Itt Tech Linux Assignment 3.1

In: Computers and Technology

Submitted By thescorpion1985
Words 283
Pages 2
1. JetDirect, LPD/LPR, IPP, and SMB.
2. It is The Internet Printing Protocol (IPP).
3. lpadmin, a CUPS web interface, and system – config – printer.
4. It is a Uniform Resource Identifier. It is a string/ name, or a symbol to identify a resource (ex: http://hangtime.blogs.nba.com/2012/07/18/blazers-smith-released-from-hospital/#)
5. Model Wizbang 9000 – lpadmin -p Wizbang 9000 -E -v socket://172.20.20.76 -m Wizbang 9000 ps.ppd.gz
PPD file Wizbang_9000_ps.ppd.gz (already in the foomatic database) - lpadmin -p "Wizbang 9000" -E -v socket://(add IP address here) -m Wizbang_9000_ps.ppd.gz (basically, the same answer as the previous answer before this one).
Connected to a JetDirect print server with an IP of 172.20.20.76 – press CTRL + V and it enters it to the copied IP, after you’ve copied the IP address….and then press the “enter” key.
Accessible to all users – lpoptions -p printer -o option1=value –o, for a second option, enter the value of the file name.
6. A timing attack; a side channel attack, which the attacker tries to concede a cryptosystem, in which, you estimate the time taken to execute cryptographic secrets/conclusions or formulas.
7. rsh and rexec. (they send passwords in visible text).
8. (/home/axl/.ssh/id_rsa):
9. /etc/ssh/sshd_config, or /usr/local/etc/ssh/sshd_config, and /etc/sshd_config.
10. Modify the etc/host.deny, then enter sshd: “all.” You can then modify /etc/host.allow, then add the commands: sshd: Archie, sshd: Jughead, and sshd: Veronica (In reality, there would be no names. Instead there would be IP addresses in place of the names Archie, Jughead, and…...

Similar Documents

Itt Tech

...that there are more teams and more games per season the averages are different. IV. Look Back i) What method, if any, do you believe would be more effective than using a graph to summarize this type of data? Answer: A spreadsheet showing the data in an organized file. j) What types of problems might be most receptive to graphing as a problem solving technique? Answer: Calculating the differences in the data. Skill Level II Answer: Skill Level III Answer: Hints: Research the Internet and/or the ITT Tech Virtual Library for the information required in the assignment. Summarize your data in a table, and then build a graph. Remember: you must provide your references (the format of your reference list is to be determined by your instructor). ----------------------- Problem Acquire the necessary data, and compile it in an effective format, to compare the batting careers of Babe Ruth, Hank Aaron, and Mark McGwire. Problem Whereas batters are often judged by the number of home runs they hit, pitchers are judged by statistics such as the number of games they win, their earned run average (ERA), and the number of no-hitters they throw. 1. Execute the necessary research to identify the winning pitcher in the final game of three World Series of......

Words: 719 - Pages: 3

Itt-Tech Answers

...Don Delara/IT320 IT320 Wan Technology/ Unit 4 Assignment: 4.1 1. At what layer of the OSI model does CDP operate? Data Link layer 2. What is the primary use for CDP? To discover information about directly connected Cisco devices 3. What network layer protocols can CDP provide information for? IP, Internetwork Packet Exchange (IPX), and AppleTalk 4. When CDP is enabled on an interface, a router (or switch) sends CDP advertisements on a regular basis, which list information about the sending router. Included in the packets are a series of Type/Length/Value, or TLV, data structures. 5. The show cdp neighbors command can be used to display one line of information about each directly connected CDP-enabled device. List the six pieces of information displayed. Device ID, local interface, holdtime, capability, platform, and port ID 6. In the topology of all Cisco devices shown in Figure 4-1, you are on Host A and consoled in to RTA. What devices can you see in the output from CDP commands? SWA, RTB, and RTC—only the directly connected devices that are attached to RTA 7. How would you gather information about other CDP-enabled devices in the network? By Telneting to those devices and using the show cdp neighbors command 8. From RTB in Figure 4-1, what devices can you see in the output from CDP commands? RTA and RTD 9. From RTC in Figure 4-1, what devices can you see in the output from CDP commands? RTA and RTD 10. From RTD in Figure 4-1, what......

Words: 1186 - Pages: 5

Itt Tech Linux 2 Homework 1.1

...Nicole Lynn Bojko Homework Assignment 1.1 1. List the number and name of each runlevel as used by Fedora/Red Hat Linux. 0 = Halt – Shuts down the system 1 = Single User – Mode for administrative tasks 2 = Multiuser without NFS - Does not configure network interfaces and does not export networks services 3 = Multiuser - Starts the system normally 4 = User defined – For special purposes 5 = Multiuser with X - As runlevel 3 + display manager 6 = Reboot – Reboots the system 2. Which two runlevels should NEVER be set as the default? 0 = halt and 6 = reboot 3. What script contains the default runlevel? /etc/rc 4. The init scripts for each runlevel are contained in which directory tree? /etc 5. What would you name the link to an init script that would start the fictitious bigd daemon early in the boot process? /etc/rc.local and write the script to run at boot time. 6. What would you name the same link to kill the same daemon? Kill 9 7. How would you use the service command to manually kill the bigd daemon? Service bigd stop 8. How would you use chkconfig to set the bigd daemon to start at runlevels 2 and 3? chkconfig bigd --level 2 and 3 on 9. How would you use chkconfig to remove bigd from all runlevels? chkconfig --del bigd 10. How would you use telinit to switch to runlevel 5? Edit the /etc/inittab and Enter : id:5:initdefault: 11. How would you tell Linux to shut down in five minutes ( not delay five minutes) with the message “ The system will......

Words: 276 - Pages: 2

Assignment 2.1 Linux Class Itt

...Assignment 2.1 August 4, 2013 1. The two predominant Linux desktops currently in use are GNOME and KDE. GNOME is a desktop environment and graphical user interface (GUI) that runs on top of a computer operating system. It is composed entirely of free and open source software and is developed by both volunteers and paid contributors, the largest corporate contributor being Red Hat. KDE is an international free software community producing an integrated set of cross-platform applications designed to run on Linux, FreeBSD, Solaris, Microsoft Windows, and OS X systems. It is known for its Plasma Desktop, a desktop environment provided as the default working environment on many Linux distributions, such as Kubuntu, Pardus, and openSUSE. 2. Panel – these are the bars at the top and bottom of the screen. They hold objects or icons which are shortcuts or applets. Menu bar – the menu bar appears at the top of the File Browser window and displays a drop down menu when you click one of its selections. The Nautilus File Browser menu bar controls which information is displayed and how it is displayed. Applet – this is a small program that displays its user interface on or adjacent to the panel. (EXAMPLES: clock or workspace switcher) Notification area – an applet that displays icons of applications that are running and open. (For example, if you’re playing the CD player, this would show in the notification area) Shading – this appears to be a graphical......

Words: 567 - Pages: 3

Assignment on Linux

...Narayan Saha | CIT1533 | SCM-024155 Raj Narayan Saha | CIT1533 | SCM-024155 Introduction to Operating Systems assignment 1 Introduction to Operating Systems assignment 1 Contents The Linux Operating System 1 The History of Linux 3 The linux mascot 4 linux and its fued with microsoft 4 The Advantages and Disadvantages of Linux 6 Comparing Linux to Windows 7 The increase in complexity of Operating Systems 8 advantages and disadvantages of this increased complexity 10 Client-Server Operating System 11 Plug and Play & Multitasking in Windows 13 plug and play 13 multitasking in windows 15 References 17 The Linux Operating System Before getting into Linux, a short introduction on what an Operating System is – An Operating System is a software layer that is between the hardware and the software that you actually use to get something productive. In other words, the operating system is what allows the software to talk to the hardware, such as storing information to the hard drive, to send out print jobs to the printer and so on and so forth. Figure [ 1 ] An excerpt from the Ubuntu (a Linux distribution) website on how and why it's free Figure [ 1 ] An excerpt from the Ubuntu (a Linux distribution) website on how and why it's free Now, onto Linux. Linux, like Microsoft Windows is an Operating System. Unlike Windows, however, Linux is open source, meaning one can readily find the source code for the OS for free and add or edit the......

Words: 4387 - Pages: 18

Itt Tech

...Michael Knall Date: 6/26/14 Class: Programming Unit 2 Assignment 1: Homework Short Answer 1-4: 1.) What dose a professional programmer usually do first to gain an understanding of a problem? Break the larger problem into independent sub-problems. Seek solution of each sub-problem. Test the solutions of each sub-problem. Combine all the tried and tested solutions together. Apply the solution to the complex problem under consideration 2.) What is Pseudo Code? A notation resembling a simplified programming language, used in program design. 3.) Computer programs typically perform what three steps? Input is received. Some process performed on the input. Output is produced. 4.) What dose the term “user-friendly” mean? The term user-friendly is commonly used in the softwear business to describe programs that are easy to use. Algorithm workbench 1-2: 1.) Design an algorithm that prompts the user to enter his or her height and stores the user’s input in a variable named height. Any height, you just have to be good, i advise you to work on your shot having better than a 60% shot is alot better than any other aspect? In Basketball Rules and Regulations =The official height of an NBA basketball hoop is 10 feet from the floor to the rim. 2.) Design an algorithm that prompts the user to enter his or her favorite color and stores the user’s input in a variable named color. Declare Interger color Display “ what is the color” Input......

Words: 260 - Pages: 2

Itt Tech Is4799 Capstone

...configurations, installing, maintaining, and managing desktop/client server operating systems * Excellent communication and organization skills * Knowledge of PC hardware, Operating systems, OSI Model, TCP/IP, Ethernet, LAN, WAN, basic telecommunications technologies, network design, implementation, and management * Configuration of DNS, Active Directory, Cisco routers, and switches * Experience building and maintaining a local area network (LAN) * Possess a working knowledge of TCP/IP, VM Ware, and LAN/WAN technology * Quick learner with strong working knowledge of software, hardware, networking, operating systems, and security applications Education * ITT Technical Institute, St. Petersburg, FL Graduation: December 2013 * Bachelors Information Systems and Cyber-security * ITT Technical Institute, St. Petersburg, FL Graduation: March 2012 * Associates of Computer Network Systems Employment Lead Technician Generation Cyber – Pinellas Park, FL * Diagnose computers, networks, and repair to clients standards * Train clients how to use computer hardware and software * Software applications * Technical support for network security * Meeting organizational standards Project Manager Preferred Property Services – Largo, FL * Train employees to handle customer service problems in a professional manner * Assist with trouble clients * Fix any network and computer problems * Train employees on network......

Words: 14657 - Pages: 59

Itt Tech

...objective for this job is to obtain some people skills from interacting with the customers that come in and learn more about the phone industry, I’m currently a student at ITT Tech majoring in Network Systems Administration and thought this job would be a good start in the tech industry. | Skills & Abilities | | I have been working with Computers since the age of 13 so my computer tech skills are well refined, I can and will adjust to any environment when need be, I am a quick learner regardless of what it may be I can and will learn it as fast as I possibly can, I am extremely patient and have been known to work well with people. | Experience | | Dish washer, Minnesota misonic Homes North ridge March 2013 To May 2013 My duties as the dish washer goes beyond the title I not only made sure all the dishes were clean I also helped with serving the food, my job was a bit stressful at times because we was working with the elderly who’s immune system is much weaker because of aging. Pizza Maker, Pizza Ranch August 2014, Current employer My task are to make and prep the dough in the morning and also make quick but quality pizza’s as fast as possible keeping up with the orders and the Buffet line. | Education | | ITT TECHNICAL INSTATUTE – Brooklyn Center - BA I am currently a student at ITT Tech working on my BA in Network System Administration, I just finish with my first quarter in the summer and now moving on to the second quarter in the fall, I currently......

Words: 415 - Pages: 2

Unit 1 Assignment 1 Itt Tech

...Unit 1 Assignment 1 Blank Answer Sheet Name: Date: Electronics ET2530 1. Define Modulation. The process of varying one or more properties of a periodic waveform, called the carrier signal, with a modulating signal that contains information to be transmitted. 2. What is a carrier Frequency? A carrier frequency is a single radio frequency with steady amplitude. 3. Describe two reasons that modulation is used for communications transmissions. a) Signal integrity b) Power savings 4. List three parameters of a high frequency carrier that may be varied by a low frequency intelligence signal. Amplitude, frequency and phase v = Vp·sin(ωt + Φ) ω = 2πf (describe which parameters can be varied) 5. What are the frequency ranges included in the following frequency subdivisions: MF (medium frequency)300-3000kHz, HF (high frequency)3-30MHz, VHF (very high frequency)30-300MHz, UHF (ultra-high frequency)300-3000MHz, and SHF (super high frequency)3-30GHz? 7. A microwave transmitter typically requires a +8dBm audio level to drive the input fully. If a +10 dBm level is measured, what is the actual voltage level measured? Assume a 600Ω system. (2.45V) Hint: Use this equation and solve it for V2 10 dBm = 20 · log10 (V2/0.77459) 9. Convert the following power to their dBm equivalents: (a) p = 1 W = 30.0000dBm (b) p = 0.001 W = 0.00000dBm (c) p = 0.0001W = -10.0000dBm (d) p = 25 μW = dBm Use this formula: dBm = 10 · log10 [P2/(10-3)] 15. Define electrical......

Words: 703 - Pages: 3

Assignment 1.1 Linux

...IT250 Homework Assignment 1.1: 1. What did Richard Stallman mean when he stated that GNU was a free operating system? Richard Stallman meant that his intention was that nobody would have to pay for “permission” to use the GNU system. He learned to distinguish carefully between “free” in the sense of freedom and “free” in the sense of price. Free software is software that users have the freedom to distribute and change. 2. Describe the relationship between Linux and the GNU Project. Linux is the kernel, the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. 3. List and describe in detail four advantages of Linux. Applications: Linux is both free and commercial as well as a wide variety of tools: graphical, word processing, networking, security administration, Web server and many others. Flexibility: Linux can be used for high performance server applications, desktop applications, and embedded systems. You can save disk space by only installing the components needed for a particular use. You can restrict the use of specific computers by installing for example only selected office applications instead of the whole suite. Performance: Linux......

Words: 593 - Pages: 3

Eng 115 Assignment 3.1 Determining

...ENG 115 ASSIGNMENT 3.1 DETERMINING To purchase this visit following link: http://www.activitymode.com/product/eng-115-assignment-3-1-determining/ Contact us at: SUPPORT@ACTIVITYMODE.COM ENG 115 ASSIGNMENT 3.1 DETERMINING ENG 115 ASSIGNMENT 3.1 DETERMINING ENG 115 ASSIGNMENT 3.1 DETERMINING ENG 115 ASSIGNMENT 3.1 DETERMINING To purchase this visit following link: http://www.activitymode.com/product/eng-115-assignment-3-1-determining/ Contact us at: SUPPORT@ACTIVITYMODE.COM ENG 115 ASSIGNMENT 3.1 DETERMINING ENG 115 ASSIGNMENT 3.1 DETERMINING ENG 115 ASSIGNMENT 3.1 DETERMINING ENG 115 ASSIGNMENT 3.1 DETERMINING To purchase this visit following link: http://www.activitymode.com/product/eng-115-assignment-3-1-determining/ Contact us at: SUPPORT@ACTIVITYMODE.COM ENG 115 ASSIGNMENT 3.1 DETERMINING ENG 115 ASSIGNMENT 3.1 DETERMINING ENG 115 ASSIGNMENT 3.1 DETERMINING ENG 115 ASSIGNMENT 3.1 DETERMINING To purchase this visit following link: http://www.activitymode.com/product/eng-115-assignment-3-1-determining/ Contact us at: SUPPORT@ACTIVITYMODE.COM ENG 115 ASSIGNMENT 3.1 DETERMINING ENG 115 ASSIGNMENT 3.1 DETERMINING ENG 115 ASSIGNMENT 3.1 DETERMINING ENG 115 ASSIGNMENT 3.1 DETERMINING To purchase this visit following link: http://www.activitymode.com/product/eng-115-assignment-3-1-determining/ Contact us at: SUPPORT@ACTIVITYMODE.COM ENG 115 ASSIGNMENT 3.1 DETERMINING ENG 115 ASSIGNMENT 3.1......

Words: 423 - Pages: 2

Nt1430 Linux Networking Unit 5 Assignment 1 Itt Orange

...Francisco Ramirez Unit 5 assignment 1 Ch. 18 1. Sftp-secure file transfer protocol is a network protocol that provides file access, transfer, and management over a trusted data stream. Scp-secure transfer protocol is a network protocol that transfers data that can withstand or is immune to interception and tampering. 2. Use the “ssh host who” command in the terminal to show who is logged in 3. Scp user@bravo:-r your@home:blank 4. “$ ssh plum xterm” or use this command with “-y” if x11 forwarding is not trusted 5. The problem that enabling compression prevent when using a ssh to run remote x11 applications on a local display would be that this creates a backup feature. Should the computer crash, all of your work will be saved on the hard drive. 6. Check with the remote administrator to see if something has changed. Ch. 20 1. Edit “etc/aliases file to include the entry: root, var/logs/systemmail 2. “Cat~/. Forward”, then max@bravo.com then “/max” 3. Edit “/etc/mail/access” and add the following: “connect 192.168.1.1 relay” 4. “dnl” stand for “delete to new line”, works the same as # in shell script; it instructs the compiler to ignore any line followed by “dnl” 5. Go to content configuration on Spamassassin, then under “required spam assassin score”, change 3 to 5. 6. First, type the mail followed by the e-mail address of the recipient: mail Max@email.com, then type the subject line, then press enter. Type your message,......

