Essay Columbia Supplemental Essays Exam
Admission Essay Columbia Supplemental Essays ExamAngilina Jones
 
Blog Posts - Freeintelli. Online assignment writing service.
Blog Posts - Freeintelli. Online assignment writing service.Blog Posts - Freeintelli. Online assignment writing service.
Blog Posts - Freeintelli. Online assignment writing service.Angilina Jones
 
Native American Writing Paper - Training4Thefuture.X
Native American Writing Paper - Training4Thefuture.XNative American Writing Paper - Training4Thefuture.X
Native American Writing Paper - Training4Thefuture.XAngilina Jones
 
Sample Essay For College Scholarshi. Online assignment writing service.
Sample Essay For College Scholarshi. Online assignment writing service.Sample Essay For College Scholarshi. Online assignment writing service.
Sample Essay For College Scholarshi. Online assignment writing service.Angilina Jones
 

More from Angilina Jones (20)

Moduladmission Essay Essay For University Appli
Moduladmission Essay Essay For University AppliModuladmission Essay Essay For University Appli
Moduladmission Essay Essay For University Appli
 
Compare Contrast Essays Example Of A Compar
Compare Contrast Essays Example Of A ComparCompare Contrast Essays Example Of A Compar
Compare Contrast Essays Example Of A Compar
 
Guidelines For Writing A Research Paper -Headsom
Guidelines For Writing A Research Paper -HeadsomGuidelines For Writing A Research Paper -Headsom
Guidelines For Writing A Research Paper -Headsom
 
Find Cheap And Affordable Essay. Online assignment writing service.
Find Cheap And Affordable Essay. Online assignment writing service.Find Cheap And Affordable Essay. Online assignment writing service.
Find Cheap And Affordable Essay. Online assignment writing service.
 
Writing Paper Background - Free Download Lined Pape
Writing Paper Background - Free Download Lined PapeWriting Paper Background - Free Download Lined Pape
Writing Paper Background - Free Download Lined Pape
 
Nyu College Essay - The Best Place To Buy Same Day Es
Nyu College Essay - The Best Place To Buy Same Day EsNyu College Essay - The Best Place To Buy Same Day Es
Nyu College Essay - The Best Place To Buy Same Day Es
 
Essay Writing Posters Teaching Resources
Essay Writing Posters Teaching ResourcesEssay Writing Posters Teaching Resources
Essay Writing Posters Teaching Resources
 
Some Time Ago I Challenged Myself To Create An Origa
Some Time Ago I Challenged Myself To Create An OrigaSome Time Ago I Challenged Myself To Create An Origa
Some Time Ago I Challenged Myself To Create An Origa
 
10Cc - Paperback Writer Lyrics. Online assignment writing service.
10Cc - Paperback Writer Lyrics. Online assignment writing service.10Cc - Paperback Writer Lyrics. Online assignment writing service.
10Cc - Paperback Writer Lyrics. Online assignment writing service.
 
How To Write A Video Essay A Step-By-Step Guide And
How To Write A Video Essay A Step-By-Step Guide AndHow To Write A Video Essay A Step-By-Step Guide And
How To Write A Video Essay A Step-By-Step Guide And
 
Learn How To Write An Editorial Easy Guide Wit
Learn How To Write An Editorial  Easy Guide WitLearn How To Write An Editorial  Easy Guide Wit
Learn How To Write An Editorial Easy Guide Wit
 
Abstract Paper Sample Format. Online assignment writing service.
Abstract Paper Sample Format. Online assignment writing service.Abstract Paper Sample Format. Online assignment writing service.
Abstract Paper Sample Format. Online assignment writing service.
 
My Best Friend Essay Examples Sitedoct.Org
My Best Friend Essay Examples  Sitedoct.OrgMy Best Friend Essay Examples  Sitedoct.Org
My Best Friend Essay Examples Sitedoct.Org
 
How To Write A Research Essay. Online assignment writing service.
How To Write A Research Essay. Online assignment writing service.How To Write A Research Essay. Online assignment writing service.
How To Write A Research Essay. Online assignment writing service.
 
Free Downloadable Templates For Programs For
Free Downloadable Templates For Programs ForFree Downloadable Templates For Programs For
Free Downloadable Templates For Programs For
 
019 Why Nyu Essay Sample Example College Transfer
019 Why Nyu Essay Sample Example College Transfer019 Why Nyu Essay Sample Example College Transfer
019 Why Nyu Essay Sample Example College Transfer
 
Admission Essay Columbia Supplemental Essays Exam
Admission Essay Columbia Supplemental Essays ExamAdmission Essay Columbia Supplemental Essays Exam
Admission Essay Columbia Supplemental Essays Exam
 
Blog Posts - Freeintelli. Online assignment writing service.
Blog Posts - Freeintelli. Online assignment writing service.Blog Posts - Freeintelli. Online assignment writing service.
Blog Posts - Freeintelli. Online assignment writing service.
 
Native American Writing Paper - Training4Thefuture.X
Native American Writing Paper - Training4Thefuture.XNative American Writing Paper - Training4Thefuture.X
Native American Writing Paper - Training4Thefuture.X
 
Sample Essay For College Scholarshi. Online assignment writing service.
Sample Essay For College Scholarshi. Online assignment writing service.Sample Essay For College Scholarshi. Online assignment writing service.
Sample Essay For College Scholarshi. Online assignment writing service.
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 

