Free Essay

Linux Cis126Dl

In: Social Issues

Submitted By brbai
Words 749
Pages 3
Lab 3 Chapter 4 Exercises

Name: Brandon Bailey

1. The system displays the following message when you attempt to log in with an incorrect username or an incorrect password:

Login incorrect

a. This message does not indicate whether your username, your password, or both are invalid. Why does it not reveal this information?
It does not differentiate between an incorrect username or password. It prevents guessing.
b. Why does the system wait for a couple of seconds to respond after you supply an incorrect username or password?
It’s so users can’t run a script and put in about 100,000 guesses a second.
2. Give three examples of poor password choices. What is wrong with each?
Jump1 (less then 6 characters) jump12(no capital letters) jump(All lowercase letters,missing numbers and under 6 characters.
3. Is fido an acceptable password? Give several reasons why or why not.
No capital letters, under 6 characters, no numbers.
4. What is a context menu? How does a context menu differ from other menus? Context menues have options that apply to a speccifc window or selected object.
5. What appears when you right-click the root window? How can you use this object?
It brings up window options. You can resize it, move it or keep it as the top window.
6. How would you swap the effects of the right and left buttons on a mouse?
What is the drag-and-drop threshold? How would you change it?
Go to the mouse prefference window and change it from right to left handed. It’s how far you must drag the object so the system knows it has dragged something.
7. What are the primary functions of the Main menu?
To show options at login.
8. Describe three ways to
a. Change the size of a window.
You can hit the resize box in the top right corner, you can grab the bottom left corner of the window and drag it, you can grab the top of the window and press against the top of the screen and let go.
b. Delete a window.
Press the X button in the top right corner, Typing xkill in the command prompt and then click the window you want to close. Alt + F4

9. What are the functions of a Window Operations menu? How do you display this menu?
Close, minimize, maximize, resize move.
10. What is a panel? Name a few objects on the panels and explain what you can use them for. What do the Workspace Switcher applet and the
Window List applet do?
What are the functions of a Window Operations menu? How do you display this menu?
A panel is a bar that appears on the desktop and holds objects.
Each rectangle in the Workplace Switcher applet, the group of rectangles near the right end of the Bottom panel, represents a workspace. When you click a rectangle, the Switcher displays the corresponding workspace and highlights the rectangle to indicate which workspace GNOME is displaying.
One Window List applet appears on the Bottom panel for each window that is open on or iconified from the displayed workspace. Left-clicking this object minimizes or restores its window. A right-click displays the
Window Operations menu. If a window is buried under other windows, click its Window List applet to make it visible
11. What are tooltips? How are they useful?

Hands-on Exercises: To prepare for this lab you must have installed the KDE desktop during installation or you can add it now. NOTE: Your screen shots may not look exactly like these because of Fedora version differences.

1. First you need to install the Guest Additions for Virtual Box or VMWare:

2. Now let’s install the KDE desktop. I assume you did not install it during initial installation so we will use yum (yellowdog update manager) to go on the Internet and download the files for KDE and install them. Use the following commands, as root, from a terminal window prompt: yum install @kde-desktop Now log out, and when you log back in you should see the option on the log on screen to log onto the computer with the KDE desktop. Screen print the desktop, it should have a start menu with this icon:

3. Do a screen print of your screen that looks like the KDE Help Center screen. Having trouble getting in. When I try to login it shows it booting then goes to a blue screen. [pic]

Similar Documents

Free Essay

Case Project

...Project Student College Case Project Linux as an operating system is a powerful tool used in businesses for its secure kernel and command line interface. From a small business to a large enterprise, Linux is used to run servers, store vital information and documents. In Outdoor Adventures, this store needs a more efficient computing system. The system will need to keep information available and secure enough to ensure that the information can only be seen by the right people. To help keep things organized, a file structure will also be required to keep all the files with special permissions together for easy access. To better illustrate the security capabilities of Linux Ed Sawicki of Biznix.org said, “The Linux firewall has functionality that rivals expensive commercial firewalls. Its rules allow fine grained control over stateless and stateful packet filtering. The Linux firewall is extensible, allowing new filtering capabilities as the need arises.” This comparison is powerful when considering what would be the most cost effective direction for a business, but also the safest. Another advantage of linux is that it is generally free to try before applying it to a commercial setting. The product can in effect speak for its self by allowing itself to be made publicly available so there is no need to consider it a “business risk” when a technician can experiment with it first before applying it on a much grander scale. “Linux…is a freely available multitasking and multiuser...

