Skip to main content

System Setup

  • Chapter
  • First Online:
Cyber Operations
  • 2521 Accesses

Abstract

Cyber operations is about the configuration, defense, and attack of real systems. This text focuses on systems that were deployed between 2011 and 2017.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The Notes and References section at the end of the chapter provides links to locations containing installation discs for CentOS, Kali, Mint, Ubuntu, and OpenSuSE as well as to evaluation copies of Microsoft operating systems.

  2. 2.

    Systems kept in their initial state without any security patches are quite insecure; they should not be exposed on the Internet.

  3. 3.

    http://docs.kali.org/general-use/install-vmware-tools-kali-guest

  4. 4.

    The precise version depends on the version of VirtualBox.

  5. 5.

    The precise path to the CD varies with the user. In the example, it is in /run/media/egalois, because the user that mounted the CD was egalois.

  6. 6.

    http://docs.kali.org/general-use/kali-linux-virtual-box-guest

  7. 7.

    Registration is required to download.

  8. 8.

    This may function poorly on older unsupported versions of Java.

  9. 9.

    This may function poorly on older and now unsupported versions of Flash Player.

  10. 10.

    https://www.java.com/en/download/faq/win10_faq.xml

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Mike O'Leary

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

O’Leary, M. (2019). System Setup. In: Cyber Operations. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4294-0_1

Download citation

Publish with us

Policies and ethics