Question

In: Computer Science

Please type, I will rate you well. Thank you. In Linux: Identify three commands that use...

Please type, I will rate you well. Thank you.

In Linux:

  • Identify three commands that use SUID mode. Discuss why this is so?
  • Identify the commands that are generally causing the highest load on your system and discuss your perspectives on why they cause such a load. Discuss your perspectives on the considerations system administration must give while using these commands.

Solutions

Expert Solution

Three commands that use SUID mode are (i) passwd, (ii) ping, (iii) crontab or at.

SUID: SUID stands for Set owner User IDentity. Using this mode the users will get file owner's permission and UID when executing the program or any task.

  • "passwd" command is used to change the password which is owned by owner or root, the user has to take permission from the owner. For this purpose the user will use SUID mode to get permission.
  • "ping" command is used to open socket files and ports in order to send and receive IP packets, the user uses SUID mode to take permission from the owner.
  • "crontab" or "at" command is used to edit some of the files which are owned by the owner, the user has to take permission. For this purpose user uses SUID mode.

The list of commands that are generally causing the highest load on your system:

  • vmstat
  • uptime
  • pmstat
  • iotop
  • iostat

By using all these commands we can get logged into non-responsive system and we may face hardware errors. Some of them will update and print statistics for every interval of seconds while dealing with I/O activities. So it will be high load to the system. Sometimes though the system uses older kernel, we may run some commands which are not capable for those systems. This will also cause high load to the system.

It is better to use SUID mode to get rid of unauthorized access of any user. SUID mode will ask for the authorization of user. So user has to take permission from the owner. By using SUID mode we can achieve security and proper execution.

The commands which are causing the highest load will provide detailed information from time to time. They even provide the statistics of the execution. Of course this leads to high load but better to increase the time of interval.


Related Solutions

Can you please type, I will rate you well! Thank you! In this activity, you will...
Can you please type, I will rate you well! Thank you! In this activity, you will be devising a Data Collection plan that describes how information on each asset will be collected. Develop a Data Collection plan that can be used to perform Data Collection on the different assets in the Action Forensics organization. As you develop this plan you will have to make decisions based on your understanding of how the company works. Do not worry that you are...
Please type your answer, I will rate you well. This is about Threat Modeler when conducting...
Please type your answer, I will rate you well. This is about Threat Modeler when conducting risk assessments. What did you learn about threat modeling by examining the features of Threat Modeler? Should software like Threat Modeler be used exclusively, or in addition to other threat modeling techniques?
Try the Linux commands listed below. Post your thoughts about how to use these commands. Discuss...
Try the Linux commands listed below. Post your thoughts about how to use these commands. Discuss options that you might use with them, compare and contrast them and/or ask questions about commands you are not sure about. mount and umount more and less head and tail grep kill / xkill / pkill / killall su and sudo man and whatis ping and traceroute
How LUNCH meterpreter in Kali Linux. Complete command please. Thank you
How LUNCH meterpreter in Kali Linux. Complete command please. Thank you
Use Kali Linux Commands to show me the following: 1. Who are you? 2. Change directory...
Use Kali Linux Commands to show me the following: 1. Who are you? 2. Change directory to Downloads 3. Make a new directory 4. Make a new text file under your name (Ghada.txt) 5. Write a paragraph about Cyber security (4 to 5 sentences) >>simply open the file and write inside it 6. Change the permission to be 764 7. Open the file but with a cyber security match Show me each and every step with figure b. Enter into...
Please provide the Stata commands and outputs where necessary, thank you. 4. The following are data...
Please provide the Stata commands and outputs where necessary, thank you. 4. The following are data on y = quit rate per 100 employees in manufacturing x = unemployment rate The data are for United States and cover the period 1990-2002. Year Y X 1990 1.3 6.2 1991 1.2 7.8 1992 1.4 5.8 1993 1.4 5.7 1994 1.5 5.0 1995 1.9 4.0 1996 2.6 3.2 1997 2.3 3.6 1998 2.5 3.3 1999 2.7 3.3 2000 2.1 5.6 2001 1.8 6.8...
Please Use your keyboard (Don't use handwriting) Thank you.. I need new and unique answers, please....
Please Use your keyboard (Don't use handwriting) Thank you.. I need new and unique answers, please. (Use your own words, don't copy and paste) IT243 Course name: System Analysis and Design ***********Please i need more details and more Explain********** Q1: What are the roles of a project sponsor and the approval committee during the different SDLC phases? Q2: As the project sponsor, you suggested that your company that runs multiple local supermarkets should provide an online shopping service to increase...
Please Use your keyboard (Don't use handwriting) Thank you.. I need new and unique answers, please....
Please Use your keyboard (Don't use handwriting) Thank you.. I need new and unique answers, please. (Use your own words, don't copy and paste) IT243 Course name: System Analysis and Design ***********Please i need more details and more Explain********** Q2: As the project sponsor, you suggested that your company that runs multiple local supermarkets should provide an online shopping service to increase sales during COVID-19 pandemic. Write a system request to propose this project. System request Project Sponsor Business Need...
Please Use your keyboard (Don't use handwriting) Thank you.. I need new and unique answers, please....
Please Use your keyboard (Don't use handwriting) Thank you.. I need new and unique answers, please. (Use your own words, don't copy and paste) HCI 314 Write a page and a half (400-600 words) in an essay style answer to respond to the following question: Disruptive innovation is a driver for change in public health informatics. As a Health Informatics professional which innovation do you think has the greatest impact during COVID-19 pandemic and why? _____ please re -write my...
Please Use your keyboard (Don't use handwriting) Thank you.. I need new and unique answers, please....
Please Use your keyboard (Don't use handwriting) Thank you.. I need new and unique answers, please. (Use your own words, don't copy and paste) IT243 Course name: System Analysis and Design Q2: As the project sponsor, you suggested that your company that runs multiple local supermarkets should provide an online shopping service to increase sales during COVID-19 pandemic. Write a system request to propose this project. System request Project Sponsor Business Need Business Requirements Business Value Special Issues or Constraints...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT