Skip to main content

Understanding Linux for 312-38: Network Security Administrator Exam

This is a guest article by Shubra Sinha about Understanding Linux for 312-38: Network Security Administrator Exam. Linux, a free Unix-type operating system, was created in 1991 by Linus Torvalds, a student at the University of Helsinki. He started Linux by writing a kernel, which is the heart of the operating system. He created Linux with the assistance of developers around the world.

Linux has been released under GNU General Public License and its source code is available to everyone without any cost. Therefore, anyone can work on it, change it, or enhance it. Many companies and individuals have released their own versions of operating systems based on the Linux kernel. Basic services and device drivers used by all other programs are provided by the Linux kernel.

Some features of Linux are as follows:

  • Multi-user
  • Multitasking
  • Graphical User Interface (GUI)
  • Hardware support
  • Networking connectivity
  • Network servers
  • Application support

Advantages of using the Linux operating system:

Following are the advantages of using the Linux operating system:

Cost and performance:

The Linux is free, so there is no need to pay for it, and it comes with all applications. Linux has a good speed and is almost free from viruses.


The Linux operating system does not require heavy resources as compared to Windows operating systems.


Linux is more secure than Windows operating systems. In 2009, the Windows operating system was affected by 48000 viruses, whereas Linux was affected by only 40.

No Need of Defragmentation:

Linux uses different file systems, which do not require defragmentation.

Built-in Utilities:

Linux comes with dozens of utilities and software, which include games, messengers, photo managers, office automation software, CD burners, PDF applications, etc.

Loopholes in Linux Security

Following are the possible security loopholes in the Linux operating system:

  • Weak and Default Passwords: The first main reason of Linux hacking is using weak and default passwords. Users always choose a password that is easy to remember, but they often forget that it may be easy to crack.

Some examples of good passwords are as follows:

Password How to Remember it

Mrci5yo : My rusty computer is 5 years old.
Itmp?pri : Is this my pen? Please return it.

  • Open Network Ports: The open network ports are free invitations for malicious hackers. This is one of the major reasons of Linux hacking.
  • Old Software Versions: It is also one of the possible reasons of Linux hacking. It may be possible that an older version of the software has some vulnerability that can be easily exploited.
  • Insecure and Badly Configured Programs: All programs should be configured properly. Insecure and unverified programs may have a vulnerability that can be easily exploited.
  • Stale and Unnecessary Programs: As long as there are layoffs and employee terminations, there will be a need to erase any access that the employee had.
  • Server Ignorance: Check the Linux servers for any security hole and vulnerability regularly, otherwise this may become a cause of an attack.

uCertify 312-38 PrepKit:

You can pass the Network Security Administrator Exam by studying from uCertify PrepKit. If you do not pass in first attempt your money will be refunded. 312-38 PrepKit has:

  • 309 questions with full explanations
  • Chapter by Chapter Study Guide
  • Interactive quizzes and Study Notes
  • Test History and Performance Review
  • Interactive Software. etc

For trail you can download free practice questions from here:


Popular posts from this blog

List Of Common Flowers in Kerala With Pictures

Kerala is one of the famous tourist spot situated on the south of India famous for its numerous wild life and thick vegetation. Like the Himalayan ranges on the north of India,

AMOLED display coming to Samsung Galaxy Tab range

This is a guest post by Erica about the arrival of AMOLED display to Samsung Galaxy Tab range.Samsung could be transplanting a seven inch AMOLED screen into an upcoming addition to its Galaxy Tab range of tablet computers.

You may have experienced an AMOLED display in a small portable device before as Samsung, Nokia and HTC have all used them in smartphones to date. However, the expense of producing AMOLED screens has prohibited them from appearing on larger devices like tablets, until now.

The seven inch Galaxy Tab was launched last year but an update with an AMOLED screen would be most welcome, cutting energy consumption and improving colours and contrast ratios across the board.

The rumours about this device state that it will run Android 3.0, feature a three megapixel camera on the rear, a two megapixel snapper on the front and have a display resolution of 1024x600 which is not bad for a device of this size.

The hardware powering the new Galaxy Tab will consist of a 1.2GHz processor w…

Building Blocks for Virtual Businesses : Key technological systems you must have to succeed in the remote business world

This is a guest post by Ripley Daniels about "Key technological systems you must have to succeed in the remote business world.

Whenever I tell friends I had a tough day at the office, they laugh at me. That's because they know I don't really have an office. I work very hard but I work for a company that is completely remote. Only a few of my co-workers ever go into an office at all and when they do, it's only for short periods of time. Our "office" is a virtual one. To us, the traditional office workplace is a thing of the past, alongside Tyrannosaurus Rex, the slide rule, and telephones where you stick your finger in a hole and turn a dial.
Unfortunately, none of this prevents me from having tough days. I still have them. But the reasons have nothing to do with the fact that my co-workers and I don't have a brick and mortar edifice that we can use to plan, strategize, hold our meetings, make presentations, discuss sensitive business topics, build relatio…