Assignment 2.1 Linux Class Itt

In: Computers and Technology

Submitted By gcgdfan141
Words 567
Pages 3
Assignment 2.1 August 4, 2013

1. The two predominant Linux desktops currently in use are GNOME and KDE. GNOME is a desktop environment and graphical user interface (GUI) that runs on top of a computer operating system. It is composed entirely of free and open source software and is developed by both volunteers and paid contributors, the largest corporate contributor being Red Hat. KDE is an international free software community producing an integrated set of cross-platform applications designed to run on Linux, FreeBSD, Solaris, Microsoft Windows, and OS X systems. It is known for its Plasma Desktop, a desktop environment provided as the default working environment on many Linux distributions, such as Kubuntu, Pardus, and openSUSE.

2. Panel – these are the bars at the top and bottom of the screen. They hold objects or icons which are shortcuts or applets.
Menu bar – the menu bar appears at the top of the File Browser window and displays a drop down menu when you click one of its selections. The Nautilus File Browser menu bar controls which information is displayed and how it is displayed.
Applet – this is a small program that displays its user interface on or adjacent to the panel. (EXAMPLES: clock or workspace switcher)
Notification area – an applet that displays icons of applications that are running and open. (For example, if you’re playing the CD player, this would show in the notification area)
Shading – this appears to be a graphical enhancement. GTS – GigaTexel Shading boasts of Cinematic effects, but has fallen out of popular use.
Location bar – this appears below the main toolbar. It displays the name of the directory that appears in the View pane. It can be displayed either iconic or textual.
Nautilus – is a browser tool. This component gives you two ways to work with files: the traditional File Browser view and the…...

Similar Documents

Itt Tech Linux Assignment 3.1

...1. JetDirect, LPD/LPR, IPP, and SMB. 2. It is The Internet Printing Protocol (IPP). 3. lpadmin, a CUPS web interface, and system – config – printer. 4. It is a Uniform Resource Identifier. It is a string/ name, or a symbol to identify a resource (ex: http://hangtime.blogs.nba.com/2012/07/18/blazers-smith-released-from-hospital/#) 5. Model Wizbang 9000 – lpadmin -p Wizbang 9000 -E -v socket://172.20.20.76 -m Wizbang 9000 ps.ppd.gz PPD file Wizbang_9000_ps.ppd.gz (already in the foomatic database) - lpadmin -p "Wizbang 9000" -E -v socket://(add IP address here) -m Wizbang_9000_ps.ppd.gz (basically, the same answer as the previous answer before this one). Connected to a JetDirect print server with an IP of 172.20.20.76 – press CTRL + V and it enters it to the copied IP, after you’ve copied the IP address….and then press the “enter” key. Accessible to all users – lpoptions -p printer -o option1=value –o, for a second option, enter the value of the file name. 6. A timing attack; a side channel attack, which the attacker tries to concede a cryptosystem, in which, you estimate the time taken to execute cryptographic secrets/conclusions or formulas. 7. rsh and rexec. (they send passwords in visible text). 8. (/home/axl/.ssh/id_rsa): 9. /etc/ssh/sshd_config, or /usr/local/etc/ssh/sshd_config, and /etc/sshd_config. 10. Modify the etc/host.deny, then enter sshd: “all.” You can then modify /etc/host.allow, then add the commands: sshd: Archie, sshd: Jughead, and sshd:......