Recently uploaded (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 

LAN Performance Analysis, Access Management, and Virus Protection

  • 1. Analysis Of Lan Performance And Support Issues, Viruses On... MANAGEMENT OF ACCESS TO LAN, LAN PERFORMANCE AND SUPPORT ISSUES, VIRUSES ON LAN ASSESSMENT: 2 Date: 01–3–2015 Submitted by: Prashanth rao .S Student ID: i145013 Tutor Name: Henry He Cohort No: 70115 Word Count: 3,293 1. Introduction 4 2. Management of Access 4 2.1 Management of access to network resources 4 Printer: 4 Internet : 4 Database: 4 2.2 Level of Access: 5 User: 5 Operator: 5 Administrator: 5 2.3 Methods of Controlling Access: 5 Personal Identification 5 Directory (Folder) & File: 5 Temporal: 5 Location: 5 2.4 Purpose of Access Audit Trail: 6 3. Performance Issues 6 3.1 Effect of different factors on response time 6 Speed of devices: 6 Bandwidth of Transmission line: 6 Queuing at nodes: 6 Queuing at hosts: 6 Processing time: 7 Message size and overheads 7 Priority at nodes: 7
  • 2. Quality of transmission: 7 3.2 Analysis of Data and Identification Problems 7 3.3 Diagnostic Tools to Collect Data 7 3.4 Methods for Improving the Performance of the Following: 8 Faster Chips: 8 Network Boards 8 Improved Protocols: 8 Hard Drive: 8 Media: 8 Memory: 8 4. Support Issues 8 4.1 Distinguishing Roles 8 Suppliers: 8 Third Party Professionals: 8 Local Expertise: 9 4.2 Expectations of Users 9 Suppliers: 9 Third Party Professionals: 9 Local Expertise: 9 Product Guarantees: 9 Software Tools: 9 5. Viruses on Local Area Network 10 5.1 Symptoms of Viruses 10 5.2 Transmission of Viruses 10 5.3 Methods of Virus Protection, detection and eradication. 10 6. Conclusion 11 7. ... Get more on HelpWriting.net ...
  • 3.
  • 4. Similarities Between FAT32 And NTFS NFTS vs FAT 32 New Technology File System is a proprietary file system, File Allocation Table 32 is a computer file system architecture. These two are very alike in some ways and very different in others. NTFS is newer and has a lot more storage but FAT32 is has better security and still works even if Windows is opened incorrectly. The purpose of this essay is to compare and contrast FAT32 and NTFS. NTFS is a proprietary file system which means it is a file format of a business or person that contains data that is stored according to a certain encoding–scheme, designed by the business to be secret, so that only the company that stored the data can see the data with software that they have developed. NTFS has a max volume size of 264 clusters and the max number of files is 4,294,967,295 files. NTFS is used to store and retrieve files on a hard disk. NTFS offers improvements from FAT and HPFS in performance, extendibility, and security. FAT32 is an older file system so it isn't as efficient but it has more compatibility with other OS's. It is the oldest of the three file systems available for Windows and most flash drives are formatted with FAT32. FAT32 is used as a data recovery system and ... Show more content on Helpwriting.net ... Some of the reasons that they are the same is they are both proprietary file systems. This means that they both format files that contain encrypted data so that only the people that encrypted it can see it. They both support Windows XP, Windows 2000, Windows 2003, Server, Windows Vista, and Windows 7. They both have a limit of 255 characters for a file name. They also have many differences including max volume size, max files on volume, max file size, max number of clusters, etc. NTFS has many things that FAT32 doesn't, including alternate streams, compression, encryption, object permissions, disk quotas, sparse files, reparse points, volume mount points, built in security, and ... Get more on HelpWriting.net ...
  • 5.
  • 6. Pos-335 Individual Assignment File Management Paper Introduction The task of implementing a protection scheme that will provide controlled access to specific files in a system is not only an important but also a necessary task to ensure that the integrity as well as the availability of that file is maintained throughout. This paper is designed to put into perspective a protection scheme to facilitate the scenario where a system has 5000 user and 4990 of those users will need to have access to a particular file within the system. It will also provide clarity on Access control list (ACL's) their roles as well as the different flavors available. It will also try to prove that proper implementation and utilizations of groups within a security scheme provides not only organization and ... Show more content on Helpwriting.net ... Access control list provides greater control over file permissions which traditional UNIX files permissions falls short. Groups Creating and assigning users to groups in a protection scheme is not only a recommendation but also a standard for control all modern operating system. Users and machines alike can be assigned to groups and that group is then placed on ACLs as if they are individual users. Every group member inherits all the permissions granted to that group on the ACL. This assignment of users and machines to groups will solve many problems when addressing security issues, one such issue would be the assignment of permissions to massive number of people rather than individually Groups permissions are managed by the ACL that grants the user the permissions assigned by the ACL to take actions on objects. These permissions can be assigned fixed actions for a given group. For example, a User in the Accounts group could only submit, manage and view data pertaining to the accounts department. Someone in the Sales group also would only be able to view customer information, add or remove products or services from the customer account, etc. Permissions also can be set where there is an all–or–nothing, parameter where a member of a group manages files across multiple ACLs. For example the HR group can manage files associated with all employees from every department. Actions and permissions assigned ... Get more on HelpWriting.net ...
  • 7.
  • 8. Unix Pos420 Uop UNIX, Linux, and Windows Servers Security When comparing Linux/Unix versus Windows platforms for security it is important to take into account the security issues being addressed. The most common types of security breaches in today's business world are based on social engineering attacks. These attacks are focused on bypassing security measures by tricking users into accomplishing the tasks required by the malicious code. These attacks can introduce numerous types of malicious code into the network ranging from spyware up to and including viruses. When comparing Windows versus Linux/Unix it is important to realize that more security features may be available depending on the exact operating system. This comparison is not to compare ... Show more content on Helpwriting.net ... A fundamental aspect of managing any computer system, UNIX or otherwise, is the backup of user and system data for possible retrieval purposes in the case of system failure, data corruption, etc. Users, both teacher, student, or counselor, expect and depend on the admin to recover files that have been accidentally erased, or lost due to hardware problems. Backup devices may be locally connected to a system or remotely accessible across a network. Typical backup media types include: 1/4" cartridge tape, 8mm cartridge tape (used infrequently today) DAT (very common) DLT (where lots of data must be archived) Floptical, ZIP, JAZ, SyQuest (common for user–level backups) Backup tapes, disks and other media should be well looked after in a secure location within the university, primarily at a main office as a whole (ie. Arizona). Software tools for archiving data include low–level format–independent tools, file and directory oriented tools such as tar, filesystem– oriented tools, standard UNIX utilities, and high–level tools (normally commercial packages) such as IRIS NetWorker. The most commonly used program is tar, which allows one to gather together a number of files and directories into a single 'tar archive' file. Tar files can also be compressed and some of the university's backup devices have built–in hardware compression abilities. Note that files such as MPEG movies and JPEG images are already in a compressed format ... Get more on HelpWriting.net ...
  • 9.
  • 10. Itech 1005 ITECH1002 Assignment 1 Lecturer's Name: Sanjay Jha ATMC Sydney Assignment has to be submitted online on Moodle on or before the due date. SUBJECT CODE: ITECH1004 SUBJECT TITLE: NETWORK OPERATING SYSTEM ASSIGNMENT NUMBER AND TITILE: 1– NETWORKING ASSIGNMENT WORD COUNT (IF APPLICABLE): 3274 DUE WEEK: WEEK–6 LAB/TUTORIAL GROUP: LAB 2 LECTURER: SANJAY JHA TUTOR:
  • 11. SANJAY JHA STUDENT ID (FedUni): 30314027 STUDENT FAMILY NAME: KIRAN STUDENT GIVEN NAMES: RIJAL I declare that this assignment is my individual work. I have not worked collaboratively nor have I copied from any other student's work or from any other source except where due acknowledgement is made explicitly in the text, nor has ... Show more content on Helpwriting.net ... 9 TOPIC 4: FILE SYSTEMS......................................................................................................... 9 4.1 BASIC TERMINOLOGY OF FILE SYSTEMS ................................................................................ 9 BIOS (BASIC INPUT OUTPUT SYSTEM: .................................................................................................. 9 PARTITION: ........................................................................................................................................... 10 FILE SYSTEM: ........................................................................................................................................ 10 MOUNTING ............................................................................................................................................ 10 UMOUNTING: ......................................................................................................................................... 10 4.2 DIFFERENCE BETWEEN LINUX AND WINDOW FILE SYSTEM .................................................... 10 BASH SHELL .......................................................................................................................................... 11 4.3 ABSOLUTE AND RELATIVE LINUX FILE PATHS: ... Get more on HelpWriting.net ...
  • 12.
  • 13. Linux And Windows And Linux 1. What are Linux distros? Mention the names of a few distros. Are all of the distros open source and free? Linux distros i.e. Linux distributions, is a merging of all the different parts and programs that is created by different organizations. Some of the Linux distros are Ubuntu, openSUSE, Debian, Slackware, Gentoo, Arch Linux. Not all of the distros are open source and free. 2. What is the significance of file extensions (.txt, .pdf, .docx, .jpeg, etc) in Windows and Linux? For example, there is a file named as "hello.mp3" in windows and Linux. What type of file will it be in Windows and Linux? Briefly explain. In windows almost every file require the use of extension in order for the system to function. In Linux operating system they do not require the use of extension. In Linux, the extensions are used only to make the user understand the type of file. TYPE OF FILE: o In windows: hello.mp3 will be a mp3 file only and the extension is important to be specified. o In Linux: hello.mp3 is considered as a normal file which can be used for texts, video etc 3. Briefly explain metacharacter ">" and ">>" in Linux with an example Special character in data field or program that provides information about other character. ">" this metacharacter is basically used as 'command > filename' .Sends the output of the command on the left into the file named on the right of this symbol. If the file does not exist, create it and if does exist, overwrite it eg. cal > ... Get more on HelpWriting.net ...
  • 14.
  • 15. Questions On Http And Ftp Q).HTTP and FTP? HTTP :– HTTP is short for Hypertext Transfer Protocol, and includes the basic rules for displaying a web page on the screen of a computer, smart phone, tablet, or any mobile device. FTP :– FTP is short for File Transport Protocol a program that allows users and computers to send and receive large portions of data through a private or public network. It can also be used to send configuration files to network devices, such as switches and routers. File Transport Protocol, or FTP, is an open protocol standard that is widely used to transport and receive large files. FTP can be used to send and receive large files. FTP can also be used to send configuration files and software updates for network switches and routers. It uses ports for communications and also uses encryption to protect the information being received and sent. Differences between HTTP and FTP :– The difference between the two is that HTTP is a protocol used by the World Wide Web that allows the transfer of files from a web server to a user's web browser for viewing web pages on the Internet, while the FTP protocol is used to transfer files from a computer to and from an FTP server. FTP facilitates the transfer of files from one computer to another. HTTP transfers only web page content to the browser so as to view it. The transferred file is not saved in the memory space. FTP, on the other hand, transfers the whole file to the another computer, and the file is saved in memory. HTTP does not ... Get more on HelpWriting.net ...
  • 16.
  • 17. Guide to Unix Chapter 2 Essay Andrew Cortino April 9th Chapter 2 ?'s 1. Your company is discussing plans to migrate desktop and laptop users to Linux. One concern raised by the users is whether Linux supports the use of CDs and DVDs for both work files and for listening to music. Which of the following is an appropriate answer? c. Linux supports both the UDF and iso9660 file systems for CD and DVD use. 2. You receive a message that you've successfully backed up hda2 on your Linux system. What is hda2? b. the second partition on your main hard disk 3. You have purchased a special monitor for your computer and the instructions tell you to make a minor modification to the inittab file. Where would you locate this file on a typical Linux system? ... Show more content on Helpwriting.net ... a. /var 18. A friend of yours is trying to make more space on his hard disk drive and is considering deleting the /lib directory because he has heard it mostly contains games that he doesn't use. What is your recommendation? d. Keep the /lib directory because it holds security information, shared library images, kernel modules and other important files. 19. Which of the following are permissions that can be granted to a file? (Choose all that apply.) b. write c. execute e. read 20. Which of the following commands enable(s) you to set permissions on a directory after you create it? (Choose all that apply.) c. chmod 21. You have created many notes to yourself that end in .txt. Which of the following commands enables you to list all of the .txt files in your home directory while you are in the Bash shell? b. ls *.txt 22. Where is virtual memory located? disk, like swap space 23. When you see the permissions rwx––x––x associated with a file, what permissions are granted? owner has read, write, and execute: Group has execute: other has execute 24. Your boss wants to use the command to view hidden files and also wants to know how to find them among other files. What do you tell her? /s is to view hidden files, hidden files begin with a dot 25. You have many files that begin with the word "account" and that end with two digits to designate a year, such as account00, account 01, and so on. What is the command that ... Get more on HelpWriting.net ...
  • 18.
  • 19. Essay It250 Exam Review amIT250– Linux Operating Sytem FINAL EXAM REVIEW 1. (Page 1)Who developed Linux? Linus Torvalds , What year was it released? September 1991 2. (Page 232)Sends info from one point to another point? > 3. (Page 243)Matches any single character in the name of an existing file? ? 4. (Page 14–15)Component of X Windows that will allow you to customize the user interface? Window Manager 5. (Page 34)Where are programs and data temporarily stored when there is not enough RAM to hold all the information it is processing? Swap file 6. (Page 38)Logical Volume Manager(know what this is used for)Allows you to change the size of logical volumes (partitions) 7. (Page 888)What is the common C Compiler for Linux? GNU ... Show more content on Helpwriting.net ... ls to see files and permissions? ls–l 23. (Page 152)What command do you use to change the name of a file? mv (THROWN OUT) 24. (Page 180)In vi, what takes you to the top? 1 shift G to the bottom? Shift G How do you delete a single character? X 25. (Page 887)Any C program has to end with this extension. .c 26. (Page 154)What command is used to show the last ten lines of a file? tail 27. (Page 169)What command is used to list users that are logged into the system? who 28. (Pages 606– 607)What program allows files to be shared? Samba 29. (Page 181)What command is used to exit vi and save? zz and esc :wq 30. (Page 196)What command takes you to your home directory? cd 31. (Page 498)Which utility helps you update packages? Yum (installed by default) 32. (Page 193)Absolute pathnames: starts at root and has nothing to do with your home directory 33. (Pages 241–242)What command moves a command from the background to the foreground? fg 34. (Page 288)How do you give users permission to execute? ch mod u+x 35. (Page 216)Hard links and symbolic links... If you delete a hard link the symbolic(soft) link will not work. 36. (Page 192)Which utility displays the pathname of the working directory? pwd 37. (Page 505)What is used to graphically add and remove software packages? pirut 38. 39. (Page 150)How do you see one page at a time? (pipe less) | less 40. ... Get more on HelpWriting.net ...
  • 20.
  • 21. Assignment : Questions And Answers On The Computer System plain the following unexpected result: $ whereis date tell you where is the executable file date is located. date: /bin/date ...$ echo $PATH this command tell you what is the content in path environment .:/usr/local/bin:/usr/bin:/bin this command gives the list of directories are shared by the shell when the command is given. $ cat > dateecho "This is my own version of date." this will this message into file named date.$ ./date this is not executable.Tue May 21 11:45:49 PDT 2013 2. What are two ways you can execute a shell script when you do not have execute permission for the file containing the script? Can you execute a shell script if you do not have read permission for the file containing the script? 1– In bash you can use ... Show more content on Helpwriting.net ... This script helps you keep track of phone conversations and meetings. $ cat journal# journal: add journal entries to the file# $HOME/journal–filefile=$HOME/journal–filedate >> $fileecho –n "Enter name of person or group: "read nameecho "$name" >> $fileecho >> $filecat >> $fileecho "––––––––––––––––––––––––––––––––––––––––––––––––––––" >>$fileecho >> $file a. What do you have to do to the script to be able to execute it? We need to use $ chmod +x journal b. Why does the script use the read builtin the first time it accepts input from the terminal and the cat utility the second time? Because its read the name from stdin, cats instead of stdout. 6. Assume the /home/zach/grants/biblios and /home/zach/biblios directories exist. Specify Zach's working directory after he executes each sequence of commands. Explain what happens in each case. a. $ pwd/home/zach/grants$ CDPATH=$(pwd)$ cd$ cd biblios after the executing the preceding command. Zach's working directory is /home/zach/grants/biblios. b. $ pwd/home/zach/grants$ CDPATH=$(pwd)$ cd $HOME/biblios After cdPath was set and the working directory specified in CdPath. Cd is searches working directory just in one case which is after it search the directories specified by cdpath. 7. Name two ways you can identify the PID number of the login shell. Ps , echo$$ 8. Enter the following command: $ sleep 30 | cat /etc/services Is there any output from sleep? Where does cat get its input from? What ... Get more on HelpWriting.net ...
  • 22.
  • 23. Unix Linux Research Paper unix linux Unix has different costs and its not freely accessible linux can be freely downloaded, There are priced versions for Linux also, but windows normally costs a lot more cost unix linux on the other side unix operating system is used in internet servers, workstations & personal computers.Backbone of the majority of finance infastructure and many 24x365 high availability solutions. linux is a great example of an open source software development and free operating system,linux can be installed on many devices ranging from mobile phones to computers,mainframes and upper computers usage Unix Linux whereas the Unix users have to wait weeks for a bug removal patch due to it going through an endless development cycles . both operating systems are vulnerable to bugs and threats ,yet Linux is way better in dealing with bugs and threats as it's an open operating system ,bugs can be reported by anyone in the user/developer forum ,and it gets fixed within few days Threat detection A rough estimate of UNIX viruses is between 85 and 120 viruses reported till now. Linux has had about 60 to 100 viruses listed till date. None ... Show more content on Helpwriting.net ... It was written in the C language and was designed to be a portable and multi–user system in a time– sharing configuration. the inventor of Linus OS is Linus travolds,he always wanted to call his invention 'Freax'.at the beginning , he used to store files under the name 'Freax' for about 12 months.in 1991,travolds became curious about operating systems so he thought of creating his own while attending to his university and he was frustrated by the licensing of Minix ,which at the time limited it to educational use only ,so he began to work on his own operating system kernel ,which became the Linux kernel operating system ,he then began to develop his operating system on Minix and the applications used on minix were also used on the Linux later. ... Get more on HelpWriting.net ...
  • 24.
  • 25. Operating System Comparisons Operating System Comparisons PRG/355 February 4, 2013 Operating System Comparisons Table of Contents Introduction 3 Memory Management 3 Process Management 6 File Management 7 Security 8 Conclusion 9 References 11 Introduction An operating system (OS) is software that manages the hardware and software resources of a computer system. Basically an OS is a set of libraries or functions which programs may use to perform specific tasks relating to interfacing with computer system components (The Computer Technology Documentation Project, n.d.). Advantages and disadvantages exist in every operating system. Reviewed in this paper is a comparison of some of the primary responsibilities of popular operating ... Show more content on Helpwriting.net ... The kernel maintains a list of free pages for each zone. Each zone has its own page allocator that allocates and frees memory as needed. Mac OS X is a little different as compared to the older MAC OS virtual memory. Similar to Windows OS, when Mac OS X needs memory it pushes something currently not needed into a swap file for temporary storage (OSX Daily, 2010). The swap file concept is also known as virtual memory. Mac OS X, because it is built on the UNIX core, relies heavily on swap files and paging for general memory and cache management. Virtual memory, also known as secondary memory or secondary storage, typically refers to hard disk storage and is much slower than main memory. Advantages of virtual memory include; running more than one application at a time, the ability to run larger programs with less RAM, applications may launch faster because of file mapping, and the user does not have to buy more main memory (RAM). Disadvantages of virtual memory include; applications run slower than if loaded into main memory, increased time to switch between applications, less hard drive space for the users use, and some may argue reduced system stability is inherent to virtual memory. Linux's virtual memory system is responsible for the memory visible to each process. The memory system creates virtual memory on demand and swaps pages in and out of main memory to the disk as needed. Virtual memory is divided into regions called backing. Backing is ... Get more on HelpWriting.net ...
  • 26.
  • 27. Questions On Operating Systems And Security Coursework Assignment Operating Systems and Security (M2G421117) Adam Shanks – S1436559 12–12–2014 Contents Page 1 – Contents Page 2 – Introduction and Linux Security Page 3 – Linux Security Pages 4–13 – Lab Work Page 14 – Conclusion Page 15 – Copy of BASH Shell Script Page 16 – References Introduction This Report will give an overview of Linux security and the features of SELinux (Security Enhanced Linux). This report will be split into 4 sections, Section 1 will be the introduction that will describe what I am being asked to undertake for this coursework. Section 2 will be on Linux security that will have a description of a Discretionary Access Control (DAC) and Mandatory Access Control, along with a comparison of them both. Section 3 will be the Apache server directory configuration and shell script, this will show an account of my work on the configuration of the serving directory in order to allow pages to be served using the apache web server while SELinux is enabled and in enforcing mode. This section will also include an account of a bash script shell that will test the security configurations. This section will be presented in the report with the use of screenshots along with a detailed description of the commands performed and what the screenshots show. Section 4 will contain the conclusion and this will include my thoughts on the work that I have undertaken and on the capabilities of SELinux. Linux Security Security Enhanced Linux is an advanced access
  • 28. ... Get more on HelpWriting.net ...
  • 29.
  • 30. The Linux File System For A Structured Hierarchically Tree The Linux file system is ordered in a structured hierarchically tree. This file system is a tree shaped structure, where the root of the tree is called the file system root and beneath the root are directories. The root of the file system is usually stored on the partition of a disk and combing one partition with the file system is known as mounting a file system. ........ The Linux architecture handles all of the types of files by hiding the implementation details of any single file type behind a certain layer of software, which is called the VFS or virtual file system. The standard file system that is on–disk is called ext3. The ext3 file system is partitioned into multiple segments that are termed block groups. Ext3 first selects the block group for the file when it starts allocating. Within each block group it tries to keep allocations physically contiguous and reduces fragmentation if possible. It also maintain a bitmap of all free blocks within a certain block group. Whenever a free block is identified, the search is extended backwards until an allocated block is found. The Windows operating system uses NTFS, which stands for New Technology File System for the management of its file systems. This manager allows for larger individual files to be handles without any problems. NTFS also allows an enhanced error recovery, more efficient file storage system, and also an increase in the security of the files. File Explorer is used to allow users to search for ... Get more on HelpWriting.net ...
  • 31.
  • 32. Description Of A Network Administrator User: User is a part of machine or operating system. Every user has a unique user id as well as the passwords. Mostly on the network user have some limited access like user have only read permissions and user also have shared printer access. They can give only prints. And also they can use shared files and folders. USER: Operator: Operator Means in the any organization unit or in our home unit who have responsible for the controlling, maintaining (taking backup) and monitoring the machine it's called operator. in the organization operator have only read only access. They can't do modify or edit. Operator can work on different different operating systems and software as well as on applications. And restriction only will applied by the network administrator if operator is member of that particular network. OPERATOR Administrator: In any organization unit have at list one administrator. Administrators have all the authority in his/her network. They can create user and as well as they can create new users and they can modify all the LAN setting. As well as they can install the application/software on the network. Only Administrator has permissions to give the access to the all network users or one particular user. If administrator wants to give rights to ... Get more on HelpWriting.net ...
  • 33.
  • 34. Application Software And File Management System input or retrieval of the data would be required, as the student can then access the data and retrieve it from a school computer for use. The compatibility of a wide range of devices connected to the network needs to be taken into consideration due to the broad range of operating systems, application software and file management systems available. For instance, a word processed document generated on a MacBook laptop running a variant of Mac OS X would need to be compatible with word processing applications used on the school network system that runs on Microsoft Windows. In the event which it is not, the file would need to be converted into a compatible file type in order to be accessed on school devices. Access to a file management system that is linked to the student's school login would also be crucial, as the documents can then be manipulated, whether they are uploaded, retrieved or stored. This offers the student a wide range of options in which they can access their own files, as well as many forms of shared information placed on the system that include school research resources. The usage of cloud services such as Google Drive or Microsoft OneDrive would need to be universal for all platforms connected to the server for file management. There are also many risks to be had with implementing the BYOD system in our school. One of which is with the volume of students at the school at present, there is a risk to be had in which the school server system could not physically ... Get more on HelpWriting.net ...
  • 35.
  • 36. Advantages And Disadvantages Of Hadoop Distributed File... Chapter 7 IMPLEMENTATION The implementation phase of the project is where the detailed design is actually transformed into working code. Aim of the phase is to translate the design into a best possible solution in a suitable programming language. This chapter covers the implementation aspects of the project, giving details of the programming language and development environment used. It also gives an overview of the core modules of the project with their step by step flow. The implementation stage requires the following tasks. Planning has to be done carefully. Examination of system and the constraints. Design of methods. Evaluation of the method. Correct decisions regarding selection of the platform. Appropriate language selection ... Show more content on Helpwriting.net ... The file system that manages the storage across network of machines is called distributed file systems. Hadoop mainly comes with the distributed file system called HDFS (Hadoop distributed file system). HDFS Design: The HDFS file system is designed for storing files which are very large means files that are hundreds of megabytes, gigabytes and terabytes in size, with streaming data access patterns, running on commodity hardware clusters. HDFS has a idea of write once read many times pattern. A dataset is typically generated or copied from the source and various analyses are performed on that dataset. And hadoop does not need expensive hardware. It is designed to run on commodity hardware. 7.1.1 Basic Architecture of HDFS Figure 7.1.1 shows the basic architecture of NS2. NS2 provides users with executable command ns which take on input argument, the name of a Tcl simulation scripting file. Users are feeding the name of a Tcl simulation script (which sets up a simulation) as an input argument of an NS2 executable command ns. In most cases, a simulation trace file is created, and is used to plot graph and/or to create animation. Fig 7.1.1: Basic Architecture of ... Get more on HelpWriting.net ...
