The Scrambled Penguin

123456789101112131415161718192021222324
Across
  1. 4. bit On regular files, it is ignored; on a directory, prevents deletion or renaming unless the owner of directory, file, or superuser
  2. 5. Denial of service attack, a process continually replicates and overloads the entire system
  3. 10. Direct reference or copy of the original file, allows for easy accessibility, secure backup, and data persistence
  4. 13. See process running on the system, in realtime
  5. 14. Pseudo filesystem that contains information about the system state
  6. 17. Allows permitted users to execute a command with elevated privileges, for a temporary amount of time
  7. 19. Method of hiding data in another media type so that the existence of the data is concealed
  8. 20. Key Cryptography where sender and receiver shares a common key to encrypt and decrypt
  9. 22. Remote login protocol that secures network services on insecure network
  10. 23. Archives, compresses, deletes log files to manage disk space and improve performance
  11. 24. Mnemonic form to add, change, or remove directory permissions
Down
  1. 1. Essential commands used by the system, specifically root only, maintaining system integrity
  2. 2. Hardware or software that prevents unwanted packets from accessing network and systems
  3. 3. Prevents data inconsistencies, performs fast checks, prevent corrupting by writing data twice
  4. 6. Kernel error causing the computer to reboot
  5. 7. An acronym for a program that blocks spam software from posting comments on pages
  6. 8. A kernel background process that starts automatically after booting, has low PID numbers
  7. 9. Stores encrypted user password hashes and policies, protects against unauthorized access, readable to the superuser
  8. 11. Device manager that detects and configures devices automatically, created everytime at time of machine boot.
  9. 12. Kernel, not a complete operating system
  10. 15. Authentication framework, wrapper for different libraries
  11. 16. High level package management, is a wrapper, very powerful
  12. 18. We are different people, but still interconnected
  13. 21. Account with administrative, utmost control, and highest privileges