Module 3 Using Linux.

Slides:



Advertisements
Similar presentations
WordPress Installation for Beginners Sheila Bergman
Advertisements

®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Web browsers It’s a software application for retrieving and presenting information on WWW. An information resource is identified by a Uniform Resource.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Microsoft Office Illustrated Using Advanced Features.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Terminal Services Terminal Services is the modern equivalent of mainframe computing, in which servers perform most of the processing and clients are relatively.
CADRipper Pro Installation The CADRipper Pro is installed on either a 32-bit or 64-bit desktop computer running the latest updates for XP, Vista and Windows.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
SYST Web Technologies SYST Web Technologies Installing a Web Server (XAMPP)
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Linux Operations and Administration
Google Chrome Your Customized Google Buddy April 2012 John Riley and Denise Tate-Kuhler.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
1 Web Server Administration Chapter 3 Installing the Server.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Module 4: Add Client Computers and Devices to the Network.
Irongeek.com Adrian Crenshaw Joseph Hollingsworth.
PTA Linux Series Copyright Professional Training Academy, CSIS, University of Limerick, 2006 © Workshop II Transferable Skills & Common Tasks Professional.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
1 Web Server Administration Chapter 3 Installing the Server.
Microcomputer Fundamentals Computer Class This class is designed for first-time computer users. Over the next several weeks, we will discuss how computers.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 7: Fundamentals of Administering Windows Server 2008.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
1 Working with MS SQL Server Textbook Chapter 14.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Protecting Students on the School Computer Network Enfield High School.
INTERNET SAFETY FOR KIDS
LINUX Operating System Offered by UBUNTU. Default Application Ubuntu contains a selection of useful applications. In the Applications menu you will find.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
Linux Essentials Chapter 4: Using Common Linux Programs.
Software - A set of instructions, stored digitally within the computer's memory, which tells the computer system what to do.  System Software  Application.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
Explore GNOME The easy way, using a live CD By Carl Weisheit.
Microcomputer Fundamentals Computer Class This class is designed for first-time computer users. Over the next several weeks, we will discuss how computers.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Their newest version, Office 365 is available for $80 to $150, based on a yearly subscription or a software purchase. There are several ways to gain access.
Customizing the Browser Deploying IE10 Browser Management App Compat.
Training Deck Microsoft Corporation Store, sync, and share your work files.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Setting up a Printer. ♦ Overview Linux servers can be used in many different roles on a LAN. File and print servers are the most common roles played by.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Reclaim/Restore with LINUX Course Objectives ● Demonstrate the operation and functionality of the Linux distribution - Ubuntu. ● Each student will have.
How to fix Netflix Signing In Issues? For More Details Visit Our Website
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Windows Tutorial 5 Protecting Your Computer
Office 2016 and Windows 10: Essential Concepts and Skills
IT Security Awareness Day October 19, 2016
Managing Windows Security
Macintosh & Linux Used to fill in pg 5 & 6 of “Operating Systems” Packet.
Chapter 6 Application Hardening
Software Applications for end-users
How to Fi
MICROSOFT OUTLOOK and Outlook service Provider
Bomgar Remote support software
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Unit 27: Network Operating Systems
Unit 7 NT1330 Client-Server Networking II Date: 7/26/2016
Chapter 3: Protecting Your Data and Privacy
software & cloud computing
Provide secure environment for online assessment with Moodle – POC.
Presentation transcript:

Module 3 Using Linux

Exam Objective 1.4 ICT Skills and Working in Linux Objective Summary Gain desktop skills Introduce the command line Learn about Linux in industry, cloud computing, and virtualization

Working with the Linux Environment

Graphical vs. Non-Graphical Graphical mode runs an X-server, has windows, and menus Non-graphical mode is text only, focuses on shell access You can run multiple shells in graphical mode, each within their own window

Getting to a terminal Look for xterm or terminal Perform a search Look for a “Utilities” or “System” menu You can have multiple terminal windows open Cut and paste between different applications Same shells as non-graphical mode

Working with Linux Lots of software available to get office work done with Linux LibreOffice provides a word processor, spreadsheet, and presentation package that are compatible with Microsoft applications Firefox or Chromium for web browsing Distribution or desktop environment will provide email tools and other apps like a calculator and notepad

Linux Security Basics

Keeping Safe Cookies are a small token that your browser sends back to the originating site on each request Cookies are the biggest violators of privacy You can disable cookies entirely Or just wipe them at the end of the session Also able to disable 3rd party cookies

Passwords Use strong, unique passwords everywhere Software like KeePassX securely save your passwords so you don’t need to remember as many A strong password is random 10 or more characters Mix of UPPERCASE and lowercase Add in symbols (#![;…

Protecting your computer Use a firewall A default “deny incoming; allow outgoing” policy is very effective iptables is the built in Linux firewall system Keep up to date Your distribution should make it easy to check for, and install, upgrades Updates have fixes for security problems Check often, or have your computer do it for you