Linux Administration Time : 2½ Hrs.] Prelim Question Paper [Marks : 75

Total Page:16

File Type:pdf, Size:1020Kb

Linux Administration Time : 2½ Hrs.] Prelim Question Paper [Marks : 75 T.Y. B.Sc. (IT) : Sem. V Linux Administration Time : 2½ Hrs.] Prelim Question Paper [Marks : 75 Q.1 Attempt any TWO: [10] Q.1 (a) Explain Linux distributions. [5] (A) Linux Distributions Although there is only one standard version of Linux, there are actually several different distributions. Different companies and groups have packaged Linux and Linux software in slightly different ways. Red Hat Linux [Any five distribution 5 marks] Red Hat Linux is currently the most popular Linux distribution. As a company, Red Hat provides software and services to implement and support professional and commercial Linux systems. Red Hat freely distributes its version of Linux under the GNU Public License. Red Hat generates income by providing professional level support, consulting, and training services. Red Hat originated the RPM package system used on several distributions, which automatically installs and removes software packages. Red Hat maintains an extensive library of Linux documentation that is freely accessible online. On its Web site, you can link to its support page, which lists the complete set of Red Hat manuals, all in Web page format for easy viewing with any Web browser. Red Hat offers several commercial products and services for business and e- commerce solutions. Mandrake Mandrake Linux is another popular Linux distribution with many of the same features as Red Hat. It focuses on providing up-to-date enhancements and an easy-to-use installation and GUI configuration. SuSE Originally a German language-based distribution, SuSE has become very popular throughout Europe and is currently one of the fastest growing distributions worldwide. Vidyalankar Debian Debian Linux is an entirely noncommercial project, maintained by hundreds of volunteer programmers. 1 Vidyalankar : T.Y. B.Sc. (IT) Linux Its aim is to enhance Linux with new and improved applications and implementations. Caldera Caldera OpenLinux is designed for corporate commercial use. Caldera has organized its OpenLinux distribution into several different packages, each geared to different markets. These include the eDesktop package, which is designed for basic workstation operations, and the eServer package, which is designed for Linux servers. Caldera also offers a line of commercial and proprietary Linux packages. Slackware Slackware is available from numerous Internet sites, and you can order the CD from Walnut Creek Software. The Slackware distribution takes special care to remain as closely Unix compliant as possible. TurboLinux TurboLinux provides English, Chinese, and Japanese versions of Linux. It includes several of its own packages, such as TurboPkg, for automatically updating applications. Q.1 (b) How loader works? State the difference between grub and lilo. [5] (A) Grub : Grub stands for Grand Unified Bootloader. The bootlader is the software program. If you have multiple kernel images installed on your system, you can choose which one to be executed. GRUB displays a splash screen, waits for few seconds, if you don’t enter anything, it loads the default kernel image as specified in the grub configuration file. (grub.conf in /boot) GRUB has the knowledge of the filesystem (the older Linux loader LILO didn’t understand filesystem). Grub configuration file is/boot/grub/grub.conf (/etc/grub.conf is a link to this). [Working of loader 3 marks and difference 2 marks (4 points)] GRUB LILO GRUB stands for GR and Unified Stands for Linux Loader VidyalankarBootloader. GRUB supports an unlimited number LILO supports only up to 16 of boot entries. different boot selections; GRUB can boot from network. LILO cannot boot from network. 2 Prelim Paper Solution There is no need to change GRUB LILO must be written again every when the configuration file is time you change the configuration changed as GRUB is dynamically file. configurable. GRUB has an interactive command LILO does not have an interactive interface. command interface. GRUB has the knowledge of the file LILO doesn’t have the know ledged system. file system. Q.1 (c) State any 5 linux supported file systems and explain ext3 and ext 2. [5] (A) 5 Linux Supported File System [1 mark] 1. ext3 2. ext2 3. Reiser 4. FAT 5. NTFS ext2(non-journaling file system) [2 marks] xt2 stands for second extended file system. ext2 does not have journaling feature. On flash drives, usb drives, ext2 is recommended, as it doesn’t need to do the over head of journaling. Can handle file systems up to 4 TB It supports long file names up to 1012 characters. In case user processes fill up a file system, ext2 normally reserves about 5% of disk blocks for exclusive use by root so that root can easily recover from that situation. Ext3 [2 marks] Ext3 stands for third extended file system. Starting from Linux Kernel 2.4.15 ext3 was available. The main benefit of ext3 is that it allows journaling. Journaling has a dedicated area in the file system, where all the changes are tracked. When the system crashes, the possibility of file system corruption is less because of journaling. (If no journaling, then fsck commend(file system consistency check) is used to check for the corrupted file and to repair that file). Vidyalankar Under ext2, when a file system is uncleanly mounted, the whole file system must be checked. This takes a long time on large file systems. ext3 keeps a record of uncommitted file transactions and applies only those transactions when the system is brought back up. 3 Vidyalankar : T.Y. B.Sc. (IT) Linux Maximum individual file size can be from 16 GB to 2 TB Overall ext3 file system size can be from 2 TB to 32 TB You can convert a ext2 file system to ext3 file system directly (without backup/restore). Q.1 (d) Explain RAID levels with diagram. [5] (A) RAID : Is an acronym for Redundant Array of Independent Disks. Used for maintaining copy of the data. There are two types of RAID – hardware RAID and Software RAID. Hardware RAID – in H. RAID, the disks have their own RAID controller with built in software that handles RAID disk setup. The controller is a card in one of the system’s expansion slots. Ot it may be built onto the system board. The O/S does not control the RAID level used, it is controlled by the hardware RAID controller. Software RAID – there is no RAID controller card. The O/S is used to set up a logical array and the O/S controls the RAID level used by the system. Six RAID levels are commonly used. The three most commonly used RAID levels are RAID level 0 – stripping [½ mark] This level requires at least two disks and uses a method called striping that writes data across both drives. There is no redundancy provided by this level of RAID, since the loss of either drive makes it impossible to recover the data. This level does give a speed increase in writing to the disks. Vidyalankar 4 Prelim Paper Solution RAID level 1 – Mirroring [½ mark] This level requires at least two disks and uses a method called mirroring. With mirroring, the data is written to both of the drives. So, each drive is an exact mirror of the other one and if one fails the other still holds all the data. There are two variants to level 1 with one variant using a single disk controller that writes to both disks. The other variant uses two disk controllers, one for each disk. This variant of RAID level 1 is known as duplexing. RAID level 2 – Error Checking and Correction [1 mark] Requires minimum 3 disks. RAID 2 adds error checking and correcting checksums to RAID-1. ECC is Error correcting code in which each data signal confirms to specific rules of construction so that departures from this construction in the received signal can generally be automatically detected and corrected. RAID 2 A1 A2 A3 A4 Ap1 Ap2 Ap3 B1 B2 B3 B4 Bp1 Bp2 Bp3 C1 C2 C3 C4 Cp1 Cp2 Cp3 D1 D2 D3 D4 Dp1 Dp2 Dp3 Disk 0 Disk 1 Disk 2 Disk 3 Disk 4 Disk 5 Disk 6 RAID level 3 – Byte-Level Striping with Parity Disk [1 mark] Requires minimum 3 disks. It does striping, like RAID-0, but at a very Vidyalankarsmall granularity. It also adds parity disks which helps in error detection and recovery. 5 Vidyalankar : T.Y. B.Sc. (IT) Linux RAID 3 A1 A2 A3 Ap(13) A4 A5 A6 Ap(46) B1 B2 B3 Bp(13) B4 B5 B6 Bp(46) Disk 0 Disk 1 Disk 2 Disk 3 RAID level 4 – Block-Level Striping with Parity disk [1 mark] requires minimum 3 disks. It attempts to add error checking and recovery to RAID-3 by doing block level striping with the addition of a single parity disk. RAID 4 A1 A2 A3 Ap B1 B2 B3 Bp C1 C2 C3 Cp D1 D2 D3 Dp Disk 0 Disk 1 Disk 2 Disk 3 RAID level 5 – Block-Level Striping with Distributed Parity [1 mark] It requires at least three disks and uses striping to write the data across the two disks similarly to RAID 1. But unlike 1, this level uses the third disk to hold parity information that can be used to reconstruct the data from either, but not both, of the two disks after a single disk failure. RAID 5 A1 A2 A3 Ap B1 B2 Bp B3 C1 Cp C2 C3 Dp D1 D2 D3 Vidyalankar Disk 0 Disk 1 Disk 2 Disk 3 The information of system’s RAID configuration is stored in /etc/traidtab . 6 Prelim Paper Solution Q.2 Attempt any TWO: [10] Q.2 (a) How to manage rc scripts using chkconfig? [5] (A) To configure any software package to work at boot time use this command with following options: [Each point 1 mark] 1.
Recommended publications
  • Adu FTP Server Adu FTP Server Supriyanto [email protected] IINDENDEKKSS
    ADU SOFTWARE Berita | Ulasan | Adu Software | Utama | Bisnis | Apa Sih Sebenarnya... | Tutorial Adu FTP Server Adu FTP Server Supriyanto [email protected] IINDENDEKKSS ADU FTP SERVER oftpd 0.3.7 27 ProFTPD 1.2.10 27 PureFTPd 1.0.19 28 vsftpd 2.0.3 28 Wu-FTPD 2.6.2 29 WzdFTPD 0.5.2 29 auh sebelum protokol HTTP dibuat, pa- Wu-FTPD, WzdFTPD dan otftpd. Kriteria pengujian: ra pengguna Internet zaman dahulu su- Untuk pengujian keenam FTP server ini, Kali ini kami menguji enam buah aplikasi dah menggunakan protokol FTP sebagai yang menjadi penilaian terbesar bagi kami FTP Server yang ada di Linux. Sama seperti J sarana bertukar file. File Transfer Protocol adalah di masalah security. Program FTP pengujian yang telah dilakukan, kami tetap (FTP) merupakan aplikasi standar Internet server yang baik, harus memiliki catatan se- menggunakan empat kriteria sebagai bah- yang pertama kali di buat pada tahun 1971 curity hole yang sedikit. Banyak kasus yang an penilaian. Kriteria pertama adalah fung- sebagai bagian dari U.S Department of terjadi pada FTP Server yang berkaitan de- sionalitas. Sebuah program FTP Server yang Defense’s ARPANET (DARPANET) proto- ngan root exploit, yang didapat dari secu- baik harus memiliki fitur keamanan yang cols, yang kemudian juga melahirkan TCP rity hole aplikasi FTP Server. Untuk krite- baik dan memiliki kecepatan dalam mena- dan Internet Protocol (TCP/IP). ria lainnya adalah fitur pendukung aplikasi ngani request dari banyak user dalam satu Fungsi utama dari FTP sendiri adalah tersebut. Seperti adanya Authentification waktu. Untuk kriteria ini kami memberikan untuk berbagi file antar file system yang ber- Based SQL, LDAP atau PAM, virtual host porsi 40%.
    [Show full text]
  • General Infrastructure Vsftpd FTPS Setup Red Hat Enterprise Linux 5
    HAC Maarssen General Infrastructure vsftpd FTPS setup Red Hat Enterprise Linux 5 / CentOS 5 Author: René Hartman Version: 1.2.2 HAC Maarssen DOCUMENT HISTORY Document Location Ensure that this document is the current version. Printed documents and locally stored copies may become obsolete due to changes in the master document. Revision History Document name: FTPS_Setup_RHEL5.doc Version: 1.2.2 Date of 1 st version: 14-May-2010 Date of this version: 14-May-2010 Note: in the following table the revision number does not necessarily match with the version number of the document. The version number of the document is merely meant to control the number of saved changes. Version Date Author Status* Brief Description, Remarks Cpt FA Ap 1.0 14-May-2010 René Hartman X Initial Draft * Cpt = Concept; FA = For Approval; Ap = Approved HAC Maarssen Reviewers The following people have reviewed this document Version Name Role Required date of feedback Classifications Status: For approval HAC Maarssen TABLE OF CONTENTS Document History.......................................................................................................................... 1 Table Of Contents ......................................................................................................................... 3 1 Introduction ........................................................................................................................... 4 1.1 Overview .........................................................................................................................
