Ethereal Users Guide


Book Description

Ethereal is one of those packages that many network managers would love to be able to use, but they are often prevented from getting what they would like from Ethereal because of the lack of documentation. This document is part of an effort on the part of the Ethereal team to improve the accessibility of Ethereal. We hope that you find it useful, and look forward to your comments.




Rick Gallahers MPLS Training Guide


Book Description

Rick Gallahers MPLS Training Guide introduces readers to mpls concepts, installation, migration, operation, inspection, and troubleshooting. It discusses specific router and switch platforms and includes such topics as frame-mode mpls, cell-mode mpls, label distribution protocol, tag distribution protocol, label distribution protocol migration, mpls configuration, traffic engineering, mpls vpns, mpls vpn deployment models, mpls vpn routing protocol support, multi-protocol bgp, mpls vpn configurations, mpls vpn integration, and mpls vpn management. - Readers will find complete ready-to-use configurations for routers - Shows how to implement MPLS traffic engineering on a core network and optimize traffic - Great for users studying for Cisco's Implementing Cisco MPLS exam, 640-910 and written by a Cisco internetworking expert who knows everything about MPLS - Includes coverage of Cisco Systems' newly released (October 7, 2002) Multiprotocol Label Switching (MPLS) - Bandwidth Protection software package. The new architecture uses MPLS Traffic Engineering Fast Reroute and an offline application called Tunnel Builder Pro to increase resiliency at a network-wide level - Includes updated coverage of MPLS and GMPLS




Ethereal Packet Sniffing


Book Description

This book provides system administrators with all of the information as well as software they need to run Ethereal Protocol Analyzer on their networks. There are currently no other books published on Ethereal, so this book will begin with chapters covering the installation and configuration of Ethereal. From there the book quickly moves into more advanced topics such as optimizing Ethereal's performance and analyzing data output by Ethereal. Ethereal is an extremely powerful and complex product, capable of analyzing over 350 different network protocols. As such, this book also provides readers with an overview of the most common network protocols used, as well as analysis of Ethereal reports on the various protocols. The last part of the book provides readers with advanced information on using reports generated by Ethereal to both fix security holes and optimize network performance. - Provides insider information on how to optimize performance of Ethereal on enterprise networks. - Book comes with a CD containing Ethereal, Tethereal, Nessus, Snort, ACID, Barnyard, and more! - Includes coverage of popular command-line version, Tethereal.




Linux Clustering


Book Description

"Linux Clustering" is the premier resource for system administrators wishing to implement clustering solutions on the many types of Linux systems. It guides Linux Administrators through difficult tasks while offering helpful tips and tricks.




The Official Samba-3 HOWTO and Reference Guide


Book Description

A guide to the features of Samba-3 provides step-by-step installation instructions on integrating Samba into a Windows or UNIX environment.




Tools for Teaching Computer Networking and Hardware Concepts


Book Description

"This book offers concepts of the teaching and learning of computer networking and hardwar eby offering undamental theoretical concepts illustrated with the use of interactive practical exercises"--Provided by publisher.




Red Hat Linux - Study Guide


Book Description




Love: A User's Guide


Book Description

Working for Vogue, Amy spends her days dressing waif models in London’s latest apparel while fending off insults from the Gucci-garbed staff. Hardly the glamorous job she hoped it would be. But that won’t stop her from fantasizing about the sensational life she knows she’s destined for—or the prince who’s bound to redeem her from a less-than-glowing record in romance. However, beneath her dreamy exterior, Amy has a sure streak of common sense. So when the impossible happens—and her path crosses that of London’s hottest film star—she swoons with longing, expecting nothing in return. But Orlando Rock has other ideas. For Amy is just the kind of girl he’s after: smart and witty, different from the daft supermodels and vain leading ladies he’s dated before. Or is she? For with fame, fortune, and true love just around the corner, Amy’s head is spinning, her jet-fueled imagination poised for takeoff. Is her love for Orlando stronger than her lust for the limelight—or is she merely fated to be the paparazzi’s latest prey?




Managing Security with Snort & IDS Tools


Book Description

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools. This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs.Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts.Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.




Motorola Droid X Survival Guide: Step-by-Step User Guide for Droid X: Getting Started, Downloading FREE EBooks, Using EMail, Photos and Videos, and Surfing Web


Book Description

This concise Motorola Droid X manual provides step-by-step instructions on how to do everything with your Droid X FASTER. This phone is a highly customizable device that uses the Android operating system. You will unlock hidden secrets on your device, such as how to download FREE eBooks, send email, surf the web, and read news for FREE. This Droid X guide includes: Getting Started: - Button Layout - Navigating the Screens - Making Calls - Using the Speakerphone During a Voice Call - Staring a Conference Call - Managing Your Contacts - Adding a New Contact - Adding a Favorite Contact (Speed Dial) - Text Messaging - Adding Texted Phone Numbers to Contacts - Copying, Cutting, and Pasting Text - Using Swype - Sending Picture and Video Messages - Using the Internet Browser - Managing Open Browser Windows - Photos and Videos - Taking Pictures - Capturing Videos - Using the Email Application - Changing Email Options - Managing Applications - Sharing an Application - Using the Android Market to Download Applications - Reading User Reviews - Deleting an Application Advanced Topics: - Reading eBooks on the Droid X - Downloading thousands of free eBooks - Adjusting the Settings - Turning Vibration On and Off - Setting Alert Sounds - Changing the Wallpaper - Setting a Pattern Lock - Changing Keyboard Settings - Changing Photo Settings - Turning Bluetooth On and Off - Turning Wi-Fi On and Off - Turning Airplane Mode On and Off - Tips and Tricks - Using Voice Search - Maximizing Battery Life - Resetting Your Droid X - Viewing the Full Horizontal Keyboard - Calling a Number on a Website - Troubleshooting - List of Droid-friendly websites that save you time typing in long URL addresses