The Debian Administrator's Handbook, Debian Wheezy from Discovery to Mastery


Book Description

Accessible to all, this book teaches the essentials to anyone who wants to become an effective and independent Debian GNU/Linux administrator. It covers all the topics that a competent Linux administrator should master, from the installation and the update of the system, up to the creation of packages and the compilation of the kernel, but also monitoring, backup and migration, without forgetting advanced topics like SELinux setup to secure services, automated installations, or virtualization with Xen, KVM or LXC. Learn more about the book on http: //debian-handbook.info




Yersinia


Book Description

You want to check how strong your local network is – check it with the Yersinia program. STP solves problems in local networks connected with high congestion of switches risking creation of loops in the Ethernet. However, besides advantages, this protocol also has disadvantages. The micro-course describes a tool for testing the Yersina local network safety including testing and attacks on STP. Keywords: yersinia, STP, atak, CDP, HSRP, LAN test, witch test, switch security Yersinia Installation of the program The yersiniaprogram Types of attacks Examples




COBOL


Book Description

What language is one of the most popular and most often used programming languages? Naturally, it is COBOL. Cobol is a programming language created for executing programs within economics. It is used as the main language in programs doing bank calculations. The micro-course describes the COBOL language and the way of compiling programs in the Linux system. Keywords: Cobol, identification, division, open-cobol




Pro Puppet


Book Description

Pro Puppet is an in-depth guide to installing, using, and developing the popular configuration management tool Puppet. The book is a comprehensive follow-up to the previous title Pulling Strings with Puppet. Puppet provides a way to automate everything from user management to server configuration. You'll learn how to create Puppet recipes, extend Puppet, and use Facter to gather configuration data from your servers. Puppet is a must-have tool for system administrators, and Pro Puppet will teach you how to maximize its capabilities and customize it for your environment. Install and configure Puppet to immediately start automating tasks and create reporting solutions Learn insider tricks and techniques to better manage your infrastructure Become a Puppet expert!




Repositories in the Debian and Ubuntu systems


Book Description

Installation of packets in Debian is even easier. In this micro-course it was described how to manage packets in Debian and Ubuntu distributions.




Desktop Linux


Book Description




VirtualBox


Book Description

The virtual system on your virtual desktop. The micro-course describes installation of the system to the VirtualBox virtualization. Keywords: VirtualBox, VBoxManage VirtualBox Installation of the VirtualBox system Installation with the use of repositories VirtualBox in the Debian system. VirtualBox in systems based on RPM Running the VirtualBoxsystem Configuration of the VirtualBox hypervisor Oracle VM VirtualBox Extension Pack




SQUID proxy server in the Linux system


Book Description

Why do I not have the updated page? The micro-course describes the SQUID proxy server, its configuration and the way to protect it against unauthorized use. Keywords: squid, proxy, proxy server




The Afbackup program


Book Description

Afbackup - another approach to creating a system backup copy. The micro-course describes the work of, configuration and running the popular program for creating backup copies - Afbackup. Keywords: afbackup, afbackup-client, full_backup, incr_backup, afrestore, avverify, afserver, afmserver




Kerberos


Book Description

Secure authentication – only with Kerberos. Kerberos is a protocol designated for authentication and authorization in computer networks. The mechanism based on this protocol mediates in confirming user identity and ensures secure access to remote services. The micro-course describes the rules of the mechanism, architecture and basic terms. Moreover, it describes installation and configuration of the system on the basis of Kerberos MIT implementation being the most popular non-commercial version of this mechanism. Keywords: Kerberos, kye seurity, Needhama, Schroedera, ticket, authentication, authorization, KDC, Key Distibution Center, Kerberos MIT, Heimdal Kerberos Kerberos – simplified way of working Kerberos – simplified way of working – stage one Kerberos – way of working Important features of the Kerberos protocol The Kerberos system glossary Implementations of the Kerberos system Installation of Kerberos Kerberos configuration