CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [279]
4. When you are finished, exit the terminal window.
Lab B.17: Hide a Linux File
This lab requires a Linux workstation.
If an attacker is truly looking for something on your system, they will find it. A great many problems, however, occur from users who are acting out of maliciousness, spite, or similar motives, and it is much easier to keep files safe from them because they often don’t have the same tools or knowledge as outside attackers.
One simple method for “protecting” a file is to hide it. To hide a file in Linux, you use the period character (.) as the first character of its name. It will then no longer appear in listings unless you use the -a option (such as ls -a). Here are the steps for the user sven to hide the text file pageup within his home directory:
1. From the desktop, choose Programs Accessories Terminal.
2. Type the command cd /home/sven.
3. Type the command mv pageup .pageup. The file is now considered “hidden.”
4. When you are finished, exit the terminal window.
Lab B.18: Hide and Access a Windows Share
This lab requires two Windows workstations.
A simple method for “protecting” shares is to make them hidden. To hide a share in Windows, you use the dollar sign character ($) as the last character of its name. It will then no longer appear in listings and will need to be referred to specifically to be accessed. Follow these steps:
1. On Computer1, choose to share the C:\WINDOWS directory, and name the share DATA$.
2. On Computer2, look for the share. Use My Network Places (or Network Neighborhood on older Windows operating systems) to look for the share. You should not be able to see the share because the name ends with $.
3. Right-click My Network Places and choose Map Network Drive.
4. In the Path box, type \\Computer1\DATA$.
5. Click OK. You should now be able to access the share.
Lab B.19: Encrypt a Windows File
This lab requires a Windows workstation.
Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow these steps:
1. Within Windows Explorer or the Desktop, right-click an individual file and choose Properties.
2. On the General tab, click the Advanced button that appears underneath Attributes.
3. Check the Encrypt box contents to secure data. Notice that you cannot choose to both encrypt the data and compress it.
4. Click OK to exit. Click OK again at the Properties dialog box.
5. A warning box appears asking if you want to encrypt only the file or the entire directory (the parent folder). Choose to only encrypt the one file and click OK again.
Lab B.20: Count the Number of Running Linux Processes
This lab requires a Linux workstation.
To view only a count of the number of processes running on a Linux workstation, follow these steps:
1. As root, from the desktop, choose Programs Accessories Terminal.
2. Type the command ps -ef | grep -c $. This number can be used to generate a simple baseline as you rerun the command occasionally and look for massive fluctuations.
3. When you are finished, exit the terminal window.
Lab B.21: Display the Security Tab in Windows XP
This lab requires a Windows XP workstation.
By default, Windows XP does not display the Security tab for files and folders. To turn this feature on, follow these steps:
1. Choose Start Control Panel Folder Options.
2. Click the View tab.
3. Scroll to the bottom of the Advanced Settings (shown in Figure B.5) and uncheck the Use Simple File Sharing [Recommended] box.
4. Click OK to exit. Close Control Panel.
FIGURE B.5 Simple file sharing prevents the Security tab from being displayed for files and folders.
Lab B.22: View Effective Permissions in Windows XP
This lab requires a Windows XP workstation.
Permissions can be assigned at multiple levels—to folders, files, and so on. Additionally, sometimes what is granted to one group may be denied to another, and when a user is a member of more than one group, permissions can become confusing.
To view effective permissions for a file in Windows XP, follow these steps:
1.