Abstract
Cyber operations is about the configuration, defense, and attack of real systems. This text focuses on systems that were deployed between 2011 and 2017.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The Notes and References section at the end of the chapter provides links to locations containing installation discs for CentOS, Kali, Mint, Ubuntu, and OpenSuSE as well as to evaluation copies of Microsoft operating systems.
- 2.
Systems kept in their initial state without any security patches are quite insecure; they should not be exposed on the Internet.
- 3.
- 4.
The precise version depends on the version of VirtualBox.
- 5.
The precise path to the CD varies with the user. In the example, it is in /run/media/egalois, because the user that mounted the CD was egalois.
- 6.
- 7.
Registration is required to download.
- 8.
This may function poorly on older unsupported versions of Java.
- 9.
This may function poorly on older and now unsupported versions of Flash Player.
- 10.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Mike O'Leary
About this chapter
Cite this chapter
O’Leary, M. (2019). System Setup. In: Cyber Operations. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4294-0_1
Download citation
DOI: https://doi.org/10.1007/978-1-4842-4294-0_1
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-4293-3
Online ISBN: 978-1-4842-4294-0
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books