<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Amannik</id>
	<title>ICO wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Amannik"/>
	<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php/Special:Contributions/Amannik"/>
	<updated>2026-05-06T05:08:13Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=DDoS_Eng&amp;diff=121717</id>
		<title>DDoS Eng</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=DDoS_Eng&amp;diff=121717"/>
		<updated>2017-05-09T09:48:07Z</updated>

		<summary type="html">&lt;p&gt;Amannik: added a bit about defense&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Overview&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Written by Andris Männik&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
DDoS (Distributed Denial-of-Service) is an attack in which the goal is to flood a system with requests from a network of computers so that the system buckles under the weight of the bandwith, so that the system cannot process legitimate requests and if the attack is coming from a wide area it is incredibly difficult to filter legitimate and illegitimate traffic. DDoS&#039;ing is most commonly done in botnets, zombie computers infected with malicious software to accept commands from the attacker&#039;s own computer, to start and stop flooding a service with requests whenever the attacker chooses.&lt;br /&gt;
&lt;br /&gt;
As technology advances discovering and remedying DDoS attacks will be much more difficult.&lt;br /&gt;
&lt;br /&gt;
DDoS is a more sophisticated version of DoS.&lt;br /&gt;
&lt;br /&gt;
The difference comes from that in DDoS&#039;ing, the requests are coming from a plethora of computers from many different networks, where as DoS&#039;ing is when the requests are coming from a single computer from a single network.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Methods&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Attack vectors&lt;br /&gt;
&lt;br /&gt;
Generally, DDoS attacks can be divided into these categories:&lt;br /&gt;
&lt;br /&gt;
Volumetric attacks, for example SYN flooding. This sort of attack is meant to utilize the 3 way TCP handshake in which computers are sending SYN packets and the receiving computer has to reply with an ACK packet. The most basic attack type. Devices which are capable of keeping up with millions of device requests are even brought low by this type of attack.&lt;br /&gt;
&lt;br /&gt;
Application Layer Attack - This attack relies on the disruption of information between computers.  This vector of attack is good for an attacker who doesn&#039;t have a big botnet, because the attacked server has to use a lot more resources to respond to the HTTP request, and there&#039;s little bandwith cost to the attacker, or at least, significantly lower to the attacker than it is to the attacked server or system.&lt;br /&gt;
&lt;br /&gt;
Fragmentation Attacks - Fragmentation normally is done for data transmission, since each network has a unique limit for the size of datagrams that it can process. This pre-configured limit is known as the MTU (maximum transmission unit). In this example, sending a datagram the size of which is larger than the receiving server&#039;s MTU, the datagram has to be fragmented so that it can be transmitted wholly. The IP header in the datagram contains the flag detailing whether fragmentation is turned on or not to see if fragmentation is allowed to take place. In cases where the flag is set to no fragmentation in the IP header, then the packet is dropped. If the flag is turned on, then the offset would explain to the recipient device the exact order the fragments should be placed in for reassembly.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attack amplification&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
DNS Reflection - By forging the victims IP address, the attacker can make small requests to the DNS server and allow the victim to be sent the replies. This allows the attacker to amplify the power of his or her botnet by up to 70 times,which makes it much easier to overflow the victim with requests.&lt;br /&gt;
Chargen Reflection - A vast majority of computers and printers which are connected to the internet support a service called Chargen. This allows random people to ask for a question from the device and the device replies with a random string containing letters. Chargen can be used to amplify the aforementioned DNS type attack.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Symptopms of DDoS&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
NOTE: All interruptions in a service can not be attributed to a DoS type attack, there are a plethora of reasons and possibilities why a service might be reacting similarily as it would if it were DDoS&#039;ed, like the administrator doing maintenance and because of that, the services are temporarily slowed down or offline. Nevertheless, there are signs which should be paid attention to,which might indicate that the network or service is suffering a DDoS attack.&lt;br /&gt;
&lt;br /&gt;
One sign of an attack is that the computer and internet are performing slower than usual. This would be noticeable when you try to open a file or go to a website and it takes longer than usual.&lt;br /&gt;
In addition to a system responding slowly, you might suffer issues with going to a website at all.&lt;br /&gt;
The increase in mail in your spambox can also be an indication that your computer has just recently suffered a DDoS attack.&lt;br /&gt;
Internet traffic may be slowed down in a geographic region, like a country experiencing a DDoS attack, the citizen&#039;s of the country will suffer from poor connection speed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Prevention of DDoS&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The easiest and also most expensive solution would be to buy more bandwith. For example : If you have 10000 systems all of which are capable of sending traffic 1Mbps then that means accumulatively you can send 10 gbps data. A systems administrator might also want to expand out to more servers in different data centers so that the load would be better distributed between servers. If the traffic is spread out well between the servers,then the load on that 1 server can handle the traffic better. Nowadays though, upping the bandwith isn&#039;t a cost effective solution but nevertheless it is a solution.&lt;br /&gt;
One of the most critical parts of a system is a DNS server. Generally it&#039;s a bad idea to leave it open for others to access. Restricting access to the DNS servers might be an option so that it couldn&#039;t be attacked so easily. &lt;br /&gt;
&lt;br /&gt;
Similarily, what will happen if those servers are under attack? Even if there&#039;s access to the website, there&#039;s no connection to the DNS server and the domain name cannot be converted into an ip address which is also bad. A majority of providers use two DNS servers when registering a domain but often enough two DNS servers aren&#039;t enough.A systems administrator has to make sure that the DNS is as well protected as the web services and other affiliated resources.&lt;br /&gt;
&lt;br /&gt;
When assessing your network there&#039;s quite a bit of measures to undertake in order to protect the network layer. You have ascertain that the router doesn&#039;t forward bad packets and the ICMP would have to be denied and to use proper firewall software.&lt;br /&gt;
