Nt1430

In: Computers and Technology

Submitted By mrfileman
Words 464
Pages 2
Unit 5

Ch 18 end of chapter questions/exercises #1 -4 , #6.

1. What is the difference between scp and sftp utilities?
The SCP (secure copy) utility copies an ordinary or directory file from one system to another on a network SFTP is a secure FTP Client.

2. How can you use ssh to find out who is logged inon a remote system?
Assuming you have the same username on both systems, the following command may prompt you for your password on the remote system and displays the output of who:
$ ssh host who 3. How would you use scp to copy your ~/.bashrc file from the system named plum to the local system?
Scp user@bravo:-r your@home:blank 4. How would you use SSH to run xterm on plum and show the display on the local system?
Assuming you have the same username on both systems and an X11 server running locally, the following command runs xterm on plum and presents the display on the local system:
$ ssh plum xterm
You need to use the –Y option if trusted X11 forwarding is not enabled.
6. When you try to connect to another system using an OpenSSH client and you see a message warning you that the remote host identification has changed, what has happened? What should you do?
This message indicates that the fingerprint of the remote system is not the same as the local system remembers it. Check with the remote system’s administrator to find out if something changed. If everything seems to be in order, remove the remote system’s key from the file specified in the error message and try logging in on the remote system using ssh. You can use ssh-keygen with the –R option followed by the name of the remote system to remove hashed entries. The system will display the first-time authentication message (page 6) again as OpenSSH verifies that you are connecting to the correct system.

Ch 20 end of chapter questions/exercises #6, #9

6. Describe the…...

Similar Documents

Nt1430 Unit 2 Lab Procedure

...------------------------------------------------- [fred@localhost ~]$ cd ------------------------------------------------- [fred@localhost ~]$ pwd ------------------------------------------------- /home/fred ------------------------------------------------- [fred@localhost ~]$ mkdir NT1430 ------------------------------------------------- [fred@localhost ~]$ cd NT1430 ------------------------------------------------- [fred@localhost NT1430]$ (cont’d) 3. Next, in order to organize your work, create subdirectories for each of the 10 Units in the course. We can automate this process a bit by using brace expansion. For information about this technique, see the info page for bash. Note: There are no spaces in the first command except between the mkdir command & file name. ------------------------------------------------- [fred@localhost NT1430]$ mkdir Unit{02,03,04,05,06,07,08,09,10} ------------------------------------------------- [fred@localhost NT1430]$ ls ------------------------------------------------- Unit02 Unit04 Unit06 Unit08 Unit10 ------------------------------------------------- Unit03 Unit05 Unit07 Unit09 ------------------------------------------------- fred[fred@localhost NT1430]$ 4. Now we will change directories to Unit02 and use vim to create a text file called LastnameF-Lab2.txt replacing LastnameF with your last name and first initial. ------------------------------------------------- [fred@localhost......

Words: 1532 - Pages: 7

Research Paper Nt1430

...Matt Moore NT1430 5-30-13 Research Paper When it comes to IPv6 there are a lot of topics that can be discussed. It will change the Internet forever as we know it. IPv4 is the fourth version of protocol using a 32 bit address space whereas IPv6 will be using 128 bits of hexadecimal addressing to allow for drastically more addresses. Currently IPv4 allows roughly 4,294,967,296 possible addresses and with the current allocation practices it limits the number of public address to a few hundred million. In contrast, the 128 bit address space that IPv6 uses can provide roughly 3.4 x 1038 possible addresses. The sheer size of the IPv6 address allows for the subdividing of the address into a hierarchical routing structure that in turn can reflect the current topology of the Internet. This will provide great flexibility for the addressing and routing in the future where the IPv4 obviously lacks in comparison. It would hard to imagine a world where we do have anymore Internet addresses to go around. This should hopefully solve that problem, at least for a while to come. When configuring DHCP on Linux to use IPv6 one must be sure that they have everything in order. The two most used means of auto configuration IPS are on the router advertisement and dhcpv6. When you are using the RA a server daemon needs to advertise a network prefix which is typically a /64, gateway and sometimes a DNS server. Then the Client machines can auto configure their IPv6 addresses when they...

Words: 538 - Pages: 3

Nt1430 Week 1 Hw

...NT1430 12/15/13 Chapter 1 #1, 4 1. Free software is software that users have the freedom to distribute and change. The three main characteristics of free software are: The source code has to be distributed with the program, users must be allowed to redistribute modified versions under the same terms/licensing, and you can not restrict people from redistributing/modifying/using the software. 4. GNU stands for "GNU'S Not Unix", and it was designed to be a UNIX-like operating system developed by Richard Stallman. Linux is the name of operating system kernel developed by Linus Torvalds. GNU's tools aside the Linux kernel make the operating system known as “Linux” aka “GNU/Linux”. Thousands, possibly hundreds of thousands, of people helped refine the operating system because it was distributed freely online. Chapter 2 # 1 1. Installing Fedora/RHEL uses the process of copying operating system files from a CD, DVD, or USB flash drive to the hard disk on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible including fresh installations, upgrades from older releases of Fedora, and dual-boot. Chapter 3 #1, 4, 8 1. A live system gives you a chance to preview Fedora without installing it. It does not write/install to hard disks. 4. Put /boot at the beginning of the drive (partition 1) so that there is no issue of Linux having to boot from a partition too far into the drive. 8. When the system...

Words: 470 - Pages: 2

Nt1430

...William Coffman NT1430 Unit 3 Chapter Exercises Chapter 7 Exercises 1,3,4,8 Chapter 9 Exercises 1,2,3,4,5,6,8 Chapter 9 Advanced Exercises 10,11 1. What does the shell ordinarily do while a command is executing? What should you do if you do not want to wait for a command to finish before running another command? Answer: The shell waits for it to finish before it gives you another prompt and allows you to continue. Run the command in the background by using an ampersand (&) just before the Return stroke that ends the command line. 3. What is a PID number? Why are these numbers useful when you run processes in the background? Which utility displays the PID numbers of the commands you are running? Answer: It is an identification number that is automatically assigned to each process when it is created. When you want to use the kill command, the syntax requires the PID Number . You can use the PS utility to display the PID numbers of running. 4. Assume that the following files are in the working directory: $ ls intro notesb ref2 section1 section3 section4b notesa ref1 ref3 section2 section4a sentrev Give commands for each of the following, using wildcards to express filenames with as few characters as possible. a. List all files that begin with section. Answer: $ ls b. List the section1, section2, and section3 files only. Answer: $ ls c. List the intro file only. Answer: $ ls i d. List the......

Words: 1108 - Pages: 5

Unit 1 Nt1430

...Juan Pena NT1430 Unit 1 Chapter Exercises Ch.1 1. Free software is software that users have the freedom to distribute and change. The three main characteristics of free software are: The source code has to be distributed with the program, you cannot restrict people from redistributing/modifying/using the software, and users must be allowed to redistribute modified versions under the same terms/licensing. 4. GNU stands for "GNU'S Not Unix", and it was designed to be a UNIX-like operating system developed by Richard Stallman. Linux is the name of operating system kernel developed by Linus Torvalds. GNU's tools aside the Linux kernel make the operating system known as “Linux” aka “GNU/Linux”. Thousands of people helped refine the operating system online. Ch.2 1. Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible, including fresh installations, upgrades from older releases of Fedora/RHEL, and dual-boot installations. Ch.3 1. Live System- A computer that runs the Wide Area Progressive games and displays the main system window. The advantages are customization, cost, free market, stability, and community. 4. Put/boot at the beginning of the drive (partition 1) so that Linux does not have to boot from a partition too far into the drive. Positioning of /boot can be a problem on......

