CommLineLit:Activity III

From Anarchy In Action

<< Back to Learning Activities


Note: Utilize the Learning Module, the chmod Tutorial, and the supplementary material to answer the questions below. You are encouraged to use external resources to find the answers.


Seila's Spreadsheet

Seila has just created a spreadsheet that contains sensitive information and saved it on the shared computer system. Since you are the assistant sysadmin, he has sent you an e-mail with some questions.


Seila wants to delete old files, now that he has made a new spreadsheet to replace them. However, he does need to back up some of the old files, and would like to sort them into separate directories based upon the date they were last modified. If possible, he would like to automate the task.

1. Should Seila utilize a graphical tool or the command line to perform this task? Please explain to Seila why he should use either a GUI or CLI.


------------------------------------------------------------------------------------

Seila is viewing a directory on the shared computer system. The directory listing is as follows:

-rw- rw- r--  susan  acctg  homework.txt
-rw- r-- r--  susan  acctg  publicity.html
d--- --- rwx  juan   acctg  sales 
-rw- r-- ---  seila  acctg  spreadsheet.xls

2a. Seila's username is seila. He wants to make sure that no one else is able to read or write to his spreadsheet file, spreadsheet.xls. Is anyone else on the shared computer system able to read or write to this file?


------------------------------------------------------------------------------------

2b. Please explain why or why not.


------------------------------------------------------------------------------------

3. What is the 3-digit numerical chmod of -rw-------?


------------------------------------------------------------------------------------

Seila has read articles about computer security, but is still unsure how to best protect this data. He has asked you to find a good resource on the subject. Click here to search with DuckDuckGo for a resource on "data security".

4a. After you have picked the resource you think is best, list the web address (URL) and title of the resource.


------------------------------------------------------------------------------------

4b. Why do you think this is a good resource?


------------------------------------------------------------------------------------

5. Please list any of the resources you may have used to answer the questions above.


------------------------------------------------------------------------------------