Words: 1333 - Pages: 6

Free Essay

Virtual Desktop Infrastructure

...Assignment 3: Evaluate Virtual Work Software Virtual Desktop Infrastructure Jeanette Johnson Lawrence Technological University MIS 7463 – Virtual Work Environments – Spring 2013 Dr. Anne Kohnke, Assistant Professor of IT, College of Management April 13, 2013 Contents Product Description and Application 3 Major Issues 4 Why the Need for VDI? 4 Is VDI for Everyone? 5 Successful Application of VDI 5 What Exactly Does VDI Offer Organizations? 5 Oracle Virtual Desktop Infrastructure Specifications….at a Glance 7 Reviews 8 What Oral Roberts University has to say about VDI 8 Scripps Networks’ Review of VDI 10 What Small Business Computing Reviewer, Joe Moran, Thinks of VDI 10 Summary and Interpretation of Reviews 11 Implementation 12 VDI Project Plan: Start with Using the Proper Apps and Utilize Pilot Program 13 VDI Licensing: Be Wary about Going for the $40 (or less) per Desktop Guarantee 13 Ensure you Tackle VDI Storage Challenge with Network-Attached Storage (NAS) System and Data Deduplication 14 Factors to Consider When Considering Whether or Not to Implement VDI 15 Conclusion 16 VDI offers Better Support 16 VDI Helps Strengthen Security 16 The BYOD Crowd will Be Happier with VDI 17 Product Description and Application Virtual Desktop Infrastructure (VDI) is simply the practice of hosting desktop operating systems (OS) in a virtual...

Words: 4825 - Pages: 20

Premium Essay

Operating Systems

...software applications can operate accordingly. Operating systems can be found in almost any type of a computer device such as personal computers, supercomputers, cellular telephones, and video game consoles as stated by Linux Systems (2011). As the research was being conducted for this paper, it raised a question whether the internet uses the operating system? It proved to be a challenge to actually pin point the most common operating systems on the Internet, but as the research continued, it was obvious that these three, Windows, Mac OS X, and Linux are considered to be the most common operating systems used on the Internet today. Background of each Operating System Windows Privately owned operating systems, Microsoft Windows is generally used on personal computers and as of today, the most commonly used version is Windows XP with the new version of Windows 7 for personal computers and Windows Server 2008 R2 for servers is entering the market. Mac OS X Mac OS X is a graphical operating system which is designed and distributed by Apple Incorporated is considered to be partially privately owned. Its latest version of software is pre-loaded on all of the Macintosh Computers and is also a UNIX operating system that uses advanced technology. Linux Is an operating system that can be used on a variety of devices such as personal computers, supercomputers, and some hand...

Words: 1150 - Pages: 5

Free Essay

Random Walk Shoes

...disk storage, 6.5G RAM and Intel or AMD company’s Dual-core CPU. However, today most companies sell at least 500GB disk storage on market. For example, Dell sell T320 tower server series is good choice. 2. Most Web server software runs on Microsoft Windows Server products, Linux, or other UNIX-based operating systems such as FreeBSD. They have both advantages and disadvantages. ----- | advantages | disadvantages | Microsoft | Simpler for their information systems staff to learn and use than UNIX-based systems. | Security weaknesses | Linux | An open-source operating system, Fast, efficient, easy to install. Downloaded free from web, user-friendly like Microsoft, Secure and stable | Compatibility | UNIX | Secure and stable operating system | user-friendly is not good, need type the command code, | I will recommend Amy choose Linux because it is an open-source operating system. Linux can be downloaded free from the Web. For some small and medium-sized companies, they don’t need to buy window. Linux system security is very high, unlike Windows system often update and close loophole. Especially, LAMP is very popular combination for Web server computer construction today. That means Linux + Apache + MySql + PhP. 3. The two commonly used Web server programs is Apache Http Server and Microsoft Internet Information Server (IIS). The NetCraft Web server surveys show that...

Words: 462 - Pages: 2

Premium Essay

Cis 210 Term Paper

...Benjamin Porter 12/13/13 Benjamin Porter 12/13/13 Abstract Developing and designing an effective in house e-commerce website for Tony’s Chips. Abstract Developing and designing an effective in house e-commerce website for Tony’s Chips. Website MIGRATION PROJECT [Document subtitle] Website MIGRATION PROJECT [Document subtitle] Introduction Tony’s Chips has been acquired by a new independent company. The new company’s intention is to focus on the e-commerce website that they have planned. Currently, the old website is externally hosted and it is required to be moved to an internal one. This new system will store, retrieve, and have data recovery solutions for the company. An additional backup site will need to be created as a failover if the main site goes down. The new and improved site will need to allow customers access to order products online. Project Goal This project has an overall goal of producing a system and website that is in accordance to the demands of Tony’s Chips. The systems architecture will involve all of the systems requirements in its design. The architecture will make use of programs that perform efficiently and properly. Application compatibility is also key to for all of the system components that are going to be used in the system. The project is also aimed at creating a reliable backup and recovery solution for the system. Available system component alternatives The requirements for the system is one that has a system architecture...

Words: 2669 - Pages: 11

Free Essay

Assignment 1

...Accessing the Oracle Server Adewale Sonubi Professor Brian Smith CIS 111: Introduction to Database Management System October 13, 2013 Through this assignment, I was able to experience logging into the Strayer University Oracle Server. The process started a little rough for me because I did not have the necessary credentials, but once I received them from I was able to log in. the screen I attained at the end of the exercise is shown below: I googled putty on the google search engine and found www.putty.org; I was able to save the download on my desktop for future use. One I opened it, I entered “unix-online.strayer.edu” in the host section using port 22. I also entered “Student UNIX Server” I the saved session and saved it also for future use. After entering both required information, I clicked “OPEN” and the command screen opened. I was prompted for a login and password of which I entered the information provided to me by the professor and I was able to log into the UNIX server. I also typed in the oracle command provided to me and I was able to log into the oracle server. I made sure I tried the process more than once to ensure I properly understand the process. After finishing the exercise, I searched for the snipping tool on my desktop, and was able to take a snapshot of the screen and save to my desktop. I then copied and pasted the screen into this document to show that the assignment was done and that my credentials...

Words: 276 - Pages: 2

Free Essay

Capstone Final Documentation

...CNS Capstone A COMPREHENSIVE NETWORK DEVELOPMENT PROJECT SUBMITTED TO THE IT / COMPUTER NETWORKS SYSTEMS PROGRAM IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE ASSOCIATE DEGREE By Instructor – Roman Danyew Table of Contents Introduction to Cornerstone Communications………………………….................. 3 STAR MEDICAL’s Proposal Overview ……………………………….................. 4 Executive Summary………………………………………………………………... 6 Assumptions and Constraints………………………………………………………. 7 Deliverables………………………………………………………………………... 8 Project Details Implementation and Timeline……………………………………………… 9 Network Topology........................................................................................ 11 IP Schema…………………………………………………………………. 16 Security…………………………………………………………………….. 17 Active Directory Structure…………………………………………………………. 18 Active Directory and Exchange……………………………………………………..19 Website hosting and developing…………………………………………………… 20 Maintenance and Training Plan …………………………………………………….22 Risk Analysis………………………………………………………………………. 23 Backup Plan…………………………………………………………………………24 Cost Analysis………………………………………………………………………. 25 Appendix…………………………………………………………………………… 26 Appendix A: Cost Analysis…………………………………………………27 Appendix B: Hardware…………………………………………………….. 29 Introduction to Cornerstone Cornerstone Communications has been providing networking and data communications...

Words: 7795 - Pages: 32

Free Essay

A Small Clothing Store

...Network Security Fundamentals CIS 333 Showcase: Security Deployment of a small network infrastructure for DRE Inc. Submitted By Rene Dell Submitted To Dr. Lawrence Joseph March, 2012 Table of Content Abstract ……………………………………………………………………….I Introduction……………………………………………………………..……..II The Problem Statement………………………………………………….……..III The Proposed Solution………………………………………………………….IV The Methodology………………………………………………………………..V The Result……………………………………………………………………….VI The Conclusion………………………………………………………………….VII References……………………………………………………………………….VIII Abstract DRE Inc is a company that produces wrist watches for men and women. The company started in 1999 with just about 10 member staffs in Takoma, Maryland. Now more than 12 years later, DRE has grown to a company of over 500 employees, and has departments in Washington DC, Virginia, Maryland and the head quarters in New York City. This growth has allowed for an increased problem in the network infrastructure and management for the company. Introduction: DRE Inc has four major departments, sales in Maryland, Manufacturing in Washington Dc, Warehouse in Virginia, and the Accounting Department in New York City. The proposed network will have four routers, to serve each location. The Proposed Solution Figure 1a DRE Inc Organizational Chart The Proposed solution will include the following: 5 Cisco routers 1 Cisco PIX 500 Firewall 4 Cisco switches Mail Server, Print Server, database...

Words: 855 - Pages: 4

Free Essay

Miss

...Contribute • Submit an Article • Submit a Poll Current Poll What is your /etc/mtab? a regular file a link to /proc/mounts something else... ( 620 votes ~ 5 comments ) Recent Weblogs TCP weirdness, IMAP, wireshark, and perdition by dkg 6 comments mod-fcgi terminated by calling exit() by simonw Brief updates and some advice by kumanna Linux/Ubuntu on an Asus UL30A (QX130V) by mnaumann 1 comment Installing Debian onto an Asus A6Q00KM by ajt 1 comment Ingo Steinke by fraktalisman Popularity vs. stagnation by Steve 11 comments Lenny guest and Hyper-V by e5z8652 Burst of GET / requests on Apache2 by k2 3 comments Munin 1.4.0 alpha released by stab More Weblogs • Archived Weblogs Debian Administration System Administration Tips and Resources [ About | Adverts | Archive | FAQ | Hall of Fame | Search | Tag Cloud | Securely erasing files, by filling your disk Posted by Steve on Sat 2 Jan 2010 at 14:34 Tags: filesystems, secure-delete, security, utilities With modern filesystems securely deleting files isn't always easy, but one approach which stands a good chance of working is to write random patterns over all unused areas of a disk - thus erasing the contents of files you've previously deleted. ( Read 293 more words ~ 11 comments posted ) Creating Bind DNS-Entries with regular dyndns-clients in routers Posted by stefanbauer on Thu 31 Dec 2009 at 10:46 Tags: bind, dynamic dns, perl Recently there was a message posted upon the debian-user-german...

Words: 987 - Pages: 4

Premium Essay

Linux Operating System

...Joseph Silva 4/1/12 Linux Operating System Assignment 2 1. KDE and GNOME 2. Panel- Panels are bars that appear on the desktop and hole (panel) objects. They are part of the desktop, so they remain consistent across workspaces. Menu Bar- The menu bar appears at the top of the File Browser window and displays a menu when you click one of it selections. Applet- an applet is a small program that displays its user interface on or adjacent to the panel. You interact with the applet panel object. The clock and workspace switcher are applets. Notification Area- the notification area is a portion of the taskbar that provides temporary source for notifications and status. It can also be used to display icons for system and program features that have no presence on the desktop. Shading- its shrinks the window so only the title is visible. Location Bar- below the main tool is the location bar, which displays the name of the directory that appears in the view pane. Nautilus- displays emblems in both its icon and list views, although there may not be room for more than one emblem in the list view. Nautilus grays out items you are not allowed to change. Workspace- workspaces divide the desktop into one or more areas, with one such area filling the screen at any given time. Initially there are two workspaces. All workplaces display the same panels and objects. Workspace Switcher- the number of workspaces the switcher displays changes as you changes the number in...

Words: 350 - Pages: 2

Premium Essay

Exploring Linux Operating Systems

...Exploring Linux Operating Systems What is Linux? Linux is an Operating System for a computer; it is like other Operating Systems such as Windows and the OS X for MAC. Linux was created in 1991 and has been found on many different systems like Super Computers, cell phones, and even the New York stock exchange. What sets Linux apart from other Operating Systems is that Linux is made by several different companies. According to www.linux.com over 3,200 developers have from 200 companies have contributed to the kernel which is just a small piece of the distribution. How is Linux used today? While other Operating Systems are very limited to personal computing devices, Linux is not limited it can be found on many different things. Linux had its start as a server Operating System but is also one of the only Operating System that can be found on more than just a personal computer. Some of the different things it can be found on taken from www.linux.com “These are just the most recent examples of Linux-based devices available to consumers worldwide. This actual number of items that use Linux numbers in the thousands.” www.linux.com File Editors Coming from a Windows Operating System pretty much my whole life, which means I only have experience with GUI editors such as Notepad from Windows. After working with Linux and its file editors this past week I found it much faster and easier than using the notepad system in Windows. There are two different kinds of editors...

