Step 0: Get your materials ready
You need to log in to the class Linux server with the Terminal application over SSH. Use the Fox textbook, resources listed below (if any) and your reading notes for support.
Write your answers in a Word (or similar) document.
Step 1: Create a better ping command
Useping -hto look up the options that you can use with theping Create an alias so that when you executepingit stops after 5 tries and shows hostnames if they are available.
Create an alias so that when you executeslowpingit does the same thing as your newpingcommand and it also waits for 3 seconds between each attempt.
If you are unhappy with an alias and want to re-create it, useunaliasto remove the existing alias first.
Answer the following questions
What is the exact command you used to create thepingalias?
What is the exact command you used to create theslowpingalias?
What do you think the advantages are of making these aliases? Why not just stick to the regularpingcommand?
Step 2: Which servers are down?
Using yourslowpingcommand, check the servers listed below. Take a screenshot of ONE of the successful attempts. Name the screenshotslowping.xxxwherexxxis the appropriate file extension.
Servers to check:
iti201s[X].comminfo.rutgers.edu(replace [X] with numbers 1-10)
Answer the following questions
Which servers (if any) appear to be down?
You should have seen some different hostnames than what you were expecting. Take a shot at explaining why this is not an issue. I mean, two names for the same server? Should that cause some kind of conflict?
Step 3: Check the remote servers
Runtraceouteagainst one of the servers in step 2 that are responsive and take a screenshot.
Runtraceouteagainstwww.example.orgtake a screenshot and name ittraceroute.xxxwherexxxis the appropriate file extension.
Step 4: Network tools or hacking tools?
The Fox textbook says that these tools are often considered insecure programs and that hackers might use either or both to investigate the computers on a LAN. Lets stipulate for now that this is true.
In an earlier module we learned about a tool that could be used to give access to these commands to only certain people. What is that tool, and how would it reduce the risk that Fox is referring to? (hint: think about system permissions and recall how you could and could not useaptin an earlier lab.)
Based on what these tools do, do you think regular users should have access to them? Defend your answer.
How to submit your lab results
Upload the Word document and the following screenshots:
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more