    [Show full text]
  • Pembuatan Ftp Server Pada Server Redhat 4 Dengan Vsftpd
    Media Informatika Vol.13 No.1 (2014) PEMBUATAN FTP SERVER PADA SERVER REDHAT 4 DENGAN VSFTPD Hendy Djaja Siswaja E-mail : [email protected] Sekolah Tinggi Manajemen Informatika dan Komputer LIKMI Jl. Ir. H. Juanda 96 Bandung 40132 ABSTRAK FTP merupakan salah satu dari protokol pada jaringan komputer yang memiliki fungsi untuk memberi akses upload dan download file antar komputer yang terhubung dalam suatu jaringan komputer. FTP disukai karena mudah untuk dibuat dandapat dengan mudah untuk diakses dengan menggunakan web browser pada komputer. FTP paling banyak digunakan pada sistem operasi berbasis Linux, bahkan banyak distro-distro Linux yang menyediakan layanan FTP sebagai sarana bagi para user-nya untuk mendownload sistem operasi, update,aplikasi atau repositori lainnya. Kata kunci : ftp, VSFTPD, protokol, linux, jaringan komputer. 1. PENDAHULUAN Dalam setiap jaringan komputer, selalu muncul suatu kebutuhan dalam membagikan file-file komputer dari satu komputer ke komputer yang lain dan kebutuhan ini dapat dikatakan sebagai sesuatu hal yang bersifat primer (mendasar). Mengirimkan dan menerima file komputer mungkin merupakan suatu hal yang sederhana, bisa saja seseorang membagikan file komputer yang dimilikinya tanpa melalui jaringan komputer, misalnya melalui media perangkat penyimpanan sekunder seperti CD, DVD atau flashdisk. Namun cara seperti ini memiliki kekurangan terutama untuk file komputer yang sifatnya dinamis (sering mengalami perubahan) atau ketika pengirim dan penerima berada pada tempat yang berjauhan, misalnya berbeda kota maka pemindahan file dari satu komputer ke komputer yang lain dengan menggunakan media penyimpanan sekunder akan membutuhkan waktu cukup lama. Berangkat dari kebutuhan inilah maka para ahli jaringan komputer memikirkan suatu protokol yang memungkinkan satu komputer mengirimkan dan atau menerima data dari komputer yang lain melalui jaringan komputer sehingga kekurangan 44 45 Hendy Djaja Siswaja/ Pembuatan FTP Server pada Server Redhat 4 dengan VSFTPD dalam pembagian file melalui media penyimpanan sekunder dapat teratasi.
    [Show full text]
  • Virtual Environment for Ipv6 Analysis
    Virtual Environment for IPv6 Analysis ____________________________ Ricardo Alexander Saladrigas Advisor: Dr. Anna Calveras Barcelona DEDICATION To my parents, for giving me opportunities of immeasurable value and supporting me and my farfetched ideas. To my near family, for their accumulated efforts of improving our collective life. And to Maria Alexandra Siso, Robert Baumgartner, Alyssa Juday and Marc Ramirez for keeping me sane. i ACKNOWLEDGMENTS I extend my gratitude to everyone that has made my work possible. I express my thanks to the communities of VirtualBox, StackOverflow, ServerFault and Ubuntu Help as well as the Reddit communities for Linux and Networking for answering all my technical questions in detail and without prejudice I would like to thank Dr Anna Calveras for her guidance and patience. ii RESUMEN Nuestro objetivo fue la creación de una red compuesta de máquinas virtuales conectadas de forma específica a través de interfaces virtuales y con una seria de protocolos pre configurados que permiten la fácil creación de túneles IPv6 y traductores IPv6 a IPv4. Esta red les permitirá a profesores y estudiantes analizar y observar trafico IPv6 real sin la necesidad de una red física. La red está compuesta de múltiples Máquinas Virtuales Ubuntu y una Máquina Virtual Windows 7. La red puede ser fácilmente instalada en un ordenador corriendo Ubuntu o una distribución basada en Ubuntu. Un USB arrancable fue desarrollado para usar la red en un ordenador sin la necesidad de una instalación o de un sistema operativo especifico. Todas las máquinas virtuales Linux pueden fácilmente ser controladas a través de una terminal sin necesidad de clave utilizando una serie de scripts.
