Computer Security & Management
Across
- 4. System that dynamically manages device files
- 5. Technique that maps private IPs to a public IP
- 8. Bootloader that loads the Linux kernel
- 10. Signal that cannot be caught or ignored
- 11. Remote source of software packages
- 13. File that defines which users can run commands as root
- 16. Central system logging service
- 19. Filesystem technique that logs changes before writing to disk to prevent corruption
- 21. Data structure that stores file metadata
- 24. Technique of hiding data within another file
Down
- 1. Software that interfaces between OS and hardware
- 2. Directory permission restricting file deletion to owner
- 3. Process that has finished but remains in process table
- 5. Value that determines process scheduling priority
- 6. Structure that organizes and stores files on disk
- 7. Device type that reads/writes data in chunks
- 9. Command used to detach a filesystem
- 10. Encryption using a shared key
- 12. Init system with PID 1 that manages services
- 14. File storing encrypted user passwords
- 15. Tool used to install local .deb packages
- 17. System call that creates a new process
- 18. US law expanding surveillance and intelligence powers
- 20. Core of the OS that manages hardware and processes
- 22. Background process running without user interaction
- 23. Command used to change file ownership