Another idea would be to close all unused ports. A lot of ISP&#039;s offer a service to not allow access to specified ports which would be better than restricting access to them yourself. Should the company be the recepient of an attack the ISP will help the company manage it.&lt;br /&gt;
&lt;br /&gt;
Something to keep in mind would be how to mitigate an attack. It would be very wise to have a plan to quickly swap dynamic resources for static resources. If doing this, it would be highly advisable to have systems which would pick up attacks. There&#039;s not a worse situation for a company than have their systems offline, which is why it&#039;s necessary to be ready to go on the counter offensive as soon as tehe attack begins. Stopping a DDoS attack is very complicated because it&#039;s incredibly difficult to find the attacks point of origin. Which is why you have to set up an infrastructure from the get go which is hard to break into and would be up to the security standards of today.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Defending Against DDoS Attacks&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Preparation for a DDoS attack should be something every company should think of in advance so if the attack should happen there&#039;s a general idea on what to do. DDoS attacks cannot be prevented but some steps can be taken to make it harder for an attacker to render a network unresponsive.&lt;br /&gt;
&lt;br /&gt;
One of the things that can be done is in regard to the Architecture. It is Imperative to make the architecture as resistant as possible.  &lt;br /&gt;
&lt;br /&gt;
The following steps will help spread out organizational assets as to avoid making things easy for the attacker:&lt;br /&gt;
&lt;br /&gt;
    To place servers in different data centers.&lt;br /&gt;
    To make sure that data centers are located on different networks.&lt;br /&gt;
    To make sure that the data centers have no bottlenecks.&lt;br /&gt;
&lt;br /&gt;
For a company that depends on the internet and servers it is important to make sure that resources are geographically dispersed.&lt;br /&gt;
&lt;br /&gt;
Overall, priorities for architecture should be geographic diversity, provider diversity, and elimination of bottlenecks. While these are best practices for general business continuity and disaster recovery, they will help ensure organizational resiliency in response to a DDoS attack.&lt;br /&gt;
&lt;br /&gt;
HARDWARE:&lt;br /&gt;
&lt;br /&gt;
To deploy the hardware that can handle known attack types and use the options that are in the hardware that would protect network resources. Whilst adding greater hardware or special hardware won&#039;t prevent the attacks from happening, BUT taking thse steps will lessen the impact of an attack.&lt;br /&gt;
&lt;br /&gt;
Hardware upgrading is effective against SYN flood attacks. Most modern hardware, network firewalls, web application firewallswill generally have a setting that allows a network operator to start closing out TCP connections if the requests are frequent enough.&lt;br /&gt;
&lt;br /&gt;
SCRUBBING:&lt;br /&gt;
&lt;br /&gt;
There are services available that are made for responding to the attacks. This service is called a scrubbing service, or rather cloud scrubbing service as the traffic gets rerouted through the scrubbing service before it ever hits a victim&#039;s network. Like all of the aforementioned ideas, it would be best to implement these before any actual DDoS attack takes place.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mitigating damage&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
It&#039;s nigh on impossible to stop a DDoS attack. Which is why instead of trying to stop it, it might be better to mitigate damage instead what the attackers might do. In order for there to be any damage mitigation there has to be a plan at the earliest stages of the attack commencing and for that to happen you must know the early signs of a DDoS attack and to do that you have to monitor the network traffic so you can discover any unusual activity taking place.&lt;br /&gt;
&lt;br /&gt;
Another good approach is to frequently scan the network and web applications to discover vulnerabilities to the system early. Protecting your infrastructure means protecting the laptops,servers and other devices which can be used in making a botnet.&lt;br /&gt;
There are some applications like IBM Security which protects devices from application layer attacks and have been shown to deter minor DDoS attacks.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Conclusion&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Nowadays, DDoS attacks are one of the most common attacks being done in cyberspace, which take place every day. It&#039;s an attack, where the attacker takes advantage of other computers, the owners of which are unaware that their computers are being used to make these attacks. These computers are put into a network and they&#039;re used to attack one or several targets by sending the victims miljons of data packets. Even though a DDoS attack is nigh impossible to stop, the systems administrator has to do everything in his or her power to insure the safety of hte network. All system administrators should get acquainted with this type of attack because that&#039;s the best way to mitigate damage.&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Amannik</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=DDoS_Eng&amp;diff=120195</id>
		<title>DDoS Eng</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=DDoS_Eng&amp;diff=120195"/>
		<updated>2017-04-17T13:30:05Z</updated>

		<summary type="html">&lt;p&gt;Amannik: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Overview&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Written by Andris Männik&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
DDoS (Distributed Denial-of-Service) is an attack in which the goal is to flood a system with requests from a network of computers so that the system buckles under the weight of the bandwith, so that the system cannot process legitimate requests and if the attack is coming from a wide area it is incredibly difficult to filter legitimate and illegitimate traffic. DDoS&#039;ing is most commonly done in botnets, zombie computers infected with malicious software to accept commands from the attacker&#039;s own computer, to start and stop flooding a service with requests whenever the attacker chooses.&lt;br /&gt;
&lt;br /&gt;
As technology advances discovering and remedying DDoS attacks will be much more difficult.&lt;br /&gt;
&lt;br /&gt;
DDoS is a more sophisticated version of DoS.&lt;br /&gt;
&lt;br /&gt;
The difference comes from that in DDoS&#039;ing, the requests are coming from a plethora of computers from many different networks, where as DoS&#039;ing is when the requests are coming from a single computer from a single network.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Methods&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Attack vectors&lt;br /&gt;
&lt;br /&gt;
Generally, DDoS attacks can be divided into these categories:&lt;br /&gt;
&lt;br /&gt;
Volumetric attacks, for example SYN flooding. This sort of attack is meant to utilize the 3 way TCP handshake in which computers are sending SYN packets and the receiving computer has to reply with an ACK packet. The most basic attack type. Devices which are capable of keeping up with millions of device requests are even brought low by this type of attack.&lt;br /&gt;
&lt;br /&gt;
Application Layer Attack - This attack relies on the disruption of information between computers.  This vector of attack is good for an attacker who doesn&#039;t have a big botnet, because the attacked server has to use a lot more resources to respond to the HTTP request, and there&#039;s little bandwith cost to the attacker, or at least, significantly lower to the attacker than it is to the attacked server or system.&lt;br /&gt;
&lt;br /&gt;
Fragmentation Attacks - Fragmentation normally is done for data transmission, since each network has a unique limit for the size of datagrams that it can process. This pre-configured limit is known as the MTU (maximum transmission unit). In this example, sending a datagram the size of which is larger than the receiving server&#039;s MTU, the datagram has to be fragmented so that it can be transmitted wholly. The IP header in the datagram contains the flag detailing whether fragmentation is turned on or not to see if fragmentation is allowed to take place. In cases where the flag is set to no fragmentation in the IP header, then the packet is dropped. If the flag is turned on, then the offset would explain to the recipient device the exact order the fragments should be placed in for reassembly.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attack amplification&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
DNS Reflection - By forging the victims IP address, the attacker can make small requests to the DNS server and allow the victim to be sent the replies. This allows the attacker to amplify the power of his or her botnet by up to 70 times,which makes it much easier to overflow the victim with requests.&lt;br /&gt;
Chargen Reflection - A vast majority of computers and printers which are connected to the internet support a service called Chargen. This allows random people to ask for a question from the device and the device replies with a random string containing letters. Chargen can be used to amplify the aforementioned DNS type attack.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Symptopms of DDoS&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
NOTE: All interruptions in a service can not be attributed to a DoS type attack, there are a plethora of reasons and possibilities why a service might be reacting similarily as it would if it were DDoS&#039;ed, like the administrator doing maintenance and because of that, the services are temporarily slowed down or offline. Nevertheless, there are signs which should be paid attention to,which might indicate that the network or service is suffering a DDoS attack.&lt;br /&gt;
&lt;br /&gt;
One sign of an attack is that the computer and internet are performing slower than usual. This would be noticeable when you try to open a file or go to a website and it takes longer than usual.&lt;br /&gt;
In addition to a system responding slowly, you might suffer issues with going to a website at all.&lt;br /&gt;
The increase in mail in your spambox can also be an indication that your computer has just recently suffered a DDoS attack.&lt;br /&gt;
Internet traffic may be slowed down in a geographic region, like a country experiencing a DDoS attack, the citizen&#039;s of the country will suffer from poor connection speed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Prevention of DDoS&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The easiest and also most expensive solution would be to buy more bandwith. For example : If you have 10000 systems all of which are capable of sending traffic 1Mbps then that means accumulatively you can send 10 gbps data. A systems administrator might also want to expand out to more servers in different data centers so that the load would be better distributed between servers. If the traffic is spread out well between the servers,then the load on that 1 server can handle the traffic better. Nowadays though, upping the bandwith isn&#039;t a cost effective solution but nevertheless it is a solution.&lt;br /&gt;
One of the most critical parts of a system is a DNS server. Generally it&#039;s a bad idea to leave it open for others to access. Restricting access to the DNS servers might be an option so that it couldn&#039;t be attacked so easily. Similarily, what &lt;br /&gt;
&lt;br /&gt;
will happen if those servers are under attack? Even if there&#039;s access to the website, there&#039;s no connection to the DNS server and the domain name cannot be converted into an ip address which is also bad. A majority of providers use two DNS servers when registering a domain but often enough two DNS servers aren&#039;t enough.A systems administrator has to make sure that the DNS is as well protected as the web services and other affiliated resources.&lt;br /&gt;
&lt;br /&gt;
When assessing your network there&#039;s quite a bit of measures to undertake in order to protect the network layer. You have ascertain that the router doesn&#039;t forward bad packets and the ICMP would have to be denied and to use proper firewall software.&lt;br /&gt;
Another idea would be to close all unused ports. A lot of ISP&#039;s offer a service to not allow access to specified ports which would be better than restricting access to them yourself. Should the company be the recepient of an attack the ISP will help the company manage it.&lt;br /&gt;
&lt;br /&gt;
Something to keep in mind would be how to mitigate an attack. It would be very wise to have a plan to quickly swap dynamic resources for static resources. If doing this, it would be highly advisable to have systems which would pick up attacks. There&#039;s not a worse situation for a company than have their systems offline, which is why it&#039;s necessary to be ready to go on the counter offensive as soon as tehe attack begins. Stopping a DDoS attack is very complicated because it&#039;s incredibly difficult to find the attacks point of origin. Which is why you have to set up an infrastructure from the get go which is hard to break into and would be up to the security standards of today.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mitigating damage&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
It&#039;s nigh on impossible to stop a DDoS attack. Which is why instead of trying to stop it, it might be better to mitigate damage instead what the attackers might do. In order for there to be any damage mitigation there has to be a plan at the earliest stages of the attack commencing and for that to happen you must know the early signs of a DDoS attack and to do that you have to monitor the network traffic so you can discover any unusual activity taking place.&lt;br /&gt;
&lt;br /&gt;
Another good approach is to frequently scan the network and web applications to discover vulnerabilities to the system early. Protecting your infrastructure means protecting the laptops,servers and other devices which can be used in making a botnet.&lt;br /&gt;
