Free Essay

My Homework(Linux & Unix)

In: Computers and Technology

Submitted By YangUn
Words 815
Pages 4
1. 사무실에서 상사가 금요일 10:30 회의에 참석하라고 급하게 지시했는데, 이 일정을 메모할 펜을 찾을 수가 없다. 어떤 Linux 명령을 써서 Meeting이라는 파일에 이 메모를 저장할 수 있는가?
답 : B. cat > Meeting (cat이라는 명령어로 미팅이란 파일에 내가 입력한 내용을 저장)

2. 앞의 문제 1에서 메모하기 전에 금요일의 날짜를 메모에 포함시키기로 하였다. 어떤 Linux명령으로 금요일의 날짜를 알 수 있을까?
답 : A. cal (달력을 출력하는 명령어)

3. 명령을 타이핑하는 중에 명령과 함께 표시해야 할 파일 이름을 잘못 쳤다. 다음 중 어느 명령줄 키 조합(command-line key combination)이 되돌려서 오류를 정정할 수 있나?
답 : A. Ctrl+b (이전문자로 이동하는 명령줄 키 조합)
(Alt+End, Ctrl+2, Shift+Alt+m 해당하는 조합은 책 어디에도 없었습니다.)

4. 지난 몇 달 동안 당신은 패스워드를 변경하지 않았고, 이제 새 패스워드로 바꾸려고 한다. 다음 명령 중 어느 것을 써야하나?
답 : D. passwd (패스워드를 새로지정하는 명령어)

5. cat명령에서 -n 옵션이 무엇에 쓰는 것인지 생각나지 않는다. 다음 중 어느 것을 써야 cat의 -n 옵션의 목적을 알아낼 수 있나?
답 : C. man cat (‘man 명령어‘는 해당 명령어의 매뉴얼을 볼수잇는 명령어)

6. 다음 중 어느 것이 AT&T Bell 연구소가 원래 개발한 UNIX 배포판인가?
답 : D. System V

7. Linux에서 쓰이는 기본 명령해석기(command interpreter)는 어느 shell인가?
답 : A. Bash shell
(본문에 리눅스는 기본명령해석기로 bash shell를 사용한다고 나와있습니다.)

8. Annual_Report라는 파일의 끝에 텍스트 한 줄을 추가하려한다. 다음 명령 중 텍스트 한 줄을 추가할 수 있는 명령은 어느 것인가?
답 : C. cat >> Annual_Report (cat >> 파일이름 : 해당파일에 내용추가)

9. SSH는 (하는데) 쓰일 수 있다.
답 : B. 네트워크 상의 다른 컴퓨터에 로긴(log-in)

10. 오늘은 Linux서버관리자로서 첫날이어서 상사가 root 패스워드를 알려줬다. root가 무엇인가?
답 : D. UNIX/Linux 시스템에 완전한 접근을 할 수 있는 관리자 계정

11. project라 부르는 문서 파일에서 파일의 생성 날짜와 마지막으로 갱신된 날짜를 파일의 마지막 두 줄에 기록했다. 어느 명령이 project 파일의 마지막 두 줄을 보여줄까?
답 : c. tail -n 2 project
(답은 이것이 맞으나 실제 실행시 저 문구대로 실행한다면 오류가 뜨면서 사용법을 보여준다. 그러므로 정확한 답은 tail –2 project)

12. man명령으로 매뉴얼을 보고 있을 때 어느 키를 눌러야 정상적인 명령 프롬프트로 돌아갈까? 모두 고르시오.
답 : A. q (누르는 즉시 바로 돌아감)
(B. Alt+s, C. Shift+Spacebar : 누르면 일정 퍼센트로 넘어가는데 문제에선 키를 눌러야 정상적인 명령 프롬프트로 돌아간다고 하는걸 보면 즉시 바뀌는걸 말하기 때문에 정답이라 할 수가 없습니다. 만약 즉시가 아니라 어떻게든 넘어가는것만을 찾는다면 B와 C도 정답입니다.)

