Automating System Administration with Perl

Size: px
Start display at page:

Download "Automating System Administration with Perl"

Transcription

1 O'REILLY Beijing Cambridge Farnham Köln Sebastopol Taipei Tokyo SECOND EDITION Automating System Administration with Perl David N. Blank-Edelman

2 Table of Contents Preface xv 1. Introduction 1 Automation Is a Must 1 How Perl Can Help You 2 This Book Will Show You How 3 What You Need 5 Some Notes About the Perl Versions Used for This Book 6 What About Perl 5.10? 6 What About Strawberry Perl? 6 What About Perl 6? 6 Some Notes About Using Vista with the Code in This Book 7 Locating and Installing Modules 8 Installing Modules on Unix 9 Installing Modules on Win32 9 It's Not Easy Being Omnipotent 10 Don't Do It 10 Drop Your Privileges As Soon As Possible 10 Be Careful When Reading Data 11 Be Careful When Writing Data 12 Avoid Race Conditions 12 Enjoy 13 References for More Information Filesystems 15 Perl to the Rescue 15 Filesystem Differences 16 Unix 16 Windows-Based Operating Systems 16 Mac OS X 18 Filesystem Differences Summary 19 Dealing with Filesystem Differences from Perl 19 vii

3 Walking or Traversing the Filesystem by Hand 21 Walking the Filesystem Using the File::Find Module 26 Walking the Filesystem Using the File::Find::Rule Module 36 Manipulating Disk Quotas 38 Editing Quotas with edquota Trickery 40 Editing Quotas Using the Quota Module 44 Editing NTFS Quotas Under Windows 45 Querying Filesystem Usage 46 Module Information for This Chapter 48 References for More Information User Accounts 49 Unix User Identities 50 The Classic Unix Password File 50 Changes to the Password File in BSD 4.4 Systems 57 Shadow Passwords 58 Windows-Based Operating System User Identities 59 Windows User Identity Storage and Access 59 Windows User ID Numbers 61 Windows Passwords Don't Play Nice with Unix Passwords 63 Windows Groups 63 Windows User Rights 68 Building an Account System to Manage Users 71 The Backend Database 73 The Low-Level Component Library 78 The Process Scripts 89 Account System Wrap-Up 94 Module Information for This Chapter 97 References for More Information 97 Unix Password Files 97 Windows User Administration User Activity 99 Process Management 100 Windows-Based Operating System Process Control 100 Unix Process Control 119 File and Network Operations 125 Tracking File Operations on Windows 125 Tracking Network Operations on Windows 128 Tracking File and Network Operations in Unix 129 Module Information for This Chapter 135 Installing Win32::Setupsup 135 References for More Information 136 viii I Table of Contents

4 5. TCP/IP Name and Configuration Services 137 Host Files 137 Generating Host Files 140 Error-Checking the Host File Generation Process 143 Improving the Host File Output 144 Incorporating a Source Code Control System 148 NIS, NIS+, and WINS 151 NIS+ 154 Windows Internet Name Server (WINS) 154 Domain Name Service (DNS) 155 Generating DNS (BIND) Configuration Files 156 DNS Checking: An Iterative Approach 165 DHCP 174 Active Probing for Rogue DHCP Servers 176 Monitoring Legitimate DHCP Servers 181 Module Information for This Chapter 183 References for More Information Working with Configuration Files 185 Configuration File Formats 188 Binary 188 Naked Delimited Data 189 Key/Value Pairs 190 Markup Languages 192 All-in-One Modules 235 Advanced Configuration Storage Mechanisms 236 Module Information for This Chapter 236 References for More Information 237 XML and YAML SQL Database Administration 239 Interacting with a SQL Server from Perl 240 Using the DBI Framework 243 Using ODBC from Within DBI 249 Server Documentation 251 MySQL Server via DBI 252 Oracle Server via DBI 254 Microsoft SQL Server via ODBC 255 Database Logins 258 Monitoring Space Usage an a Database Server 260 Module Information for This Chapter 263 References for More Information 263 DBI 263 Table of Contents I ix

5 Microsoft SQL Server 264 ODBC 264 Oracle Sending Mail 265 Getting sendmail (or a Similar Mail Transport Agent) 266 Using the OS-Specific IPC Framework to Drive a Mail Client 266 Speaking the Mail Protocols Directly 268 Common Mistakes in Sending 273 Overzealous Message Sending 273 Subject Line Waste 282 Insufficient Information in the Message Body 282 Fetching Mail 285 Talking POPS to Fetch Mail 285 Talking IMAP4revl to Fetch Mail 287 Processing Mail 291 Dissecting a Single Message 291 Dissecting a Whole Mailbox 296 Dealing with Spam 297 Support Mail Augmentation 305 Module Information for This Chapter 310 References for More Information Directory Services 313 What's a Directory? 313 Finger: A Simple Directory Service 314 The WHOIS Directory Service 318 LDAP: A Sophisticated Directory Service 321 LDAP Programming with Perl 322 The Initial LDAP Connection 323 Performing LDAP Searches 325 Entry Representation in Perl 329 Adding Entries with LDIF 331 Adding Entries with Standard LDAP Operations 333 Deleting Entries 334 Modifying Entry Names 335 Modifying Entry Attributes 337 Deeper LDAP Topics 339 Putting It All Together 348 Active Directory Service Interfaces 354 ADSI Basics 355 Using ADSI from Perl 357 x I Table of Contents

6 Dealing with Container/Collection Objects 359 Identifying a Container Object 360 So How Do You Know Anything About an Object? 360 Searching 363 Performing Common Tasks Using the WinNT and LDAP Namespaces 366 Working with Users via ADSI 367 Working with Groups via ADSI 369 Working with File Shares via ADSI 369 Working with Print Queues and Print Jobs via ADSI 370 Working with Windows-Based Operating System Services via ADSI 371 Module Information for This Chapter 373 References for More Information 373 LDAP 373 ADSI Log Files 377 Reading Text Logs 377 Reading Binary Log Files 378 Using unpack() 378 Calling an OS (or Someone Else's) Binary 383 Using the OS's Logging API 384 Structure of Log File Data 385 Dealing with Log File Information 388 Space Management of Logging Information 388 Log Parsing and Analysis 395 Writing Your Own Log Files 425 Logging Shortcuts and Formatting Help 425 Basic/Intermediate Logging Frameworks 426 Advanced Logging Framework 428 Module Information for This Chapter 429 References for More Information Security 433 Noticing Unexpected or Unauthorized Changes 434 Local Filesystem Changes 434 Changes in Data Served Over the Network 440 Noticing Suspicious Activities 442 Local Signs of Peril 442 Finding Problematic Patterns 444 Danger an the Wire, or "Perl Saves the Day" 449 Preventing Suspicious Activities 460 Suggest Better Passwords 460 Reject Bad Passwords 461 Table of Contents I xi

7 Module Information for This Chapter 466 References for More Information SNMP 469 Using SNMP from Perl 469 Sending and Receiving SNMP Traps, Notifications, and Informs 480 Alternative SNMP Programming Interfaces 484 Module Information for This Chapter 486 References for More Information Network Mapping and Monitoring 489 Network Mapping 489 Discovering Hosts 490 Discovering Network Services 499 Physical Location 501 Presenting the Information 503 Textual Presentation Tools 503 Graphical Presentation Tools 507 Monitoring Frameworks 522 Extending Existing Monitoring Packages 524 What's Left? 526 Module Information for This Chapter 527 References for More Information Experiential Learning 529 Playing with Timelines 530 Task One: Parsing crontab Files 530 Task Two: Displaying the Timeline 531 Task Three: Writing Out the Correct XML File 533 Putting It All Together 534 Summary: What Can We Learn from This? 536 Playing with Geocoding 537 Geocoding from Postal Addresses 537 Geocoding from IP Addresses 541 Summary: What Can We Learn from This? 544 Playing with an MP3 Collection 544 Summary: What Can We Learn from This? 546 One Final Exploration 546 Part One: Retrieving the Wiki Page with WWW::Mechanize 547 Part Two: Extracting the Data 550 Part Three: Geocoding and Mapping the Data 551 Summary: What Can We Learn from This? 554 Remember to Play 555 xii I Table of Contents

8 Module Information for This Chapter 555 Source Material for This Chapter 556 A. The Eight-Minute XML Tutorial 557 B. The 10-Minute XPath Tutorial 563 C. The 10-Minute LDAP Tutorial 573 D. The 15-Minute SQL Tutorial 579 E. The Five-Minute RCS Tutorial 593 F. The Two-Minute VBScript-to-Perl Tutorial 597 G. The 20-Minute SNMP Tutorial 603 Index 617 Table of Contents 1 xiii

Windows PowerShell Cookbook

Windows PowerShell Cookbook Windows PowerShell Cookbook Lee Holmes O'REILLY' Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Foreword Preface xvii xxi Part I. Tour A Guided Tour of Windows PowerShell

More information

Web Security Testing Cookbook*

Web Security Testing Cookbook* Web Security Testing Cookbook* Systematic Techniques to Find Problems Fast Paco Hope and Ben Walther O'REILLY' Beijing Cambridge Farnham Koln Sebastopol Tokyo Table of Contents Foreword Preface xiii xv

More information

WINDOWS SERVER HACKS. HLuHB Darmstadt. O'REILLY 5 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo

WINDOWS SERVER HACKS. HLuHB Darmstadt. O'REILLY 5 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo WINDOWS SERVER HACKS HLuHB Darmstadt 15899417 O'REILLY 5 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Contents Credits Foreword Preface vii xvii xix Chapter 1. General Administration 1

More information

Mac OS X Lion Server

Mac OS X Lion Server ng Mac OS X Lion Server Charles Edge, Jr. O'REILLY Beijing Cambridge Farnham Kbln Sebastopol Tokyo Table of Contents Preface ix 1. Planning 1 The Minimum 1 Server Allocation 2 Service Allocation 2 Choosing

More information

PATROL Internet Server Manager Technical Brief

PATROL Internet Server Manager Technical Brief PATROL Internet Server Manager Technical Brief Contents Why Manage Web Applications?...1 What Is PATROL?...1 The PATROL Agent...2 PATROL Knowledge Modules...2 The PATROL Console...2 PATROL Internet Server

More information

Apple Pro Training Series. OS X Server. Essentials. Arek Dreyer. and Ben Greisler

Apple Pro Training Series. OS X Server. Essentials. Arek Dreyer. and Ben Greisler Apple Pro Training Series OS X Server Essentials Arek Dreyer and Ben Greisler Table of Contents Configuring and Monitoring OS X Server Lesson 1 About This Guide 3 Learning Methodology 4 Lesson Structure

More information

sendmail Cookbook Craig Hunt O'REILLY' Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo

sendmail Cookbook Craig Hunt O'REILLY' Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo sendmail Cookbook Craig Hunt O'REILLY' Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Preface xi 1. Getting Started 1 1.1 Downloading the Latest Release 5 1.2 Installing

More information

"Charting the Course... Enterprise Linux Networking Services Course Summary

Charting the Course... Enterprise Linux Networking Services Course Summary Course Summary Description This an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement these services

More information

NETWORK SECURITY HACKS

NETWORK SECURITY HACKS SECOND EDITION NETWORK SECURITY HACKS 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. Andrew Lockhart O'REILLY Beijing

More information

Firewall Builder Architecture Overview

Firewall Builder Architecture Overview Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.

More information

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. Preface p. ix Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. 6 Common Linux Features p. 8 Primary Advantages

More information

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught

More information

Microsoft Visual Basic Scripting Edition and Microsoft Windows Script Host Essentials

Microsoft Visual Basic Scripting Edition and Microsoft Windows Script Host Essentials Microsoft Visual Basic Scripting Edition and Microsoft Windows Script Host Essentials 2433: Microsoft Visual Basic Scripting Edition and Microsoft Windows Script Host Essentials (3 Days) About this Course

More information

ActiveXperts Network Monitor. White Paper

ActiveXperts Network Monitor. White Paper ActiveXperts Network Monitor Centralized monitoring of Windows, Novell, Linux and Unix servers White Paper 2008, ActiveXperts Software B.V. This document is written by ActiveXperts Software B.V. and represents

More information

Authoring for System Center 2012 Operations Manager

Authoring for System Center 2012 Operations Manager Authoring for System Center 2012 Operations Manager Microsoft Corporation Published: November 1, 2013 Authors Byron Ricks Applies To System Center 2012 Operations Manager System Center 2012 Service Pack

More information

How To Write A Nosql Database In Spring Data Project

How To Write A Nosql Database In Spring Data Project Spring Data Modern Data Access for Enterprise Java Mark Pollack, Oliver Gierke, Thomas Risberg, Jon Brisbin, and Michael Hunger O'REILLY* Beijing Cambridge Farnham Koln Sebastopol Tokyo Table of Contents

More information

Rails Cookbook. Rob Orsini. O'REILLY 8 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo

Rails Cookbook. Rob Orsini. O'REILLY 8 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Rails Cookbook Rob Orsini O'REILLY 8 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Foreword : ; xi Preface ; ;... xiii 1. Getting Started 1 1.1 Joining the Rails Community

More information

Web Hosting Features. Small Office Premium. Small Office. Basic Premium. Enterprise. Basic. General

Web Hosting Features. Small Office Premium. Small Office. Basic Premium. Enterprise. Basic. General General Basic Basic Small Office Small Office Enterprise Enterprise RAID Web Storage 200 MB 1.5 MB 3 GB 6 GB 12 GB 42 GB Web Transfer Limit 36 GB 192 GB 288 GB 480 GB 960 GB 1200 GB Mail boxes 0 23 30

More information

SecureVault Online Backup Service FAQ

SecureVault Online Backup Service FAQ SecureVault Online Backup Service FAQ C0110 SecureVault FAQ (EN) - 1 - Rev. 19-Nov-2007 Table of Contents 1. General 4 Q1. Can I exchange the client type between SecureVault PC Backup Manager and SecureVault

More information

Backup and Recovery. W. Curtis Preston O'REILLY' Beijing Cambridge Farnham Köln Paris Sebastopol Taipei Tokyo

Backup and Recovery. W. Curtis Preston O'REILLY' Beijing Cambridge Farnham Köln Paris Sebastopol Taipei Tokyo Backup and Recovery W. Curtis Preston O'REILLY' Beijing Cambridge Farnham Köln Paris Sebastopol Taipei Tokyo Table of Contents Preface xv Part I. Introduction 1. The Philosophyof Backup 3 Champagne Backup

More information

Installing The SysAidTM Server Locally

Installing The SysAidTM Server Locally Installing The SysAidTM Server Locally Document Updated: 17 October 2010 Introduction SysAid is available in two editions: a fully on-demand ASP solution and an installed, in-house solution for your server.

More information

Exchange Server Cookbook

Exchange Server Cookbook Exchange Server Cookbook Paul Robichaux, Missy Koslosky, and Devin t. Ganger CREILLT Beijing Cambridge Farnham Köln Paris Sebastopol Taipei Tokyo Table of Contents Preface xi 1. Getting Started 1 Cooking

More information

IceWarp to IceWarp Server Migration

IceWarp to IceWarp Server Migration IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone

More information

McAfee Network Threat Response (NTR) 4.0

McAfee Network Threat Response (NTR) 4.0 McAfee Network Threat Response (NTR) 4.0 Configuring Automated Reporting and Alerting Automated reporting is supported with introduction of NTR 4.0 and designed to send automated reports via existing SMTP

More information

Windows PowerShell. 3.0 Step by Step. Ed Wilson

Windows PowerShell. 3.0 Step by Step. Ed Wilson Windows PowerShell 3.0 Step by Step Ed Wilson Foreword Introduction xix xxi Chapter 1 Overview of Windows PowerShell 3.0 1 Understanding Windows PowerShell 1 Using cmdlets 3 Installing Windows PowerShell

More information

Configuring, Managing and Maintaining Windows Server 2008 Servers

Configuring, Managing and Maintaining Windows Server 2008 Servers Configuring, Managing and Maintaining Windows Server 2008 Servers MOC6419 About this Course This five-day instructor-led course combines five days worth of instructor-led training content from the Network

More information

ICANWK401A Install and manage a server

ICANWK401A Install and manage a server ICANWK401A Install and manage a server Release: 1 ICANWK401A Install and manage a server Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications

More information

User Identification (User-ID) Tips and Best Practices

User Identification (User-ID) Tips and Best Practices User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using

More information

and Active Directory Adding, Changing and Deleting Accounts, Compiling Addresses for Mail Lists

and Active Directory Adding, Changing and Deleting Accounts, Compiling Addresses for Mail Lists and Active Directory Adding, Changing and Deleting Accounts, Compiling Addresses for Mail Lists, Ltd. 2550 SW Grapevine Parkway Gapevine, TX 76051 Tel: (817) 601-3222 http://www.altn.com Copyright 2006.

More information

RPM Utility Software. User s Manual

RPM Utility Software. User s Manual RPM Utility Software User s Manual Table of Contents 1. Introduction...1 2. Installation...2 3. RPM Utility Interface...4 1. Introduction General RPM Utility program is an RPM monitoring, and management

More information

UNISOL SysAdmin. SysAdmin helps systems administrators manage their UNIX systems and networks more effectively.

UNISOL SysAdmin. SysAdmin helps systems administrators manage their UNIX systems and networks more effectively. 1. UNISOL SysAdmin Overview SysAdmin helps systems administrators manage their UNIX systems and networks more effectively. SysAdmin is a comprehensive system administration package which provides a secure

More information

In this chapter, we will introduce works related to our research. First, we will

In this chapter, we will introduce works related to our research. First, we will Chapter 2 Related Works In this chapter, we will introduce works related to our research. First, we will present the basic concept of directory service and Lightweight Directory Access Protocol (LDAP).

More information

A Plan for the Continued Development of the DNS Statistics Collector

A Plan for the Continued Development of the DNS Statistics Collector A Plan for the Continued Development of the DNS Statistics Collector Background The DNS Statistics Collector ( DSC ) software was initially developed under the National Science Foundation grant "Improving

More information

THE WHOLE INTERNET USER'S GUIDE & CATALOG EDKROL

THE WHOLE INTERNET USER'S GUIDE & CATALOG EDKROL THE WHOLE INTERNET USER'S GUIDE & CATALOG EDKROL O'REILLY & ASSOCIATES, INC. 103 MORRIS STREET, SUITE A SEBASTOPOL CA 95472 (800) 998-9938 (707) 829-0515 EMAIL: nuts@ora.com OR uunet!ora!nuts TABLE OF

More information

How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free

How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free Setting Up a Macintosh For Use In The Medical Center The purpose of this document is to provide some assistance and direction to the users of Macintosh computers in The Medical Center network environment.

More information

Class Schedule. March to June 2009. Administering Cisco Unified Communications Manager (ACUCM)

Class Schedule. March to June 2009. Administering Cisco Unified Communications Manager (ACUCM) Tuition Cost: $2,995 Length: 35 Hours (5 days) for the combination ACUCM ACU courses Introduction: The ACUCM course provides system administrators network professionals with an understing of the Cisco

More information

Ficha técnica de curso Código: IFCAD320a

Ficha técnica de curso Código: IFCAD320a Curso de: Objetivos: LDAP Iniciación y aprendizaje de todo el entorno y filosofía al Protocolo de Acceso a Directorios Ligeros. Conocer su estructura de árbol de almacenamiento. Destinado a: Todos los

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

PowerBroker Identity Services. Programmer's Guide

PowerBroker Identity Services. Programmer's Guide PowerBroker Identity Services Programmer's Guide Contents Introduction 3 Turning On Scripting 4 Simple Scripting with VBScript 5 Scripting with C# or VB.NET 8 Advanced Topics 9 Programming Reference 10

More information

Configuring Managing and Maintaining Windows Server 2008 Servers (6419B)

Configuring Managing and Maintaining Windows Server 2008 Servers (6419B) Configuring Managing and Maintaining Windows Server 2008 Servers (6419B) Who Should Attend This course is intended for Windows Server administrators who operate Windows Servers on a daily basis and want

More information

3.14. 3.14 Training on Linux System Administration, LPI Certification Level 1

3.14. 3.14 Training on Linux System Administration, LPI Certification Level 1 165 3.14 Training on Linux System Administration, LPI Certification Level 1 Name of the Tool: Source: Usage: Description: GIZ This training has been designed for IT experts and institutions desired to

More information

Configuring and Monitoring Database Servers

Configuring and Monitoring Database Servers Configuring and Monitoring Database Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this

More information

MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008

MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008 1 of 6 1/6/2010 3:23 PM MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008 This five-day instructor-led course combines five days worth of instructor-led training content from the Network

More information

Installation & Configuration Guide Version 1.0. TekSMTP Version 1.0 - Installation & Configuration Guide

Installation & Configuration Guide Version 1.0. TekSMTP Version 1.0 - Installation & Configuration Guide TekSMTP Installation & Configuration Guide Version 1.0 2013 KaplanSoft - http://www.kaplansoft.com/ 1 Document Revision 1.0 http://www.kaplansoft.com/ TekSMTP is built by Yasin KAPLAN Read Readme.txt for

More information

Course Outline. Configuring, Managing & Maintaining Windows 2008 Server. Course Description: Pre-requisites:

Course Outline. Configuring, Managing & Maintaining Windows 2008 Server. Course Description: Pre-requisites: Configuring, Managing & Maintaining Windows 2008 Server Course Description: This five-day instructor-led course combines five days worth of instructor-led training content from the Network Infrastructure

More information

Installing and configuring Microsoft Reporting Services

Installing and configuring Microsoft Reporting Services Installing and configuring Microsoft Reporting Services Every company, big or small has to use various tools to retrieve data from their Databases. IT departments receive many different requests for data

More information

COLLEGE OF COMPUTER SCIENCE & INFORMATICS Information Technology Courses

COLLEGE OF COMPUTER SCIENCE & INFORMATICS Information Technology Courses COLLEGE OF COMPUTER SCIENCE & INFORMATICS Information Technology Courses IT101 Introduction to Computer Applications The 20 th century not only brought us the dawn of Information Age, but continued to

More information

IMail Server. Getting Started Guide. Software Version 7. Ipswitch, Inc.

IMail Server. Getting Started Guide. Software Version 7. Ipswitch, Inc. Getting Started Guide Software Version 7 Ipswitch, Inc. Ipswitch, Inc. 81 Hartwell Ave Lexington, MA 02421 Phone: 781-676-5700 Fax: 781-676-5710 Web: http://www.ipswitch.com Copyrights The information

More information

Active Directory Adapter with 64-bit Support Installation and Configuration Guide

Active Directory Adapter with 64-bit Support Installation and Configuration Guide IBM Security Identity Manager Version 6.0 Active Directory Adapter with 64-bit Support Installation and Configuration Guide SC27-4384-02 IBM Security Identity Manager Version 6.0 Active Directory Adapter

More information

Using ODBC with MDaemon 6.5

Using ODBC with MDaemon 6.5 Using ODBC with MDaemon 6.5 Alt-N Technologies, Ltd 1179 Corporate Drive West, #103 Arlington, TX 76006 Tel: (817) 652-0204 2002 Alt-N Technologies. All rights reserved. Other product and company names

More information

FTP Accounts Contents

FTP Accounts Contents FTP Accounts Contents Goal... 2 1. Add an FTP Account... 2 2. The FTP Account Management Table... 3 3. Remove an FTP Account... 4 4. Edit an FTP Account's Quota... 4 5. Change an FTP Account's Password...

More information

Other documents in this series are available at: servernotes.wazmac.com

Other documents in this series are available at: servernotes.wazmac.com Wazza s Snow Leopard Server QuickStart 14. Win XP - Workgroup Setup About the Document This document is the fourteenth in a series of documents describing the process of installing and configuring a Mac

More information

"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary

Charting the Course... ... to Your Success! MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test

More information

C# Cookbook. Stephen Teilhet andjay Hilyard. O'REILLY 8 Beijing Cambridge Farnham Köln Paris Sebastopol Taipei Tokyo '"J""'

C# Cookbook. Stephen Teilhet andjay Hilyard. O'REILLY 8 Beijing Cambridge Farnham Köln Paris Sebastopol Taipei Tokyo 'J' C# Cookbook '"J""' Stephen Teilhet andjay Hilyard O'REILLY 8 Beijing Cambridge Farnham Köln Paris Sebastopol Taipei Tokyo Tableof Contents Preface xv 1. Numbers 1 1.1 Determining Approximate Equality Between

More information

Data Stored on a Windows Server Connected to a Network

Data Stored on a Windows Server Connected to a Network Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Server Connected to

More information

Windows Vista The Definitive Guide

Windows Vista The Definitive Guide Windows Vista The Definitive Guide William R. Stanek ULB Darmstadt "75*277 O'REILLY 4 Beijing Cambridge Famham Koln Paris Sebastopol Taipei Tokyo Table of Contents Preface ix Part I. Setting Up, Customizing,

More information

Querying Databases Using the DB Query and JDBC Query Nodes

Querying Databases Using the DB Query and JDBC Query Nodes Querying Databases Using the DB Query and JDBC Query Nodes Lavastorm Desktop Professional supports acquiring data from a variety of databases including SQL Server, Oracle, Teradata, MS Access and MySQL.

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

6419: Configuring, Managing, and Maintaining Server 2008

6419: Configuring, Managing, and Maintaining Server 2008 6419: Configuring, Managing, and Maintaining Server 2008 Course Number: 6419 Category: Technical Duration: 5 days Course Description This five-day instructor-led course combines five days worth of instructor-led

More information

Web App Security Audit Services

Web App Security Audit Services locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server

More information

PROJECT MANAGEMENT SYSTEM

PROJECT MANAGEMENT SYSTEM Requirement Analysis Document v.2 14.12.2009 CENG-401 SOFTWARE ENGINEER PROJECT MANAGEMENT SYSTEM (Project Manager) Ahmet Edip SEÇKİN 07010555 (Developer) Erhan ŞEN 07010507 (Developer) Semih Serdar CENGİZOĞLU

More information

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

PYTHON IN A NUTSHELL. O'REILLY Beijing Cambridge Farnham Köln Sebastopol Taipei Tokyo. Alex Martelli. Second Edition

PYTHON IN A NUTSHELL. O'REILLY Beijing Cambridge Farnham Köln Sebastopol Taipei Tokyo. Alex Martelli. Second Edition PYTHON IN A NUTSHELL Second Edition Alex Martelli O'REILLY Beijing Cambridge Farnham Köln Sebastopol Taipei Tokyo iii Table of Contents Preface ix Part 1. Getting Started with Python 1. Introduction to

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

PRiSM Security. Configuration and considerations

PRiSM Security. Configuration and considerations PRiSM Security Configuration and considerations Agenda Security overview Authentication Adding a User Security Groups Security Roles Asset Roles Security Overview Three Aspects of Security Authentication

More information

Implementing a Microsoft Windows 2000 Network Infrastructure

Implementing a Microsoft Windows 2000 Network Infrastructure Course Outline Implementing a Microsoft Windows 2000 Network Infrastructure Other Information MS2153 Days 5 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Implementing

More information

Windows Server 2003 default services

Windows Server 2003 default services Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.

More information

1 Accessing E-mail accounts on the Axxess Mail Server

1 Accessing E-mail accounts on the Axxess Mail Server 1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server

More information

Tango Hostway s Reseller Platform

Tango Hostway s Reseller Platform Tango Hostway s Reseller Platform Web Hosting Plans Linux Hosting Pricing Monthly $7.95 $9.95 $11.95 $13.95 $18 Quarterly $19.88 $24.88 $29.88 $34.88 $45 Semi-Annually $39.75 $49.75 $59.75 $69.75 $90 Yearly

More information

How To Back Up Your Pplsk Data On A Pc Or Mac Or Mac With A Backup Utility (For A Premium) On A Computer Or Mac (For Free) On Your Pc Or Ipad Or Mac On A Mac Or Pc Or

How To Back Up Your Pplsk Data On A Pc Or Mac Or Mac With A Backup Utility (For A Premium) On A Computer Or Mac (For Free) On Your Pc Or Ipad Or Mac On A Mac Or Pc Or Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Configuring, Managing and Maintaining Windows Server 2008 Servers

Configuring, Managing and Maintaining Windows Server 2008 Servers Configuring, Managing and Maintaining Windows Server 2008 Servers Elements of this syllabus are subject to change Course Details Course Code: 6419 Duration: Notes: 5 day(s) This course syllabus should

More information

Configuring and Using the TMM with LDAP / Active Directory

Configuring and Using the TMM with LDAP / Active Directory Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring

More information

Novell Identity Manager

Novell Identity Manager Password Management Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 3.6.1 June 05, 2009 www.novell.com Identity Manager 3.6.1 Password Management Guide Legal Notices Novell, Inc. makes no representations

More information

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network

More information

W3Perl A free logfile analyzer

W3Perl A free logfile analyzer W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed

More information

NCP Secure Enterprise Management for Windows OS. New Features version 1.03 to 2.05

NCP Secure Enterprise Management for Windows OS. New Features version 1.03 to 2.05 What s New NCP Secure Enterprise Management for Windows OS New Features version 1.03 to 2.05 Disclaimer Considerable care has been taken in the preparation and publication of this document, errors in content,

More information

Lieberman Software Corporation Enterprise Random Password Manager

Lieberman Software Corporation Enterprise Random Password Manager Lieberman Software Corporation Enterprise Random Password Manager RSA envision Ready Implementation Guide Last Modified: January 27, 2011 Partner Information Product Information Partner Name Web Site Product

More information

Accessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute

Accessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute Accessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute JMP provides a variety of mechanisms for interfacing to other products and getting data into JMP. The connection

More information

NETWORK SECURITY HACKS *

NETWORK SECURITY HACKS * NETWORK SECURITY HACKS * Andrew %pckhart Ji O'REILLY* Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Contents Credits Preface ix xi Chapter 1. Unix Host Security 1 1. Secure Mount Points

More information

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup.

