1 Introduction to GNU/Linux & TCP/IP Basics

Size: px
Start display at page:

Download "1 Introduction to GNU/Linux & TCP/IP Basics"

Transcription

1 2 Toegepaste Informatica, reeks 1B Computernetwerken, deel 2 Opdracht: Oplossingen Labo s Student: Y. Reekmans 1 Introduction to GNU/Linux & TCP/IP Basics Server: debbie.nwlab.khleuven.be Port: Exercises Opdracht 2 man ls man cp man rm man mv... mkdir - p exercise/dir1/dir4 touch excercise/dir1/dir4/file4 touch exercise/dir1/file3 mkdir exercise/dir2 mkdir exercise/dir3 touch exercise/file1 touch exercise/file2 rm -r exercise du -h /var Text editing Opdracht 7 vi me.txt <i> Joske Vermeulen <esc> :wq pg. 1 van 10 KHLeuven, dept. G&T, 2TI

2 Opdracht 8 cp me.txt we.txt vi we.txt <i> Meer namen <esc> :wq Network commands Opdracht 9 ifconfig 0 ping -c 10 1 traceroute 2 netstat -tl 3 netstat 6 nc -l -p nc localhost nc -l -p Firefox: debbie: pg. 2 van 10 KHLeuven, dept. G&T, 2TI

3 2 Introduction to GNU/Linux 2 Your homedirectory pscp -P @debbie.nwlab.khleuven.be:test.txt C:\ pscp -P C:\test.txt @debbie.nwlab.khleuven.be:test.txt Permissions Opdracht 2 chmod u=rwx,g=rwx,o=rwx file1 chmod u=rw,g=r,o=r file2 chmod u=rw,g=,o= file3... of ook: chmod 777 file1 chmod 644 file2 chmod 600 file3... mkdir public chmod 755 public Neen, de permissies zijn niet overgedragen op de kopie. Door het gebruiken van de -p flag: cp -p file file_copy history less Improving efficiently Opdracht 6 less /.bash_history history Opdracht 9 touch file_$(date +%Y.%m.%d) 0 alias dua='du --max-depth=1 -B KB;du --max-depth=1 -B MB;du --max-depth=1 -B GB' dua pg. 3 van 10 KHLeuven, dept. G&T, 2TI

4 3 Introduction to GNU/Linux 3 man sort man head man tail... User 1: - mkfifo /tmp/pipe - cat > /tmp/pipe User 2: - cat /tmp/pipe User 1: rm /tmp/pipe echo "text1" > file1.txt;echo "text2" > file2.txt;cat file1.txt file2.txt > file3.txt ls -l grep -v rwx Opdracht 6 cat /usr/share/dict/dutch grep rare Opdracht 7 ls -l tr -s ' ' cut -d ' ' -f1,8 Opdracht 8 cat /usr/share/dict/dutch grep rare sort -d -r Applied exercises Opdracht 9 last.log cat last.log grep -E 'ˆ([0-9]{6})' cut -d ' ' -f1 sort -u wc -l cat last.log grep -E 'ˆ([0-9]{6})' cut -d ' ' -f1 sort uniq -c sort -nr head -n 1 cat last.log grep -E 'ˆ([0-9]{6})' tr -s ' ' cut -d ' ' -f1,10 sort -k 2 -r head -n 5 0 ftpd.log pg. 4 van 10 KHLeuven, dept. G&T, 2TI

5 cat ftpd.log wc -l cat ftpd.log grep "Feb" grep "RETR " cut -d "\"" -f2 cut -d " " -f2 cat ftpd.log grep "USER usery" wc -l cat ftpd.log grep "Feb" grep "USER usery" cut -d " " -f1 sort uniq A bruteforce attack checking common used logins Nope traceroute DSL bb.netvision.net.il (Israel --> Provider netvision -->...) cat ftpd.log grep "06/Feb" grep "netvision.net" grep "USER " cut -d "\"" -f2 cut -d " " cat ftpd.log grep "06/Feb" grep "netvision.net" grep "PASS " wc -l cat ftpd.log cut -d " " -f1 sort uniq -c sort -nr head -n 10 1 portscan tcpdump.log and portscan firewalled tcpdump.log Checking on every port (udp/tcp) of a connection whether it is open or not Attacker: & Victim: cat portscan_tcpdump.log grep ack cut -d " " -f3 cut -d "." -f5 sort -n 2 apache google.log Visits from google's bot and those from regular users using google as search engine Bot(cat apache_google.log grep "bot" wc -l): Regular(cat apache_google.log grep -v "bot" wc -l): (cat apache_google.log grep "bot" cut -d " " -f1 sort uniq wc -l) None cat apache_google.log grep -v "bot" cut -d "\"" -f4 cut -d "/" -f pg. 5 van 10 KHLeuven, dept. G&T, 2TI

