Chapter 10 Flashcards
hacker
in the linux world this refers to intelligent linux users… not necessarily malicious individuals
525
network server intermediaries
super server
super daemon
525
inetd
depreciated legacy super daemon.
525
inetd
Service Name
name of the service as listed in /etc/services file
526
inetd
Socket Type
tells the system what type of connection to expect like whether it is two way
526
inetd
Protocol
specifies which TCP/IP transport layer protocol will be used
526
inetd
Wait/No Wait
specifies whether the server connected to its client and freed the socket (nowait) or should process packets and then time out (wait)
526
inetd
User
username used to run the server. The root and nobody users were common choices
526
inetd
Parameters
Everything after the server name consisted of parameters that were passed to the server
526
xinetd
extended super daemon. It provides the functionality of inetd plus security options that are similar to those of TCP wrappers. controlled by the /etc/xinetd.d directory
528
fuser
determines the processes currently using network port
537
su
switch user
typed alone results in a prompt for root password. if the user types the password correctly
544
repudiation environment
a user can deny actions.
545
VNC
Virtual Network Computing
transfer’s data over the network unencrypted
555
who
shows you who is currently logged on to the system. It displays the username, their current terminal, and the time they logged into the system
547
who -a
adds far more information to the who command’s output
547