Words: 270 - Pages: 2

Itt Tech

...Niel Smith NT1310 Unit 5 Assignment 1 Cabling Factors and Tools Discussion Flexibility What type of install is the cable going into? Is everything in a fixed position? If you have an install where items are moved around without being disconnected, using highly flexible cable is necessary. Cables in these scenarios need to be flexible to meet those demands of mobility, and also for the life of the wire so that it does not crack, break, fray or short. We had a job at a university where we moved flat panels on a track system to create different screen sizes, and for that we had to make sure the cable would meet the demand. Capacitance Cat 6 is not always better than Cat 5. If a video extender is made for Cat 5e, using Cat 6 may cause you a problem. The electrical properties are different, and the circuitry inside may not be able to reconcile the increased capacitance. You confirm should with the manufacturer before making a substitute in a Category cable. Jacket What type of jacket does your cable need? You have plenum, riser, PVC/non-plenum and direct burial. Plenum cable is often required in commercial work, especially in buildings where there are open-air returns; it is essential to meeting code. Integrators will often use riser grade at the riser, and then transfer to plenum in the plenum space. This saves some cost, but I recommend you second-guess saving that few cents per foot in most cases. The chances of mixing up a box of cable and pulling riser in the......

Words: 772 - Pages: 4

Assignment 3.1 Determining

...ASSIGNMENT 3.1 DETERMINING To purchase this tutorial visit here: http://mindsblow.us/question_des/ASSIGNMENT31DETERMINING/1831 contact us at: help@mindblows.us ENG 115 ASSIGNMENT 3.1 DETERMINING ASSIGNMENT 3.1 DETERMINING To purchase this tutorial visit here: http://mindsblow.us/question_des/ASSIGNMENT31DETERMINING/1831 contact us at: help@mindblows.us ENG 115 ASSIGNMENT 3.1 DETERMINING ASSIGNMENT 3.1 DETERMINING To purchase this tutorial visit here: http://mindsblow.us/question_des/ASSIGNMENT31DETERMINING/1831 contact us at: help@mindblows.us ENG 115 ASSIGNMENT 3.1 DETERMINING ASSIGNMENT 3.1 DETERMINING To purchase this tutorial visit here: http://mindsblow.us/question_des/ASSIGNMENT31DETERMINING/1831 contact us at: help@mindblows.us ENG 115 ASSIGNMENT 3.1 DETERMINING ASSIGNMENT 3.1 DETERMINING To purchase this tutorial visit here: http://mindsblow.us/question_des/ASSIGNMENT31DETERMINING/1831 contact us at: help@mindblows.us ENG 115 ASSIGNMENT 3.1 DETERMINING ASSIGNMENT 3.1 DETERMINING To purchase this tutorial visit here: http://mindsblow.us/question_des/ASSIGNMENT31DETERMINING/1831 contact us at: help@mindblows.us ENG 115 ASSIGNMENT 3.1 DETERMINING ASSIGNMENT 3.1 DETERMINING To purchase this tutorial visit here: http://mindsblow.us/question_des/ASSIGNMENT31DETERMINING/1831 contact us at: help@mindblows.us ENG 115 ASSIGNMENT 3.1 DETERMINING ASSIGNMENT 3.1 DETERMINING To purchase this tutorial visit......

Words: 756 - Pages: 4

Linux Ii Research Assignment - Linux Security Technologies

...Research Assignment Linux Security Technologies Kristy Graves ITT Tech – Dayton Linux II IT302 Mandatory Access Control Mandatory Access Control (MAC) is a system wide policy that relies on the current system to control access (Syracuse University, 2009). Users cannot alter or make any changes to this policy. Only the administrator has the clearance and authorization to make changes (The Computer Language Company Inc., 2012). Mandatory access control mechanisms are more than Discretionary Access Control (DAC) but have trade offs in performance and convenience to all users (The Open Web Application Security Project, 2002). Users can access lower level documentation, but they cannot access higher level without the process of declassification. Access is authorized or restricted based on the security characteristics of the HTTP client. This can be due to SSL bit length, version information, originating IP address or domain, etc. Systems supporting flexible security models can be SELinux, Trusted Solaris, TrustedBSD, etc. DAC checks the validity of the credentials given by the user. MAC validate aspects which are out of the hands of the user (Coar, 2000). If there is no DAC list on an object, full access is granted to any user (Microsoft, 2012). SELinux SELinux has three states of operation. These states are enforcing, permissive, and disabled. SELinux was developed by the U.S. National Security Agency (NSA) and implements MAC in a Linux kernel (Sobell, 2011).......

Words: 875 - Pages: 4