Words: 283 - Pages: 2

Assignment 2.1

...Quality Assurance Test Plan (QATP) for SugarCRM .......... Table of Contents 1 Introduction 2 1.1 Purpose 2 1.2 Scope 2 1.3 Overview 2 1.4 Definitions, Acronyms, and Abbreviations 2 1.5 References 3 2 Scope of Testing 3 2.1 Product Overview 3 2.2 Scope of Testing 4 2.2.1 Within Scope of Testing 4 2.2.2 Out of Scope of Testing 5 2.3 Requirement Criticality Classification Guideline 5 2.4 Functional Requirements 5 2.5 Non Functional Requirement 6 3 Assumption and Risk 7 3.1 Assumptions and Dependencies 7 3.2 Risk Management 7 4 Test Deliverables and Schedule 8 4.1 Test Design 8 4.2 Reporting 8 4.3 Escalation 9 4.3.1 Results 9 4.3.2 Deliverables 9 4.3.3 Configuration management 9 4.4 Test Phases 9 4.5 Testing Activities 10 5 Testing Approach 11 5.1 Testing Activities 11 Smoke Testing 13 5.1.1 Objective 13 5.1.2 Entry Criteria 13 5.1.3 Exit Criteria 13 5.1.4 Test suspension resumption criteria 13 5.2 User Interface Testing 13 5.2.1 Objective 13 5.2.2 Entry Criteria 13 5.2.3 Exit Criteria 14 5.2.4 Test suspension resumption criteria 14 5.2.5 Special Considerations 14 5.3 Functional Testing 14 5.3.1 Objective 14 5.3.2 Entry Criteria 14 5.3.3 Exit Criteria 14 5.3.4 Test suspension resumption criteria 14 5.3.5 Special Considerations 14 5.4 Regression Testing 14 5.4.1 Objective 14 5.4.2 Entry......

Words: 5688 - Pages: 23

Assignment 1.2 - Itt

...Research Assignment Part 1 Nathan Ceriotti Windows Server 2008 comes has several different versions, some of these are designed for specific system types. Each different version of Windows Server 2008 bring different features to the table for server management. Some of the popular versions of Windows server 2008 are Window Server – Datacenter, Windows Server – Enterprise, and Windows Server – Standard. (Microsoft.com) Datacenter is designed for large scale virtualization, with this it can help reduces costs on power consumption on the server and reduce infrastructure maintenance. Enterprise provides high levels of system uptime, giving the capability to have numerous services running in the office, offsite, and international. Windows Server standard edition allows the basic services provided by Windows Server 2008, being able to maintain a basic serviced server. (Microsoft.com) Windows Server 2008 has several new features and enhancements. Some of these are: IIS 7, Role-based installation, and Network access protection. Internet Information Server, is a group of internet servers with additional capabilities giving windows HTTP capability. (TechTarget) Role-based installation allows for scalability in large heavy email traffic.(GFI) With it being a less extreme version of server core gives a more simplistic adding and removing roles. Simply put pick what role the server is to be and it will be it. There are many difference between Server 2008 and 2003. One...

Words: 387 - Pages: 2

Linux 1 Assignment 6.1

...IT250 – Linux 1 Assignment 6.1 10/2012 EXERCISES, Page 582 1. Which commands can you use from the command line to send a file to the default printer?  lpr/lp – sends job(s) to the printer  lpr – prints a file 3. Which commands list your outstanding print jobs?  lpq/lpstat – Displays the status of the print queue 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol?  System-config-printer  lpinfo Displays available drivers  lpadmin configures printers  The cups native protocol is IPP EXERCISES, Page 669 1. What advantage does a switch have over a hub?  Switches are faster and switches have a repeater which boosts your speed 3. Name two servers that allow you to share directories between systems.  NFS  Samba   5. What is a common function of a router? What is this function called?  A router connects a LAN to another network, such as the internet. A router can perform several functions, the most common of which is allowing several systems to share a single Internet connection and IP address is NAT. When a router uses NAT, the packets from each system on the LAN appear to come from a single IP address; the router passes return packets to the correct system.  A router can also act as a firewall. 7. Which tool can you use to configure a wireless NIC (rather than having it be configured automatically)?  The network manager applet  CLI: nm-connection-editor ADVANCED EXERCISES, Page 669 9. If......

Words: 276 - Pages: 2

Itt Tech Linux 2 Homework 1.1

...Nicole Lynn Bojko Homework Assignment 1.1 1. List the number and name of each runlevel as used by Fedora/Red Hat Linux. 0 = Halt – Shuts down the system 1 = Single User – Mode for administrative tasks 2 = Multiuser without NFS - Does not configure network interfaces and does not export networks services 3 = Multiuser - Starts the system normally 4 = User defined – For special purposes 5 = Multiuser with X - As runlevel 3 + display manager 6 = Reboot – Reboots the system 2. Which two runlevels should NEVER be set as the default? 0 = halt and 6 = reboot 3. What script contains the default runlevel? /etc/rc 4. The init scripts for each runlevel are contained in which directory tree? /etc 5. What would you name the link to an init script that would start the fictitious bigd daemon early in the boot process? /etc/rc.local and write the script to run at boot time. 6. What would you name the same link to kill the same daemon? Kill 9 7. How would you use the service command to manually kill the bigd daemon? Service bigd stop 8. How would you use chkconfig to set the bigd daemon to start at runlevels 2 and 3? chkconfig bigd --level 2 and 3 on 9. How would you use chkconfig to remove bigd from all runlevels? chkconfig --del bigd 10. How would you use telinit to switch to runlevel 5? Edit the /etc/inittab and Enter : id:5:initdefault: 11. How would you tell Linux to shut down in five minutes ( not delay five minutes) with the message “ The system will......

Words: 276 - Pages: 2

It220 Assignment 2.1

...Assignment 2.1 Chapter 5 1-37 odd | | | | * What are the four layers of the TCP/IP model? Application layer, Transport layer, Internet layer, and Network Interface layer. * What are well-known ports? Ports reserved by ICANN (1 – 1023) * Define the purpose of a connection oriented protocol. It establishes a connection, manages the delivery of data, and terminates the connection. * What is the purpose of a sequence number (SEQ=) in TCP data packets? The sequence number is used to keep track of the data packets being transferred from host A to host B. * Describe how a TCP connection is terminated. The Host B sends a FIN (finish) packet to host A. Host A then sends an ACK packet acknowledging the reception of the FIN packet. Host A sends a FIN packet, then Host B responds with an ACK packet. * What is the purpose of the Internet layer in the TCP/IP protocol suite? Defines the protocol used for addressing and routing data packets. * What is the purpose of an ARP reply? The protocol that contains the hardware address for the destination host. * When is IGMP used? It’s used to control the flow of data in the network, for reporting errors, and for preforming diagnostics. * Convert the following 8-bit binary number to decimal: 10010011. 147. * Convert the following 8-bit number to decimal: 1111100. 252. * Convert the number 192 to its binary equivalent. 11000000. * Convert the number 96 to its binary equivalent.......

Words: 343 - Pages: 2

Homework Assignment 2.1

...users have the freedom to distribute and change. 2. Describe the relationship between Linux and the GNU Project.  Linux is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called “Linux” distributions are really distributions of GNU/Linux. 3. List and describe in detail four advantages of Linux. Applications – Linux is both free and commercial as well as a wide variety of tools: graphical, word processing, networking, security administration, Web server and many others. Flexibility - Linux can be used for high performance server applications, desktop applications, and embedded systems. You can save disk space by only installing the components needed for a particular use. You can restrict the use of specific computers by installing for example only selected office applications instead of the whole suite. Performance - Linux provides persistent high performance on workstations and on networks. It can handle unusually large numbers of users simultaneously, and can make old computers sufficiently responsive to be useful again. Stability - Linux doesn’t need to be rebooted periodically to maintain performance levels. It......

Words: 1165 - Pages: 5

Assignment on Linux

...Narayan Saha | CIT1533 | SCM-024155 Raj Narayan Saha | CIT1533 | SCM-024155 Introduction to Operating Systems assignment 1 Introduction to Operating Systems assignment 1 Contents The Linux Operating System 1 The History of Linux 3 The linux mascot 4 linux and its fued with microsoft 4 The Advantages and Disadvantages of Linux 6 Comparing Linux to Windows 7 The increase in complexity of Operating Systems 8 advantages and disadvantages of this increased complexity 10 Client-Server Operating System 11 Plug and Play & Multitasking in Windows 13 plug and play 13 multitasking in windows 15 References 17 The Linux Operating System Before getting into Linux, a short introduction on what an Operating System is – An Operating System is a software layer that is between the hardware and the software that you actually use to get something productive. In other words, the operating system is what allows the software to talk to the hardware, such as storing information to the hard drive, to send out print jobs to the printer and so on and so forth. Figure [ 1 ] An excerpt from the Ubuntu (a Linux distribution) website on how and why it's free Figure [ 1 ] An excerpt from the Ubuntu (a Linux distribution) website on how and why it's free Now, onto Linux. Linux, like Microsoft Windows is an Operating System. Unlike Windows, however, Linux is open source, meaning one can readily find the source code for the OS for free and add or edit the......

