explain the differences between the viruses, and bots.
Excel 02 skills homework, simulation training , exam, end of chapter wuiz
I need help
i have so much work to do and this computer course is difficult
Introduction to artificial intelligence
Its a question abou artificial intelligence
Lab 10
Lab 10
The Command Line
Installing programs in Linux
÷ First, to update your system:
o Open up a terminal window by going to: Applications>Accessories>Terminal
o type:
§ sudo apt-get update
o then type:
§ sudo apt-get install build-essential
§ Do an internet search.
§ What are the update and build-essential packages are used for?
· The apt-get update command is run in order to synchronize the software package index on Ubuntu with their Internet sources. The apt-get build-essential package includes the components and references used to build Debian packages.
§ What is the difference between apt-get and apt-get install?
· Apt-get will fetch the package
§ What is your current location? Example: /home/yazan
· The current location is /home/student
§ What happened? What did sudo mkdir /myProgs do?
· Advanced to the next line and a directory named /myProgs was created in the root of the file system.
§ Is the file that you saved to the desktop gone? If not, see me. Yes the file is gone. Where did it go? The file is now in /myProgs
§ What did this do?
· Moved the directory location of the cursor to the /myProgs directory.
§ What are the file permissions for nmap-5.00.tar.bz2? –RW-RW-R–
o If you want to look inside /myProgs/nmap-5.00 to see the files (without changing directories), what will you type? ls /myProgs or ls –l /myProgs. Do this and tell me what the contents are:
o What do you see? The number 10.
What is this command is doing? Use the man command to find out about both the more
o the input file which in this case is INSTALL.
and the wc command. What does this do? Display the number of lines contained in
¡ What is this doing? Checking for the build system, host system and compiler type to ensure compatibility.
¡ What does the make command do? It is a script that runs the compiler to compile the software/source code.
What is this doing? Installs the software just compiled into the correct directories and edits menus and paths as necessary so that the compiled packages work
¡ correctly.
¡ Why would you do this? To delete the nmap-5.00 directory and files. What does rm do? (remember typing man rm will help) Removes files and directories.
¡ What is the name of the compiler that works with C? gcc
¡ How about C++? g++
¡ What is a compiler? A compiler reads program language code and creates a binary based upon the programmed code. Translates the code to machine language.
¡ What is nano? Nano is a text editor.
What did you do? The command compiled the program I just wrote and saved as
¡ myProg.cpp
¡ Why do you have to type sudo? Because elevated permissions are needed to execute the file.
¡ What result do you get? A $ appears.
¡ Explain what echo $? Does – The echo command displays whatever is given as input to standard output so $ was displayed to standard output.
week-3
Do a bit of research on CWE, Common Weakness Enumeration. Write a brief overview of their scoring system. Pick one of common weaknesses identified on their site and describe it.
speech plan
speech plan
java
Write your answers in the text boxes provided.
Be clear with your answers!
good and not so good
Assignment Content
- We spent a large amount of time in class talking about “good” systems and “not so good” systems…and we saw some of the characteristics of each…and I am sure (at least I hope) that while we discussing it, you were thinking of systems that you think are good, and those that you think are not so good…
So for this assignment, I want you to tell me one system that you think is good, and one system that you think is not so good…if it is a website, include the link…tell me SPECIFICALLY why you think the system is good or not so good…and tell me how you would improve on what they have…
And I know your next question…how long does this assignment have to be?…well, I am not really into counting words…but just to give you some perspective, I would say that by the time you are done, you should have a least one full page and maybe two full pages…if you wrote half a page, you probably wrote too little…if you wrote 5 full pages, you wrote too much…as I always tell my classes – just write!…and before you know it, you will have 1 to 2 pages…
Remember, any assignment turned in after the due date and time will lose 5 points per day…so make sure you get these in on time…
And as always…if you have ANY questions about ANYTHING, please do not hesitate to reach out to me and ask…
Have a great week!…
Assignment
You will describe (via an xls) the characteristics of at least four (4) different types of theorized hypothesis indicating the type of variables implicated (dependent, independent, categorical, quantitative, impact of outliners) and their count (i.e. ANOVA, 2 or more categorical IV, 1 dependent quantitative variable, outliners only applicable to IV).
Project 1: Vulnerability and Threat Assessment Step 7: Analyze Network Analysis Tools
Now that you have finished the threats and vulnerabilities report, you will analyze how network analysis tools are employed to identify vulnerabilities.
Earlier in the project, as you developed the comprehensive project plan, you should have read about tools and techniques available for vulnerability assessment activities. Research the tools relevant to the project plan and provide a cogent analysis of which tool or tools to recommend for this project. Consider threat remediation and make special note of tools used to identify software communications vulnerabilities.
Include the findings in a one- to two-page report, including a justification of your decision based on peer-reviewed reference materials cited in APA format. This report will be used in the final vulnerability and threat assessment report.