6 4 Regular Expressions grep -E '[aeiou]{4,5}' /usr/share/dict/dutch Opdracht 2 grep -E "([0-9]{1,3}[\.,-]){4}\.*\.*" ftpd.log grep -oe "Firefox/2.0.0.([0-9])*" apache_google.log sort uniq grep -oe "Firefox/([0-9]+\.)*[0-9]" apache_google.log sort uniq grep -E 'ˆver(.)*en$' /usr/share/dict/dutch wc -l grep -E 'ˆ[enrtiscau]{7}v[enrtiscau]{15}$' /usr/share/dict/dutch Opdracht 6 Correct? grep -E "ˆ([zrtypqsdfghjklmwxcvbn]?[aeiou]){2}*$" /usr/share/dict/dutch Opdracht 7?? pg. 6 van 10 KHLeuven, dept. G&T, 2TI

7 5 Extra practice cat /etc/debconf.conf grep -v '#' Opdracht 2 last -i grep -v "10." grep -v "root" grep -v " " wc -l last -i grep -v "10." grep -v "root" grep -v " " cut -d " " -f1 sort uniq so echo Time = $(date +"%H:%M:%S (%d/%m/%y)") date "+Time = %H:%M:%S (%d/%m/%y)" echo "Logged in users = $(who cut -d " " -f1 sort uniq wc -l)" Opdracht 6 echo "Open TCP connections = $(netstat -t wc -l)" Opdracht 7 echo "Free memory = $(free -m grep Mem: tr -s " " cut -d " " -f4) MB" Opdracht 8 echo "Free Disk Space = $(df / -B G grep / tr -s " " cut -d " " -f4)b" Opdracht 9 echo "CPU =$(cat /proc/cpuinfo grep "model name" cut -d ":" -f2)" 0 echo "System load = $(uptime tr -s " " cut -d " " -f9,10,11)" 1?? 2?? 3?? pg. 7 van 10 KHLeuven, dept. G&T, 2TI

8 ?? 5?? pg. 8 van 10 KHLeuven, dept. G&T, 2TI

9 6 Some Notes openssl enc -aes-128-cbc -in secret.txt -out secret.txt.aes openssl enc -d -aes-128-cbc -in secret.txt.aes openssl enc -des3 -in secret.txt -out secret.txt.aes openssl enc -d -des3 -in secret.txt.aes pg. 9 van 10 KHLeuven, dept. G&T, 2TI

10 7 Stappenplan gpg --gen-key Opdracht 2 bestandje maken Export your asciiencoded key to a file username.pub in your home directory, and make sure all other users can read this file (only read access of course!). gpg --output <file> --export < > (eigen ) Now import some keys from classmates: gpg --import <file> een bestand encrypteren: gpg --encrypt --armor --output <encrypted filename> --recipient < > Opdracht 6 Keys are identified by the corresponding address. If you look at this file, you will see it contains binary data1. To get the output in an ascii format, use the armor option: Opdracht 7 Decrypteren: gpg --decrypt --output <ontcijferd geencrypteerd> pg. 10 van 10 KHLeuven, dept. G&T, 2TI

ICS 351: Today's plan

ICS 351: Today's plan ICS 351: Today's plan routing protocols linux commands Routing protocols: overview maintaining the routing tables is very labor-intensive if done manually so routing tables are maintained automatically:

More information

CA and SSL Certificates

CA and SSL Certificates 1 For this exercise you must again be root. Login and obtain root privileges: sudo su 2 Create a working directory only accessible to root: mkdir ~/ca cd ~/ca chmod og rwx. 3 Install openssl if necessary

More information

Tutorial 0A Programming on the command line

Tutorial 0A Programming on the command line Tutorial 0A Programming on the command line Operating systems User Software Program 1 Program 2 Program n Operating System Hardware CPU Memory Disk Screen Keyboard Mouse 2 Operating systems Microsoft Apple

More information

Ciphermail Gateway Separate Front-end and Back-end Configuration Guide

Ciphermail Gateway Separate Front-end and Back-end Configuration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway Separate Front-end and Back-end Configuration Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction

More information

Introduction to Operating Systems

Introduction to Operating Systems Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these

More information

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons

More information

Command Line - Part 1

Command Line - Part 1 Command Line - Part 1 STAT 133 Gaston Sanchez Department of Statistics, UC Berkeley gastonsanchez.com github.com/gastonstat Course web: gastonsanchez.com/teaching/stat133 GUIs 2 Graphical User Interfaces

More information

An Introduction to the Linux Command Shell For Beginners

An Introduction to the Linux Command Shell For Beginners An Introduction to the Linux Command Shell For Beginners Presented by: Victor Gedris In Co-Operation With: The Ottawa Canada Linux Users Group and ExitCertified Copyright and Redistribution This manual

More information

A UNIX/Linux in a nutshell

A UNIX/Linux in a nutshell bergman p.1/23 A UNIX/Linux in a nutshell Introduction Linux/UNIX Tommi Bergman tommi.bergman[at]csc.fi Computational Environment & Application CSC IT center for science Ltd. Espoo, Finland bergman p.2/23

More information

Unix Sampler. PEOPLE whoami id who

Unix Sampler. PEOPLE whoami id who Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host

More information

Open Source Computational Fluid Dynamics

Open Source Computational Fluid Dynamics Open Source Computational Fluid Dynamics An MSc course to gain extended knowledge in Computational Fluid Dynamics (CFD) using open source software. Teachers: Miklós Balogh and Zoltán Hernádi Department

More information

Computer Forensics Process

Computer Forensics Process About term paper and course project! Primary objectives I expect that you can learn not only the knowledge but also the research approaches such that you can have a better preparation to start your own

More information

Linux command line. An introduction to the Linux command line for genomics. Susan Fairley

Linux command line. An introduction to the Linux command line for genomics. Susan Fairley Linux command line An introduction to the Linux command line for genomics Susan Fairley Aims Introduce the command line Provide an awareness of basic functionality Illustrate with some examples Provide

More information

An A-Z Index of the Apple OS X command line (TERMINAL) The tcsh command shell of Darwin (the open source core of OSX)

An A-Z Index of the Apple OS X command line (TERMINAL) The tcsh command shell of Darwin (the open source core of OSX) An A-Z Index of the Apple OS X command line (TERMINAL) The tcsh command shell of Darwin (the open source core of OSX) alias alloc awk Create an alias List used and free memory Find and Replace text within

More information

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo) EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...

More information

File Transfer Examples. Running commands on other computers and transferring files between computers

File Transfer Examples. Running commands on other computers and transferring files between computers Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you

More information

Linux System Administration on Red Hat

Linux System Administration on Red Hat Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,

More information

Basic Linux & Package Management. Original slides from GTFO Security

Basic Linux & Package Management. Original slides from GTFO Security Basic Linux & Package Management Original slides from GTFO Security outline Linux What it is? Commands Filesystem / Shell Package Management Services run on Linux mail dns web central authentication router

More information

Thirty Useful Unix Commands

Thirty Useful Unix Commands Leaflet U5 Thirty Useful Unix Commands Last revised April 1997 This leaflet contains basic information on thirty of the most frequently used Unix Commands. It is intended for Unix beginners who need a

More information

Partek Flow Installation Guide

Partek Flow Installation Guide Partek Flow Installation Guide Partek Flow is a web based application for genomic data analysis and visualization, which can be installed on a desktop computer, compute cluster or cloud. Users can access

More information

Single Node Hadoop Cluster Setup

Single Node Hadoop Cluster Setup Single Node Hadoop Cluster Setup This document describes how to create Hadoop Single Node cluster in just 30 Minutes on Amazon EC2 cloud. You will learn following topics. Click Here to watch these steps

More information

Introduction to Linux and Cluster Basics for the CCR General Computing Cluster

Introduction to Linux and Cluster Basics for the CCR General Computing Cluster Introduction to Linux and Cluster Basics for the CCR General Computing Cluster Cynthia Cornelius Center for Computational Research University at Buffalo, SUNY 701 Ellicott St Buffalo, NY 14203 Phone: 716-881-8959