Words: 4387 - Pages: 18

Assignment 1.1 Linux

...IT250 Homework Assignment 1.1: 1. What did Richard Stallman mean when he stated that GNU was a free operating system? Richard Stallman meant that his intention was that nobody would have to pay for “permission” to use the GNU system. He learned to distinguish carefully between “free” in the sense of freedom and “free” in the sense of price. Free software is software that users have the freedom to distribute and change. 2. Describe the relationship between Linux and the GNU Project. Linux is the kernel, the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. 3. List and describe in detail four advantages of Linux. Applications: Linux is both free and commercial as well as a wide variety of tools: graphical, word processing, networking, security administration, Web server and many others. Flexibility: Linux can be used for high performance server applications, desktop applications, and embedded systems. You can save disk space by only installing the components needed for a particular use. You can restrict the use of specific computers by installing for example only selected office applications instead of the whole suite. Performance: Linux......

Words: 593 - Pages: 3

Nt1430 Linux Networking Unit 5 Assignment 1 Itt Orange

...Francisco Ramirez Unit 5 assignment 1 Ch. 18 1. Sftp-secure file transfer protocol is a network protocol that provides file access, transfer, and management over a trusted data stream. Scp-secure transfer protocol is a network protocol that transfers data that can withstand or is immune to interception and tampering. 2. Use the “ssh host who” command in the terminal to show who is logged in 3. Scp user@bravo:-r your@home:blank 4. “$ ssh plum xterm” or use this command with “-y” if x11 forwarding is not trusted 5. The problem that enabling compression prevent when using a ssh to run remote x11 applications on a local display would be that this creates a backup feature. Should the computer crash, all of your work will be saved on the hard drive. 6. Check with the remote administrator to see if something has changed. Ch. 20 1. Edit “etc/aliases file to include the entry: root, var/logs/systemmail 2. “Cat~/. Forward”, then max@bravo.com then “/max” 3. Edit “/etc/mail/access” and add the following: “connect 192.168.1.1 relay” 4. “dnl” stand for “delete to new line”, works the same as # in shell script; it instructs the compiler to ignore any line followed by “dnl” 5. Go to content configuration on Spamassassin, then under “required spam assassin score”, change 3 to 5. 6. First, type the mail followed by the e-mail address of the recipient: mail Max@email.com, then type the subject line, then press enter. Type your message,......

Words: 270 - Pages: 2

Assignment 2.1 the Public Needs to Know

...Assignment 2.1 The Public Needs to Know Click Link Below To Buy: http://hwaid.com/shop/assignment-2-1-the-public-needs-to-know/ Due Week 4 and worth 150 points Select one (1) of the scenarios on which to focus your informative paper. Research the topic and include credible sources to support claims. Identify your purpose clearly, incorporate audience needs, establish a desired tone, and organize information and / or claims effectively. 1. Your boss has asked you (a communication specialist) to write an informative paper about the free clinic that will be opening in your local neighborhood for those without medical insurance. Describe the process and benefits of the program for the public. 2. The state school board chairperson has asked you (a consultant on health and wellness) to write an informative paper about the recent changes to the national breakfast and lunch program to improve nutrition and health. Describe the process and benefits of the programs for parents. 3. The director of a local domestic violence shelter has asked you (a board member and volunteer for the organization) to write an informative paper about your local organization’s program. Describe the process and benefits of the program for the community members. Write a three to four (3-4) page paper in which you: 1. Provide a clear thesis statement. 2. Describe the process (decisions, steps) involved in the program. 3. Explain the benefits of the program. 4. Develop a coherently structured......

Words: 433 - Pages: 2

Assignment 2.1

...conduct “life-skills”, recreational or self-care workshops. Household-Care Volunteers help us to maintain clean and welcoming homes by performing tasks such as cleaning, gardening, yard work, painting rooms, and grocery shopping. Household-Care Volunteering is an excellent opportunity for faith communities and other groups interested in civic engagement. Faith Works does more than provide relief to those in domestic abuse situations in the community. Annually we host a gala auction off donated paintings, jewelry and clothing from celebrities. All proceeds go to the local boys and girls club. Over time, with this money they have installed an extra wing in their facility for our child care center. Smart Boards and computers are now in every class room. Also, every child enrolled has access to an iPad while they are there and tutors after school to help with homework in English, Math, and History for grades 1-12. Faith Works also hosts drawing contests and spelling bees for the youth in our community to showcase their talent. It’s also a way for the children to occupy their free time and relinquish their creativity. Winners of these contests are provided with scholarships ranging from $100-1,000. In conclusion, Faith Works does more for the community than provide relief from domestic abuse. However, that is our number one concern! We like to help people bounce back and regain control of their lives and sense of self. We want to let the people we help know that they are......

