Linux 101

In: Computers and Technology

Submitted By Tawanaof3
Words 469
Pages 2
1. The system displays the following message when you attempt to log in an incorrect password: Login incorrect
a. This message does not indicate whether your user name, your password, or both are invalid. Why does it not reveal this information?
For security purposes – to discourage unauthorized people from guessing names or password to gain access to the computer.
b. Why does the system wait for a couple of seconds to respond after you supply an incorrect username or password?
To stop others from cracking the system
2. Give three examples of poor password choices. And what is wrong with each.
Tawana Johnson - name is very easy to figure out
Tawana 72788 – name and birthday-can figure out
Johnson - too short and easily figured out because last name
3. Is Fido an acceptable password?
Why not?
Too short – easily detected
4. What is a context menu?
A menu in a graphical user interface that appears upon user interaction.
How does a context menu differ from other menus?
A context menu has choices that apply specifically to the window you are in.
5. What appears when you right-click the root window? How can you use this object?
Shortcut menu to get to windows quicker
6. How would you swap the effects of the right and left buttons on a mouse?
The Mouse preferences window enables you to change your mouse from right to left click.
What is a drag a drop-and-drop threshold?
It tells you how far you must drag before the systems the systems consider the drag part of drag and drop.
How would you change it?
From the mouse preference window.

7. What is the primary function of the main menu?
To organize the types of interactions that is possible between the user and the computer.
8. Describe three ways
a. Change a size of a window - position the mouse on the corner of the…...

Similar Documents


...After researching some popular commercial windows applications, I have found a few good open-source alternatives for Linux users. The four Windows applications I researched were Adobe Acrobat, Adobe Photoshop, Internet Explorer, and Norton Anti-Virus. The most user friendly Adobe Acrobat alternative I found was PDFMod. This a very user friendly platform with a nice GUI interface that allows you to reorder, rotate, and remove pages, export images from a document, edit the title, subject, author, and keywords, and combine documents via drag and drop. This program is very simple and easy to use to modify PDF documents. Adobe Photoshop was a little harder to find a good alternative, but I think that GIMP 2.6 answers that call. GIMP is a very simple yet complex application that can be used as a simple paint program, an expert quality photo retouching program, an online batch processing system, a mass production image renderer, an image format converter, etc. You can expand GIMP with the use of plug-ins and extensions to do just about anything. Gimp also has an advanced scripting interface allows everything from the simplest task to the most complex image manipulation procedures to be easily scripted. An obvious choice for me as a replacement for Internet Explorer(due to the fact that I already use it) is Mozilla Firefox. Firefox is, in my opinion, a superior browser with better security, performance, personalization, etc. With Firefox you can sync your desktop browser with...

Words: 446 - Pages: 2


...SELinux (Security-Enhanced Linux) was developed by the U.S National Security Agency and essentially enforces security policies that limits what a user or program can do by implementing MAC (Mandatory Access Control) in the Linux kernel. It defines a security policy that controls many different things such as files, devices, sockets, ports and even some processes. The Security-enhanced Linux's features are designed to enforce the separation of information based on confidentiality and integrity requirements. They are designed for preventing processes from reading data and programs, tampering with data and programs, bypassing application security mechanisms, executing untrustworthy programs, or interfering with other processes in violation of the system security policy. They also help to confine the potential damage that can be caused by malicious or flawed programs. They should also be useful for enabling a single system to be used by users with differing security authorizations to access multiple kinds of information with differing security requirements without compromising those security requirements. SELinux can be in one of three states or modes and the first mode would be the enforcing/active state. This is the default state wherein no user or program will be able to do anything not permitted by the security policy. The next mode would be the permissive/warn state wherein SELinux sends warning message to a log but does not enforce the security policy. Later...

Words: 799 - Pages: 4


...Whether you are an experienced user of Linux or you just want to test run the system on your computer, there are several advantages that you can gain from using this operating system. One factor would be the cost, when you use Linux you will have to spend a penny this software is freely available. This operating system allows you to install the software on number computers unlike in the case of other application systems where you are limited to only one computer installation. Another advantage you gain from installing Linux onto your computer is the fact that this software has stronger security than other OS. There is your choice is another great advantage of using Linux over other operating systems. This is because the user is allowed to control almost all aspects of the system. Majorly, you will be allowed to change how your desktop looks and feels. Fourthly Linux software is packed with huge usability features as compared to other operating software such as Windows. Finally the best part of this software is that it is an open source of software material. This means that in addition to getting the software free of charge, you will also be able to have an opportunity to modify the source code to suit you desires by adding more features or removing undesired ones. Linux provides so many software choices for your specific tasks. These are feature that no other operating system can offer as far your computer application and usage is concerned. Linux should therefore be......

Words: 276 - Pages: 2


...Red Hat Enterprise Linux 5.3 Release Manifest Package Manifest for all Architectures. Red Hat Enterprise Linux Documentation Don Domingo Copyright © 2008 . This material may only be distributed subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version of the OPL is presently available at Red Hat and the Red Hat "Shadow Man" logo are registered trademarks of Red Hat, Inc. in the United States and other countries. All other trademarks referenced herein are the property of their respective owners. 1801 Varsity Drive Raleigh, NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park, NC 27709 USA Abstract This document is a record of all package changes since the last minor update of Red Hat Enterprise Linux 5 1. Added Packages ................................................................................................................... 1 2. Dropped Packages .............................................................................................................. 19 3. Updated Packages ............................................................................................................... 20 1. Added Packages cmirror-1.1.36-1.el5 • Group: System Environment/Base • Summary: cmirror - The Cluster Mirror Package • Description: cmirror - Cluster Mirroring 1 Release Manifest cmirror-kmod-0.1.21-10.el5 • Group...

Words: 32183 - Pages: 129


...Chapter 5 1. Which command can you use to determine who is logged in on a specific terminal? The who, finger, and w commands. 3. What happens when you give the following commands if the file named done already exist? The cp to_do done, copies files and directories and the mv to_do done moves (renames) the file which is the same as overwriting the file. Chapter 6 1. Is each of the following an absolute pathname, a relative pathname, or a simple filename? a. milk_co, simple filename b. correspond/business/milk_co, relative pathname c. /home/max, absolute pathname d. /home/max/literature/promo, absolute pathname e. .., relative pathname f. letter.0210, simple filename 2. List the commands that you can use to perform these operations. a. Make your home directory the working directory. cd b. Identify the working directory. Pwd 3. If the working directory is /home/max with a subdirectory named literature, give three set of commands used to create a subdirectory named classics under literature. Also give several sets of commands that you can use to remove the classics directory and its contents. a. To create a sub directory use mkdir /home/max/literature/classics, mkdir ~max/literature/classics, or mkdir ~/literature/classics b. To remove the directory and contents rmdir /home/max/literature/classics, rmdir ~max/literature/classics, rmdir ~/literature/classics, rm -r /home/max/literature/classics 4. The df utility displays all mounted filesystems......

Words: 344 - Pages: 2


...1) Describe some reasons why Linux is installed on only a very small fraction of desktop computers. Are there particular categories of products or users who might see Linux as more appealing than conventional operating systems? Do you think Linux's share of the desktop market will increase? Why or why not? Linux is used proportionally due to the fact that we live in a Windows world. All of the name brand software applications like Office, Peachtree and QuickBooks are Windows based. I couldn’t imagine playing Call of Duty on Linux. Not saying it couldn’t happen. Without being said there is a huge demand to make Windows applications. The overall installation process for Linux is different. I won’t say difficult but different. Linux overall doesn’t have the virus issues that Windows tends to obtain. I know there are a ton of LIVE CD’s out there that is used for forensics, firewalls, backup and recovery. I have used a few of them in the past to recover partitions on hard drives unattainable by windows. I see windows becoming more and more of an online service in the future. If Microsoft goes this route, I can see users adapting to Linux just to avoid a big brother conspiracy. One thing that could also increase the usage of Linux might be those entities that are trying to implement technology with a tight budget. 2) What are some of the benefits of cloud computing? What are some of the drawbacks? Find an article about cloud computing online. Summarize and critique the...

Words: 663 - Pages: 3


...Carlos Moises Pelaez | IT250 | Linux Operating System: Assignment 1.1 | 3/30/2013 | 1) In the free software world, there are several uses of the word "free." The two main ones are "free as in speech" and "free as in beer." Free as in speech means you are relatively unfettered in what you can do with the software. You can modify it, use it for whatever you want, and give it to others (or even sell it). Free as in beer means that you can obtain it for no monetary cost. Richard Stallman originally envisioned GNU to be free as in speech. At the time he started the project (in 1983), internet access was slow and expensive, high-capacity storage devices weren't readily available, and very few people had a personal computer. It would have been infeasible to offer GNU on a gratis basis. Stallman actually used to charge $150 for a tape with the GNU software on it, plus $15 for a manual. 2) The GNU project develops programs and utilities for an as yet rudimentary operating system known as "GNU." Since the programs are open-source, they have been adapted to work using the Linux kernel as well. Other than using its programs, there is no direct relationship. 3) Advantage #1 – Stability: If you have used other operating systems, once you have made the switch to Linux, you will notice that Linux has an edge over Windows here. I can remember rebooting Windows many times over the years, because an application crashed, and I could not continue working. Linux can crash also...

Words: 1208 - Pages: 5


...In 1991, a Finnish student, Linus Torvalds, created a free terminal emulator, based in UNIX, that would eventually take the form of an operating system kernel, Linux version 0.01. Linux evolved into a fully functioning Operating System (OS) with one of its first distributions created by the Manchester Computing Center, MCC Interim Linux, using a combined boot/root disk (Hayward, 2012). Linux luminaries, Slackware, RedHat and Debian began to rise between 1992 and 1994 as well as the Linux kernel growing to version 0.95, becoming the first kernel to run the X Windows System. The Big Three, Slackware, Debian and Red Hat were instrumental in the anticipated launching of Linux version 1.0.0 in 1994 with 176,250 lines of code. Over the next five years the big three released some of the greatest Linux distributions, including the Jurix Linux, which is allegedly the first distribution to include a scriptable installer; the installer allows an administrator install across similar machines. The Juris Linux distribution is mostly noted in Linux history because it was used as a base system for SUSE Linux which is still in operation today (Hayward, 2012). Launched in 1996, Linux 2.0 had 41 releases in the series; inclusion of critical operating system features and rapid releases helped to make the Linux operating system the OS of choice for IT professionals. Another notable moment in Linux history was the release of Version 2.4 which contained support for USB, PC Cards, ISA Plug and...

Words: 745 - Pages: 3


...Ever since the creation of the Linux kernel by Linus Torvalds in 1991, many versions of Linux have been created. Due to the open source of the kernel, this gives advanced users the option to alter the kernel to their liking. This, in turn, has yielded a near endless amount of distributions and versions available out there. In my research, I have found the main versions of Linux have derived from Debian Linux, Slackware Linux, or RedHat Linux. However, the first distribution meant for the masses was Yggdrasil Linux (Citation). First, there were versions such as MCC Interim Linux developed by University of Manchester and TAMU developed by Texas A&M, however these were in-house developments not really meant to be widely distributed. Yggdrasil, one of the first widely distributed version of Linux, was described as a Plug and play Linux. Its’ initial release took place in December of 1992, but in the form of an alpha release. The beta version was released in 1993, and the official release the next year in 1994. It was the first Linux operating system distributed via a live CD-ROM. It included an automatic configuration of the software installation, much like we see today, making it very easy for even a novice user to set it up. Yggdrasil was not free, however, the company charged $39.95 per copy (Yggdrasil Computing). After conducting research of the number of distribution of Linux, the exact number could not be pinpointed. There are so many developers tweaking the Linux...