  • 37.
  • 38. Questions On Database Management System 1. Interpreting language: Since the file–processing system can be built on any of the programming languages, this will be a tedious task for other language developers to understand the actual logic behind the data storage and build a new requirement. But Database Management System (DBMS) uses a Structured Query Language (SQL) which will be used universally to insert, update or delete the data by all the developers and this will act as a common language for all the developers/ end users to work with the data. 2. Data redundancy and inconsistency. In file processing system, many files are generated or created using different programming languages by different developers in one particular project. For example, let us consider the example of a Software project which consists of various teams/ developer teams. a. Duplicate data: In our software project example, if we have a particular person working on two technologies namely .NET developer and as an Automation test developer, then the same person information (namely employee id, email id, phone number) will be stored in both the files(namely .NET team file and the Automation test developer file) In DBMS, by using the normalization concepts on tables, we design the database in such a way that the data is not duplicated. b. Data Redundancy leads to higher storage and access cost. As the same employee's data is stored in two different files, this leads to unnecessary usage of disk space for the same employee data which will ... Get more on HelpWriting.net ...
  • 39.
  • 40. Switch From Windows For Linux Switch from WINDOWS to LINUX Prepared for CEO HACKD, LLC Prepared by Joseph Wangombe Student UNIVERSITY OF MARYLAND UNIVERSITY COLLEGE. December 03, 2014 Switch from Windows to Linux Introduction The switch from Windows to Linux is something that many organizations contemplate doing but many tread this route with much care. In recent years management has been concerned with the rising cost of doing business; the security of their patents and customer information were their major concerns. While most agree that these issues deserve attention, consensus dissolves on how to solve the concern. This proposal is to elaborate to the process to switch from Windows to Linux. It has long been thought by many people here in the ... Show more content on Helpwriting.net ... Hardware and Installation Options 3. The way users will log in to systems 4. How systems will get their IP Address 5. How the DNS will be accessed by the LSDG systems 6. How files may be accessed by the LSDG 7. How to share files securely 8. How printing will be handled. 9. Data encryption. Plan for Migration from Windows to Linux The transition from Windows to Linux can be long and take months to achieve, the moving of data setting the installations of the servers and clients is time consuming and need professionals to handle it, however the transition is more than worth it. A good transition to take place would require extensive planning of resources, time and expertise. The best approach to deal with migrate from Windows to Linux is gradual, one department after another. The service of servers is the most
  • 41. critical phase to start with. A typical office uses shared resources to maximize on the resource hence it is critical to start with the services that are shared the most and change those first. Printing, Storage and application servers are some of the critical areas that any organization's IT want to see go as smooth as possible. Linux can be configured from installation to be a server or just a regular desktop client. Once the servers have been installed in place then the clients that are going to be pulling the resources from it can be installed and integrated gradually to avoid disruption of services to the workers. It is important to educate the ... Get more on HelpWriting.net ...
  • 42.
  • 43. Essay on UNIX&Linux UNIX AND LINUX Two Powerful Systems That Are Often Misunderstood Unix and Linux There have been many–recorded eras throughout man's history. There was the Ice Age (BURR), the Stone Age, the Bronze Age, and the Industrial Age (revolution) just to name a few. Each of these eras marks pivotal advances in humankind. Here are some examples of our advancements, during the Ice Age, one of nature's first demonstrations of her power in population control, man presents his first fashion show focusing on the elegant features of Fur clothing and accessories. The Industrial Revolution mans first experience with assembly line manufacturing. It ... Show more content on Helpwriting.net ... There are many operating systems in use today, a few examples are Windows 95/98, Windows NT, MS–DOS, UNIX and one you may not have heard of, LINUX. The focuses of this report are the operating systems UNIX and LINUX, two very interesting and powerful systems. The first is often labeled as too confusing and unfriendly, the later is relatively unknown to the novice user, but surprisingly they are very similar in design. A short history of the two operating systems may explain why they are so similar. UNIX is a creation out of Bell Labs in the 1960's, in a project headed by Stephen Bourne. The idea was to create an operating system whose kernel (core part) was as tiny as possible. The main driving force, the small UNIX kernel, was that the developers were doing their work on what were considered in that day to be tiny computers. The severe limitation on RAM resulted in a small kernel with all the utilities implemented as separate, stand–alone programs. Each was itself tiny, and designed to accept input from the preceding program as well as provide output to succeeding programs. This process of using output from one program as input into another is referred to as piping and is central to UNIX operating systems today (UNIX & LINUX Answers! Certified Tech Support © 1998). LINUX is a creation of Linus ... Get more on HelpWriting.net ...
  • 44.
  • 45. Social Media And Its Effects On The World Today Without... You have to admit – it's hard to imagine the world today without the Internet. However, it seems it's hard just for some us. A recent study from the B2B research firm Clutch, revealed that more than 46% of small businesses in the United States still don't have a website for their company. Numerous reasons were listed for not having an online presence, for instance, around 12% of small business representatives said that they use social media networks in place of static site. But the most popular reason by far was the cost of maintaining a site. Now, while starting and maintaining a website will definitely cost you, in reality, you don't have to spend a ton of money in order to have a fully–functional, modern site and keep up with the competition. On the other hand, there are some things you cannot ignore if you want to save as much money as you can, and unfortunately, one of the biggest issues many companies don't pay much attention is cybersecurity. These days, hackers and other cyber criminals are pocketing a staggering amount of data and money from small business around the globe. The State of Cybersecurity When you consider the costs that companies suffering as a result of cybercrime – "crime wave" is an understatement to say the least, as a matter of fact, "epidemic" is more like it. Just consider this, three years ago, according to the Wall Street Journal, the cost of cybercrime in America was around $100 billion. Last year, however, insurance company Lloyd's ... Get more on HelpWriting.net ...
  • 46.
  • 47. Microsoft 's System Preparation Utility You may come across a situation where you have a computer that does not support a PXE boot. For these cases you can boot the computer from disk using a discover image. A discover image is an image file that you can burn to a CD–ROM or other boot medium(s). When you boot the client computer using the discover image disk, the computer loads Windows PE, connects to a specified WDS server, and proceeds with the operating system installation process. Before capturing a computer with WDS, you must prepare a master or reference computer with the Sysprep.exe utility and reboot the computer using the capture image. Microsoft's System Preparation Utility (Sysprep.exe) prepares a Windows computer for cloning by removing specific computer information such as the computer name and Security Identifier (SID). On Windows Server 2012, the Sysprep.exe is located in the following folder: We studied in the above topic about the minimum requirements to boot the WDS server and deploy an image to a client computer which are a boot image and an install image. However, you can also create two additional types of boot images in order to boot the WDS server. These are capture and discover images and are explained below: In addition, the boot image starts the operating system installation. The install image on the other hand contains the operating system that WDS installs.The boot images and the install images use the WIM, a file format that allows a file structure (folders and files) to be stored ... Get more on HelpWriting.net ...
  • 48.
  • 49. Application Of An Organization Store And Shares Its Data... NSN: 128098762 Achievement Standard 91367 Digital Technologies 2.40 Contents Introduction .............................................. 3 File Management ..................................... 4 Input, Output, Storage, Retrieval and Manipulation ............................................ 7 Ethical and Legal Issues ........................... 8 Backup Procedures and Conventions ... 10 The Role of Information Systems .......... 12 Bibliography ........................................... 13 Introduction This report involves how an organisation stores and shares its data securely but makes it available to those who have the right to see it. The organisation I have chosen is Otumoetai College. This organisation is large and handles data for over 2000 students, which relies heavily on sharing data securely. There are 4 main different sets of people who require access to data pertaining to the college, each of these sets have their own needs and different levels of access. 1. Administrators – These people securely manage the data for the other three groups below. Admins manage the data tracking for student's data, including their progress, finances/school transactions, attendance and also supply student's results to the New Zealand education department. 2. Teachers – Teachers have multiple roles and needs for access to the school database. This group may require access to student progress, attendance and other learning materials. 3. Students – ... Get more on HelpWriting.net ...
