Skip to main content

Who is system administrator?

5.Who is System administrator?
Ans.
1. Linux system administrator is the person who has “root” access, which is to say the one who is the system’s ‘superuser’ (or root user).

2. A standard Linux user is limited to whatever he/she can do with underlying engine of the system.

3. But root user has unuttered access to everything that includes user accounts their home directories and the files inside those directories, all system configuration and all the files on the system.

4. A certain body of thought says no one should ever log in as “root” because System administrator tasks can be performed more easily and safely with others.

5. Because system administrator has full privileges his first duty is to know what he is doing.

6. The word duty implies a degree of task or work which is hard to perform.

7. Clearly it’s a tremendous flexibility of system measured against the responsibility to run a tight organisation.

8. These duties do not so much constrain you, the system administrator, as free you to match the job task.


Comments

Popular posts from this blog

Java,ES,QT practical files

All practical files: Click below to start download Uploaded on special request||||

Vidyalankar Question paper solutions

Download from their website: http://www.vidyalankar.org/index.aspx or just click here to download

Discuss security issues in Network File system.

71.Discuss security issues in Network File system. Ans. 1. NFS protocol version 3 and older have some security problems that make it unsuitable for use across the Internet and potentially unsafe for use even in trusted network. 2. One NFS weakness, in general terms, is the /etc/exports file, if a cracker is able to spoof or take over a trusted address, an address listed in /etc/exports then your exported NFS mount are accessible. 3. NFS has normal Linux file system access controls that take over once a client has mounted an NFS export, once this happens normal user and group permissions on the files take over access control. 4. The 1st way to defense is to use host access control, to limit access to services , particularly the portmapper, which has long been target of exploits attempts. 5. For this add the entries in /etc/hosts.clevy lockd, statd, mountd and rquoted. 6. Careful use of IS packet firewall, using netfilter, dramatically increases NFS server security. ...