TASK \ OS TASK \ OS TASK \ OS Show/Set EEPROM

Total Page:16

File Type:pdf, Size:1020Kb

TASK \ OS TASK \ OS TASK \ OS Show/Set EEPROM TASK \ OS OS notes administrative GUI managing users TASK \ OS list hardware configuration unique id useful for licensing show/set EEPROM/NVRAM values add device without reboot remove device tape device stdin/ stdout/ stderr X kvm config TASK \ OS read a disk label whole disk in partition label a disk partition a disk TASK \ OS kernel show/set kernel parameters limit physical memory loaded kernel modules load module unload module make disk bootable startup scripts start/ stop/ config services shutdown (& power off if possible) run levels 1 *=normal states for more detail see www.phildev.net/runlevels.html show runlevel 1 time zone info check swap space bind process to CPU TASK \ OS "normal" filesystem volume-based filesystem file system description volume manipulation create filesystem create non-0-length empty file mount CDROM eject CDROM create/mount ISO image ACL management Fibre Channel / SAN TASK \ OS NFS share definitions NFS share command NFS information name resolution order show network interface info change IP start DHCP client ping one packet sniff network route definitions telnetd, ftpd banner set date/time (from net: ntp or other) TASK \ OS auditing encrypted passwords in min password length allow/deny root logins firewall config TASK \ OS show installed software file is in which package add software precompiled binaries of GPLware and freeware C compiler show patch level and/or patches patch tool configure/show runtime linking fortran-2000.com/ ArnaudRecipes/ sharedlib.html link library path tracing utility define user defaults csh global .login default syslog and messages system error reporting tool performance monitoring match process to file or port X pop-up Wikipedia FAQs (see also faqs.org) mailing list mailing list archives man pages www.freebsd.org/ cgi/man.cgi newsgroup(s) and forums groups.google user groups magazines vendor home page vendor docs and patches (see also man pages) vendor phone (US) wikis FreeBSD Derived from 4.4BSD-Lite and 386BSD. This table does not include external packages from /usr/ports. /stand/sysinstall pw adduser rmuser vipw chpass adduser rmuser pw vipw FreeBSD sysctl -a dmesg cat /var/run/dmesg./var/run/dmesg.bootboot pciconf -l eeprom (SPARC only) ?? ?? camcontrol atacontrol kldload ?? /dev/rsa0 /dev/fd/[012] Xorg -configure xf86config FreeBSD disklabel -r cc fdisk disklabel -wr sysinstall fdisk sysinstall FreeBSD /kernel /boot/kernel/kernel /boot/kernel.conf /boot/loader.conf sysctl /etc/sysctl.conf ?? kldstat kldload kldunload boot0cfg disklabel /etc/rc* (4-) /etc/rc.d/* (5+) /usr/local/etc/rc.d/* shutdown -p now 0: halt and power off 1: single-user mode 6: reboot c: block further logins q: rescan ttys(5) file kernel security levels: -1*: permanently insecure 0: insecure 1: secure 2: highly secure 3: network secure who -r sysctl kern.securelekern.securelevelvel /etc/localtime /usr/share/zoneinfo swapinfo pstat -s cpuset FreeBSD ufs/ffs/ufs2 (5+) ext2 ccd vinum geom (5+) /etc/fstab vinum ccdconfig geom (5.3+) gstripe (5.3+) gmirror (5.3+) graid3 (5.3+) newfs fsck fsdb clri truncate -s size [K|M|G] filename dd if=/dev/zero of= filename bs=size [b|k|m|g] \ count=desired