CV Sebastian Schönwetter

Total Page:16

File Type:pdf, Size:1020Kb

CV Sebastian Schönwetter CV Sebastian Schönwetter Personal details Name Sebastian Schönwetter Address Steenweg op Brussel 149 1780 Wemmel Belgium Telephone Office : +32-2-460 39 86 Fax : +32-2-460 88 49 GSM : +32-485-844 368 Email [email protected] Date and place of birth October 13th, 1978, Berlin Languages Dutch, fluent French, fluent English, fluent German, fluent Extra qualifications Novell Netware 3.12 Microsoft Certified Professional Windows NT Microsoft Certified Professional TCP/IP Networking Microsoft Certified Professional Microsoft Exchange HP-UX Unix Administration Level 300 HP Surestore E XP512 Level 100,200,300 HP Virtual Array 7x00 Level 100,200,300 HP Advanced Storage Area Networks High Availability with MC/Serviceguard Projects Storage Date Customer Project Environment 2001/08 Belgian Post Group XP512 – installation Solaris 2001/08 HP Internal Networked RAID1 for clustering Linux 2001/10 Ebone / KPN Qwest XP256 migration Solaris / HP-UX 2001/10 Belgian Post Group XP512 – Business Copy Solaris 2001/12 Content Europe XP512 HP-UX / Linux 2002/02 Vlaams fonds Sociale Integratie XP48 – Business Copy & Continuous Access HP-UX 2002/03 DEME / Dredging International VA 7100 / Brocade installation Win2k 2002/03 TRW VA 7100 installation HP-UX 2002/04 Miko Coffee Belgium VA 7100 – Data migration HP-UX 2002/04 JetAir VA 7100 / Brocade installation HP-UX 2002/05 Alpro VA 7400 / Brocade – Data migration EMC HP-UX symmetrix 2003/09 Belgian Post Group XP 512 Disaster Recovery / Continuous Access Solaris / W2K 2003/07 Belgian Post Bank XP 1024 Solaris 2003/11 HP France / Carrefour France XP 1024 - Performance benchmark + ExpansionAIX 2004/1 Phoenix IT Services France Remote monitoring/alarming for XP256/XP512 WinNT / Perl 2004/9 HP France / ANPE Business Copy XP1024 / XP512 HP-UX 2004/12 Sun MicroSystems / Pioneer Legato Networker / Sun EBS Solaris Europe 2005/2 Sun MicroSystems / Luminus ShadowImage implementation Solaris 2005/3 Sun MicroSystems / Sogesma Legato Networker / Sun EBS Solaris 2005/3 European School Brussels II Legato Networker Linux 2005/6 Belgian Post Group XP12000 – installations + migrations Solaris 2005/8 Belgian Post Group XP12000 – scripting for ShadowImage Solaris / Windows 2005/11 Belgian Post Group XP12000 – scripting for TrueCopy Solaris / Windows Unix Date Customer Project Environment 2001/02 Ebone / KPN Qwest System configuration data collection (HP COP) HP-UX 2001/05 Roxell HP-UX installation HP-UX 2001/09 SAEY Steel Holding Performance Analysis Unix / Autoraid HP-UX 2001/09 Sycron Belgium Performance Analysis Unix HP-UX 2001/11 Universitair Ziekenhuis Antwerp Ignite-UX server implementation + Golden HP-UX image creation 2003/05 Belgian Post Group Cricket monitoring and graphing Solaris 2004/06 European School Brussels II Windows, Exchange 2000 migration to Linux / Linux Samba / OpenLDAP 2004/10 Sun Microsystems / Pioneer Data center migration - re-installation Solaris Europe 2005/2-3 Sun Microssystems / Luminus Data center migration Solaris 2005/6-12 Belgian Post Group System Administration Solaris Scripting Date Customer Project Environment 2002/08 European School Web-based creation of users / home IIS / W2K / Solaris / Perl / directories / mailboxes / active directory VBScript containers, database drive from Oracle database on Solaris 2003/02 Belgian Post Group Automatic creation of excel reports about disk Solaris / Linux / Perl space utilization / SAN topology 2003/05 Belgian Post Group Web-based admin tool for restarting and Reliant UNIX / Shell / C logging application reboots Projects (cont'd) Clustering Date Customer Project Environment 2001/04 HP Internal MC/Serviceguard cluster with NFS and Oracle HPUX DB 2002/09 HP Internal OpenMosix cluster with application load Linux balancing 2002/11 Jean Richard Insurance Heartbeat Cluster with Apache / Postgres / Linux DHCP / BIND server 2004/4 HP France / STK MicroElectronics MC/SG Cluster for OmniBack + Oracle HPUX 2005/4 Jean Richard Insurance Redesign cluster with SAN and Central storage Linux 2005/12 Belgian Post Group Integration of ShadowImage (HP Continuous Solaris Access) in Veritas Cluster Network management Date Customer Project Environment 2003 Belgian Post Group Brocade FC Switches monitoring in Big Brother Big Brother/Linux/Solaris 2002/2003 Belgian Post Group HP XP512 Monitoring in Big Brother Big Brother/Solaris 2003 Belgian Post Group XP512 Performance graphing Cricket/Linux 2003 Belgian Post Group Brocade FC Swutch traffic graphing Cricket/Linux 2004/8 Open2 Nagios monitoring of all customers Nagios/Linux 2004/11 Interbrew Nagios monitoring of printing environment Nagios/AIX 2005/3-6 Interbrew Nagios as a replacement for BMC Patrol Nagios/AIX 2006/5 Belgian Local Polic Nagios network monitoring of local Network Nagios/Linux Printing Date Customer Project Environment 2003/12 Interbrew Dazel - HP OMS AIX 2004/1 Interbrew Web-Based Automatisation HP OMS AIX / PHP / Perl 2004/3-6 Interbrew SAP / HP OMS document management using AIX / Perl EMC Documentum 2004/7-12 Interbrew SAP output formatting using StreamServe / HP AIX / Perl OMS Technical Knowledge Application software Sun Staroffice / OpenOffice Operating Systems Linux Telecommunications HP-UX 10.20, 11.00, 11.11 Comverse Voice mail systems Solaris 2.6, 8.0, 9.0 x86 & sparc, 10 Comverse iSMSC systems SCO Unixware & Openserver Comverse Unified Messaging systems Intel RMX (realtime OS) Siemens K1103 as an analysis and Compaq True 64 Unix troubleshooting tool Motorola Unix m88k Storage Area Networking Clustering Brocade 2800 series HP MC/Serviceguard Clustering Brocade 3800 series TruCluster on Tru64 Brocade 12000 and 24000 Directors Heartbeat / Linux HP XP 256 (HDS 7700e) OpenMosix / Linux HP XP 48/512 (HDS 9910/9960) HP XP 128/1024 (HDS 9970/9980) Storage Managers HP XP 12000 (HDS Tagmastore) HP-UX LVM HP Virtual Array 7100 / 7400 Veritas VxVM Sun StorEdge T3 Solstice DiskSuite Sun StorEdge 3510 Linux LVM Logical Storage Manager (LSM) Tru64 SAN Management HP Commandview & CommandviewSDM Networking HP Performance Advisor TCP/IP HP San Manager Novell Netware Appletalk Network / Environment monitoring BigBrother Messaging Software BigSister Washington University & Cyrus IMAP Cricket QMail / Vpopmail / Sendmail / Exim Nagios Microsoft Exchange Printing Database Software HP Dazel / HP OMS PostgreSQL Cups MySQL Solid embedded SQL engine Backup Informix BakBone Netvault Legato Networker / Sun Enterprise Backup Internet software Veritas Netbackup Apache HTTP server Linux/Solaris PHP Squid (Proxy Server) Jakarta/Tomcat ISC Bind v8 & v9 ISC DHCPd Microsoft Internet Information Server Microsoft Proxy Server / ISA Programming Languages PERL, C, AWK, SH PHP Employment information account management, a software engineer (RCAA) and a hardware engineer (HSE). Past working experience 1995-1996 2001 Small jobs during school holidays for my family’s Became Technical Account Mgr at HP, with small businesses. focus on Unix and Storage. TAM handles Setting up a network and a policy for the consulting assignments and selected strategic administration, defining procedures for customer accounts ('Belgian Post', Ministry of document creation and creating websites. Internal Affairs). Primary consulting assignments Started working in a nearby computer firm. : Unix performance studies, new Storage technologies implementations and Data 1997 migration. Became self-employed, working primarily for the previous computer Firm. 2002 Left HP and joined “Belgian Post' as Unix / San 1998 administrator. Became a partner in the business, after defining a new name and new business goals for the firm. Again self-employed. 1999 Stopped as partner of the computer services firm. 2003 Contracting jobs for Belgian Post, HP France No longer self-employed 2004 Contracting jobs for Belgian Post, HP France, Joined Comverse Network Systems Interbrew, Sun Microsystems 1999 2005 Comverse Network Systems is one of the world’s Contracting jobs for Interbrew, Sun leading developers of value added services for Microsystems, Belgian Post telecom operators around the world. Support for Proximus, Belgacom, KPN Orange for Voice 2006 Mail and SMS systems. New installations Contracting jobs for Belgian Post, Belgian Local planning and pro-active management of a vast Police network spanning 6 interconnected sites, containing over 56 Unix Strong points (M88k/Solaris/Tru64/Sco) servers. Very Customer-minded Analytical 2000 Passion for technology Joined Hewlett-Packard as Account Support Vision Engineer Unix. With the HP Personalised System Can work independent Support contract customers get an account team that takes care of his environment. The team consists of a primary customer contact (ASE) who handles the pro-active support and .
