Question

In: Computer Science

1. Discuss the various log files found on a Linux system. Based on their own experiences,...

1. Discuss the various log files found on a Linux system. Based on their own experiences, how often do they feel they would check these files, and how vigilant do they think they would be about the process? Have them outline some of the reasons why an administrator might tend to ignore these files.

2. Discuss there experiences with the creation of user and group accounts in other OSs such as Windows 10 or Windows Server 2019. What do they feel are some of the advantages and disadvantages of the various utilities provided for user management on these systems, as well as the way that user information is stored?

Solutions

Expert Solution

In the Linux family of operating systems various log files are stored in var/log directory.

These log files store footprints of various actions of user and system.

There are many directories in which these log files are stored.

to view log files in cent os with root user access change your directory as

# cd var/log

# ls

var/log/messeges: This directory shows general messeges of system.

var/log/auth.log: This file shows authentication logs.

var/log/kern : This directory shows logs of kernel

var/log/httpd: This directory shows all files related to apache web server like failed connection, file not found on the server, unauthorised access, script execution related messages.

var/log/yum.log : This file shows yum command related logs.

System administrator usually checks apache server related logs so admin can make changes according to errors in apache web server to ensure web server runs continuously and dont have downtime.

System administrator has to aware about critical systems logs to ensure os is healthy.

There are bunch of logs that only shows excution of programs and system processes so, admin has to ignore these log files.

In windows users are created through computer management section.

In this section there is menu Local users and groups, when we click this menu there is window new user where we have to put username and password and new use is being created.

Because of GUI user creation process is very easy in windows 10, also granting rights to user is also very easy, in the Linux os grantig various rights to user is difficult process.

In linux accessing user account is very easy with perfect access rights, in windows many conclifcts may happen with user access grant with rights. linux uses public and private keys to access account, in windows users information is stored and encrypted in system.


Related Solutions

We are interested in the implementation of a Unix/Linux system utility for the concatenation of a list of n text files.
Write in C We are interested in the implementation of a Unix/Linux system utility for the concatenation of a list of n text files. In order to do that we are going to consider the following syntax below where the concatenation of n text files are written in the output file all.txt or on the console if the output text file is not specified.       $./mycat file_1.txt file_2.txt   . . .   file_n.txt > all.txt
1. Based on her own experiences in court, a prosecutor believes that some judges provide more...
1. Based on her own experiences in court, a prosecutor believes that some judges provide more severe punishments than other judges for people convicted of domestic violence. Five of the most recent domestic violence sentences (in years) handed down by three judges are recorded below. Judge 1 Judge 2 Judge 3 1 3 1 1 2 5 3 4 2 2 3 1 2 4 1 Using this information, test the null hypothesis at the .05 level of significance that...
Please discuss some of the pros and cons of DaaS and AaaS; discuss your own experiences...
Please discuss some of the pros and cons of DaaS and AaaS; discuss your own experiences with self-service BI. discuss any experience you may have with "shadow IT".
Your responses are to be based on your own experiences and insights. Do not use materials...
Your responses are to be based on your own experiences and insights. Do not use materials and examples from other sources, including the Internet. Students have used examples from outside sources in the past and have failed this final assessment and in some cases, failed the course due to evidence of plagiarism. Describe how you could use hypothesis testing to help make a decision in your current job, a past job, or a life situation. Include a description of the...
Pertaining to the Linux operating system, which is a variant of Unix, DISCUSS Topics that will...
Pertaining to the Linux operating system, which is a variant of Unix, DISCUSS Topics that will include things such as history, Linux kernel, and design principles.
Based upon your learning in this course and your own personal and professional experiences with healthcare,...
Based upon your learning in this course and your own personal and professional experiences with healthcare, what do you feel needs to happen in our healthcare delivery system to achieve better access and higher quality care for all Americans?
Must Show Work .  Based on her own experiences in court, a prosecutor believes that some judges...
Must Show Work .  Based on her own experiences in court, a prosecutor believes that some judges provide more severe punishments than other judges for people convicted of domestic violence.  Five of the most recent domestic violence sentences (in years) handed down by three judges are recorded below. Judge 1 Judge 2 Judge 3 1 3 1 1 2 5 3 4 2 2 3 1 2 4 1 Using this information, test the null hypothesis at the .05 level of significance...
Discuss what issues you've had in installing an operating system and if the vendor (Microsoft, Linux,...
Discuss what issues you've had in installing an operating system and if the vendor (Microsoft, Linux, etc.) was helpful in fixing those issues.
Describe the various courts found in the Texas justice system. What are some of the benefits...
Describe the various courts found in the Texas justice system. What are some of the benefits and drawbacks of electing state judges?
Unix/Linux Turn in the following commands and any output from the commands. 1) ll to show the original 3 files
Unix/LinuxTurn in the following commands and any output from the commands.1) ll to show the original 3 files2) run the tar command to stuff three files3) ll to show the 'tar archive'4) mkdir newdir to create a new directory to unstuff the 'tar archive'
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT