Sei sulla pagina 1di 4

Administrators use user accounts to assign permissions to network resources and define the types of actions a user can

perform (referred to as right in Windows), such as creating file shares or installing software. Group accounts are used to organize users so that assignment of resource permissions and rights can be managed more easily than working with dozens or hundreds of individual user accounts. When Windows is first installed, two users are created: Administrator and Guest. After entering the full name and user logon name, you click Next to get to the window shown in Figure 9-3, where you enter the password and conform it. The password is case sensitive. User must change password at next logonThe user is prompted to change the password at the next logon. Administrators sometimes create accounts with a default password based upon the users name or phone number that must be changed at the next logon. This option can also be set when users forget their passwords and the support staff changes passwords for them. Notice the Guest user in the figure, shown with a black arrow in a white circle to indicate that the account is disabled. Global The default option, global groups contain users from the domain in which theyre created but can be assigned permissions to resources in other domains in a multidomain network. Their main purpose is to group users together who require access to similar resources. Special Identity Groups: Authenticated users members are any user account (except Guest) that logs on to a computer or domain with a valid username and password. System refers to the Windows OS Self refers to the object on which permissions are being set A user profile stored on the same system where the user logs on is called a local profile. A roaming profile follows the user no matter which computer he or she logs on to. Its stored on a network share so that when a user logs on to any computer in the network, the profile is copied from the network share to the profile folder on the local computer. A third type of profile, called a mandatory profile, discards a users profile changes at logoff so that the profile is always the same when the user logs on. Mandatory profiles are sometimes used on shared computers and for guest accounts. Both the logon name and password are case sensitive on Linux. When a user is created on Linux, a group with the same name as the user is also created, and the new user is made a member of this group.

To view the list of users, display the /etc/passwd files contents with the cat /ect/ passwd command, and to view the list of groups, display the /etc/groups files contents with the cat /ect/groups command. The cat command lists a text files contents on screen. A basic disk can be divided into one to four partitions as follows, with a maximum of four partitions. One extended partition An extended cant be formatted with a file system or assigned a drive letter. Its divided into one or more logical drives, each of which can be formatted and assigned a drive letter. A logical drive is considered a volume, but an extended partition is not. Only a primary partition can be the active partition, which is a partition which can hold boot files (called the boot loader) the BIOS loads before it can start the OS. An extended partition/logical drive cant be booted, but it can store OS files. The active primary partition stored the Windows boot loader is referred to as the system partition. The partition or logical drive holding the Windows OS files is called the boot partition. In most cases, these two are the same because both the boot loader files and Windows OS files are often located on the C drive. A dynamic disk can be divided into one or more volumes; the term partition isnt used in this context. You can create up to 1000 volumes per dynamic disk (although no more than 32 are recommended). A dynamic disk offers features that a basic disk doesnt, namely RAID and disk spanning, which is created a volume that occupies space on two or more disks. FAT16 is limited to 2 GB partitions in most implementations (although Windows NT permits partitions up to 4 GB). Disk quotas enable administrators to limit the amount of disk space the users files can occupy on a disk volume or in a folder. By default, encrypted folders and files can be identified by their filenames displayed in green. Permissions: Read Users can view file contents, copy files, open folders and subfolders, and view file attributes and permissions. Read & execute grants the same permissions as Read and includes the ability to run applications or scripts. List folder contents this permission applies solely to folders and grants the same permissions as read & execute. However, because it doesnt apply to files, Read & execute must also be set on the folder to allow users to open files in the folder.

Write users can create and modify files and read file attributes and permissions. However, this permission doesnt allow users to read or delete files. In most cases, the Read or Read & execute permission should be given with the Write permission. Linux supports a number of file systems. Among them are Ext3, Ext4, ReiserFS, and XFS. Ext3 (and more recently Ext4) is the default file system for most Linux distributions. In Linux, there are only three permissions and three user types which can be assigned one or more of these permissions: Owner the owner of the file or folder, which is usually the user who created it Group the primary group to which the owner belongs Other all other users

Sharing permissions with NTFS Change All permissions granted be Read, plus create files and folders, change contents and attributes of file and folders, and delete file sand folders.

Print server A Windows computer thats sharing a printer. It accepts print jobs from computers on the network and sends jobs to the printer to be printed on the print device. Print queue A storage location for print jobs awaiting printing. In Windows, the print queue is implemented as a folder (by default, C:\Windows\System32\Spool\Printers) where files that make up each print job are stored until theyre sent to the print device or print server.

Event Viewer administrators use Event Viewer to examine log entries generated by system services and applications.

Error Error events, indicated by a white exclamation point inside a red circle, are often generated when a process or service is unable to perform a task or stops unexpectedly. Error messages should be addressed immediately, as they indicate a configuration error or an operational problem.

A baseline is a record of performance data gathered when a system is performing well under normal operating conditions.

An uninterruptable power supply (UPS) is a device with a built-in battery, power conditioning, and surge protection.

RAID 0 Called disk striping, RAID 0 distributes data over two or more disks. RAID 0 has no faulttolerance capabilities but does enhance disk performance. Available in Windows Server 2000/2003 as well as Linux.

RAID 1+0 Combines RAID levels 1 and 0 and is sometimes called RAID 10. It uses a RAID 1 mirror set thats striped with another set of drive and can survive multiple disk failures in some circumstances. A minimum of four disk is required for this configuration.

A failover cluster is used to provide fault tolerance in the event of a complete system failure. A load-balancing cluster consists of two or more servers that appear as a single unit to users.

Potrebbero piacerti anche