13. Linux 배포판을 모두 고르시오.
답 : 모두 배포판이다.
A. SUSE Linux Enterprise (유료 배포판, 무료는 openSUSE 리눅스)
B. Mandriva
(책 내용에서는 없지만 예전 맨드레이크소프트에서 만들었으나 상표분쟁으로 인하여 맨드리바로 바꾸었다. 맨드리바 리눅스 이것 또한 배포판이다.)
c. Fedora (무료 배포판)
d. Red Hat Enterprise Linux (유료 배포판)

14. 파일의 내용을 보여줄 수 있는 명령을 모두 고르시오.
답 : A. less, B. cat (Text 형식의 로그파일의 내용 확인가능)
(grok : 명령어가 존재하지 않음, whatis : database에서 얻은 명령의 간단한 설명을 표시)

15. who명령을 쓰면 무슨 정보를 볼 수 있나? 모두 고르시오.
답 : A. the users on the local system

16. 터미널 화면을 깨끝이 지울 수 있는 명령은 무엇인가?
답 : D. clear (clean, freshstart, new 이세가지의 명령어는 없다.)

17. 동료와 Linux컴퓨터를 공유해 쓰고 있다. 일을 끝냈을 때 UNIX/Linux 쎄션을 끝내는 가장 좋은 방법은 무엇인가?
답 : D. Use a GUI menu option to log out or enter an appropriate command for the shell you are using, such as exit or logout (if there is no GUI desktop in use).

18. 당신이 로펌에서 다른 8명과 함께 근무하고 있다. 8대의 컴퓨터는 모두 회사의 네트워크에 무선으로 연결되어 서로 교신하고 있고 서버는 없다. 이러한 네트워크는 다음 중 어느것인가?
답 : B. a peer-to-peer network
(p2p 네트워크는 두가지 방식이 있는데 첫째로 어느정도 서버의 도움을 얻어서 개인간 접속을 실현하는 방법 두 번째로는 상호간에 미리 주소를 받아 정보를 공유해 서버없이 직접 연결하는 방식이다 이때 두 번째 방법으로 한다면 서버없이 교신할수있기 때문에 이 네트워크라고 생각합니다.)

19. 다음의 컴퓨터들에서 UNIX/Linux 운영체제를 볼 수 있는 것은 어느 것인가? 모두 고르시오. 답 : 전부 다 운영체제를 볼수있다.
A. a mainframe computer
B. a desktop PC
C. a server
D. a workstation used for scientific research

20. 파일의 내용을 프린트하는 명령을 방금 실행시켰는데 같은 파일을 한 카피 더 출력하려고 한다. 파일을 출력 시켰던 이전의 명령을 반복시킬 수 있는 키는 무엇인가?
답 : C. Press the up arrow key one time.(↑ 한번 누른다)
(이전 명령을 반복시킨다는 것이 다시 명령하고 싶다는 의미면 윗방향 화살표 키를 눌러서 누른 횟수에 따른 이전명령을 다시 할수있게 되기 때문에 C가 정답이다.)

21. 당신의 회사는 국제적이어서 캐나다, 미국, 스페인, 홍콩에 있는 매니저들의 회의 시간을 GMT 기준으로 계획하고 있다. 어느 명령이 GMT 현재시간을 보여줄 수 있나?
답 : B. date –u
(time –g 라는 명령어 없음, cal –t 잘못된 명령이라고 뜸, hour 명령어가 없음)

22. more명령의 목적을 설명하시오.
답 : 파일내용을 한 페이지 단위로 보기 위함. cat명령어에 비해 더욱 많은 내용이 나옴.

23. Telnet의 목적은 무엇인가?
답 : 원격자의 컴퓨터를 인터넷을 통해 접속하여 사용하기 위한 원격접속 서비스.

24. 달력을 보려고 명령줄에 cal을 입력했지만 오류메시지만 나왔다. 원인이 무엇인가?
답 : 명령어는 대소문자 구분이 필요하다

25. 한 명령줄에 한 개 이상의 명령을 실행시키려면 어떻게 하나?
답 : 세미콜론(;) 키를 이용하면 된다. 이걸 이용해서 명령하면 입력한 순서대로 실행이 된다.…...

Similar Documents

Premium Essay

Unix/Linux

...UNIX, Linux, and Windows Server Critique POS/420 Name Professor Date University of Phoenix Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently......