There are some applications like IBM Security which protects devices from application layer attacks and have been shown to deter minor DDoS attacks.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Conclusion&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Nowadays, DDoS attacks are one of the most common attacks being done in cyberspace, which take place every day. It&#039;s an attack, where the attacker takes advantage of other computers, the owners of which are unaware that their computers are being used to make these attacks. These computers are put into a network and they&#039;re used to attack one or several targets by sending the victims miljons of data packets. Even though a DDoS attack is nigh impossible to stop, the systems administrator has to do everything in his or her power to insure the safety of hte network. All system administrators should get acquainted with this type of attack because that&#039;s the best way to mitigate damage.&lt;/div&gt;</summary>
		<author><name>Amannik</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=DDoS_Eng&amp;diff=120194</id>
		<title>DDoS Eng</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=DDoS_Eng&amp;diff=120194"/>
		<updated>2017-04-17T13:21:06Z</updated>

		<summary type="html">&lt;p&gt;Amannik: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Overview&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Written by Andris Männik&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
DDoS (Distributed Denial-of-Service) is an attack in which the goal is to flood a system with requests from a network of computers so that the system buckles under the weight of the bandwith, so that the system cannot process legitimate requests and if the attack is coming from a wide area it is incredibly difficult to filter legitimate and illegitimate traffic. DDoS&#039;ing is most commonly done in botnets, zombie computers infected with malicious software to accept commands from the attacker&#039;s own computer, to start and stop flooding a service with requests whenever the attacker chooses.&lt;br /&gt;
&lt;br /&gt;
As technology advances discovering and remedying DDoS attacks will be much more difficult.&lt;br /&gt;
&lt;br /&gt;
DDoS is a more sophisticated version of DoS.&lt;br /&gt;
&lt;br /&gt;
The difference comes from that in DDoS&#039;ing, the requests are coming from a plethora of computers from many different networks, where as DoS&#039;ing is when the requests are coming from a single computer from a single network.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Methods&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Attack vectors&lt;br /&gt;
&lt;br /&gt;
Generally, DDoS attacks can be divided into these categories:&lt;br /&gt;
&lt;br /&gt;
Volumetric attacks, for example SYN flooding. This sort of attack is meant to utilize the 3 way TCP handshake in which computers are sending SYN packets and the receiving computer has to reply with an ACK packet. The most basic attack type. Devices which are capable of keeping up with millions of device requests are even brought low by this type of attack.&lt;br /&gt;
&lt;br /&gt;
Application Layer Attack - This attack relies on the disruption of information between computers.  This vector of attack is good for an attacker who doesn&#039;t have a big botnet, because the attacked server has to use a lot more resources to respond to the HTTP request, and there&#039;s little bandwith cost to the attacker, or at least, significantly lower to the attacker than it is to the attacked server or system.&lt;br /&gt;
&lt;br /&gt;
Fragmentation Attacks - Fragmentation normally is done for data transmission, since each network has a unique limit for the size of datagrams that it can process. This pre-configured limit is known as the MTU (maximum transmission unit). In this example, sending a datagram the size of which is larger than the receiving server&#039;s MTU, the datagram has to be fragmented so that it can be transmitted wholly. The IP header in the datagram contains the flag detailing whether fragmentation is turned on or not to see if fragmentation is allowed to take place. In cases where the flag is set to no fragmentation in the IP header, then the packet is dropped. If the flag is turned on, then the offset would explain to the recipient device the exact order the fragments should be placed in for reassembly.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Attack amplification&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
    DNS Reflection - By forging the victims IP address, the attacker can make small requests to the DNS server and allow the victim to be sent the replies. This allows the attacker to amplify the power of his or her botnet by up to 70 times,which makes it much easier to overflow the victim with requests.&lt;br /&gt;
    Chargen Reflection - A vast majority of computers and printers which are connected to the internet support a service called Chargen. This allows random people to ask for a question from the device and the device replies with a random string containing letters. Chargen can be used to amplify the aforementioned DNS type attack.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Symptopms of DDoS&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
NOTE: All interruptions in a service can not be attributed to a DoS type attack, there are a plethora of reasons and possibilities why a service might be reacting similarily as it would if it were DDoS&#039;ed, like the administrator doing maintenance and because of that, the services are temporarily slowed down or offline. Nevertheless, there are signs which should be paid attention to,which might indicate that the network or service is suffering a DDoS attack.&lt;br /&gt;
&lt;br /&gt;
    One sign of an attack is that the computer and internet are performing slower than usual. This would be noticeable when you try to open a file or go to a website and it takes longer than usual.&lt;br /&gt;
    In addition to a system responding slowly, you might suffer issues with going to a website at all.&lt;br /&gt;
    The increase in mail in your spambox can also be an indication that your computer has just recently suffered a DDoS attack.&lt;br /&gt;
    Internet traffic may be slowed down in a geographic region, like a country experiencing a DDoS attack, the citizen&#039;s of the country will suffer from poor connection speed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Prevention of DDoS&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
    The easiest and also most expensive solution would be to buy more bandwith. For example : If you have 10000 systems all of which are capable of sending traffic 1Mbps then that means accumulatively you can send 10 gbps data. A systems administrator might also want to expand out to more servers in different data centers so that the load would be better distributed between servers. If the traffic is spread out well between the servers,then the load on that 1 server can handle the traffic better. Nowadays though, upping the bandwith isn&#039;t a cost effective solution but nevertheless it is a solution.&lt;br /&gt;
    One of the most critical parts of a system is a DNS server. Generally it&#039;s a bad idea to leave it open for others to access. Restricting access to the DNS servers might be an option so that it couldn&#039;t be attacked so easily. Similarily, what &lt;br /&gt;
&lt;br /&gt;
will happen if those servers are under attack? Even if there&#039;s access to the website, there&#039;s no connection to the DNS server and the domain name cannot be converted into an ip address which is also bad. A majority of providers use two DNS servers when registering a domain but often enough two DNS servers aren&#039;t enough.A systems administrator has to make sure that the DNS is as well protected as the web services and other affiliated resources.&lt;br /&gt;
&lt;br /&gt;
    When assessing your network there&#039;s quite a bit of measures to undertake in order to protect the network layer. You have ascertain that the router doesn&#039;t forward bad packets and the ICMP would have to be denied and to use proper firewall software.&lt;br /&gt;
Another idea would be to close all unused ports. A lot of ISP&#039;s offer a service to not allow access to specified ports which would be better than restricting access to them yourself. Should the company be the recepient of an attack the ISP will help the company manage it.&lt;br /&gt;
    Something to keep in mind would be how to mitigate an attack. It would be very wise to have a plan to quickly swap dynamic resources for static resources. If doing this, it would be highly advisable to have systems which would pick up attacks. There&#039;s not a worse situation for a company than have their systems offline, which is why it&#039;s necessary to be ready to go on the counter offensive as soon as tehe attack begins. Stopping a DDoS attack is very complicated because it&#039;s incredibly difficult to find the attacks point of origin. Which is why you have to set up an infrastructure from the get go which is hard to break into and would be up to the security standards of today.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mitigating damage&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
It&#039;s nigh on impossible to stop a DDoS attack. Which is why instead of trying to stop it, it might be better to mitigate damage instead what the attackers might do. In order for there to be any damage mitigation there has to be a plan at the earliest stages of the attack commencing and for that to happen you must know the early signs of a DDoS attack and to do that you have to monitor the network traffic so you can discover any unusual activity taking place.&lt;br /&gt;
&lt;br /&gt;
Another good approach is to frequently scan the network and web applications to discover vulnerabilities to the system early. Protecting your infrastructure means protecting the laptops,servers and other devices which can be used in making a botnet.&lt;br /&gt;
There are some applications like IBM Security which protects devices from application layer attacks and have been shown to deter minor DDoS attacks.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Conclusion&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Nowadays, DDoS attacks are one of the most common attacks being done in cyberspace, which take place every day. It&#039;s an attack, where the attacker takes advantage of other computers, the owners of which are unaware that their computers are being used to make these attacks. These computers are put into a network and they&#039;re used to attack one or several targets by sending the victims miljons of data packets. Even though a DDoS attack is nigh impossible to stop, the systems administrator has to do everything in his or her power to insure the safety of hte network. All system administrators should get acquainted with this type of attack because that&#039;s the best way to mitigate damage.&lt;/div&gt;</summary>
		<author><name>Amannik</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=DDoS_Eng&amp;diff=120165</id>
		<title>DDoS Eng</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=DDoS_Eng&amp;diff=120165"/>
		<updated>2017-04-17T09:58:37Z</updated>

		<summary type="html">&lt;p&gt;Amannik: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Overview&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Written by Andris Männik&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
DDoS (Distributed Denial-of-Service) is an attack in which the goal is to flood a system with requests from a network of computers so that the system buckles under the weight of the bandwith, so that the system cannot process legitimate requests and if the attack is coming from a wide area it is incredibly difficult to filter legitimate and illegitimate traffic. DDoS&#039;ing is most commonly done in botnets, zombie computers infected with malicious software to accept commands from the attacker&#039;s own computer, to start and stop flooding a service with requests whenever the attacker chooses.&lt;br /&gt;
&lt;br /&gt;
As technology advances discovering and remedying DDoS attacks will be much more difficult.&lt;br /&gt;
&lt;br /&gt;
DDoS is a more sophisticated version of DoS.&lt;br /&gt;
&lt;br /&gt;
The difference comes from that in DDoS&#039;ing, the requests are coming from a plethora of computers from many different networks, where as DoS&#039;ing is when the requests are coming from a single computer from a single network.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Methods&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Attack vectors&lt;br /&gt;
&lt;br /&gt;
Generally, DDoS attacks can be divided into four categories:&lt;br /&gt;
&lt;br /&gt;
    Volumetric attacks, for example SYN flooding. This sort of attack is meant to utilize the 3 way TCP handshake in which computers are sending SYN packets and the receiving computer has to reply with an ACK packet. The most basic attack type. Devices which are capable of keeping up with millions of device requests are even brought low by this type of attack.&lt;br /&gt;
&lt;br /&gt;
   Application Layer Attack - This attack relies on the disruption of information between computers.  This vector of attack is good for an attacker who doesn&#039;t have a big botnet, because the attacked server has to use a lot more resources to respond to the HTTP request, and there&#039;s little bandwith cost to the attacker, or at least, significantly lower to the attacker than it is to the attacked server or system.&lt;br /&gt;
&lt;br /&gt;
    Fragmentide rünnakud(Fragmentation Attacks ing.k) - Need rünnakud tekitavad üleujutuse, saates ohvrile TCP või UDP fragmente. Tänu sellele väheneb süsteemi jõudlus ning ohver ei saa enam andmevooge uuesti kokku panna.&lt;/div&gt;</summary>
		<author><name>Amannik</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=DDoS_Eng&amp;diff=120158</id>
		<title>DDoS Eng</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=DDoS_Eng&amp;diff=120158"/>
		<updated>2017-04-17T09:24:01Z</updated>

		<summary type="html">&lt;p&gt;Amannik: Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;Overview&amp;#039;&amp;#039;&amp;#039;   Written by Andris Männik   DDoS (Distributed Denial-of-Service) is an attack in which the goal is to flood a system with requests from a network of computers...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Overview&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Written by Andris Männik&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
DDoS (Distributed Denial-of-Service) is an attack in which the goal is to flood a system with requests from a network of computers so that the system buckles under the weight of the bandwith, so that the system cannot process legitimate requests and if the attack is coming from a wide area it is incredibly difficult to filter legitimate and illegitimate traffic. DDoS&#039;ing is most commonly done in botnets, zombie computers infected with malicious software to accept commands from the attacker&#039;s own computer, to start and stop flooding a service with requests whenever the attacker chooses.&lt;br /&gt;
&lt;br /&gt;
As technology advances discovering and remedying DDoS attacks will be much more difficult.&lt;br /&gt;
&lt;br /&gt;
