% & ' # ('$ %$)$ &*&& ) & *)+,-%. / 0--"1####$ % % # 2 (3 &,--%. # 6/4-7/*8,#071*!",7*%,+07+5 "!96+*%,+07+5 "!96+& (& * *% & & ; %&< & ###
|
|
|
- Blaise Marshall
- 10 years ago
- Views:
Transcription
1 !"$% && % & ' ('$ %$)$ &*&& ) & *)+,-%. / 0--"1$ % % 2 (3 &,--% & 6/4-7/*8/71*!"5+,"*%,+07+5 "!96+ 6/4-7/*8,071*!",7*%,+07+5 "!96+*%,+07+5 "!96+& 6/4-7/*8,071*!",7*%,+07+5 "!96+*%,+07+5 "!96+& :, ( (& * *% & & ; %&< &
2 = %$ ( %$ >(=
3 6 *$ % &2 &>( 0- )9 %9;= &.. 8&* &) 0-
4 9& ( * &, & *& %& *& & &=! " $ %!! & ' () ') ' * +,-! +-!./ 0! (! * ' 0 0 2! /.3! 4 ' 0 2 $ % $ ) %9" && * % % %$% 9" %% $ ( & %&& *& ( 9&?%?% % &>(% % & 1& =
5 ' 5 /6748.9:, ; 5" 0 ' 5 /6748.9:,, ; 5" 0 -$ &(% - +& ( 2(!! '( 2% &) 0-0-% & & &?%?$ &&& * & $ )& % % " % 3 %3%$)% '& & $ = B%$ *' ) % %= 0 ' < ( ' &3 %% ( < <<&< << < >@
6 " *& '*$ $ <& = 5 =>,?, =>,@?, ' &% % %?+? $ $ ( )&%& ( 6 &?6? A6 & *...*+C,+405--<,D6 & * & %&. % $"! $ & $ & % * )$ *& "! % 'E 8 (2!* 8&'&*&!29;2*:,*( *' ' (9& *% ' " 9& % * & %) & )!% &% >( $ & $9 9& &9(&??2 &' = ' 5 /6748.9:, ; 63.68,, ' 5 /6748.9:,, ; 63.68,, 2( &!
7 ! ). 9& &'$ " & (' *$ %( &(&& *$ (* %. $( (* & 6 * & ' * 6% $ )'6 * & %$ 1 % 3 )$ $ % %$ % *() %$ % $ %$ )& &(
8 Imprimà par Daniel L 05 oct 04 10:21 Page 1/6!/usr/bin/perl w use strict; use POSIX; use IO::Socket; use Sys::Syslog; (C) 2004 Daniel Lacroix <[email protected]> Note: Part of code were copied and adapted from "ldirectord" CVS version This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA USA =head1 NAME Daemon to monitor real squid proxy and control Linux Virtual Server director =head1 SYNOPSIS B<> [B< debug>] =head1 OPTIONS B< debug> Don t start as daemon and activate debugging message on stdout. =cut 05 oct 04 10:21 Page ip => , status => WORKING, [WORKING DEAD], ip => , status => WORKING, [WORKING DEAD], ]; Function sub daemon fork() so the parent can exit, this returns control to the command line or shell invoking your program. This step is required so that the new process is guaranteed not to be a process group leader. The next step, setsid(), fails if you re a process group leader. my $status = fork(); if($status<0) die("could not fork: $!"); if($status>0) exit(0); setsid() to become a process group and session group leader. Since a controlling terminal is associated with a session, and this new session has not yet acquired a controlling terminal our process now has no controlling terminal, which is a Good Thing for daemons. if(posix::setsid()<0) die("could not setsid"); fork() again so the parent, (the session group leader), can exit. This means that we, as a non session group leader, can never regain a controlling terminal. $status = fork(); if($status<0) die("could not fork: $!"); if($status>0) exit(0); Global variable nomber of second beetween each service check (plus check time) use constant SLEEP_STEP => 5; service port to test to check if service is working use constant SERVICE_PORT => 80; define a web site to test the porn filter use constant PORN_WEB_SITE => " list of real server to use/test my $real_server = [ mardi 05 octobre 2004 Documents/Programmation// chdir("/") to ensure that our process doesn t keep any directory in use. Failure to do this could make it so that an administrator couldn t unmount a filesystem, because it was our current directory. if(chdir("/")<0) die("could not chdir"); close() fds 0, 1, and 2. This releases the standard in, out, and error we inherited from our parent process. We have no way of knowing where these fds might have been redirected to. Note that many daemons use sysconf() to determine the limit _SC_OPEN_MAX. _SC_OPEN_MAX tells you the maximun open files/process. Then in a loop, the daemon can close all possible file descriptors. You have to decide if you
9 05 oct 04 10:21 Page 3/6 need to do this or not. If you think that there might be file descriptors open you should close them, since there s a limit on number of concurrent file descriptors. close(stdin); close(stdout); close(stderr); Establish new open descriptors for stdin, stdout and stderr. Even if you don t plan to use them, it is still a good idea to have them open. The precise handling of these is a matter of taste; if you have a logfile, for example, you might wish to open it as stdout or stderr, and open /dev/null as stdin; alternatively, you could open /dev/console as stderr and/or stdout, and /dev/null as stdin, or any other combination that makes sense for your particular daemon. if(open(stdin, "</dev/null")<0) die("could not open /dev/null"); if(open(stdout, ">>/dev/console")<0) die("could not open /dev/console"); if(open(stderr, ">>/dev/console")<0) die("could not open /dev/console"); Return: 0 : port not open 1 : port open sub check_tcp_open my ($address, $port) my $remote = IO::Socket::INET >new( Proto => "tcp", PeerAddr => $address, PeerPort => $port, Timeout => 1); my $result = 1; $result = 0 unless($remote); close($remote) if($result); return $result; Return: 0 : service not filtering 1 : service filtering sub check_porn_filter my ($address, $port) my $remote = IO::Socket::INET >new( Proto => "tcp", PeerAddr => $address, PeerPort => $port, Timeout => 1); my $result = 1; return(0) unless($remote); print $remote "GET ".PORN_WEB_SITE." HTTP/1.0\n\n"; my $res = ""; while(<$remote>) mardi 05 octobre oct 04 10:21 Page $res.= $_; if($res!~ /index\.erasme\.org/) $result = 0; close($remote); return $result; Return: 0 : serveur down 1 : serveur up sub check_server my ($address) system("ping i 0.2 W 1 c 1 $address > /dev/null"); if($?) return(0); else return(1); Start local only service sub start_local_proxy system("service optenet start"); system("iptables t nat A PREROUTING p tcp m tcp dport 80 j REDIRECT to ports 8080"); system("iptables t nat A PREROUTING p tcp m tcp dport 3128 j REDIRECT to ports 8080" system("iptables t nat A PREROUTING p tcp m tcp dport 9090 j REDIRECT to ports 8080" Stop local only service sub stop_local_proxy system("iptables t nat D PREROUTING p tcp m tcp dport 80 j REDIRECT to ports 8080"); system("iptables t nat D PREROUTING p tcp m tcp dport 3128 j REDIRECT to ports 8080" system("iptables t nat D PREROUTING p tcp m tcp dport 9090 j REDIRECT to ports 8080" system("service optenet stop"); Main program my $debug = 0; =~ debug ) $debug = 1; become a daemon &daemon() unless($debug); open syslog facility Documents/Programmation// Imprimà par Daniel L
10 Imprimà par Daniel L 05 oct 04 10:21 Page 5/6 openlog(, pid, daemon ); syslog( info, squid LVS watcher service started ); 1 if all server are down my $minimum_service = 0; check for ever while(1) my $state_changed = 0; check working server $working_server = 1; print "New service check round:\n" if($debug); foreach my $server (@$real_server) if(&check_porn_filter($server > ip, SERVICE_PORT)) if($server > status eq DEAD ) $state_changed = 1; $server > status = WORKING ; push(@working_server, $server > ip ); print "WORKING: $server >ip\n" if($debug); else if($server > status eq WORKING ) $state_changed = 1; $server > status = DEAD ; print "DEAD: $server >ip\n" if($debug); if the working status has changed, update the setup accordingly if($state_changed) print "global status changed\n" if($debug); clear all real server system("ipvsadm C; ipvsadm A f 1 s wlc"); if some server are working generate corresponding LVS setup if($working_server!= 1) add each working server to the ipvsadm list foreach my $workserver (@working_server) print "ipvsadm a f 1 r $workserver:".service_port." g w 1\n" if($debug); system("ipvsadm a f 1 r $workserver:".service_port." g w 1"); log status changer syslog( warning, status changed, working server list:.join(,,@working_server)); 05 oct 04 10:21 Page sleep a litle before next service check sleep(sleep_step); closelog(); exit(0); if we were at minimum service stop it now if($minimum_service) print "minimum service stop\n" if($debug); &stop_local_proxy(); $minimum_service = 0; oups we are alone working, start a proxy on the redirector else print "minimum service start\n" if($debug); &start_local_proxy(); $minimum_service = 1; log status changer syslog( warning, NO MORE REAL SERVER WORKING MINIMAL MODE ); mardi 05 octobre 2004 Documents/Programmation//
11 Imprimà par Daniel L squidwatch 27 sep 04 17:05 Page 1/2!/bin/bash squidwatch This starts and stops. chkconfig: description: is a daemon to monitor real squid proxy\ in the LVS loadbalancing system. pidfile: /var/run/.pid 27 sep 04 17:05 Page condrestart esac *) exit $RETVAL echo $"Usage: $0 start stop status restart" RETVAL=1 squidwatch PATH=/sbin:/bin:/usr/bin:/usr/sbin:/usr/local/bin Source function library.. /etc/init.d/functions Check that we are root... so non root users stop here [ id u = 0 ] exit 1 RETVAL=0 prog="" start() echo n $"Starting $prog: " /usr/local/bin/ RETVAL=$? echo return $RETVAL stop() echo n $"Stopping $prog: " killproc $prog RETVAL=$? echo return $RETVAL restart() stop start See how we were called. case "$1" in start) start stop) stop status) status $prog restart) restart reload) reload condrestart) mardi 05 octobre 2004 Documents/Programmation//init.d/squidwatch
Linux Syslog Messages in IBM Director
Ever want those pesky little Linux syslog messages (/var/log/messages) to forward to IBM Director? Well, it s not built in, but it s pretty easy to setup. You can forward syslog messages from an IBM Director
Linux Squid Proxy Server
Linux Squid Proxy Server Descriptions and Purpose of Lab Exercise Squid is caching proxy server, which improves the bandwidth and the reponse time by caching the recently requested web pages. Now a days
smtp-user-enum User Documentation
smtp-user-enum User Documentation [email protected] 21 January 2007 Contents 1 Overview 2 2 Installation 2 3 Usage 3 4 Some Examples 3 4.1 Using the SMTP VRFY Command................. 4 4.2
Syslog & xinetd. Stephen Pilon
Syslog & xinetd Stephen Pilon What create log files? Logging Policies Throw away all data immediately Reset log files at periodic intervals Rotate log files, keeping data for a fixed time Compress and
avast! for linux technical documentation
avast! for linux technical documentation Martin Tůma, [email protected] June 4, 2014 Contents 1 Overview 1 2 Installation 2 3 Operation 3 4 Licensing 4 5 Virus definitions updates 4 6 AMaViS integration 4
Relayd: a load-balancer for OpenBSD
Relayd: a load-balancer for OpenBSD Giovanni Bechis [email protected] University of Applied Sciences, Vienna, Austria May 5, 2012 what is relayd useful for? Reverse proxy Ssl accelerated reverse proxy
Load Balancing Microsoft AD FS. Deployment Guide
Load Balancing Microsoft AD FS Deployment Guide rev. 1.1.1 Copyright 2002 2015 Loadbalancer.org, Inc. Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org Software
Linux Shell Script To Monitor Ftp Server Connection
Linux Shell Script To Monitor Ftp Server Connection Main goal of this script is to monitor ftp server. This script is example of how to use ftp command in bash shell. System administrator can use this
OpenMCU User Manual 1/17
OpenMCU User Manual OpenMCU User Manual 1/17 INDEX p. 1. INTRODUCTION...1 2. FEATURES...1 3. OPERATION...1 4. COMMAND LINE OPTIONS...1 5. MANAGEMENT INTERFACE...2 5.1. General...2 5.2. Parameters...2 5.3.
Avast for linux technical documentation
Avast for linux technical documentation Martin Tůma, [email protected] December 10, 2014 Contents 1 Overview 1 2 Installation 2 3 Operation 4 4 Licensing 4 5 Virus definitions updates 4 6 AMaViS integration
Command Line Interface User Guide for Intel Server Management Software
Command Line Interface User Guide for Intel Server Management Software Legal Information Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel
Linux firewall. Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users
Linux firewall Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users Linux firewall Linux is a open source operating system and any firewall
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
Monitoring a Linux Mail Server
Monitoring a Linux Mail Server Mike Weber [email protected]] Various Methods to Monitor Mail Server Public Ports SMTP on Port 25 POPS on Port 995 IMAPS on Port 993 SNMP Amavis on Port 10024 Reinjection
Symom Documentation. Symom Agent MRTG. Linux. Windows. Agent. Agent. Windows Agent. Linux Agent
Symom Documentation Symom & MRTG Windows Linux Windows Linux MRTG O mrtg the most know program for bandwidth monitoring. It is simple and can also be used for monitoring other units as cpu, memory, disk.
Getting Started with RES Automation Manager Agent for Linux
Getting Started with RES Automation Manager Agent for Linux Contents Chapter 1: Introduction 1 Chapter 2: Prerequisites and General Guidelines 2 Chapter 3: Installation 3 3.1 Manual Installation... 3 3.2
PetaLinux SDK User Guide. Application Development Guide
PetaLinux SDK User Guide Application Development Guide Notice of Disclaimer The information disclosed to you hereunder (the "Materials") is provided solely for the selection and use of Xilinx products.
Libki and Koha: Leveraging Open Source Software for Single Sign-on Integration
Kyle Hall uses the case of Koha v. Libki to illustrate best practices for librarians looking to integrate two open source software systems in this chapter from editor Nicole Engard s More Library Mashups.
As shown, the emulator instance connected to adb on port 5555 is the same as the instance whose console listens on port 5554.
Tools > Android Debug Bridge Android Debug Bridge (adb) is a versatile tool lets you manage the state of an emulator instance or Android-powered device. It is a client-server program that includes three
Incremental Backup Script. Jason Healy, Director of Networks and Systems
Incremental Backup Script Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Incremental Backup Script 5 1.1 Introduction.............................. 5 1.2 Design Issues.............................
BF2CC Daemon Linux Installation Guide
BF2CC Daemon Linux Installation Guide Battlefield 2 + BF2CC Installation Guide (Linux) 1 Table of contents 1. Introduction... 3 2. Opening ports in your firewall... 4 3. Creating a new user account...
Angels (OpenSSL) and D(a)emons. Athula Balachandran Wolfgang Richter
Angels (OpenSSL) and D(a)emons Athula Balachandran Wolfgang Richter PJ1 Final Submission SSL server-side implementation CGI Daemonize SSL Stuff you already know! Standard behind secure communication on
Setting Up the Site Licenses
XC LICENSE SERVER Setting Up the Site Licenses INTRODUCTION To complete the installation of an XC Site License, create an options file that includes the Host Name (computer s name) of each client machine.
Firewall Piercing. Alon Altman Haifa Linux Club
Firewall Piercing Alon Altman Haifa Linux Club Introduction Topics of this lecture Basic topics SSH Forwarding PPP over SSH Using non-standard TCP ports Advanced topics TCP over HTTP Tunneling over UDP
F-Secure Internet Gatekeeper
F-Secure Internet Gatekeeper TOC F-Secure Internet Gatekeeper Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper...5 1.1 Features...6 Chapter 2: Deployment...8 2.1 System requirements...9 2.2
Title: Documentation for the Pi-UPS-Monitor-App
Title: Documentation for the Pi-UPS-Monitor-App Version: 0.01 Date: 09.01.14 Table of Content 1. PURPOSE, OR WHAT PIUSVMONITOR DOES...3 2. PACKAGE CONTENTS...4 3. INSTALLATION...5 4. USAGE...6 5. CONSOLE
Netfilter. GNU/Linux Kernel version 2.4+ Setting up firewall to allow NIS and NFS traffic. January 2008
Netfilter GNU/Linux Kernel version 2.4+ Setting up firewall to allow NIS and NFS traffic January 2008 Netfilter Features Address Translation S NAT, D NAT IP Accounting and Mangling IP Packet filtering
Spectrum Technology Platform. Version 9.0. Spectrum Spatial Administration Guide
Spectrum Technology Platform Version 9.0 Spectrum Spatial Administration Guide Contents Chapter 1: Introduction...7 Welcome and Overview...8 Chapter 2: Configuring Your System...9 Changing the Default
Device Integration: Cisco Wireless LAN Controller (WLC)
Complete. Simple. Affordable Device Integration: Cisco Wireless LAN Controller (WLC) Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM,
Debian and Windows Shared Printing mini HOWTO
Debian and Windows Shared Printing mini HOWTO Ian Ward 2005 07 01 Revision History Revision 1.6 2005 07 01 Revised by: iw Clarified hpijs requirement, added lpinfo and lpoptions
Job Scheduler Daemon Configuration Guide
Job Scheduler Daemon Configuration Guide A component of Mark Dickinsons Unix Job Scheduler This manual covers the server daemon component of Mark Dickinsons unix Job Scheduler. This manual is for version
Building Elastix-2.4 High Availability Clusters with DRBD and Heartbeat (using a single NIC)
Building Elastix2.4 High Availability Clusters with DRBD and Heartbeat (using a single NIC) This information has been modified and updated by Nick Ross. Please refer to the original document found at:
Rapid Access Cloud: Se1ng up a Proxy Host
Rapid Access Cloud: Se1ng up a Proxy Host Rapid Access Cloud: Se1ng up a Proxy Host Prerequisites Set up security groups The Proxy Security Group The Internal Security Group Launch your internal instances
ipta iptables Log Analyzer Anders Sikvall ichimusai.org
ipta iptables Log Analyzer Anders Sikvall ichimusai.org May 17, 2015 Version 0.1 Copyright 2015 Anders Sikvall http://ichimusai.org/projects/ipta [email protected] Contents 1 Introduction 5 1.1 Project
Linux Firewalls (Ubuntu IPTables) II
Linux Firewalls (Ubuntu IPTables) II Here we will complete the previous firewall lab by making a bridge on the Ubuntu machine, to make the Ubuntu machine completely control the Internet connection on the
Monitoring Clearswift Gateways with SCOM
Technical Guide Version 01 28/11/2014 Documentation Information File Name Document Author Document Filename Monitoring the gateways with _v1.docx Iván Blesa Monitoring the gateways with _v1.docx Issue
8 steps to protect your Cisco router
8 steps to protect your Cisco router Daniel B. Cid [email protected] Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention
Decision Support System to MODEM communications
Decision Support System to MODEM communications Guy Van Sanden [email protected] Decision Support System to MODEM communications by Guy Van Sanden This document describes how to set up the dss2modem communications
Cisco Setting Up PIX Syslog
Table of Contents Setting Up PIX Syslog...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 How Syslog Works...2 Logging Facility...2 Levels...2 Configuring
PIM SOFTWARE TR50. Configuring the Syslog Feature TECHNICAL REFERENCE. www.panduit.com [email protected] 866-721-5302 page 1
PIM SOFTWARE Configuring the Syslog Feature TECHNICAL REFERENCE TR50 Published: 5/14/08 Syslogs are typically used for computer system management and security audits and are supported by a wide variety
Network Monitoring & Management Log Management
Network Monitoring & Management Log Management These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Syslog
etrust Audit Reference Guide r8 SP2 CR1
etrust Audit Reference Guide r8 SP2 CR1 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational purposes only
GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III
QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added
$ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@";
NAME Net::FTP - FTP Client class SYNOPSIS use Net::FTP; $ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@"; $ftp->login("anonymous",'-anonymous@') or die "Cannot
MONIT. UNIX Systems Management
MONIT UNIX Systems Management Introduction monit is a utility for managing and monitoring, processes, files, directories and devices on a Unix system. Monit conducts automatic maintenance and repair and
INASP: Effective Network Management Workshops
INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network
Management, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts
AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,
Secure Proxy Server Installation Guide
Secure Proxy Server Installation Guide Copyright 2006 by Connect, Inc. All rights reserved. This document may not be reproduced in full or in part, in any form, without prior written permission of Connect
Network Monitoring & Management Log Management
Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
Device Integration: Citrix NetScaler
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
How To Analyze Logs On Aloha On A Pcode On A Linux Server On A Microsoft Powerbook (For Acedo) On A Macbook Or Ipad (For An Ubuntu) On An Ubode (For Macrocess
Application Note Analyze ALOHA s HAProxy logs with halog Document version: v1.1 Last update: 3rd September 2013 Purpose Being able to analyze logs generated by the ALOHA Load-Balancer stored in a third
SSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer
SSL Intercept Mode Certificate Installation Guide Revision 1.0.0 Warning and Disclaimer This document is designed to provide information about the configuration of CensorNet Professional. Every effort
Scalable Linux Clusters with LVS
Scalable Linux Clusters with LVS Considerations and Implementation, Part II Eric Searcy Tag1 Consulting, Inc. [email protected] May 2008 Abstract Whether you are perusing mailing lists or reading
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that
Runtime Monitoring & Issue Tracking
Runtime Monitoring & Issue Tracking http://d3s.mff.cuni.cz Pavel Parízek [email protected] CHARLES UNIVERSITY IN PRAGUE faculty of mathematics and physics Runtime monitoring Nástroje pro vývoj software
SendMIME Pro Installation & Users Guide
www.sendmime.com SendMIME Pro Installation & Users Guide Copyright 2002 SendMIME Software, All Rights Reserved. 6 Greer Street, Stittsville, Ontario Canada K2S 1H8 Phone: 613-831-4023 System Requirements
How to scan/exploit a ssl based webserver. by xxradar. http://www.radarhack.com mailto:[email protected]. Version 1.
How to scan/exploit a ssl based webserver. by xxradar. http://www.radarhack.com mailto:[email protected]. Version 1.0 21-09-2003 1. Introduction Sometimes late at night, playing with openssl and connecting
Load Balancing Trend Micro InterScan Web Gateway
Load Balancing Trend Micro InterScan Web Gateway Deployment Guide rev. 1.1.7 Copyright 2002 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...
Load Balancing McAfee Web Gateway. Deployment Guide
Load Balancing McAfee Web Gateway Deployment Guide rev. 1.1.4 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
How to Push CDR Files from Asterisk to SDReporter. September 27, 2013
How to Push CDR Files from Asterisk to SDReporter September 27, 2013 Table of Contents Revision History... 3 1 Introduction... 4 2 Build Asterisk... 4 3 Configure Asterisk... 4 3.1 Load CDR Modules...
STEP 4 : GETTING LIGHTTPD TO WORK ON YOUR SEAGATE GOFLEX SATELLITE
STEP 4 : GETTING LIGHTTPD TO WORK ON YOUR SEAGATE GOFLEX SATELLITE Note : Command Lines are in red. Congratulations on following all 3 steps. This is the final step you need to do to get rid of the old
Who s Doing What? Analyzing Ethernet LAN Traffic
by Paul Barry, [email protected] Abstract A small collection of Perl modules provides the basic building blocks for the creation of a Perl-based Ethernet network analyzer. I present a network analyzer
System Log Setup (RTA1025W Rev2)
System Log Setup (RTA1025W Rev2) System Log As shown on the web page, you can view the system log and configure system log whenever you want. To view the system log, you must configure system log first.
ESET Gateway Security
ESET Gateway Security Installation Manual and User Guide Linux, BSD and Solaris Contents 1....3 Introduction 1.1 1.2 Main...3 functionality Key...3 features of the system...5 2. Terminology and abbreviations...7
Syslog Monitoring Feature Pack
AdventNet Web NMS Syslog Monitoring Feature Pack A dventnet, Inc. 5645 G ibraltar D rive Pleasanton, C A 94588 USA P ho ne: +1-925-924-9500 Fa x : +1-925-924-9600 Em ail:[email protected] http://www.adventnet.com
OpenDaylight & PacketFence install guide. for PacketFence version 4.5.0
OpenDaylight & PacketFence install guide for PacketFence version 4.5.0 OpenDaylight & PacketFence install guide by Inverse Inc. Version 4.5.0 - Oct 2014 Copyright 2014 Inverse inc. Permission is granted
Basic Exchange Setup Guide
Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided
Assignment 3 Firewalls
LEIC/MEIC - IST Alameda ONLY For ALAMEDA LAB equipment Network and Computer Security 2013/2014 Assignment 3 Firewalls Goal: Configure a firewall using iptables and fwbuilder. 1 Introduction This lab assignment
Alteon Basic Firewall Load Balancing. Sample Configuration
T e c h n i c a l T i p TT-0411406a -- Information -- 29-Nov-2004 Contents: Contents:...1 Introduction:...1 Associated Products:...1 Sample Configuration...2 Setup...2 Configuring PC...3 Configuring CES1...3
RSA Authentication Manager
McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: RSA Authentication Manager February 26, 2015 RSA Authentication Manager Page 1 of 9 Important Note: The information contained
TREK HOSC PAYLOAD ETHERNET GATEWAY (HPEG) USER GUIDE
TREK HOSC PAYLOAD ETHERNET GATEWAY (HPEG) USER GUIDE April 2016 Approved for Public Release; Distribution is Unlimited. TABLE OF CONTENTS PARAGRAPH PAGE 1 Welcome... 1 1.1 Getting Started... 1 1.2 System
Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs [email protected]
Open Source High Availability Writing Resource Agents for your own services Lars Marowsky-Brée Team Lead SUSE Labs [email protected] Agenda Introduction Resource Agents in context Basic Resource Agents (+ code)
Introduction to Linux Virtual Server and High Availability
Outlines Introduction to Linux Virtual Server and High Availability Chen Kaiwang [email protected] December 5, 2011 Outlines If you don t know the theory, you don t have a way to be rigorous. Robert
TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.
TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure
Configuring IIS 6 to Load Balance a JBoss 4.2 Adobe LiveCycle Enterprise Suite 2 (ES2) Cluster
Adobe LiveCycle ES2 Technical Guide John C. Cummins, Technical Architect, Adobe Professional Services Public Sector Configuring IIS 6 to Load Balance a JBoss 4.2 Adobe LiveCycle Enterprise Suite 2 (ES2)
CLC License Server Administrator Manual
CLC License Server Administrator Manual User manual for CLC License Server 3.6.1 Windows, Mac OS X and Linux April 23, 2012 This software is for research purposes only. CLC bio Finlandsgade 10-12 DK-8200
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
PHP Debugging. Draft: March 19, 2013 2013 Christopher Vickery
PHP Debugging Draft: March 19, 2013 2013 Christopher Vickery Introduction Debugging is the art of locating errors in your code. There are three types of errors to deal with: 1. Syntax errors: When code
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Introduction. dnotify
Introduction In a multi-user, multi-process operating system, files are continually being created, modified and deleted, often by apparently unrelated processes. This means that any software that needs
Sys::Syslog is an interface to the UNIX syslog(3) program. Call syslog() with a string priority and a list of printf() args just like syslog(3).
Perl version 5.8.8 documentation - Sys::Syslog NAME Sys::Syslog - Perl interface to the UNIX syslog(3) calls VERSION Version 0.13 SYNOPSIS use Sys::Syslog; # all except setlogsock(), or: use Sys::Syslog
Configuration Manual
Configuration Manual Page 1 of 20 Table of Contents Chronicall Setup...3 Standard Installation...3 Non-standard Installation (Recording Library on Separate machine)...8 Configuring Call Recording through
Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version.
Release notes version 7.01 Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version. It s available as a free downloadable upgrade to existing version 7.0 customers
Adaptec Event Monitor Utility. User s Guide
Adaptec Event Monitor Utility User s Guide 2 Copyright Copyright 2013 PMC-Sierra, Inc. All rights reserved. The information in this document is proprietary and confidential to PMC-Sierra, Inc., and for
Load Balancing VMware Horizon View. Deployment Guide
Load Balancing VMware Horizon View Deployment Guide v1.1.0 Copyright 2014 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 4 Appliances Supported... 4 VMware Horizon View Versions Supported...4
Vertigo's Running Dedicated Server HOWTO (v1.2)
Vertigo's Running Dedicated Server HOWTO (v1.2) 1. Overview This document will describe the configuration details about running a megamek dedicated server in a MegaMekNET campaign setting. This document
Load Balancing Sophos Web Gateway. Deployment Guide
Load Balancing Sophos Web Gateway Deployment Guide rev. 1.0.9 Copyright 2002 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org
UNICORE UFTPD server UNICORE UFTPD SERVER. UNICORE Team
UNICORE UFTPD server UNICORE UFTPD SERVER UNICORE Team Document Version: 1.0.0 Component Version: 2.3.2 Date: 14 09 2015 UNICORE UFTPD server Contents 1 UNICORE UFTP 1 1.1 UFTP features...................................
Synthetic Application Monitoring
Synthetic Application Monitoring... Andrew Martin Senior Technical Consultant Contents End User Experience Monitoring - Synthetic Transactions 3 Argent and Synthetic Transactions 3 Web Based Application