Words: 2760 - Pages: 12

Free Essay

Linux Homework

...Nobody would have to pay for permission. Free software is software that users have the freedom to distribute and change. 2. Describe the relationship between Linux and the GNU project. There is really no direct relationship between them. The GNU programs are open source and have been adapted to work using the Linux kernel as well. Linux is normally used in combination with the GNU operating system. The whole system is basically GNU with Linux added. All the so-called “Linux” distributions are really distributions of GNU/Linux. 3. List and describe in detail four advantages of Linux. Stability-Linux has an edge over Windows. In case Linux crashes, the kernel and other processes are usually not harmed. Free software-Most of the Linux software is free of cost. Runs on old hardware-Linux can be ran on older and slower machines. Security-Linux has the advantages of the code being in public domain. This can act like a double-edged sword while you can look at the code and developers can rapidly fix the holes hackers can find bad code. 4. List three examples of different hardware platforms on which Linux has been ported. It can be ported on x86, Alpha, and PowerPC. 5. What are the minimum system requirements for Fedora 15 with the GUI installed? Xen 3.46 6. What is the primary file system type used by Fedora 15 Linux? Ext4 7. What is LVM? What advantages does LVM have over traditional partitions? It allows you to manage logical volumes in a single partition it......

Words: 465 - Pages: 2

Free Essay

It Unix Linux

...Introduction to UNIX and Linux UNIX was developed at Bell Laboratories by Ken Thompson and Dennis Ritchie in 1969 and it was created on a minicomputer called the PDP-7. (Muse) Computer aided design, manufacturing control systems, laboratory simulations, even the Internet its self, all began life with and because of UNIX systems. (unix.org) The reason for building UNIX was to create a simple interactive operating system, called “Multics” (Multiplexed Information and Computing System). (Kioskea.net) UNIX went through growing pains through the years, but in 1991, Linus Torvalds, commenced Linux development and the distro Solaris 1.0 debuts. (unix.org) Torvalds writes “Sadly, a kernel” (which is what Linux is and has always been) “by itself gets you nowhere. To get a working system you need a shell, compliers, a library, etc.” (Moody, pg 44) “Linus Torvalds had a kernel but no programs of his own, Richard Stallman and GNU had programs but no working kernel.” (linux.org) GNU is a recursive acronym that means GNU is Not Unix. UNIX/Linux can literally be used anywhere. While completing my AAS, my final project was to build a Samba server, which I needed a Linux distro to make happen, and I went with Ubuntu. Samba is the standard Windows interoperability suite of programs for Linux and UNIX. (Samba.org) Basically, Samba makes file transfer between a Linux/Unix server, and a Windows server, seamless. To Windows, Samba looks just like another Windows server so it allowes easy file...

Words: 515 - Pages: 3

Free Essay

Ms Windows vs. Unix/Linux

...Ms Windows vs. Unix/Linux MS Windows vs. Unix/Linux University of Phoenix POS/420 Introduction to Unix October 20, 2008 Scott Stewart MS Windows vs. Unix/Linux  The Microsoft and Linux operating systems have been long considered to be in a competition to be the best operating systems on the market. This paper will compare and contrast these operating systems to help the consumer decide which is right for his or her environment. Such subjects as; cost, market share, hardware requirements, file processing, programming capabilities, availability if application software, networking, and user interface will be examined. Cost The cost difference between running a Linux desktop / server compared to a Microsoft desktop / server is overwhelming. In all scenarios, Linux ends up being the cheaper and more “functionality rich” option. In the first scenario, let’s compare the cost difference between a Linux and Microsoft desktop. The first cost difference in this scenario is the cost of obtaining the software. A copy of most Linux distributions can be obtained for under $60 dollars, and free if it is downloaded from such sites as www.linuxiso.com. A Microsoft desktop is not so cheap however; the initial cost of purchasing a full copy of Windows Vista is currently $319.95, a much larger cost than that of Linux desktop. Functionality wise, both the Linux and Microsoft desktops provide the basic needs of the “home user,” however, such additional features as an......

Words: 324 - Pages: 2

Free Essay

Linux Homework

...LAUREN FISHER LINUX CLASS Q.WHAT ARE THE PREDOMINANT LINUX DESKTOP CURRENTLY IN USE? A. The two predominant Linux desktops currently in use for business or commercial use are Fedora and RHEL (Red Hat Enterprise Linux). These have shown to be reliable, stable and have regular updates with dependable support. For the home user Mint and Ubuntu are ranked as the most popular 1.PANEL-These are the bars at the top and bottom of the screen. They hold objects or icons which are shortcuts or applets 2.MENU BAR-The Menu bar appears at the top of the File Browser window and displays a drop down menu when you click one of its selections. The Nautilus File Brower menubar controls which information is displayed and how it is displayed 3.APPLET-This is a small program that displays its user interface on or adjacent to the panel. Examples of this would be the Clock or Workspace Switcher. 4. NOTIFICATION AREA-is an applet that displays icons of applications that are running and open. So, if your playing the CD Player, this would show an icon in the Notification area 5.SHADING-this appears to be a graphical enhancement. GTS – GigaTexel Shading boast of Cinematic effects, but has fallen out of popular use. 6.LOCATION BAR-This appears below the main toolbar. It displays the name of the directory that appears in the View pane. It can be displayed either iconic or texual. 7.NAUTILUS-Is a browser tool. This component gives you two ways to work with files: the traditional File Browser...