Words: 1308 - Pages: 6

Free Essay

Unit 2 Discussion

...Unit 2 Discussion 1: Identifying Layers of Access Control in Linux Learning Objectives and Outcomes * You will be able to identify various layers of access control in a Linux server environment. * You will make security recommendations using different layers of access control. Assignment Requirements Really Cheap Used Computers, Inc. is an online seller of old school computers. The organization’s e-commerce Web site runs on a Linux server. The server is located at the organization’s local office in Boston, Massachusetts. The company has experienced tremendous growth and has hired you as the new security analyst. You access the server and find that there are virtually no layers of security other than the passwords set for user accounts. Discuss at least three layers of access control that can be put in place on this server to create a more secure environment. Rationalize whether the given scenario represents discretionary access control (DAC) or mandatory access control (MAC). Participate in this discussion by engaging in a meaningful debate regarding your choices of the three layers of access control in Linux. You must defend your choices with a valid rationale. Summarize your thoughts in a Word document and submit it to your instructor. Required Resources None Submission Requirements * Format: Microsoft Word * Font: Arial, Size 12, Double-Space * Citation Style: Chicago Manual of Style * Length: 1–2 pages * Due By:Unit 2 Assessment Checklist ...

Words: 568 - Pages: 3

Premium Essay

Unit 6 Discussion

...Unit 6 Discussion 1: Determining Firewall Rules Learning Objectives and Outcomes <!--[if !supportLists]--> <!--[endif]-->You will be able to explore design and firewall rules for a bastion host. <!--[if !supportLists]--> <!--[endif]-->You will examine how a bastion host allows administrators to access Samba and Secure Shell (SSH) for remotely managing a server. Assignment Requirements As the Linux system administrator of insurance company Secure All, Inc., you need to design firewall rules for the organization’s bastion host file server, which uses Samba. This server is located in the local area network (LAN) with the network address 172.16.0.0/12 and subnet 255.240.0.0. The server should also allow Web application access for its online transaction platform to mount the filesystem. The Web application resides on the Web server located in the demilitarized zone (DMZ). This server has two interface cards. One card, which is for the traffic from the DMZ firewall, is linked to the wide area network (WAN). This card’s IP address is 192.168.1.5. The other interface card has the IP address 172.16.1.5 and is linked to the LAN. Which firewall rules should be written using iptables for the server hosting Samba? Discuss and suggest firewall rules to allow administrators to remotely manage the server using SSH. Use the concept of “default deny” when designing the rules. Participate in this discussion by engaging in a meaningful debate...

Words: 922 - Pages: 4

Free Essay

Css 200 Ip2-Lab

...CSS200-1401B-01 Principals of Network Security Instructor: Gregory Roby Phase 2, Individual Project Date: March 08, 2014 By: Gil Palacio Lab #3 Overview: In this Lab I am learning how to use the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application. This application is an open source tool that automates network exploration to perform several different types of security audit scans of large IP networks (LAB 3, CTU. 2014). SO here is what I gather while doing this Lab: I added several IPs to putty in order to build information or to give information to the GUI that I am looking into. I copy pasted the two interfaces that are up,up in the 1st question from the Lab Assessment sheet of the putty profile created: Interface Ethernet0/0 "", is up, line protocol is up Hardware is 88E6095, BW 100 Mbps Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps) Available but not configured via nameif MAC address c84c.7556.de9e, MTU not set IP address unassigned 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 L2 decode drops 0 switch ingress policy drops 0 packets output, 0 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets 0 babbles, 0 late collisions, 0 deferred 0 lost carrier, 0 no carrier 0 rate limit drops ...

Words: 1306 - Pages: 6

Free Essay

Nt1430 Unit 5 Homework

...Chap 18 Pg 699 Q1 difference between scp and sftp utilities? SCP is a secure file copy utility and SFTP is a secure file transfer protocol even though it does not have anything to do with the FTP we are use to in windows. Q2 How can you use SSH to find out who is logged in on a remote system? By typing $ ssh host who in the terminal window Q3 How would you use scp to copy ~/.bashrc file from the system named plum to the local system? From the local system you would type scp user@plum:~/..bashrc local system: .bashrc. Q4 How would you use scp to run xterm on plum and show the display on the local system? Having the same username on both systems and the X11 server running locally, the command to run xterm from the plum system and show on the local display is $ ssh plum xterm Q5 What problem can enabling compression present when you are using ssh to run remote X applications on a local display? Compression can cause an increase in latency to an extent the might not be desirable for an X session forwarded over high-band width connections. Q6 When you try to connect to another system using an OpenSSH client and you see a message warning you that the remote host identification has changed, what has happened? What should you do? This indicates that the fingerprint of the remote system is not the same as the local system remembers it. Check to find out if something changed. If everything is ok, get rid of the remote system’s key from the file located in the error message and...

Words: 584 - Pages: 3