Week Date Teaching Attended 2 Jan 2013 Lab 1: Linux Services/Toolkit Dev t
|
|
|
- Reynold Chandler
- 10 years ago
- Views:
Transcription
1 Week Date Teaching Attended 2 Jan 2013 Lab 1: Linux Services/Toolkit Dev t Aim: The aim of this lab is to investigate the discovery and configuration of services within Linux. It uses a Linux Ubuntu Virtual Machine (UBUNTU). You can either run VMWare Workstation on the local machine in the lab, or connect via a web browser to the VM2003 IaaS virtualisation servers. The Console (DESKTOP) on the local machine will be from Windows 7, where in VM2003 it is an Ubuntu console, as outlined below. Local machine Lm2003.napier.ac.uk OR CONSOLE DESKTOP UBUNTU DESKTOP (Console) UBUNTU (LinuxServer) Time to spend on practicals: Up to 4/5 hours (Two supervised hours in the lab, and two/three additional hours, unsupervised). Activities: Complete Lab 1: Linux Services/Toolkit Development 1.pdf from WebCT or Take End of Unit Tests for unit1: Learning activities: At the end of these activities, you should understand: How to review/define services in Linux. How to interface to WinDump from the toolkit development Reflective statements (end-of-exercise): What are the key Linux commands used to discover the services which are being run? What is the key folder location for the Web server in Linux? Why does Linux need the VNC Client, when Windows uses the Remote Desktop Client? Source code used: Adv. Security & Net. Forensics Linux Services Bill Buchanan, Rich Macfarlane 1
2 Lab 1: Linux Services Rich Macfarlane, Bill Buchanan Details Aim: To provide a foundation in setup, discovery, and use of Linux services. 1.2 Activities An overview of Linux commands, to assist with the lab, can be found at: This part of the lab has two elements: the host machine (DESKTOP) and the Linux virtual server guest machine (UBUNTU), as shown below. The lab can be completed on either of the 2 architectures shown below. Either using VMWare Workstation on the local machine in the lab (shown in Figure 1), or remotely on our VM2003 virtualisation server cluster, via a web browser (shown in Figure 2). The local lab architecture is shown below. This requires the Linux VM Server to be run using VM Workstation on the local PC. Host PC DESKTOP Windows7 PC VM Workstation Physical NIC Virtual NIC Services Web Server FTP Server Telnet Server UBUNTU Linux Server Figure 1 - Lab Architecture The following video can be used as a guide to complete the local version of the lab: On-line video demo of the local lab: Adv. Security & Net. Forensics Linux Services Bill Buchanan, Rich Macfarlane 2
3 The virtualisation server cluster lab architecture is shown in Figure 1 - Lab Architecture below. This requires a Linux VM Console and a Linux VM Server to be run in the Virtualisation Cluster (our Private Cloud). Virtual Machines Cluster Virtual Machine - Server INTERNET Virtual NIC Web Server FTP Server Telnet Server Virtual NIC Virtual Machine - Console UBUNTU Linux Server Napier Network x.x Services DESKTOP Linux VM Desktop PC LOCAL MACHINE Windows 7 PC Figure 2 - Cluster Lab Architecture The following video can be used as a guide to complete the server cluster version of the lab: On-line video demo of the cluster lab: Linux Ubuntu Server L1.1 Run the virtual Linux server image (locally run the.vmx file, and power on the virtual machine, or deploy your LinuxServer VM in the Adv Security Workspace on the cluster). Log into the server as User name: Napier, Password: napier123. When using VM Workstation some shortcuts are worth remembering, such as CTRL+G to grab the input focus to the current guest VM, and CTRL+ALT to return focus to the host machine. The following link has a list of shortcuts for VM Workstation: Adv. Security & Net. Forensics Linux Services Bill Buchanan, Rich Macfarlane 3
4 Within the virtual server UBUNTU, open a Terminal Window (command line window), from Applications->Accessories->Terminal such as shown in Figure 3. Figure 3 - Run Linux Terminal From UBUNTU determine the servers IP address using the Linux ifconfig command. If your UBUNTU VM does not have an IP Address, check that it is connected to the host via NAT, using the menu VM>Settings, as shown below, and issue the dhclient command to get an IP Address from the VMWare DHCP server. From DESKTOP open a command line window and determine the IP Address of the host PC using the Windows ipconfig more command (or ifconfig more if using the cluster). Look for the interface which is on the same subnet as UBUNTU. Complete the IP Addressing diagrams in Figure 4 OR 5, depending on which architecture you are using. Fill in the IP addresses(s) of the DESKTOP machine, and the UBUNTU virtual server. Adv. Security & Net. Forensics Linux Services Bill Buchanan, Rich Macfarlane 4
5 Host PC DESKTOP Windows7 PC VM Workstation Virtual NIC Physical NIC UBUNTU Linux Server Figure 4 - Local lab IP Addressing Virtual Machines Cluster Virtual Machine - Server Virtual NIC Virtual Machine - Console DESKTOP Linux VM Virtual NIC UBUNTU Linux Server Web Server FTP Server Telnet Server Figure 5 - Cluster IP Addressing L1.2 From DESKTOP, ping UBUNTU, and vice-versa, to check the connectivity. Was the ping from DESKTOP to UBUNTU successful? Was the ping from UBUNTU to DESKTOP successful? Why might this be? YES/NO YES/NO Windows 7 Firewall If DESKTOP is a Windows7 machine it may be that the firewall is blocking virtual networks (typically connected as network type Public), and so we need to either allow ICMP traffic through, or turn the firewall off on the VMWare network. ( x.x) On DESKTOP, open the Windows Network and Sharing Center window. This can be accessed by left clicking the Windows Network Connections Icon, ( or ) in the Adv. Security & Net. Forensics Linux Services Bill Buchanan, Rich Macfarlane 5
6 notification area, and selecting Open Network and Sharing Center. (It can aso be accessed via the Windows Control Panel). Check which type of network UBUNTU is connected to (typically Public). Select Change advanced sharing settings, and Turn on file and printer sharing for this network type, as shown below. This should allow ICMP packets used by the ping tool through the firewall for this network type. Retest the connectivity test from WINDOWS2003 to DESKTOP. Was the ping from UBUNTU to DESKTOP successful? YES/NO Linux Services L1.3 To list the running network services in the UBUNTU server, the netstat command can be used. From UBUNTU use netstat -help to check the arguments and options. Adv. Security & Net. Forensics Linux Services Bill Buchanan, Rich Macfarlane 6
7 Use the netstat ltu command to determine the services that are running. (-l listening, -t TCP, -u UDP) List some of the services (and their port numbers) which are running on the server: Note: The n flag can be used to find the numeric port numbers of the listening servers. The IANA Port Numbers web page lists the official services and their protocol/portnumbers. Try googling for it. To view the associated processes for the services, on UBUNTU use the p flag such as: sudo netstat antp List some of the services and their processes? Services: Web L1.4 In the virtual Linux server UBUNTU, open a Terminal Window and navigate to the folder /var/www. Use the ls command to list the contents of the directory. What are the names of the files in this directory, and what type of files are they: L1.5 From the host system DESKTOP, using a browser, connect to the Web Server running on UBUNTU using where w.x.y.z is the IP address of your UBUNTU Linux server, as shown below. Figure 6 - HTTP connection to web server on UBUNTU Adv. Security & Net. Forensics Linux Services Bill Buchanan, Rich Macfarlane 7
8 On UBUNTU use the netstat atu command to determine the services that are running. (-a all connections, listening and established, -t TCP, -u UDP) Can you see the established client/server connection between DESKTOP and UBUNTU? What is the client port? From DESKTOP, connect to the Web Server, but this time using telnet from a windows command shell or Putty (you may need to activate the Windows telnet client via Control Panel>Programs & Features>Turn Windows Features On & Off): telnet w.x.y.z 80 and then send the HTTP GET command to the server: GET /index.html What is the response from the web server? How does this relate to accessing the home page, using the web browser? L1.6 On the UBUNTU Linux Server create your own home web page. Open an editor to create a new html web page, using a command such as such as sudo vi or sudo gedit. Save the page with a name such as my_home_page.html, and in the /var/www folder. It should contain a link to the default page (index.html), such as: My Home Page This is a sample HTML page. Click [here] to return to the default home file. Figure 7 - Creating 'My Home Page' web page Adv. Security & Net. Forensics Linux Services Bill Buchanan, Rich Macfarlane 8
9 Can you access this new web page, via a browser, from the host (DESKTOP)? YES/NO On UBUNTU, go to /var/log/apache2. What are the contents of the folder? Using the cat filename command or an editor such as vi find out, and explain, what the different files contain: How might these log files be used to trace malicious activity? Figure 8 - Apache Web Server Access Log Services: Telnet L1.7 Connect to the Telnet Server on UBUNTU from DESKTOP using telnet w.x.y.z, where w.x.y.z is the IP address of UBUNTU. Login in with the user: napier (password: napier123). On UBUNTU, use the netstat atu command to determine the services that are running. (-a all connections, listening and established, -t TCP, -u UDP) Can you see the established telent client/server connection between DESKTOP and UBUNTU? Adv. Security & Net. Forensics Linux Services Bill Buchanan, Rich Macfarlane 9
10 What is the default home folder for Telnet on UBUNTU? (Look up/google the Linux command to determine the current [working] directory) Quit from Telnet, using the exit command. Services: FTP L1.8 From your host, connect to the FTP Server from DESKTOP, via a web browser using ftp://w.x.y.z, where w.x.y.z is the IP address of UBUNTU, as shown in Figure 9. Figure 9 - FTP connection Open a command line window from DESKTOP, and connect to the FTP Server using the command: telnet w.x.y.z 21 Then enter the commands in bold (and note the some of the commands that you get beside the sample return ones): USER napier 331 Password required for napier. PASS napier Linux ubuntu generic #48-Ubuntu SMP Fri Oct 16 14:04:26 UTC 2009 i To access official Ubuntu documentation, please visit: User napier logged in. HELP Adv. Security & Net. Forensics Linux Services Bill Buchanan, Rich Macfarlane 10
11 214- The following commands are recognized (* =>'s unimplemented). USER PORT STOR MSAM* RNTO NLST MKD CDUP PASS PASV APPE MRSQ* ABOR SITE XMKD XCUP ACCT* TYPE MLFL* MRCP* DELE SYST RMD STOU SMNT* STRU MAIL* ALLO CWD STAT XRMD SIZE QUIT RETR MSOM* RNFR LIST NOOP XPWD PWD 257 "/home/napier" is current directory. TYPE I 200 Type set to I. PASV 227 Entering Passive Mode (192,168,75,136,146,31) LIST Did the LIST command succeed? YES/NO The PASV FTP command opens up a different port for the data transfer. This is calculated from the last two digits of the Passive Mode response (227 response). It is calculated as, the second last (146) digital multiplied by 256, plus the last digital (31). So, in this case, it would be: Port = 146* = Next, open up the data transfer channel by creating a new Telnet connection, in a second command line window, such as with the command: telnet w.x.y.z Now try the LIST command again, in the 1 st command window. Did the LIST command succeed? YES/NO On UBUNTU, go to /var/log dir. View the syslog file (using the cat syslog command or the vi editor). What is its contents? How might these log files be used to trace malicious activity? View the contents of /etc/inetd.conf file. How is this used to enable services? Adv. Security & Net. Forensics Linux Services Bill Buchanan, Rich Macfarlane 11
12 Services: Remote Desktop L1.9 On the host PC, download the VNC Client application from: Downloads Tab, and choose Free Edition once you have installed. Then from the host (DESKTOP), connect to UBUNTU using the VNC Client, as shown in Figure 10. Note: A dialog may appear on the server, which requires you to allow access to the VNC Client program. Figure 10 - VNC Viewer Client Application Which is the service which is running on UBUNTU that allows the remote connection to happen? Figure 11 - VNC Viewer Application with Remote Desktop of UBUNTU Adv. Security & Net. Forensics Linux Services Bill Buchanan, Rich Macfarlane 12
13 1.3 Security & Forensics Toolkit Development The objective of this series of labs is to build an integrated Security & Forensic Toolkit in C#. Partially complete versions of the toolkit, written in C#, will be used as a starting point in the labs. A complete, fully functional toolkit can also be downloaded from the link below. The finished toolkit application can be downloaded from: Toolkit Development 1 - Windows Utilities This toolkit lab shows how to integrate some Windows command line security utilities in to the toolkit software. This toolkit software development lab has an associated video demo. Video demo of toolkit software development part 1: For this lab, download the partially finished toolkit application source code (a Visual Studio C# Solution) from the link below: Toolkit source code: Extract the source code for the C# Windows Application to a local folder. Next open the toolkit application with Visual Studio (VS) (double click the VS solution file toolkit.sln). You should see the Solution Explorer panel on the right of the VS Window. Open the Toolkit Windows Form by double clicking the client.cs module, from the Solution Explorer panel. The Toolkit form should now be shown in the panel on the left. The Network tab should be displayed, as shown below. Adv. Security & Net. Forensics Linux Services Bill Buchanan, Rich Macfarlane 13
