mirror of
https://github.com/jackyzha0/quartz.git
synced 2026-03-24 15:05:42 -05:00
vault backup: 2023-03-20 09:39:23
This commit is contained in:
parent
d5a53001e0
commit
1429230b91
@ -5,6 +5,9 @@ tags:
|
|||||||
- cosc301
|
- cosc301
|
||||||
---
|
---
|
||||||
|
|
||||||
|
> [!DANGER] need to study this and watch lecture
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
security awareness
|
security awareness
|
||||||
- physical and network attacks
|
- physical and network attacks
|
||||||
@ -72,6 +75,7 @@ User Management
|
|||||||
- Paths and prompts
|
- Paths and prompts
|
||||||
- Keep a copy of your shell scripts (initial setups) in order to survive them from upgrade of OS/software
|
- Keep a copy of your shell scripts (initial setups) in order to survive them from upgrade of OS/software
|
||||||
- For more detailed info, man bash
|
- For more detailed info, man bash
|
||||||
|
|
||||||
- Password
|
- Password
|
||||||
- Very important for security
|
- Very important for security
|
||||||
- Should not be names of persons, books, places, your computer, nor your phone number, birthday, car registration plate, login name, words in dictionaries, keyboard sequence
|
- Should not be names of persons, books, places, your computer, nor your phone number, birthday, car registration plate, login name, words in dictionaries, keyboard sequence
|
||||||
@ -87,5 +91,45 @@ User Management
|
|||||||
- video:x:33:hzy,paul,kai
|
- video:x:33:hzy,paul,kai
|
||||||
- Group name:password:group id;list of members
|
- Group name:password:group id;list of members
|
||||||
|
|
||||||
- Remove a user: deluser – The relevant lines from /etc/passwd, /etc/group, and /etc/shadow will be removed. – It is a good idea to first disable the account before you start removing stuff
|
- Remove a user: deluser
|
||||||
- Disable a user temporarily – A better way when you are not sure if a user will come back – Way 1: Put an * in the password field of /etc/shadow – Way 2: use passwd -{l|u} username – Way 3: Change the login shell to a script file
|
- The relevant lines from /etc/passwd, /etc/group, and /etc/shadow will be removed.
|
||||||
|
- It is a good idea to first disable the account before you start removing stuff
|
||||||
|
- Disable a user temporarily
|
||||||
|
- A better way when you are not sure if a user will come back
|
||||||
|
- Way 1: Put an * in the password field of /etc/shadow
|
||||||
|
- Way 2: use passwd -{l|u} username
|
||||||
|
- Way 3: Change the login shell to a script file
|
||||||
|
|
||||||
|
|
||||||
|
User Account
|
||||||
|
- How to manage user accounts on different computers?
|
||||||
|
- Share home directory using NFS
|
||||||
|
- Share passwords using NIS (Network Information System) or LDAP (lightweight directory access protocol)
|
||||||
|
- Allocate an Email server
|
||||||
|
- Directory services like LDAP
|
||||||
|
- How to remember different passwords for different accounts on different computers?
|
||||||
|
-
|
||||||
|
|
||||||
|
- Control user resources
|
||||||
|
- Disk space
|
||||||
|
- Separate disk partition for problem users
|
||||||
|
- Use df command to monitor space
|
||||||
|
- Quotas and limits
|
||||||
|
- Better not to put them on users until necessary
|
||||||
|
- Check limits.conf under /etc/security
|
||||||
|
- Killing old processes: kill
|
||||||
|
- Don’t do it unless you are absolutely sure
|
||||||
|
- Account policy
|
||||||
|
- Who shouldn’t have a user code?
|
||||||
|
- How to deal with weak passwords?
|
||||||
|
|
||||||
|
User Support
|
||||||
|
- User support services
|
||||||
|
- cshelp
|
||||||
|
- User training and well-being
|
||||||
|
- How to treat the users?
|
||||||
|
- Your adversaries?
|
||||||
|
- Your friends?
|
||||||
|
- Your co-operators?
|
||||||
|
|
||||||
|
friendly attitude
|
||||||
@ -5,4 +5,22 @@ tags:
|
|||||||
- cosc301
|
- cosc301
|
||||||
---
|
---
|
||||||
|
|
||||||
|
Installation of linux
|
||||||
|
- Major Linux distributions
|
||||||
|
- Ubuntu, Red Hat, Debian, Fedora, S.u.S.E., etc
|
||||||
|
- Why need to install?
|
||||||
|
- Copy Linux onto the hard disk
|
||||||
|
- Properly place the boot program, the Linux kernel, and startup scripts so that the computer can boot up from the hard disk
|
||||||
|
- Select an installation method
|
||||||
|
- CD-ROM
|
||||||
|
- NFS
|
||||||
|
|
||||||
|
Disk layout after installation
|
||||||
|

|
||||||
|
|
||||||
|
BIOS or EFI
|
||||||
|
- BIOS (Basic I/O System) or EFI (Extensible Firmware Interface)
|
||||||
|
- A program that is written in ROM
|
||||||
|
- Provides the lowest level interface to peripheral devices and controls the first step of the boot procedure
|
||||||
|
- BIOS tests the system, looks for and checks peripherals and then looks for a device (floppy, hard disk, or CDROM) to use to boot the system
|
||||||
|
- Master Boot Record (MBR) is the sector that the BIOS reads in and starts when a hard disk is used to boot.
|
||||||
@ -32,6 +32,6 @@ https://www.cs.otago.ac.nz/cosc301/schedule.php
|
|||||||
- [x] [[03-ipv6-bootcamp]]
|
- [x] [[03-ipv6-bootcamp]]
|
||||||
- [x] [[04-scripting-techniques]]
|
- [x] [[04-scripting-techniques]]
|
||||||
- [x] [[05-filesystems]]
|
- [x] [[05-filesystems]]
|
||||||
- [[06-network-system-administration]]
|
- [x] [[06-network-system-administration]]
|
||||||
- [[07-system-installation]]
|
- [[07-system-installation]]
|
||||||
# Info
|
# Info
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user