Words: 351 - Pages: 2

Unit 2 Assignment Nt1430

...Unit 2 Assignment NAME NT1430 DATE 1. What is the utility that can be used to copy a file, including text and executable program (binary) files? cp 2. Which of the following Linux utilities lists the names of files in a single directory? ls 3. What command displays the last 10 lines of a file? -tail What command displays the first 10 lines of a file? -head 4. What is a Process? What Utility provides communication between processes where output of one process provide input for another? 1.) A process is the execution of a command by Linux. They have the ability to communicate with eachother. 2.) | (Pipe) 5. Which of the following utilities do you use to determine the list of users logged on to a specific terminal? who command 6. What does the command pwd do? What does the cd command do? 1.) Prints the working directory. 2.) Changes from the current directory to another working directory. 7. In terms of file or directory permissions, what does U-G-O stand for? What are the 3 permission that can be given to a file or directory? 1.) User: owner of the file, Group: changes group permissions, Other: anyone who isn’t an owner of a file or in a group. 2.) read, write, execute 8. In terms of permissions, what does 777 mean? It means everyone has permission to read, write and execute a file. 9. What does the command chmod do? What happens when I use it with the following? chmod 755 myfile 1.) It modifies the access...

Words: 529 - Pages: 3

Nt1430

...Chapter 1 Exercise 1 Free software is software which is not charged for; as such you can share it with whoever you want, as many times as you want. You can also install it on as many of your home computers as you wish. Chapter 1 Exercise 4 GNU a group dedicated to creating an operating system compatible with the Unix software system. Linux is based off the original Unix operating software. Unix provided the kernel, while Linux provided the interface that people used in place of another operating system like windows or apples own software. Linus Torvalds developed the Linux kernel, and Richard Stallman created the GNU Project Chapter 2 Exercise 1 Depending on the installation being done, Fedora/RHEL either overwrites all the files on the hard drive, or updates the software that has new versions Chapter 3 Exercise 1 A live system is where you have a linux running on top of another operating system like windows. The advantages are that none of the changes you make are kept, as it doesn’t write to the hard drive Chapter 3 Exercise 4 I honestly could not find the answer to this question Chapter 3 Exercise 8 Disk Druid is a GUI program that allows users to add, delete or modify partitions on a hard disk Chapter 11 Exercise 1 Single user mode is where only the system console is enabled, you can run programs from the console, so long as they are not graphical programs (Text only). Multi user Mode is where you have a graphical interface to use. Chapter 11 Exercise......

Words: 358 - Pages: 2

Nt1430 Linux Networking

...NT1430: Linux Networking Unit 4 Homework Assignment Chapter 14: 1. Which commands can you use from the command line to send a file to the default printer? a. lpoptions –d printer 2. Which command would you give to cancel all print jobs on the system? a. cancel job-id 3. Which commands list your outstanding print jobs? a. lpc status 4. What is the purpose of sharing a Linux printer using Samba? a. Sharing a Linux printer using Samba allows Windows and OS/2 clients to send print jobs to the printer. 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol? a. 1.) System-config-printer 2.) lpinfo Displays available drivers 3.) lpadmin configures printers b. IPP is the native protocol Chapter 10: 1. Describe the similarities and differences between these utilities: a. Scp and ftp i. SCP stands for Secure Copy Protocol, and FTP is an acronym for the File Transfer Protocol, which was the original file transfer protocol. SCP and FTP are two applications for copying files from one computer to another. Both were based on their own protocols, but both now use different prtocols. b. Ssh and telnet i. Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the user against anyone with malicious intent while Telnet has no security measures whatsoever. c. Rsh......

Words: 284 - Pages: 2

Nt1430

...Stacie Rollins Friday, December 19, 2014 Nt1430 Unit 2 Assignment 1 Chapter 5: The Linux Utilities 1. Which commands can you use to determine who is logged in on a specific terminal? The command you can use is the $ was well as who, and finger command. 3. What Happens when you give the following commands if the file named done already exists? $ Cp to_do done Done is overwritten with contents of ‘to_do’. * Mv to_do done To_do no longer exists after the command. 4. How can you find out which utilities are available on you system for editing files? Which utilities are available for editing on your system? You can use which and where is to locate the utility and locate to search for files. You can use VIM to create and edit a file. 8. What is the result of giving which utility the name if a command that resides in a directory that is not in your search path? It will say that this command cannot be found. 10. Experiment by calling the file utility with the name of files in /usr/bin. How many different types of files are there? File/usr/bin/; | awk –D: ‘{print$7}’ | sort –u and there are 9 different file types. Assignment 2 Chapter 6: The Linux File System 1. Is each of the following an absolute pathname, a relative pathname, or a simple filename? a) Milk_co Simple Filename b) Correspond/business/Milk_co Relative Pathname c) /home//max Absolute Pathname d) /home/max/literature/promo Absolute Pathname e) .. Relative Pathname f)...

Words: 526 - Pages: 3

Nt1430

...Kirk Land NT1430 Unit 3 Chapter Exercise 1/12/14 Chapter 7 (Page 251) 1. What does the shell ordinarily do while a command is executing? What should you do if you do not want to wait for a command to finish before running another command? • The shell waits for the process to finish (or sleeps). Run a command in the background. 3. What is a PID number? Why are these numbers useful when you run processes in the background? Which utility displays the PID numbers of the commands you are running? • Process identification numbers – a large number assigned by the operating system that identifies the command running in the background. So that you know which process are still running or finished. 4. Assume that the following files are in the working directory: $ ls intro notesb ref2 section1 section3 section4b notesa ref1 ref3 section2 section4a sentrev Give commands for each of the following, using wildcards to express filenames with as few characters as possible. a. List all files that begin with section. - Is section* b. List the section1, section2, and section3 files only. - Is section (123) c. List the intro file only. - Is i* d. List the section1, section3, ref1, and ref3 files. - Is *(13) 8. Give an example of a command that uses grep a. With both input and output redirected. - $ grep \$ID is_list b. With only input redirected. - . $ grep -i suzi < addresses c. With only output redirected. - $...

Words: 703 - Pages: 3

Nt1430

...Chapter 19 Exercises 1. What changes does FTP make to an ASCII file when you download it in ASCII mode to a Windows machine from a Linux server? What changes are made when you download the file to a Mac? a. FTP only makes changes necessary for compatibility with Unix vs. Windows line / carriage returns.It replaces new line with a return 2. What happens if you transfer an executable program file in ASCII mode? b. The file will be corrupted: Any bytes that match a NEWLINE will be changed, resulting in a program that will not execute properly. 3. When would ftp be a better choice than sftp? c. When you are sharing public files 4. How would you prevent a local user from logging in on a vsftpd server using her system username and password? d. /etc/vsftpd.conf: local_enable=NO 5. What advantage does sftp have over ftp? e. Ftp is NOT a secure protocol. All usernames and passwords exchanged in setting up an FTP connection are sent in cleartext, data exchanged over and FTP connection is not encryption and the connection is subject to hijacking. A SFTP protocol however, is secure, thus your information is far safer. 6. What is the difference between cd and lcd in ftp? f. A cd command changes the remote working directory; an lcd command changes the local working directory. Advance Exercises 7. Why might you have problems connecting to an FTP server in PORT mode? g. Server might be because blocked or not......

Words: 1068 - Pages: 5

Nt1430

...Linux Commands The following table is a list of linux commands found on a Redhat 9.0 server. To see a list of bash shell commands, go to the shell commands page. For those of you who are unsure how to use linux commands, see our Linux Commands Tutorial. Click on the command name or the  to see a description of the command. Click on the  to see the man page for that command. Command | Description |   |   | adduser | Add a new user |   | | arch | Print machine architecture | | | awk | Find and Replace text within file(s) |   | | bc | An arbitrary precision calculator language |   | | cal | Display a calendar | | | cat | Concatenate files and print on the standard output | | | chdir | Change working directory | | | chgrp | Change the group ownership of files | | | chkconfig | Tool for maintaining the /etc/rc[0-6].d directory hierarchy |   | | chmod | Change the access permissions of files and directories |   | | chown | Change the user and group ownership of files | | | chroot | Change root directory |   | | cksum | Print CRC checksum and byte counts |   | | clear | Clear terminal screen |   | | cmp | Compare two files |   | | comm | Compare two sorted files line by line |   | | cp | Copy one or more files to another location |   | | cron | Daemon to execute scheduled commands |   | | crontab | Schedule a command to run at a later time |   | | csplit | Split a file into context-determined pieces |   | | ......

