Administrator Access is defined as a level of access above that of a normal user. This definition is intentionally vague to allow the flexibility to accommodate varying systems and authentication mechanisms.After installation, Linux requires configuration and systems administration. Corporate systems need monitoring, backups, updates, as well as system and user management.
Processes execute within their own process environment, they have their own memory, current working directory, priority, process ID, parent process ID and the file access privileges of the user ID under which they execute.
The basic Linux monitoring commands such as pstree and ps -auxw and top will inform you of the processes running on your system. Sometimes a process must be terminated.
The three most common methods of defining a Linux user and authenticating their logins are:
On a UNIX system, everything is a file; if something is not a file, it is a process."
This statement is true because there are special files that are more than just files (named pipes and sockets, for instance), but to keep things simple, saying that everything is a file is an acceptable generalization. A Linux system, just like UNIX, makes no difference between a file and a directory, since a directory is just a file containing names of other files. Programs, services, texts, images, and so forth, are all files. Input and output devices, and generally all devices, are considered to be files, according to the system.
The ping command tests the connection between the local machine and a remote address or machine.
The traceroute command expands on the functionality of the ping command. It provides a report on the path that the packets take to get from the local machine to the remote machine. Each step (intermediate server) in the path is called a hop. Route information is useful when troubleshooting a networking issue: if there is packet loss in one of the first few hops the problem is often related to the user’s local area network (LAN) or Internet service provider (ISP). By contrast, if there is packet loss near the end of the route, the problem may be caused by an issue with the server’s connection.
Linux Describe the uses of policy documents and the procedure documents in system administration and provide...
Linux System Administration What files are used by the “finger” command? What command did you use? The “uname” command will display certain information about the Linux machine you are using. What option on this command will print the “machine hardware name”? What is the machine hardware name on “loki”? Pay attention to the keyword “machine hardware name”.
In Linux: - Please describe ( Shell Command-Line Expansion) and provide an example. - Please describe the meaning of ( running a process in the background ) with your example. - Please describe how you can use ( noclobber ) with example.
Linux/Unix Please describe the thread/process management with regards to the Linux/Unix system
Linux Server Administration - Create a Virtual Machine with two additional disks devices (excluding the operating system). On the first disk partition it to have 4 partitions of approximately 5GB in size each – these will be mounted on /mnt/a, /mnt/b, /mnt/c, /mnt/d. On the second disk create two partitions of 10GB in size which will be mounted in /mnt/e, /mnt/f. Once created impose a file system and make them mount at boot time. What commands did you use to...
How could I secure linux operating system? Describe it or Describe the steps?
Describe the purpose of a dispute resolution policy and procedure?
Linux Explain how you would find the file “web.log” on your Linux system? Please provide the command along with all the options
11. There are several tools that the Federal Reserve System uses to implement monetary policy. a. Describe these tools b. Explain how the Fred would use each tool in order to increase the money supply.
choose a medical procedure that involves the Integumentary system, Digestive system, and Urinary system. Describe the procedure and define the terminology used in that procedure. (3 procedures, one for each system)
Discuss what NIS is and the setup and uses of NIS servers in a Linux environment. Consider a scenario where you have to setup one such server for your institution, discuss its setting in an institution and what purpose it could serve and whether or not you will require a Master Server. Please provide more than 250 words