Skip to main content

Understanding Linux for 312-38: Network Security Administrator Exam

This is a guest article by Shubra Sinha about Understanding Linux for 312-38: Network Security Administrator Exam. Linux, a free Unix-type operating system, was created in 1991 by Linus Torvalds, a student at the University of Helsinki. He started Linux by writing a kernel, which is the heart of the operating system. He created Linux with the assistance of developers around the world.

Linux has been released under GNU General Public License and its source code is available to everyone without any cost. Therefore, anyone can work on it, change it, or enhance it. Many companies and individuals have released their own versions of operating systems based on the Linux kernel. Basic services and device drivers used by all other programs are provided by the Linux kernel.


Some features of Linux are as follows:

  • Multi-user
  • Multitasking
  • Graphical User Interface (GUI)
  • Hardware support
  • Networking connectivity
  • Network servers
  • Application support

Advantages of using the Linux operating system:

Following are the advantages of using the Linux operating system:



Cost and performance:

The Linux is free, so there is no need to pay for it, and it comes with all applications. Linux has a good speed and is almost free from viruses.

Resources:

The Linux operating system does not require heavy resources as compared to Windows operating systems.

Security:

Linux is more secure than Windows operating systems. In 2009, the Windows operating system was affected by 48000 viruses, whereas Linux was affected by only 40.

No Need of Defragmentation:

Linux uses different file systems, which do not require defragmentation.

Built-in Utilities:


Linux comes with dozens of utilities and software, which include games, messengers, photo managers, office automation software, CD burners, PDF applications, etc.


Loopholes in Linux Security

Following are the possible security loopholes in the Linux operating system:

  • Weak and Default Passwords: The first main reason of Linux hacking is using weak and default passwords. Users always choose a password that is easy to remember, but they often forget that it may be easy to crack.

Some examples of good passwords are as follows:


Password How to Remember it

Mrci5yo : My rusty computer is 5 years old.
Itmp?pri : Is this my pen? Please return it.

  • Open Network Ports: The open network ports are free invitations for malicious hackers. This is one of the major reasons of Linux hacking.
  • Old Software Versions: It is also one of the possible reasons of Linux hacking. It may be possible that an older version of the software has some vulnerability that can be easily exploited.
  • Insecure and Badly Configured Programs: All programs should be configured properly. Insecure and unverified programs may have a vulnerability that can be easily exploited.
  • Stale and Unnecessary Programs: As long as there are layoffs and employee terminations, there will be a need to erase any access that the employee had.
  • Server Ignorance: Check the Linux servers for any security hole and vulnerability regularly, otherwise this may become a cause of an attack.



uCertify 312-38 PrepKit:

You can pass the Network Security Administrator Exam by studying from uCertify PrepKit. If you do not pass in first attempt your money will be refunded. 312-38 PrepKit has:

  • 309 questions with full explanations
  • Chapter by Chapter Study Guide
  • Interactive quizzes and Study Notes
  • Test History and Performance Review
  • Interactive Software. etc


For trail you can download free practice questions from here: http://www.ucertify.com/download/312-38.html.

Comments

Popular posts from this blog

iPhone sales help fuel worldwide smartphone numbers

There are nearly 150 million smartphones out there in the world, according to new figures. Thanks to record breaking sales figures by Apple for the iPhone 4S by the end of 2011 there was almost a 50% increase in the number of devices up on the previous year. The research by Gartner Inc. claims the figures rose during the final quarter of 2011 thanks to the 30 million plus iPhone 4S' sold by Apple. The results led to Apple becoming the third largest vendor of mobile phones in the world. They also became the top smartphone vendor, with nearly a quarter of global sales in the fourth quarter. Over the rest of 2011, Apple took a fifth of the share of the smartphone market. The UK and wider Western Europe along with North America were the driving forces for the figures, says Gartner. Up until the launch of the iPhone 4S sales were a little slow. Suddenly the spiked as we all ran out to buy the new device. Worldwide, mobile device sales figures reached 476.5 million in the fourth q...

3 Things to Avoid as a Motivational Speaker

Motivational speakers deliver at least hour-long speeches about positive thinking and how to better yourself and the people around you. These messages often apply to a wide variety of settings, whether at home, at work, or even at a personal level. If you're ever planning on becoming a motivational speaker, there are a lot of things that you should avoid. Here are the three of the most common ones.

Yahoo invisible detector – insights on a new online service

This is a guest article by Iulian about leading Yahoo Invisible detector service http://www.detectinvisible.com/ . There are several online businesses which are basically ruling the online industry, and one of them is Yahoo. Founded in 1994 by Jerry Yang and David Filo in Santa Clara, California, Yahoo! started to grow significantly over the years, now having millions of users all over the world. One of the most widespread products of Yahoo is Yahoo Mail and Messenger. Over time yahoo messenger had become a habit for millions and soon they’ve introduced the possibility to become invisible for other users. It was obvious that a whole new kind of service appeared online, that of yahoo invisible detector. The yahoo invisible detector as an online service first appeared when yahoo was at protocol 13, now being at protocol 17, and at first there were several websites offering their services in order for you to find out which buddy of yours is hiding. Unfortunately, as soon as yahoo star...

The Concepts of Social Networking in Today's World

In today’s high tech world, networking occurs as much on computers as in “real life” social situations. Social media has opened up a vast new frontier for people to connect with others. Before the advent of social media, people generally networked at social gatherings like mixers, fundraising galas and similar events. Of course, such “face-to-face” networking is still important and common, but social media allows possibilities that did not exist before. One of the problems with older networking models is that often the same people showed up at all the events. The percentage of the population that is active in community events tends to be rather low. On the other hand, almost everyone these days uses social media. Vast reach of social networking According to the latest stats, Facebook alone has more than 900 million active users worldwide with the number continuing to grow. Twitter and Google+ also have large numbers of active users that cross all demographic categories. ...