Linux Assignment
Linux Assignment
This assignment consists of 3 questions each of equal value. They consist of common tasks required of a system administratortasks I have had to do at some time in the past. Clear Layout It is vitally important that your assignment is clearly laid out with questions and parts of questions clearly dened. It must be a straight forward matter for the examiner to determine that you have completed each exercise satisfactorily. We want quality not quantity. Poorly organised submissions will be rejected or receive a poor mark.
A A text le or PDF/A document typeset using vanilla L TEX are preferred over a document produced by a word-processor. If you must use Microsoft Word please export your document as PDF/A1 not PDF.
Command Output When answering these questions you will have to run commands under Linuxwhenever a command is run you will need to: a. explain in your own words the purpose of the command in the context of the assignment question. (Please do not just copy the Description section from the man page!) Also, you need to explain in your own words all terminology usedas if you were explaining to an average user! (Please show you understand what you are doing!) b. show that the command workedeither from its output or the output from another command. For example
prompt> dd if=/dev/zero of=Crypt.fs bs=1M count=32 32+0 records in
1
PDF/A is an archival format of PDF that embeds all fonts used in the document within the PDF le. To ensure PDF/A format in Word check ISO19005-compliant (PDF/A) under Options when saving a le as PDF.
32+0 records out 33554432 bytes (34 MB) copied, 0.109063 s, 308 MB/s prompt> ls -l Crypt.fs -rw-r--r-- 1 user user 33554432 2013-02-25 10:18 Crypt.fs
c. To capture text output from programs you will have to redirect the output to a le or use the command script. If you are using the command script turn o the tty escape sequences that change the colour of console textthe escape sequences will appear in output le and make it impossible to read.
c. Do not explain how you installed packages! d. List all resources used in answering the question.
You may assume that she has root access to be able to congure her home machine to mount an encrypted le-system. Notes: a. Do not use the tool cryptmount-setup or the tool installed by the package cryptsetup. b. Manually create les and conguration les. c. Follow the steps outlined in the cryptmount man page explaining the purpose of every step! d. List all resources used in answering the question. e. Do not explain how you installed the cryptmount package it should already be installed on the Virtual Debian.