Free Essay

Chapter Four Fedora and Red Hat Linux

In:

Submitted By Saads93
Words 404
Pages 2
1. The system displays the following message when you attempt to log in with an incorrect username or an incorrect password: Login incorrect
a.This message does not indicate whether your username, your password, or both are invalid. Why does it not reveal this information? Answer: It is a strategy meant to discourage unauthorized people from guessing names and passwords to gain access to the system.
b.Why does the system wait for a couple of seconds to respond after you supply an incorrect username or password? Answer: To help stop a brute force attack from cracking the system security features.

2. Give three examples of poor password choices. What is wrong with each? Doctor4 = word in the dictionary can be easily found and cracked bluejay = does not contain a number or a capitalized letter Hot4 = is too short

3. Is fido an acceptable password? Give several reasons why or why not. Answer: No, a password needs to be at least 8 characters with at least one number so it will not be easily guessed.

4. What is a context menu? How does a context menu differ from other menus? Answer: It is a menu with choices that apply to the window or icon you click on It is specific to what you previously right clicked on – like an extension of the previous page with more options.

5. What appears when you right click the root window? How can you use this object? Answer: Displays the desktop menu. Enables you to create a folder, launcher, or document.

6. How would you swap the effects of the right and left buttons on a mouse? What is the drag-and-drop threshold? Answer: (Main menu: System>Preferences>Mouse) then specify the change of position between the right and left function. Specifies how far you must drag an object before the system considers the action apart of the drag and drop option. How would you change it? Change the characteristics in the Mouse Preferences window.

7. What are the primary functions of the Main menu? answer: To show options at login.

8. Describe three ways to
a. Change the size of a window.
You can hit the resize box in the top right corner, you can grab the bottom left corner of the window and drag it, you can grab the top of the window and press against the top of the screen and let go.

Similar Documents

Free Essay

Linux Chapter 1

...Chapter 1 Introduction to Linux At a Glance Class Notes Table of Contents • Overview • Objectives • Teaching Tips • Quick Quizzes • Class Discussion Topics • Additional Projects • Additional Resources • Key Terms • Technical Notes for Hands-On Projects Lecture Notes Overview Linux technical expertise is essential in today’s computer workplace as more and more companies switch to Linux to meet their computing needs. Thus, it is important to understand how Linux can be used, what benefits Linux offers to a company, and how Linux has developed and continues to develop. In the first half of this chapter, you will learn about operating system terminology and features of the Linux operating system, as well as the history and development of Linux. Later in this chapter, you will learn about the various types of Linux and situations in which Linux is used. Chapter Objectives In this chapter, you will learn to: • Understand the purpose of an operating system • Outline the key features of the Linux operating system • Describe the origins of the Linux operating system • Identify the characteristics of various Linux distributions and where to find them • Explain the common uses of Linux in industry today Quick Quiz 1 1. What term is used to describe a running program on Linux? a. Application b. Process c. Runtime d. Project 2. What is represented...

Words: 3777 - Pages: 16

Free Essay

Computer Analysis

...Fedora 12 Security-Enhanced Linux User Guide Murray McAllister Scott Radvan Daniel Walsh Dominick Grift Eric Paris James Morris Security-Enhanced Linux Fedora 12 Security-Enhanced Linux User Guide Edition 1.4 Author Author Author Author Author Author Copyright © 2009 Red Hat, Inc. Copyright © 2009 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https://fedoraproject.org/wiki/ Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. All other trademarks are the property of their respective owners...

Words: 26838 - Pages: 108

Free Essay

It250

...Chapter One (History of Linux): The history of Linux begins not with the release of Linux in 1991 but with the creation of GNU (which stands for Gnu’s not UNIX). This started with the purpose of creating a free OS to anyone who wanted with. By 1991 everything was complete except for the kernel which Linus Torvalds provided. The Code was free, this dated to back to when UNIX was released to Universities for a low cost and that way its students would be familiar with it and it would slowly permeate the marketplace once those students got out of the schoolhouse and made their way up the ladder of business. Some of the best things about Linux is the fact that is has a large selection of applications written for it that range from word processing to graphical tools to security administration software. It provides a wide range of peripherals and easy to install software. It works on a variety of platforms as well with a variety of hardware which allows it to be extremely portable. Another big key in this development is the creation of UNIX in B programming language which gave rise to C, C++ and Objective C. Linux has the shells to be able to interpret command language and programming language. GUI allows people to customize the desktop environment to suit their needs or tastes. Chapter Two and Three (Installation and Step by Step Installation): In the installation of Linux there are many different mediums to install it from. You can install it form a Live CD, An install...

Words: 539 - Pages: 3

Free Essay

Cis 206 Slingshot Academy / Tutorialrank.Com

...----------------------------------------------------------- CIS 206 Case Study 2-4 Discussing How Applications Interact with Operating Systems (DEVRY) For more course tutorials visit www.tutorialrank.com You have been asked to prepare a short lecture for users in the Accounting Department. They have expressed interest in learning more about how the operating system supports the applications they use. Your boss would like to review your lecture notes prior to the class, so you need to save them to a document. Your notes should provide details of your lecture. ----------------------------------------------------------- CIS 206 Case Study 8-2 Researching Background and Font Combinations in Fedora Core 4 (DEVRY) For more course tutorials visit www.tutorialrank.com Case 8-2: Researching Background and Font Combinations in Fedora Core 4 You have been asked to prepare a presentation on the poor choices users make when working with desktop backgrounds and fonts. For your presentation, you need to research three different background choices, each with a different font. Your presentation should include information about font size and icons, how they look with different backgrounds, and how different backgrounds work with the fonts. Can you still read the...

Words: 3261 - Pages: 14

Premium Essay

Introduction Fedora

...01 558366 ch01.qxd 11/24/03 10:15 AM Page 1 C H A P T E R Getting Started ou’ll find that Fedora is remarkably friendly and easy to use for work, play, or for just surfing the Internet. This chapter helps you to get logged in and use the friendly Fedora Bluecurve desktop and demonstrates how to log out and shut down the computer. You also learn how to configure the date, time, and your time zone, how to set up any printer you may have connected to your computer, and how to get your computer connected to the Internet. Even if you are eager and able to start using the many powerful applications with little or no help, please take the time to familiarize yourself with the terms and important concepts contained in this chapter, especially the information about users and security in the section “Before You Log In.” 1 ✦ ✦ Y ✦ ✦ Introductory Terms When you learn about a new operating system, you also need to learn new terminology. Here are a few basic terms you should learn to use Fedora. You will see these terms often throughout this book: ✦ Graphical User Interface (GUI) — A screen with icons, menus, and panels for the user to click on to initiate actions such as starting applications and opening files. ✦ Point and click — You move the mouse to point to something on the screen, and then click one of the mouse buttons to perform a task. By default, you click the left mouse button to do most tasks, but very often you can get a custom menu of options when...

Words: 7515 - Pages: 31

Premium Essay

Class Notes - Networking

...PRINTED BY: Norman Puga . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. Essential Linux Administration: A Comprehensive Guide for Beginners Page 1 of 4 PRINTED BY: Norman Puga . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. ESSENTIAL LINUX ® ADMINISTRATION: A COMPREHENSIVE GUIDE FOR BEGINNERS i CHUCK EASTTOM WITH SERGE PALLADINO Course Technology PTR A part of Cengage Learning 9781133795308 i ii Essential Linux Administration: A Comprehensive Guide for Beginners Chuck Easttom with Serge Palladino Publisher and General Manager, Course Technology PTR: Stacy L. Hiquet Associate Director of Marketing: Sarah Panella Manager of Editorial Services: Heather Talbot Marketing Manager: Mark Hughes Acquisitions Editor: Heather Hurley Project and Copy Editor: Marta Justak Technical Reviewer: Danielle Shaw Interior Layout Tech: MPS Limited, a Macmillan Company Cover Designer: Mike Tanamachi Indexer: Sharon Shock Proofreader: Kelly Talbot © 2012 Course Technology, a part of Cengage Learning. ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording...

Words: 34239 - Pages: 137

Premium Essay

Computer Book

...The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book Copyright ©2008-2013, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advocacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. This book is also available in printed form, published by No Starch Press and may be purchased wherever fine books are sold. No Starch Press also offers this book in electronic formats for most popular e-readers: http://nostarch.com/tlcl.htm Release History Version 13.07 09.12 09.11 09.10 Date July 6, 2013 December 14, 2009 November 19, 2009 October 3, 2009 Description Second Internet Edition. First Internet Edition. Fourth draft with almost all reviewer feedback incorporated and edited through chapter 37. Third draft with revised table formatting, partial application of reviewers feedback and edited through chapter 18. Second draft incorporating the first editing pass. Completed first draft. 09.08 09...

Words: 100185 - Pages: 401

Free Essay

It Report

...as for providing necessary information regarding the project & also for their support in completing the project. I would like to express my gratitude towards my parents & member of (Organization Name) for their kind co-operation and encouragement which help me in completion of this project. I would like to express my special gratitude and thanks to industry persons for giving me such attention and time. My thanks and appreciations also go to my colleague in developing the project and people who have willingly helped me out with their abilities. TABLE OF CONTENT CHAPTER 1 Introduction Organogram for F.C.D.A- I.C.T Unit CHAPTER 2 HARDWARE AND SOFTWARE Computer motherboard Installations of software CHAPTER 3 NETWORKING Networking Devices Ethernet standard of cabling Network topology CHAPTER 4 WEB DEVELOPMENT HTML and HTML tags The use of CSS Java script CHAPTER 5 Summary and conclusion Chapter 1 Introduction This chapter...

Words: 4162 - Pages: 17

Premium Essay

Qwer145

...Answers to the Chapter 3 Review Questions 1. You are in the vi editor and realize that you need to perform a file listing to check the name of a file. What command can you use from vi? Answer: c. :!ls 2. Your new assistant is trying to use vi, but each time he tries to type a line of text, it is not entered on the screen. What is the problem? Answer: a. He is not in insert mode. 3. In vi, a screen-oriented command ______________________, Answer: b. executes at the location of the cursor 4. You have been editing a file in vi and decide to undo the most recent two actions you have entered. What should you type? Answer: c. Press Esc, u, u. 5. You have placed the cursor in vi at the beginning of a line. While in the command mode, how can you delete the entire line? (Choose all that apply.) Answer: c. Type dd. 6. You are using vi to edit a configuration file, but decide to abort the editing session (you haven’t yet saved anything). What do you type from command mode? Answer: a. :q! 7. You open a large document in the vi editor and decide that you want to quickly place the cursor at the beginning of the last line. Which command mode option do you use? Answer: d. G 8. How can you start a Emacs and create a new file called budget at the same time? Answer: c. Type emacs budget at the command line. 9. You want to search for the word “egregious” in your text file while editing in Emacs. Which of...

Words: 2497 - Pages: 10

Premium Essay

Wdasdv

...Answers to the Chapter 3 Review Questions 1. You are in the vi editor and realize that you need to perform a file listing to check the name of a file. What command can you use from vi? Answer: c. :!ls 2. Your new assistant is trying to use vi, but each time he tries to type a line of text, it is not entered on the screen. What is the problem? Answer: a. He is not in insert mode. 3. In vi, a screen-oriented command ______________________, Answer: b. executes at the location of the cursor 4. You have been editing a file in vi and decide to undo the most recent two actions you have entered. What should you type? Answer: c. Press Esc, u, u. 5. You have placed the cursor in vi at the beginning of a line. While in the command mode, how can you delete the entire line? (Choose all that apply.) Answer: c. Type dd. 6. You are using vi to edit a configuration file, but decide to abort the editing session (you haven’t yet saved anything). What do you type from command mode? Answer: a. :q! 7. You open a large document in the vi editor and decide that you want to quickly place the cursor at the beginning of the last line. Which command mode option do you use? Answer: d. G 8. How can you start a Emacs and create a new file called budget at the same time? Answer: c. Type emacs budget at the command line. 9. You want to search for the word “egregious” in your text file while editing in Emacs. Which of...

Words: 2497 - Pages: 10

Free Essay

Paper

...Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY ISSUE #90 - October 201 4 Photo: miss_millions (Flickr.com) P R I S O N AR C H I T E C T BUILD YOUR OWN OPEN SOURCE PRISON Fu ll Ci rcle M a g a zi n e i s n e i th e r a ffi li a te d wi th , n o r e n d o rse d b y, Ca n o n i ca l Ltd . full circle magazine #90 1 contents ^ HowTo OpenConnect to Cisco p.1 4 Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY Linux News p.04 BACK NEXT MONTH LibreOffice p.1 5 Command & Conquer p.1 2 Arduino p.25 LinuxLabs p.XX Broadcast With WCS p.1 7 Linux Labs p.28 Review p.36 My Story p.37 BACK NEXT MONTH Blender p.XX Letters p.40 Tuxidermy p.41 Q&A p.42 BACK NEXT MONTH Inkscape BACK NEXT MONTH Ubuntu Women p.XX Ubuntu Games p.44 Graphics p.22 Security p.XX The articles contained in this magazine are released under the Creative Commons Attribution-Share Alike 3.0 Unported license. This means you can adapt, copy, distribute and transmit the articles but only under the following conditions: you must attribute the work to the original author in some way (at least a name, email or URL) and to this magazine by name ('Full Circle Magazine') and the URL www.fullcirclemagazine.org (but not attribute the article(s) in any way that suggests that they endorse you or your use of the work). If you alter, transform, or build upon this work, you must distribute the resulting work under...

Words: 22047 - Pages: 89

Free Essay

Khan

...Android ™ A Programmer’s Guide This page intentionally left blank Android ™ A Programmer’s Guide J.F. DiMarzio New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2008 by The McGraw-Hill Companies. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. 0-07-159989-4 The material in this eBook also appears in the print version of this title: 0-07-159988-6. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. For more information, please contact George Hoare, Special Sales, at george_hoare@mcgraw-hill.com or (212) 904-4069. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and...

Words: 43266 - Pages: 174

Premium Essay

Intro to Linux

...A Practical Guide to Linux Commands, Editors, and Shell Programming SECOND EDITION ® Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Library of Congress Cataloging-in-Publication...

Words: 228961 - Pages: 916

Free Essay

Fsfdfdfd

...Oracle VM VirtualBox R User Manual Version 5.0.0 c 2004-2015 Oracle Corporation http://www.virtualbox.org Contents 1 First steps 1.1 Why is virtualization useful? . . . . . . . . . . . . . . . 1.2 Some terminology . . . . . . . . . . . . . . . . . . . . . 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . 1.4 Supported host operating systems . . . . . . . . . . . . 1.5 Installing VirtualBox and extension packs . . . . . . . . 1.6 Starting VirtualBox . . . . . . . . . . . . . . . . . . . . 1.7 Creating your first virtual machine . . . . . . . . . . . 1.8 Running your virtual machine . . . . . . . . . . . . . . 1.8.1 Starting a new VM for the first time . . . . . . 1.8.2 Capturing and releasing keyboard and mouse 1.8.3 Typing special characters . . . . . . . . . . . . 1.8.4 Changing removable media . . . . . . . . . . . 1.8.5 Resizing the machine’s window . . . . . . . . 1.8.6 Saving the state of the machine . . . . . . . . 1.9 Using VM groups . . . . . . . . . . . . . . . . . . . . . 1.10 Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . 1.10.1 Taking, restoring and deleting snapshots . . . 1.10.2 Snapshot contents . . . . . . . . . . . . . . . . 1.11 Virtual machine configuration . . . . . . . . . . . . . . 1.12 Removing virtual machines . . . . . . . . . . . . . . . . 1.13 Cloning virtual machines . . . . . . . . . . . . . . . . . 1.14 Importing and exporting virtual machines . . . . . . . 1.15 Global Settings . . . . . . . . . . . . . . . . . . . . . ....

Words: 143714 - Pages: 575

Free Essay

Ethical Hacking

...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated...

Words: 185373 - Pages: 742