1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zysi [14]
3 years ago
9

Research and build a chroot jail that isolates ssh users who belong to the restrictssh group. (You will also need to create the

restrictssh group). Next, install an ftp server and configure it to allow anonymous logins. Create a second chroot jail that can be accessed by the anonymous account. You will probably need to create several new user accounts to facilitate testing your setups.
Computers and Technology
1 answer:
makkiz [27]3 years ago
7 0

Answer:

Explanation:

#!/bin/bash

# This script can be used to create simple chroot environment

# Written by LinuxConfig.org  

# (c) 2020 LinuxConfig under GNU GPL v3.0+

#!/bin/bash

CHROOT='/var/chroot'

mkdir $CHROOT

for i in $( ldd $* | grep -v dynamic | cut -d " " -f 3 | sed 's/://' | sort | uniq )

 do

   cp --parents $i $CHROOT

 done

# ARCH amd64

if [ -f /lib64/ld-linux-x86-64.so.2 ]; then

  cp --parents /lib64/ld-linux-x86-64.so.2 /$CHROOT

fi

# ARCH i386

if [ -f  /lib/ld-linux.so.2 ]; then

  cp --parents /lib/ld-linux.so.2 /$CHROOT

fi

echo "Chroot jail is ready. To access it execute: chroot $CHROOT"

You might be interested in
Which of the following would not be considered metadata for a spreadsheet file?
Genrish500 [490]

Answer:

B.

Explanation:

Metadata is a type of data that dispense details of other data. In simple terms, metadata can be defined as information of a file such as file name, attributes, etc.

<u>In excel sheet, metadata works the same and helps to provide information about </u><u>file name, author name, file size, attributes such as read-only, archieve, hidden, system, location of the file, date and time of creation, modification, or accessed, type of file, etc</u><u>.</u>

From the given options, the information that is not considered or included in metadata is calculation inside the file. Metadata in excel sheet does not include calculations inside the file. Thus option B is the correct answer

7 0
3 years ago
Have you ever tried using such a camera?​
guapka [62]

Answer: yeah i mean i use my canon camera

Explanation:

7 0
3 years ago
The following program results in a compiler error. Why? int FindMin(int a, int b) { int min; if (a &lt; b) { min = a; } else { m
Mila [183]

Answer:

The answer is "Variable min is defined in the "FindMin()" method, but is used in the main method".

Explanation:

Following are the correct code to the given question:

#include <iostream>//header file

using namespace std;

int FindMin(int a, int b) //defining a method FindMin that takes two integer parameters

{

   int min; //defining integer variable

   if (a < b) //use if to check a value less than b

   {

       min = a; //holding smallest value in min

   }

   else //defining else block

   {

       min = b;//holding smallest value in min

   }

   return min; //return min value

}

int main() //defining main method

{

   int x,y,min; //defining integer variable

   cin >> x; //input value

   cin >> y; //input value

   min = FindMin(x,y); //holding method return value in min variable

   cout<<"The smaller number is: "<<min<< endl; //print method value with message

   return 0;

}

Output:

Please find the attached file.

In the code, a method "FindMin" is defined that takes two integer parameters "a,b" and inside the method, an integer variable "min" is declared that uses a conditional statement that checks the smallest value that store in the min variable and return its value.

In the main method, three integer variable is declared in which two is used for hold value from user-end pass into the method and store its return value in min variable and print value with the message.

7 0
3 years ago
An IT environment with a bastion host, an intrusion prevention system, and workstation antivirus and firewall software is an exa
pochemuha

Answer:

Defense in depth

Explanation:

4 0
4 years ago
Read 2 more answers
Which characteristic of four different dinosaur fossils makes a dinosaur most similar to the present-day birds?
lidiya [134]
B, i think please answer mine now
4 0
4 years ago
Read 2 more answers
Other questions:
  • A. What sectors are used with Foo?
    8·1 answer
  • String member function compare compares two strings (or substrings) and returns 0 if:
    5·1 answer
  • A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications.
    14·1 answer
  • What is the foundational domain for business
    12·1 answer
  • If the code for JAVA is LCXC, what is the code for BASIC?
    12·1 answer
  • Font size means the height of characters.<br>True<br>False​
    11·1 answer
  • 5. Why do we need programming language?​
    13·2 answers
  • Multiple Choice
    9·1 answer
  • Question 1 of 10
    8·1 answer
  • Word wrap is the same as __________ return and means you let the ______________ control when it will go to a new line.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!