DDoS is a more sophisticated version of DoS.&lt;br /&gt;
&lt;br /&gt;
The difference comes from that in DDoS&#039;ing, the requests are coming from a plethora of computers from many different networks, where as DoS&#039;ing is when the requests are coming from a single computer from a single network.&lt;/div&gt;</summary>
		<author><name>Amannik</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=120005</id>
		<title>OSadmin wiki article</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=120005"/>
		<updated>2017-04-10T09:56:36Z</updated>

		<summary type="html">&lt;p&gt;Amannik: /* Chosen topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Intro=&lt;br /&gt;
*Choose a topic from personal experience related with the subject or from topics found on the wiki page&lt;br /&gt;
*[[#Chosen_topics|Write the topic here]].&lt;br /&gt;
*Lecturer will confirm the topic&lt;br /&gt;
*Write your article in wiki environment &lt;br /&gt;
*Inform the [[Operating_systems#Lecturer|lecturer]] when the article is finished&lt;br /&gt;
*Receive feedback for corrections&lt;br /&gt;
&lt;br /&gt;
=Requirements for the wiki article=&lt;br /&gt;
Author: name, group and date when the article is written&lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Covers points what will be discussed in the article, what are the requirements for the article reader; what are the operating system’s requirements. &lt;br /&gt;
&lt;br /&gt;
==Contents==&lt;br /&gt;
All commands should be easily separable from the overall text. &lt;br /&gt;
Users should be able to copy the commands directly (additional info like prompt and user distinction symbols should be left out from the command description area)&lt;br /&gt;
The text should determine what user permissions are needed to perform these tasks. &lt;br /&gt;
The reader of your article is your fellow students, so try to avoid irrelevant information and stay on topic (don’t explain the meaning of IP address or how to install Ubuntu, when your topic is actually about htop)&lt;br /&gt;
All the content should be referenced. &lt;br /&gt;
Do not use slang and try to be grammatically correct.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; &lt;br /&gt;
Bear in mind that this is an open environment, so everything you write in your wiki article, will be public. &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Referencing==&lt;br /&gt;
Best practises of wiki referencing should be used. &lt;br /&gt;
Terms are but between square brackets to reference other articles in the system.&lt;br /&gt;
All drawing and images have to be referenced below the picture and in the text. (for example “System architecture can be viewed on image x, y and z.”)&lt;br /&gt;
Author’s own ideas have to be clearly presentable. Everything used from the sources have to be referenced. &lt;br /&gt;
&lt;br /&gt;
==Fellow student review==&lt;br /&gt;
Please find a fellow student who will review your article and give a feedback on the discussion tab of the article using [http://enos.itcollege.ee/~edmund/materials/viki-artikkel/Assessment-model-for-the-wiki-article.html the following assessment model].&lt;br /&gt;
&lt;br /&gt;
==Summary==&lt;br /&gt;
Besides a short overview, what was discussed in this article, it should also include the author&#039;s own opinion about the topic. &lt;br /&gt;
&lt;br /&gt;
==Category==&lt;br /&gt;
Add the following category to the end of the article (last row):&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=Chosen topics=&lt;br /&gt;
Please write here your topic and name, group:&lt;br /&gt;
* &#039;&#039;&#039;Basic Automation with Python&#039;&#039;&#039;; Ardi Vaba; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;SSH Encryption&#039;&#039;&#039;; Frank Korving; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;Translation of OSadmin wiki help page to English [[https://wiki.itcollege.ee/index.php/Osadmin_spikker]]&#039;&#039;&#039;; Peep Kuulme; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;XSS Attack Vectors&#039;&#039;&#039;; Masaki Ihara; CSE-11&lt;br /&gt;
*[https://wiki.itcollege.ee/index.php/Auditd &#039;&#039;&#039;Auditd - Linux system monitoring with audit daemon&#039;&#039;&#039;], Nika Ptskialadze, CSE-11&lt;br /&gt;
* &#039;&#039;&#039;GNU Privacy Guard (GnuPG)&#039;&#039;&#039;; Patricia Bruno Barbosa; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;BackBox OS&#039;&#039;&#039;; Ats Tootsi; CSE-11&lt;br /&gt;
*[https://wiki.itcollege.ee/index.php/creating_malware_lab &#039;&#039;&#039;How to create your own malware analysis lab&#039;&#039;&#039;], Mikus, CSE-11&lt;br /&gt;
*&#039;&#039;&#039;&#039;Arch Linux&#039;&#039;&#039;&#039;;Farhan Nayeem Islam;CSE-C11&lt;br /&gt;
* &#039;&#039;&#039;&#039;VPN basics&#039;&#039;&#039;&#039;, Christian Cataldo, CSE-C11; [https://wiki.itcollege.ee/index.php/VPN_(English_version)]&lt;br /&gt;
* &#039;&#039;Translation of DDoS Wiki page[[https://wiki.itcollege.ee/index.php/DDoS_Eng]]&#039;&#039;&#039;; Andris Männik; CSE-11&lt;br /&gt;
==Ideas==&lt;br /&gt;
* UNIX CLI password manager https://www.passwordstore.org and its GUI http://qtpass.org/&lt;br /&gt;
&lt;br /&gt;
=References=&lt;br /&gt;
* [https://wiki.itcollege.ee/index.php/Osadmin_referaadi_teemad counterpart article in Estonian]&lt;br /&gt;
* http://manpage.io&lt;br /&gt;
* https://linuxjourney.com/&lt;br /&gt;
* [https://linux.die.net/man/ Linux man-pages]&lt;br /&gt;
* [https://linux.die.net Linux docs]&lt;br /&gt;
* http://www.tecmint.com/60-commands-of-linux-a-guide-from-newbies-to-system-administrator/&lt;br /&gt;
* http://www.tecmint.com/useful-linux-commands-for-system-administrators/&lt;br /&gt;
* http://www.cyberciti.biz/tips/top-linux-monitoring-tools.html&lt;br /&gt;
* http://www.thegeekstuff.com/2010/12/50-unix-linux-sysadmin-tutorials&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Amannik</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=120004</id>
		<title>OSadmin wiki article</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=120004"/>
		<updated>2017-04-10T09:35:11Z</updated>

		<summary type="html">&lt;p&gt;Amannik: /* Chosen topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Intro=&lt;br /&gt;
*Choose a topic from personal experience related with the subject or from topics found on the wiki page&lt;br /&gt;
*[[#Chosen_topics|Write the topic here]].&lt;br /&gt;
*Lecturer will confirm the topic&lt;br /&gt;
*Write your article in wiki environment &lt;br /&gt;
*Inform the [[Operating_systems#Lecturer|lecturer]] when the article is finished&lt;br /&gt;
*Receive feedback for corrections&lt;br /&gt;
&lt;br /&gt;
=Requirements for the wiki article=&lt;br /&gt;
Author: name, group and date when the article is written&lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Covers points what will be discussed in the article, what are the requirements for the article reader; what are the operating system’s requirements. &lt;br /&gt;
&lt;br /&gt;
==Contents==&lt;br /&gt;
All commands should be easily separable from the overall text. &lt;br /&gt;
Users should be able to copy the commands directly (additional info like prompt and user distinction symbols should be left out from the command description area)&lt;br /&gt;
The text should determine what user permissions are needed to perform these tasks. &lt;br /&gt;
The reader of your article is your fellow students, so try to avoid irrelevant information and stay on topic (don’t explain the meaning of IP address or how to install Ubuntu, when your topic is actually about htop)&lt;br /&gt;