More information

Internet Programming. Security

Internet Programming. Security Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures

More information

Birmingham Environment for Academic Research. Introduction to Linux Quick Reference Guide. Research Computing Team V1.0

Birmingham Environment for Academic Research. Introduction to Linux Quick Reference Guide. Research Computing Team V1.0 Birmingham Environment for Academic Research Introduction to Linux Quick Reference Guide Research Computing Team V1.0 Contents The Basics... 4 Directory / File Permissions... 5 Process Management... 6

More information

Command Line Crash Course For Unix

Command Line Crash Course For Unix Command Line Crash Course For Unix Controlling Your Computer From The Terminal Zed A. Shaw December 2011 Introduction How To Use This Course You cannot learn to do this from videos alone. You can learn

More information

Introduction to Running Hadoop on the High Performance Clusters at the Center for Computational Research

Introduction to Running Hadoop on the High Performance Clusters at the Center for Computational Research Introduction to Running Hadoop on the High Performance Clusters at the Center for Computational Research Cynthia Cornelius Center for Computational Research University at Buffalo, SUNY 701 Ellicott St

More information

To enable https for appliance

To enable https for appliance To enable https for appliance We have used openssl command to generate a key pair. The below image shows on how to generate key using the openssl command. SSH into appliance and login as root. Copy all

More information

Load Balancing/High Availability Configuration for neoninsight Server

Load Balancing/High Availability Configuration for neoninsight Server Load Balancing/High Availability Configuration for neoninsight Server Introduction: This document provides details on the configuration and the components used for a two node load balancing system with

More information

COMP 3704 Computer Security

COMP 3704 Computer Security COMP 3704 Computer Security Christian Grothoff christian@grothoff.org http://grothoff.org/christian/ 1 Key Size Consider how much the information is worth Even advancements in computing are not going to

More information

Training Day : Linux

Training Day : Linux Training Day : Linux Objectives At the end of the day, you will be able to use Linux command line in order to : Connect to «genotoul» server Use available tools Transfer files between server and desktop

More information

SECURE Web Gateway. HTTPS/SSL Technical FAQ. Version 1.1. Date 04/10/12

SECURE Web Gateway. HTTPS/SSL Technical FAQ. Version 1.1. Date 04/10/12 SECURE Web Gateway HTTPS/SSL Technical FAQ Version 1.1 Date 04/10/12 Introduction This Technical FAQ explains the operation of the HTTPS/SSL scanning and how it is deployed. How does the SECURE Web Gateway

More information

Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop

Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 14/01/05 file:/data/hervey/docs/pre-sanog/web/ha/security/apache-ssl-exercises.html #1 Exercises Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 1. Install Apache with SSL support 2. Configure

More information

Apache, SSL and Digital Signatures Using FreeBSD

Apache, SSL and Digital Signatures Using FreeBSD Apache, SSL and Digital Signatures Using FreeBSD AfNOG 2007 Unix System Administration April 26, 2007 Hervey Allen Network Startup Resource Center Some SSL background Invented by Netscape for secure commerce.

More information

Linux FTP Server Setup

Linux FTP Server Setup 17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started

More information

Introduction to HDFS. Prasanth Kothuri, CERN

Introduction to HDFS. Prasanth Kothuri, CERN Prasanth Kothuri, CERN 2 What s HDFS HDFS is a distributed file system that is fault tolerant, scalable and extremely easy to expand. HDFS is the primary distributed storage for Hadoop applications. Hadoop

More information

Unix/Linux Forensics 1

Unix/Linux Forensics 1 Unix/Linux Forensics 1 Simple Linux Commands date display the date ls list the files in the current directory more display files one screen at a time cat display the contents of a file wc displays lines,

More information

Linux Security Ideas and Tips

Linux Security Ideas and Tips Linux Security Ideas and Tips Hugh Brown Sr. Systems Administrator ITS Enterprise Infrastructure University of Iowa October 8, 2014 Hugh Brown (University of Iowa) Linux Security Ideas and Tips October

More information

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca Abstract TCP SYN flooding attack is a kind of denial-of-service attack. This SYN flooding attack is using the weakness

More information

STEP 4 : GETTING LIGHTTPD TO WORK ON YOUR SEAGATE GOFLEX SATELLITE

STEP 4 : GETTING LIGHTTPD TO WORK ON YOUR SEAGATE GOFLEX SATELLITE STEP 4 : GETTING LIGHTTPD TO WORK ON YOUR SEAGATE GOFLEX SATELLITE Note : Command Lines are in red. Congratulations on following all 3 steps. This is the final step you need to do to get rid of the old

More information

The objective of this lab is to learn how to set up an environment for running distributed Hadoop applications.