Words: 1003 - Pages: 5


...Unit 2 Discussion 1: Identifying Layers of Access Control in Linux One of the most vital security tasks is to maintain control over incoming network connections. As system administrator, there are many layers of control over these connections. At the lowest level unplug network cables, but this is rarely necessary unless your computer has been badly cracked beyond all trust. More realistically, you have the following levels of control in software, from general to service-specific: Network interface - The interface can be brought entirely down and up. Firewall - By setting firewall rules in the Linux kernel, you control the handling of incoming (and outgoing and forwarded) packets. This topic is covered in Chapter 2. A superdaemon or Internet services daemon- A superdaemon controls the invocation of specific network services. Suppose the system receives an incoming request for a Telnet connection. The superdaemon could accept or reject it based on the source address, the time of day, the count of other Telnet connections open... or it could simply forbid all Telnet access. Superdaemons typically have a set of configuration files for controlling your many services conveniently in one place. Individual network services - Any network service, such as sshd or ftpd, may have built-in access control facilities of its own. For example, sshd has its AllowUsers configuration keyword, ftpd has /etc/ftpaccess, and various services require user authentication. ......

Words: 324 - Pages: 2


... Using gnome-tweak-tool (Fedora) 94 Introduction to the Desktop 95 Launching Programs from the Desktop 96 Switching Workspaces 98 Setting Personal Preferences 99 Mouse Preferences 101 Working with Windows 102 Using Nautilus to Work with Files 102 Updating Software 109 Session Management 110 Getting Help 111 Feel Free to Experiment 111 Logging Out 111 Getting the Most Out of the Desktop 112 GNOME Desktop Terminology 112 Opening Files 113 Panels 113 The Main Menu 114 Windows 115 The Object Context Menu 119 xviii Contents Updating, Installing, and Removing Software Packages 122 Updates 123 Add/Remove Software 124 Where to Find Documentation 125 GNOME Desktop Help Window 125 man: Displays the System Manual 126 apropos: Searches for a Keyword 127 info: Displays Information About Utilities 128 The ––help Option 131 HOWTOs: Finding Out How Things Work 131 Getting Help 132 More About Logging In 134 The Login Screen 134 What to Do if You Cannot Log In 135 Logging In Remotely: Terminal Emulators, ssh, and Dial-Up Connections 135 Logging In from a Terminal (Emulator) 136 Changing Your Password 137 Using Virtual Consoles 138 Working from the Command Line 139 Correcting Mistakes 139 Repeating/Editing Command Lines 141 Chapter Summary 142 Exercises 143 Advanced Exercises 144 Chapter 5: The Linux Utilities 145 Special Characters 146 Basic Utilities 147 ls: Lists the Names of Files 148 cat: Displays a Text File 148 rm: Deletes a File 148 less Is more...

Words: 315186 - Pages: 1261


...In the world, the most widely used operating system is Windows. In my 3 years in Mercy College I observed that all computers in the school or most personal Laptops of the students is running on version of Windows. But is Windows really the most efficient operating system? The majority of common users will have to agree, but a select few believe otherwise. Many programmers and computer enthusiasts believe Linux to be a far more efficient and usable system because of its flexibility and efficient code. Even so, among the common users, Linux is probably the least known and most underused computer system in the world. The objective of this paper is to determine which system truly is better for users both common and adept. This research compares both operating systems with each other as to determine which is more customizable, easier use, and faster to run. To provide an objective and thorough comparison, this paper looks at key features present in each operating system. After assessing each system, it can be concluded that, although Windows is definitely more widely used than Linux, Linux is the better operating system because of its usability, open source code, and efficient language. However, before analyzing the necessary components, ample background for each operating system must first be provided. The main objective of Windows was " provide a personal computing environment for the common user," (Alampay) the common user being people who don't have in-depth...