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup. Quick Scan Features Setup Guide XE3024EN0-2 This guide includes instructions for: Scan to E-mail Setup on page 1 Scan to Mailbox Setup on page 6 Network Scanning Setup on page 9 Scan to PC Setup on page

More information

Auburn Montgomery. Registration and Security Policy for AUM Servers

Auburn Montgomery. Registration and Security Policy for AUM Servers Auburn Montgomery Title: Responsible Office: Registration and Security Policy for AUM Servers Information Technology Services I. PURPOSE To outline the steps required to register and maintain departmental

More information

Web Hosting Getting Started Guide

Web Hosting Getting Started Guide Web Hosting Getting Started Guide This guide describes: - Hosting Terms and Definitions - How to sync a domain with your hosting account - How to change your domain s nameservers - How to use FTP to upload

More information

Installation Guide NetIQ AppManager

Installation Guide NetIQ AppManager Installation Guide NetIQ AppManager April 2016 www.netiq.com/documentation Legal Notice NetIQ AppManager is covered by United States Patent No(s): 05829001, 05986653, 05999178, 06078324, 06397359, 06408335.

More information

Someone may be manipulating information in your organization. - and you may never know about it!

Someone may be manipulating information in your organization. - and you may never know about it! for iseries, version 3.5 Complete Security Suite for iseries (AS/400) TCP/IP and SNA Connectivity Someone may be manipulating information in your organization - and you may never know about it! If your

More information

The Mac OS X Server Essentials v10.5 Exam Skills Assessment Guide

The Mac OS X Server Essentials v10.5 Exam Skills Assessment Guide The Mac OS X Server Essentials v10.5 Exam Skills Assessment Guide To Register This exam is offered at Apple Authorized Training Centers and Prometric Testing Centers worldwide. For information on exam

More information

Heroix Longitude Quick Start Guide V7.1

Heroix Longitude Quick Start Guide V7.1 Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: support@heroix.com Notice Heroix provides

More information

VitalQIP DNS/DHCP & IP Address Management Software and Appliance Solution

VitalQIP DNS/DHCP & IP Address Management Software and Appliance Solution VitalQIP DNS/DHCP & IP Address Management Software and Appliance Solution May 2011 7.3 Version 1 Copyright 2011 Alcatel-Lucent 1 Table of Contents 1. Document Purpose... 3 2. What s New in VitalQIP 7.3?...

More information

Active Directory Compatibility with ExtremeZ-IP

Active Directory Compatibility with ExtremeZ-IP Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices White Paper Group Logic White Paper October 2010 About This Document The purpose of this technical paper is to discuss how ExtremeZ-IP

More information

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services Univention Corporate Server Operation of a Samba domain based on Windows NT domain services 2 Table of Contents 1. Components of a Samba domain... 4 2. Installation... 5 3. Services of a Samba domain...

More information

Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper

Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.

More information

Self-Service Active Directory Group Management

Self-Service Active Directory Group Management Self-Service Active Directory Group Management 2015 Hitachi ID Systems, Inc. All rights reserved. Hitachi ID Group Manager is a self-service group membership request portal. It allows users to request

More information

Setting up a Mac on the CU network

Setting up a Mac on the CU network School of Medicine IT Office Setting up a Mac on the CU network v1.3 JAM 23/12/13 This document explains how to setup a Mac on the Cardiff University network, access useful resources and configure native

More information

Questions & Answers from the Webcast: Your Mac Users Deserve Quality Support Too. Sponsors: Atempo. Centrify. Group Logic. LANrev.

Questions & Answers from the Webcast: Your Mac Users Deserve Quality Support Too. Sponsors: Atempo. Centrify. Group Logic. LANrev. Questions & Answers from the Webcast: Your Mac Users Deserve Quality Support Too Sponsors: Atempo Centrify Group Logic LANrev Parallels November 10, 2009 Web Help Desk Contents Compilation of the questions

More information

Parallels Pro Control Panel

Parallels Pro Control Panel Parallels Pro Control Panel Legal and Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 2008, Parallels,

More information

Zmanda Cloud Backup Frequently Asked Questions

Zmanda Cloud Backup Frequently Asked Questions Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What

More information

Archiving with MS Exchange Server

Archiving with MS Exchange Server Archiving with MS Exchange Server Copyright 2011 by REDDOXX GmbH REDDOXX GmbH Neue Weilheimer Str. 14 73230 Kirchheim Fon: +49 (0)7021 92846-0 Fax: +49 (0)7021 92846-99 email: info@reddoxx.com Internet:

More information