Skip to the content
Tech Portfolio

Rhia Dimapelis

  • Home
  • About Me
  • Cybersecurity
    • CYSE200T
      • (1) What makes cybersecurity interesting?
      • (2) Majors offered by ODU and how these majors relate to cybersecurity.
      • (3) Four ethical issues that arise when storing electronic information about individuals
      • (4) Cybersecurity risks in the U.S. and other countries.
      • (5) Legal ways to make money in cybersecurity
      • (6) How has cybersecurity technology created workplace deviance?
      • (7) What are the costs and benefits of developing cybersecurity programs in business?
      • (8) How can you tell if your computer is safe?
      • (9) Three ways that computers have made the world safer and less safe
      • (10) How do engineers make cyber networks safer?
      • (11) What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
      • (12) How does cyber technology impact interactions between offenders and victims?
      • (13) How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
    • CYSE270
      • (6) File Permissions
      • (7) Storage Management
      • (8) Shell Script
      • (10) Networking Basics
      • (11) Basic Network Configuration
      • (12) Advance Networking
      • (13) System Admin
  • Contact
  • Home
  • About Me
  • Cybersecurity
    • CYSE200T
      • (1) What makes cybersecurity interesting?
      • (2) Majors offered by ODU and how these majors relate to cybersecurity.
      • (3) Four ethical issues that arise when storing electronic information about individuals
      • (4) Cybersecurity risks in the U.S. and other countries.
      • (5) Legal ways to make money in cybersecurity
      • (6) How has cybersecurity technology created workplace deviance?
      • (7) What are the costs and benefits of developing cybersecurity programs in business?
      • (8) How can you tell if your computer is safe?
      • (9) Three ways that computers have made the world safer and less safe
      • (10) How do engineers make cyber networks safer?
      • (11) What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
      • (12) How does cyber technology impact interactions between offenders and victims?
      • (13) How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
    • CYSE270
      • (6) File Permissions
      • (7) Storage Management
      • (8) Shell Script
      • (10) Networking Basics
      • (11) Basic Network Configuration
      • (12) Advance Networking
      • (13) System Admin
  • Contact

(13) System Admin

Dimapelis-CYSE270-Assignment-13Download

rdima002

Author archive

December 8, 2023

Uncategorized

Previous post

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

PERSONAL IMAGE

Put either a picture or an image representative of yourself here.

BIOGRAPHY

Please write a brief, two-to-three sentence biography here.

Meta

  • Log in
  • Entries RSS
  • Comments RSS
  • Old Dominion University WordPress

Social Media

Facebooktwitterlinkedinrssyoutube

© 2026 Tech Portfolio — Powered by WordPress

Theme by Anders Noren — Up ↑

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept