From 1429230b916ca7e2a850c068fd58938700e8d3ec Mon Sep 17 00:00:00 2001 From: Jet Hughes Date: Mon, 20 Mar 2023 09:39:23 +1300 Subject: [PATCH] vault backup: 2023-03-20 09:39:23 --- .../notes/06-network-system-administration.md | 48 ++++++++++++++++++- content/notes/07-system-installation.md | 18 +++++++ content/notes/cosc-301.md | 2 +- 3 files changed, 65 insertions(+), 3 deletions(-) diff --git a/content/notes/06-network-system-administration.md b/content/notes/06-network-system-administration.md index ae70752e0..0c0d3277a 100644 --- a/content/notes/06-network-system-administration.md +++ b/content/notes/06-network-system-administration.md @@ -5,6 +5,9 @@ tags: - cosc301 --- +> [!DANGER] need to study this and watch lecture + + security awareness - physical and network attacks @@ -72,6 +75,7 @@ User Management - Paths and prompts - Keep a copy of your shell scripts (initial setups) in order to survive them from upgrade of OS/software - For more detailed info, man bash + - Password - Very important for security - Should not be names of persons, books, places, your computer, nor your phone number, birthday, car registration plate, login name, words in dictionaries, keyboard sequence @@ -87,5 +91,45 @@ User Management - video:x:33:hzy,paul,kai - Group name:password:group id;list of members -- Remove a user: deluser – The relevant lines from /etc/passwd, /etc/group, and /etc/shadow will be removed. – It is a good idea to first disable the account before you start removing stuff -- Disable a user temporarily – A better way when you are not sure if a user will come back – Way 1: Put an * in the password field of /etc/shadow – Way 2: use passwd -{l|u} username – Way 3: Change the login shell to a script file \ No newline at end of file +- Remove a user: deluser + - The relevant lines from /etc/passwd, /etc/group, and /etc/shadow will be removed. + - It is a good idea to first disable the account before you start removing stuff +- Disable a user temporarily + - A better way when you are not sure if a user will come back + - Way 1: Put an * in the password field of /etc/shadow + - Way 2: use passwd -{l|u} username + - Way 3: Change the login shell to a script file + + +User Account +- How to manage user accounts on different computers? + - Share home directory using NFS + - Share passwords using NIS (Network Information System) or LDAP (lightweight directory access protocol) + - Allocate an Email server + - Directory services like LDAP +- How to remember different passwords for different accounts on different computers? +- + +- Control user resources + - Disk space + - Separate disk partition for problem users + - Use df command to monitor space + - Quotas and limits + - Better not to put them on users until necessary + - Check limits.conf under /etc/security + - Killing old processes: kill + - Don’t do it unless you are absolutely sure +- Account policy + - Who shouldn’t have a user code? + - How to deal with weak passwords? + +User Support +- User support services + - cshelp +- User training and well-being +- How to treat the users? + - Your adversaries? + - Your friends? + - Your co-operators? + +friendly attitude \ No newline at end of file diff --git a/content/notes/07-system-installation.md b/content/notes/07-system-installation.md index 1db2ce49a..1f2cf5718 100644 --- a/content/notes/07-system-installation.md +++ b/content/notes/07-system-installation.md @@ -5,4 +5,22 @@ tags: - cosc301 --- +Installation of linux +- Major Linux distributions + - Ubuntu, Red Hat, Debian, Fedora, S.u.S.E., etc +- Why need to install? + - Copy Linux onto the hard disk + - Properly place the boot program, the Linux kernel, and startup scripts so that the computer can boot up from the hard disk +- Select an installation method + - CD-ROM + - NFS +Disk layout after installation +![Disk layout after installation](https://i.imgur.com/C3njX6h.png) + +BIOS or EFI +- BIOS (Basic I/O System) or EFI (Extensible Firmware Interface) + - A program that is written in ROM + - Provides the lowest level interface to peripheral devices and controls the first step of the boot procedure + - BIOS tests the system, looks for and checks peripherals and then looks for a device (floppy, hard disk, or CDROM) to use to boot the system + - Master Boot Record (MBR) is the sector that the BIOS reads in and starts when a hard disk is used to boot. \ No newline at end of file diff --git a/content/notes/cosc-301.md b/content/notes/cosc-301.md index 77d406d3e..39a270e1c 100644 --- a/content/notes/cosc-301.md +++ b/content/notes/cosc-301.md @@ -32,6 +32,6 @@ https://www.cs.otago.ac.nz/cosc301/schedule.php - [x] [[03-ipv6-bootcamp]] - [x] [[04-scripting-techniques]] - [x] [[05-filesystems]] -- [[06-network-system-administration]] +- [x] [[06-network-system-administration]] - [[07-system-installation]] # Info