Words: 478 - Pages: 2

Free Essay

Secring Windows and Unix/Linux Servers

...Securing Windows and Unix/Linux Servers Floyd E. Street DeVry University Securing Windows and Unix/Linux Servers With the constant threat of internet hackers on the rise, Companies must pay close attention to secure their computer networks from would be intruders. In order to maintain the highest level of security within the os servers you must first have knowledge of the vulnerabilities of the running operating system. It is those vulnerabilities in the system that the intruders will be searching your network for. The known shortcomings and vulnerabilities of Windows and Unix/Linux servers have dysfunctions that can be exploited to gain access to a company’s private information. This information in the wrong hands could cost an organization millions of dollars in security damages. One of the ways to prevent this type security breech is to make sure that your Windows and Unix/Linux servers has the right up dated patches for these operating systems. According to, (Conklin, W. A.2009) “One of the most effective measures security professionals can take to address attacks on their computer systems and networks is to ensure that all software is up-to-date in terms of vendor-released patches. Many of the outbreaks of viruses and worms would have been much less severe if everybody had applied security updates and patches when they were released.” Ignoring the update prompts on your system is not a wise thing to do. New vulnerabilities in......

Words: 471 - Pages: 2

Free Essay

Guide to Unix Using Linux

...Review Questions 1. b cat > Meeting 2. a cal 3. a Ctrl + b 4. d passwd 5. c man cat 6. d System V 7. a Bash shell 8. c cat >> Annual_Report 9. b log in remotely to another computer on a network 10. d the administrative account that has complete access to a UNIX/Linux system 11. c tail –n 2 project 12. a q 13 A SUSE Linux Enterprise B Mandriva C Fedora D Red Hat Enterprise Linux 14. a less b cat 15. a the users on the local system C a listing of all authorized users on a system, regardless of whether or not they are logged in 16 d clear 17. d Use the shut Down option even though your coworker may want to access the computer after you, becuase this is the best way to fully reinitialize security for the next user session 18. b a peer-to-peer network 19. a a mainframe computer B a desktop pc C a sever D a workstation used for scientific research 20. c press the up arrow key one time 21. b date -u 22번. 스크롤을 아래로 내려 파일의 내용을 볼 수 있습니다 23번. Telnet은 원격 컴퓨터, UNIX, 리눅스, 또는 Windows PC를 연결하는데 사용될 수 있다. 24번. 유닉스와 리눅스는 예민하다, 그러므로 달력을 표시하기 위해서 cal명령과 not cal명령을 사용해야만 한다. 25번. 한줄에 한 개이상의 명령을 실행시키기 위해서는 :세미콜론을 사용하여 각각의 명령을 구분시킨다. 1장 DISCOVERY EXERCISES 1. 현재 파일목록확인을 할 때 사용하는 명령어이다. 현재디렉토리의 파일 목록뿐만 아니라 원하는 파일이 어느 디렉토리에있는지도 확인가능하다. 2. –R 옵션을 찾을 수가 없습니다. 3. 알아볼것 없음 4. 저는 1995년 8월 20일 생입니다. 확인 결과 일요일입니다. 4. 2008년 2012년 6. 화면에 clear를 입력 후 화면을 정리하고 .. 7. Date –u로 출력합니다. 8.......

Words: 1150 - Pages: 5

Free Essay

Unix/Linux Paperwork Week 3

...for the liscencs / permissions to use the GNU. 2. Describe the relationship between Linux and the GNU Project. Linux and Gnu are used together basicly most systems would be GNU + Linux combinded , Linux is a kernel where GNU is the whole. 3. List and describe in detail four advantages of Linux The Performance of linux is alot stronger where you can do alot more seeing as how it is open source. Linux is Free. Linux also offers you a bunch of free tools from networking stuff, Security, Graphical much more. Also runs on older hardware 4. . List three examples of different hardware platforms on which Linux has been ported. A feware Alpha, Apple Pcs , Compaqs 5.What are the minimum system requirements for Fedora 15 with the GUI installed? Fedora 15 This is basicly for CPUs such as AMD, Cyrix and VIA compatible with equivalent or the following intel processors Recommended for text-mode: 200 MHz Pentium Pro or better Recommended for graphical: 400 MHz Pentium Pro or better Minimum RAM for text-mode: 256 MiB Minimum RAM for graphical: 640 MiB Recommended RAM for graphical: 1152 MiB Processors and memory requirements for the x86_64 architectures Minimum RAM for text-mode: 256 MiB Minimum RAM for graphical: 640 MiB Recommended RAM for graphical: 1152 MiB Can use up to a little more then 9GB of disk space 6. What is the Primary file system type used by Fedora 12 Linux EXT4 7. . What is LVM? What advantages does LVM have over traditional......

Words: 352 - Pages: 2

Premium Essay

Unix/Linux Comparison Matrix

...Unix® and Linux® Comparison Matrix - 5 Marks 1. Name three versions of Unix 1. BSD/OS 2. AIX 3. Solaris 2. Name three versions of Linux 1. Canonical's Ubuntu 2. Novell's openSUSE 3. Red Hat's Fedora 3. Describe 3 major differences between Unix and Linux 1. Cost- Linux is free and Different flavors of UNIX have different cost structures according to vendors. 2. Linux is an example of Open Source software and UNIX is a closed source OS. 3. Text mode interface: Linux- BASH (Bourne Again SHell) is the Linux default shell. It can support multiple command interpreters. UNIX- Originally the Bourne Shell; now it's compatible with many others including BASH, Korn & C. 4. Which of the following is not a UNIX or Linux variant a. SunOS b. RedHat c. DOS d. HP-UX e. Debian 5. Use the command to change directory locations. a. cd b. rm c. mkdir d. cut 6. Use the command to delete a directory. a. delete_dir b. mkdir c. rmdir d. cat 7. Which of the following are text editors? (Choose all that apply.) a. vi b. emacs c. ls d. cat 8. The command creates a directory named winchester in the root directory. a. mkdir /winchester b. mkdir ../Winchester c. mkdir \winchester d. md /Winchester 9. The command allows......

Words: 378 - Pages: 2

Free Essay

Unix/Linux

...Chap 3 1. What is a live system? What advantages does it have over an installed system? A live system is a Linux session you run on a computer without installing Linux on the computer. When you reboot after a live session, the computer is untouched. They also give you the chance to preview without installing it. 2. Describe the Anaconda installer. Anaconda can perform background processing. You can still be entering information while Anaconda is installing packages and you can skip over the screens that are irrelevant to your install. 3. Where can the installation image used by Anaconda be located? The virtual console 4. Why is it important to test the installation medium? How can you do so? The data can become corrupted while fetching an installation image. It is also possible for a transient error to occur while writing an image to a recordable medium. It can also save you hours of aggravation if the install fails. 5. What should you do if the graphical installer does not work? Try waiting a while and if the installation hangs or try performing a textual installation. 6. When might you specify an ext2 file system instead of ext4? When partitions who data do not change often, because ext4 offers no benefits. 7. Which utilities can you use to partition a hard disk prior to installation? The gnome-disks using a GUI. You can also use the parted or fdisk from the command line. 8. What do you need to do before you can install Fedora as......

Words: 437 - Pages: 2

Free Essay

Unix, Linux, Mac Os, Windows Os Comparison

...Introduction The most commonly known Operating Systems (OS) today are UNIX, Linux, MacOS, and Windows. These operating systems all behave in their own way and similar in others. This paper will discuss this comparison of how these operating systems utilize memory, process handling, file management, and security. Memory Management Each operating system is required to allocate a certain amount of memory for the operating system itself for the processes that are being used or executed. There are two places memory exists: physically on the motherboard of the computer and within the operating system itself. When the operating system dynamically divides the memory usage between these two areas, this is called memory management. Each operating system manages memory different from the others; however they all follow some basic rules of memory management. All of the operating system’s memory management in general follows these requirements: relocation, protection, sharing, logical organization, and physical organization (Stallings, 2015). Relocation of memory is the process that allows the operating system to move a process or file from physical memory to virtual memory and back again, depending on the need for that data. Virtual memory exists within the operating system which uses the hard drive to store temporary information and physical memory is located on the motherboard of the computer. While the process is in memory, protection of that area needs to be enabled to...