    [Show full text]
  • Fedora 16 System Administrator's Guide
    Fedora 16 System Administrator's Guide Deployment, Configuration, and Administration of Fedora 16 Jaromír Hradílek Douglas Silas Martin Prpič Eva Kopalová Eliška Slobodová Tomáš Čapek Petr Kovář Miroslav Svoboda System Administrator's Guide John Ha David O'Brien Michael Hideo Don Domingo Fedora 16 System Administrator's Guide Deployment, Configuration, and Administration of Fedora 16 Edition 1 Author Jaromír Hradílek [email protected] Author Douglas Silas [email protected] Author Martin Prpič [email protected] Author Eva Kopalová [email protected] Author Eliška Slobodová [email protected] Author Tomáš Čapek [email protected] Author Petr Kovář [email protected] Author Miroslav Svoboda [email protected] Author John Ha Author David O'Brien Author Michael Hideo Author Don Domingo Copyright © 2011 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
    [Show full text]
  • Ubuntu Server Guide Basic Installation Preparing to Install
    Ubuntu Server Guide Welcome to the Ubuntu Server Guide! This site includes information on using Ubuntu Server for the latest LTS release, Ubuntu 20.04 LTS (Focal Fossa). For an offline version as well as versions for previous releases see below. Improving the Documentation If you find any errors or have suggestions for improvements to pages, please use the link at thebottomof each topic titled: “Help improve this document in the forum.” This link will take you to the Server Discourse forum for the specific page you are viewing. There you can share your comments or let us know aboutbugs with any page. PDFs and Previous Releases Below are links to the previous Ubuntu Server release server guides as well as an offline copy of the current version of this site: Ubuntu 20.04 LTS (Focal Fossa): PDF Ubuntu 18.04 LTS (Bionic Beaver): Web and PDF Ubuntu 16.04 LTS (Xenial Xerus): Web and PDF Support There are a couple of different ways that the Ubuntu Server edition is supported: commercial support and community support. The main commercial support (and development funding) is available from Canonical, Ltd. They supply reasonably- priced support contracts on a per desktop or per-server basis. For more information see the Ubuntu Advantage page. Community support is also provided by dedicated individuals and companies that wish to make Ubuntu the best distribution possible. Support is provided through multiple mailing lists, IRC channels, forums, blogs, wikis, etc. The large amount of information available can be overwhelming, but a good search engine query can usually provide an answer to your questions.
    [Show full text]
  • Centos 5.5 VSFTPD (Very Secure FTP Server) JHON FREDY
    CentOS 5.5 VSFTPD (Very Secure FTP server) JHON FREDY HERRERA SERVICIOS DE RED Manual Step by Step COLOMBIA (MEDELLIN) 2010 Mind Wide Open™ BLOG – http://jfherrera.wordpress.com VSFTPD & Virtual Users | CentOS 5.5 GROUP | “???” INDICE Objetivo ............................................................................................................................... 3 Topología ............................................................................................................................. 4 Tabla de direccionamiento .................................................................................................... 6 VSFTPD ................................................................................................................................. 7 VSFTPD & Usuarios virtuales ................................................................................................. 8 VSFTPD ....................................................................................................................................................... 8 Bibliografía ......................................................................................................................... 29 MiNdWiDe - Group 2 Mind Wide Open™ BLOG – http://jfherrera.wordpress.com VSFTPD & Virtual Users | CentOS 5.5 GROUP | “???” Objetivo Realizar la instalación y configuración de FTP en CentOS permitiendo la administración de los usuarios en una base de datos local permitiendo así la creación de usuarios virtuales. MiNdWiDe - Group 3 Mind Wide Open™ BLOG
    [Show full text]
  • Enterprise Linux Network Services (GL275) H7092S This Is an Expansive Course Covering a Wide Range of Network H7092S HPE Course Number Services
    Course data sheet Enterprise Linux Network Services (GL275) H7092S This is an expansive course covering a wide range of network H7092S HPE course number services. Attention is paid to the concepts needed to Course length 5 days implement and troubleshoot the network services securely Delivery mode ILT, VILT and to provide extensive hands-on experience. Topics include View schedule, local View now pricing, and register security with SELinux and Netfilter, DNS concepts and View related courses View now implementation with Bind, LDAP concepts and implementation using OpenLDAP, web services with Apache, FTP with vsftpd, caching, filtering proxies with Squid, SMB/CIFS (Windows® networking) with Samba, and email concepts and implementation with Postfix combined with either Dovecot or Cyrus. Audience Course objectives Why HPE Education Services? • IDC MarketScape leader 5 years running • New Linux system administrators At the conclusion of this course, you should be for IT education and training* able to: • Recognized by IDC for leading with global coverage, unmatched technical Prerequisites • Gain the knowledge and skills required to expertise, and targeted education setup, configure, and manage the most consulting services* • UNIX® Fundamentals (51434S) or popular network services available for • Key partnerships with industry leaders Red Hat and SUSE Linux systems OpenStack®, VMware®, Linux®, Microsoft®, • Linux Fundamentals (U8583S) and ITIL, PMI, CSA, and SUSE • Enterprise Linux Systems Administration • Complete continuum of training delivery
    [Show full text]
  • An Overview of Red Hat Linux
    Chapter 1 An Overview of Red Hat Linux In This Chapter • Introducing Red Hat Linux • What is Linux? • Linux’s roots in UNIX • Common Linux features • Primary advantages of Linux • What is Red Hat Linux? • Why choose Red Hat Linux? • The culture of free software Linux was a phenomenon waiting to happen. The computer industry suffered from a rift. In the 1980s and 1990s, people had to choose between inexpensive, market-driven PC operating systems from Microsoft and expensive, technology-driven operating systems such as UNIX. Free software was being created all over the world, but lacked a common platform to rally around. Linux has become that common platform. For several years, Red Hat Linux has been the most popular commercial distribution of Linux. With the latest versions of Red Hat Linux (reflected in the Fedora Core and Red Hat Enterprise Linux distributions), Red Hat, Inc. has taken steps to offer both free-flowing community versions and well-supported commercial versions of Red Hat Linux. NOTE: Because of significant overlap between Fedora Core and Red Hat Enterprise Linux, I use the term Red Hat Linux to refer to technology in both distributions. If software I describe is missing (primarily from Enterprise, which doesn't include many games and personal software), you can add the software later. Check your CDs, then check yum repositories described in Chapter 5 to find software RPMs. Introducing Red Hat Linux With the recent split between community (Fedora) and commercial (Red Hat Enterprise Linux) versions of Red Hat Linux, Red Hat has created a model that can suit the fast-paced changes in the open source world, while still meeting the demands for a well-supported 4 Part I: Getting Started in Red Hat Linux commercial Linux distribution.
