Week 06 - Lab 1 ( APUE )___Muhammad
.docx
keyboard_arrow_up
School
University of Texas, Dallas *
*We aren’t endorsed by this school
Course
3377
Subject
Computer Science
Date
May 8, 2024
Type
docx
Pages
39
Uploaded by CoachSparrowMaster99
Week 06 - Lab 1 ( APUE )
Muhammad
login as: axm210331
Pre-authentication banner message from server:
| University of Texas at Dallas
| Department of Computer Science
|
| Use of UTD Information Systems is subject to
| the UTD Information Security and Acceptable Use Policy.
|
| Pursuant to Texas Administrative Code 202:
| (1) Unauthorized use is prohibited;
| (2) Usage may be subject to security testing and monitoring;
| (3) Misuse is subject to criminal prosecution; and
| (4) No expectation of privacy except as otherwise provided by applicable
| privacy laws.
|
| ATTENTION: utdnetid != utdnetid@utdallas.edu (UTD != Google!)
|
| Just use utdnetid, and for the love of programming, STOP USING ALL CAPS!
|
| [[NOTE: All CS Graduate Students should use csgrads1.utdallas.edu ]]
| [[ If you are a CS Graduate Student, you cannot logon to this server.]]
|
|
| ***** This system will require a connection to the GlobalProtect VPN startin
> g
| on the following dates:
|
| cslinux1.utdallas.edu - June 15, 2020
| cslinux2.utdallas.edu - June 22, 2020
|
| ***** GlobalProtect VPN Instructions: https://www.utdallas.edu/oit/howto/vpn
> /
|
End of banner message from server
Keyboard-interactive authentication prompts from server:
End of keyboard-interactive prompts from server
+----------------------------------------------------------------------+
MobaXterm Personal Edition v23.2 (SSH client, X server and network tools) ? SSH session to axm210331@cslinux1.utdallas.edu Direct SSH : ? SSH compression : ? SSH-browser : ? X11-forwarding : ? (remote display is forwarded through SSH) ? For more info, ctrl+click on help or visit our website. +----------------------------------------------------------------------+
Last login: Sat Sep 30 00:42:58 2023 from 10.50.124.129
***---***---***---***---***---***
csgrads1.utdallas.edu - CentOS Linux 7.9
--All CS Graduate Students should use csgrads1--
cs1.utdallas.edu - CentOS Linux 7.9
cs2.utdallas.edu - CentOS Linux 7.9
***---***---***---***---***---***
This system is for use by CS students who need a general purpose Linux system
to complete homework assignments. Computationally or resource intensive
simulations will be throttled automatically.
Thank you,
CS Lab Manager
cs-labs@utdallas.edu
/scratch disk space can be used for temporary files.
All files within /scratch will be erased on a regular basis (Sunday 0300).
{cslinux1:~} script apue
script: cannot open apue: Is a directory
Terminated
{cslinux1:~} script week5lab1
Script started, file is week5lab1
{cslinux1:~} cd apue
{cslinux1:~/apue} gunzip src.3e.tar.gz
{cslinux1:~/apue} tar -xvf src.3e.tar
apue.3e/
apue.3e/advio/
apue.3e/daemons/
apue.3e/datafiles/
apue.3e/db/
apue.3e/DISCLAIMER
apue.3e/environ/
apue.3e/exercises/
apue.3e/figlinks/
apue.3e/filedir/
apue.3e/fileio/
apue.3e/include/
apue.3e/intro/
apue.3e/ipc1/
apue.3e/ipc2/
apue.3e/lib/
apue.3e/Make.defines.freebsd
apue.3e/Make.defines.linux
apue.3e/Make.defines.macos
apue.3e/Make.defines.solaris
apue.3e/Make.libapue.inc
apue.3e/Makefile
apue.3e/printer/
apue.3e/proc/
apue.3e/pty/
apue.3e/README
apue.3e/relation/
apue.3e/signals/
apue.3e/sockets/
apue.3e/standards/
apue.3e/stdio/
apue.3e/systype.sh
apue.3e/termios/
apue.3e/threadctl/
apue.3e/threads/
apue.3e/threads/badexit2.c
apue.3e/threads/barrier.c
apue.3e/threads/cleanup.c
apue.3e/threads/condvar.c
apue.3e/threads/exitstatus.c
apue.3e/threads/Makefile
apue.3e/threads/maketimeout.c
apue.3e/threads/mutex1.c
apue.3e/threads/mutex2.c
apue.3e/threads/mutex3.c
apue.3e/threads/rwlock.c
apue.3e/threads/threadid.c
apue.3e/threads/timedlock.c
apue.3e/threadctl/atfork.c
apue.3e/threadctl/detach.c
apue.3e/threadctl/getenv1.c
apue.3e/threadctl/getenv2.c
apue.3e/threadctl/getenv3.c
apue.3e/threadctl/Makefile
apue.3e/threadctl/suspend.c
apue.3e/threadctl/timeout.c
apue.3e/termios/csize.c
apue.3e/termios/ctermid.c
apue.3e/termios/getpass.c
apue.3e/termios/isatty.c
apue.3e/termios/Makefile
apue.3e/termios/settty.c
apue.3e/termios/t_getpass.c
apue.3e/termios/t_isatty.c
apue.3e/termios/t_raw.c
apue.3e/termios/t_ttyname.c
apue.3e/termios/ttyname.c
apue.3e/termios/winch.c
apue.3e/stdio/buf.c
apue.3e/stdio/fgetsfputs.c
apue.3e/stdio/getcharbug.c
apue.3e/stdio/getcputc.c
apue.3e/stdio/Makefile
apue.3e/stdio/memstr.c
apue.3e/stdio/mkstemp.c
apue.3e/stdio/tempfiles.c
apue.3e/standards/conf.c.modified
apue.3e/standards/makeconf.awk
apue.3e/standards/Makefile
apue.3e/standards/makeopt.awk
apue.3e/standards/pathconf-lim.sym
apue.3e/standards/pathconf-opt.sym
apue.3e/standards/sysconf-lim.sym
apue.3e/standards/sysconf-opt.sym
apue.3e/sockets/clconn.c
apue.3e/sockets/clconn2.c
apue.3e/sockets/findsvc.c
apue.3e/sockets/initsrv1.c
apue.3e/sockets/initsrv2.c
apue.3e/sockets/makefile
apue.3e/sockets/ruptime-dg.c
apue.3e/sockets/ruptime.c
apue.3e/sockets/ruptimed-dg.c
apue.3e/sockets/ruptimed-fd.c
apue.3e/sockets/ruptimed.c
apue.3e/signals/abort.c
apue.3e/signals/child.c
apue.3e/signals/critical.c
apue.3e/signals/Makefile
apue.3e/signals/mask.c
apue.3e/signals/read1.c
apue.3e/signals/read2.c
apue.3e/signals/reenter.c
apue.3e/signals/setops.c
apue.3e/signals/sigtstp.c
apue.3e/signals/sigusr.c
apue.3e/signals/sleep1.c
apue.3e/signals/sleep2.c
apue.3e/signals/suspend1.c
apue.3e/signals/suspend2.c
apue.3e/signals/system.c
apue.3e/signals/systest2.c
apue.3e/signals/tsleep2.c
apue.3e/relation/Makefile
apue.3e/relation/orphan3.c
apue.3e/pty/driver.c
apue.3e/pty/loop.c
apue.3e/pty/main.c
apue.3e/pty/Makefile
apue.3e/proc/awkexample
apue.3e/proc/echoall.c
apue.3e/proc/exec1.c
apue.3e/proc/exec2.c
apue.3e/proc/fork1.c
apue.3e/proc/fork2.c
apue.3e/proc/Makefile
apue.3e/proc/nice.c
apue.3e/proc/pracct.c
apue.3e/proc/pruids.c
apue.3e/proc/system.c
apue.3e/proc/systest1.c
apue.3e/proc/systest3.c
apue.3e/proc/tellwait1.c
apue.3e/proc/tellwait2.c
apue.3e/proc/test1.c
apue.3e/proc/times1.c
apue.3e/proc/vfork1.c
apue.3e/proc/wait1.c
apue.3e/printer/ipp.h
apue.3e/printer/Makefile
apue.3e/printer/print.c
apue.3e/printer/print.h
apue.3e/printer/printd.c
apue.3e/printer/util.c
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
95
arrow_forward
The CAN-SPAM Act of 2003 was the first law meant to curtail unsolicited email, often referred to as spam. However, the law has many loopholes. Internet service providers (ISPs) and organizations' email administrators use antispam technologies as the front line guards against spam.
Although spam still exists, do you think the CAN-SPAM Act has been effective? Why or why not?In what ways does spam affect digital forensic investigations?
arrow_forward
TASK 01 (SHODAN)•For this assignment you will have to do some observation task on some vulnerabilities that can be exploited to attack ICS security.•Remember: ONLY OBSERVE for study purpose. UNITEN will not be responsible for your experimentation beyond the required task.Search for potential location of ICS devices•Use Shodan website•Search for location that is linked to port 102 in Malaysia•Note how many are there in Malaysia1.Find out what all those displayed information mean from the search. Explain it in your report. [5 marks]2.Use the map in SHODAN to actually find out where these location actually is. [2 marks]3.Cross check with google map if the location is actually real. List at least TWO detailed address and information found through SHODAN, [3 marks]4.Extra bonus marks: Find out other port number that might be used by ICS device and perform a search. List them out and perform the same test. Write the same report of your findings.
TASK 02 (GOOGLE HACKING)•For this assignment…
arrow_forward
1)Discusss the security aspects of gmail system
arrow_forward
Alert dont submit AI generated answer.
please show all steps.
arrow_forward
a) Alice is an employee at the Xiamen University of Technology (XUT). Recently, Alice's
computer had some issues, and the IT department of XUT provided Alice with a
temporary computer. While using this temporary computer, Alice notices (from the
browser history, downloaded files) that the temporary computer was previously used by
some other employees of XUT, and contains sensitive information such as several user's
ID and passwords (stored in the browser), PowerPoint slides containing confidential
employee information etc.
To address the security issues discussed in this scenario, answer the below questions:
i) Describe a control measure based on policy and procedures, and a control measure
based on education, training and awareness.
i1)
Compare the control measures described above. Which of these do you think will
be the most effective in this scenario? Justify your answer.
arrow_forward
Cryptography involves five important concepts, integrity, confidentiality, authentication, non-repudiation, and digital signatures. Please describe the technical process, in detail, that involves sending an encrypted email from a sender to a receiver. Be sure to include and describe the technical details for each of the five concepts and the cryptography that takes place. (i.e SHA, AES, RSA, etc.). Please include in our discussion what the difference between a hashing algorithm and an encryption.
arrow_forward
Describe the security techniques used for the following
situations and justify their uses:
a) Separating files of one user from another
b) Making data secure and hard to read by unauthorised users
c) Detecting malicious files received from the Internet
d) Blocking unwanted traffic trying to access a network
criteria
List the names, purposes and characteristics of a range of security techniques.
Justify the use of a range of security techniques in typical situations.
note
just listing isn’t enough. We need to know the purpose and technical details of each security technique
no handwriting please
arrow_forward
Can you read this and correct errors if you see them please thank you for some reason bartleby write not working and I need it edit please? Thank you for your time
I chose cybersecurity specialist as my career for several reasons. The main reason is I can provide for my family. I will be able to hire assistants, and we can live more comfortably. Cybersecurity is a technology equipped to protect programs, network, system, and data from cyber-attack. Since the introduction of new technology, adjustment of cyber threats and risk is accumulating for cybercriminal. Today cybersecurity is important because the world uses more technology, and when you use your device more likely cyber-attack can affected. Cybersecurity protects electronic data and information. For my career I desire to stop cybercriminal who are escalating their attacks with advancement from technology. Taking cybersecurity, I would love to fix cyber-attack, yet also protect your device before cybering comes in. The types of…
arrow_forward
According to the courts, what does the First Amendment of the U.S. Constitution allow
for internet free "speech?" May the Government browse Web sites without a warrant in
order to nip terrorism plots in the bud? What does the Fourth Amendment's search and
seizure provisions allow with regard to shutting down objectionable web sites? What about
sites that are hosted overseas?
arrow_forward
Artemis Financial is looking to encrypt their archive files and they need advice from you, as the developer and security expert, on employing best practices for encrypting their long-term archive files. You will need to research and identify the best and most secure cipher available today to recommend to Artemis Financial. Ultimately, you will recommend the algorithm cipher for file encryption that is most appropriate for their needs.
Your recommendations should be documented and delivered to Artemis Financial. This work will inform your continued work with Artemis Financial in Project Two. However, the specifics of this assignment will not be required as a deliverable in Project Two.
Address the following in your recommendations to Artemis Financial:
Algorithm Cipher: Review the scenario and the Java Security Standard Algorithm Names, a standard list of algorithm ciphers provided by Oracle for recommending an appropriate encryption algorithm cipher. Specifically, recommend an…
arrow_forward
You've been warned about a ransomware assault known as Ryuk. Assume that each infected device will cost you $100 to restore your files.