Words: 2918 - Pages: 12

Premium Essay

Ch 4 Test Linux/Unix

...Ch 4 test lux 205 True/False Indicate whether the statement is true or false. _T___ 1. UNIX/Linux store data, such as letters, product records, or vendor reports, in flat ASCII files. _F___ 2. The command rmdir can be used to delete a directory that is not empty. _T___ 3. Moving and renaming a file are essentially the same operation. _F___ 4. When you are moving files, using the -o option with the mv command can be a good idea so that you don’t unexpectedly overwrite a destination file with the same name. _F___ 5. When you use cat to combine two files into a third file, the first line of the output contains the first line of the first file followed by the first line of the second file. __F__ 6. When you use the paste command, by default, the pasted results appear in columns separated by commas. __T__ 7. You can complete a project using awk that you cannot complete using a combination of paste, cut, sort, and join. Multiple Choice Identify the choice that best completes the statement or answers the question. __C__ 8. In UNIX/Linux, text files and binary files are considered to be ____ files. a.|executable|c.|regular| b.|document|d.|dynamic| __A__ 9. Character special files are used by input/output devices for communicating one character at a time, providing what is called ____ data. a.|raw|c.|ASCII|| b.|binary|d.|block| __C__ 10. System administrators and programmers refer to standard input as......

Words: 1554 - Pages: 7

Free Essay

Linux Homework

...IT250 Linux Home Work Chapter 4 1) What command can be used to list the files in a directory? dir 2) What command can be used to display the contents of a text file? cat 3) What command can be used to delete a file? rm Chapter 5 1) What commands can be used to compress a file? Gzip and bzip2 2) Name two text editing commands we used. nano and vim 3) What VIM command quits without saving. :q! 4) What VIM command saves and quits. ZZ 5) What VIM command is used to switch from text entry to command mode? Esc Chapter 6 1) What command allows us to check or change permissions? Chmod 2) When working with permissions, what symbolic permissions value of RW? Read and write 3) What is the numeric equivalent of this value? 6 Chapter 7 1) When used with a command, what does the > character do? Redirect output 2) What does grep do? Search file(s) for lines that match a given pattern Chapter 8 1) Define GNOME GNOME is designed to be a Windows-like Desktop system Chapter 9 1) Define BASH. Bourne Again Shell GNU’s command interpreter for UNIX Chapter 10 1) What command can I use to identify the name of the computer I’m using? hostname 2) Define daemon. A program that runs in the background, rather than controlled by the user 3) Identify a daemon. ftp 4) Define FQDN. Fully qualified domain name, is the complete domain name for a specific host 5) Identify one top level domain. Infrastructure top-level domain Chapter 11 1) What is sudo? ......

Words: 437 - Pages: 2

Free Essay

Project 9 Unix Linux Admin1

... or usermod -L -e 1980-01-01 buser Unlock/enable the buser account now using any non-GUI method.  What two commands on Linux can be used to enable (unlock) an account?  Verify you can use both ftp and sftp with the buser account now. From /etc/passwd change the login shell to /bin/bash Or usermod –L –e 2020-01-01 buser Change the login shell of buser to “/sbin/nologin”.  Try ftp and sftp for that user again.  What happened? The user lock not working As root, try the following commands: “su -c 'id' buser” and “su buser”.  Did either command work? Su –c ‘id’ buser Uid=1002(buser) gid=1002(buser) group=1002(buser) context-unconfig…… Change the login shell of buser to “/bin/false”.  Try both ftp and sftp for that user again.  What happened this time?  Can you explain these results?  (HINT:  Examine /etc/shells for a list of valid shells on your system.) Connection closed The problem with the login shell when we change it to /bin/false the connection doesn’t understand it and who will deal with account so the connection will be close Restore the login shell of buser to “/bin/bash”.  As root, try the following commands: “su buser” and “su -c 'id' buser”.  Did either command work this time? Yes it’s work . Force user buser to change the password immediately at the next login.  (On Linux use the chage command.  On Solaris, use the passwd command.)  What was the exact command used? passwd –e buser 6- What command...

Words: 924 - Pages: 4

Premium Essay

Unix, Linux, and Windows Server Critique

...UNIX, Linux, and Windows Server Critique Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active are just a few of the ways that help close the......

Words: 2750 - Pages: 11

HERE Drive | Jack Lemmon | saison 20, épisode 20 - Manucure pour 4 femmes