POSTACI WEBMAIL DOKÜMANTASYONU VERSIYON 1.0.3

Size: px
Start display at page:

Download "POSTACI WEBMAIL DOKÜMANTASYONU VERSIYON 1.0.3"

Transcription

1 POSTACI WEBMAIL DOKÜMANTASYONU VERSIYON Umut Gökbayrak 2000 Bornova ø]plu

2 ddoõúpdoduõper\xqfd\dqõpgdqklod\uõopd\dq6hu\do H

3 ÖNSÖZ...6 *ø5øù MATERYAL...9 øù/(7ø0 Sø67(0ø : RED HAT GNU/LINUX Linux nedir? Linux Kurulumu...10 *18YHg]J U<D]ÕOÕP V(5ø7$%$1,: MYSQL APACHE SUNUCU Apache' nin Temin Edilmesi Apache' nin Derlenmesi Apache' nin Kurulumu DQDO6XQXFX'HVWH L9LUWXDO+RVWLQJ FIREWALL: IPCHAINS...25,SFKDLQV HJLULú Paket Filtreleme...25,SFKDLQV8\JXODPDODUÕ...26,SFKDLQV.XOODQÕPÕ...27 <DSÕODQøúOHPOHUL.DOÕFÕ.ÕOPDN EK KÜTÜPHANELER: C-CLIENT B(7ø0 Dø/ø: PHP3 / PHP4 (ZEND) PHP nedir? ,0$3YH1173IRQNVL\RQODUÕ \64/)RQNVL\RQODUÕ POP3 SUNUCU: QPOPPER QPopper Nedir? Kurulum ve Dokümantasyon MTA YAZILIMI: SENDMAIL Elektronik Posta Sendmail Kurulumu...76.RQILJ UDV\RQGRV\DODUÕYHoDOÕúWÕUÕODELOLUGRV\DODU HQGPDLOND\ÕWGRV\DODUÕWXWXOPDVÕ UYGULAMA G(/øù7ø50( ORTAMI: HTML METOT Sø67(0ø1 A1$/ø=ø UREOHPLQ7DQÕPÕ...80 *HUHNVLQLP7DQÕPÕ Alternatif Çözümler Üretmek...81 *HoHUOLd ] P Q%XOXQPDVÕ...82 *HUHNOL<D]ÕOÕPYH'RQDQÕPÕQ7HGDULN(GLOPHVL...83 *HUoHNOHúWLULOHELOLUOLNdDOÕúPDODUÕ TASARIM LPDUL7DVDUÕP...86 $UD\ ]7DQÕPODUÕ...89 *LUGLdÕNWÕ7DVDUÕPÕ øolúnlvho9hulwdedqõ7dvduõpõ...105

4 3.3 G(5d(./(ù7ø5ø KAYNAKLAR EK A PROGRAMIN KAYNAK KODU EK B HTTPD.CONF DOSYASI EK C - SENDMAIL.MC VE SENDMAIL.CF DOSYASI EK D FIREWALL KODU EK E PHP.INI DOSYASI EK F *3//ø6$166g=/(ù0(6ø25ø-ø1$/ø EK G POSTACI NIN AYRINTILI KURULUM DOSYASI...174

5

6 Önsöz %X GRN PDQ 326,; X\XPOX LúOHWLP VLVWHPLQH VDKLS ELU PDNLQDGD 323->Web Gateway \D]ÕOÕPÕ RODQ 3RVWDFÕQÕQ WDVDUÕP DúDPDVÕQGDQ JHOLúWLULOPHVL OLVDQVÕ GD ÕWÕPÕ JLEL NRQXODUÕ içermektedir. %X\DSÕVÕLOHSURMHND\QDNNRGXDoÕNYHWDPDPHQ FUHWVL]ELU\D]ÕOÕPROPDVÕQDUD PHQ*3/ /LVDQVÕ 1 LOH NRUXQPDNWD YH OLVDQVWD DoÕNoD EHOLUWLOHQ úhnloohugh GD ÕWÕPÕ \DSÕODELOPHNWHGLU 6D ODQÕODQEXGRN PDQWDV\RQGDVLVWHPLD\UÕQWÕOÕRODUDNWDQÕPODPDNWDYHDoÕNODPDNWDGÕU 1 Bkz : Ek F *3/ /LVDQV 6 ]OHúPHVL - Richard Stallman

7 *LULú g]hoolnoh VRQ \HGL \ÕOGD NXOODQÕPÕ orn KÕ]OÕ ELU úhnlogh DUWDQ,QWHUQHW EX NRQX\D HO DWPÕú E \ NILUPDODUYHGÕú ONHOHULQ7 UNL\H ]HULQGHNLWHNQRORMLNEDVNÕODUÕVD\HVLQGHWDQÕQDQYH NXOODQÕODQ ELU RUWDP GDKD orn ELU PHFEXUL\HW KDOLQH JHOPLúWLU 7HNQRORMLGHNL EX KÕ]OÕ JHOLúPH\H D\DN X\GXUPDN LVWH\HQ SHN orn NLúL VLVWHPH GDKLO ROPDN \D GD HQ D]ÕQGDQ kartvizitinde adresinin görünmesini istemektedir..xoodqõfõoduõqõqõqvdghfheholuol X\JXODPDODUÕ NXOODQDELOGLNOHUL G ú Q O UVH H-PDLO DOPD YH J QGHUPH LúOHPLQLQ 2XWORRN ([SUHVV 1HWVFDSH 0DVVHQJHU.PDLO %HPDLO JLEL PDVD VW \D]ÕOÕPODU LOH \DSÕOPDVÕ NLPL \HQL NXOODQÕFÕODU WDUDIÕQGDQ orn ]RU \D GD LPNDQVÕ] RODUDN QLWHOHQGLULOPHNWHGLU 3HN orn X]PDQ NXOODQÕFÕ LVH VH\DKDW KDOLQGH\NHQ H-PDLOODUÕQD NROD\FD XODúDELOHFHNOHUL ELU ZHE DUD \ ] LVWHPHNWHGLU %DKVHGLOHQ VHEHSOHUGHQ GROD\Õ PDLO-!ZHE JDWHZD\ \D]ÕOÕPODUÕ <DKRR Altavista, Hotmail gibi dünya devi ILUPDODU WDUDIÕQGDQ NXOODQÕOPDNWD YH NXOODQÕFÕODU VHUYLV VD OD\ÕFÕODUÕQGDQEXKL]PHWLEHNOHPHNWHGLU $QDOL] YH WDVDUÕP odoõúpdoduõ VRQXFXQGD HOGH HGLOHQ YHULOHU GR UXOWXVXQGD VLVWHP ROXúWXUXOPXúYHNRGODQPDVÕLoLQRUWDPDUDúWÕUPDODUÕQDEDúODQPÕúWÕU%XQXn için seçilen ortam ornnxoodqõfõoõyhornlúohpoleluruwdpropdoõgõu6lvwhplq,qwhuqhw ]HULQGHKL]PHWYHUPHVL VHoLOHFHNSODWIRUPXQ,QWHUQHWYH\HUHOD GHVWH LVXQPD ]HOOLNOHULQLWDúÕPDVÕ]RUXQOXOX XQX JHWLUPLúWLU /LQX[ JLEL NXOODQÕPÕ JLWWLNoH \D\JÕQODúDQ VWDELO YH JHOLúPH\H DoÕN ELU VLVWHP ]HULQGH JHUoHNOHúWLULOHQ EX SURMH \LQH /LQX[ LoLQ JHOLúWLULOPLú 0\64/ DGOÕ YHULWDEDQÕ \D]ÕOÕPÕQÕ NXOODQPDNWDGÕU.XOODQÕODQ :HE VXQXFX \D]ÕOÕPÕ \LQH 81,; VLVWHPOHU LoLQ JHOLúWLULOPLú YH G Q\DGD RUDQÕQGD NXOODQÕODQ $SDFKH :HE VXQXFX \D]ÕOÕPÕGÕU $VOÕQGD SURJUDPÕQ ZHE VXQXFX ED ÕPOÕOÕ Õ EXOXQPDPDNWD ROXS 3+3 \H GHVWHN YHUHQ =HXV 5R[HQ,,6 3:6 JLEL E W QZHEVXQXFXODUGDWHRULNWHoDOÕúPDVÕP PN QG U323VXQXFXRODUDN\LQHG Q\DQÕQHQ popüler POP3 sunucx\d]õoõpõrodq4srsshuyh07$rodudngdeluvwdqgduwrodq6hqgpdlo NXOODQÕOPÕúWÕU 3URJUDP EX LNL ELOHúHQH GH ED ÕPOÕ ROPD\ÕS 5)& VWDQGDUWODUÕQD uygun KHUKDQJLELU323YH07$\D]ÕOÕPÕ\ODoDOÕúDELOLU 3URJUDPÕQ JHOLúWLULOPHVL DúDPDVÕQGD 323 VXQXFXGDQ ler çekilmesi ve MTA ile e- PDLOODUÕQ J QGHULOPHVL VÕUDVÕQGD DOW VHYL\H NRGX \HQL EDúWDQ LPSOHPHQWH HWPHPHN FRRNLH \ROXLOHJ YHQOLNVD ODQPDVÕYHULWDEDQÕED ODQWÕVÕJLELNRQXODUGDELUVXQXFXWDUDIEHWLPOHPH GLOLRODQ3+3NXOODQÕOPÕúWÕU3+3QLQH-PDLOSURWRNROOHULLOHED ODQWÕVÕQÕVD ODPDNDPDFÕLOH GH,0$3 LOH ELUOLNWHJHOHQ&N W SKDQHEDúOÕNGRV\DODUÕQGDQID\GDODQÕOPÕúWÕU%DKVL JHoHQ&EDúOÕNGRV\DODUÕQDC-FOLHQWN W SKDQHGRV\DODUÕDGÕYHULOPHNWHGLU <D]ÕOÕPÕQNXUXOGX XVXQXFXGDNXOODQÕFÕODUÕQHQ ]HOELOJLOHULQLQGH\HUDODELOHFH LH-PDLOODUÕ WXWXOPDNWD YH EXQD ELU DUD\ ] JHOLúWLULOPHVL WHPHO DPDo ROGX X LoLQ EX VXQXFXQXQ KDFNHU VDOGÕUÕODUÕQGDQ NRUXQPDVÕ NXOODQÕFÕODUÕQ PDKUHPL\HWL DoÕVÕQGDQ orn QHPOL ROPDNWDGÕU Sunucu üzerinde biu ILUHZDOO \D]ÕOÕPÕ JHOLúWLULOPHVL GH PHFEXUL ELU XQVXUGXU %X DPDoOD KHPHQ KHPHQ E W Q /LQX[ V U POHUL LOH EHUDEHU JHOHQ LSFKDLQV DGOÕ SRUW ILOWUHOHPH YH \ QOHQGLUPH SURJUDPÕ NXOODQÕOPÕúWÕU.XOODQÕODQ ILUHZDOO XQ NRGX LVH (N ' GH EXOXQPDNWDGÕU YukarÕGD EDKVHGLOHQ ELOHúHQOHUGHQ ROXúDQ VLVWHP JHUHN \HUHO D ODU LoLQ JHUHNVH,QWHUQHW X\JXODPDODUÕ LoLQ JD\HW X\JXQ YH J YHQOL ELU RUWDP ROXúWXUPDNWDGÕU 6LVWHP ELOHúHQOHUL ND\QDNNRGODUÕDoÕNYHDODQODUÕQGDNHQGLOHULQLLVSDWODPÕúGHQHQPLú\D]ÕOÕPODUGÕU

8 %LUELUOHUL\OH X\XPOX ROPD ]RUXQOXOX X WDúÕ\DQ EX \D]ÕOÕPODU DUDVÕQGDNL X\XP YH ELUOLNWH odoõúdeloluolnexyhehq]hulsurmhohughkd\dwl QHPWDúÕU%XX\XPXVD ODPDNDPDFÕ\ODSURMH V UHVLQFH SHN orn GHQHPH YH DUDúWÕUPD \DSÕOPÕúWÕU (Q X\JXQ RUWDP ]HULQGH, en verimli úhnloghvlvwhplqodoõúpdvõkhghiohqplúwlu

9 2. Materyal øúohwlp6lvwhpl5hg+dw*18/lqx[ Linux nedir? Linux VHUEHVWoH GD ÕWÕODELOHQ orn J UHYOL orn NXOODQÕFÕOÕ 81,; LúOHWLP VLVWHPi türevidir. /LQX[,QWHUQHW ]HULQGH LOJLOL YH PHUDNOÕ ELUoRN NLúL WDUDIÕQGDQ RUWDN RODUDN JHOLúWLULOPHNWH RODQYHEDúWD,%0-3&X\XPOXNLúLVHOELOJLVD\DUODUROPDN ]HUHELUoRNSODWIRUPGDoDOÕúDELOHQ YHKHUKDQJLELUPDOL\HWLROPD\DQELULúOHWLPVLVWHPLGLU UNIX OL\ÕOODUÕQRUWDODUÕQGDE \ NELOJLVD\DUODU ]HULQGHoRNNXOODQÕFÕOÕELULúOHWLPVLVWHPL RODUDNJHOLúWLULOPLúWLU=DPDQLoHULVLQGH\D\ÕOPÕúYHELUoRNW UHYLRUWD\DoÕNPÕúWÕU81,;LVPL 81,;5HVHDUFK/DERUDWRULHV,1&úLUNHWLQLQWHVFLOOLPDUNDVÕROGX XQGDQGROD\ÕELUoRNúLUNHW D\QÕWHPHOHGD\DQDQLúOHWLPVLVWHPOHULLoLQGH LúLNLVLPOHUNXOODQDJHOPLúOHUGLUgUQHNRODUDN Hewlett-Packard; HP-UX IBM; AIX Sun Microsystems; SUN OS NXOODQPDNWDGÕUODU%XJ QNLúLVHOELOJLVD\DUODUGDQV SHUELOJLVD\DUODUa kadar birçok bilgisayar LoLQ\D]ÕOPÕúEXOXQDQ81,;W UHYOHULPHYFXWWXU1HYDUNLEXW UHYOHULQoR XJHOLúLPLEHOLUOL ELUQRNWDGDGXUPXúYH\ NVHNIL\DWODVDWÕODQWLFDUL\D]ÕOÕPODUGÕU /LQX[ WHPHO RODUDN )LQODQGL\D hqlyhuvlwhvlqgh UHQFL RODQ /LQXV 7RUYDOGV ÕQ YH,QWHUQHW ]HULQGH PHUDNOÕ ELU orn \D]ÕOÕPFÕQÕQ NDWNÕODUÕ LOH JHOLúWLULOPLúWLU /LQX[ JHOLúLPL DoÕN ELU úhnlogh \DSÕOPDNWDGÕU %XQXQ DQODPÕ LúOHWLP VLVWHPLQLQ KHU DúDPDVÕ DoÕN RODUDN,QWHUQHW ]HULQGH \D\ÕQODQPDNWD G Q\DQÕQ G UW ELU \DQÕQGD NXOODQÕFÕODU WDUDIÕQGDQ WHVW HGLOPHNWH KDWDODUÕ YH HNVLNOLNOHUL WHVELW HGLOHUHN G ]HOWLOPHNWH YH JHOLúWLULOPHNWHGLU =DPDQ ]DPDQ EX GHQHPH DúDPDODUÕ EHOLUOL ELU QRNWDGD GXUGXUXOXU YH J YHQLOLU ELU LúOHWLP VLVWHPL VXQXOXS JHOLúWLUPH LoLQ D\UÕ ELU VHUL\H GHYDP HGLOLU *HOLúWLUPHGH \HU DODQ EX DoÕNOÕN /LQX[ XQ HQ E \ N DYDQWDMODUÕQGDQ ELULGLU *HOLúLPL HYULPVHOGLU KDWDODU DQÕQGD NXOODQÕFÕODU WDUDIÕQGDQ WHVELWHGLOLSUDSRUHGLOPHNWHYHELUoRNNLúLQLQNDWNÕVÕ\ODG ]HOWLOPHNWHGLU%D]ÕLúOHWLPVLVWHPL sürümleri saatler içerisinde güncellenebilmektedir. /LQX[ $QG\ 7DQQHQEDXP WDUDIÕQGDQ JHOLúWLULOPLú RODQ 0LQL[ LúOHWLP VLVWHPLQGHQ HVLQOHQLOPLúWLU/LQXV7RUYDOGVERú]DPDQODUÕQGD0LQL[WHQGDKDL\LELU0LQL[LúOHWLPVLVWHPL \DUDWPDN G ú QFHVL\OH $ XVWRV VRQODUÕQGD LON odoõúdq /LQX[ ohnlugh LQL ROXúWXUGX (NLP WDULKLQGH V U P /LQX[ LON GHID WDQÕWÕOGÕ /LQXV FRPSRVPLQL[ KDEHU JUXEXQD J QGHUGL L \D]ÕGD \HQL ELU LúOHWLP VLVWHPL JHOLúWLUPHNWH ROGX XQX YH LOJLOHQHQ KHUNHVLQ \DUGÕPÕQÕ EHNOHGL LQL \D]PÕúWÕ øúohwlp VLVWHPLQLQ ohnlugh L LoLQ YHULOHQ QXPDUDODU NÕVD V UHGH ELU VWDQGDUW ND]DQGÕ D[\ VHNOLQGHEHOLUWLOHQoHNLUGHN türevlerinde y bulunulan VHYL\H\L[JHOLúLPDúDPDVÕQÕJ VWHUPHNWHGLU7HNVD\ÕOÕ[OHUJHOLúWLUPHDúDPDODUÕQÕoLIWVD\ÕOÕ [ OHU LVH J YHQLOLU /LQX[ ohnlughnohulql J VWHUPHNWHGLUOHU D LVH GH LúLN /LQX[ V U POHULQL EHOLUWLU %X \D]ÕQÕQ KD]ÕUODQGÕ Õ 7HPPX] LoHULVLQGH HQ VRQ J YHQLOLU NDUDUOÕ /LQX[ ohnlugh LHQVRQJHOLúLPDúDPDVÕQGDNLoHNLUGHNLVHGXU(\lül 2000 e kadar da SHNoRN\HQLOLNLOHGROXV U P Q QoÕNPDVÕEHNOHQPHNWHGLU

10 2.1.2 Linux Kurulumu.XUXODFDN6LVWHPLQ$oÕOPDVÕ 5HG +DW &' VL ERRWDEOH\DQLGR UXGDQ&'GHQDoÕODELOLUGXUXPGDGÕU&'\HUOHúWLULOGLNWHQ sonra BIOS, CD' dendoõodfdnúhnloghd\duodqõuyhvlvwhp\hqlghqedúodwõoõu %LOJLVD\DU&' GHQDoÕOÕUDoÕOPD]DúD ÕGDNLHNUDQLOHNDUúÕODúÕOÕU %XDoÕOÕúHNUDQÕQGDQLWLEDUHQ\DSÕODELOHFHNOHUúXQODUGÕU.XUXOXPLoLQGH LúLN\ QWHPOHUEHOLUOHPHN )RQNVL\RQWXúODUÕQÕNXOODQDUDNGH LúLNNXUXOXPPHWRWODUÕKDNNÕQGDELOJLDOPDN $\UÕFDNXUXOXRODQ/LQX[VLVWHPLYDUYHDoÕOPÕ\RUVDEXQODUÕG ]HOWPHN RODELOLU%XHNUDQGDNXUXOXPDEDúODPDNLoLQ(QWHUWXúXQDEDVÕOÕU /LQX[ELUGHQoRNVDQDOHNUDQGHVWHNOHU+HUELUVDQDOHNUDQÕJ UHELOPHNLoLQ$OWWXúXYHELU klavye üzerinden F1-) DUDVÕQGD ELU WXúD EDVÕODELOLU 6LVWHP YDUVD\ÕODQ RODUDN $OW) NRPELQDV\RQXLOHJHOHQWW\DGOÕWHUPLQDOJ U QW OHQHFHNWLU.XUXOXPVÕUDVÕQGDGL HUHNUDQODU PHVDMODUÕJ VWHUPHNLoLQNXOODQÕOPDNWDGÕU.XUXOXPEDúODGÕNWDQVRQUDLONRODUDNHNUDQNDUWÕQÕWDQÕPD\DoDOÕúDFDNWÕU%XQXQDPDFÕ5HG +DW ÕQ V U P QGHQ LWLEDUHQ JUDILN RUWDPGD NXUXOXPX GHVWHNOHPHVL YH GR DO Rlarak da GHVWHNOHQHQELUHNUDQNDUWÕQDLKWL\DoGX\PDVÕGÕU *UDILNRUWDPDoÕOGÕNWDQVRQUDLONRODUDNGLOVHoLPL\DSÕOPDVÕLVWHQPHNWHGLU$úD ÕGDGLOVHoLP HNUDQÕJ U OPHNWHGLU

11

12 Klavye Seçimi $úd ÕGDNLHNUDQGDJ U OG JLELWXúOXVWDQGDUWNODY\HG ]HQLYEVHoHQHNOHUVHoLOHUHN 1H[WWXúXLOHELUVRQUDNLHNUDQDJHoLOLU

13 )DUH$\DUODUÕ Bir sonraki seçim, sistemdeki IDUH ohúlglqlq EHOLUOHQPHVLGLU /LVWHGH E W Q IDUH ohúlwohul PHYFXWROXSHQX\JXQRODQVHoHQHNLúDUHWOHQPHOLGLU

14 .XUXOXPD%DúODQPDVÕ %XDúDPD\DNDGDURODQDGÕPODUVLVWHPLQHQWHPHOGRQDQÕP ]HOOLNOHULQLQEHOLUOHQPHVLDPDoOÕ LGL%XDúDPDGDQVRQUDNXUXODFDNRODQSDNHWOHUVHoLOHFHNYHVDELWGLVNHNRS\DODQDFDNWÕU

15 Kurulum Seçenekleri 5HG+DW/LQX[NXUXOXPLúOHPLQLNROD\ODúWÕUPDNDPDFÕLOH*QRPHøVWHPFL.'(LVWHPFLJLEL KD]ÕUVHoHQHNOHULOHJHOLU *QRPHøVWHPFLVHoHQH LPDNLQHQLQELUPDVD VW ELOJLVD\DUÕRODUDNNXOODQÕODFD ÕQÕG ú QHUHN ELU HY NXOODQÕFÕVÕQÕQ LKWL\Do GX\DFD Õ ELOHúHQOHUL \ NOHU (Q EHOLUJLQ ]HOOL L LVH /LQX[ XQ standart arayüzlerinden Gnome yüklenmesidir..'( øvwhpfl VLVWHP LVH D\QHQ *QRPH JLEL ELU HY NXOODQÕFÕVÕQD KLWDS HGHUNHQ ; :LQGRZV arayüzü olarak Gnome yerine KDE yi yükler. 6HUYHUVHoHQH LELOJLVD\DUÕJ YHQOLELUVXQXFXROPDN ]HUHVDGHFHJHUHNOLELOHúHQOHULOHNXUDU 6XQXFXODU LoLQ \D]ÕODQ \D]ÕOÕPODU orn ohúlwol WHVWOHUGHQ JHoWL L YH /LQX[ XQ HQ \D\JÕQ NXOODQÕOGÕ ÕDODQROGX XLoLQVRQGHUHFHJ YHQOLGLU &XVWRP VHoHQH L YDUVD\ÕODQ D\DUODPDODUGDQ KHUKDQJL ELULVLQL X\JXQ J UPH\HQ YH VDGHFH LVWHGL LSDNHWOHUL\ NOHPHNLVWH\HQX]PDQNXOODQÕFÕODULoLQX\JXQELUo ] PG U Güncelleme seçenh L LVH HVNL ELU YHUVL\RQ 5HG +DW EXOXQDQ PDNLQHOHUGH KHUKDQJL ELU \HGHNOHPHJHUHNWLUPHGHQVLVWHPL\HQLV U PHJ QFHOOHPHNLoLQNXOODQÕOÕU 3RVWDFÕ LoLQ NXUXODQ VLVWHP VXQXFX DPDoOÕ NXOODQÕODFD Õ LoLQ HQ X\JXQ VHoHQHN 6XQXFX RODFDNWÕU

16 3DNHWOHULQ.XUXOPDVÕ %LU QFHNL HNUDQGD 6XQXFX VHoHQH L VHoLOGL L LoLQ.XUXOXP 3URJUDPÕ VXQXFX ]HULQGHNL SDUWLV\RQ D\DUODPDODUÕQÕ YH IRUPDWODPD\Õ NHQGLVL \DSDFDN YH DUGÕQGDQ GD EX VHoHQHN LoLQ YDUVD\ÕODQJHOHQSDNHWOHUL\ NOHPH\HEDúOD\DFDNWÕU

17 *18YHg]J U<D]ÕOÕP ³g]J U \D]ÕOÕP ]J UO NOHUL NRUXPD\D \ QHOLN ELU DNÕPÕQ DGÕGÕU øqjlol]fh GHNL ³IUHH V ]F Q QoLIWDQODPOÕROPDVÕQGDQGROD\ÕED]Õ\DQOÕúDQODPDODUROPDNWDGÕUg]J U\D]ÕOÕP FUHWVL]EHGDYDROPDN]RUXQGDGH LOGLU g]j U\D]ÕOÕPÕQWHPHOLQGHNXOODQÕFÕQÕQELU\D]ÕOÕPÕoDOÕúWÕUPDNRS\DODPDGD ÕWPDLQFHOHPH GH LúWLUPHYHJHOLúWLUPH ]J UO NOHUL\DWDU'DKDNHVLQYHDoÕNELULIDGH\OHNXOODQÕFÕODUDúX KDNODUWDQÕQPÕúWÕU +HUWXUOXDPDoLoLQSURJUDPÕoDOÕúWÕUPD ]J UO 3URJUDPÕQQDVÕOoDOÕúWÕ ÕQÕLQFHOHPHYHNHQGLJHUHNVLQLPOHULGR UXOWXVXQGDGH LúWLUPH ]J UO 3URJUDPND\QDNNRGXQDHULúLPEXQXQLoLQELU QúDUWWÕU <HQLGHQGD ÕWPDYHWRSOXPODSD\ODúPD ]J UO 3URJUDPÕJHOLúWLUPHYHJHOLúPLúKDOL\OHWRSOXPDGD ÕWPD ]J UO % \OHFH \D]ÕOÕP E W Q WRSOXP \DUDUÕQD JHOLúWLULOPLú ROXU. Program kaynak koduna HULúLPEXQXQLoLQGHELU QúDUWWÕU %LUSURJUDPE W QNXOODQÕFÕODUÕEXKDNODUÕQW P QHVDKLSROGXNODUÕ]DPDQ ]J UELU\D]ÕOÕP ROXU <DQL NRS\DODPD GH LúWLUPH D\QHQ \DGD GH LúWLUHUHN SDUD\OD VDWPD KHUNHVH YH KHU \HUGHGD ÕWPDEHGDYDYHUPH ]J UO NOHULQHVDKLSROPDOÕVÕQÕ]%X ]J UO NOHUHVDKLSROPDN NLPVHGHQL]LQDOPDPD\ÕYHL]LQLoLQKLoELUEHGHO GHPHPH\LGHLoHULU $\UÕFD SURJUDPGD KHU W UO GH LúLNOLN \DSÕODELOLU YH EX KDOL\OH LúWH YH\D H OHQFH DPDoOÕ NXOODQÕOPD\D GD RODQDN WDQÕU +DWWD EX GH LúLNOLNOHULQ YDUOÕ ÕQÕQ NLPVH\H ELOGLULOPHVL ]RUXQOXOX XQX GD JHUHNWLUPH] 'H LúLNOLNOHULQ \D\ÕQODQPDVÕYH\DGD ÕWÕOPDVÕKDOLQGHGHKLo NLPVH\HKLoELUúH\ELOGLULOPHVLJHUHNOLGH LOGLU *HOLúWLUPH YH GD ÕWPD ]J UO NOHULQLQ DQODPOÕ ROPDVÕ LoLQ SURJUDPÕQ ND\QDN NRGXQD HULúHELOPHVL JHUHNLU %X QHGHQOH ND\QDN NRGXQXQ DoÕN YH NROD\ HULúLOHELOLU ROPDVÕ ]J U \D]ÕOÕPLoLQJHUHNOLELUúDUWWÕU $QFDN ]J U \D]ÕOÕPÕQ GD ÕWÕPÕQGD ED]Õ NXUDOODU NRQPDVÕ GD RODQDNOÕGÕU %X NXUDOODUÕQ yukarõgd EHOLUWLOHQ WHPHO ]J UO NOHUOH oholúphphvl JHUHNLU guqh LQ CCFRS\OHIW NDYUDPÕ EDVLWoH V \OH\HFHN ROXUVDN úx NXUDOÕ NR\DU 3URJUDPÕ KHUKDQJL ELU ELoLPGH GD ÕWÕUNHQ NXOODQÕFÕODUÕQ WHPHO ]J UO NOHUL NÕVÕWODQDPD] $oõnod J U OG JLEL EX NXUDO WHPel ]J UO NOHUOHoHOLúPHPHNWHWDPWHUVLQHRQODUÕNRUXPDNWDGÕU 'H LúWLULOPLú ELU SURJUDPÕQ SDNHWOHQPHVL NRQXVXQGD GD ED]Õ NXUDOODU NRQDELOLU $QFDN EX NXUDOODU GH LúLNOLNOHUL YH GD ÕWÕPÕ HQJHOOH\HFHN ELoLPOHUH E U QHPH] $\UÕFD ³3URJUDP EX úhnlogh GD ÕWÕOÕUVD úx úhnlogh GH GD ÕWÕPÕ VD ODQPDOÕGÕU W U QGH NXUDOODU GD X\JXQ RODELOLU $\QÕWHPHOLONHOHUEXGXUXPGDGDJHoHUOLGLU'LNNDWHGLOPHVLJHUHNHQELUQRNWDGDSURJUDPÕQ KLoGD ÕWÕOPDPDVÕNRQXVXQGDWDQÕQDQ ]J UO NW U *18 3URMHVL odoõúdqoduõ ³FRS\OHIW NXUDOODUÕQÕ NXOODQPDNWDGÕU %XUDGDNL DPDo KHUNHVLQ ]J UO NOHULQL\DVDOoHUoHYHGHNRUXPDNWÕU2QODUDJ UHSURJUDPODUÕEX\ QWHPOHNRUXPDNHQ X\JXQ\ROGXU$PDSURJUDPFRS\OHIWLOHNRUXQPD\DQ ]J UELU\D]ÕOÕPLVHGHNXOODQÕOPDN istenmeyebilir.

18 Ba]HQ GHYOHWOHULQ NR\GX X GÕúVDWÕP NXUDOODUÕ YH WLFDUHW DPEDUJRODUÕ \D]ÕOÕPÕQ XOXVODUDUDVÕ DODQGD GD ÕWÕOPDVÕQÕ HQJHOOH\HELOLU 1H \D]ÕN NL \D]ÕOÕP JHOLúWLUHQOHU EX NXUDO YH \DVDODUÕ GHOPH ]J UO QH VDKLS GH LOGLUOHU $QFDN ELU SURJUDPÕQ NXOODQÕOÕú ELoLmi ile ilgili yasal G ]HQOHPHOHUHNDUúÕJHOPHNKDNODUÕYHJ UHYOHULGLU% \OHFHV ]NRQXVXGHYOHWOHULQ\DVDPD DODQÕGÕúÕQGDNDODQNXOODQÕFÕODUÕQKDNODUÕRODQDNODUoHUoHYHVLQGHNRUXQPXúROXU

19 9HULWDEDQÕ0\64/ Günümüzde vhulwdedqõ KHU LQVDQÕQ \DúDPÕQÕQ ELU SDUoDVÕ ROPXúWXU 9HULWDEDQÕ NDYUDPÕ ROPDGDQ \DSÕODQ KHU Lú orn FDQ VÕNÕFÕ ELU GXUXP DOPDNWD YH KDWWD ED]Õ LúOHUL \DSPDN RODQDNVÕ] KDOH JHOPHNWHGLU %DQNDODU QLYHUVLWHOHU YH N W SKDQHOHU YHULWDEDQÕ VLVWHPOHULQH \R XQ RODUDN ED OÕ RODQ RUJDQL]DV\RQODUD UQHN RODUDN J VWHULOHELOLU,QWHUQHW WH LVH DUDPD PRWRUODUÕ RQOLQH DOÕúYHULú YH KDWWD ZHE VLWHVL LVLPOHQGLUPH NXUDOODUÕ ZHEVLWH QDPLQJ FRQYHQWLRQKWWSZZZELUYHULWDEDQÕROPDGDQLPNDQVÕ]KDOHJHOPHNWHGLUBir bilgisayar ]HULQGHJHUoHNOHúWLULOHQYHDUD\ ]HGLOHQELUYHULWDEDQÕQDYHULWDEDQÕVXQXFXVXDGÕYHULOLU 64/ 6WUXFWXUHG 4XHU\ /DQJXDJH úx DQ G Q\DGDNL HQ SRS OHU YH VWDQGDUWODúPÕú ELU YHULWDEDQÕ GLOLGLU 3D]DUGDNL KÕ]OÕ 64/ YHULWDEDQÕ VXQXFXODUÕQGan birisi de, T.c.X. Data.RQVXOW$%WDUDIÕQGDQJHOLúWLULOHQPXOWL-user ve multi-threaded özelliklerine sahip MySQL' GLU 0\64/ ELU VXQXFX GDHPRQ RODQ P\VTOG YH orn VD\ÕGD IDUNOÕ LVWHPFL SURJUDP YH N W SKDQHOHULLoHUHQELULVWHPFLVXQXFXJHUoHNOHúWLULPLGLU0\64/WLFDULYH ]HONXOODQÕPODU LoLQ FUHWVL]GLU 0\64/ LOH KD]ÕUODQDQ EX X\JXODPDODUÕ JHOLúWLUPHN LoLQ 0\64/ LQ OLVDQV E O P QHEDNÕOPDVÕJHUHNLU 0\64/ LQ WHPHO DYDQWDMODUÕ KÕ]Õ J F YH NXOODQÕP NROD\OÕ ÕGÕU 0\64/ LQ JHOLúWLULOPH nedeni gerohnwhxfx]grqdqõp ]HULQGHGL HUYHULWDEDQÕVDWÕFÕODUÕQGDQGDKDKÕ]OÕELUúHNLOGH E \ NYHULWDEDQODUÕLOHEDúDoÕNDELOHFHNELU64/VXQXFX\DGX\XODQLKWL\DoWÕU 0\64/ LQ WHPHOL \ÕOODUGÕU UHWLP ohyuhvlqgh \ NVHN RUDQGD WDOHS J UHQ ELU GL]L \RUGDPD GD\DQPDNWDGÕU+DODJHOLúWLUPHDOWÕQGDROPDVÕQDUD PHQ0\64/]HQJLQYHoRN\DUDUOÕELU IRQNVL\RQN PHVLVXQPDNWDGÕU MySQL' in temel yeteneklerini özetleyecek olursak; -(ú]dpdqoõvõqõuvõ]vd\õgdnxoodqõfõlohedúhgheloph\hwhqh L -ND\ÕWLOHEDúHGHELOPH\HWHQH L -drnkõ]oõehonlghsd]dugdnlhqkõ]oõnrpxwlúohph -+Õ]OÕYHYHULPOLNXOODQÕFÕ\HWNLOHQGLUPHVLVWHPL $PDPXKWHPHOHQHQLOJLQo ]HOOL L0\64/LQ FUHWVL]ROPDVÕGÕU7F;0\64/LKHUNHVH DoÕN FUHWVL]ELU U QRODUDNVXQDU2]DPDQ0\64/LNLPOHUNXOODQÕ\RU" %XYHULWDEDQÕVXQXFXDQRQLPúLUNHWoHYUHOHULQGHE \ NWDOHSJ UP úw U%XQODUGDQED]ÕODUÕ Silicon Graphics (http://www.sgi.com) Siemens (http://www.siemens.com) 'DKDE \ NELUNXOODQÕFÕOLVWHVLQH0\64/NXOODQÕFÕOLVWHVLQGHQXODúÕODELOLU +D]ÕUODQPÕúRODQEXSURMHGH0\64/NXOODQÕODQEDúOÕNODUúXúHNLOGHVÕUDODQDELOLU Sanal e-pdlogl]lqohulroxúwxupdyhh-mail saklama Adres Defteri Not Defteri Bookmark yöneticisi 6DQDODODQDGÕ\ QHWLPL.XOODQÕFÕ%LOJLOHUL Ka\ÕW'RV\DODUÕ

20 2.3 Apache Sunucu $SDFKH ND\QDN NRGX DoÕN ELU FUHWVL] ZHE VXQXFX \D]ÕOÕPÕGÕU 6WDELO V U P RODQ [ /LQX[ 6RODULV 'LJLWDO 8QL[ $,; JLEL SHN orn 8QL[ WDEDQOÕ VLVWHPH YH 8QL[326,; WHQ W UHPLú5KDSVRG\%H26%626'JLEL8QL[326,;GHQW UHPLúVLVWHPOHUHGHGHVWHN YHUPHNWHGLU$\UÕFD$PLJD26YHGHVWHNYHULOPHVHGH:LQGRZV[17YHUVL\RQODUÕGD mevcuttur. ' Q\D ]HULQGH NXOODQÕODQ ZHE VXQXFXODUÕQÕQ UHVPL LVWDWLVWL LQL \DSDQ ELU NXUXOXú RODQ 1HWFUDIW ÕQ KWWSZZZQHWFUDIWFRP WH \DSWÕ Õ DUDúWÕUPD\D J UH G Q\D ]HULQGH $SDFKH QLQ NXOODQÕP QLQ ]HULQGHGLU 0LFURVRIW WDEDQOÕ VLVWHPOHU JLWWLNoH SRS OHU ROPDVÕQDUD PHQ\LQHGH$SDFKHQLQSRS ODULWHVLQLHQJHOOHPHPHNWHGLU Apache' nin Temin Edilmesi Apache' nlq VRQ YHUVL\RQX KDNNÕQGD ELOJL KWWSZZZDSDFKHRUJ DGUHVLQGHNL $SDFKH ZHE VXQXFXGD EXOXQDELOLU ùx DQGDNL \D\ÕPÕ YH JHoPLú EHWD-WHVW \D\ÕPODUÕ PLUURU ZHE YH IWS VLWHOHULLOHEHUDEHUEXUDGDOLVWHOHQPHNWHGLUdR X]DPDQHQVRQYHUVL\RQ$SDFKHEHNOHQGL i kadar iyi sonuç vermez. Yerine en son versiyon stabil sürümün temin edilmesi sorunsuz ve J YHQOLELUVXQXFXLoLQWHPHOúDUWWÕU Apache' nin Derlenmesi $SDFKH QLQ GHUOHQPHVL o DGÕPGDQ ROXúXU øonrodudnvxqxfxgdexoxqpdvõlvwhqhq$sdfkh modülleulqlq VHoLOPHVL JHUHNLU $UGÕQGDQ LúOHWLP VLVWHPL LoLQ ELU D\DUODPD \DUDWÕOÕU 6RQ RODUDNoDOÕúWÕUÕODELOLUGRV\DGHUOHQLU ASDFKHQLQW PD\DUODPDVÕ$SDFKH\D\ÕPÕQÕQVUFGL]LQLQGH\DSÕOÕU &RQILJXUDWLRQ GRV\DVÕQGD $SDFKH \H GHUOHQHFHN PRG OOHU VHçilir. Bu seçimli SDUDPHWUHOHUOH LOLúNLOL VDWÕUODU GRV\DQÕQ VRQXQGDNL $GG0RGXOH VDWÕUODUÕQGD \HU DOPDNWDGÕU DoÕNODPDVDWÕUÕGXUXPXQGDQNDOGÕUÕOÕUYH\D\D]ÕODQ\DGDLQGLULOHQ HNVWUD PRG OOHUOH LOLúNLOL RODUDN \HQL VDWÕUODU HNOHQLU $SDFKH PRG OOHULQLQ QDVÕO \D]ÕODFD Õ KDNNÕQGD Q ELOJL KWWSZZZDSDFKHRUJGRFVPLVF$3,KWPO VD\IDVÕQGDQ HGLQLOHELOLU øohul NXOODQÕFÕODU ED]Õ YDUVD\ÕODQ PRG OOHUH LKWL\DoODUÕQÕQ ROPDGÕ ÕQD NDUDU YHULUOHUVH EXQODUÕ \RUXP VDWÕUÕ KDOLQH JHWLUHELOLUOHU ( HU KHUKDQJL ELU 5XOH VDWÕUÕ HNOHPHN LVWHQLU LVH &RQILJXUDWLRQ GRV\DVÕQGDNL NRPXWODUÕQRNXQPDVÕJHUHNPHNWHGLU.XOODQÕODQLúOHWLPVLVWHPLLoLQ$SDFKHQLQNRQILJ UDV\RQXQGDQRUPDOGHVDGHFHDúD ÕGDNL &RQILJXUHEHWLPLQLQoDOÕúWÕUÕOPDVÕJHUHNLU)DNDWEXEDúDUÕVÕ]OÕNODVRQXoODQÕUVDYH\DED]Õ ]HO JHUHNVLQLPOHUROXUVD U3RVWDFÕ3+3VX-exec modüllerine gereksinim duyar) Configuration GRV\DVÕQGD (;75$B&)/$*6 /,%6 /')/$*6,1&/8'(6 VHoHQHNOHUGHQ ELU YH\D GDKD ID]ODVÕG ]HQOHQPHOLGLU

21 &RQILJXUHEHWLPLQLoDOÕúWÕUÕOÕQFDDúD ÕGDNLQHEHQ]HUELUoÕNWÕDOÕQÕU % Configure Using 'Configuration' as config file + configured for <whatever> platform + setting C compiler to <whatever> * + setting C compiler optimization-level to <whatever> * + Adding selected modules + doing sanity check on compiler and options Creating Makefile in support Creating Makefile in main Creating Makefile in os/unix Creating Makefile in modules/standard %X EHWLP DGÕPGD NXOODQÕOPDN ]HUH ELU 0DNHILOH ROXúWXUXU $\UÕFD VHoLPOL GHVWHN SURJUDPODUÕQGHUOHQPHVLLoLQGHGHVWHNGL]LQLQGHELU0DNHILOH\DUDWÕU ( HU ELUGHQ orn NRQILJ UDV\RQ NRUXPDN LVWHQLUVH &RQILJXUDWLRQ D DOWHUQDWLI ELU &RQILJXUDWLRQ GRV\DVÕQGDQ RNXPD \DSPDVÕQÕ VD ODPDN LoLQ ELU VHoHQHN YHULOHELOLU U Configure -file Configuration.ai). PDNH\D]ÕOÕU Apache' nin Kurulumu VUF GL]LQLQL]GH KWWSG DGOÕ ELU ELQDU\ GRV\D RODFDNWÕU $SDFKH QLQ ELQDU\ ELU NRS\DVÕ EX GRV\D\Õ EHUDEHULQGH JHWLUHFHNWLU %LU VRQUDNL DGÕP SURJUDPÕQ NXUXOPDVÕ YH NRQILJ UDV\RQXQXQ \DSÕOPDVÕGÕU $SDFKH GHUOHQGL L GL]LQOHUGH NRQILJ UH HGLOHELOHFHN YH odoõúwõuõodelohfhn úhnlogh WDVDUODQPÕúWÕU ( HU EDúND ELU \HUGH odoõúwõupdn LVWHQLUVH ELU GL]LQ \DUDWÕOÕUFRQIORJVYHLFRQVGL]LQOHULEXQXQLoLQHNRS\DODQÕU+HULNLGXUXPGDGDVXQXFXGDNL kök dizinindenll]lqohulqqdvõodwdqdfd ÕQÕWDQÕPOD\DQJ YHQOLNLSXoODUÕQÕQRNXQPDVÕJHUHNLU 'DKD VRQUD VXQXFX LoLQ FRQILJXUDWLRQ GRV\DODUÕQÕQ G ]HQOHQPHVL JHUHNLU %X o PHUNH]L FRQILJXUDWLRQ GRV\DVÕQD ohúlwol WDOLPDWODUÕQ NXUXOPDVÕQÕ NDSVDU VUPFRQI DFFHVVFRnf ve KWWSGFRQIDGÕQGDNLEXGRV\DODUYDUVD\ÕODQRODUDNFRQIGL]LQLQGH\HUDOÕU%DúODUNHQ\DUGÕP DPDFÕ\ODGD ÕWÕPÕQFRQIGL]LQLQGHEXGRV\DODUÕQD\QÕODUÕQGDQPHYFXWWXUYHLVLPOHULVUPFRQIdist, access.conf-dist ve httpd.conf-dist olarak geçmektedir. -dist' siz olarak bu dosyalar NRS\DODQDELOLU YH\D LVLPOHUL GH LúWLULOHELOLU $UGÕQGDQ EX GRV\DODUÕQ KHU ELUL G ]HQOHQLU %X GRV\DODUÕQ GR UX ELU úhnlogh NXUXOPDPDVÕ VXQXFXQXQ HPQL\HWVL] ROPDVÕQD \D GD odoõúpdpdvõqgd \RO DoDELOLU FRQI GL]LQLQGHNL ELU GL HU GRV\D RODQ PLPHW\SHV GRV\DVÕQÕQ JHQHOOLNOHG ]HQOHQPH\HLKWL\DFÕ\RNWXU øonrodudnkwwsgfrqigrv\dvõqõg ]HQOHQLU%XVXQXFXKDNNÕQGDNLJHQHOQLWHOLNOHULNXUDUSRUW QXPDUDVÕ odoõúpdvõqõ VD OD\DQ NXOODQÕFÕ YV $UGÕQGDQ VUPFRQI GRV\DVÕQÕ G ]HQOHQLU; bu, GRN PDQD DFÕQÕQN N Q VXQXFXWDUDIÕQGDQLúOHQHQ+70/YH\DLoVHOLPDJHPDSLúOHPHJLEL ]HOIRQNVL\RQODUÕYVNXUDU6RQRODUDNHULúLPLQHQWHPHOKDOLQLEHOLUOHPHNLoLQDFFHVVFRQI GRV\DVÕG ]HQOHQLU %X o GRV\D\D HN RODUDN VXQXFXQXQ GDYUDQÕúÕ VXQXFXQXQ HULúWL L GL]LQOHUGHNL KWDFFHVV GRV\DODUÕNXOODQÕODUDNELUGLUHFWRU\-by-GLUHFWRU\WHPHOL ]HULQHNRQILJ UDV\RQX\DSÕODELOLU

22 6LVWHPVDDWLQLQD\DUODQPDVÕ *HQHO ELU ZHE VXQXFXQXQ GR UX odoõúpdvõ LoLQ ]DPDQÕ GR UX ELU úhnlogh NRUXPDVÕ JHrekir. d QN +773 SURWRNRO Q Q HOHPDQODUÕ J Q FLQVLQGHQ LIDGH HGLOLU %XQGDQ GROD\Õ 8QL[ WH 173YH\DGL HUHú]DPDQODPDVLVWHPOHULQLQNXUXOXPXQXQDUDúWÕUÕOPDVÕJHUHNLU 6XQXFXQXQdDOÕúWÕUÕOPDVÕYH6RQODQGÕUÕOPDVÕ 6XQXFXQXQ EDúODWÕOPDVÕ LoLQ EDVLWoH KWWSG QLQ odoõúwõuõopdvõ JHUHNLU %X NRGXQ GHUOHQGL L GL]LQGHKWWSGFRQIGRV\DVÕQÕDUD\DFDNWÕUYDUVD\ÕODQRODUDNXVUORFDODSDFKHFRQIKWWSGFRQI ( HU EX GRV\D EDúND ELU \HUGH\VH -I SDUDPHWUHVL\OH JHUoHN \HU YHULOHELOLU guqh LQ /usr/local/apache/httpd -f /usr/local/apache/conf/httpd.conf +HU úh\ \ROXQGD JLGHUVH EXQXQ DUGÕQGDQ NRPXW VDWÕUÕ JHOHFHNWLU YH EX GXUXP VXQXFXQXQ D\DNWD YH odoõúõ\ru ROGX XQXQ ELU J VWHUJHVLGLU 6XQXFXQXQ LQLWLDOL]DWLRQ X V UHVLQFH ELU úh\ohuwhuvjlghuvhhnudqgdelukdwdphvdmõj U QHFHNWLU6XQXFXGR UXELUúHNLOGHEDúODUVD WDUD\ÕFÕ VXQXFX\D ED ODQPD YH GRN PDQWDV\RQX RNXPD DPDoOÕ NXOODQÕODELOLU ( HU D\QÕ PDNLQDGD VXQXFX RODUDN WDUD\ÕFÕ\Õ odoõúwõuõoõ\ru YH QXPDUDOÕ SRUW YDUVD\ÕODQ SRUW RODUDN NXOODQÕOÕ\RUVDWDUD\ÕFÕ\D\D]ÕODELOHFHNX\JXQELU85/KWWSORFDOKRVWúHNOLQGHGLU 6XQXFX odoõúpd\d EDúODGÕ ÕQGD LVWHNOHUL \HULQH JHWLUHELOHFHN ELU GL]L FKLOG SURFHVV OHU \DUDWDFDNWÕU $SDFKH URRW NXOODQÕFÕ RODUDN EDúODWÕOÕUVD FKLOGUHQ KWWSGFRQI GRV\DVÕQGD veulohqhj UHNXOODQÕFÕ\ÕGH LúWLULUNHQSDUHQWSURFHVVURRWRODUDNoDOÕúPD\DGHYDPHGHFHNWLU KWWSG odoõúwõuõogõ ÕQGD ELU DGUHVH ED ODQPDN ELQG WD EDúDUÕVÕ] ROX\RUVD \D $SDFKH QLQ NXOODQPDVÕ LoLQ WDVDUODGÕ ÕQÕ] SRUWX EDúND ELU SURFHVV NXOODQÕ\RUGXU ya da httpd normal bir NXOODQÕFÕ RODUDN odoõúwõuõopõúwõu IDNDW Q GDKD DúD ÕVÕQGDNL ELU SRUWX NXOODQPD\D odoõúõ\rugxu UQH LQYDUVD\ÕODQSRUW %LU VLVWHP UHERRW XQGDQ VRQUD VXQXFXQXQ odoõúpd\d GHYDP HWPHVL LVWHQL\RUVD VLVWHPLQ EDúODQJÕoGRV\DODUÕQDKWWSGLoLQELUoD UÕPFDOOHNOHQPHOLGLUWLSLNRODUDNUFORFDOGRV\DVÕ YH\D UF1 GL]LQLQGHQ ELU GRV\D %X $SDFKH L URRW RODUDN DoDU %X \DSÕOPDGDQ QFH VXQXFXQXQ J YHQOLN YH HULúLP NÕVÕWODPDODUÕQÕQ GR UX ELU úhnlogh NRQILJ UDV\RQXQXQ yapõogõ ÕQGDQHPLQROXQPDVÕJHUHNLU Durmak için, Apache parent process' e bir TERM sinyali gönderir. Bu process' in PID' si logs GL]LQLQGHNLKWWSGSLGGRV\DVÕQD\D]ÕOÕUEDúNDELUúHNLOGHFRQILJXUHHGLOPHGL LV UHFHFKLOG SURFHVV OHU OG U OPH\H odoõúõopdpdoõgõu d QN EXQODU SDUHQW WDUDIÕQGDQ \HQLOHQHFHNWLU 6XQXFX\XGXUGXUDFDNWLSLNELUNRPXWúXúHNLOGHGLU kill -TERM `cat /usr/local/apache/logs/httpd.pid` $SDFKH NRPXW VDWÕUÕ VHoHQHNOHUL FRQILJXUDWLRQ YH ND\ÕW GRV\DODUÕ KDNNÕQGD GDKD ID]OD ELOJL için 6WDUWLQJ $SDFKH \H EDNÕODELOLU 'D ÕWÕN PRG OOHU WDUDIÕQGDQ GHVWHNOHQHQ W P $SDFKH WDOLPDWODUÕLoLQELUUHIHUDQVNLWDEÕ$SDFKHGLUHFWLYHVWLU

23 'HVWHN3URJUDPODUÕQÕQ'HUOHQPHVL <XNDUÕGDGHUOHQHQYHNRQILJ UDV\RQX\DSÕODQDQDKWWSGVXQXFX\DHk olarak, Apache bir dizi GHVWHN SURJUDPD VDKLSWLU %XQODU YDUVD\ÕODQ RODUDN GHUOHQPH]OHU 'HVWHN SURJUDPODUÕ GD ÕWÕPÕQVXSSRUWGL]LQLQGH\HUDOÕUODU'HVWHNSURJUDPODUÕGHUOHPHNLoLQEXGL]LQHJHoLOLUYH make komutu verilir. 6DQDO6XQXFX'HVWH LVirtual Hosting) 6DQDO VXQXFX WHULPL ELUGHQ ID]OD VXQXFXQXQ J U Q UGHNL VXQXFX LVLPOHULQL IDUNOÕODúWÕUDUDN ELUPDNLQH ]HULQGHEXOXQGXUXOPDVÕQGDQEDKVHGHUgUQH LQILUPDODULoLQELUZHEVXQXFX\X VDKLS ROGXNODUÕ DODQ DGODUÕQÕQ EXQODUD ZZZFRPSDQ\FRP ve olarak NXOODQÕFÕQÕQHNVWUD\ROELOJLVLQHJHUHNGX\PDGDQXODúDELOHFH LELUúHNLOGHSD\ODúWÕUÕOPDVÕDU]X edilen bir durumdur. Apache, IP-WDEDQOÕ VDQDO VXQXFXODUÕ GHVWHNOH\HQ ZHE VXQXFXODUGDQ biridlu $SDFKH QLQ YH VRQUDNL YHUVL\RQODUÕ KHP,3-WDEDQOÕ KHP GH LVLP-WDEDQOÕ VDQDO VXQXFXODUÕ YKRVWV ODUÕ GHVWHNOHU 6DQDO VXQXFXODUÕQ VRQUDNL GH LúLN úhnloohul ED]HQ LVLP- WDEDQOÕYH\D,3WDEDQOÕROPD\DQVDQDOVXQXFXODURODUDNGDJHoHU Ip 7DEDQOÕ6DQDO%XOXQGXUPD9LUWXDO+RVWLQJ IP-WDEDQOÕWHULPLQGHQGHDQODúÕOGÕ ÕJLELKHU,3-WDEDQOÕVDQDOVXQXFXLoLQVXQXFXIDUNOÕELU,3 DGUHVLQH VDKLS ROPDOÕGÕU %X ROD\ ELUGHQ orn D ED ODQWÕVÕQD VDKLS PDNLQH LOH YH\D ELUoRN LúOHWLPVLVWHPLWDUDIÕQGDQGHVWHNOHQHQVDQDODUD\ ]NXOODQÕPÕLOHVD ODQDELOLU $SDFKHQLQ,SWDEDQOÕ6DQDO%XOXQGXUPDøoLQ.XUXOXPX %LUoRNVXQXFX\XGHVWHNOH\HELOPHVLLoLQ$SDFKHQLQNRQILJ UDV\RQXQXQ\DSÕOPDVÕQGDLNL\RO YDUGÕU+HUVXQXFXDGÕLoLQD\UÕELUKWWSGGHDPRQoDOÕúWÕUÕODELOLU<DGDW PYLUWXDOKRVWODUÕ GHVWHNOH\HQWHNELUGHDPRQoDOÕúWÕUÕODELOLU %LUGHQoRNGDHPRQNXOODQÕODQ\HUOHU - * YHQOLN E OPH NRQXODUÕ YDUGÕU 0HVHOD FRPSDQ\ LQ FRPSDQ\ GHQ KLoELUNLúLQLQZHEGÕúÕQGDYHULOHULQLRNXPDVÕQÕLVWHPHGL i bir durumda, KHUELULIDUNOÕ8VHU*URXS/LVWHQYH6HUYHU5RRWD\DUODUÕLOHoDOÕúDQLNL GHDPRQDLKWL\DoYDUGÕU - 0DNLQDGDNLKHU,3DOLDVÕGLQOHQHUHNEHOOHNYHGRV\DWDQÕPOD\ÕFÕODUÕQÕQ JHUHNVLQLPOHUL ]DUDU J UPHGHQ JHUoHNOHúWLULOHELOLU 6DGHFH ZLOGFard" adresi veya belirli adresler dinlenebilir. Bu nedenle, herhangi bir nedenle belirli bir adresi dinlemeye ihtiyaç olursa, tüm belirli adreslerin dinlenmesi gereklidir. 7HNELUGDHPRQNXOODQÕODQ\HUOHU - KWWSGNRQILJ UDV\RQXVDQDOVXQXFXODUDUDVÕQGDSD\ODúÕODELOLU - 0DNLQHE \ NPLNWDUODUGDLVWH HFHYDSYHULU%XQHGHQOHD\UÕGHDPRQ ODUGDoDOÕúPDLOHROXúDFDNSHUIRUPDQVND\EÕ QHPOLRODELOLU

24 1. %LUGHQID]ODGDHPRQNXOODQÕOPDVÕ +HU VDQDO VXQXFX LoLQ D\UÕ ELU KWWSG NXUXOXPX \DUDWÕOÕU +HU NXUXOXPGD Geamon' un servis YHUHFH L,3 DGUHVL YH\D VDQDO VXQXFX VHoPHN LoLQ FRQILJXUDWLRQ GRV\DVÕQGD /LVWHQ GLUHNWLILQLNXOODQÕOÕUgUQH LQ Listen %LUPDNLQHDGÕ\HULQHELU,3DGUHVLNXOODQPDNWDYViye edilmektedir. 2. 6DQDOVXQXFXODUODWHNELUGDHPRQNXUXOPDVÕ %XUDGD DQD ELOJLVD\DU YH W P VDQDO VXQXFXODU LoLQ WHN ELU KWWSG LVWHNOHUL FHYDSOD\DFDNWÕU &RQILJXUDWLRQGRV\DVÕQGDNL9LUWXDO+RVWGLUHNWLIL6HUYHU$GPLQ6HUYHU1DPH'RFXPHQW5RRW ErrorLog ve TransferLog veya CustomLog configuration direktiflerine, her sanal sunucu için IDNOÕGH HUOHUDWDPDGDNXOODQÕOÕUgUQH LQ <VirtualHost ServerAdmin DocumentRoot /groups/smallco/www ServerName ErrorLog /groups/smallco/logs/error_log TransferLog /groups/smallco/logs/access_log </VirtualHost> <VirtualHost ServerAdmin DocumentRoot /groups/baygroup/www ServerName ErrorLog /groups/baygroup/logs/error_log TransferLog /groups/baygroup/logs/access_log </VirtualHost> +HPHQKHPHQKHUFRQILJXUDWLRQGLUHNWLIL9LUWXDO+RVWGLUHNWLILQLQLoLQHNRQDELOLUøVWLVQDODU ServerType, StartServers, MaxSpareServers, MinSpareServers, MaxRequestsPerChild, %LQG$GGUHVV /LVWHQ 3LG)LOH 7\SHV&RQILJ 6HUYHU5RRW 1DPH9LUWXDO+RVW YH ELUNDo EDúND GLUHNWLIGDKDROPDNWDGÕU ( HU VX(;(& ZUDSSHU NXOODQÕOPÕúVD 8VHU YH *URXS ELU 9LUWXDO+RVW GLUHNWLILQLQ LoLQGH NXOODQÕODELOLU

25 2.4 Firewall: Ipchains,SFKDLQV HJLULú Ipchains Nedir? Ipchains, Linux un IPv4 firewall kodunun ve BSD nin, ipfw paketinin bir türevi olan LSIZDGPSDNHWLQLQWHNUDU\D]ÕOPÕúKDOLGLU,3SDNHWOHULQLILOWUHOHQGLUPHNRQXVXQGDSL\DVDGDNL ELQOHUFH GRODUD VDWÕODQ EHQ]HUOHUL LOH D\QÕ NDOLWHGH VXQXODQ YH ohnlughn ]HUL /LQX[ DOWÕQGDoDOÕúDQ FUHWVL]ELU\D]ÕOÕPGÕU,SFKDLQVHVNLILUHZDOONRGXQGDNLGHIUDJPDQWDV\RQHNVLNOL LELWVD\DoODUÕQHNVLNOL L7&3 8'3,&03KDULFLQGHNLSDNHWOHULoLQGHVWH LQLQROPDPDVÕWHUVNXUDOODUWDQÕPODPDROPDPDVÕ E \ NGH LúLNOLNOHU\DSPDQÕQ]RUROPDVÕJLELQHGHQOHUGHQGROD\ÕRUWD\DoÕNPÕúWÕU,SFKDLQV LQ E W Q YHUVL\RQODUÕQGD EXQODUÕQ WDPDPÕQD GHVWHN YHULOPHNWH YH JHOHFHN YHUVL\RQODUGD GD 1$7JLELJHOLúPLú ]HOOLNOHUe de yer verilecektir Ipchains Nereden Bulunur? Ipchains KDNNÕQGD en son bilgilere ve D\QÕ ]DPDQGD HQ VRQ YHUVL\RQXQD DGUHVLQGHQ XODúÕODELOLU $\UÕFD EX G N PDQÕQ KD]ÕUODQPDVÕQGD HVDV ND\QDN RODUDN DOÕQDQ,3&KDLQV +2:72 \D GD DGUHVLQGHQ XODúPDN P PN QG U $\UÕFD G Q\D ]HULQGH,SFKDLQV ]HULQH odoõúdq NXOODQÕFÕ YH JHOLúWLULFLOHU LOH GLUHN LOHWLúLPH geçmek için ise e-posta listesi mevcuttur. Bu listeye üye olmak için DGUHVLQHLoLQGH³VXEVFULEH \D]ÕOÕELUPesaj göndermek yeterlidir Paket Filtreleme TCP/IP ve paketler %LU D GHNL E W Q SDNHWOHU SDNHWOHU KDOLQGH LOHWLOPHNWHGLU øohwlohfhn RODQ YHUL QFH EHOLUOL X]XQOXNWDSDNHWOHUHE O Q UYHDUGÕQGDQEXSDNHWOHULQKHUELULQLQEDúÕQDQHUHGHQJeldiklerini, QHUH\HJLWWLNOHULQLSDNHWLQWLSLYHEHQ]HUL\ QHWLPDPDoOÕELUNDoED\WYHULHNOHQLU3DNHWLQEX EDúOÕNNÕVPÕQDheaderJHUoHNWHYHULEXOXQDQDUNDNÕVPÕQDLVHbodyDGÕYHULOLU 7&3,3GHQLOHQSURWRNRO7&38'3JLELSHNoRNSURWRNRO QELUOHúLPLQGHQROXúXUYHKHUELU SURWRNRO Q NHQGLQH DLW ]HOOLNOHUL YDUGÕU guqh LQ ZZZ GH H-mail transferinde, telnet vb. SODWIRUPODUGDNXOODQÕODQ7&3SURWRNRO O HOVÕNÕúPDGL\HELOHFH LPL]ELUúHNLOGHLOHWLúLP NXUDUNLEXGDúXúHNLOGHELUNRQXúPD\DEHQ]Hr. %D ODQPDNLVWL\RUXP, 7DPDP%D ODQ, 7HúHNN UOHU. 3DNHW)LOWUHOHPH GH DQD PDQWÕN LVH JHOHQ KHU SDNHWLQ KHDGHU NÕVPÕQDEDNDUDNJHOHQSDNHWLQ QHROGX XQXQDQODúÕOPDVÕYHDUGÕQGDQGDKD QFHGHQEHOLUOHQPLúRODQNXUDOODUoHUoHYHVLQGHEX paketi verilebiohfhnwhsnlghqelulvllohd ÕUODPDNWÕU9HULOHELOHFHNWHSNLOHUúXQODUGÕU Deny *HOHQSDNHWLQJHoLúLQHNHVLQOLNOHL]LQYHUPHPHNWLU Accept *HOHQSDNHWLQJHoLúLQHL]LQYHUPHNWLU

An alternative creatinine reagent for the reagent-dependent Beckman Synchron CX3 analyzer

An alternative creatinine reagent for the reagent-dependent Beckman Synchron CX3 analyzer .LW%D ÕPOÕ%HFNPDQ6\QFKURQ&;$QDOL] U øolq$owhuqdwli Kreatinin Çözeltisi 'U øvpdlo 7HPHO 1, 'U $KPHW dõ OÕ 1, Dr. Yusuf Türköz 1, Dr. Elif Özerol 1, Dr. Engin M. Gözükara 1 %HFNPDQ 6\QFKURQ &; RWRDQDOL]

