Nt1330 Unit 1 Research Paper

Improved Essays
Task 1
In Unix/Linux operating system a user can have root access or not, the root access provides complete access to user of a system. There are some following risks to have a single root user on Unix/Linux operating system.
Easy to hack: If any security error broke the security then a hacker can get the access of all data and can get the whole control of hardware. It allow to retrieve all files and data without root access. So, it is a big risk of losing and stolen data and important information of user (Why is it bad to login as root?, n.d.).
Security: when any application like Flash, Firefox etc is running on root account then any type of weakness of that program can destroy your system. Because, now some viruses have access all over or small bugs in a program can format the necessary files(Why is it bad to login as root?, n.d.).
…show more content…
All actions can hide by root user: All the commands are run through sudo. It has a record of every command which was executed. The root password allows the user to make changes and give rights to execute every command. So, with the help of it any user can delete the work history. A root user has more control on the machine (Why is it bad to login as root?,

Related Documents

  • Improved Essays

    My first research experience started when I participated in bone scaffold designing project at the Cooper Union in Spring 2012, under the supervision of professor David Wootton at Cooper Union Department of Mechanical Engineering. The purpose of this study was to design and manufacture bone scaffold for orthopedic trauma, especially for segmented bone fracture. I worked with a senior mechanical engineering student who had been conducting the research as his senior capstone project. The first task was to test manufacturing efficiency of two different types of polycaprolactone (PCL) with different average molecular weight. I concluded that the low molecular weight PCL is more convenient for mold-casting fabrication, due to low viscosity, while the high molecular weight PCL has an advantage of being mechanically stronger than the brittle…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    QUES 1. A router has the following CIDR entries in the routing table: Address/Mask Next Hop 135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 Router 1 Default Router 2 For each of the following IP addresses, what does the router do if a packet with that address arrives? 1. 135.46.63.10 2.…

    • 607 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Isolate Prices Project My program runs as follows first displays the local start time, which would be the current time and would work as almost like the starting point of stopwatch. We than have a vector which is where all the input files information is stored. After, the vector is created we have to fill the vector with the information from the input files. Then we read all the data from the vector and output into 2 files. Lastly the end time is display with the elapsed time.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Hi Maribel, I have been in communication with the Prelude TS in regards if this can be accomplished and if so, can we mimic what is being done in ecw to stay compliant. Here is the response from the TS: My recommendation was to build it as a document table that way we can mimic Ecw, while staying compliant. Ideally the end result should looks like this:…

    • 67 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 370 Words
    • 2 Pages

    1. The customer edge router will peer only with a provider router and will not peer with other customer edge routers. With reference to the diagram above, CE2 will peer with PE2 and not with CE1 or CE3. 2. If a new site is added, configuration is done only on the provider edge router.…

    • 370 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Application / Files sharing between computers Windows Homegroup Windows home networking has been extremely complicated to configure in the past, but Homegroup is easy to set up. Just create a Homegroup from the Homegroup option within Windows Explorer (File Explorer on Windows 8) and you’ll get a password which enables you to access fromyour nearby computers and they can join your Homegroup. The other members of the Homegroup will now have access to your shared files when they log ON to the same network — then you may select the libraries whichever you want to share while you create a Homegroup. Dropbox LAN Sync Many people exchange files between their computers by synchronising them with any one of the cloud storage solutions like Dropbox, Google Drive, or SkyDrive. This can take a while — the file first gets uploaded to your cloud storage provider’s servers and then it gets downloaded back to your other computers.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases, and of Bacterial Methods of Warfare (Geneva Protocol) was penned and signed on 17 June, 1925. This was a treaty signed by the Allies at the close of World War I, which was actually just an extension and re-verification of the Treaty of Versailles (signed in 1919) prior to WWI. The Geneva Protocol furthered the Treaty of Versailles in that it expanded the weapons ban to include a ban on bacteriological warfare. In 1969, this protocol was further expanded to include CS gas agents and harassing agents (probably due to their use by the U.S. during the Vietnam War).…

    • 656 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 2 Case Study

    • 473 Words
    • 2 Pages

    decisions. The various preferences should be weighted against each other and a percent importance should be applied to that characteristic as its weighting factor. All weighting factors should sum to 100%. A baseline technology should be selected with which to compare all the other technologies or solutions. A variance factor between the baseline and the alternative is assigned and put in the appropriate cell.…

    • 473 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Verizon LG G4

    • 449 Words
    • 2 Pages

    An Android user operating with root access is the equivalent to a Windows user operating with administrator permissions. Without the admin permissions, we do not have full access to the system. Not having that kind of access limits what we can do; we call this locked down with factory resections. There are many advantages to having root access, but you shouldn't have root access unless you are an advanced Android user. If you deleted the wrong files from the internal system, you can damage the device.…

    • 449 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Rooting the Samsung galaxy S4 Mini will give your Android operating system administrator permission like you would have with Windows operating system. It means you can play with the OS without any restrictions. Not having the restrictions gives you greater control over what you can install and have on your device -- that's the main reason for people wanting the root access. With the root access, we can install custom ROMs and change the device from the stock ROM that's given to you. You can also install many more apps that can be fun, help you, remove bloatware, increase the performance and more.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    By then they have to go a computer repair place and shell out big bucks to fix whatever problem may have occurred. There is a solution to this problem however, and it is called spyware removal software. There are several insecurities on your computer when you first buy it, and if you dont do anything about it, you are allowing yourself to be exposed to countless infections. By keeping yourself exposed, you give access to multiple hackers who can turn your life into a complete nightmare. Once a hacker is into your computer, they are…

    • 522 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Dos Attack Research Paper

    • 580 Words
    • 3 Pages

    Well, Trojan viruses are RATs, or Remote Administration Tools, which gives the host access to any machine infected, whenever they want access. This includes the ability to log every single key you press, every password you type, and even every credit card number you enter on amazon. Hackers gain access to your bank accounts, personal information, and anything else that you do on your computer. They can blackmail you with personal information in order to get money, sell your credit cards, and hack into your bank accounts all at a few strokes of the keyboard. In 1982 the US found out that the KGB had been stealing our technology and using it.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    It is best common practice to create non-administrator accounts for everyday usage to reduce the risk from unauthorized applications installing. Essentially, standard user accounts mitigate the chance of malware running with administrator permissions. Likelihood of threat 4 - The likelihood of the risk is high since end users already download and install software from the Internet. As a result, AMI is battling pop-up ads and sluggish workstations.…

    • 540 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Examples Of SQL Injection

    • 820 Words
    • 4 Pages

    SQL Injection An SQL Injection is the technique of inserting complete or partial SQL commands in user-supplied data fields of a web application and submitting them for execution by the database server. The SQL Injection is normally injected by attackers to compromise the security of a website, access private data and perform other unauthorized actions that a developer never anticipated. Overview Majority of businesses use website features such as contact forms, search functions, feedback fields, shopping carts and others to interact with their customers, employees and users. This allows users to legitimately submit, store or retrieve information in the website’s database. The website forms must therefore have access to the database to enable…

    • 820 Words
    • 4 Pages
    Great Essays