Auditing NFS Events. Efstratios Karatzas
|
|
|
- Scott Pope
- 9 years ago
- Views:
Transcription
1 Auditing NFS Events Efstratios Karatzas FreeBSD Developer Summit Karlsruhe Institute of Technology Karlsruhe, Germany October 8, 2010
2 Audit's Limitations TrustedBSD's Audit implementation is widely used by sys/admins to keep an eye on their servers via run-time monitoring, post-mortem analysis, etc. However, Audit is limited on the following aspects: Audit is focused on gathering data from local system calls. Audit assumes that a running kernel thread will be involved in at most one security event at a time.
3 Motivation Why should we extend the functionality of Audit? There are plenty of kernel subsystems (such as firewalls or NFS) that generate security log data which are, at the moment, ignored by Audit. FreeBSD is widely used as a file server and current implementation only supports auditing of local filesystem activity, i.e. No logging of NFS server activity. Logging of NFS activity requested by sys/admins on multiple occasions.
4 Suggested GsoC Project Idea How should we extend Audit? In order to successfuly audit other kernel subsystems, Audit must support handling of simultaneous audit records per running kernel thread. i.e. two Audit Records are needed when an open(2) is used over NFS and this action triggers a Firewall Event. Actually extend other kernel subsystems to use the Audit framework and log security relevant information.
5 GSoC 2010 Audit Kernel Events Deliverables of this project in a nutshell: Audit Support for NFS RPCs that get serviced by your FreeBSD fileserver. This includes support for both the current NFS implementation in sys/nfs* as well as the experimental NFS implementation in sys/fs/nfs* (NFS protocols v2,3 & 4). Handling of multiple audit records per kernel thread via use of a treelike data structure that is kept with each kernel thread.
6 Demo This is the audit record for the NFSv3 RPC "WRITE": header,181,11,nfsrv_write(),0,mon Aug 9 20:21: , msec argument,2,0x8,flags path,/usr/home/gpf/desktop/nfs/my_test/file attribute,646,1002,0,104,216583, text, :639 protocol,nfsv3 subject,-1,1002,0,1002,0,1560,0,0, return,success,0 trailer,181
7 vnode* to file path? (1) Task: Acquiring a full filename from just a vnode pointer; necessary in order to make sense out of NFS activity. Pre-existing solution: vn_fullpath(9) use the name cache to generate a full pathname.
8 vnode* to file path? (2) Problems with vn_fullpath(): Name Cache Hints are lost every time the server reboots. Contents of the cache are replaced in a semi-lru fashion. Therefore, this KPI is deemed unreliable for use in a security submodule such as Audit.
9 vnode* to file path? (3) Proposed Solution: Store the directory *node number (hint) inside the filehandle during filehandle creation, VOP_VPTOFH(9). Collect the *node number from the filehandle using VFS_FHHINT(9). Feed the vnode* and the directory hint to vn_fullpath_nocache(9). vn_fullpath_nocache(9) will then try to generate a working path for the vnode in question without making use of the name cache.
10 vn_fullpath_nocache(9) The hardest part is to link a non-directory vnode with a parent directory - VOP_GETPARENT(9) is used. Use the directory parent hint to make this easier. Perform an exhaustive search on the filesystem. Use filesystem specific mechanisms to facilitate the seach. i.e. The parent znode_id is stored inside each znode in ZFS. Problems: Hardlinks with multiple paths, temporary files with no path at all.
11 Todo List Stuff left to do: Review code alongside mentor and merge with HEAD. Port VOP_GETPARENT(9) to other filesystems. Update Audit code at sys/fs/nfs* as new functionality is being added to the experimental NFS server.
12 Audit & GSoC (1) Distributed Audit Daemon Alexey Mikhailov, GSoC 2007 unsuccessful Sergio Ligregni, GSoC 2010 successful Application-Specific Audit Trails Ilias Marinos, GSoC 2009 successful The same mechanisms can be extended to jails (work in progress)
13 Audit & GSoC (2) Audit Log Analyzer Dongmei Liu, GSoC 2007 unsuccessful Audit Kernel Events Diego Giagio (Firewalls), GSoC 2008 unsuccessful His work will be picked up by me :-) Efstratios Karatzas (NFS), GSoC 2010 successful
14 The End Thank you for your time! For more information on my project, please visit the project's wiki page Special Thanks to: Robert Watson Rick Macklem FreeBSD Project & Community Google & Carol Smith
Practical Security Event Auditing with FreeBSD
Practical Security Event Auditing with FreeBSD Christian Brüffer [email protected] NYCBSDCon New York City, USA November 14, 2010 Outline 1. What / What for / Why 2. Format 3. Configuration and Operation
FreeBSD Developer Summit TrustedBSD: Audit + priv(9)
FreeBSD Developer Summit TrustedBSD: Audit + priv(9) Robert Watson FreeBSD Project Computer Laboratory University of Cambridge TrustedBSD Audit Quick audit tutorial Adding audit support to new kernel features
CAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD
CAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD Robert N. M. Watson Security Research Computer Laboratory University of Cambridge March 23, 2006 Introduction Background Common Criteria,
We mean.network File System
We mean.network File System Introduction: Remote File-systems When networking became widely available users wanting to share files had to log in across the net to a central machine This central machine
Network File System (NFS)
Network File System (NFS) Brad Karp UCL Computer Science CS GZ03 / M030 10 th October 2011 NFS Is Relevant Original paper from 1985 Very successful, still widely used today Early result; much subsequent
Oak Ridge National Laboratory Computing and Computational Sciences Directorate. Lustre Crash Dumps And Log Files
Oak Ridge National Laboratory Computing and Computational Sciences Directorate Lustre Crash Dumps And Log Files Jesse Hanley Rick Mohr Sarp Oral Michael Brim Nathan Grodowitz Gregory Koenig Jason Hill
Chapter 11 Distributed File Systems. Distributed File Systems
Chapter 11 Distributed File Systems Introduction Case studies NFS Coda 1 Distributed File Systems A distributed file system enables clients to access files stored on one or more remote file servers A file
Chapter 11: File System Implementation. Operating System Concepts with Java 8 th Edition
Chapter 11: File System Implementation 11.1 Silberschatz, Galvin and Gagne 2009 Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation
Installation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
FileNet System Manager Dashboard Help
FileNet System Manager Dashboard Help Release 3.5.0 June 2005 FileNet is a registered trademark of FileNet Corporation. All other products and brand names are trademarks or registered trademarks of their
Virtual Private Systems for FreeBSD
Virtual Private Systems for FreeBSD Klaus P. Ohrhallinger 06. June 2010 Abstract Virtual Private Systems for FreeBSD (VPS) is a novel virtualization implementation which is based on the operating system
CYAN SECURE WEB APPLIANCE. User interface manual
CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
SMART Solutions for Active Directory Migrations
SMART Solutions for Active Directory Migrations Challenges of Active Directory Migrations Types of Active Directory Migrations Intra- Forest Migration between Domains in the Same Forest Separate a Forest
An On-line Backup Function for a Clustered NAS System (X-NAS)
_ An On-line Backup Function for a Clustered NAS System (X-NAS) Yoshiko Yasuda, Shinichi Kawamoto, Atsushi Ebata, Jun Okitsu, and Tatsuo Higuchi Hitachi, Ltd., Central Research Laboratory 1-28 Higashi-koigakubo,
Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.
Kiwi SyslogGen A Freeware Syslog message generator for Windows by SolarWinds, Inc. Kiwi SyslogGen is a free Windows Syslog message generator which sends Unix type Syslog messages to any PC or Unix Syslog
Session 17 Windows 7 Professional DNS & Active Directory(Part 2)
Session 17 Windows 7 Professional DNS & Active Directory(Part 2) Fall 2011 ITE153 Operating Systems 1 Session 17 Windows 7 Professional Operating in Microsoft Networks Fall 2011 ITE153 Operating Systems
How to protect, restore and recover SQL 2005 and SQL 2008 Databases
How to protect, restore and recover SQL 2005 and SQL 2008 Databases Introduction This document discusses steps to set up SQL Server Protection Plans and restore protected databases using our software.
Incremental Backup Script. Jason Healy, Director of Networks and Systems
Incremental Backup Script Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Incremental Backup Script 5 1.1 Introduction.............................. 5 1.2 Design Issues.............................
AVG Business Secure Sign On Active Directory Quick Start Guide
AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and
File-System Implementation
File-System Implementation 11 CHAPTER In this chapter we discuss various methods for storing information on secondary storage. The basic issues are device directory, free space management, and space allocation
Threat Modelling for Web Application Deployment. Ivan Ristic [email protected] (Thinking Stone)
Threat Modelling for Web Application Deployment Ivan Ristic [email protected] (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /
Linux Audit Quick Start SUSE Linux Enterprise 10 SP1
Linux Audit Quick Start SUSE Linux Enterprise 10 SP1 NOVELL QUICK START CARD Linux audit allows you to comprehensively log and track any access to files, directories, or resources of your system and trace
The Native AFS Client on Windows The Road to a Functional Design. Jeffrey Altman, President Your File System Inc.
The Native AFS Client on Windows The Road to a Functional Design Jeffrey Altman, President Your File System Inc. 14 September 2010 The Team Peter Scott Principal Consultant and founding partner at Kernel
SAMBA AND SMB3: ARE WE THERE YET? Ira Cooper Principal Software Engineer Red Hat Samba Team
SAMBA AND SMB3: ARE WE THERE YET? Ira Cooper Principal Software Engineer Red Hat Samba Team September 22, 2015 NO FLASH PHOTOGRAPHY SLIDES ARE ONLINE GLOSSARY What does that acronym mean? SMB Server Message
From bsdtar to tarsnap
Building an online backup service Colin Percival Tarsnap Backup Inc. [email protected] September 28, 2013 Who am I? A computer scientist. Publications in computational mathematics, numerical analysis,
KB259302 - Windows 2000 DNS Event Messages 1 Through 1614
Page 1 of 6 Knowledge Base Windows 2000 DNS Event Messages 1 Through 1614 PSS ID Number: 259302 Article Last Modified on 10/29/2003 The information in this article applies to: Microsoft Windows 2000 Server
OPERATING SYSTEMS FILE SYSTEMS
OPERATING SYSTEMS FILE SYSTEMS Jerry Breecher 10: File Systems 1 FILE SYSTEMS This material covers Silberschatz Chapters 10 and 11. File System Interface The user level (more visible) portion of the file
McAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
Wavelink Avalanche Mobility Center Linux Reference Guide
Wavelink Avalanche Mobility Center Linux Reference Guide Version 5.0 amc-rg-linux-50-20100621 Revised 21/6/2010 ii Copyright 2010 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985
Lesson Objectives. To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization
Lesson Objectives To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization AE3B33OSD Lesson 1 / Page 2 What is an Operating System? A
Microsoft Baseline Security Analyzer
The (MBSA) checks computers running Microsoft Windows Server 2008 R2 for common security misconfigurations. The following are the scanning options selected for Cisco Unified ICM Real-Time Distributor running
HowTo Check. Microsoft Cluster. Functionality via SNMP
HowTo Check Microsoft Cluster Functionality via SNMP Version 1.2 20.02.2009 Herbert Stadler [email protected] Table of Contents 1. SHORT INTRODUCTION...3 2. CHECK WINDOWS SNMP SERVICE...3 3. WINDOWS SNMP
An Open Source Wide-Area Distributed File System. Jeffrey Eric Altman jaltman *at* secure-endpoints *dot* com
An Open Source Wide-Area Distributed File System Jeffrey Eric Altman jaltman *at* secure-endpoints *dot* com What is AFS? A global wide-area Distributed File System providing location independent authenticated
Solaris Run Cron Job Every 5 Minutes
Solaris Run Cron Job Every 5 Minutes 2 ways of every 5 minutes time format in crontab Maybe you are on Solaris? As far as I know Crontab executes task every minute instead of running it once. Cron jobs
GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III
QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added
Snare System Version 6.3.3 Release Notes
Snare System Version 6.3.3 Release Notes is pleased to announce the release of Snare Server Version 6.3.3. Snare Server Version 6.3.3 Bug Fixes: Implemented enhanced memory management features within the
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with
Four Reasons To Start Working With NFSv4.1 Now
Four Reasons To Start Working With NFSv4.1 Now PRESENTATION TITLE GOES HERE Presented by: Alex McDonald Hosted by: Gilles Chekroun Ethernet Storage Forum Members The SNIA Ethernet Storage Forum (ESF) focuses
Using Secure4Audit in an IRIX 6.5 Environment
Using Secure4Audit in an IRIX 6.5 Environment Overview... 3 Icons... 3 Installation Reminders... 4 A Very Brief Overview of IRIX System auditing... 5 Installing System Auditing... 5 The System Audit Directories...
Kaseya 2. User Guide. Version 1.1
Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
ovirt and Gluster hyper-converged! HA solution for maximum resource utilization
ovirt and Gluster hyper-converged! HA solution for maximum resource utilization 21 st of Aug 2015 Martin Sivák Senior Software Engineer Red Hat Czech KVM Forum Seattle, Aug 2015 1 Agenda (Storage) architecture
Running a Workflow on a PowerCenter Grid
Running a Workflow on a PowerCenter Grid 2010-2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)
Network File System (NFS) Pradipta De [email protected]
Network File System (NFS) Pradipta De [email protected] Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS
HOW TO GUIDE. Pcounter Scan Server. For Support Click here INTRODUCTION
INTRODUCTION This document shows configuration methods of the Pcounter Scan Server on different brands of MFP. The is an FTP server application that works along with Pcounter embedded and/or MFP applications
Hadoop and Map-Reduce. Swati Gore
Hadoop and Map-Reduce Swati Gore Contents Why Hadoop? Hadoop Overview Hadoop Architecture Working Description Fault Tolerance Limitations Why Map-Reduce not MPI Distributed sort Why Hadoop? Existing Data
CIA Lab Assignment: Web Servers
CIA Lab Assignment: Web Servers A. Bakker N. Sijm C. Dumitru J. van der Ham Feedback deadline: October 17, 2014 10:00 CET Abstract Web servers are an important way of putting information out on the Internet
Determine the process of extracting monitoring information in Sun ONE Application Server
Table of Contents AboutMonitoring1 Sun ONE Application Server 7 Statistics 2 What Can Be Monitored? 2 Extracting Monitored Information. 3 SNMPMonitoring..3 Quality of Service 4 Setting QoS Parameters..
Version Control. Luka Milovanov [email protected]
Version Control Luka Milovanov [email protected] Configuration Management Configuration management is the management of system change to software products Version management: consistent scheme of version
Module 15: Nonconformance And Corrective And Preventive Action
Module 15: Nonconformance And Corrective And Preventive Action Guidance...15-2 Figure 15-1: Root Cause Diagram...15-3 Tools and Forms...15-6 Tool 15-1: Corrective & Preventive Action Worksheet...15-6 Tool
ZooKeeper. Table of contents
by Table of contents 1 ZooKeeper: A Distributed Coordination Service for Distributed Applications... 2 1.1 Design Goals...2 1.2 Data model and the hierarchical namespace...3 1.3 Nodes and ephemeral nodes...
Disaster Recovery for Ingres. Abstract
Disaster Recovery for Ingres A general disaster recovery discussion followed by Ingres specific issues and recommendations 2002-2003 Comprehensive Consulting Solutions, Inc., All rights reserved. Abstract
Mac OS X Security Checklist:
Mac OS X Security Checklist: Implementing the Center for Internet Security Benchmark for OS X Recommendations for securing Mac OS X The Center for Internet Security (CIS) benchmark for OS X is widely regarded
Getting Started. Backup Repositories. Getting Started 1/6
Getting Started 1/6 Getting Started The Server Backup application enables you to backup and restore data that is stored on the OmniVista server. You can specify that a backup be performed immediately,
Client Monitoring with Microsoft System Center Operations Manager 2007
Client Monitoring with Microsoft System Center Operations Manager 2007 Microsoft Corporation Published: December 18, 2006 Updated: December 18, 2006 Executive Summary Client monitoring is a new feature
Enabling Remote Management of SQL Server Integration Services
Enabling Remote Management of SQL Server Integration Services [email protected] www.schmittdotnet.com Version 1.0 10/14/2010 Copyright and Disclaimers This guide is for informational purposes only.
RedHat (RHEL) System Administration Course Summary
Contact Us: (616) 875-4060 RedHat (RHEL) System Administration Course Summary Length: 5 Days Prerequisite: RedHat fundamentals course Recommendation Statement: Students should have some experience with
Installation Guide for Basler pylon 2.3.x for Linux
Installation Guide for Basler pylon 2.3.x for Linux Version 2.3.x Document ID Number: AW00100401000 Revision Date: May 27, 2011 Subject to Change Without Notice Basler Vision Technologies Installation
APACHE WEB SERVER. Andri Mirzal, PhD N28-439-03
APACHE WEB SERVER Andri Mirzal, PhD N28-439-03 Introduction The Apache is an open source web server software program notable for playing a key role in the initial growth of the World Wide Web Typically
Contents. Part 1 SSH Basics 1. Acknowledgments About the Author Introduction
Acknowledgments xv About the Author xvii Introduction xix Part 1 SSH Basics 1 Chapter 1 Overview of SSH 3 Differences between SSH1 and SSH2 4 Various Uses of SSH 5 Security 5 Remote Command Line Execution
WINDOWS LOGGING CHEAT SHEET - Win 7/Win 2008 or later
This Windows Logging Cheat Sheet is intended to help you get started setting up basic and necessary Windows Audit Policy and Logging. By no means is this list extensive; but it does include some very common
Case Study. File Transfer Issues Faced by an Engineering Company
Case Study File Transfer Issues Faced by an Engineering Company Abstract This case study shows how an engineering company changed their long-running file transfer system because of security issues; and
Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services
Univention Corporate Server Operation of a Samba domain based on Windows NT domain services 2 Table of Contents 1. Components of a Samba domain... 4 2. Installation... 5 3. Services of a Samba domain...
Clinical Scheduling for Windows
RESOURCE AND PATIENT MANAGEMENT SYSTEM Clinical Scheduling for Windows (BSDX) Version 3.0 Office of Information Technology (OIT) Albuquerque, New Mexico Preface Security This manual contains the installation
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02
EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2003-2005
...2. Standard Installation...4. Example Installation Scenarios...5. Network Installation...8. Advanced Settings...10. Product Requirements
...2. Standard Installation...4. Example Installation Scenarios...5. Network Installation...8. Advanced Settings...10. Product Requirements ProjectMatrix 1 Standard Installation Install ProjectNotify from
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Surround SCM Best Practices
Surround SCM Best Practices This document addresses some of the common activities in Surround SCM and offers best practices for each. These best practices are designed with Surround SCM users in mind,
Statement of Support on Shared File System Support for Informatica PowerCenter High Availability Service Failover and Session Recovery
Statement of Support on Shared File System Support for Informatica PowerCenter High Availability Service Failover and Session Recovery Applicability This statement of support applies to the following Informatica
EMC NetWorker Module for Microsoft Applications Release 2.3. Application Guide P/N 300-011-105 REV A02
EMC NetWorker Module for Microsoft Applications Release 2.3 Application Guide P/N 300-011-105 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
PVFS High Availability Clustering using Heartbeat 2.0
PVFS High Availability Clustering using Heartbeat 2.0 2008 Contents 1 Introduction 2 2 Requirements 2 2.1 Hardware................................................. 2 2.1.1 Nodes...............................................
The Settings tab: Check Uncheck Uncheck
Hi! This tutorial shows you, the soon-to-be proud owner of a chatroom application, what the &^$*^*! you are supposed to do to make one. First no, don't do that. Stop it. Really, leave it alone. Good. First,
Lightweight Virtualization: LXC Best Practices
Lightweight Virtualization: LXC Best Practices Christoph Mitasch LinuxCon Barcelona 2012 Slide 1/28 About Based in Bavaria, Germany Selling server systems in Europe ~100 employees >10.000 customers Slide
Computer Science 4302 Operating Systems. Student Learning Outcomes
Computer Science 4302 Operating Systems Student Learning Outcomes 1. The student will learn what operating systems are, what they do, and how they are designed and constructed. The student will be introduced
Application Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
Server Monitoring: Centralize and Win
Server Monitoring: Centralize and Win Table of Contents Introduction 2 Event & Performance Management 2 Troubleshooting 3 Health Reporting & Notification 3 Security Posture & Compliance Fulfillment 4 TNT
How To Use A Microsoft Networker Module For Windows 8.2.2 (Windows) And Windows 8 (Windows 8) (Windows 7) (For Windows) (Powerbook) (Msa) (Program) (Network
EMC NetWorker Module for Microsoft Applications Release 2.3 Application Guide P/N 300-011-105 REV A03 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
Junos WebApp Secure 5.0.0-10 (formerly Mykonos)
Junos WebApp Secure 5.0.0-10 (formerly Mykonos) Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net April, 2013 Juniper Networks, Inc.
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................
BF2CC Daemon Linux Installation Guide
BF2CC Daemon Linux Installation Guide Battlefield 2 + BF2CC Installation Guide (Linux) 1 Table of contents 1. Introduction... 3 2. Opening ports in your firewall... 4 3. Creating a new user account...
ZFS Backup Platform. ZFS Backup Platform. Senior Systems Analyst TalkTalk Group. http://milek.blogspot.com. Robert Milkowski.
ZFS Backup Platform Senior Systems Analyst TalkTalk Group http://milek.blogspot.com The Problem Needed to add 100's new clients to backup But already run out of client licenses No spare capacity left (tapes,
ENTERPRISE LINUX SECURITY ADMINISTRATION
ENTERPRISE LINUX SECURITY ADMINISTRATION This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet
Vulnerability Scanning and Patch Management
Vulnerability Scanning and Patch Management Vulnerability Scanning and Patch Management Security vulnerabilities remain amongst the most disruptive and damaging types of problem experienced in real-world
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot
EXTENDED FILE SYSTEM FOR F-SERIES PLC
EXTENDED FILE SYSTEM FOR F-SERIES PLC Before you begin, please download a sample I-TRiLOGI program that will be referred to throughout this manual from our website: http://www.tri-plc.com/trilogi/extendedfilesystem.zip
Using RichCopy. For. Bulk Fileshare Transfer
Using RichCopy For Bulk Fileshare Transfer By Don Reese RichCopy is a GUI-based, multi-threaded file copy tool provided by Microsoft. It takes advantage of the multithreaded Windows environment to speed
GlusterFS Distributed Replicated Parallel File System
GlusterFS Distributed Replicated Parallel File System SLAC 2011 Martin Alfke Agenda General Information on GlusterFS Architecture Overview GlusterFS Translators GlusterFS
GL550 - Enterprise Linux Security Administration
GL550 - Enterprise Linux Security Administration This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such
Chapter 12 File Management
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Roadmap Overview File organisation and Access
How to test and debug an ASP.NET application
Chapter 4 How to test and debug an ASP.NET application 113 4 How to test and debug an ASP.NET application If you ve done much programming, you know that testing and debugging are often the most difficult
