i
Installation in Standalone Machine
Installation through NFS
Installation Through FTP
Installation Through HTTP
Installation Through KICKSTART
Creation Of File Systems
Understanding EXT2, EXT3 & EXT4 File Systems
Converting Ext2 to Ext3 File Systems
Reverting back from Ext3 to Ext2 File systems
Understanding fdisk, e2label, mount, umount commands
Understanding fstab and mtab Hles
File System Management Troubleshooting
Understanding different types of groups and creation of groups
Creation of users in different groups
Understanding Passwd, Shadow Files
Understanding Passwd Aging
Creation of Quotas for Users, Groups and File Systems
Understanding Users Security Files
The different commands for Monitoring the Users
User Management Troubleshooting
Understanding the different types of run-levels
Understanding different types of shutdown commands
Understanding run control scripts
Understanding NFS server and NFS clients
Understanding daemons and Files in NFS of boot phases
Configuring NFS server and different NFS clients
Configuration of autofs, NFS security
Understanding the features and advantages of FTP Server
Configuring FTP server and FTP clients
Configuring FTP server for anonymous and real Users with download and upload permissions
Configuring FTP User access, FTP security
Understanding FTP Basic Commands
Configuring of Anonymous FTP Server
Understanding XINETD based and non XINETD based services
Configuring XINETD based services
XINETD security
Understanding DNS Service and different types of DNS Servers
Configuring DNS (Master) DNS (Slave)
Understanding & Configuring forward (DNS) and cache (DNS) of boot phases
Understanding different types of files when the system is booting
DNS Troubleshooting
Creation of file systems and converting into LVM
Creation of Physical Partitions
Creation of Volume Groups
Creation of Logical Partitions
Extending the Volume Group
Extending the Logical Partitions
Understanding the features and advantages of RPM
Installation of RPM Packages
Up-gradation of RPM
Verification of RPM
Querying
RPM Troubleshooting
Understanding different types of File System Backup
Understanding different types of Files Backups
Understanding different types of Dump Levels
Understanding Monthly, Weekly, Daily Backups
Different types of Backup strategies
Understanding NIS and daemons at NIS (Server, Slave and Clients)
Configuring NIS (Master), NIS (Slave) and NIS clients
Integrating NIS ( Master and Slave) with NFS Server
Understanding of APACHE
Configuring APACHE Web Server with virtual hosting
Configuring APACHE Web Server with IP BASED, HOST BASED and PORT BASED
Understanding the features and advantages of Samba Server
Configuring SAMBA for heterogeneous environment
Sharing the resources between Unix to Unix using SAMBA
Sharing the resources between Windows to Unix (vice-versa)
SAMBA security
UNIX and GNU Linux are a true multi user OS
When opening to work on a Linux box, it can be prevented by the number of system and user accounts may find in the /etc/passwd file. A Multi-user capability is a large asset for a system but it inevitably to be secured.
Detect and repair security holes
Empty passwords
Empty passwords strength be the result of a successful attack and used as a backdoor. Can also be a simplex misconfiguration by the system Administrator. Let's see how to detect it :
awk -F':' '{ if ( $2 == "" ) print $1 }' /etc/shadow
How to quick fix it : Deactivate stated accounts using the CLI as root.
usermod -s /bin/false -L --expiredate 1 "$account"
UID 0 accounts
The root should have the UID 0. Another account with that UID is frequently similar to the backdoor.
How to detect it :
awk -F':' '{ if ( $3 == "0" ) print $1 }' /etc/passwd
How to fix it : Disable account.
usermod -s /bin/false -L --expiredate 1 "$account"
Don't miss out!