mount /cdrom mount_cd9660 camcontrol eject devID mkisofs mdconfig; mount getfacl setfacl {get,set}{f,p}mac ?? FreeBSD /etc/exports kill -s HUP `cat /var/run/mountd.pid` nfsstat /etc/host.conf (4-) /etc/nsswitch.conf (5+) ifconfig -a edit /etc/rc.conf (option ifconfig_interfaifconfig_interfacename)cename) ifconfig dhclient ping -c 1 hostname tcpdump edit /etc/rc.conf (option defaultrouter) netstat -r route /etc/ftpwelcome date adjkerntz ntp (obs) timed FreeBSD auditd /etc/master.passwd /etc/login.access; /etc/ttys ipfw ipf pf pf pfctl FreeBSD pkg_info ls /var/db/pkg pkg_add -W file /stand/sysinstall /usr/ports make pkg_add portinstall (from /usr/ports) ftp.freebsd.org/ pub/FreeBSD http://www.freebsd.org/ /usr/bin/cc (gcc) uname -a (6.2+) csup cvsup or or cvs to update, then rebuild ldd ldconfig kldstat $LD_LIBRARY_PATH ktrace truss /etc/login.conf /etc/csh.login /var/log/messages dmesg send-pr fstat; nfsstat; systat; vmstat; netstat; uustat; top; iostat lsof sockstat /usr/local/bin/xmessage FreeBSD www.freebsd.org/doc/ en_US.ISO8859-1/books/faq lists.freebsd.org/mailman/listinfo lists.freebsd.org/mailman/listinfo www.freebsd.org/cgi/man.cgi comp.unix.bsd freebsd.misc www.freebsd.org/ support.html#user http://www.daemonnews.org/ http://www.freebsd.org/ www.freebsd.org/handbook www.freebsd.org/releases/ 925-674-0783 (FreeBSD Mall) ?? HHPP--UUXX LLiinnuuxx (rh)(rh) = Red Hat, Mandrake, SUSE,... (deb) = Debian, Libranet,... (fed) = Fedora (gen) = Gentoo (md) = Mandrake/Mandriva Hewlett-Packard (SUSE) = SUSE sam (rh, FC2+, RHEL4+) system-config* (rh) redhat-config* smh (11.31+) linuxconf (obsolete) (SUSE) yast2 (deb) dpkg-reconfigdpkg-reconfigureure (md) drakconf uusseerraadddd uusseerraadddd uusseerrddeell uusseerrmmoodd uusseerrmmoodd uusseerrddeell ggeettpprrppww aadddduusseerr mmooddpprrppww cchhaaggee ppwwggeett ggeetteenntt HHPP--UUXX LLiinnuuxx iioossccaann ddmmeessgg (if you're lucky) dmesg (if you're lucky) cat /var/log/dmesg aaddbb //pprroocc//** mmooddeell llsshhww stm (from the SupportPlus CDROM) dmidecode bdf (like most vendors' df ) ) lspci ggeettccoonnff llssppnnpp machinfo (11.23+) lsscsi pprriinntt__mmaanniiffeesstt llssuussbb lsmod (SUSE) hwinfo /sys/devices/* uname -i ?? sseettbboooott //ddeevv//nnvvrraamm (if you have it) ssttmm hhwwcclloocckk nvsetenv iinnff--ee uuddeevv (2.6+) ioscan -fnC devtype ;; uuddeevvttrriiggggeerr insf -C devtype modprobe kerneld insmod hotplug rrmmssff ??cardctl /dev/rmt/0m /dev/st0 ?? //ddeevv//ffdd//[012] xorgcfg xorgconfig Xorg -configure system-config-display xf86config XFree86 -configure redhat-config-xfree86 itemap /etc/X11/?dm HHPP--UUXX LLiinnuuxx scsimgr (11.31+) diskinfo pvdisplay fdisk -l /dev/hda (e.g. if /dev/hda1 ?? is a partition) cfdisk fdisk e2label pvcreate smh (11.31+) parted (if you have it) llvvccrreeaattee ccffddiisskk ssaamm ffddiisskk pdisk (on a MAC) (deb) mac-fdisk (on a MAC) (md) diskdrake HHPP--UUXX LLiinnuuxx /hpux (9)(9) /boot/vmlinuz* /stand/vmunix (10+) /boot/bootlx (see /etc/lilo.conf or /boot/grub/menu/boot/grub/menu.lst).lst) smh (11.31+) /proc/* ssyyssddeeffssaamm ssyyssccttll//pprroocc//ssyyss//** kmtune (11+) /etc/sysctl.conf kctune (11.23+) getconf ?? mmeemm==((iin nlliilloo..ccoonnf foor r//bboooott//ggrruubb//g grruubb..ccoonnff)) kkmmaaddmmiinn--ss llssmmoodd modprobe kmadmin -L insmod rmmod kmadmin -U modprobe -r (rh) mkbootdisk (deb) fdisk -A (and lilo to manipulate mbr) mkboot /etc/rc* (9)(9) /etc/rc* (but may vary) /etc/init.d/ /etc/rc.config.d (preferred) /sbin/rc* (10+) /sbin/init.d/ (rh) service (rh) chkconfig (deb) sysv-rc-conf shutdown -Ph now shutdown -y -g0 -i0 halt shutdown -yh 0 poweroff 00::sshhuut tddoowwnn ((sseettiinn //eettcc//iinniittttaabb)) ss,,SS::ssiinnggllee--uusseerr 00::hhaalltt 11::ssyyss aaddmmiinn ss,,SS,,11:: vendor-dependent 22::mmuullttiiuusseerr 11::ssiinnggllee--uusseerr 33**::sshhaarre eNNFFSS 22--55**::mmuullttiiuusseerr 44**::ssttaarrt tGGUUII 66::rreebboooott 5: user-defined 6: user-defined who -r /sbin/runlevel /usr/share/zoneinfo/ /usr/lib/tztab /etc/localtime catswapon /proc/meminfo -s cat /proc/swaps swapinfo free psrset -b mpsched -c intctl taskset (sched-utils) HHPP--UUXX LLiinnuuxx hhffss eexxtt22 vxfs (11.0+) ext3 ReiserFS jfs (vxfs) LVM, LVM2 LLVVMM EEVVMMSS VxVM($) VxVM($) /etc/checklist (9)(9) /etc/fstab (10+) /etc/fstab vvgg**;;llvv**; ;ppvv** ee22ffssaaddmm eexxtteennddffss llvvccrreeaattee ffssaaddmm llvvrreemmoovvee lvextend mmkkffss mmkkee22ffss nneewwffss mmkkrreeiisseerrffss mkdosfs mkfs.* ffsscckk ffsscckk ffssddbb ddeebbuuggffss e2undel dd if=/dev/zero of= filename bs=1024k count=desired prealloc ppffss__mmoouunnttdd mmoouunntt//mmnntt//ccddrroomm pfsd (deb) mount /cdrom pfs_mount mount /dev/dsk/cxtydz4 /SD_CDROM mount -orr /dev/cdrom /mnt/cdrom (requires "Rock Ridge extension" patches, 11+) ?? eject nnoohhuuppppffss__mmoouunnttdd&&;; mmkkiissooffss nohup pfsd&; pfs_mount -t iso9660 -x unix pathToIso moumountPointntPoint mount -o loop pathToIso mountPoint llssaaccll ggeettffaaccll cchhaaccll sseettffaaccll getacl setacl scsimgr (11.31+) fcmsutil fcdlist tdutil tdlist tddiag ?? HHPP--UUXX LLiinnuuxx //eettcc//eexxppoorrttss //eettcc//eexxppoorrttss eexxppoorrttffss--aa //eettcc//iinniitt..dd//nnffss--sseerrvveerrrreel looaadd share ((1111..3311++)) ((rrhh)) exportfs -a shareall (11.31+) share_nfs (11.31+) nnffssssttaatt ccaatt//pprroocc//mmoouunnttss /etc/nsswitch.conf /etc/nsswitch.conf /etc/resolv.conf nwmgr (11.31+) ifconfig llaannaaddmmiinn eetthhttooooll landiag lanscan netstat -in ifconfig lan x x //ssbbiinn//sseett__ppaarrmmssiinniittiiaall iiffccoonnffiigg ifconfig (rh) redhat-configredhat-config-network-network (fedora) system-config-netsystem-config-networkwork (rh) edit: / etc/hosts, /etc/sysconfig/network, /etc/sysconfig/ network-scripts/ ifcfg-eth0 (deb) edit /etc/network/interfaces; /etc/init.d/networking restart dhcpcd dhclient ?? ping hostname 10 1 (9)(9) ping hostname -n 1 (10+) ping -c 1 hostname nneettttll eetthheerrffiinndd nneettffmmtt ttccppdduummpp wireshark ( formerly ethereal) etherape /etc/rc.config.d/netconf route netstat -r (rh) /etc/sysconfig/network (rh) /etc/sysconfig/static-routes (deb) /etc/init.d/n/etc/init.d/networketwork (deb) /etc/network /etc/issue.net (telnet) (ftp varies; can use tcp wrappers) /etc/inetd.conf (telnet) ntpdate rdate netdate ntpdate HHPP--UUXX LLiinnuuxx audisp (2.6+) auditd aauuddeevveenntt //vvaarr//lloogg//ffaaiilllloogg
Recommended publications
  • Freenas® 11.0 User Guide