  • 50.
  • 51. Programming Proposal Sample Programming Solution Proposal Crystal Wright PRG/210 September 19, 2011 Christopher Stott Programming Solution Proposal "New York Freelance Technology is a web based organization affiliated with Montana Freelance Technology and GMR Web Services that continues to give you quality hosting at an affordable cost." (New York Freelance Technology, 2011) Not only does NY Freetech perform web specific tasks, they also handle numerous person to person tasks such as custom computer building, videography and DVD authoring. Their web related tasks include web design, web development, graphics design, web hosting and DNS (domain name system). One thing NY Freetech does not have is a support forum for their customers. To contact customer ... Show more content on Helpwriting.net ... Write down the database name because it will be needed by the web developer. After creating the database, click on it choose set database permissions and choose a user for that database and set the permissions for that database user for that database. Make note of the user name and password for that user to pass to the developer as well. That will all be needed for the forum install. For the file permissions, in webmin choose the others tab and click file manager. Navigate to the forum folder and set the permissions for the files stated in the readme section of the forum software. When this is done, the web developer can create a link on the main page to the forum. When this is done the developer can then navigate in their browser to the location of the forum as noted in the forum software readme. The install page will come up and ask for the database name user and password. After that it will ask a few questions so it can run its install script to configure everything. When it is done it will ask for a forum administrator username and password. At this stage the developer can test the forum and code the theme files of the forum to make it match the look and feel of the website. Now that the roles of the personnel involved must play, we can go over the steps of the development cycle to make sure everything is done in a modular fashion. The first part of the program development cycle has been done. We have already ... Get more on HelpWriting.net ...
  • 52.
  • 53. Installation Of An Iso Image Dvd The installation will be performed using an ISO image DVD that contains the SUSE installation. The installation process will configure language, keyboard, license, partitioning, time settings, and desktop selection. A graphical interface will be used for end users in order to provide an easier transition from Windows to SUSE. Command line interface configurations will be selected for servers and administrative systems in order to provide better performance (opensSUSE). Users will logon to the systems using the KDE desktop environment. The KDE environment will provide a familiar look for users migrating from Windows systems. KDE replicates most preferred functions used in Windows (Beginning SUSE Linux, 2006). User's logon to ... Show more content on Helpwriting.net ... During account and group migrations, all accounts will be reviewed to ensure access only to users that are still within the organization. This will be an opportunity to HACKD, LLC to remove old and expired accounts from the infrastructure. Password age and expiration will be configured within the /etc/shadow file (User and Group Overview LabSim, 2015). The IP Address configuration implemented will be a mixture of Static and Dynamic IPs. Static addresses will be assigned to servers, network devices and other peripherals such as printers. Desktops and laptops will be configured to use dynamic IP addressing through a DHCP lease that will last 12 hours. In order to manage dynamic host configuration protocol (DHCP) requests a DHCP virtual server will be configured. This server will have appropriate services enabled including "dhcpd". Configuration changes will be saved at the dhcp.conf file. Static IP addresses will be configured in the /etc/sysconfig/network–scripts file. DHCP lease settings are defined within the /etc/dhcpd.conf file. The system domain name service (DNS) will be handled by a virtual DNS server. Desktop and laptops will have an entry indicating the DNS server within /etc/resolv.conf. Systems will be configured to use the domain name service with the /etc/hosts file as a backup. For name resolution Linux can use a range entry located in the /etc/nsswitch.conf file. The file is ... Get more on HelpWriting.net ...
  • 54.
  • 55. Legal And Regulatory Framework Essay NEW ZEALAND SCHOOL OF EDUCATION LAN– LOCAL AREA NETWORK MANAGEMENT/ PERFORMANCE/ SUPPORT/ DETECTION AND PREVENTION OF VIRUS ASSESSMENT REPORT SUBMITTED TO ¬– VIDHYA DESAI STUDENT ID: 145177 BATCH NO: 70714 BY: YUGANDHAR KAMBAPATI Contents Introduction 3 1. MANAGING THE ACCESS 3 1.1 IDENTIFYING THE RESOURCES 3 1.2 Access Levels 4 1.3 Methods to Control Access 5 1.4 Purpose of Audit Trial 6 2. PERFORMANCE ISSUES ON LAN 7 2.1 Data Analysis and Identifying Problem 7 2.2 Response Time Analysis 7 2.3 DIAGNOSTIC TOOLS 8 2.4 METHODS IMPROVING LAN PERFORMANCE 9 3. LAN SUPPORT ISSUES 10 3.1 Local expertise: 10 3.2 User expectations 10 3.3 Role of Suppliers 10 3.4 Third party professionals 11 4. VIRUSES ON LOCAL AREA NETWORK 11 4.1 Symptoms and transmission of viruses: 12 4.2 Method for prevention, detection and eradication of viruses: 14 CONCLUSION 16 REFERENCES 17 Introduction A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building, using network media.
  • 56. The defining characteristics of LANs, in contrast to Wide Area Networks (WANs), include their smaller geographic area, and non–inclusion of leased communication networks ARC NET, Token Ring and other technology standards have been used in the past, but Ethernet over twisted pair cabling, and Wi–Fi are the two most common technologies currently used to build ... Get more on HelpWriting.net ...
  • 57.
  • 58. Purpose Of Operating Systems For Computer Programs Purpose of operating systems An operating system is known to be a software which lets the person to manage computer hardware an also software resources and provides common services for computer programmes. The most important part when it comes to the computer system is the operating part of the system software. Most application programs need an operating system to be able to run. Interactions between things such as keyboard and CPU are also controlled by the operating systems and this is one of the reason why we use operating systems as they tell the components what to do and how to communicate with the user and without the operating system the user would not be able to use the computer or the components with ease. Machine management ... Show more content on Helpwriting.net ... Task manager is what shows the user the programmes that the operating system is running and how much each programme uses up in the terms of memory. Programmes can only be loaded or copied from the hard drive into memory for the programme to work and be able to run. There is a limit on how much RAM to be able to run these programmes. After the programme is shut it has to be removed from the memory (ram) for there to be more space free for other programmes that you may want to open up and run. The hard drive however the hard drive is able to store information for a longer period of time. Processor management is where time is given to applications and processes via the processor so that they are able to work as well as they can. Processors cycles are also taken advantage of so that everything is able to function together without any problems. Small coding which is called threading which is controlled by scheduling is a way that threads gets information about computer systems. Processor management is where time is given to applications and processes via the processor so that they are able to work as well as they can. Processors cycles are also taken advantage of so that everything is able to function together without any problems. Small coding which is called threading which is controlled by scheduling is a way that threads gets information about ... Get more on HelpWriting.net ...
  • 59.
  • 60. Sandbox Vs Android Security Essay The kernel enforces security between applications and the system at the process level through standard Linux facilities, such as user and group IDs that are assigned to applications. By default, applications cannot interact with each other and applications have limited access to the Operating System. If application A tries to do something malicious like read application B 's data or dial the phone without permission (a separate application), then the Operating System protects against this, because application A does not have the appropriate user privileges. All these features together are called the sandbox that jails the actions done by applications: the sandbox is simple, auditable, and based on decades–old UNIX–style user separation of ... Show more content on Helpwriting.net ... When the user continues with the installation the system assumes that all the permissions where granted. The system accepts all the permissions listed in the AndroidManifest.xml, and is not possible to select which permissions to allow and which not. [4] [8] In the next section are described the mayor security threats found in Android. III. ANDROID SECURITY THREADS AND LACKS Android, as other smartphone Operating System, considers the security as integral part in its design. [4] However it has presented vulnerabilities that had been found and demonstrated by researchers and others that have been exploited by attackers. [2][8][9]. The same threats found in the modern SO can be applied to Android. For each security level in Android's architecture exists the possibility of any of the following types of attacks [9]: user 's information subtract information eavesdropping Unavailability of device 's services and resources spyware and malware execution Android threats can be classified in three mayor groups [10] based on where the threat is located: in an application, website, or network. C. Application Communication Processes can communicate using any of the traditional UNIX–type mechanisms, where, the Linux permissions still apply. Android also provides Inter Process Communication (IPC) mechanisms: [4] D. Binder: A lightweight capability–based remote procedure call mechanism designed for high performance for ... Get more on HelpWriting.net ...
  • 61.