Write a one-page executive briefing (in memo style) outlining the following actions to address the danger you've identified:
Find out about a security danger and/or breach and study the information you findAssess the danger and prepare a briefing for senior management (a one-page paper in Word, PDF, etc.)Write a concise summary of the main aspects of the problemWhat effect, if any, could it have on St. Eligius?Make suggestions for short-term measures to reduce the risk.Suggestions for long-term mitigation
arrow_forward
You are assisting with the Investigation of a report of Bestiality, and have been accessed to conduct the digital forensic examination of the Suspect’s Cellular telephone. You have been provided with a Warrant, which authorizes you to acquire a forensic image of all data on the phone, and then conduct a subsequent review of the data for images or videos of obscenity involving animals. The Warrant authorizes you to search all files and folders on the phone, to include deleted files, unallocated space which may exist on the phones flash memory, and, to conduct the same examination of any SD Card the phone may contain.
After conducting an acquisition of the data using the Cellebrite Physical Analyzer Mobile Device Toolkit, you realize no images or videos were extracted. After a little research, you realize that the phone uses a Cloud Based storage system, by default, to save all pictures and videos to the users Google Drive. In an attempt to verify this setting, you set up a digital…
arrow_forward
You are assisting with the Investigation of a report of Bestiality, and have been accessed to conduct the digital forensic examination of the Suspect’s Cellular telephone. You have been provided with a Warrant, which authorizes you to acquire a forensic image of all data on the phone, and then conduct a subsequent review of the data for images or videos of obscenity involving animals. The Warrant authorizes you to search all files and folders on the phone, to include deleted files, unallocated space which may exist on the phones flash memory, and, to conduct the same examination of any SD Card the phone may contain.
After conducting an acquisition of the data using the Cellebrite Physical Analyzer Mobile Device Toolkit, you realize no images or videos were extracted. After a little research, you realize that the phone uses a Cloud Based storage system, by default, to save all pictures and videos to the users Google Drive. In an attempt to verify this setting, you set up a digital…
arrow_forward
You are assisting with the Investigation of a report of Bestiality, and have been accessed to conduct the digital forensic examination of the Suspect’s Cellular telephone. You have been provided with a Warrant, which authorizes you to acquire a forensic image of all data on the phone, and then conduct a subsequent review of the data for images or videos of obscenity involving animals. The Warrant authorizes you to search all files and folders on the phone, to include deleted files, unallocated space which may exist on the phones flash memory, and, to conduct the same examination of any SD Card the phone may contain.
After conducting an acquisition of the data using the Cellebrite Physical Analyzer Mobile Device Toolkit, you realize no images or videos were extracted. After a little research, you realize that the phone uses a Cloud Based storage system, by default, to save all pictures and videos to the users Google Drive. In an attempt to verify this setting, you set up a digital…
arrow_forward
Q3) Now a day, nearly every library, airport and hotel offer a way to access the
Internet from your cell phone or other mobile device. That means the information
you have on your phone could be available to hackers in the area – unless you've
taken steps to protect your data. As a computer engineering, how can you protects
your phone data from hackers? Discuss this issue briefly.
arrow_forward
In this day and age of advanced technology, could you please explain why authentication still poses such a challenge?
arrow_forward
Authentication in today's internet world seems like a daunting endeavor; please explain the reasons why this is the case.
arrow_forward
Justify the challenges that modern authentication procedures entail in light of our prevalent Internet culture.
arrow_forward
Discuss the concept of end-to-end encryption in messaging apps. How does it work, and what are the security and privacy implications of implementing end-to-end encryption?
arrow_forward
Provide justification for why authentication is a problem in today's Internet-based culture.
arrow_forward
Discuss the principles of end-to-end encryption and its role in securing data transmission over the Internet.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Related Questions
- 95arrow_forwardThe CAN-SPAM Act of 2003 was the first law meant to curtail unsolicited email, often referred to as spam. However, the law has many loopholes. Internet service providers (ISPs) and organizations' email administrators use antispam technologies as the front line guards against spam. Although spam still exists, do you think the CAN-SPAM Act has been effective? Why or why not?In what ways does spam affect digital forensic investigations?arrow_forwardTASK 01 (SHODAN)•For this assignment you will have to do some observation task on some vulnerabilities that can be exploited to attack ICS security.•Remember: ONLY OBSERVE for study purpose. UNITEN will not be responsible for your experimentation beyond the required task.Search for potential location of ICS devices•Use Shodan website•Search for location that is linked to port 102 in Malaysia•Note how many are there in Malaysia1.Find out what all those displayed information mean from the search. Explain it in your report. [5 marks]2.Use the map in SHODAN to actually find out where these location actually is. [2 marks]3.Cross check with google map if the location is actually real. List at least TWO detailed address and information found through SHODAN, [3 marks]4.Extra bonus marks: Find out other port number that might be used by ICS device and perform a search. List them out and perform the same test. Write the same report of your findings. TASK 02 (GOOGLE HACKING)•For this assignment…arrow_forward
- 1)Discusss the security aspects of gmail systemarrow_forwardAlert dont submit AI generated answer. please show all steps.arrow_forwarda) Alice is an employee at the Xiamen University of Technology (XUT). Recently, Alice's computer had some issues, and the IT department of XUT provided Alice with a temporary computer. While using this temporary computer, Alice notices (from the browser history, downloaded files) that the temporary computer was previously used by some other employees of XUT, and contains sensitive information such as several user's ID and passwords (stored in the browser), PowerPoint slides containing confidential employee information etc. To address the security issues discussed in this scenario, answer the below questions: i) Describe a control measure based on policy and procedures, and a control measure based on education, training and awareness. i1) Compare the control measures described above. Which of these do you think will be the most effective in this scenario? Justify your answer.arrow_forward
- Cryptography involves five important concepts, integrity, confidentiality, authentication, non-repudiation, and digital signatures. Please describe the technical process, in detail, that involves sending an encrypted email from a sender to a receiver. Be sure to include and describe the technical details for each of the five concepts and the cryptography that takes place. (i.e SHA, AES, RSA, etc.). Please include in our discussion what the difference between a hashing algorithm and an encryption.arrow_forwardDescribe the security techniques used for the following situations and justify their uses: a) Separating files of one user from another b) Making data secure and hard to read by unauthorised users c) Detecting malicious files received from the Internet d) Blocking unwanted traffic trying to access a network criteria List the names, purposes and characteristics of a range of security techniques. Justify the use of a range of security techniques in typical situations. note just listing isn’t enough. We need to know the purpose and technical details of each security technique no handwriting pleasearrow_forwardCan you read this and correct errors if you see them please thank you for some reason bartleby write not working and I need it edit please? Thank you for your time I chose cybersecurity specialist as my career for several reasons. The main reason is I can provide for my family. I will be able to hire assistants, and we can live more comfortably. Cybersecurity is a technology equipped to protect programs, network, system, and data from cyber-attack. Since the introduction of new technology, adjustment of cyber threats and risk is accumulating for cybercriminal. Today cybersecurity is important because the world uses more technology, and when you use your device more likely cyber-attack can affected. Cybersecurity protects electronic data and information. For my career I desire to stop cybercriminal who are escalating their attacks with advancement from technology. Taking cybersecurity, I would love to fix cyber-attack, yet also protect your device before cybering comes in. The types of…arrow_forward
- According to the courts, what does the First Amendment of the U.S. Constitution allow for internet free "speech?" May the Government browse Web sites without a warrant in order to nip terrorism plots in the bud? What does the Fourth Amendment's search and seizure provisions allow with regard to shutting down objectionable web sites? What about sites that are hosted overseas?arrow_forwardArtemis Financial is looking to encrypt their archive files and they need advice from you, as the developer and security expert, on employing best practices for encrypting their long-term archive files. You will need to research and identify the best and most secure cipher available today to recommend to Artemis Financial. Ultimately, you will recommend the algorithm cipher for file encryption that is most appropriate for their needs. Your recommendations should be documented and delivered to Artemis Financial. This work will inform your continued work with Artemis Financial in Project Two. However, the specifics of this assignment will not be required as a deliverable in Project Two. Address the following in your recommendations to Artemis Financial: Algorithm Cipher: Review the scenario and the Java Security Standard Algorithm Names, a standard list of algorithm ciphers provided by Oracle for recommending an appropriate encryption algorithm cipher. Specifically, recommend an…arrow_forwardYou've been warned about a ransomware assault known as Ryuk. Assume that each infected device will cost you $100 to restore your files. Write a one-page executive briefing (in memo style) outlining the following actions to address the danger you've identified: Find out about a security danger and/or breach and study the information you findAssess the danger and prepare a briefing for senior management (a one-page paper in Word, PDF, etc.)Write a concise summary of the main aspects of the problemWhat effect, if any, could it have on St. Eligius?Make suggestions for short-term measures to reduce the risk.Suggestions for long-term mitigationarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,