    FreeNAS® 11.0 User Guide June 2017 Edition FreeNAS® IS © 2011-2017 iXsystems FreeNAS® AND THE FreeNAS® LOGO ARE REGISTERED TRADEMARKS OF iXsystems FreeBSD® IS A REGISTERED TRADEMARK OF THE FreeBSD Foundation WRITTEN BY USERS OF THE FreeNAS® network-attached STORAGE OPERATING system. VERSION 11.0 CopYRIGHT © 2011-2017 iXsystems (https://www.ixsystems.com/) CONTENTS WELCOME....................................................1 TYPOGRAPHIC Conventions...........................................2 1 INTRODUCTION 3 1.1 NeW FeaturES IN 11.0..........................................3 1.2 HarDWARE Recommendations.....................................4 1.2.1 RAM...............................................5 1.2.2 The OperATING System DeVICE.................................5 1.2.3 StorAGE Disks AND ContrOLLERS.................................6 1.2.4 Network INTERFACES.......................................7 1.3 Getting Started WITH ZFS........................................8 2 INSTALLING AND UpgrADING 9 2.1 Getting FreeNAS® ............................................9 2.2 PrEPARING THE Media.......................................... 10 2.2.1 On FreeBSD OR Linux...................................... 10 2.2.2 On WindoWS.......................................... 11 2.2.3 On OS X............................................. 11 2.3 Performing THE INSTALLATION....................................... 12 2.4 INSTALLATION TROUBLESHOOTING...................................... 18 2.5 UpgrADING................................................ 19 2.5.1 Caveats:............................................
    [Show full text]
  • CIS Debian Linux 7 Benchmark V1.0.0 - 12-31-2015
    CIS Debian Linux 7 Benchmark v1.0.0 - 12-31-2015 http://benchmarks.cisecurity.org The CIS Security Benchmarks division provides consensus-oriented information security products, services, tools, metrics, suggestions, and recommendations (the “SB Products”) as a public service to Internet users worldwide. Downloading or using SB Products in any way signifies and confirms your acceptance of and your binding agreement to these CIS Security Benchmarks Terms of Use. CIS SECURITY BENCHMARKS TERMS OF USE BOTH CIS SECURITY BENCHMARKS DIVISION MEMBERS AND NON-MEMBERS MAY: Download, install, and use each of the SB Products on a single computer, and/or Print one or more copies of any SB Product that is in a .txt, .pdf, .doc, .mcw, or .rtf format, but only if each such copy is printed in its entirety and is kept intact, including without limitation the text of these CIS Security Benchmarks Terms of Use. UNDER THE FOLLOWING TERMS AND CONDITIONS: SB Products Provided As Is. CIS is providing the SB Products “as is” and “as available” without: (1) any representations, warranties, or covenants of any kind whatsoever (including the absence of any warranty regarding: (a) the effect or lack of effect of any SB Product on the operation or the security of any network, system, software, hardware, or any component of any of them, and (b) the accuracy, utility, reliability, timeliness, or completeness of any SB Product); or (2) the responsibility to make or notify you of any corrections, updates, upgrades, or fixes. Intellectual Property and Rights Reserved. You are not acquiring any title or ownership rights in or to any SB Product, and full title and all ownership rights to the SB Products remain the exclusive property of CIS.
    [Show full text]
  • Nport 5600 Series User's Manual
    NPort 5600 Series User’s Manual Fifteenth Edition, September 2014 www.moxa.com/product © 2014 Moxa Inc. All rights reserved. NPort 5600 Series User’s Manual The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice © 2014 Moxa Inc. All rights reserved. Trademarks The MOXA logo is a registered trademark of Moxa Inc. All other trademarks or registered marks in this manual belong to their respective manufacturers. Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa. Moxa provides this document as is, without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are periodically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. Technical Support Contact Information www.moxa.com/support Moxa Americas Moxa China (Shanghai office) Toll-free: 1-888-669-2872 Toll-free: 800-820-5036 Tel: +1-714-528-6777 Tel: +86-21-5258-9955 Fax: +1-714-528-6778 Fax: +86-21-5258-5505 Moxa Europe Moxa Asia-Pacific Tel: +49-89-3 70 03 99-0 Tel: +886-2-8919-1230 Fax: +49-89-3 70 03 99-99 Fax: +886-2-8919-1231 Moxa India Tel: +91-80-4172-9088 Fax: +91-80-4132-1045 Table of Contents 1.
    [Show full text]
  • 1 Introduction
    Technical report, IDE1202, February 2012 Enhancing Network Security in Linux Environment Master Thesis in Computer Network Engineering By Ali Mohammed, Sachin Sama and Majeed Mohammed School of Information Science, Computer and Electrical Engineering Halmstad University i Enhancing Network Security in Linux Environment Master Thesis in Computer Network Engineering School of Information Science, Computer and Electrical Engineering Halmstad University Box 823, S-301 18 Halmstad, Sweden February 2012 ii Preface First of all, we would like to express our sincere gratitude to our Supervisor Philip Heimer and Professor Tony Larsson for their supervision and assistance in the entire thesis work. We are also thankful to IDE department, Halmstad University for providing this opportunity to complete this thesis. Ali Mohammed Sachin Sama Majeed Mohammed iii iv Abstract Designing a secured network is the most important task in any enterprise or organization development. Securing a network mainly involves applying policies and procedures to protect different network devices from unauthorized access. Servers such as web servers, file servers, mail servers, etc., are the important devices in a network. Therefore, securing these servers is the first and foremost step followed in every security implementation mechanism. To implement this, it is very important to analyse and study the security mechanisms provided by the operating system. This makes it easier for security implementation in a network. This thesis work demonstrates the tasks needed to enhance the network security in Linux environment. The various security modules existing in Linux makes it different from other operating systems. The security measures which are mainly needed to enhance the system security are documented as a baseline for practical implementation.
    [Show full text]
  • Access Control Framework
    This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author (s) and do not necessarily reflect the views of the National Science Foundation C5L1S1 When working for an institution as a Linux Administrator, you may be required to protect certain information based on its sensitivity. For instance, most organizations will have an internal network in which data contained in certain directories or drives are made public—employees can access the contents. However, certain kinds of information such as employee salaries, classified research, secret prototypes, health information, military secrets, and private communications are considered highly sensitive and are usually restrictedU the from everyone except very few people authorized to access the data. In this lesson, we will explore processes, tools, and control lists that make it possible to limit access to sensitive data on a Linux-based system. Understanding this topic is important for any system administrator configuring systems in the workplace that require access control mechanisms. C5L1S2 You should know what will be expected of you when you complete this lesson. These expectations are presented as objectives. Objectives are short statements of expectations that tell you what you must be able to do, perform, learn, or adjust after reviewing the lesson. Lesson Objective: U the Given the need to secure a Linux server, the student will recommend a set of standard Linux tools such as PAM, Access Control Lists, and TCP Wrappers to effectively secure a Linux system and demonstrate the use of one set of tools for system lock-down.
    [Show full text]
  • Tigersharc DSP Hardware Specification, Revision 1.0.2, Direct Memory Access
    7 DIRECT MEMORY ACCESS Figure 7-0. Table 7-0. Listing 7-0. Overview Direct Memory Access (DMA) is a mechanism for transferring data with- out core being involved. The TigerSHARC® DSP’s on-chip DMA controller relieves the core processor of the burden of moving data between internal memory and an external device, external memory, or between link ports and internal or external memory. The fully-integrated DMA controller allows the TigerSHARC® DSP core processor, or an external device, to specify data transfer operations and return to normal processing while the DMA controller carries out the data transfers in the background. The TigerSHARC® DSP DMA competes with other masters for internal memory access. For more information, see “Architecture and Microarchi- tecture Overview” on page 6-7. This conflict is minimized due to the large internal memory bandwidth that is available. The DMA includes 14 DMA channels, four of which are dedicated to external memory devices, eight to link ports, and two to AutoDMA registers. TigerSHARC DSP Hardware Specification 7 - 1 Overview Figure 7-1 shows a block diagram of the TigerSHARC® DSP’s DMA controller. TRANSMITTER RECEIVER TCB TCB REGISTERS REGISTERS Internal DMA DMA CONTROLLER Bus Requests Interface Figure 7-1. DMA Block Diagram Data Transfers — General Information The DMA controller can perform several types of data transfers: • Internal memory ⇒ external memory and memory-mapped periph- erals • Internal memory ⇒ internal memory of other TigerSHARC® DSPs residing on the cluster bus • Internal memory ⇒ host processor • Internal memory ⇒ link port I/O • External memory ⇒ external peripherals 7 - 2 TigerSHARC DSP Hardware Specification Direct Memory Access • External memory ⇒ internal memory • External memory ⇒ link port I/O • Link port I/O ⇒ internal memory • Link port I/O ⇒ external memory • Cluster bus master via AutoDMA registers ⇒ internal memory Internal-to-internal memory transfers are not directly supported.
    [Show full text]
  • My Name Is Robert Kudyba and I Am the System Administrator for The
    My name is Robert Kudyba and I am the System Administrator for the Department of Computer Science here at Fordham University and a recent graduate of the Master’s in Cybersecurity. The lab will require you to install VirtualBox with Ubuntu preferable from osboxes.org. The commands listed in the lab will assume you have installed this image. Any Ubuntu version will work but if you installed from ubuntu.com then you will have to substitute the username you created for every place I reference osboxes. If you use Kali, you will be using the root user and there may be other issues as I’ve only confirmed everything works on Ubuntu. 1 In this lab, I will be gong over Linux remote access protocols Telnet and SSH, providing a history, the various encryption methods used, the concept of security through obscurity, a program called Fail2ban, how to use a Certificate Authority in OpenSSH, TCPWrapper, and Port Knocking. 2 • Telnet is a simple, text-based network protocol that is used for accessing remote computers over TCP/IP networks like the Internet. Telnet was created and launched in 1969. • Prior to telnet, you had to physically walk to a server in order to access its data. This meant, among other things, that you had to spend some time arriving at the server's location and then you had to wait for your turn to work with the server. Even if the server had the hardware power to do multiple things at the same time, you were blocked from using if someone was before you so you had to wait for others to finish their work first.
    [Show full text]
  • Nessus 8.11 User Guide
    Nessus 8.11.x User Guide Last Updated: October 29, 2020 Table of Contents Welcome to Nessus 8.11.x 13 Get Started with Nessus 16 Navigate Nessus 18 System Requirements 19 Hardware Requirements 20 Software Requirements 23 Licensing Requirements 26 Deployment Considerations 27 Host-Based Firewalls 28 IPv6 Support 29 Virtual Machines 30 Antivirus Software 31 Security Warnings 32 Manage SSL Certificates 33 Custom SSL Certificates 34 SSL Client Certificate Authentication 35 Create a New Custom CA and Server Certificate 36 Upload a Custom CA Certificate 38 Add a Root CA 39 Create Nessus SSL Certificates for Login 40 Enable Connections with Smart Card or CAC Card 43 Connect with Certificate or Card Enabled Browser 44 Copyright © 2020 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade- marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective Install Nessus and Nessus Agents 46 Download Nessus 47 Install Nessus 49 Install Nessus on Linux 50 Install Nessus on Windows 52 Install Nessus on Mac OS X 54 Install Nessus Agents 56 Retrieve the Linking Key 57 Install a Nessus Agent on Linux 58 Install a Nessus Agent on Windows 62 Install a Nessus Agent on Mac OS X 66 Link an Agent to Nessus Manager 70 Upgrade Nessus and Nessus Agents 73 Upgrade Nessus 74 Upgrade from Evaluation 75 Update Nessus Software 76 Upgrade Nessus on Linux 79 Upgrade Nessus on Windows 80 Upgrade Nessus on Mac OS X 81 Upgrade a Nessus Agent 82 Downgrade Nessus Software 85 Configure Nessus 86 Install Nessus Essentials, Professional, or Manager 87 Link to Tenable.io 89 Copyright © 2020 Tenable, Inc.
    [Show full text]
  • Performance, Scalability on the Server Side
    Performance, Scalability on the Server Side John VanDyk Presented at Des Moines Web Geeks 9/21/2009 Who is this guy? History • Apple // • Macintosh • Windows 3.1- Server 2008R2 • Digital Unix (Tru64) • Linux (primarily RHEL) • FreeBSD Systems Iʼve worked with over the years. Languages • Perl • Userland Frontier™ • Python • Java • Ruby • PHP Languages Iʼve worked with over the years (Userland Frontier™ʼs integrated language is UserTalk™) Open source developer since 2000 Perl/Python/PHP MySQL Apache Linux The LAMP stack. Time to Serve Request Number of Clients Performance vs. scalability. network in network out RAM CPU Storage These are the basic laws of physics. All bottlenecks are caused by one of these four resources. Disk-bound •To o l s •iostat •vmstat Determine if you are disk-bound by measuring throughput. vmstat (BSD) procs memory page disk faults cpu r b w avm fre flt re pi po fr sr tw0 in sy cs us sy id 0 2 0 799M 842M 27 0 0 0 12 0 23 344 2906 1549 1 1 98 3 3 0 869M 789M 5045 0 0 0 406 0 10 1311 17200 5301 12 4 84 3 5 0 923M 794M 5219 0 0 0 5178 0 27 1825 21496 6903 35 8 57 1 2 0 931M 784M 909 0 0 0 146 0 12 955 9157 3570 8 4 88 blocked plenty of RAM, idle processes no swapping CPUs A disk-bound FreeBSD machine. b = blocked for resources fr = pages freed/sec cs = context switches avm = active virtual pages in = interrupts flt = memory page faults sy = system calls per interval vmstat (RHEL5) # vmstat -S M 5 25 procs ---------memory-------- --swap- ---io--- --system- -----cpu------ r b swpd free buff cache si so bi bo in cs us sy id wa st 1 0 0 1301 194 5531 0 0 0 29 1454 2256 24 20 56 0 0 3 0 0 1257 194 5531 0 0 0 40 2087 2336 34 27 39 0 0 2 0 0 1183 194 5531 0 0 0 53 1658 2763 33 28 39 0 0 0 0 0 1344 194 5531 0 0 0 34 1807 2125 29 19 52 0 0 no blocked busy but not processes overloaded CPU in = interrupts/sec cs = context switches/sec wa = time waiting for I/O Solving disk bottlenecks • Separate spindles (logs and databases) • Get rid of atime updates! • Minimize writes • Move temp writes to /dev/shm Overview of what weʼre about to dive into.
    [Show full text]
  • Xcode Package from App Store
    KH Computational Physics- 2016 Introduction Setting up your computing environment Installation • MAC or Linux are the preferred operating system in this course on scientific computing. • Windows can be used, but the most important programs must be installed – python : There is a nice package ”Enthought Python Distribution” http://www.enthought.com/products/edudownload.php – C++ and Fortran compiler – BLAS&LAPACK for linear algebra – plotting program such as gnuplot Kristjan Haule, 2016 –1– KH Computational Physics- 2016 Introduction Software for this course: Essentials: • Python, and its packages in particular numpy, scipy, matplotlib • C++ compiler such as gcc • Text editor for coding (for example Emacs, Aquamacs, Enthought’s IDLE) • make to execute makefiles Highly Recommended: • Fortran compiler, such as gfortran or intel fortran • BLAS& LAPACK library for linear algebra (most likely provided by vendor) • open mp enabled fortran and C++ compiler Useful: • gnuplot for fast plotting. • gsl (Gnu scientific library) for implementation of various scientific algorithms. Kristjan Haule, 2016 –2– KH Computational Physics- 2016 Introduction Installation on MAC • Install Xcode package from App Store. • Install ‘‘Command Line Tools’’ from Apple’s software site. For Mavericks and lafter, open Xcode program, and choose from the menu Xcode -> Open Developer Tool -> More Developer Tools... You will be linked to the Apple page that allows you to access downloads for Xcode. You wil have to register as a developer (free). Search for the Xcode Command Line Tools in the search box in the upper left. Download and install the correct version of the Command Line Tools, for example for OS ”El Capitan” and Xcode 7.2, Kristjan Haule, 2016 –3– KH Computational Physics- 2016 Introduction you need Command Line Tools OS X 10.11 for Xcode 7.2 Apple’s Xcode contains many libraries and compilers for Mac systems.
    [Show full text]
  • The Complete Freebsd
    The Complete FreeBSD® If you find errors in this book, please report them to Greg Lehey <grog@Free- BSD.org> for inclusion in the errata list. The Complete FreeBSD® Fourth Edition Tenth anniversary version, 24 February 2006 Greg Lehey The Complete FreeBSD® by Greg Lehey <[email protected]> Copyright © 1996, 1997, 1999, 2002, 2003, 2006 by Greg Lehey. This book is licensed under the Creative Commons “Attribution-NonCommercial-ShareAlike 2.5” license. The full text is located at http://creativecommons.org/licenses/by-nc-sa/2.5/legalcode. You are free: • to copy, distribute, display, and perform the work • to make derivative works under the following conditions: • Attribution. You must attribute the work in the manner specified by the author or licensor. • Noncommercial. You may not use this work for commercial purposes. This clause is modified from the original by the provision: You may use this book for commercial purposes if you pay me the sum of USD 20 per copy printed (whether sold or not). You must also agree to allow inspection of printing records and other material necessary to confirm the royalty sums. The purpose of this clause is to make it attractive to negotiate sensible royalties before printing. • Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this one. • For any reuse or distribution, you must make clear to others the license terms of this work. • Any of these conditions can be waived if you get permission from the copyright holder. Your fair use and other rights are in no way affected by the above.
    [Show full text]
  • David Gwynne <[email protected]>
    firewalling with OpenBSD's pf and pfsync David Gwynne <[email protected]> Thursday, 17 January 13 introduction ‣ who am i? ‣ what is openbsd? ‣ what are pf and pfsync? ‣ how do i use them? ‣ ask questions whenever you want Thursday, 17 January 13 who am i? ‣ infrastructure architect in EAIT at UQ ‣ i do stuff, including run the firewalls ‣ a core developer in openbsd ‣ i generally play with storage ‣ but i play with the network stack sometimes Thursday, 17 January 13 what is openbsd? ‣ open source general purpose unix-like operating system ‣ descended from the original UNIX by way of berkeley and netbsd ‣ aims for “portability, standardization, correctness, proactive security and integrated cryptography.” ‣ supports various architectures/platforms Thursday, 17 January 13 what is openbsd? ‣ one source tree for everything ‣ kernel, userland, doco ‣ bsd/isc/mit style licenses on all code (with some historical exceptions) ‣ 6 month dev cycle resulting in a release ‣ 3rd party software via a ports tree ‣ emergent focus on network services Thursday, 17 January 13 what is openbsd? ‣ it is very aggressive ‣ changes up and down the stack (compiler to kernel) to make a harsher, stricter, and less predictable runtime environment ‣ minimal or no backward compatibility as things move forward ‣ whole tree is checked for new bugs ‣ randomise as much as possible all over Thursday, 17 January 13 what is openbsd? ‣ it is extremely conservative ‣ tree must compile and work at all times ‣ big changes go in at the start of the cycle ‣ we’re not afraid to back stuff out ‣ peer review is necessary ‣ we do back away from some tweaks for the sake of usability Thursday, 17 January 13 what is pf? ‣ short for packet filter ‣ the successor to IP Filter (ipf) ‣ ipf was removed due to license issues ‣ the exec summary is that it is a stateful filter for IP (v4 and v6) traffic ‣ does a little bit more than that though..
    [Show full text]