  • 62. Differences And Disadvantages Of The Evolution Of Database... Evolution of Database Management Systems What is Database : Database is a set of data. It has a regular structure and that is organized in such a way that a computer can easily find the desired information. What is Data : Data is a collection of distinct pieces of information, particularly information that has been in some specific way for use in analysis or making decisions. What is Database Management Systems : A collection of programs that manages the database structure and controls access to the data stored in the database. Evolution of Database Management Systems Now we should talk about these 4 topics, File Management System Hierarchical database System Network Database System Relational Database System File Management System ... Show more content on Helpwriting.net ... Data Security: Traditional file organization has security advantages over electronic filing, but it also has its disadvantages. Electronic files are usually accessible on a network, which means it's possible for an unauthorized person to gain access to electronic data over the Internet through hacking methods. Access time: One of the primary disadvantages of traditional file systems is the time it takes to access data. It can take minutes if not hours to locate a few files in a large paper filing system. Electronic databases allow for almost instantaneous access to information Editing and communication: Traditional file systems are cumbersome in that they do not allow users to easily edit files or send information to others. Paper files often cannot be edited directly, forcing users to make new copies to update old files. Order of data: Data can get out of order in traditional filing systems. If someone accidentally puts a file in the wrong place, or takes a file out of a cabinet and forgets to put it back, it can lead to lost data or the creation of additional copies of files. Electronic filing systems allow users to quickly check whether information already exists somewhere in the system, which helps avoid problems like redundant files and data ... Get more on HelpWriting.net ...
  • 63.
  • 64. File Management Paper File Management Paper – Unix® File Permissions Joe Guckiean POS/355 April 15, 2013 Bob O'Connor File Management Paper – Unix® File Permissions The name Unix® refers to a play on words rather than being an acronym. During the mid–1960 an operating system was developed at MIT that allowed multiple users to work on a system at any one time. It was called Multiplexed Information and Computing System (MULTICS). In the late 1960s, closer to 1970, a couple programmers at Bell Laboratories wrote an assembler to interface with a DEC PDP–7. Unlike MULTICS, this version allowed only one user to access it at a time. One of the programmers kiddingly called it Uniplexed Information and Computing System (UNICS) pronounced Unix. In the ... Show more content on Helpwriting.net ... In Unix® there are three sets of permissions that can be modified at the folder and file level; user, group, and the world. In this illustration, user and group permissions will be discussed. To begin, a command at the console must be executed to create the user group. The syntax is: groupadd [g– gid [–o]] [–r] [–f] groupname. Simply typing in: groupadd group_name will suffice. Groupname is where you put in the specific name of the group. If you don't specify additional parameters, the system will use the defaults. Following the creation of the group, the users must be added into it. Execute this command to add the existing users to the new group, Usermod –G <newgroup> <user>. Since there are 4990 user, a script would come in handy adding the users to the group. The VI editor is a built in tool that allows the building of scripts. Now the real work begins, defining the permissions for the file. From the console, navigate to the directory that contains the file that is to be shared. Type in this command to view the current permissions on the file, ls –l (those are lowercase L's). This command will allow the changing of permissions either at a user, group or global level. Chmod {a,u,g,o} {+,–} {r,w,x} files a = all user u = the owner g = group o = others (neither u or g) | Plus (+) =give permissionMinus(–) = remove permission | r = Read–onlyw = Read/Writex = Execute | Files = single or multiple files | ... Get more on HelpWriting.net ...
  • 65.
  • 66. Analysis Of Jacket X 's Payroll Processing System Payroll Process: During an initial review of data for Jacket–X from last year, several potential threats and vulnerabilities were identified. Specifically, the payroll business process was highlighted as containing threats and vulnerabilities requiring immediate attention from management in order to prevent a data breach. Recall threats and vulnerabilities, although often utilized together in discussing cybersecurity risks, are two separate concepts. To review, a threat is defined as an undesirable event that can cause harm". It is also important to note that threats can be internal or external to an organization (Valacich). Alternately, a vulnerability is defined as a "weakness in an organization's systems or security policies that ... Show more content on Helpwriting.net ... This would allow supervisors to create a bogus employee, place them on the payroll master file, edit their hours, and supply their own banking information for direct deposit purposes. As this would initially cause a relatively small loss to Jacket–X, it may not be noticed for a while. In order to mitigate this vulnerability, supervisors should only have access to their own employees and any changes should create an audit trail. Also, for independent contractors, the payroll specialists have permission to alter payroll details during validation. Although these permissions allow for more productivity time by creating less personnel in the validation chain, it is counterproductive as it creates a vulnerability wherein the validator is not independent and free to edit contractors' time and attendance. Additionally, this vulnerability can be exploited during the paycheck generation process wherein falsified checks can be created for the bogus contractors. In order to overcome this vulnerability, Jacket–X should separate the payroll specialists and validators in order to create a more secure validation process. Additionally, there is a major flaw with the direct deposit system in that it does not communicate with the paycheck generation process. This can cause paper checks to be issued to those employees who already receive direct deposit. Linking these two ... Get more on HelpWriting.net ...
  • 67.
  • 68. A Large International Purchasing Company A large international purchasing company is further expanding by buying out a growling local company that manufactures western wear at several locations. They are known as the cottage industries. Sam Yosemite the previous owner of the cottage industries with eight satellite offices four large and four small is helping with the transition of the company since its acquisition to make sure that the "Wild Frontier" network is merged with the new domain "Foghorn Leghorn" and migration of the current standards are put into place. The acquisition allows the existing employees to remain in place of their designations. Several changes will be taking place in terms of a larger budget for the creation and maintenance of the new network that ... Show more content on Helpwriting.net ... The TSL is a very low impact service and it requires very little COU or memory for regular operations and its hard disk requirements are small even for a great deal of clients like the ones seen in this company. The idle activities are negligible and the memory used is less than 10 MB. It will allow access from any computing device that is running the Windows–based program or even a full Windows desktop. The employees will be able to connect to terminal server to run programs and use network resources on that server. Windows Terminal Services have the ability to meet with many of the criteria for applications for remote officers. Terminal services with Windows NT the server hardware was hard pressed to support multiple server sessions. Additionally, 10 Mbps networks are considered the standard for the terminal services and have the ability to be easily saturated by network intensive applications. Also, Windows Server 2008 R2 with the terminal services allows administrators of the networks to deploy a full virtual desktop infrastructure solution. This means that the terminal server can be configured to host virtual desktop operating systems. For example, if the user logs off, any changes they made are rolled back and the virtual hard drive is left in a more pristine condition which is ready to use for the next user. With the terminal services the new RemoteApp allows the user to virtualize individual applications instead of ... Get more on HelpWriting.net ...
  • 69.
  • 70. Cs 315 Lab2 CS 315 Lab 02 A. Try to find the proper Linux commands that will answer the following questions. Hint: You can either find the answer from the textbook or from the Internet. *You need to write the procedure that is necessary to accomplish the tasks listed below. Test to see if your answers are correct and type your correct answer under each question. Upload your finished lab document to the dropbox. 1. Use the ls command to list the contents of the root file system directory (/) on your system. ls / 2. Use the ls –l command to view the contents of the root file system directory (/). ls –l / 3. Determine the inode value for the /etc directory. ls –i / 4. Make /etc your current working directory and then ... Show more content on Helpwriting.net ... 11. With your home directory as your current directory, use the command to remove read, write, and execute permissions from group and others for the spreadsheets directory. Next, verify that your change has taken place. cd documents ls –l chmod 700 spreadsheets ls –l 12. Use the cat command to create a two–line file in your home directory called datainfo. On the first line enter 144 and on the second line enter 288. After the file is created, copy it from your home directory to the spreadsheets directory you created. cat >datainfo 144 288 cp datainfo documents/spreadsheets 13. Determine the default permissions on the datainfo file your created. Next, set the permissions on the datainfo file so that the owner, group, and others can read and execute the file (otherwise leave the default settings as is). cd docments cd spreadsheets ls –l chmod ugo+x datainfo 14. Append the current month's calendar to the datainfo file that is in your home directory. Next copy your changed datainfo file over the older datainfo file in the spreadsheets directory, but use the copy option that prompts you before you overwrite the file in the spreadsheets directory. Check the contents of the datainfo file in the spreadsheets directory to make certain your copy was successful.
