Post on the blog to explain to the class how your methodology works.

Cyber Security part 1 section 1 Research and explain your topic (pick one from below) as it relates to Unix File System: Boot Blocks Superblock Cylinder Group Inode/vnode Hard Link Symbolic Link/Symlink Create a poster to explain to the class. Include diagrams and text as needed. section 2 Password cracking is used for both criminal […]