More information

0DODW\DøOLQGHNL*XDWUOÕ+DVWDODUGD6HUXPYHøGUDUø\RW' ]H\OHULøOH

0DODW\DøOLQGHNL*XDWUOÕ+DVWDODUGD6HUXPYHøGUDUø\RW' ]H\OHULøOH 0DODW\DøOLQGHNL*XDWUOÕ+DVWDODUGD6HUXPYHøGUDUø\RW' ]H\OHULøOH 7LURLG+RUPRQODUÕQÕQøOLúNLVL 'U $\úhkdq $NÕQFÕ 1 'U $\úh %DODW 1, Dr. Mehmet Turgut 1, Dr. Mustafa Çekmen 2, Dr. Zehra Küçükbay 3 'U 6DLP

More information

Linux: 20 Iptables Examples For New SysAdmins

Linux: 20 Iptables Examples For New SysAdmins Copyrighted material Linux: 20 Iptables Examples For New SysAdmins Posted By nixcraft On December 13, 2011 @ 8:29 am [ 64 Comments ] L inux comes with a host based firewall called

More information

Presbiakuzide Kan Lipoprotein Düzeyleri

Presbiakuzide Kan Lipoprotein Düzeyleri Presbiakuzide Kan Lipoprotein Düzeyleri Dr. Fehmi Döner 1, 'U +DUXQ 'R UX 1, Dr. 1DPÕN 'HOLEDú 2, Dr. Orhan Gedikli 1, Dr. Belma Pehlivan 1 3UHVELDNX]L LOHUL \DúODUGD ]HOOLNOH WL] VHVOHUGH J U OHQ VHQV

More information

Packet filtering with Linux

Packet filtering with Linux LinuxFocus article number 289 http://linuxfocus.org Packet filtering with Linux by Vincent Renardias About the author: GNU/Linux user since 1993, Vincent Renardias started to

More information

ipchains and iptables for Firewalling and Routing

ipchains and iptables for Firewalling and Routing ipchains and iptables for Firewalling and Routing Jeff Muday Instructional Technology Consultant Department of Biology, Wake Forest University The ipchains utility Used to filter packets at the Kernel

More information

Packet filtering with Iptables

Packet filtering with Iptables CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Firewall Tutorial. KAIST Dept. of EECS NC Lab.

Firewall Tutorial. KAIST Dept. of EECS NC Lab. Firewall Tutorial KAIST Dept. of EECS NC Lab. Contents What is Firewalls? Why Firewalls? Types of Firewalls Limitations of firewalls and gateways Firewalls in Linux What is Firewalls? firewall isolates

More information

Application Monitoring using SNMPc 7.0

Application Monitoring using SNMPc 7.0 Application Monitoring using SNMPc 7.0 SNMPc can be used to monitor the status of an application by polling its TCP application port. Up to 16 application ports can be defined per icon. You can also configure

More information

The effect of exogenous estrogen on the luteal and follicular phases in clomiphene citrate stimulated cycles

The effect of exogenous estrogen on the luteal and follicular phases in clomiphene citrate stimulated cycles .ORPLIHQ6LWUDWLOHøQG NOHQHQ6LNOXVODUGD(NVRMHQgVWURMHQ.XOODQÕPÕQÕQ)ROOLN OHUYH/XWHDO)D])RQNVL\RQODUÕh]HULQH(WNLVL D. Özcan Balat 1, D. Aif Kökçü 2, 'U ù NU drnúhqlp 2, D. Cazip Üstün 2.ORPLIHQ VLWUDW &&

More information

Setup Local Mail Server Using Postfix, Dovecot And Squirrelmail On CentOS 6.5/6.4

Setup Local Mail Server Using Postfix, Dovecot And Squirrelmail On CentOS 6.5/6.4 Setup Local Mail Server Using Postfix, Dovecot And Squirrelmail On CentOS 6.5/6.4 For this tutorial, I use CentOS 6.5 32 bit minimal installation, with SELinux disabled. My test box details are given below.

More information

Revised: 14-Nov-07. Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0

Revised: 14-Nov-07. Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0 Revised: 14-Nov-07 Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0 2 / 16 This edition of the User Manual has been updated with information available at the date of issue. This edition supersedes

More information

Solution of Exercise Sheet 5

Solution of Exercise Sheet 5 Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????

More information

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) 2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file

More information

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall 70 Lab #5 Lab #5 Assessment Spreadsheet A Review the default settings for Windows Firewall on your student workstation and indicate your settings below: GENERAL Recommended (Firewall On/Off) Don t Allow

More information

Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering

Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch

More information

Firewalls. Chien-Chung Shen cshen@cis.udel.edu

Firewalls. Chien-Chung Shen cshen@cis.udel.edu Firewalls Chien-Chung Shen cshen@cis.udel.edu The Need for Firewalls Internet connectivity is essential however it creates a threat vs. host-based security services (e.g., intrusion detection), not cost-effective

More information

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) 2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file

More information

CIT 380: Securing Computer Systems

CIT 380: Securing Computer Systems CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning

More information

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006 CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on

More information

Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding

Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding Firewalls slide 1 configuring a sophisticated GNU/Linux firewall involves understanding iptables iptables is a package which interfaces to the Linux kernel and configures various rules for allowing packets

More information

Böbreküstü Bezleri. The adrenal glands. %g%5(.h67h %(=/(5ø1ø1 0$.526.23ø. <$3,6,

Böbreküstü Bezleri. The adrenal glands. %g%5(.h67h %(=/(5ø1ø1 0$.526.23ø. <$3,6, Böbreküstü Bezleri Dr. Elvan Özbek 1 %X odoõúpdgd E EUHN VW EH]OHULQLQ HPEUL\RORMLN JHOLúLPL LOH KHP PDNURVNRSLN KHP GH PLNURVNRSLN \DSÕVÕ KDNNÕQGDNL NODVLN ELOJLOHU YH VRQ OLWHUDW U YHULOHUL GHUOHQHUHN

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

Redhat 6.2 Installation Howto -Basic Proxy and Transparent

Redhat 6.2 Installation Howto -Basic Proxy and Transparent Redhat 6.2 Installation Howto -Basic Proxy and Transparent This is a guide document although very detailed in some sections. It assumes you have a have an idea about installing RH and working with Linux.

More information

TCP/IP Concepts Review. A CEH Perspective

TCP/IP Concepts Review. A CEH Perspective TCP/IP Concepts Review A CEH Perspective 1 Objectives At the end of this unit, you will be able to: Describe the TCP/IP protocol stack For each level, explain roles and vulnerabilities Explain basic IP

More information

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used:

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used: Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research

More information

+ iptables. packet filtering && firewall

+ iptables. packet filtering && firewall + iptables packet filtering && firewall + what is iptables? iptables is the userspace command line program used to configure the linux packet filtering ruleset + a.k.a. firewall + iptable flow chart what?

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

Lipoprotein (a): a general view and it s relationship with various disease

Lipoprotein (a): a general view and it s relationship with various disease /LSRSURWHLQD*HQHO%LU%DNÕúYHdHúLWOL+DVWDOÕNODUODøOLúNLVL Dr. Mustafa B. Çekmen 1, Dr. Yusuf Türköz 1, Dr. Mehmet Turgut 2, Dr. Engin M. Gözükara 1 Lipoprotein (a) [lipo(a)] WH %HUJ WDUDIÕQGDQ WDQÕPODQGÕ

More information

Firewall Implementation

Firewall Implementation CS425: Computer Networks Firewall Implementation Ankit Kumar Y8088 Akshay Mittal Y8056 Ashish Gupta Y8410 Sayandeep Ghosh Y8465 October 31, 2010 under the guidance of Prof. Dheeraj Sanghi Department of

More information

Installing and Configuring Apache

Installing and Configuring Apache 3 Installing and Configuring Apache In this second of three installation-related chapters, you will install the Apache web server and familiarize yourself with its main components, including log and configuration

More information

Firewalls (IPTABLES)

Firewalls (IPTABLES) Firewalls (IPTABLES) Objectives Understand the technical essentials of firewalls. Realize the limitations and capabilities of firewalls. To be familiar with iptables firewall. Introduction: In the context

More information

Linux Routers and Community Networks

Linux Routers and Community Networks Summer Course at Mekelle Institute of Technology. July, 2015. Linux Routers and Community Networks Llorenç Cerdà-Alabern http://personals.ac.upc.edu/llorenc llorenc@ac.upc.edu Universitat Politènica de

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

Fachgebiet Technische Informatik, Joachim Zumbrägel

Fachgebiet Technische Informatik, Joachim Zumbrägel Computer Network Lab 2015 Fachgebiet Technische Informatik, Joachim Zumbrägel Overview Internet Internet Protocols Fundamentals about HTTP Communication HTTP-Server, mode of operation Static/Dynamic Webpages

More information

Lab 8.3.13 Configure Cisco IOS Firewall CBAC

Lab 8.3.13 Configure Cisco IOS Firewall CBAC Lab 8.3.13 Configure Cisco IOS Firewall CBAC Objective Scenario Topology In this lab, the students will complete the following tasks: Configure a simple firewall including CBAC using the Security Device

More information

Cisco Configuring Commonly Used IP ACLs

Cisco Configuring Commonly Used IP ACLs Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow

More information

CSC574 - Computer and Network Security Module: Firewalls

CSC574 - Computer and Network Security Module: Firewalls CSC574 - Computer and Network Security Module: Firewalls Prof. William Enck Spring 2013 1 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire,

More information

Firewall Firewall August, 2003

Firewall Firewall August, 2003 Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also

More information

TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.

TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8. TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure

More information

Remote login (Telnet):

Remote login (Telnet): SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client

More information

1.0 DHCPD.CONF. option domain-name-servers 193.220.20.30; option domain-name "smuth-mru.org.zm"; option broadcast-address 192.168.27.

1.0 DHCPD.CONF. option domain-name-servers 193.220.20.30; option domain-name smuth-mru.org.zm; option broadcast-address 192.168.27. 1.0 DHCPD.CONF option domain-name-servers 193.220.20.30; option domain-name "smuth-mru.org.zm"; option broadcast-address 192.168.27.255; option subnet-mask 255.255.255.0; option routers 192.168.27.1; ddns-update-style

More information

Virtual Host (Web Server)

Virtual Host (Web Server) Virtual Host (Web Server) 1 Muhammad Zen Samsono Hadi, ST. MSc. Lab. Komunikasi Digital Gedung D4 Lt. 1 EEPIS-ITS Virtual Networking implementation 2 Power consumption comparison 3 VS 5 Physical Virtual

More information

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,

More information

Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN

Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN Firewall IPTables and its use in a realistic scenario FEUP MIEIC SSIN José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 Topics 1- Firewall 1.1 - How they work? 1.2 - Why use them? 1.3 - NAT

More information

øq Q hqlyhuvlwhvl 7ÕS )DN OWHVL *HQHO &HUUDKL $QDELOLP 'DOÕ 0DODW\D øq Q hqlyhuvlwhvl 7ÕS )DN OWHVL 3DWRORML $QDELOLP 'DOÕ 0DODW\D

øq Q hqlyhuvlwhvl 7ÕS )DN OWHVL *HQHO &HUUDKL $QDELOLP 'DOÕ 0DODW\D øq Q hqlyhuvlwhvl 7ÕS )DN OWHVL 3DWRORML $QDELOLP 'DOÕ 0DODW\D 7LURLG 1RG OOHULQLQ øqfh ø QH $VSLUDV\RQ %L\RSVLVL 6LWRORMLN 6RQXoODUÕ LOH 3RVWRSHUDWLI +LVWRORMLN 6RQXoODUÕQÕQ.DUúÕODúWÕUÕOPDVÕ YH 7LURLGHNWRPL(QGLNDV\RQODUÕ 'U $GQDQ +DVDQR OX 1, 'U (UWDQ % OE OR OX

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance

More information

Linux Firewall Wizardry. By Nemus

Linux Firewall Wizardry. By Nemus Linux Firewall Wizardry By Nemus The internet and your server So then what do you protect your server with if you don't have a firewall in place? NetFilter / Iptables http://www.netfilter.org Iptables

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

Installing Apache Software

Installing Apache Software Web Server Web Server Is a software application that uses the HyperText Transfer Protocol. Running on computer connected to Internet. Many Web Server software applications: Public domain software from

More information

CIT 480: Securing Computer Systems. Firewalls

CIT 480: Securing Computer Systems. Firewalls CIT 480: Securing Computer Systems Firewalls Topics 1. What is a firewall? 2. Types of Firewalls 1. Packet filters (stateless) 2. Stateful firewalls 3. Proxy servers 4. Application layer firewalls 3. Configuring

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

Module: Firewalls. Professor Patrick McDaniel Spring 2009. CMPSC443 - Introduction to Computer and Network Security

Module: Firewalls. Professor Patrick McDaniel Spring 2009. CMPSC443 - Introduction to Computer and Network Security CMPSC443 - Introduction to Computer and Network Security Module: Firewalls Professor Patrick McDaniel Spring 2009 1 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed

More information

Apache 2.2 on QNX Neutrino 6.4.x OS Step-by-step installation manual

Apache 2.2 on QNX Neutrino 6.4.x OS Step-by-step installation manual Apache 22 on QNX Neutrino 64x OS Step-by-step installation manual 1 User and Group settings for Apache 22 First of all, we have to create a new GROUP in Photon On the right side menu (Shelf) select the

More information

TECHNICAL NOTES. Security Firewall IP Tables

TECHNICAL NOTES. Security Firewall IP Tables Introduction Prior to iptables, the predominant software packages for creating Linux firewalls were 'IPChains' in Linux 2.2 and ipfwadm in Linux 2.0, which in turn was based on BSD's ipfw. Both ipchains

More information

Chapter 3 Startup and Shutdown This chapter discusses how to startup and shutdown ETERNUSmgr.

Chapter 3 Startup and Shutdown This chapter discusses how to startup and shutdown ETERNUSmgr. Preface This guide discusses procedures and safeguards relating to the use of ETERNUSmgr to configure ETERNUS DX400 series, ETERNUS DX8000 series, ETERNUS2000, ETERNUS4000, ETERNUS8000, ETERNUS3000, ETERNUS6000,

More information

CSCI 7000-001 Firewalls and Packet Filtering

CSCI 7000-001 Firewalls and Packet Filtering CSCI 7000-001 Firewalls and Packet Filtering November 1, 2001 Firewalls are the wrong approach. They don t solve the general problem, and they make it very difficult or impossible to do many things. On

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

Firewalls and Intrusion Detection Systems. Advanced Computer Networks

Firewalls and Intrusion Detection Systems. Advanced Computer Networks Firewalls and Intrusion Detection Systems Advanced Computer Networks Firewalls & IDS Outline Firewalls Stateless packet filtering Stateful packet filtering Access Control Lists Application Gateways Intrusion

More information

Presented by Henry Ng

Presented by Henry Ng Log Format Presented by Henry Ng 1 Types of Logs Content information, alerts, warnings, fatal errors Source applications, systems, drivers, libraries Format text, binary 2 Typical information in Logs Date

More information

Linux Networking: IP Packet Filter Firewalling

Linux Networking: IP Packet Filter Firewalling Linux Networking: IP Packet Filter Firewalling David Morgan Firewall types Packet filter Proxy server 1 Linux Netfilter Firewalling Packet filter, not proxy Centerpiece command: iptables Starting point:

More information

Building a Home Gateway/Firewall with Linux (aka Firewalling and NAT with iptables )

Building a Home Gateway/Firewall with Linux (aka Firewalling and NAT with iptables ) Building a Home Gateway/Firewall with Linux (aka Firewalling and NAT with iptables ) Michael Porkchop Kaegler mkaegler@nic.com http://www.nic.com/~mkaegler/ Hardware Requirements Any machine capable of

More information

Lab Objectives & Turn In

Lab Objectives & Turn In Firewall Lab This lab will apply several theories discussed throughout the networking series. The routing, installing/configuring DHCP, and setting up the services is already done. All that is left for

More information

CS 5410 - Computer and Network Security: Firewalls

CS 5410 - Computer and Network Security: Firewalls CS 5410 - Computer and Network Security: Firewalls Professor Kevin Butler Fall 2015 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire, heat

More information

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker

More information

Looking for Trouble: ICMP and IP Statistics to Watch

Looking for Trouble: ICMP and IP Statistics to Watch Looking for Trouble: ICMP and IP Statistics to Watch Laura Chappell, Senior Protocol Analyst Protocol Analysis Institute [lchappell@packet-level.com] www.packet-level.com www.podbooks.com HTCIA Member,

More information

OS Installation Guide Red Hat Linux 9.0

OS Installation Guide Red Hat Linux 9.0 OS Installation Guide Red Hat Linux 9.0 C o n t e n t s Contents 3 About This Guide 5 1 Planning Your Installation 7 Requirements 7 2 Installing Red Hat 9.0 Error! Bookmark not defined. What s Next? 19

More information

Network Security Management

Network Security Management Network Security Management TWNIC 2003 Objective Have an overview concept on network security management. Learn how to use NIDS and firewall technologies to secure our networks. 1 Outline Network Security

More information

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used: Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research

More information

CSE543 - Computer and Network Security Module: Firewalls

CSE543 - Computer and Network Security Module: Firewalls CSE543 - Computer and Network Security Module: Firewalls Professor Trent Jaeger Fall 2010 1 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire,

More information

How to Turn a Unix Computer into a Router and Firewall Using IPTables

How to Turn a Unix Computer into a Router and Firewall Using IPTables How to Turn a Unix Computer into a Router and Firewall Using IPTables by Dr. Milica Barjaktarovic Assistant Professor of Computer Science at HPU Lecture from CENT370 Advanced Unix System Administration

More information

LAMP Quickstart for Red Hat Enterprise Linux 4

LAMP Quickstart for Red Hat Enterprise Linux 4 LAMP Quickstart for Red Hat Enterprise Linux 4 Dave Jaffe Dell Enterprise Marketing December 2005 Introduction A very common way to build web applications with a database backend is called a LAMP Stack,

More information

Internet Protocols. Background CHAPTER

Internet Protocols. Background CHAPTER CHAPTER 3 Internet Protocols Background The Internet protocols are the world s most popular open-system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected

More information

Firewall implementation and testing

Firewall implementation and testing Firewall implementation and testing Patrik Ragnarsson, Niclas Gustafsson E-mail: ragpa737@student.liu.se, nicgu594@student.liu.se Supervisor: David Byers, davby@ida.liu.se Project Report for Information

More information

Firewalls with IPTables. Jason Healy, Director of Networks and Systems

Firewalls with IPTables. Jason Healy, Director of Networks and Systems Firewalls with IPTables Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Host-based Firewalls with IPTables 5 1.1 Introduction.............................. 5 1.2 Concepts...............................

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

Securing the Apache Web Server

Securing the Apache Web Server Securing the Apache Web Server Jaqui Lynch Mainline Information Systems Email jaqui.lynch@mainline.com Session I12 Agenda Anatomy of a Web Transaction General Firewall and Network Web Server Parameters

More information

Email Management CSCU9B2 CSCU9B2 1

Email Management CSCU9B2 CSCU9B2 1 Email Management CSCU9B2 CSCU9B2 1 Contents Email clients choosing and using Email message header and content Emailing to lists of people In and out message management Mime attachments and HTML email SMTP,

More information

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and

More information

IP network tools & troubleshooting. AFCHIX 2010 Nairobi, Kenya October 2010

IP network tools & troubleshooting. AFCHIX 2010 Nairobi, Kenya October 2010 IP network tools & troubleshooting AFCHIX 2010 Nairobi, Kenya October 2010 Network configuration Reminder, configure your network in /etc/ rc.conf ( x = your IP, from.10 to...) ifconfig_bge0= 41.215.76.x/24

More information

Chapter 8 Network Security

Chapter 8 Network Security [Computer networking, 5 th ed., Kurose] Chapter 8 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 84Securing 8.4 e-mail 8.5 Securing TCP connections: SSL 8.6 Network

More information

CS 5410 - Computer and Network Security: Firewalls

CS 5410 - Computer and Network Security: Firewalls CS 5410 - Computer and Network Security: Firewalls Professor Patrick Traynor Spring 2015 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire,

More information

Manuale Turtle Firewall

Manuale Turtle Firewall Manuale Turtle Firewall Andrea Frigido Friweb snc Translator: Emanuele Tatti Manuale Turtle Firewall by Andrea Frigido Translator: Emanuele Tatti Published 2002 Copyright 2002, 2003 by Friweb snc, Andrea

More information

Email Aggregation using IMAP, PHP & MySQL Database

Email Aggregation using IMAP, PHP & MySQL Database Email Aggregation using IMAP, PHP & MySQL Database Antonius H. Carvalho Master of Computer Application, Mumbai University, Mumbai, India. Abstract - In today's world almost all people use email services

More information

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons

More information

Linux Networking Basics

Linux Networking Basics Linux Networking Basics Naveen.M.K, Protocol Engineering & Technology Unit, Electrical Engineering Department, Indian Institute of Science, Bangalore - 12. Outline Basic linux networking commands Servers

More information

Protecting and controlling Virtual LANs by Linux router-firewall

Protecting and controlling Virtual LANs by Linux router-firewall Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia

More information

Troubleshooting IP Access Lists

Troubleshooting IP Access Lists CHAPTER 21 This chapter describes how to troubleshoot IPv4 and IPv6 access lists (IP-ACLs) created and maintained in the Cisco MDS 9000 Family. It includes the following sections: Overview, page 21-1 Initial

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem

More information