To ensure the security of the files used by the new web site

Assignment Help Computer Network Security
Reference no: EM13283352

To ensure the security of the files used by the new Web site, files need to access controls that limit which users can view and execute them. To further your understanding of file permissions, describe in detail these 5 file listings, explain all items on each line, explain what they specify or mean, and give the chmod command to set files with these permissions:

-rwxr-xr-- 1 instruct staff 270311 Aug 11 2009 install.sh
-rw-r--r-- 1 instruct staff 348039 Aug 12 2008 User_Guide.txt
-rw-r----- 1 instruct staff 635106 Aug 12 2009 Admin_Guide.txt
drwxr-xr-x 4 instruct staff 144 Aug 12 2009 Documents
-rwsr-sr-x 1 nobody nobody 169202 Aug 11 2009 httpd

It is also a necessity to know and understand regular expressions, not only at the UNIX command line, but editors and some programs use them quite extensively.
Explain the following Metacharacters/Regular Expressions:

*
?
^
$
[0-9]
[a-z]
Give a regular expression to match the following:

All files that end in txt
Files that have a second character of a and end in sh
Any file that starts with a number
A blank line
A traditional 10-digit U.S.-based phone number, in the following format:
(407) 555-1212

Submit the explanations, commands, definitions, and expressions in a Word document.

Reference no: EM13283352

Questions Cloud

How the different tasks will play a part in future career. : How the different tasks will play a part in your current position or future career.
Transform the query into a query on fragments : Transform the query into a query on fragments.
Create a local area network : Create a local area network (LAN) design diagram of the current network that describes the hardware and software resources that Matt described.
Wireless access points in your company''s warehouse : As the Project Manager, you have been assigned a project to deploy ten (10) wireless access points in your company's warehouse and break room within the next ninety (90) days. You are free to make assumptions that satisfy the scope of the proje..
To ensure the security of the files used by the new web site : To ensure the security of the files used by the new Web site, files need to access controls that limit which users can view and execute them. To further your understanding of file permissions, describe in detail these 5 file listings, explain a..
From the analog to the digital age : From the Analog to the Digital Age
Research the simple computer games snake and tron : Research the simple computer games "Snake" and "Tron."
The command sequence in a normal smtp session : 1.What would the command sequence in a normal SMTP session be? Use C: to preface a command issued by the client and S: to preface a command issued by the server.
Advertising during the super bowl is pricey : Advertising during the Super Bowl is pricey and reserved for mega brands, but local television stations are allowed to air local advertisements during the broadcast.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Security risk to acknowledge using macros

Write down 200- to 300-word response which answers the following question: Based on article by Lenning (2005), what is main security risk which users must acknowledge when using macros?

  Explaining wtls does not give message integrity protection

An earlier version of WTLS supported a 40-bit XOR MAC and also supported RC4 stream encryption. Show that this scheme doesn't give message integrity protection.

  Explain security model of class using cnss model

suppose that the security model is required for protection of your class. Using CNSS model, examine each of the cells and write a short statement.

  Federal government regulates labels

The federal government regulates labels, warranties, and consumer products. Without government regulation, what abuses are likely to occur?

  Protection of transmitted information-sensitive data stored

You must include in your investigation protection of both transmitted information also sensitive data stored locally in computer databases.

  Find sequence of courses to satisfy all prerequisites

Bob loves foreign languages and wants to plan his course schedule for the following years. He is interested in the following nine language courses: LA15, LA16, LA22, LA31, LA32, LA126, LA127, LA141.

  Describe network crimes related to dns entry alteration

Describe network crimes that are related to DNS entry alteration or bogus DNS servers. In a network investigation, some network administrators may be cooperative while others may not.

  Future of internet anonymity services

Discuss what you believe to be the most important lesson you have learnt as a result of these discussions. Explain the impact of this and its application/impact in real life.

  Digital stratigraphy

concept of Message Digest, File Carving, MD5, Locard's Exchange, Parker's categories, computer-related crime as suggested by Donn Parker, computer systems as sources of digital evidence

  Create an overloaded constructor

Create the statements to make an overloaded constructor for the class named Car. The constructors should support 0, 1, or 2 arguments. The 1st argument will denote engine size and contain an Integer.

  Denote the des encryption of the plain text

Find another key that also has this property, and explain the structure of the DES key schedule that permit such keys to exist.

  Discussion on computer crime

The state crime lab training coordinator is concerned with level of expertise at its Blacksburg, VA location and would like to contract DC Investigative to conduct four training sessions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd