mohammed-lvw644-IS1003_Lab-02
.pdf
keyboard_arrow_up
School
University of Texas, San Antonio *
*We aren’t endorsed by this school
Course
1003
Subject
Computer Science
Date
Apr 3, 2024
Type
Pages
13
Uploaded by BailiffGuanacoMaster519
1 IS-1003-ON1-Spring-2022-Unlocking Cyber Lab 02 –
Versioning Your Work Author
: Fiona Mohammed Course Section
: IS-1003-ON1-Spring-2022-Unlocking Cyber Date
: March 11, 2022 I
NTRODUCTION
The objective of this Lab is for me to learn about GitHub, and setup a GitHub account. I will also learn to set up “
git
”
on my local machine and Sync my local “
git
”
repository with my online GitHub account. I will learn and understand GitHub, which is a code hosting platform for version control and collaboration. The “git” in GitHub is a free, open
-source, and distributed version control system designed to track changes and coordinating work among programmers during software development. Each version provides a snapshot of a system at a particular point in time. Version control is a critical practice for any system, and particularly important with evolving technologies. P
ROCESS
My GitHub Account with Username:
Below is an image of my GitHub Account with Username. The website needed my student ID or an official document from the University in order to verify that I am a current student, before I was allowed to successfully complete setting up my account. (Breakpoint #1
–
GitHub Account with Username)
2 Definitions of Push, Pull, Fork, Commit, Clone, and Branch: Push: The git push
command is a command that is used to add or upload contents in the local repository to a remote repositor. Files and changes will be visible to everyone with permission to the remote repository. Pull: The git pull
command fetches and downloads files from the remote repository and then instantly updates the local repository to match that content. Fork: The fork
command is an independent copy of repository that can be used as a “
c
opy”
to experiment on the project without affecting or messing with the actual project. Commit: The commit
command in git is used to save changes to the local repository. Git will not make changes to the project unless you authorize it to. Clone: The clone
command is used to create a synchronized linked copy of the online repository to your local machine using git. Branch: Creating a branch
generates a new pointer to help you move around. The branch
command is used for creating new branches, deleting branches, listing branches, and renaming them. (Breakpoint #2
–
Definitions of key git commands in my words)
3 Evidence of git configuration with output:
Below is evidence of my git configuration with output. I followed the steps on the instruction carefully and watched the video by the instructor, to make sure I set up correctly. I was worried about my email address getting rejected or the configuration having an error since I initially used my personal email address for the setup but needed to provide and add my student email address on GitHub to verify that I am a current student. I was not sure which email to use on the terminal, but it accepted my personal email and successfully configured. (Breakpoint #3 –
Evidence of git configuration with output)
4 Setting Up a GitHub Repository:
Below is an image of my very first repo. I had initially used two words to name it, but realized the instruction stated to use one word, no spaces. It seemed like the interface looked a little di
fferent than the instructor’s interface, but I did not run into any challenges, and setting up my new repo was straight forward. I named it myfirstrepo.
(Breakpoint #4 –
My new GitHub repo)
5 Committing my First Git Repo
: Below are some images with all the commands/outputs that I used in Committing my First Git Repo. I used the command “
pwd
”
to verify my path, and ls command to see what is in the directory. I used the “
cd
”
command to change the directory to my “mohammed
” folder and verified the contents of this folder by typing the “ls”
command again in this directory. I then created a new subfolder/subdirectory under “mohammed”
folder with the “
mkdir
”
command and named it “
test
”. I deleted the test directory with “
rmdir
”
command and created another one with the same name as my repo folder and verified it was created, using the “
ls
”
command. I switched to that directory using the “cd”
command, and “ls”
to verify it was empty. Next, I created a README File by using a simple echo
command, I chose a quote, and redirected it to a README.md
file using the redirecting symbol >>. I verified that the README.md
file exists by typing “
ls
”
which printed out the contents of the file and then “
ca
t README.md”
command to see my echo text. I initialized the local git repo I created by using the “
git init
“command, I added the file to the staging area by using “git add README.md” command. I used the “git commit -
m “first commit”” to verify that the file is Version Controlled, I then changed the name of the branch from master to main using the “git branch -
m main” command
, and my repo’s main
branch automatically converts to main. I used the “git branch”
command to verify that it had changed. (Breakpoint #5a –
My first Repo Commands and Outputs)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Identifying New Computer Viruses and Worms
Objective: Examine some current computer virus threats.
Description: As a security professional, you must keep abreast of the manynew viruses and worms that might attack networks
and computers. If one computer is compromised, all computers in your network could be compromised. Many firewalls don't
detect malware attached to an executable program or amacro virus (covered later in this section), so securityprofessionals needto
train users on the dangers of installing software, including games and screensavers, on a computer. Remember, a firewall doesn't
examine packets internal to the network, so malware can spread internally in an organization regardless of how effective the
firewall is. A good place to learn about new threats is the Internet.
1. Start your Webbrowser, and go to www.us-cert.gov.
2. Onthe homepage, type Conficker Wormin the SearchUS-CERTtext box, and then click the
GObutton. WhatOSsareaffected bythis worm?
3.…
arrow_forward
Logins may be managed in a variety of ways. Keep track of everything you've done so far to confirm your identity. What do you think about the future of passwords?
arrow_forward
Introduction to security
arrow_forward
Font
Paragraph
Styles
Example-3
A company sells product via website. Website earns $ 5000 an hour in revenue.
When an attack happens, website normally fails for three hours, Cost to repair is
$1000.It was seen that in the previous years, website was down for at least 4 times
a year. Calculate SLE, ARO, ALE for the above data,
The company wishes to purchase a fail over server to reduce this problem and the
cost of implementing it is $15000. If ARO can be reduced to 1 by implementing
fail over server, do you think that it is a feasible option?
12
arrow_forward
ic Calendar My MCBS Library English (en) -
What is the difference between Phishing and Key Loggers?
A BI.
= 三
四
arrow_forward
What if a virus was present on your tablet or smartphone?
Identify the kind of malware you may be dealing with. How
did you ensure the malware was removed from your
computer? If you don't have access to this data, you may
test a piece of mobile malware before downloading it and
posting about it in this thread.
arrow_forward
True or False:
As part of access control, we deploy settings that prevent users or hackers from seeing and exporting more data than we intend them to receive.
Group of answer choices
arrow_forward
Q11
arrow_forward
Computer Science
Create tool to decrypt or get clear version of encrypted bank account number data.
Command line utility … “Tool” | “encrypted value” —> output is decrypted value
arrow_forward
create a Login and registration page using python and mysql
please TYPE the code
The one I recieved befor was all images
arrow_forward
a. Why is it dangerous for an email program to open attachments automatically,without waiting for the user to select them?
b. Why is it dangerous to surf the Web using an open Wi-Fi network; that is, one thatdoes not require a password?
arrow_forward
Code in python Brute Force Attack
You will take an encrypted msg and the code will search for the keys for decrypting the message.
Please ONLY upload SCREENSHOTS of code and output of the code. No explanation please or i will vote down. Thank you.
arrow_forward
Explain the process of setting up and configuring BitLocker encryption in Windows for enhanced data security.
arrow_forward
Challenge–response authentication: what is it? Explain. Why is it safer than a password-based system?
arrow_forward
How do password managers save encrypted passwords? Local, web-based, cloned, or USB-based?
arrow_forward
332
arrow_forward
Course Title: Computer and Cyber Security
I need this questions answer as soon as possible.
Questiton:
Apply Playfair cipher to encrypt the message “the key is hidden under the door pad” using “friday” as a key (Ignore the space between the words).
arrow_forward
Q3) Now a day, nearly every library, airport and hotel offer a way to access the
Internet from your cell phone or other mobile device. That means the information
you have on your phone could be available to hackers in the area – unless you've
taken steps to protect your data. As a computer engineering, how can you protects
your phone data from hackers? Discuss this issue briefly.
arrow_forward
Distinguish between spoofing and session hijacking. Assuming you're a web user, write down any two precautions you take to avoid session hijacking.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Related Questions
- Identifying New Computer Viruses and Worms Objective: Examine some current computer virus threats. Description: As a security professional, you must keep abreast of the manynew viruses and worms that might attack networks and computers. If one computer is compromised, all computers in your network could be compromised. Many firewalls don't detect malware attached to an executable program or amacro virus (covered later in this section), so securityprofessionals needto train users on the dangers of installing software, including games and screensavers, on a computer. Remember, a firewall doesn't examine packets internal to the network, so malware can spread internally in an organization regardless of how effective the firewall is. A good place to learn about new threats is the Internet. 1. Start your Webbrowser, and go to www.us-cert.gov. 2. Onthe homepage, type Conficker Wormin the SearchUS-CERTtext box, and then click the GObutton. WhatOSsareaffected bythis worm? 3.…arrow_forwardLogins may be managed in a variety of ways. Keep track of everything you've done so far to confirm your identity. What do you think about the future of passwords?arrow_forwardIntroduction to securityarrow_forward
- Font Paragraph Styles Example-3 A company sells product via website. Website earns $ 5000 an hour in revenue. When an attack happens, website normally fails for three hours, Cost to repair is $1000.It was seen that in the previous years, website was down for at least 4 times a year. Calculate SLE, ARO, ALE for the above data, The company wishes to purchase a fail over server to reduce this problem and the cost of implementing it is $15000. If ARO can be reduced to 1 by implementing fail over server, do you think that it is a feasible option? 12arrow_forwardic Calendar My MCBS Library English (en) - What is the difference between Phishing and Key Loggers? A BI. = 三 四arrow_forwardWhat if a virus was present on your tablet or smartphone? Identify the kind of malware you may be dealing with. How did you ensure the malware was removed from your computer? If you don't have access to this data, you may test a piece of mobile malware before downloading it and posting about it in this thread.arrow_forward
- True or False: As part of access control, we deploy settings that prevent users or hackers from seeing and exporting more data than we intend them to receive. Group of answer choicesarrow_forwardQ11arrow_forwardComputer Science Create tool to decrypt or get clear version of encrypted bank account number data. Command line utility … “Tool” | “encrypted value” —> output is decrypted valuearrow_forward
- create a Login and registration page using python and mysql please TYPE the code The one I recieved befor was all imagesarrow_forwarda. Why is it dangerous for an email program to open attachments automatically,without waiting for the user to select them? b. Why is it dangerous to surf the Web using an open Wi-Fi network; that is, one thatdoes not require a password?arrow_forwardCode in python Brute Force Attack You will take an encrypted msg and the code will search for the keys for decrypting the message. Please ONLY upload SCREENSHOTS of code and output of the code. No explanation please or i will vote down. Thank you.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning