1 Introduction to GNU/Linux & TCP/IP Basics
|
|
- Clarissa Jenkins
- 8 years ago
- Views:
Transcription
1 2 Toegepaste Informatica, reeks 1B Computernetwerken, deel 2 Opdracht: Oplossingen Labo s Student: Y. Reekmans 1 Introduction to GNU/Linux & TCP/IP Basics Server: debbie.nwlab.khleuven.be Port: Exercises Opdracht 2 man ls man cp man rm man mv... mkdir - p exercise/dir1/dir4 touch excercise/dir1/dir4/file4 touch exercise/dir1/file3 mkdir exercise/dir2 mkdir exercise/dir3 touch exercise/file1 touch exercise/file2 rm -r exercise du -h /var Text editing Opdracht 7 vi me.txt <i> Joske Vermeulen <esc> :wq pg. 1 van 10 KHLeuven, dept. G&T, 2TI
2 Opdracht 8 cp me.txt we.txt vi we.txt <i> Meer namen <esc> :wq Network commands Opdracht 9 ifconfig 0 ping -c 10 1 traceroute 2 netstat -tl 3 netstat 6 nc -l -p nc localhost nc -l -p Firefox: debbie: pg. 2 van 10 KHLeuven, dept. G&T, 2TI
3 2 Introduction to GNU/Linux 2 Your homedirectory pscp -P @debbie.nwlab.khleuven.be:test.txt C:\ pscp -P C:\test.txt @debbie.nwlab.khleuven.be:test.txt Permissions Opdracht 2 chmod u=rwx,g=rwx,o=rwx file1 chmod u=rw,g=r,o=r file2 chmod u=rw,g=,o= file3... of ook: chmod 777 file1 chmod 644 file2 chmod 600 file3... mkdir public chmod 755 public Neen, de permissies zijn niet overgedragen op de kopie. Door het gebruiken van de -p flag: cp -p file file_copy history less Improving efficiently Opdracht 6 less /.bash_history history Opdracht 9 touch file_$(date +%Y.%m.%d) 0 alias dua='du --max-depth=1 -B KB;du --max-depth=1 -B MB;du --max-depth=1 -B GB' dua pg. 3 van 10 KHLeuven, dept. G&T, 2TI
4 3 Introduction to GNU/Linux 3 man sort man head man tail... User 1: - mkfifo /tmp/pipe - cat > /tmp/pipe User 2: - cat /tmp/pipe User 1: rm /tmp/pipe echo "text1" > file1.txt;echo "text2" > file2.txt;cat file1.txt file2.txt > file3.txt ls -l grep -v rwx Opdracht 6 cat /usr/share/dict/dutch grep rare Opdracht 7 ls -l tr -s ' ' cut -d ' ' -f1,8 Opdracht 8 cat /usr/share/dict/dutch grep rare sort -d -r Applied exercises Opdracht 9 last.log cat last.log grep -E 'ˆ([0-9]{6})' cut -d ' ' -f1 sort -u wc -l cat last.log grep -E 'ˆ([0-9]{6})' cut -d ' ' -f1 sort uniq -c sort -nr head -n 1 cat last.log grep -E 'ˆ([0-9]{6})' tr -s ' ' cut -d ' ' -f1,10 sort -k 2 -r head -n 5 0 ftpd.log pg. 4 van 10 KHLeuven, dept. G&T, 2TI
5 cat ftpd.log wc -l cat ftpd.log grep "Feb" grep "RETR " cut -d "\"" -f2 cut -d " " -f2 cat ftpd.log grep "USER usery" wc -l cat ftpd.log grep "Feb" grep "USER usery" cut -d " " -f1 sort uniq A bruteforce attack checking common used logins Nope traceroute DSL bb.netvision.net.il (Israel --> Provider netvision -->...) cat ftpd.log grep "06/Feb" grep "netvision.net" grep "USER " cut -d "\"" -f2 cut -d " " cat ftpd.log grep "06/Feb" grep "netvision.net" grep "PASS " wc -l cat ftpd.log cut -d " " -f1 sort uniq -c sort -nr head -n 10 1 portscan tcpdump.log and portscan firewalled tcpdump.log Checking on every port (udp/tcp) of a connection whether it is open or not Attacker: & Victim: cat portscan_tcpdump.log grep ack cut -d " " -f3 cut -d "." -f5 sort -n 2 apache google.log Visits from google's bot and those from regular users using google as search engine Bot(cat apache_google.log grep "bot" wc -l): Regular(cat apache_google.log grep -v "bot" wc -l): (cat apache_google.log grep "bot" cut -d " " -f1 sort uniq wc -l) None cat apache_google.log grep -v "bot" cut -d "\"" -f4 cut -d "/" -f pg. 5 van 10 KHLeuven, dept. G&T, 2TI
6 4 Regular Expressions grep -E '[aeiou]{4,5}' /usr/share/dict/dutch Opdracht 2 grep -E "([0-9]{1,3}[\.,-]){4}\.*\.*" ftpd.log grep -oe "Firefox/2.0.0.([0-9])*" apache_google.log sort uniq grep -oe "Firefox/([0-9]+\.)*[0-9]" apache_google.log sort uniq grep -E 'ˆver(.)*en$' /usr/share/dict/dutch wc -l grep -E 'ˆ[enrtiscau]{7}v[enrtiscau]{15}$' /usr/share/dict/dutch Opdracht 6 Correct? grep -E "ˆ([zrtypqsdfghjklmwxcvbn]?[aeiou]){2}*$" /usr/share/dict/dutch Opdracht 7?? pg. 6 van 10 KHLeuven, dept. G&T, 2TI
7 5 Extra practice cat /etc/debconf.conf grep -v '#' Opdracht 2 last -i grep -v "10." grep -v "root" grep -v " " wc -l last -i grep -v "10." grep -v "root" grep -v " " cut -d " " -f1 sort uniq so echo Time = $(date +"%H:%M:%S (%d/%m/%y)") date "+Time = %H:%M:%S (%d/%m/%y)" echo "Logged in users = $(who cut -d " " -f1 sort uniq wc -l)" Opdracht 6 echo "Open TCP connections = $(netstat -t wc -l)" Opdracht 7 echo "Free memory = $(free -m grep Mem: tr -s " " cut -d " " -f4) MB" Opdracht 8 echo "Free Disk Space = $(df / -B G grep / tr -s " " cut -d " " -f4)b" Opdracht 9 echo "CPU =$(cat /proc/cpuinfo grep "model name" cut -d ":" -f2)" 0 echo "System load = $(uptime tr -s " " cut -d " " -f9,10,11)" 1?? 2?? 3?? pg. 7 van 10 KHLeuven, dept. G&T, 2TI
8 ?? 5?? pg. 8 van 10 KHLeuven, dept. G&T, 2TI
9 6 Some Notes openssl enc -aes-128-cbc -in secret.txt -out secret.txt.aes openssl enc -d -aes-128-cbc -in secret.txt.aes openssl enc -des3 -in secret.txt -out secret.txt.aes openssl enc -d -des3 -in secret.txt.aes pg. 9 van 10 KHLeuven, dept. G&T, 2TI
10 7 Stappenplan gpg --gen-key Opdracht 2 bestandje maken Export your asciiencoded key to a file username.pub in your home directory, and make sure all other users can read this file (only read access of course!). gpg --output <file> --export < > (eigen ) Now import some keys from classmates: gpg --import <file> een bestand encrypteren: gpg --encrypt --armor --output <encrypted filename> --recipient < > Opdracht 6 Keys are identified by the corresponding address. If you look at this file, you will see it contains binary data1. To get the output in an ascii format, use the armor option: Opdracht 7 Decrypteren: gpg --decrypt --output <ontcijferd geencrypteerd> pg. 10 van 10 KHLeuven, dept. G&T, 2TI
ICS 351: Today's plan
ICS 351: Today's plan routing protocols linux commands Routing protocols: overview maintaining the routing tables is very labor-intensive if done manually so routing tables are maintained automatically:
More informationCA and SSL Certificates
1 For this exercise you must again be root. Login and obtain root privileges: sudo su 2 Create a working directory only accessible to root: mkdir ~/ca cd ~/ca chmod og rwx. 3 Install openssl if necessary
More informationTutorial 0A Programming on the command line
Tutorial 0A Programming on the command line Operating systems User Software Program 1 Program 2 Program n Operating System Hardware CPU Memory Disk Screen Keyboard Mouse 2 Operating systems Microsoft Apple
More informationCiphermail Gateway Separate Front-end and Back-end Configuration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway Separate Front-end and Back-end Configuration Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction
More informationIntroduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
More informationIntrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
More informationCommand Line - Part 1
Command Line - Part 1 STAT 133 Gaston Sanchez Department of Statistics, UC Berkeley gastonsanchez.com github.com/gastonstat Course web: gastonsanchez.com/teaching/stat133 GUIs 2 Graphical User Interfaces
More informationAn Introduction to the Linux Command Shell For Beginners
An Introduction to the Linux Command Shell For Beginners Presented by: Victor Gedris In Co-Operation With: The Ottawa Canada Linux Users Group and ExitCertified Copyright and Redistribution This manual
More informationA UNIX/Linux in a nutshell
bergman p.1/23 A UNIX/Linux in a nutshell Introduction Linux/UNIX Tommi Bergman tommi.bergman[at]csc.fi Computational Environment & Application CSC IT center for science Ltd. Espoo, Finland bergman p.2/23
More informationUnix Sampler. PEOPLE whoami id who
Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host
More informationOpen Source Computational Fluid Dynamics
Open Source Computational Fluid Dynamics An MSc course to gain extended knowledge in Computational Fluid Dynamics (CFD) using open source software. Teachers: Miklós Balogh and Zoltán Hernádi Department
More informationComputer Forensics Process
About term paper and course project! Primary objectives I expect that you can learn not only the knowledge but also the research approaches such that you can have a better preparation to start your own
More informationLinux command line. An introduction to the Linux command line for genomics. Susan Fairley
Linux command line An introduction to the Linux command line for genomics Susan Fairley Aims Introduce the command line Provide an awareness of basic functionality Illustrate with some examples Provide
More informationAn A-Z Index of the Apple OS X command line (TERMINAL) The tcsh command shell of Darwin (the open source core of OSX)
An A-Z Index of the Apple OS X command line (TERMINAL) The tcsh command shell of Darwin (the open source core of OSX) alias alloc awk Create an alias List used and free memory Find and Replace text within
More informationHow To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)
EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...
More informationFile Transfer Examples. Running commands on other computers and transferring files between computers
Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you
More informationLinux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
More informationBasic Linux & Package Management. Original slides from GTFO Security
Basic Linux & Package Management Original slides from GTFO Security outline Linux What it is? Commands Filesystem / Shell Package Management Services run on Linux mail dns web central authentication router
More informationThirty Useful Unix Commands
Leaflet U5 Thirty Useful Unix Commands Last revised April 1997 This leaflet contains basic information on thirty of the most frequently used Unix Commands. It is intended for Unix beginners who need a
More informationPartek Flow Installation Guide
Partek Flow Installation Guide Partek Flow is a web based application for genomic data analysis and visualization, which can be installed on a desktop computer, compute cluster or cloud. Users can access
More informationSingle Node Hadoop Cluster Setup
Single Node Hadoop Cluster Setup This document describes how to create Hadoop Single Node cluster in just 30 Minutes on Amazon EC2 cloud. You will learn following topics. Click Here to watch these steps
More informationIntroduction to Linux and Cluster Basics for the CCR General Computing Cluster
Introduction to Linux and Cluster Basics for the CCR General Computing Cluster Cynthia Cornelius Center for Computational Research University at Buffalo, SUNY 701 Ellicott St Buffalo, NY 14203 Phone: 716-881-8959
More informationInternet Programming. Security
Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures
More informationBirmingham Environment for Academic Research. Introduction to Linux Quick Reference Guide. Research Computing Team V1.0
Birmingham Environment for Academic Research Introduction to Linux Quick Reference Guide Research Computing Team V1.0 Contents The Basics... 4 Directory / File Permissions... 5 Process Management... 6
More informationCommand Line Crash Course For Unix
Command Line Crash Course For Unix Controlling Your Computer From The Terminal Zed A. Shaw December 2011 Introduction How To Use This Course You cannot learn to do this from videos alone. You can learn
More informationIntroduction to Running Hadoop on the High Performance Clusters at the Center for Computational Research
Introduction to Running Hadoop on the High Performance Clusters at the Center for Computational Research Cynthia Cornelius Center for Computational Research University at Buffalo, SUNY 701 Ellicott St
More informationTo enable https for appliance
To enable https for appliance We have used openssl command to generate a key pair. The below image shows on how to generate key using the openssl command. SSH into appliance and login as root. Copy all
More informationLoad Balancing/High Availability Configuration for neoninsight Server
Load Balancing/High Availability Configuration for neoninsight Server Introduction: This document provides details on the configuration and the components used for a two node load balancing system with
More informationCOMP 3704 Computer Security
COMP 3704 Computer Security Christian Grothoff christian@grothoff.org http://grothoff.org/christian/ 1 Key Size Consider how much the information is worth Even advancements in computing are not going to
More informationTraining Day : Linux
Training Day : Linux Objectives At the end of the day, you will be able to use Linux command line in order to : Connect to «genotoul» server Use available tools Transfer files between server and desktop
More informationSECURE Web Gateway. HTTPS/SSL Technical FAQ. Version 1.1. Date 04/10/12
SECURE Web Gateway HTTPS/SSL Technical FAQ Version 1.1 Date 04/10/12 Introduction This Technical FAQ explains the operation of the HTTPS/SSL scanning and how it is deployed. How does the SECURE Web Gateway
More informationExercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop
14/01/05 file:/data/hervey/docs/pre-sanog/web/ha/security/apache-ssl-exercises.html #1 Exercises Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 1. Install Apache with SSL support 2. Configure
More informationApache, SSL and Digital Signatures Using FreeBSD
Apache, SSL and Digital Signatures Using FreeBSD AfNOG 2007 Unix System Administration April 26, 2007 Hervey Allen Network Startup Resource Center Some SSL background Invented by Netscape for secure commerce.
More informationLinux FTP Server Setup
17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started
More informationIntroduction to HDFS. Prasanth Kothuri, CERN
Prasanth Kothuri, CERN 2 What s HDFS HDFS is a distributed file system that is fault tolerant, scalable and extremely easy to expand. HDFS is the primary distributed storage for Hadoop applications. Hadoop
More informationUnix/Linux Forensics 1
Unix/Linux Forensics 1 Simple Linux Commands date display the date ls list the files in the current directory more display files one screen at a time cat display the contents of a file wc displays lines,
More informationLinux Security Ideas and Tips
Linux Security Ideas and Tips Hugh Brown Sr. Systems Administrator ITS Enterprise Infrastructure University of Iowa October 8, 2014 Hugh Brown (University of Iowa) Linux Security Ideas and Tips October
More informationTCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca
TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca Abstract TCP SYN flooding attack is a kind of denial-of-service attack. This SYN flooding attack is using the weakness
More informationSTEP 4 : GETTING LIGHTTPD TO WORK ON YOUR SEAGATE GOFLEX SATELLITE
STEP 4 : GETTING LIGHTTPD TO WORK ON YOUR SEAGATE GOFLEX SATELLITE Note : Command Lines are in red. Congratulations on following all 3 steps. This is the final step you need to do to get rid of the old
More informationThe objective of this lab is to learn how to set up an environment for running distributed Hadoop applications.
Lab 9: Hadoop Development The objective of this lab is to learn how to set up an environment for running distributed Hadoop applications. Introduction Hadoop can be run in one of three modes: Standalone
More informationSymmetric and Public-key Crypto Due April 14 2015, 11:59PM
CMSC 414 (Spring 2015) 1 Symmetric and Public-key Crypto Due April 14 2015, 11:59PM Updated April 11: see Piazza for a list of errata. Sections 1 4 are Copyright c 2006-2011 Wenliang Du, Syracuse University.
More informationHow to Configure edgebox as a Web Server
intelligence at the edge of the network www.critical-links.com edgebox V4.5 Introduction: The Web Server panel allows the simple creation of multiple web sites using the Apache web server. Each website
More informationPractical Network Forensics
BCS-ISSG Practical Network Forensics Day BCS, London Practical Network Forensics Alan Woodroffe issg@securesystemssupport.co.uk www.securesystemssupport.co.uk Copyright Secure Systems Support Limited.
More informationAn Information System
An Information System Module 1: Tutorials and Exercises Basics Software Setup Login in your machine cd $HOME/MyOpenLDAP chmod u+x setup.sh./setup.sh ./setup.sh (BDB setup) Prepare the Berkeley Database
More informationDistributed convex Belief Propagation Amazon EC2 Tutorial
6/8/2011 Distributed convex Belief Propagation Amazon EC2 Tutorial Alexander G. Schwing, Tamir Hazan, Marc Pollefeys and Raquel Urtasun Distributed convex Belief Propagation Amazon EC2 Tutorial Introduction
More informationUNIX - FILE SYSTEM BASICS
http://www.tutorialspoint.com/unix/unix-file-system.htm UNIX - FILE SYSTEM BASICS Copyright tutorialspoint.com A file system is a logical collection of files on a partition or disk. A partition is a container
More informationSyntax: cd <Path> Or cd $<Custom/Standard Top Name>_TOP (In CAPS)
List of Useful Commands for UNIX SHELL Scripting We all are well aware of Unix Commands but still would like to walk you through some of the commands that we generally come across in our day to day task.
More informationAPPLICATION NOTE. How to build pylon applications for ARM
APPLICATION NOTE Version: 01 Language: 000 (English) Release Date: 31 January 2014 Application Note Table of Contents 1 Introduction... 2 2 Steps... 2 1 Introduction This document explains how pylon applications
More informationExperian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
More informationA candidate following a programme of learning leading to this unit will be able to:
Unit 24: Linux+ Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Demonstrate knowledge of planning the implementation Show knowledge of how to install
More informationHacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
More informationApache Security with SSL Using Ubuntu
Apache Security with SSL Using Ubuntu These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background
More informationSecurity Workshop. Apache + SSL exercises in Ubuntu. 1 Install apache2 and enable SSL 2. 2 Generate a Local Certificate 2
Security Workshop Apache + SSL exercises in Ubuntu Contents 1 Install apache2 and enable SSL 2 2 Generate a Local Certificate 2 3 Configure Apache to use the new certificate 4 4 Verify that http and https
More informationUNIX Basics. Ian Darwin TCP Informatics January, 2005. Presented from a Mac using Apple s Keynote presentation software
UNIX Basics Ian Darwin TCP Informatics January, 2005 Presented from a Mac using Apple s Keynote presentation software 1 What is this about? Brief Introduction to UNIX - ideas - basic commands - some examples
More informationRunning Kmeans Mapreduce code on Amazon AWS
Running Kmeans Mapreduce code on Amazon AWS Pseudo Code Input: Dataset D, Number of clusters k Output: Data points with cluster memberships Step 1: for iteration = 1 to MaxIterations do Step 2: Mapper:
More informationInstallation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
More informationKleine Linux-Tricks - schneller ohne Aufwand
Uli Martens uli@youam.net AIXpertenrunde 2008-12-12 Übersicht 1 2 3 4 hotkeys ALT-T exchange two arguments under the cursor (bash only) CTRL-T exchange two characters under the cursor (bash only) CTRL-L
More informationCloud Storage Quick Start Guide
Cloud Storage Quick Start Guide Copyright - GoGrid Cloud Hosting. All rights reserved Table of Contents 1. About Cloud Storage...3 2. Configuring RHEL and CentOS Servers to Access Cloud Storage...3 3.
More informationGet quick control over your Linux server with server commands
Get quick control over your Linux server with server commands by Jack Wallen Linux is a powerful environment for both the desktop and server: Both systems have matured so any action can be managed with
More informationIntroduction to HDFS. Prasanth Kothuri, CERN
Prasanth Kothuri, CERN 2 What s HDFS HDFS is a distributed file system that is fault tolerant, scalable and extremely easy to expand. HDFS is the primary distributed storage for Hadoop applications. HDFS
More informationGroundWork Monitor Open Source 5.1.0 Installation Guide
GroundWork Monitor Open Source 5.1 is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version
More informationKernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems
Module 9: Operating Systems Objective What is an operating system (OS)? OS kernel, and basic functions OS Examples: MS-DOS, MS Windows, Mac OS Unix/Linux Features of modern OS Graphical operating system
More informationUNIX / Linux commands Basic level. Magali COTTEVIEILLE - September 2009
UNIX / Linux commands Basic level Magali COTTEVIEILLE - September 2009 What is Linux? Linux is a UNIX system Free Open source Developped in 1991 by Linus Torvalds There are several Linux distributions:
More informationSysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
More informationFERMILAB CENTRAL WEB HOSTING SINGLE SIGN ON (SSO) ON CWS LINUX WITH SAML AND MOD_AUTH_MELLON
FERMILAB CENTRAL WEB HOSTING SINGLE SIGN ON (SSO) ON CWS LINUX WITH SAML AND MOD_AUTH_MELLON Contents Information and Security Contacts:... 3 1. Introduction... 4 2. Installing Module... 4 3. Create Metadata
More informationTEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
More informationOpenGeo Suite for Linux Release 3.0
OpenGeo Suite for Linux Release 3.0 OpenGeo October 02, 2012 Contents 1 Installing OpenGeo Suite on Ubuntu i 1.1 Installing OpenGeo Suite Enterprise Edition............................... ii 1.2 Upgrading.................................................
More informationFred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer
Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical
More informationInstalling Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012
Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012 1 The person installing the VC is knowledgeable of the Linux file system
More informationA Tiny Queuing System for Blast Servers
A Tiny Queuing System for Blast Servers Colas Schretter and Laurent Gatto December 9, 2005 Introduction When multiple Blast [4] similarity searches are run simultaneously against large databases and no
More informationSecure Shell. The Protocol
Usually referred to as ssh The name is used for both the program and the protocol ssh is an extremely versatile network program data encryption and compression terminal access to remote host file transfer
More informationWhat is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting
Version 1.6 1 1 1 2 2 8 8 9 9 9 What is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting your Installation Managing
More informationFINFISHER: FinFly ISP 2.0 Infrastructure Product Training
1 FINFISHER: FinFly ISP 2.0 Infrastructure Product Training Table of content 2 1. Introduction 2. The infrastructure - ADMF Client and Infection GUI - Administration: ADMF - iproxy: NDP01/02 - Radius Probe:
More informationHPCC USER S GUIDE. Version 1.2 July 2012. IITS (Research Support) Singapore Management University. IITS, Singapore Management University Page 1 of 35
HPCC USER S GUIDE Version 1.2 July 2012 IITS (Research Support) Singapore Management University IITS, Singapore Management University Page 1 of 35 Revision History Version 1.0 (27 June 2012): - Modified
More informationLocking Down Files With Encrypted File System
Page 1 of 6 close window Locking Down Files With Encrypted File System August September 2008 by Jaqui Lynch In October 2007 I outlined some of the new security features in AIX* version 6.1. This article
More informationFirst Steps. Remote Access Gateway IGW/922. with DIL/NetPC ADNP/9200
Remote Access Gateway IGW/922 with DIL/NetPC ADNP/9200 First Steps SSV Embedded Systems Dünenweg 5 D-30419 Hannover Phone: +49 (0)511/40 000-0 Fax: +49 (0)511/40 000-40 E-mail: sales@ssv-embedded.de Document
More informationINASP: Effective Network Management Workshops
INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network
More informationSet up and run your own Cesidian Root DNS server
Set up and run your own Cesidian Root DNS server How-to for Debian 6.0, bind9 and IPv4 Cesidian Root website http://cesidianroot.net/ Last change 13.02.2012 Author Contact Patrick Jansen Administrator
More informationSecure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08
Technical Note Secure File Transfer Installation Sender Recipient Attached FIles Pages Date Development Internal/External None 11 6/23/08 Overview This document explains how to install OpenSSH for Secure
More informationRadware Security Research. Reverse Engineering a Sophisticated DDoS Attack Bot. Author: Zeev Ravid
Reverse Engineering a Sophisticated DDoS Attack Bot Author: Zeev Ravid July 2015 Introduction In July 2015, Radware s Emergency Response Team (ERT) noticed a significant increased usage of the Tsunami
More informationRapidSeed for Replicating Systems Version 7.4
RapidSeed for Replicating Systems Version 7.4 7 Technology Circle, Suite 100 Columbia, SC 29203 Phone: 803.454.0300 Contents Overview...3 Supported seed devices by system...4 Prerequisites...4 General
More informationHow to simulate network devices using the Verax SNMP Simulator (Linux/Windows)
How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) Table of contents Abstract... 3 1. Verax SNMP Simulator installation... 4 2. Extracting SNMP record files from a physical
More informationGeBro-BACKUP. Die Online-Datensicherung. Manual Pro Backup Client on a NAS
GeBro-BACKUP Die Online-Datensicherung. Manual Pro Backup Client on a NAS Created and tested on a QNAP TS-559 Pro Firmware 4.0.2 Intel x86 Architecture Default hardware configuration OBM v6.15.0.0 Last
More informationHigher National Unit Specification. General information for centres. Multi User Operating Systems. Unit code: DH3A 34
Higher National Unit Specification General information for centres Unit code: DH3A 34 Unit purpose: This Unit is designed to provide candidates with a practical introduction to, and understanding of, the
More informationAgenda. Using HPC Wales 2
Using HPC Wales Agenda Infrastructure : An Overview of our Infrastructure Logging in : Command Line Interface and File Transfer Linux Basics : Commands and Text Editors Using Modules : Managing Software
More informationAlthough Mac OS X is primarily known for its GUI, the under pinnings are all Unix. This
BE Computing Web Tutorials: Server Commands Server Commands Indluded: 1. Basic Command Line Tutorial Although Mac OS X is primarily known for its GUI, the underpinnings are all Unix. This tutorial will
More informationBASIC TCP/IP NETWORKING
ch01 11/19/99 4:20 PM Page 1 CHAPTER 1 BASIC TCP/IP NETWORKING When you communicate to someone or something else, you need to be able to speak a language that the listener understands. Networking requires
More informationRelease Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8
Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 22 About this document This document provides release notes for Snare Enterprise Epilog for Windows release
More information[ X OR DDoS T h r e a t A d v i sory] akamai.com
[ X OR DDoS T h r e a t A d v i sory] akamai.com What is the XOR DDoS threat The XOR DDoS botnet has produced DDoS attacks from a few Gbps to 150+ Gbps The gaming sector has been the primary target, followed
More informationSome Tools for Computer Security Incident Response Team (CSIRT)
Some Tools for Computer Security Incident Response Team (CSIRT) AfNOG 12 30 th May 2011 10 th June 2011 Tanzania By Marcus K. G. Adomey Overview Some Unix Commands Some Selected Tools Snort AirSnort hping
More informationHow to Backup XenServer VM with VirtualIQ
How to Backup XenServer VM with VirtualIQ 1. Using Live Backup of VM option: Live Backup: This option can be used, if user does not want to power off the VM during the backup operation. This approach takes
More informationEasy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux
Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com info@1and1.com August 2015 Copyright 2015 1&1
More informationSSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
More informationMake a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
More informationInstalling and Configuring Nessus by Nitesh Dhanjani
Unless you've been living under a rock for the past few years, it is quite evident that software vulnerabilities are being found and announced quicker than ever before. Every time a security advisory goes
More informationIBM Software Hadoop Fundamentals
Hadoop Fundamentals Unit 2: Hadoop Architecture Copyright IBM Corporation, 2014 US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
More informationManaging SAS Web Infrastructure Platform Data Server High-Availability Clusters
ABSTRACT Paper SAS1776-2015 Managing SAS Web Infrastructure Platform Data Server High-Availability Clusters Ken Young, SAS Institute Inc. The SAS Web Application Server is a lightweight server that provides
More informationLarge system usage HOW TO. George Magklaras PhD Biotek/NCMM IT USIT Research Computing Services
Large system usage HOW TO George Magklaras PhD Biotek/NCMM IT USIT Research Computing Services Agenda Introduction: A Linux server as a collection of memory/disk/cpu What is the problem? memory and SWAP
More informationConfiguring MailArchiva with Insight Server
Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any
More information