  • 71. cal >> datainfo cp –i datainfo documents/spreadsheets y cd documents cd spreadsheets cat datainfo 15. Make the spreadsheets ... Get more on HelpWriting.net ...
  • 72.
  • 73. Taking a Look at Virtualization VIRTUALIZATION Virtualization is a concept in which access to a single underlying piece of hardware, like a server ,is coordinated so that multiple guest operating systems can share that single piece of hardware ,with no guest operating system being aware that it is actually sharing anything at all. Working mechanism–Virtualization software tackles the issue by empowering many operating systems and applications to run on one physical server or "host." Each independent "virtual machine" is secluded from the others, and uses as a great part the host's computing resources. Contrast b/w (OS) & the Guest OS–The host is the virtual machine host server; the underlying hardware that gives computing resources, for example processing power, memory, disk and network I/O etc. The guest is a totally separate and independent instance of an operating system and application software. Guests are the virtual workloads that dwell on a host virtual machine and contribute in that server's computing resources. Packages–Hardware virtualization alludes to the production of a virtual machine that demonstrations like a true computer with an operating system. Software executed on these virtual machines is divided from the underlying hardware resources. Desktop virtualization is the idea of differentiating the logical desktop from the physical machine .One type of desktop virtualization, virtual desktop infrastructure (VDI), could be thought as a more advanced form of hardware virtualization. ... Get more on HelpWriting.net ...
  • 74.
  • 75. How The Cloud Is A Time Consuming And Ultimately... wanting to send folders and multiple documents this method can become time consuming and ultimately inefficient. There is an option to zip files when emailing however this only compresses files to a point, some are still too big. An alternate way to saving on the cloud is using Google Drive, which in reality, most students at John Paul II (or at least in my year) do not have a lot of experience with, so generally do not use it. This would be able to securely store larger files. Since we cannot work on some files within the Google interface it would require the file to be downloaded each time it needs to be updated on a different computer. This is one disadvantage which is inefficient but as Google continues to develop more file types may be editable reducing this problem. Personally I prefer the USB for larger files and transferring files in general. However an issue at our school especially within the main computing room there are issues with USB's connecting so whenever attempting to transfer data onto the school computer to work on it there is an uncertainty whether it will successfully connect or not. The benefits as mentioned above are the USB can transfer large files and load them quickly when USB is connected. An example of this is when working on the internal assessments for digital media or digital information. When working on these assignments there is often a main folder containing many sub–folders with multiple files contained within them. This type of data ... Get more on HelpWriting.net ...
  • 76.
  • 77. Essay about Security Enhanced Linux (Selinux), Chroot... Security Enhanced Linux (Selinux), Chroot Jail, and Iptables Security Enhanced Linux (Selinux), Chroot Jail, and Iptables Three of the most important types of Linux security technologies are Security Enhanced Linux (SELinux), chroot jail, and iptables. This security measures aide in the subversion of theft and malicious activity. We will discuss these items in depth to address who created them and for what reason. Along with how these technologies changed the operating system to enforce security, and the types of threats that these security systems are design to eliminate. Security Enhanced Linux was released in December of 2000 from the National Security Agency (NSA), under the GNU general public license. SELinux is not a Linux ... Show more content on Helpwriting.net ... This user has root privileges for his or her own account, but can't access higher directories or be aware of their existence. Virtualization is great for test environment that can be set up in the chroot for software that might be too risky to deploy on a production system. Virtual environments are often used for compatibility issues. Legacy software or software using a different interface must sometimes be run in a chroot because their supporting libraries or files may otherwise clash with those of the host system. Also chroot is often used for recovery purposes. A chroot can be used to move back into a damaged environment after bootstrapping from an alternate root file system. Elevated Privileges in iptables are required for operation, and root user must be used or iptables will not function. With most Linux systems, iptables is installed as /usr/sbin/iptables and documented in its man page, which can be opened using man iptables. There is a set of user interface tools that can be used to manage your system's security profile in a more user friendly manner. The user interface firewall management tools include Bastille, and GUI tools with like KDE's Guard dog. There are Linux distributions whose main purpose is to provide a GUI front end to iptables with a variety of configurations. Iptables allows the system administrator to define tables containing chains of rules for the treatment of packets. Each table is associated with a ... Get more on HelpWriting.net ...
  • 78.
  • 79. Maintaining Information Stored On A User Freedom Without... Operating systems have to provide a level of security to allow a user freedom without someone seeing them making a purchase online. An attacker would find that purchase made very valuable, they can acquire that information. From threats and attacks which could allow sensitive information to be looked at or taken. The idea of an OS having a built in security levels is now a very crucial task. This helps to secure information to not be looked at. Securing information stored and allowing only certain users to look at it are the main components to protect. Now, computers and technology are a part of our everyday life that we do not see the protection happening in the background. To understand this more, information that is stored in a database, on a computer, through emails and websites are all examples of secure information. An OS needs to have different levels of security built in that helps protect this sensitive information. For some users and companies, they have very personal information stored on their computer. Even for a regular user, an email should not be read when it is sent to someone. A computer stores what is sent, if an attacker was able to get past the password they would get that information. Making purchases online with a credit card should not be found or easily accessible. On a company's side, they could hold up to millions of user's personal information such as social security numbers, and information about you. This paper will explore the Windows ... Get more on HelpWriting.net ...
  • 80.
  • 81. Unix Security Essay An Overview of UNIX Security The purpose of this paper is to analyze the security of UNIX. Considerations shall be given regarding generalized security aspects of a typical UNIX system. The ultimate scope of the following presentation shall remain within the boundaries of a few of the more critical UNIX security aspects. Of particular note will be discussion regarding standard user access, root access, file system security, and internet access precautions. This will not focus on specific measures used to implement security, but rather will investigate both pros and cons typical of a UNIX installation. Finally, a brief description of UNIX security versus other operating systems will be noted. Since no two UNIX–based operating ... Show more content on Helpwriting.net ... Of the utmost security concern is the protection of the root account. The root account allows a user absolute control of the system, including the ability to alter practically every aspect of the systems, from individual files to installed programs. Indeed, an entry in Wikipedia.com notes, that a UNIX administrator should be much like Clark Kent, only using the root account, or becoming Superman, when absolutely necessary, lest the security of the account be compromised (2006). Ultimately, this implementation represents a near surefire way to protect the system against many internal and external threats. By ensuring regularly scheduled root account password changes and ensuring the passwords are strong, the cons noted previously should be relatively easy to avoid. File system security is also very important regardless of the UNIX implementation. UNIX files system security generally allows access permissions to be granted to various defined users and groups. UNIX also contains an access right flag know as the "sticky bit". The sticky bit can be used to allow users and groups write access to certain directories within the system. Similarly, the sticky bit can be used by a user to disallow other users with access to the same directory to alter the contents of the file. The file can only be altered by the file owner, the directory owner, and the root account (linuxdevcenter.com, 2006). This particular element allows for a great deal of control ... Get more on HelpWriting.net ...
  • 82.
  • 83. It240 Appendix F Essay Associate Level Material Appendix F Vocabulary Table Define five of the key terms listed in the Vocabulary Table. |Term |Definition | |Windows |Whichever of several microcomputer operating systems or environments presenting a| | |graphical user interface | |Processor |A piece of a computer, such as the central processing unit, that preforms | | |calculations or other ... Show more content on Helpwriting.net ... | |Windows manager |is system software that controls the placement and appearance of windows within a| | |windowing system in a graphical user interface. | |Object manager |is a subsystem implemented as part of the Windows Executive which manages Windows| | |resources | |Device driver |In computing, a device driver or software driver is a computer program allowing | | |higher–level computer programs to interact with a hardware device. | |FAT |is a computer file system architecture now widely used on many computer systems | | |and most memory cards, such as those used with digital camera | |FAT32 |In order to overcome ... Get more on HelpWriting.net ...