User talk:Ebarrier: Difference between revisions

From ICO wiki
Jump to navigationJump to search
Ebarrier (talk | contribs)
No edit summary
Ebarrier (talk | contribs)
No edit summary
Line 1: Line 1:
==Operating systems basic terms and introduction==
==Operating systems basic terms and introduction==
Tasks of the kernel, operating system, RAM, processor etc
===Tasks of the kernel, operating system, RAM, processor etc===
==User management==
==User management==
What is authorization and authentication?  
===What is authorization and authentication?===
What is password salt and what is it used for?
===What is password salt and what is it used for?===
==Wiki article topic==
==Working with files and permissions==
==Working with files and permissions==
Explain the way why permissions are needed and how they are set for users.
===Explain the way why permissions are needed and how they are set for users===
Explain special permissions.
===Explain special permissions===
==User environment==
==User environment==
What are user environment variables used for? Name two reasons.
===What are user environment variables used for? Name two reasons===
==Processes==
==Processes==
How to stream data between processes.
===How to stream data between processes===
What are different type of processes (running, stopped, killed, zombie etc)
===What are different type of processes (running, stopped, killed, zombie etc)===
Different examples of how to benefit from sending signals between processes.
===Different examples of how to benefit from sending signals between processes===
==Software management==
==Software management==
Name various ways how to manage software in LInux.
===Name various ways how to manage software in LInux===
What are the pros and cons of Linux software management.
===What are the pros and cons of Linux software management===
What are software repositories?
===What are software repositories?===
What are libraries?
===What are libraries?===
==Filesystem hierarchy==
==Filesystem hierarchy==
Explain the hierarchy according to FHS.
===Explain the hierarchy according to FHS===
Name specific folder meanings and usage.
===Name specific folder meanings and usage===
==Documentation==
==Documentation==
Best practices of a good documentation.
===Best practices of a good documentation===
Why should we document?
===Why should we document?===
==Security==
==Security==
List the different type of security breaches.
===List the different type of security breaches===
What should the user/admin do to prevent the attack?  
===What should the user/admin do to prevent the attack?===
==Partitioning and swap area==
==Partitioning and swap area==
What are the primary, extended and logical partitions? What limitations are set with these partitions types?  
===What are the primary, extended and logical partitions? What limitations are set with these partitions types?===
When isn’t it a good idea to use swap area?
===When isn’t it a good idea to use swap area?===
==RAID and LVM technologies==
==RAID and LVM technologies==
Name main uses and features of both technologies.
===Name main uses and features of both technologies===
==SAN, NAS and CAS technologies==
==SAN, NAS and CAS technologies==
Name main uses and features of all the technologies.
===Name main uses and features of all the technologies===
==Backup and recovery==
==Backup and recovery==
Backup and recovery plans
===Backup and recovery plans===
==Monitoring and log files==
==Monitoring and log files==
Active and passive monitoring
===Active and passive monitoring===
Types of alerts
===Types of alerts===
Benefits of monitoring
===Benefits of monitoring===
Centralized logs
===Centralized logs===
==Ethical, social and personal aspects of working in IT field==
==Ethical, social and personal aspects of working in IT field==
Impostor syndrome, teamwork, burnout
===Impostor syndrome, teamwork, burnout===
Wiki article topic

Revision as of 16:20, 6 June 2016

Operating systems basic terms and introduction

Tasks of the kernel, operating system, RAM, processor etc

User management

What is authorization and authentication?

What is password salt and what is it used for?

Working with files and permissions

Explain the way why permissions are needed and how they are set for users

Explain special permissions

User environment

What are user environment variables used for? Name two reasons

Processes

How to stream data between processes

What are different type of processes (running, stopped, killed, zombie etc)

Different examples of how to benefit from sending signals between processes

Software management

Name various ways how to manage software in LInux

What are the pros and cons of Linux software management

What are software repositories?

What are libraries?

Filesystem hierarchy

Explain the hierarchy according to FHS

Name specific folder meanings and usage

Documentation

Best practices of a good documentation

Why should we document?

Security

List the different type of security breaches

What should the user/admin do to prevent the attack?

Partitioning and swap area

What are the primary, extended and logical partitions? What limitations are set with these partitions types?

When isn’t it a good idea to use swap area?

RAID and LVM technologies

Name main uses and features of both technologies

SAN, NAS and CAS technologies

Name main uses and features of all the technologies

Backup and recovery

Backup and recovery plans

Monitoring and log files

Active and passive monitoring

Types of alerts

Benefits of monitoring

Centralized logs

Ethical, social and personal aspects of working in IT field

Impostor syndrome, teamwork, burnout