All the content should be referenced. &lt;br /&gt;
Do not use slang and try to be grammatically correct.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; &lt;br /&gt;
Bear in mind that this is an open environment, so everything you write in your wiki article, will be public. &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Referencing==&lt;br /&gt;
Best practises of wiki referencing should be used. &lt;br /&gt;
Terms are but between square brackets to reference other articles in the system.&lt;br /&gt;
All drawing and images have to be referenced below the picture and in the text. (for example “System architecture can be viewed on image x, y and z.”)&lt;br /&gt;
Author’s own ideas have to be clearly presentable. Everything used from the sources have to be referenced. &lt;br /&gt;
&lt;br /&gt;
==Fellow student review==&lt;br /&gt;
Please find a fellow student who will review your article and give a feedback on the discussion tab of the article using [http://enos.itcollege.ee/~edmund/materials/viki-artikkel/Assessment-model-for-the-wiki-article.html the following assessment model].&lt;br /&gt;
&lt;br /&gt;
==Summary==&lt;br /&gt;
Besides a short overview, what was discussed in this article, it should also include the author&#039;s own opinion about the topic. &lt;br /&gt;
&lt;br /&gt;
==Category==&lt;br /&gt;
Add the following category to the end of the article (last row):&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=Chosen topics=&lt;br /&gt;
Please write here your topic and name, group:&lt;br /&gt;
* &#039;&#039;&#039;Basic Automation with Python&#039;&#039;&#039;; Ardi Vaba; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;SSH Encryption&#039;&#039;&#039;; Frank Korving; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;Translation of OSadmin wiki help page to English [[https://wiki.itcollege.ee/index.php/Osadmin_spikker]]&#039;&#039;&#039;; Peep Kuulme; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;XSS Attack Vectors&#039;&#039;&#039;; Masaki Ihara; CSE-11&lt;br /&gt;
*[https://wiki.itcollege.ee/index.php/Auditd &#039;&#039;&#039;Auditd - Linux system monitoring with audit daemon&#039;&#039;&#039;], Nika Ptskialadze, CSE-11&lt;br /&gt;
* &#039;&#039;&#039;GNU Privacy Guard (GnuPG)&#039;&#039;&#039;; Patricia Bruno Barbosa; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;BackBox OS&#039;&#039;&#039;; Ats Tootsi; CSE-11&lt;br /&gt;
*[https://wiki.itcollege.ee/index.php/creating_malware_lab &#039;&#039;&#039;How to create your own malware analysis lab&#039;&#039;&#039;], Mikus, CSE-11&lt;br /&gt;
*&#039;&#039;&#039;&#039;Arch Linux&#039;&#039;&#039;&#039;;Farhan Nayeem Islam;CSE-C11&lt;br /&gt;
* &#039;&#039;&#039;&#039;VPN basics&#039;&#039;&#039;&#039;, Christian Cataldo, CSE-C11; [https://wiki.itcollege.ee/index.php/VPN_(English_version)]&lt;br /&gt;
* &#039;&#039;BASH_shell Translation[[https://wiki.itcollege.ee/index.php/BASH_shell]]&#039;&#039;&#039;; Andris Männik; CSE-11&lt;br /&gt;
==Ideas==&lt;br /&gt;
* UNIX CLI password manager https://www.passwordstore.org and its GUI http://qtpass.org/&lt;br /&gt;
&lt;br /&gt;
=References=&lt;br /&gt;
* [https://wiki.itcollege.ee/index.php/Osadmin_referaadi_teemad counterpart article in Estonian]&lt;br /&gt;
* http://manpage.io&lt;br /&gt;
* https://linuxjourney.com/&lt;br /&gt;
* [https://linux.die.net/man/ Linux man-pages]&lt;br /&gt;
* [https://linux.die.net Linux docs]&lt;br /&gt;
* http://www.tecmint.com/60-commands-of-linux-a-guide-from-newbies-to-system-administrator/&lt;br /&gt;
* http://www.tecmint.com/useful-linux-commands-for-system-administrators/&lt;br /&gt;
* http://www.cyberciti.biz/tips/top-linux-monitoring-tools.html&lt;br /&gt;
* http://www.thegeekstuff.com/2010/12/50-unix-linux-sysadmin-tutorials&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Amannik</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=119995</id>
		<title>OSadmin wiki article</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=119995"/>
		<updated>2017-04-09T18:52:46Z</updated>

		<summary type="html">&lt;p&gt;Amannik: /* Chosen topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Intro=&lt;br /&gt;
*Choose a topic from personal experience related with the subject or from topics found on the wiki page&lt;br /&gt;
*[[#Chosen_topics|Write the topic here]].&lt;br /&gt;
*Lecturer will confirm the topic&lt;br /&gt;
*Write your article in wiki environment &lt;br /&gt;
*Inform the [[Operating_systems#Lecturer|lecturer]] when the article is finished&lt;br /&gt;
*Receive feedback for corrections&lt;br /&gt;
&lt;br /&gt;
=Requirements for the wiki article=&lt;br /&gt;
Author: name, group and date when the article is written&lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Covers points what will be discussed in the article, what are the requirements for the article reader; what are the operating system’s requirements. &lt;br /&gt;
&lt;br /&gt;
==Contents==&lt;br /&gt;
All commands should be easily separable from the overall text. &lt;br /&gt;
Users should be able to copy the commands directly (additional info like prompt and user distinction symbols should be left out from the command description area)&lt;br /&gt;
The text should determine what user permissions are needed to perform these tasks. &lt;br /&gt;
The reader of your article is your fellow students, so try to avoid irrelevant information and stay on topic (don’t explain the meaning of IP address or how to install Ubuntu, when your topic is actually about htop)&lt;br /&gt;
All the content should be referenced. &lt;br /&gt;
Do not use slang and try to be grammatically correct.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; &lt;br /&gt;
Bear in mind that this is an open environment, so everything you write in your wiki article, will be public. &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Referencing==&lt;br /&gt;
Best practises of wiki referencing should be used. &lt;br /&gt;
Terms are but between square brackets to reference other articles in the system.&lt;br /&gt;
All drawing and images have to be referenced below the picture and in the text. (for example “System architecture can be viewed on image x, y and z.”)&lt;br /&gt;
Author’s own ideas have to be clearly presentable. Everything used from the sources have to be referenced. &lt;br /&gt;
&lt;br /&gt;
==Fellow student review==&lt;br /&gt;
Please find a fellow student who will review your article and give a feedback on the discussion tab of the article using [http://enos.itcollege.ee/~edmund/materials/viki-artikkel/Assessment-model-for-the-wiki-article.html the following assessment model].&lt;br /&gt;
&lt;br /&gt;
==Summary==&lt;br /&gt;
Besides a short overview, what was discussed in this article, it should also include the author&#039;s own opinion about the topic. &lt;br /&gt;
&lt;br /&gt;
==Category==&lt;br /&gt;
Add the following category to the end of the article (last row):&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=Chosen topics=&lt;br /&gt;
Please write here your topic and name, group:&lt;br /&gt;
* &#039;&#039;&#039;Basic Automation with Python&#039;&#039;&#039;; Ardi Vaba; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;SSH Encryption&#039;&#039;&#039;; Frank Korving; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;Translation of OSadmin wiki help page to English [[https://wiki.itcollege.ee/index.php/Osadmin_spikker]]&#039;&#039;&#039;; Peep Kuulme; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;XSS Attack Vectors&#039;&#039;&#039;; Masaki Ihara; CSE-11&lt;br /&gt;
*[https://wiki.itcollege.ee/index.php/Auditd &#039;&#039;&#039;Auditd - Linux system monitoring with audit daemon&#039;&#039;&#039;], Nika Ptskialadze, CSE-11&lt;br /&gt;
* &#039;&#039;&#039;GNU Privacy Guard (GnuPG)&#039;&#039;&#039;; Patricia Bruno Barbosa; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;BackBox OS&#039;&#039;&#039;; Ats Tootsi; CSE-11&lt;br /&gt;
*[https://wiki.itcollege.ee/index.php/creating_malware_lab &#039;&#039;&#039;How to create your own malware analysis lab&#039;&#039;&#039;], Mikus, CSE-11&lt;br /&gt;
*&#039;&#039;&#039;&#039;Arch Linux&#039;&#039;&#039;&#039;;Farhan Nayeem Islam;CSE-C11&lt;br /&gt;
* &#039;&#039;&#039;VPN basics&#039;&#039;&#039;; Christian Cataldo; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;Virtual memory[[https://wiki.itcollege.ee/index.php/Virtual Memory]]&#039;&#039;&#039;; Andris Männik; CSE-11&lt;br /&gt;
==Ideas==&lt;br /&gt;
* UNIX CLI password manager https://www.passwordstore.org and its GUI http://qtpass.org/&lt;br /&gt;
&lt;br /&gt;
=References=&lt;br /&gt;
* [https://wiki.itcollege.ee/index.php/Osadmin_referaadi_teemad counterpart article in Estonian]&lt;br /&gt;
* http://manpage.io&lt;br /&gt;
* https://linuxjourney.com/&lt;br /&gt;
* [https://linux.die.net/man/ Linux man-pages]&lt;br /&gt;
* [https://linux.die.net Linux docs]&lt;br /&gt;
* http://www.tecmint.com/60-commands-of-linux-a-guide-from-newbies-to-system-administrator/&lt;br /&gt;
* http://www.tecmint.com/useful-linux-commands-for-system-administrators/&lt;br /&gt;
* http://www.cyberciti.biz/tips/top-linux-monitoring-tools.html&lt;br /&gt;
* http://www.thegeekstuff.com/2010/12/50-unix-linux-sysadmin-tutorials&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Amannik</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=119994</id>
		<title>OSadmin wiki article</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=OSadmin_wiki_article&amp;diff=119994"/>
		<updated>2017-04-09T18:51:55Z</updated>

		<summary type="html">&lt;p&gt;Amannik: /* Chosen topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Intro=&lt;br /&gt;
*Choose a topic from personal experience related with the subject or from topics found on the wiki page&lt;br /&gt;
*[[#Chosen_topics|Write the topic here]].&lt;br /&gt;
*Lecturer will confirm the topic&lt;br /&gt;
*Write your article in wiki environment &lt;br /&gt;
*Inform the [[Operating_systems#Lecturer|lecturer]] when the article is finished&lt;br /&gt;
*Receive feedback for corrections&lt;br /&gt;
&lt;br /&gt;
=Requirements for the wiki article=&lt;br /&gt;
Author: name, group and date when the article is written&lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Covers points what will be discussed in the article, what are the requirements for the article reader; what are the operating system’s requirements. &lt;br /&gt;
&lt;br /&gt;
==Contents==&lt;br /&gt;
All commands should be easily separable from the overall text. &lt;br /&gt;
Users should be able to copy the commands directly (additional info like prompt and user distinction symbols should be left out from the command description area)&lt;br /&gt;
The text should determine what user permissions are needed to perform these tasks. &lt;br /&gt;
The reader of your article is your fellow students, so try to avoid irrelevant information and stay on topic (don’t explain the meaning of IP address or how to install Ubuntu, when your topic is actually about htop)&lt;br /&gt;
All the content should be referenced. &lt;br /&gt;
Do not use slang and try to be grammatically correct.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; &lt;br /&gt;
Bear in mind that this is an open environment, so everything you write in your wiki article, will be public. &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Referencing==&lt;br /&gt;
Best practises of wiki referencing should be used. &lt;br /&gt;
Terms are but between square brackets to reference other articles in the system.&lt;br /&gt;
All drawing and images have to be referenced below the picture and in the text. (for example “System architecture can be viewed on image x, y and z.”)&lt;br /&gt;
Author’s own ideas have to be clearly presentable. Everything used from the sources have to be referenced. &lt;br /&gt;
&lt;br /&gt;
==Fellow student review==&lt;br /&gt;
Please find a fellow student who will review your article and give a feedback on the discussion tab of the article using [http://enos.itcollege.ee/~edmund/materials/viki-artikkel/Assessment-model-for-the-wiki-article.html the following assessment model].&lt;br /&gt;
&lt;br /&gt;
==Summary==&lt;br /&gt;
Besides a short overview, what was discussed in this article, it should also include the author&#039;s own opinion about the topic. &lt;br /&gt;
&lt;br /&gt;
==Category==&lt;br /&gt;
Add the following category to the end of the article (last row):&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=Chosen topics=&lt;br /&gt;
Please write here your topic and name, group:&lt;br /&gt;
* &#039;&#039;&#039;Basic Automation with Python&#039;&#039;&#039;; Ardi Vaba; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;SSH Encryption&#039;&#039;&#039;; Frank Korving; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;Translation of OSadmin wiki help page to English [[https://wiki.itcollege.ee/index.php/Osadmin_spikker]]&#039;&#039;&#039;; Peep Kuulme; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;XSS Attack Vectors&#039;&#039;&#039;; Masaki Ihara; CSE-11&lt;br /&gt;
*[https://wiki.itcollege.ee/index.php/Auditd &#039;&#039;&#039;Auditd - Linux system monitoring with audit daemon&#039;&#039;&#039;], Nika Ptskialadze, CSE-11&lt;br /&gt;
* &#039;&#039;&#039;GNU Privacy Guard (GnuPG)&#039;&#039;&#039;; Patricia Bruno Barbosa; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;BackBox OS&#039;&#039;&#039;; Ats Tootsi; CSE-11&lt;br /&gt;
*[https://wiki.itcollege.ee/index.php/creating_malware_lab &#039;&#039;&#039;How to create your own malware analysis lab&#039;&#039;&#039;], Mikus, CSE-11&lt;br /&gt;
*&#039;&#039;&#039;&#039;Arch Linux&#039;&#039;&#039;&#039;;Farhan Nayeem Islam;CSE-C11&lt;br /&gt;
* &#039;&#039;&#039;VPN basics&#039;&#039;&#039;; Christian Cataldo; CSE-11&lt;br /&gt;
* &#039;&#039;&#039;Address space layout randomization (ASLR)[[https://wiki.itcollege.ee/index.php/ASLR]]&#039;&#039;&#039;; Andris Männik; CSE-11&lt;br /&gt;
==Ideas==&lt;br /&gt;
* UNIX CLI password manager https://www.passwordstore.org and its GUI http://qtpass.org/&lt;br /&gt;
&lt;br /&gt;
=References=&lt;br /&gt;
* [https://wiki.itcollege.ee/index.php/Osadmin_referaadi_teemad counterpart article in Estonian]&lt;br /&gt;
* http://manpage.io&lt;br /&gt;
* https://linuxjourney.com/&lt;br /&gt;
* [https://linux.die.net/man/ Linux man-pages]&lt;br /&gt;
* [https://linux.die.net Linux docs]&lt;br /&gt;
* http://www.tecmint.com/60-commands-of-linux-a-guide-from-newbies-to-system-administrator/&lt;br /&gt;
* http://www.tecmint.com/useful-linux-commands-for-system-administrators/&lt;br /&gt;
* http://www.cyberciti.biz/tips/top-linux-monitoring-tools.html&lt;br /&gt;
* http://www.thegeekstuff.com/2010/12/50-unix-linux-sysadmin-tutorials&lt;br /&gt;
&lt;br /&gt;
[[Category:Operatsioonisüsteemide administreerimine ja sidumine]]&lt;/div&gt;</summary>
		<author><name>Amannik</name></author>
	</entry>
</feed>