A short two-part talk introducing: Basic Linux/Unix system administration (CentOS/RHEL5) General Computer/Network security … for the G53SEC module. Nick.

Slides:



Advertisements
Similar presentations
The VeriTrak Enterprise Application Created for The Verification Company By CTO Source, Inc. This presentation provides an overview of the system and links.
Advertisements

Lesson 22 – Introduction to Linux Systems Administration.
User Accounts and Permissions Chapter IV / Part II.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 2 Manage User Access and Security.
Guide To UNIX Using Linux Third Edition
Linux+ Guide to Linux Certification, Second Edition
1 COP 4343 Unix System Administration Unit 16: file server – samba.
ENGINEERING COMPUTING CENTER LINUX workshop
Linux System Administration LINUX SYSTEM ADMINISTRATION.
GETTING STARTED USING LINUX UBUNTU FOR A MULTI-USER SYSTEM Team 4 Lab Coordinator Manager Presentation Prep Webmaster Document Prep Faculty Facilitator.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
One to One instructions Installing and configuring samba on Ubuntu Linux to enable Linux to share files and documents with Windows XP.
Virtual Company Group 8 Presentation Date: June /04/2017
Linux Filesystem Management
The University of Akron Summit College Business Technology Dept.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
SAMBA Integrating Linux and Window. What is Samba? Free suite of programs that enables flavors of UNIX to work with other operating systems such as OS/2.
2/19/2003 Lecture 3 Computer System Administration Lecture 3 Setup (continued)
Review Security Hardening IPTables SELinux. Today Installations and updates – Rpm command and packages Apache “Issue Ownership”
A few Linux basics Network Monitoring & Management.
Unix Operating Systems Module 7. Unix Operating System Versions Basic Information User and Group Settings File Permissions Local Firewall Local Security.
Samba Advanced System Administration Course James Lwali University computing Centre Ltd, University of Dar es salaam,
Adding New Users User as an entity - username(UID), GID. UID - typically a number for system to identify the user. GID – a number that recognizes a set.
ITI-481: Unix Administration Meeting 3. Today’s Agenda Hands-on exercises with booting and software installation. Account Management Basic Network Configuration.
IT2204: Systems Administration I 1 6b). Introduction to Linux.
Access Training Linux/Unix Power Broker Access Custom Schema Database Access Customer Training Date: 25-JAN-2005.
Day 11 SAMBA NFS Logs Managing Users. SAMBA Implements the ability for a Linux machine to communicate with and act like a Windows file server. –Implements.
PROGRAMMING PROJECT POLICIES AND UNIX INTRO Sal LaMarca CSCI 1302, Fall 2009.
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Linux Administration. Pre-Install Different distributions –Redhat, Caldera, mandrake, SuSE, FreeBSD Redhat Server Install –Check HCL –Significant issues.
Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998.
Linux Security. See who's logged in 1) w (more information) 2) who (less information)
There are three types of users in linux  System users: ?  Super user: ?  Normal users: ?
Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.
Lecture 5: User Accounts & Directory Service Instructor: Dr. Najla Al-Nabhan
System Administration 1.  system administration  user and group management 2.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Linux Exercise. Download and Install the latest CentOS version and latest Ubuntu/Fedora OS. Configure a unique Host Name and a permanent IP Address for.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Linux Operations and Administration
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
Unit – 5 FTP Server. FTP Introduction One of the oldest and most commonly used protocols The original specification for the File Transfer Protocol was.
Introduction to Linux Server Setup Jonathan Hood CSE 4000 Practical Issues in Software Engineering.
Experiment No 4 Prepared by, Mr. Satish Pise. Objectives View the /etc/passwd file and describe its syntax. View the /etc/shadow file and describe its.
Ubuntu Checklist. 1.Examine the ReadMe.txt file 2.Manage user and root passwords – sudo passwd change password of username –Change password policies in.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Lightweight Directory Access Protocol Objectives –This chapter will first show you how to install and use LDAP Contents –The LDAP Database Structure –Scenario.
PRESENTED BY ALI NASIR BITF13M040 AMMAR HAIDER BITF13M016 SHOIAB BAJWA BITF13M040 AKHTAR YOUNAS BITF13M019.
LINUX SYSTEM ADMINISTRATION
Lab 05 Firewalls.
COP 4343 Unix System Administration
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
System Programming and administration CS 308
FTP - File Transfer Protocol
Logging into the linux machines
Lab 1 introduction, debrief
Welcome To : Group 1 VC Presentation
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
DHCP, DNS, Client Connection, Assignment 1 1.3
Security and File Permission
SECURITY IN THE LINUX OPERATING SYSTEM
LINUX SYSTEM ADMINISTRATION
System & Network Administration (MCSA & RHCSA)
Linux Filesystem Management
Adding New Users.
Presentation transcript:

A short two-part talk introducing: Basic Linux/Unix system administration (CentOS/RHEL5) General Computer/Network security … for the G53SEC module. Nick Reynolds. CentOS 5

Need entry in /etc/passwd Need password in /etc/shadow Need home directory /home/[username] Correct Permissions $ man adduser $ adduser $ man passwd $ passwd Gui Alternative: redhat-config-users

Runs on receiving a connection man xinted Start with: chkconfig krb5-telnet on Stop with: chkconfig krb5-telnet off

Read manual page: man telnetd Set up accounts using: adduser Change account shell: chsh (Tip: man ssh, chkconfig sshd on/off)

 ftp server  httpd server (apache)  ssh server  …

redhat-config-network-gui

Searching: yum search [string] Installing: yum install [package] Staying up to date: yum update Lots more!: man yum man yum.conf

Check logs: /var/log/* Monitor network activity: tcpdump Monitor processes: ps top

Move between accounts: /bin/su – [username] Permissions and ownership: chmod chgrp chown Manual pages: man

CentOS5 (RedHat EE) Documentation Linux Documentation Project Search Engines!

Many ways to achieve the same result. Experiment within a user account. Don’t make to many changes in one go. Stay up to date (yum update) Advanced methods to configure servers: man pam

Encryption Access Permissions Who/what do you trust? Network Infrastructure

Use secure Protocols InsecureSecure telnetssh ftpscp imapimaps httphttps

 File/directory permissions  Firewalls

 DHCP?  IP Addresses?

 Where does your data go?  Switches? Hubs? Which route?  Wi-fi