Words: 924 - Pages: 4

Nt1430 Hw Week 1

...Javier Lara PT430 NT1430 CH. 1 Page 20-21 Exercise 1 A) Free software is computer software that gives users the freedom to run the software for any purpose as well as to study, modify, and distribute the original software and the adapted versions. Free software is free, can be shared and also be updated by the people using it Exercise 4 A) The Free Software Foundation is a 501(c) non-profit organization founded by Richard Stallman on 4 October 1985 to support the free software movement, which promotes the universal freedom to study, distribute, create, and modify computer software, with the organization's preference for software being distributed under copyleft ("share alike") terms, such as with its own GNU General Public License. Linux a Unix-like and mostly POSIX-compliant computer operating system assembled under the model of free and open-source software development and distribution CH.2 Page 53 Exercise 1 A) When you install a Fedora/REHL, you copy operating system files from a cd or dvd to hard disk(s) on a system and setup configuration files so that Linux can run properly on hardware. CH.3 Page 86 Exercise 1 A) Live system is a complete bootable computer installation including operating system which runs in a computer's memory, rather than loading from a hard disk drive. Live systems can be used without a hard disk installed in a computer. Exercise 4 A) You would put the boot in a different folder so it doesn’t overwrite the original......

Words: 367 - Pages: 2

Linux Nt1430

...Josslynn Brown Linux NT1430 Chapter 1 1) Free software is software that gives you the user the freedom to share, study and modify it. We call this free software because the user is free. To use free software is to make a political and ethical choice asserting the right to learn, and share what we learn with others. The three main characteristics of free software are: The source code has to be distributed with the program, you cannot restrict people from redistributing/modifying/using the software, and users must be allowed to redistribute modified versions under the same terms/licensing. 2) Question # 4: The Free Software Foundation) is the principal organizational sponsor of the GNU Project. GNU developed many of the tools, including the C compiler that are part of the Linux operating system. Linux is the name of the operating system kernel developed by Linus Torvalds, which has since been expanded and improved by thousands of people on the Internet. Torvalds’s kernel and GNU’s tools work together as the Linux operating system. Chapter 2 1) Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible, including fresh installations, upgrades from older releases of Fedora/RHEL, and dual-boot installations. Chapter 3 1) A live system gives you a chance to preview......

Words: 517 - Pages: 3

Nt1430

...Nt1430 Unit 4 Chptr 14 1. Which commands can you use from the command line to send a file to the default printer? lp or lpr 2. Which command would you give to cancel all print jobs on the system? Either sudo lprm – or sudo cancel –a will remove all jobs from the print queues 3. Which commands list your outstanding print jobs? lpq or lpstat 4. What is the purpose of sharing a Linux printer using Samba? Sharing a Linux printer using Samba allows Windows and OS/2 clients to send print jobs to the printer. 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol? System-config-printer lpinfo Displays available drivers lpadmin configures printers The cups native protocol is IPP Chptr 10 1. Describe the similarities and differences between these utilities: a. scp and ftp SCP stands for Secure Copy Protocol, and FTP is an acronym for the File Transfer Protocol, which was the original file transfer protocol. SCP and FTP are two applications for copying files from one computer to another. Both were originally based on their own protocols, but both now use different protocols b. ssh and telnet Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the users against anyone with malicious intent while Telnet has no security measures whatsoever c. rsh and......

Words: 459 - Pages: 2

Spy Sweeper 5 8 1 | HarmonQuest | Brendan Cowell