14 L1.10 Select the [Network] tab, and to edit the code for the netstat a button, double click it. The event handler code associated with the button should be displayed. Add the following code to the event handler: runprogram("netstat", "-a"); Run the program, and test. L1.11 Select the [Network] tab, and complete the rest of the buttons (see or the figure below for the functions required). Figure 12 - Buttons to add Adv. Security & Net. Forensics Linux Services Bill Buchanan, Rich Macfarlane 14
15 L1.12 Select the [Network] table, and complete the rest of the buttons (netstat a, arp a, nbstat n, systeminfo, ipconfig, ipconfig /all, route print and net view ). See Figure L1.4. For Audit Policy add: runprogram("auditpol", "/get /category:*"); For Clear ARP add: runprogram("netsh", "interface ip delete arpcache"); For Add Firewall Rule: runprogram("netsh", "advfirewall firewall add rule name=\"networksims Rule\" dir=in action=allow protocol=tcp localport=65000"); For Add ICMP Rule: runprogram("netsh", "advfirewall firewall add rule name=\"networksims Rule\" protocol=icmpv4:8,any dir=in action=allow"); For Delete Rule: runprogram("netsh", "advfirewall firewall delete rule name=\"networksims Rule\" dir=in"); For Show Rules: runprogram("netsh", "advfirewall firewall show rule name=\"networksims Rule\""); L1.10 Now add three buttons, and three text boxes (tbping, tbtracert and tbtracert) and add a ping, tracert and nslookup button. Next add the code to each of the buttons: runprogram("ping", tbping.text); runprogram("tracert", tbtracert.text); runprogram("nslookup", tbtracert.text); Adv. Security & Net. Forensics Linux Services Bill Buchanan, Rich Macfarlane 15
Week Date Teaching Attended 3 24/01/10 Lab 2: Windows Services/Toolkit
Week Date Teaching Attended 3 24/01/10 Lab 2: Windows Services/Toolkit Aim: The aim of this lab is to investigate the discovery and configuration of services within Windows. It uses the Windows 2003 VM
FTP protocol (File Transfer Protocol)
FTP protocol (File Transfer Protocol) Introduction to FTP protocol FTP protocol (File Transfer Protocol) is, as its name indicates a protocol for transferring files. The implementation of FTP dates from
File Transfer Protocol (FTP) Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Fall 2007, TAIWAN
File Transfer Protocol (FTP) Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Fall 2007, TAIWAN 1 Contents CONNECTIONS COMMUNICATION COMMAND PROCESSING
2.5 TECHNICAL NOTE FTP
Version 2.5 TECHNICAL NOTE FTP Protocol Agent Overview Stonesoft Corp. Itälahdenkatu 22A, FIN-00210 Helsinki Finland Tel. +358 (9) 4767 11 Fax. +358 (9) 4767 1234 email: [email protected] Copyright 2002
Administrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP)
Administrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP) M. Udin Harun Al Rasyid, Ph.D http://lecturer.eepis-its.edu/~udinharun [email protected] Lab Jaringan Komputer (C-307) Table of
Communication Systems Network Applications - Online Services
Scope Communication Systems Network Applications - Online Services Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany
Lab 7: Introduction to Pen Testing (NMAP)
Lab 7: Introduction to Pen Testing (NMAP) Aim: To provide a foundation in understanding of email with a focus on NMAP. Time to complete: Up to 60 minutes. Activities: Complete Lab 7: NMAP. Complete Test
Week Date Teaching Attended 5 Feb 2013 Lab 4: Vulnerability Analysis & Enumeration/Toolkit 4
Week Date Teaching Attended 5 Feb 2013 Lab 4: Vulnerability Analysis & Enumeration/Toolkit 4 Aim: The aim of this lab is to investigate Network Scanning, System Enumeration, and Vulnerability Analysis,
Lab Objectives & Turn In
Firewall Lab This lab will apply several theories discussed throughout the networking series. The routing, installing/configuring DHCP, and setting up the services is already done. All that is left for
Laboration 3 - Administration
Laboration 3 - Administration During this laboration we will learn how to install, configure and test servers that will allow you to have access remote machines, copy files between computers and file sharing.
4-441-095-12 (1) Network Camera
4-441-095-12 (1) Network Camera SNC easy IP setup Guide Software Version 1.0 Before operating the unit, please read this manual thoroughly and retain it for future reference. 2012 Sony Corporation Table
Biznet GIO Cloud Connecting VM via Windows Remote Desktop
Biznet GIO Cloud Connecting VM via Windows Remote Desktop Introduction Connecting to your newly created Windows Virtual Machine (VM) via the Windows Remote Desktop client is easy but you will need to make
10.3.1.8 Lab - Configure a Windows 7 Firewall
5.0 10.3.1.8 Lab - Configure a Windows 7 Firewall Print and complete this lab. In this lab, you will explore the Windows 7 Firewall and configure some advanced settings. Recommended Equipment Step 1 Two
10.3.1.9 Lab - Configure a Windows Vista Firewall
5.0 10.3.1.9 Lab - Configure a Windows Vista Firewall Print and complete this lab. In this lab, you will explore the Windows Vista Firewall and configure some advanced settings. Recommended Equipment Step
How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box
CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website
Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website April 16 2012 The following instructions are to show you how to map your Home drive using ITS s Network in order to publish a website
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
In this lab you will explore the Windows XP Firewall and configure some advanced settings.
16.3.2 Lab: Configure Windows XP Firewall Print and complete this lab. In this lab you will explore the Windows XP Firewall and configure some advanced settings. Recommended Equipment Two computers directly
EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13
Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV
Immotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
In order to upload a VM you need to have a VM image in one of the following formats:
What is VM Upload? 1. VM Upload allows you to import your own VM and add it to your environment running on CloudShare. This provides a convenient way to upload VMs and appliances which were already built.
PT Activity 8.1.2: Network Discovery and Documentation Topology Diagram
Topology Diagram All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 6 Addressing Table Device Interface IP Address Subnet
Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
10.3.1.10 Lab - Configure a Windows XP Firewall
5.0 10.3.1.10 Lab - Configure a Windows XP Firewall Print and complete this lab. In this lab, you will explore the Windows XP Firewall and configure some advanced settings. Recommended Equipment Step 1
Windows Firewall Configuration with Group Policy for SyAM System Client Installation
with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it
Network Load Balancing
Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account
Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
Remote PC Guide for Standalone PC Implementation
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24
Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Deploy the ExtraHop Discover Appliance with Hyper-V
Deploy the ExtraHop Discover Appliance with Hyper-V 2016 ExtraHop Networks, Inc. All rights reserved. This manual, in whole or in part, may not be reproduced, translated, or reduced to any machine-readable
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
Case Closed Installation and Setup
1 Case Closed Installation and Setup Contents Installation Overview...2 Microsoft SQL Server Installation...3 Case Closed Software Installation...5 Register OCX for Printing...6 External Programs...7 Automatic
How To - Implement Clientless Single Sign On Authentication with Active Directory
How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:
Deploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
Training module 2 Installing VMware View
Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
ParishSOFT Remote Installation
Table of Contents Setting up Remote Solution Windows 7 or Vista... 1 Connecting to ParishSOFT... 1 Accessing Your database... 3 Switching to your parish database... 4 Setting up Accounts for users... 5
How to start with 3DHOP
How to start with 3DHOP Package content, local setup, online deployment http://3dhop.net 30/6/2015 The 3DHOP distribution Where to find it, what s inside The 3DHOP distribution package From the page http://3dhop.net/download.php
Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com
CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise
Configuring FTP Availability Monitoring With Sentry-go Quick & Plus! monitors
Configuring FTP Availability Monitoring With Sentry-go Quick & Plus! monitors 3Ds (UK) Limited, November, 2013 http://www.sentry-go.com Be Proactive, Not Reactive! Many sites and external systems transfer
Virtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
Updating MNS-BB CUSTOMER SUPPORT INFORMATION PK012906
Updating MNS-BB PK012906 CUSTOMER SUPPORT INFORMATION Order toll-free in the U.S. 24 hours, 7 A.M. Monday to midnight Friday: 877-877-BBOX FREE technical support, 24 hours a day, 7 days a week: Call 724-746-5500
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange
1 Download & Installation... 4. 1 Usernames and... Passwords
Contents I Table of Contents Part I Document Overview 2 Part II Document Details 3 Part III EventSentry Setup 4 1 Download & Installation... 4 Part IV Configuration 4 1 Usernames and... Passwords 5 2 Network...
PasserellesNumeriquesCambodia (PNC)
PasserellesNumeriquesCambodia (PNC) Table of Contents I. Configure DHCP Relay... 3 1. Use client to testing with connection... 4 II. IPTABLES On SUSE... 5 1. Variable and allow client ping... 5 2. Allow
D-Link Central WiFiManager Configuration Guide
Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install
ILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
Setting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
Using VirtualBox ACHOTL1 Virtual Machines
Using VirtualBox ACHOTL1 Virtual Machines The steps in the Apache Cassandra Hands-On Training Level One courseware book were written using VMware as the virtualization technology. Therefore, it is recommended
TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15
TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15 1 Introduction File Transfer Protocol (FTP) is the protocol designed for file sharing over internet. By using TCP/IP for lower layer, FTP
Avalanche Remote Control User Guide. Version 4.1.3
Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095
$ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@";
NAME Net::FTP - FTP Client class SYNOPSIS use Net::FTP; $ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@"; $ftp->login("anonymous",'-anonymous@') or die "Cannot
Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM
Testing New Applications In The DMZ Using VMware ESX Ivan Dell Era Software Engineer IBM Agenda Problem definition Traditional solution The solution with VMware VI Remote control through the firewall Problem
How To Set Up Dataprotect
How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Magaya Software Installation Guide
Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Lab 10: Security Testing Linux Server
Lab 10: Security Testing Linux Server 10.1 Details Aim: Security Assessment and Penetration of a Linux Web Server, using the BackTrack5 Linux Security distribution and some of its security assessment tools.
Lab 8.3.2 Conducting a Network Capture with Wireshark
Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web
Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features
1.0 Key Features Addonics T E C H N O L O G I E S NAS Adapter Model: NASU2 User Manual Convert any USB 2.0 / 1.1 mass storage device into a Network Attached Storage device Great for adding Addonics Storage
VNC User Guide. Version 5.0. June 2012
VNC User Guide Version 5.0 June 2012 Trademarks VNC is a registered trademark of RealVNC Ltd. in the U.S. and in other countries. Other trademarks are the property of their respective owners. Protected
How to Configure an Initial Installation of the VMware ESXi Hypervisor
How to Configure an Initial Installation of the VMware ESXi Hypervisor I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide
Connecting your Virtual Machine to the Internet. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs
Connecting your Virtual Machine to the Internet BT Cloud Compute The power to build your own cloud solutions to serve your specific business needs Introduction Once you have created your virtual machine
Service & Support. How do you create a communication of VNC with an Industrial Thin Client SIMATIC ITC? Thin Client.
Cover How do you create a communication of VNC with an Industrial Thin Client SIMATIC ITC? Thin Client FAQ August 2012 Service & Support Answers for industry. Question This entry is from the Siemens Industry
Installation Guidelines (MySQL database & Archivists Toolkit client)
Installation Guidelines (MySQL database & Archivists Toolkit client) Understanding the Toolkit Architecture The Archivists Toolkit requires both a client and database to function. The client is installed
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER EVALUATION GUIDE Mathieu SCHIRES Version: 1.0.1 Published March 24, 2015 http://www.inuvika.com Contents 1 Introduction 2 2 Pre-requisites 3 3 Using Third-Party
McAfee SMC Installation Guide 5.7. Security Management Center
McAfee SMC Installation Guide 5.7 Security Management Center Legal Information The use of the products described in these materials is subject to the then current end-user license agreement, which can
PC Monitor Enterprise Server. Setup Guide
PC Monitor Enterprise Server Setup Guide Prerequisites Server Requirements - Microsoft Windows Server 2008 R2 or 2012-2GB RAM - IIS 7.5 or IIS 8.0 (with ASP.NET 4.0 installed) - Microsoft SQL Server 2008
Bitrix Site Manager. VMBitrix Virtual Machine. Quick Start And Usage Guide
Bitrix Site Manager VMBitrix Virtual Machine. Quick Start And Usage Guide Contents Introduction... 3 Chapter 1. Starting The VMBitrix Virtual Machine... 4 Minimum Requirements For VMWare Player / VMBitrix...
Important Notes for WinConnect Server VS Software Installation:
Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),
Deploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
Configuring Security for FTP Traffic
2 Configuring Security for FTP Traffic Securing FTP traffic Creating a security profile for FTP traffic Configuring a local traffic FTP profile Assigning an FTP security profile to a local traffic FTP
Using Public IP Settings
Using Public IP Settings Interoute Virtual Data Centre Peter Farmer VDC Appliance Development Manager Interoute 01 Using Public IP Settings The Interoute Virtual Data Centre (VDC) Public IP Settings allow
Deploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
Using Virtual Machines
Using Virtual Machines We will use VMs in CIT 130 so that you can access both a Windows 7 and a Linux machine. You will be able to access these from on and off campus (off campus access will require that
Appendix D: Configuring Firewalls and Network Address Translation
Appendix D: Configuring Firewalls and Network Address Translation The configuration information in this appendix will help the network administrator plan and configure the network architecture for Everserve.
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Desktop : Ubuntu 10.04 Desktop, Ubuntu 12.04 Desktop Server : RedHat EL 5, RedHat EL 6, Ubuntu 10.04 Server, Ubuntu 12.04 Server, CentOS 5, CentOS 6
201 Datavoice House, PO Box 267, Stellenbosch, 7599 16 Elektron Avenue, Technopark, Tel: +27 218886500 Stellenbosch, 7600 Fax: +27 218886502 Adept Internet (Pty) Ltd. Reg. no: 1984/01310/07 VAT No: 4620143786
How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2
BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts
Advanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
File Transfer: FTP and TFTP
CHAPTER 9 File Transfer: FTP and TFTP Exercises. 2... If the control connection is accidentally severed during an FTP transfer, there would be no problem until the data transfer completed and the client
1. Introduction 2. 2. What is Axis Camera Station? 3. 3. What is Viewer for Axis Camera Station? 4. 4. AXIS Camera Station Service Control 5
Table of Contents 1. Introduction 2 2. What is Axis Camera Station? 3 3. What is Viewer for Axis Camera Station? 4 4. AXIS Camera Station Service Control 5 5. Configuring Ports 7 5.1 Creating New Inbound
Remote Desktop In OpenSUSE 10.3
Only for dummies Remote Desktop In OpenSUSE 10.3 Remote access to Linux GUI Environment from Windows Client Tedy Tirtawidjaja 5/14/2008 In Microsoft Windows environment we know Remote Desktop application
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
Media Control Server MCS-EX Integration Guide for RTI Control Systems
Media Control Server MCS-EX Integration Guide for RTI Control Systems Version 2.0-1 - Table of Contents Overview... 3 Setting up MCS for RTI Control.... 5 Requirements.... 5 Preparation.... 5 Programming
Setting up VMware Server v1 for 2X VirtualDesktopServer Manual
Setting up VMware Server v1 for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
Building a Penetration Testing Virtual Computer Laboratory
Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network
Installing NetSupport School for use with the NetSupport School Student extension for Google Chrome
Installing NetSupport School for use with the NetSupport School Student extension for Google Chrome NetSupport School delivers the tools you need to help maximise the effectiveness of computer led teaching
