Nt1330 Unit 1 Research Paper

Improved Essays
Task 1
In Unix/Linux operating system a user can have root access or not, the root access provides complete access to user of a system. There are some following risks to have a single root user on Unix/Linux operating system.
Easy to hack: If any security error broke the security then a hacker can get the access of all data and can get the whole control of hardware. It allow to retrieve all files and data without root access. So, it is a big risk of losing and stolen data and important information of user (Why is it bad to login as root?, n.d.).
Security: when any application like Flash, Firefox etc is running on root account then any type of weakness of that program can destroy your system. Because, now some viruses have access all over or small bugs in a program can format the necessary files(Why is it bad to login as root?, n.d.).
…show more content…
All actions can hide by root user: All the commands are run through sudo. It has a record of every command which was executed. The root password allows the user to make changes and give rights to execute every command. So, with the help of it any user can delete the work history. A root user has more control on the machine (Why is it bad to login as root?,

Related Documents

  • Improved Essays

    My first research experience started when I participated in bone scaffold designing project at the Cooper Union in Spring 2012, under the supervision of professor David Wootton at Cooper Union Department of Mechanical Engineering. The purpose of this study was to design and manufacture bone scaffold for orthopedic trauma, especially for segmented bone fracture. I worked with a senior mechanical engineering student who had been conducting the research as his senior capstone project. The first task was to test manufacturing efficiency of two different types of polycaprolactone (PCL) with different average molecular weight. I concluded that the low molecular weight PCL is more convenient for mold-casting fabrication, due to low viscosity, while the high molecular weight PCL has an advantage of being mechanically stronger than the brittle…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    QUES 1. A router has the following CIDR entries in the routing table: Address/Mask Next Hop 135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 Router 1 Default Router 2 For each of the following IP addresses, what does the router do if a packet with that address arrives? 1. 135.46.63.10 2.…

    • 607 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and connections to the target host. This attack uses the weakness of the host tracking service that the controller simply follows the latest Packet-in message and does not check the identity of the request.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Hi Hemant, USHDCWPBTD03 and USHDCWPBTD04 we are not using at full extend. Both the servers only use for “Single Sign on Feature”. Both the servers use 2 processor each (2 + 2 = 4). I am thinking if we remove 1 process from each server (1 + 1 = 2) we end up with 2 processer, this will save us some BizTalk cost.…

    • 63 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Isolate Prices Project My program runs as follows first displays the local start time, which would be the current time and would work as almost like the starting point of stopwatch. We than have a vector which is where all the input files information is stored. After, the vector is created we have to fill the vector with the information from the input files. Then we read all the data from the vector and output into 2 files. Lastly the end time is display with the elapsed time.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    A system upgrade is long overdue at NA Videos. This report will outline: 1. Key issues 2. Purpose of the new system (solutions) 3. What the system will and will not include 4.…

    • 577 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 370 Words
    • 2 Pages

    1. The customer edge router will peer only with a provider router and will not peer with other customer edge routers. With reference to the diagram above, CE2 will peer with PE2 and not with CE1 or CE3. 2. If a new site is added, configuration is done only on the provider edge router.…

    • 370 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook (What is a Rootkit Virus?). Owners are able to implement files, monitor what’s being down on the computer and change the systems on the…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 2 Case Study

    • 473 Words
    • 2 Pages

    decisions. The various preferences should be weighted against each other and a percent importance should be applied to that characteristic as its weighting factor. All weighting factors should sum to 100%. A baseline technology should be selected with which to compare all the other technologies or solutions. A variance factor between the baseline and the alternative is assigned and put in the appropriate cell.…

    • 473 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Verizon LG G4

    • 449 Words
    • 2 Pages

    An Android user operating with root access is the equivalent to a Windows user operating with administrator permissions. Without the admin permissions, we do not have full access to the system. Not having that kind of access limits what we can do; we call this locked down with factory resections. There are many advantages to having root access, but you shouldn't have root access unless you are an advanced Android user. If you deleted the wrong files from the internal system, you can damage the device.…

    • 449 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Rooting the Samsung galaxy S4 Mini will give your Android operating system administrator permission like you would have with Windows operating system. It means you can play with the OS without any restrictions. Not having the restrictions gives you greater control over what you can install and have on your device -- that's the main reason for people wanting the root access. With the root access, we can install custom ROMs and change the device from the stock ROM that's given to you. You can also install many more apps that can be fun, help you, remove bloatware, increase the performance and more.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    By then they have to go a computer repair place and shell out big bucks to fix whatever problem may have occurred. There is a solution to this problem however, and it is called spyware removal software. There are several insecurities on your computer when you first buy it, and if you dont do anything about it, you are allowing yourself to be exposed to countless infections. By keeping yourself exposed, you give access to multiple hackers who can turn your life into a complete nightmare. Once a hacker is into your computer, they are…

    • 522 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Dos Attack Research Paper

    • 580 Words
    • 3 Pages

    Well, Trojan viruses are RATs, or Remote Administration Tools, which gives the host access to any machine infected, whenever they want access. This includes the ability to log every single key you press, every password you type, and even every credit card number you enter on amazon. Hackers gain access to your bank accounts, personal information, and anything else that you do on your computer. They can blackmail you with personal information in order to get money, sell your credit cards, and hack into your bank accounts all at a few strokes of the keyboard. In 1982 the US found out that the KGB had been stealing our technology and using it.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    It is best common practice to create non-administrator accounts for everyday usage to reduce the risk from unauthorized applications installing. Essentially, standard user accounts mitigate the chance of malware running with administrator permissions. Likelihood of threat 4 - The likelihood of the risk is high since end users already download and install software from the Internet. As a result, AMI is battling pop-up ads and sluggish workstations.…

    • 540 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Examples Of SQL Injection

    • 820 Words
    • 4 Pages

    SQL Injection An SQL Injection is the technique of inserting complete or partial SQL commands in user-supplied data fields of a web application and submitting them for execution by the database server. The SQL Injection is normally injected by attackers to compromise the security of a website, access private data and perform other unauthorized actions that a developer never anticipated. Overview Majority of businesses use website features such as contact forms, search functions, feedback fields, shopping carts and others to interact with their customers, employees and users. This allows users to legitimately submit, store or retrieve information in the website’s database. The website forms must therefore have access to the database to enable…

    • 820 Words
    • 4 Pages
    Great Essays