Week 2 File Systems & Unix Commands. File System Hierarchy.

Slides:



Advertisements
Similar presentations
FILEMAKER SERVER SOFTWARE & REMOTE ADMINISTRATION
Advertisements

Windows 2003 Server. Windows 2003 Server Contents Fitur Windows 2003 Server Installation And Configuration Windows Management Resource  User Management.
Module 5: Configuring Access for Remote Clients and Networks.
Remote Desktop Access Novell at Home. Remote desktop access Works on Broadband Computer at work must.
Secure Shell Client. SSH program allows you to: Access another computer over a network Execute commands on a remote machine Move files from one machine.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Other File Systems: AFS, Napster. 2 Recap NFS: –Server exposes one or more directories Client accesses them by mounting the directories –Stateless server.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Windows Server WHAT IS ACTIVE DIRECTORY? FUNDAMENTALS OF THE ACTIVE DIRECTORY – Benefits of Using the Active Directory in an Enterprise Environment.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
Information Networking Security and Assurance Lab National Chung Cheng University Backdoors and Remote Access Tools INSA Laboratory.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Network File System (NFS) in AIX System COSC513 Operation Systems Instructor: Prof. Anvari Yuan Ma SID:
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
A crash course in njit’s Afs
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Telnet/SSH: Connecting to Hosts Internet Technology1.
Guide to Operating System Security Chapter 5 File, Directory, and Shared Resource Security.
FILEMAKER 8 SERVER ADMINISTRATION Paula Beveraggi Educational Technology Services.
1 T HE A NDREW F ILE S YSTEM (AFS) Michael Moeng Summer 2008.
Computation for Physics 計算物理概論 Introduction to Linux.
CNIT 132 Intermediate HTML and CSS Publish Web Page.
Connecting to USF Network for Web Site SSH Secure Shell is the FTP program you will use to download your http files onto the USF server. To get the SSH.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
File Recovery and Forensics
UNIX command line. In this module you will learn: What is the computer shell What is the command line interface What is the directory tree Some UNIX commands.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
COMP1321 Digital Infrastructure Richard Henson February 2014.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 23 Shared Folders 1.
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
10.1 Silberschatz, Galvin and Gagne ©2005 Operating System Principles 10.4 File System Mounting A file system must be mounted before it can be accessed.
Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 3-1.
A Distributive Server Alberto Pareja-Lecaros. Introduction Uses of distributive computing - High powered applications - Ever-expanding server so there’s.
CHAPTER 9 Sniffing.
Networking Components 10/2/07. Parts of a Network Clients –Computers that request or order information from a server –Usually desktop computers with their.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
1 Objectives Discuss File Services in Windows Server 2008 Install the Distributed File System in Windows Server 2008 Discuss and create shared file resources.
ITEC 502 컴퓨터 시스템 및 실습 Chapter 10-2: File Systems Mi-Jung Choi DPNM Lab. Dept. of CSE, POSTECH.
Introduction to Secure Shell Greg Porter Data Processing Manager USPFO For California.
By Chris Zachor CS 650.  Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion.
Guide to Parallel Operating Systems with Windows 7 and Linux Chapter 11 Networking.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
COMP1321 Digital Infrastructure Richard Henson March 2016.
1 Example security systems n Kerberos n Secure shell.
PuTTY Introduction to Web Programming Kirkwood Continuing Education by Fred McClurg © Copyright 2016, All Rights Reserved ssh client.
Setting up a remote office connection September 2011 Nick Maxwell.
Chapter 2 Operating Systems
Interacting with the cluster ssh, sftp, & slurm batch scripts
Virtual Private Networks
Microsoft Windows NT 4.0 Authentication Protocols
File System Implementation
Remote Access Lecture 2.
Storage Networking.
FTP - File Transfer Protocol
Unit 27: Network Operating Systems
Telnet/SSH Connecting to Hosts Internet Technology.
Computer Security Distributed System Security
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
Transarc AFS Client for NT
Windows Server Administration Fundamentals
Logging into the linux machines
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Week 2 File Systems & Unix Commands

File System Hierarchy

File Names & Extensions File Name: used so that the computer can easily remember the date within File Extensions: allow the operating system to know what application opens the file

File Manipulation

What is AFS? AFS (Andrew File System): is a distributed file system which makes it possible for users to access information from any computer on a network Security Kerberos: used to authorize the user to the system ACL (Access Control List): used to grant privileges to users for all directories on the network. Volumes: To help in scalability, AFS uses volumes, a volume keeps a set of related files & directories together on a disk, which allows admins the ability to add and remove without us losing our data

AFS File Tree

Pathnames

Relative Pathnames ~/ : The ~/ references your home directory, this will be used as a shortcut to get us back to our home directories.. : refers to the directory above the current working directory. : refers to the current working directory

Relative pathname practice The path can be expressed../.elm/inbox ~/.elm/inbox./../.elm/inbox

Client/Server Relationship Server: Is a powerful computer dedicated to managing, which sole task is to govern access to information and “serve” information requested by the client. Client: Is a normal computer, or another server, that request the information from the server and relies on information from the server to complete its task Who is the client and who is the server on NCSU network?

SSH Secure Shell: is a program that allows a computer to connect over a network and execute commands on a remote computer It provides a secure and encrypted connection over an insecure network Also protects networks from attacks such as IP spoofing, IP source routing, and DNS spoofing Uses “tunneling” to group information together in secure SSH packets before sending it over a network

Accessing AFS Windows Students Double click putty.exe icon on desktop Click ‘Eos’ then ‘Load’ Mac Students Open ‘Terminal’ Enter ‘ssh –X *replace userID with your UnityID