preview

4. 1 Task : Install A Linux Distros

Decent Essays

4.1 Task: Install a Linux Distro
1. You will need a USB drive of 8 GB or higher capacity. Install a Linux distribution of your choice, but within the Ubuntu family, onto the USB drive as if it is a HDD.
1. This can be the multiboot USBD you created in an earlier lab. You will need to mount the system read-and-write. The so-called frugal-install or ISO based installs will not do.
2. Should you wish to work with non-Ubuntu distros, adapt the following appropriately.
2. Establish at least 5 ordinary users with names and passwords of your choice. Learn how to do this as a script. Include the script in your submission. The following script was used to create the users. (See figure 1).

#!/bin/bash
# Script to add a user to Linux system if [ …show more content…

I created a stronger password
4.2 Task: DAC Examples
1. Take five examples as-is from LXU and explain DAC ideas.

4.3 Task: File Permissions, Etc
1. Find and report all files with peculiar permissions. Examples: no permissions given --- --- ---, executable but not readable, readable for group and others but not the owner, unsearchable directories, etc.
To view file permissions, I used ls -la (-- removed HTML --) command. For instance, to display all the files of the /root directory, I typed ls -la /root. (see figure 4). The –a option would display the hidden files which are typically the system files. Figure 4: viewing file permissions
The log.txt has no read, write, execute permissions.
2. Files and directories whose names begin with a dot are unlisted by ls unless -a flag is used. Find and report all such files and directories whose size is larger than 10 MB.
4.4 Task: Check for Weak Logins
1. No password shoul be breakable within an hour. List the names and plain text passwords of such users. Assume you are root.
2. Should root be allowed to login? Ubuntu/ Debian do not assign a passwd to root. Discuss the pro/cons of this choice.
The advantages of not having root password is that the users can easily swich to root without signing in with a password. This gives a flexibility of running certain scripts and installing programs.
However, not assigning a password to root would be disadvantageous in terms of security. Any user in the group would be able to

Get Access