    [Show full text]
  • Service-Fingerprinting Mittels Fuzzing (Mai 2009) 1
    Service-Fingerprinting mittels Fuzzing (Mai 2009) 1 Service-Fingerprinting mittels Fuzzing Michael Hanspach1 · Ralf Schumann1 Stefan Schemmer2 · Sebastian Vandersee2 1Fachhochschule der Wirtschaft FHDW, Bergisch Gladbach 2rt-solutions.de GmbH, Köln Zusammenfassung Für die Durchführung effektiver Penetrationstests ist die Identifizierung von Diensten (Services) und Applikationen auf den Zielsystemen, das sogenannte Service-Fingerprinting, von zentraler Bedeutung. Ziel dieses Beitrags ist es, mögliche Verbesserungspotentiale bestehender Fingerprinting-Tools zu beleuchten. Dies soll durch Einsatz von Mutation-Based Fuzzing zwecks einfacher und automatischer Erzeugung von Fingerprints erreicht werden. Durch Versenden der so präparierten Anfragen an bestimmte Dienste und Dienstversionen sollen subtile Unterschiede in den Antwortnachrichten erfasst werden, die Identifizierungs- und Unterscheidungsmerkmale bilden. Für den Nachweis der Praxistauglichkeit des Fuzzing-basierten Ansatzes und zum Vergleich mit bereits bestehenden Methoden und Tools wird eine Implementierung zum Fingerprinting von FTP- Servern vorgestellt. Im Ergebnis dieses Beitrags wird aufgezeigt, dass Fuzzing als Grundlage für das Service- Fingerprinting geeignet und sogar in Teilen den bestehenden Ansätzen, insbesondere bei der Unterscheidung von Versionen einzelner Dienste, überlegen ist. 1 Einleitung Im Hinblick auf die IT-Compliance von Unternehmen kommt der Informationssicherheit eine herausragende Bedeutung zu. In diesem Kontext stellen Penetrationstests eine wichtige Maßnahme
    [Show full text]
  • An Introduction to Securing Linux with Apache, Proftpd, and Samba by Zach Riggle
    Originally published in issue 1 of (IN)SECURE Magazine, get it for free in PDF format at www.insecuremag.com An Introduction to Securing Linux with Apache, ProFTPd, and Samba by Zach Riggle While the vast majority of Linux users are hard-core techies, some may be using Linux because they want to try something new, are interested in the technology, or simply cannot afford or do not want to use Microsoft Windows. After becoming acquainted with the new interface of Linux, whether KDE, Gnome, or another window manager, users may begin to explore their system. Many machines come with default installations of Apache and Samba, and a few others even include a FTP daemon. While these services may be disabled by default, some users may be inclined to use these programs. This article is a brief, but in-depth tutorial on how to keep these applications up-to-date and secure. 1. Installation First off, we’ll help out those that do not have the proper software installed. Your particular distribution of Linux may include a software management system that allows for easy installation of new software (i.e. YaST for SuSE, RPM for RedHat, and Slackpkg for Slackware). Many others feel more comfortable compiling software. Compiling is the feeding of programming code to a compiler program, which in turn creates the actual programs, or binaries, that the user actually runs. If you feel more comfortable using your Linux distribution’s custom software management, then feel free to get the software that way. If it is either not offered, or you wish to try your hand at or already know how to compile, read on.
    [Show full text]
  • PDF and Paper Editions, This Manual Uses Typefaces Drawn from the Liberation Fonts2 Set
    Fedora 25 System Administrator's Guide Deployment, Configuration, and Administration of Fedora 25 Stephen Wadeley Jaromír Hradílek Petr Bokoč Petr Kovář Tomáš Čapek Douglas Silas Martin Prpič Eliška Slobodová System Administrator's Guide Draft Miroslav Svoboda John Ha David O'Brien Michael Hideo Don Domingo Draft Fedora 25 System Administrator's Guide Deployment, Configuration, and Administration of Fedora 25 Edition 1 Author Stephen Wadeley [email protected] Author Jaromír Hradílek [email protected] Author Petr Bokoč [email protected] Author Petr Kovář [email protected] Author Tomáš Čapek [email protected] Author Douglas Silas [email protected] Author Martin Prpič Author Eliška Slobodová Author Miroslav Svoboda Author John Ha Author David O'Brien Author Michael Hideo Author Don Domingo Copyright © 2016 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
    [Show full text]