The objective of this lab is to learn how to set up an environment for running distributed Hadoop applications. Lab 9: Hadoop Development The objective of this lab is to learn how to set up an environment for running distributed Hadoop applications. Introduction Hadoop can be run in one of three modes: Standalone

More information

Symmetric and Public-key Crypto Due April 14 2015, 11:59PM

Symmetric and Public-key Crypto Due April 14 2015, 11:59PM CMSC 414 (Spring 2015) 1 Symmetric and Public-key Crypto Due April 14 2015, 11:59PM Updated April 11: see Piazza for a list of errata. Sections 1 4 are Copyright c 2006-2011 Wenliang Du, Syracuse University.

More information

How to Configure edgebox as a Web Server

How to Configure edgebox as a Web Server intelligence at the edge of the network www.critical-links.com edgebox V4.5 Introduction: The Web Server panel allows the simple creation of multiple web sites using the Apache web server. Each website

More information

Practical Network Forensics

Practical Network Forensics BCS-ISSG Practical Network Forensics Day BCS, London Practical Network Forensics Alan Woodroffe issg@securesystemssupport.co.uk www.securesystemssupport.co.uk Copyright Secure Systems Support Limited.

More information

An Information System

An Information System An Information System Module 1: Tutorials and Exercises Basics Software Setup Login in your machine cd $HOME/MyOpenLDAP chmod u+x setup.sh./setup.sh ./setup.sh (BDB setup) Prepare the Berkeley Database

More information

Distributed convex Belief Propagation Amazon EC2 Tutorial

Distributed convex Belief Propagation Amazon EC2 Tutorial 6/8/2011 Distributed convex Belief Propagation Amazon EC2 Tutorial Alexander G. Schwing, Tamir Hazan, Marc Pollefeys and Raquel Urtasun Distributed convex Belief Propagation Amazon EC2 Tutorial Introduction

More information

UNIX - FILE SYSTEM BASICS

UNIX - FILE SYSTEM BASICS http://www.tutorialspoint.com/unix/unix-file-system.htm UNIX - FILE SYSTEM BASICS Copyright tutorialspoint.com A file system is a logical collection of files on a partition or disk. A partition is a container

More information

Syntax: cd <Path> Or cd $<Custom/Standard Top Name>_TOP (In CAPS)

Syntax: cd <Path> Or cd $<Custom/Standard Top Name>_TOP (In CAPS) List of Useful Commands for UNIX SHELL Scripting We all are well aware of Unix Commands but still would like to walk you through some of the commands that we generally come across in our day to day task.

More information

APPLICATION NOTE. How to build pylon applications for ARM

APPLICATION NOTE. How to build pylon applications for ARM APPLICATION NOTE Version: 01 Language: 000 (English) Release Date: 31 January 2014 Application Note Table of Contents 1 Introduction... 2 2 Steps... 2 1 Introduction This document explains how pylon applications

More information

Experian Secure Transport Service

Experian Secure Transport Service Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport

More information

A candidate following a programme of learning leading to this unit will be able to:

A candidate following a programme of learning leading to this unit will be able to: Unit 24: Linux+ Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Demonstrate knowledge of planning the implementation Show knowledge of how to install

More information

Hacking Database for Owning your Data

Hacking Database for Owning your Data Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money

More information

Apache Security with SSL Using Ubuntu

Apache Security with SSL Using Ubuntu Apache Security with SSL Using Ubuntu These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background

More information

Security Workshop. Apache + SSL exercises in Ubuntu. 1 Install apache2 and enable SSL 2. 2 Generate a Local Certificate 2

Security Workshop. Apache + SSL exercises in Ubuntu. 1 Install apache2 and enable SSL 2. 2 Generate a Local Certificate 2 Security Workshop Apache + SSL exercises in Ubuntu Contents 1 Install apache2 and enable SSL 2 2 Generate a Local Certificate 2 3 Configure Apache to use the new certificate 4 4 Verify that http and https

More information

UNIX Basics. Ian Darwin TCP Informatics January, 2005. Presented from a Mac using Apple s Keynote presentation software

UNIX Basics. Ian Darwin TCP Informatics January, 2005. Presented from a Mac using Apple s Keynote presentation software UNIX Basics Ian Darwin TCP Informatics January, 2005 Presented from a Mac using Apple s Keynote presentation software 1 What is this about? Brief Introduction to UNIX - ideas - basic commands - some examples

More information

Running Kmeans Mapreduce code on Amazon AWS

Running Kmeans Mapreduce code on Amazon AWS Running Kmeans Mapreduce code on Amazon AWS Pseudo Code Input: Dataset D, Number of clusters k Output: Data points with cluster memberships Step 1: for iteration = 1 to MaxIterations do Step 2: Mapper:

More information

Installation and Deployment

Installation and Deployment Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats

More information

Kleine Linux-Tricks - schneller ohne Aufwand

Kleine Linux-Tricks - schneller ohne Aufwand Uli Martens uli@youam.net AIXpertenrunde 2008-12-12 Übersicht 1 2 3 4 hotkeys ALT-T exchange two arguments under the cursor (bash only) CTRL-T exchange two characters under the cursor (bash only) CTRL-L

More information

Cloud Storage Quick Start Guide

Cloud Storage Quick Start Guide Cloud Storage Quick Start Guide Copyright - GoGrid Cloud Hosting. All rights reserved Table of Contents 1. About Cloud Storage...3 2. Configuring RHEL and CentOS Servers to Access Cloud Storage...3 3.

More information

Get quick control over your Linux server with server commands

Get quick control over your Linux server with server commands Get quick control over your Linux server with server commands by Jack Wallen Linux is a powerful environment for both the desktop and server: Both systems have matured so any action can be managed with

More information

Introduction to HDFS. Prasanth Kothuri, CERN

Introduction to HDFS. Prasanth Kothuri, CERN Prasanth Kothuri, CERN 2 What s HDFS HDFS is a distributed file system that is fault tolerant, scalable and extremely easy to expand. HDFS is the primary distributed storage for Hadoop applications. HDFS

More information

GroundWork Monitor Open Source 5.1.0 Installation Guide

GroundWork Monitor Open Source 5.1.0 Installation Guide GroundWork Monitor Open Source 5.1 is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version

More information

Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems

Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems Module 9: Operating Systems Objective What is an operating system (OS)? OS kernel, and basic functions OS Examples: MS-DOS, MS Windows, Mac OS Unix/Linux Features of modern OS Graphical operating system

More information

UNIX / Linux commands Basic level. Magali COTTEVIEILLE - September 2009

UNIX / Linux commands Basic level. Magali COTTEVIEILLE - September 2009 UNIX / Linux commands Basic level Magali COTTEVIEILLE - September 2009 What is Linux? Linux is a UNIX system Free Open source Developped in 1991 by Linus Torvalds There are several Linux distributions:

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

FERMILAB CENTRAL WEB HOSTING SINGLE SIGN ON (SSO) ON CWS LINUX WITH SAML AND MOD_AUTH_MELLON

FERMILAB CENTRAL WEB HOSTING SINGLE SIGN ON (SSO) ON CWS LINUX WITH SAML AND MOD_AUTH_MELLON FERMILAB CENTRAL WEB HOSTING SINGLE SIGN ON (SSO) ON CWS LINUX WITH SAML AND MOD_AUTH_MELLON Contents Information and Security Contacts:... 3 1. Introduction... 4 2. Installing Module... 4 3. Create Metadata

More information

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in

More information

OpenGeo Suite for Linux Release 3.0

OpenGeo Suite for Linux Release 3.0 OpenGeo Suite for Linux Release 3.0 OpenGeo October 02, 2012 Contents 1 Installing OpenGeo Suite on Ubuntu i 1.1 Installing OpenGeo Suite Enterprise Edition............................... ii 1.2 Upgrading.................................................

More information

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical

More information

Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012

Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012 Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012 1 The person installing the VC is knowledgeable of the Linux file system

More information

A Tiny Queuing System for Blast Servers

A Tiny Queuing System for Blast Servers A Tiny Queuing System for Blast Servers Colas Schretter and Laurent Gatto December 9, 2005 Introduction When multiple Blast [4] similarity searches are run simultaneously against large databases and no

More information

Secure Shell. The Protocol

Secure Shell. The Protocol Usually referred to as ssh The name is used for both the program and the protocol ssh is an extremely versatile network program data encryption and compression terminal access to remote host file transfer

More information

What is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting

What is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting Version 1.6 1 1 1 2 2 8 8 9 9 9 What is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting your Installation Managing

More information

FINFISHER: FinFly ISP 2.0 Infrastructure Product Training

FINFISHER: FinFly ISP 2.0 Infrastructure Product Training 1 FINFISHER: FinFly ISP 2.0 Infrastructure Product Training Table of content 2 1. Introduction 2. The infrastructure - ADMF Client and Infection GUI - Administration: ADMF - iproxy: NDP01/02 - Radius Probe:

More information

HPCC USER S GUIDE. Version 1.2 July 2012. IITS (Research Support) Singapore Management University. IITS, Singapore Management University Page 1 of 35

HPCC USER S GUIDE. Version 1.2 July 2012. IITS (Research Support) Singapore Management University. IITS, Singapore Management University Page 1 of 35 HPCC USER S GUIDE Version 1.2 July 2012 IITS (Research Support) Singapore Management University IITS, Singapore Management University Page 1 of 35 Revision History Version 1.0 (27 June 2012): - Modified

More information

Locking Down Files With Encrypted File System

Locking Down Files With Encrypted File System Page 1 of 6 close window Locking Down Files With Encrypted File System August September 2008 by Jaqui Lynch In October 2007 I outlined some of the new security features in AIX* version 6.1. This article

More information

First Steps. Remote Access Gateway IGW/922. with DIL/NetPC ADNP/9200

First Steps. Remote Access Gateway IGW/922. with DIL/NetPC ADNP/9200 Remote Access Gateway IGW/922 with DIL/NetPC ADNP/9200 First Steps SSV Embedded Systems Dünenweg 5 D-30419 Hannover Phone: +49 (0)511/40 000-0 Fax: +49 (0)511/40 000-40 E-mail: sales@ssv-embedded.de Document

More information

INASP: Effective Network Management Workshops

INASP: Effective Network Management Workshops INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network

More information

Set up and run your own Cesidian Root DNS server

Set up and run your own Cesidian Root DNS server Set up and run your own Cesidian Root DNS server How-to for Debian 6.0, bind9 and IPv4 Cesidian Root website http://cesidianroot.net/ Last change 13.02.2012 Author Contact Patrick Jansen Administrator

More information

Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08

Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08 Technical Note Secure File Transfer Installation Sender Recipient Attached FIles Pages Date Development Internal/External None 11 6/23/08 Overview This document explains how to install OpenSSH for Secure

More information

Radware Security Research. Reverse Engineering a Sophisticated DDoS Attack Bot. Author: Zeev Ravid

Radware Security Research. Reverse Engineering a Sophisticated DDoS Attack Bot. Author: Zeev Ravid Reverse Engineering a Sophisticated DDoS Attack Bot Author: Zeev Ravid July 2015 Introduction In July 2015, Radware s Emergency Response Team (ERT) noticed a significant increased usage of the Tsunami

More information

RapidSeed for Replicating Systems Version 7.4

RapidSeed for Replicating Systems Version 7.4 RapidSeed for Replicating Systems Version 7.4 7 Technology Circle, Suite 100 Columbia, SC 29203 Phone: 803.454.0300 Contents Overview...3 Supported seed devices by system...4 Prerequisites...4 General

More information

How to simulate network devices using the Verax SNMP Simulator (Linux/Windows)

How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) Table of contents Abstract... 3 1. Verax SNMP Simulator installation... 4 2. Extracting SNMP record files from a physical

More information

GeBro-BACKUP. Die Online-Datensicherung. Manual Pro Backup Client on a NAS

GeBro-BACKUP. Die Online-Datensicherung. Manual Pro Backup Client on a NAS GeBro-BACKUP Die Online-Datensicherung. Manual Pro Backup Client on a NAS Created and tested on a QNAP TS-559 Pro Firmware 4.0.2 Intel x86 Architecture Default hardware configuration OBM v6.15.0.0 Last

More information

Higher National Unit Specification. General information for centres. Multi User Operating Systems. Unit code: DH3A 34

Higher National Unit Specification. General information for centres. Multi User Operating Systems. Unit code: DH3A 34 Higher National Unit Specification General information for centres Unit code: DH3A 34 Unit purpose: This Unit is designed to provide candidates with a practical introduction to, and understanding of, the

More information

Agenda. Using HPC Wales 2

Agenda. Using HPC Wales 2 Using HPC Wales Agenda Infrastructure : An Overview of our Infrastructure Logging in : Command Line Interface and File Transfer Linux Basics : Commands and Text Editors Using Modules : Managing Software

More information

Although Mac OS X is primarily known for its GUI, the under pinnings are all Unix. This

Although Mac OS X is primarily known for its GUI, the under pinnings are all Unix. This BE Computing Web Tutorials: Server Commands Server Commands Indluded: 1. Basic Command Line Tutorial Although Mac OS X is primarily known for its GUI, the underpinnings are all Unix. This tutorial will

More information

BASIC TCP/IP NETWORKING

BASIC TCP/IP NETWORKING ch01 11/19/99 4:20 PM Page 1 CHAPTER 1 BASIC TCP/IP NETWORKING When you communicate to someone or something else, you need to be able to speak a language that the listener understands. Networking requires

More information

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8 Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 22 About this document This document provides release notes for Snare Enterprise Epilog for Windows release

More information

[ X OR DDoS T h r e a t A d v i sory] akamai.com

[ X OR DDoS T h r e a t A d v i sory] akamai.com [ X OR DDoS T h r e a t A d v i sory] akamai.com What is the XOR DDoS threat The XOR DDoS botnet has produced DDoS attacks from a few Gbps to 150+ Gbps The gaming sector has been the primary target, followed

More information

Some Tools for Computer Security Incident Response Team (CSIRT)

Some Tools for Computer Security Incident Response Team (CSIRT) Some Tools for Computer Security Incident Response Team (CSIRT) AfNOG 12 30 th May 2011 10 th June 2011 Tanzania By Marcus K. G. Adomey Overview Some Unix Commands Some Selected Tools Snort AirSnort hping

More information

How to Backup XenServer VM with VirtualIQ

How to Backup XenServer VM with VirtualIQ How to Backup XenServer VM with VirtualIQ 1. Using Live Backup of VM option: Live Backup: This option can be used, if user does not want to power off the VM during the backup operation. This approach takes

More information

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com info@1and1.com August 2015 Copyright 2015 1&1

More information

SSL Tunnels. Introduction

SSL Tunnels. Introduction SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,

More information

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder. CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files

More information

Installing and Configuring Nessus by Nitesh Dhanjani

Installing and Configuring Nessus by Nitesh Dhanjani Unless you've been living under a rock for the past few years, it is quite evident that software vulnerabilities are being found and announced quicker than ever before. Every time a security advisory goes

More information

IBM Software Hadoop Fundamentals

IBM Software Hadoop Fundamentals Hadoop Fundamentals Unit 2: Hadoop Architecture Copyright IBM Corporation, 2014 US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

More information

Managing SAS Web Infrastructure Platform Data Server High-Availability Clusters

Managing SAS Web Infrastructure Platform Data Server High-Availability Clusters ABSTRACT Paper SAS1776-2015 Managing SAS Web Infrastructure Platform Data Server High-Availability Clusters Ken Young, SAS Institute Inc. The SAS Web Application Server is a lightweight server that provides

More information

Large system usage HOW TO. George Magklaras PhD Biotek/NCMM IT USIT Research Computing Services

Large system usage HOW TO. George Magklaras PhD Biotek/NCMM IT USIT Research Computing Services Large system usage HOW TO George Magklaras PhD Biotek/NCMM IT USIT Research Computing Services Agenda Introduction: A Linux server as a collection of memory/disk/cpu What is the problem? memory and SWAP

More information

Configuring MailArchiva with Insight Server

Configuring MailArchiva with Insight Server Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any

More information