Words: 881 - Pages: 4

Linux Ii Research Assignment - Linux Security Technologies

...Research Assignment Linux Security Technologies Kristy Graves ITT Tech – Dayton Linux II IT302 Mandatory Access Control Mandatory Access Control (MAC) is a system wide policy that relies on the current system to control access (Syracuse University, 2009). Users cannot alter or make any changes to this policy. Only the administrator has the clearance and authorization to make changes (The Computer Language Company Inc., 2012). Mandatory access control mechanisms are more than Discretionary Access Control (DAC) but have trade offs in performance and convenience to all users (The Open Web Application Security Project, 2002). Users can access lower level documentation, but they cannot access higher level without the process of declassification. Access is authorized or restricted based on the security characteristics of the HTTP client. This can be due to SSL bit length, version information, originating IP address or domain, etc. Systems supporting flexible security models can be SELinux, Trusted Solaris, TrustedBSD, etc. DAC checks the validity of the credentials given by the user. MAC validate aspects which are out of the hands of the user (Coar, 2000). If there is no DAC list on an object, full access is granted to any user (Microsoft, 2012). SELinux SELinux has three states of operation. These states are enforcing, permissive, and disabled. SELinux was developed by the U.S. National Security Agency (NSA) and implements MAC in a Linux kernel (Sobell, 2011).......

Words: 875 - Pages: 4

Reserch Assignment 2.1

... Research Assignment 2.1 Kyle McGraw ITT Technical Institute IT302 Linux Mr. Gort April 14, 2012 In this paper I will go over 3 different types of Linux security technologies those follow with SELinux, chroot jail, and iptables. These technologies aid in prevention of identity theft. I will help you understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them. Under the GPL in late 2000 SElinux was released from the National Security Agency’s Office of Information Assurance. More recently it was developed by the open source community with the help of NSA. SElinux currently ships as a part of Fedora Core, and it’s supported by Red Hat. Also there are packages that exist for Debian, SuSe, and Gentoo although at this time these were unsupported by anyone. SElinux is based on the concept of Mandatory Access Control. Under MAC, administrators control every interaction on the software of the system. A least privilege concept is used, by default applications and users have no rights, because all rights have to be granted by an administrator because of the system’s security policy. Under DAC, the files are owned by the user also that user has full control over them. If an attacker penetrates that user’s account they can do whatever with the files owned by that user. Standard UNIX permissions are still present on the system, and will be consulted......

Words: 938 - Pages: 4

It302 Linux System Administration Research Assignment 1

...IT302 Linux System Administration Research Assignment 1 SELinux or Security Enhanced Linux uses an architecture that separates enforcement from access policy decisions. With this architecture different types of policies can be implemented, including Role-Based Access Control (RBAC), Type Enforcement (TE), and Multi-Level Security (MLS). The module assigns security labels to each subject or object. It uses a security class to determine the kinds of relationship a pair of labels might have. The triplet consisting of a pair of labels and a class are then sent to a policy server to determine if access is allowed. The security labels are assigned dynamic integer security ID's (SID's); the reply from the policy server is cached in an 'access vector cache' for performance reasons. SELinux was developed in coordination with the open source community and the National Security Agency (NSA) to provide the highest level of security for the Linux operating system. Linux V-Server – The three basic elements of the VServer are: * The security context. A process in one security context cannot see processes in other security contexts, neither with the 'ps' command, nor with 'cat /proc' nor in any other way. As side-effect, this means that a process in one context cannot kill processes in other contexts. * Capabilities. The existing Linux kernel provides a wide variety of capabilities which can be taken away from processes. These include the ability to change network......

Words: 423 - Pages: 2