Words: 3215 - Pages: 13


...CSCI 1483 Intro to UNIX/Linux Ch 1-5 Slide Objectives for Midterm exam prep Ch 1 Objectives * Define OSs, including PC and server OSs * Describe the UNIX and Linux operating systems * Explain the purpose of UNIX/Linux shells * Discuss how to select user names and passwords * Connect to UNIX/Linux using Telnet or SSH * Use basic *nix commands & editing features * Explain the role of a system administrator * Change your password for security * Use multiple commands to view the contents of files * Redirect output to a file Ch 2 Objectives * Discuss UNIX/Linux FSs and list several examples * State the standard tree structure * Define partition and list 3 recommended ones for *nix * What are inodes, and what is stored in them? * Describe contents of: /boot, /bin, /dev, /home, /lib, /mnt, /media, /proc, /root, /sbin, /tmp, /usr, and /var * State purpose of the mount and umount commands * State the path (pathnames) to any file, and prompts * List commands to do the following: * Navigate the FS, create and remove directories, copy and delete files, configure file permissions Ch 3 Objectives * Compare ASCII, binary, and executable files * Understand the types of editors * Tell how to enter the 3 modes of the vi editor * Be able to create and edit files using the vi editor * Be able to create and edit files using the Emacs editor * Nothing to submit for these last 2...

Words: 397 - Pages: 2


...Optional *nix OS Extra Credit Project Introduction You can earn up to 10 optional extra credit points each Part that you submit in this project, but you have to begin the first week. You can always drop out later if you don’t have time…it’s optional! The project will help you select and install a Linux OS on an old computer. It will be easy XC points for those who have already done so, and a great learning experience for everyone. Part 1—Find an old computer you can install Linux on, and determine its hardware Note: If you do not do Part 1, you are not eligible to do any of the following parts! A. Old computers which are too slow for Windows often make great *nix boxes. B. Find one in your garage, from a neighbor or family member, or at a garage sale. C. You will need system unit, keyboard, mouse, monitor & [optional—network card] D. If it used to run Windows, it should be fine E. Determine what hardware it has, including a. CPU speed, # of cores, etc. b. Memory c. Hard drive space and interface (SATA, PATA, SCSI) d. Network card—ethernet? 100Mbps? Gbps? F. If you have trouble determining what hardware you have, hit the discussion board. G. Submit brand & specs in the link under the weekly Content folder for credit Part 2—Select a Linux, UNIX, or BSD OS and verify that your hardware will support it A. This is strictly research. Find a *nix flavor with which you are unfamiliar! B...

Words: 478 - Pages: 2


...#!/usr/bin/env bash # (As the name implies) Based on the visual style of vim-powerline. # Original prompt based on falconindy's, but that's been mostly replaced. # Generates a prompt that looks roughly like # >>> ~/path/to/src # Where the first > (blue) represents a local tty, the second > (green) # represents a non-su'd non-root tty, while the third > (magenta) # represents a git repo, branch "master", untouched. # These > expand and change color as desrcribed by the conditionals below. # The xterm/rxvt window title is set as if it were a colorless console. prompt_powerline() { local _none="\[\e[0m\]" local _k="\[\e[0;30;40m\]" _r="\[\e[0;31;40m\]" _g="\[\e[0;32;40m\]" _y="\[\e[0;33;40m\]" \ _b="\[\e[0;34;40m\]" _m="\[\e[0;35;40m\]" _c="\[\e[0;36;40m\]" _w="\[\e[0;37;40m\]" # Switches the fancy powerline symbols for simple > and a flat cap for the console if [[ $TERM == 'linux' ]]; then _div='>' _cap=""; else _div='⮁' _cap="\[\e[0;30m\]⮀" fi # Switches the default blue ">" for a yellow " hostname >" if remote if [[ $SSH_TTY ]]; then local _host="$_y \h $_div" _title_host="\h>"; else local _host="$_b$_div" _title_host=">"; fi # Replaces the default green ">" for a green " username >" if other non-root or # a red " root >" if root if (( UID == 1000 )); then # I can generalize this later ... local _user="$_g$_div" _title_user=">" elif (( UID == 0 )); then...

Words: 533 - Pages: 3