Question: 1 . Your name is Jane. Create a repository for your project named Linux . The folder is created outside thehome directory of Jane. It

1.Your name is Jane. Create a repository for your project named Linux. The folder is created outside thehome directory of Jane. It is a group project and your friend Tom also has to have access to this repository.Things to be noted:You create a user Tom with short description and password and a home directory.Let Tom modify his shell and password.Tom shouldnt be able to access your home folder.Create another folder named notes where you keep your study notes and Tom and may beother friends can also have same access to it. Guest shouldnt be able to modify anything.Create another folder named research where you keep the list of your researches. Others canhave a look at list of researches in it but no one should be able to read, write it.Approach to solve:Start with creating a new user TomCreate two groups.Add yourself and tom in one group. The other group can be for your set of friends.Put proper permissions for the groups and folders.2.Toms laptop has CentOS Linux and Janes laptop has Ubuntu Linux. Once they found few software packages useful to install.Jane wants to upgrade the version of python to python3. Check and upgrade the python version.Jane and Tom want mysql to be installed on their system.Remove python for Tom as he wont be using it.Install java with tar.gz available. Please guide them, how to build them using simple commands like (1)./configure (2) make and (3) make install.Support them to resolve dependency on other software modules, installing as super user and normal user, possible file permission issues and running few applications immediately after boot process.
Approach to solve:Let Jane check the python version if installed. If it is not installed, install python3. If installed and python2 present then remove it and then install python3.Check if mysql is installed in either system. If not present, then install it.Checkif python is present in Toms system. If present remove it.Make sure to have sudo access or elevate the permission for the user.Resolve dependencies if any.Untar java.gz and install it.Provide executable permission to it.Let java start immediately after boot.3.Networking:Tina brought her own laptop.Please help them to build a private network between her and Toms laptops.Sometime, Tom and Tina like to work on each others system from their own laptop. Please guide them about remote log-in. Please explain them about pros and cons of SSH and Telnet.Sometimes they want to share their files with each other over network. Please provide themvarious alternatives like FTP, TFTP, SCP and SFTP etc with their relative advantagesThey noticed that none of the alternatives worked for them. Please introduce them aboutvarious troubleshooting tools at Linux. It can be, wireshark, tcpdump, netstat command etc.Also explain them, the relevance and importance of opening of a specific port at firewall to run any server.Now they got Internet connectivity and they are about to connect both laptop to Internet.Explain them about possible DoS attack (and its remedy) if any port is open in the system.Approach to solve:Connect Tom and Tina by lan cable or by wireless.Run command ifconfig to find if they are in same subnet.Try ping to other machines.If ping is successful then a connection is established.Let the communicate via ftp, scp , ssh, etc.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!