Skip to main content

Write a note on cron files.

35.Write a note on cron files.
Ans.
1. ‘cron’ is a daemon that executes commands according to a preset schedule that a user defines.

2. It wakes up every minute and checks all cron files to see what jobs need to be run at that time.

3. cron files can be set up by user or the system administrator to take care of system task.

4. Users edit their crontab files by telling cron what programs they’d like to run automatically and how often they’d like to run them.

5. User crontab files are stored in ‘/var/spool/cron’. They are named after the user they belong to.

6. System cron files are stored in the following subdirectories of the /etc directory:
cron.d
cron.daily
cron.hourly
cron.monthly
cron.weekly

7. crontab in the /etc directory is sort of the master control file set up to run all the scripts.

8. By default, a file in cron.d called ‘sysstat’ runs a system activity accounting tool every 10 minutes, 24x7.

Comments

Popular posts from this blog

Java,ES,QT practical files

All practical files: Click below to start download Uploaded on special request||||

Vidyalankar Question paper solutions

Download from their website: http://www.vidyalankar.org/index.aspx or just click here to download

Discuss security issues in Network File system.

71.Discuss security issues in Network File system. Ans. 1. NFS protocol version 3 and older have some security problems that make it unsuitable for use across the Internet and potentially unsafe for use even in trusted network. 2. One NFS weakness, in general terms, is the /etc/exports file, if a cracker is able to spoof or take over a trusted address, an address listed in /etc/exports then your exported NFS mount are accessible. 3. NFS has normal Linux file system access controls that take over once a client has mounted an NFS export, once this happens normal user and group permissions on the files take over access control. 4. The 1st way to defense is to use host access control, to limit access to services , particularly the portmapper, which has long been target of exploits attempts. 5. For this add the entries in /etc/hosts.clevy lockd, statd, mountd and rquoted. 6. Careful use of IS packet firewall, using netfilter, dramatically increases NFS server security. ...