Recommended publications
  • Analysis and Performance Optimization of E-Mail Server
    Analysis and Performance Optimization of E-mail Server Disserta¸c~aoapresentada ao Instituto Polit´ecnicode Bragan¸capara cumprimento dos requisitos necess´arios `aobten¸c~aodo grau de Mestre em Sistemas de Informa¸c~ao,sob a supervis~aode Prof. Dr. Rui Pedro Lopes. Eduardo Manuel Mendes Costa Outubro 2010 Preface The e-mail service is increasingly important for organizations and their employees. As such, it requires constant monitoring to solve any performance issues and to maintain an adequate level of service. To cope with the increase of traffic as well as the dimension of organizations, several architectures have been evolving, such as cluster or cloud computing, promising new paradigms of service delivery, which can possibility solve many current problems such as scalability, increased storage and processing capacity, greater rationalization of resources, cost reduction, and increase in performance. However, it is necessary to check whether they are suitable to receive e-mail servers, and as such the purpose of this dissertation will concentrate on evaluating the performance of e-mail servers, in different hosting architectures. Beyond computing platforms, was also analze different server applications. They will be tested to determine which combinations of computer platforms and applications obtained better performances for the SMTP, POP3 and IMAP services. The tests are performed by measuring the number of sessions per ammount of time, in several test scenarios. This dissertation should be of interest for all system administrators of public and private organizations that are considering implementing enterprise wide e-mail services. i Acknowledgments This work would not be complete without thanking all who helped me directly or indirectly to complete it.
    [Show full text]
  • Linux E-Mail Set Up, Maintain, and Secure a Small Office E-Mail Server
    Linux E-mail Set up, maintain, and secure a small office e-mail server Ian Haycox Alistair McDonald Magnus Bäck Ralf Hildebrandt Patrick Ben Koetter David Rusenko Carl Taylor BIRMINGHAM - MUMBAI This material is copyright and is licensed for the sole use by Jillian Fraser on 20th November 2009 111 Sutter Street, Suite 1800, San Francisco, , 94104 Linux E-mail Set up, maintain, and secure a small office e-mail server Copyright © 2009 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: June 2005 Second edition: November 2009 Production Reference: 1051109 Published by Packt Publishing Ltd. 32 Lincoln Road Olton Birmingham, B27 6PA, UK. ISBN 978-1-847198-64-8 www.packtpub.com
    [Show full text]
  • The Qmail Handbook by Dave Sill ISBN:1893115402 Apress 2002 (492 Pages)
    < Free Open Study > The qmail Handbook by Dave Sill ISBN:1893115402 Apress 2002 (492 pages) This guide begins with a discussion of qmail s history, architecture and features, and then goes into a thorough investigation of the installation and configuration process. Table of Contents The qmail Handbook Introduction Ch apt - Introducing qmail er 1 Ch apt - Installing qmail er 2 Ch apt - Configuring qmail: The Basics er 3 Ch apt - Using qmail er 4 Ch apt - Managing qmail er 5 Ch apt - Troubleshooting qmail er 6 Ch apt - Configuring qmail: Advanced Options er 7 Ch apt - Controlling Junk Mail er 8 Ch apt - Managing Mailing Lists er 9 Ch apt - Serving Mailboxes er 10 Ch apt - Hosting Virtual Domain and Users er 11 Ch apt - Understanding Advanced Topics er 12 Ap pe ndi - How qmail Works x A Ap pe ndi - Related Packages x B Ap pe ndi - How Internet Mail Works x C Ap pe ndi - qmail Features x D Ap pe - Error Messages ndi x E Ap pe - Gotchas ndi x F Index List of Figures List of Tables List of Listings < Free Open Study > < Free Open Study > Back Cover • Provides thorough instruction for installing, configuring, and optimizing qmail • Includes coverage of secure networking, troubleshooting issues, and mailing list administration • Covers what system administrators want to know by concentrating on qmail issues relevant to daily operation • Includes instructions on how to filter spam before it reaches the client The qmail Handbook will guide system and mail administrators of all skill levels through installing, configuring, and maintaining the qmail server.
    [Show full text]
  • Domain Name Systems-Based Electronic Mail Security
    DRAFT NIST CYBERSECURITY PRACTICE GUIDE DOMAIN NAME SYSTEMS-BASED ELECTRONIC MAIL SECURITY How-To Guides For Security Engineers Scott Rose William Barker Santos Jha Chinedum Irrechukwu Karen Waltermire NIST SPECIAL PUBLICATION 1800-6C DRAFT NIST Special Publication 1800-6C NIST Cybersecurity Practice Guide DOMAIN NAME SYSTEMS- BASED ELECTRONIC MAIL SECURITY 1800-6C Scott Rose How-To Guides Information Technology Laboratory For Security Engineers National Institute of Standards and Technology William C. Barker Dakota Consulting Silver Spring, MD Santos Jha Chinedum Irrechukwu The MITRE Corporation McLean, VA Karen Waltermire National Cybersecurity Center of Excellence National Institute of Standards and Technology November 2016 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Willie May, Under Secretary of Commerce for Standards and Technology and Director DRAFT DISCLAIMER Certain commercial entities, equipment, products, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST or NCCoE, nor is it intended to imply that the entities, equipment, products, or materials are necessarily the best available for the purpose. National Institute of Standards and Technology Special Publication 1800-6C Natl Inst. Stand. Technol. Spec. Publ. 1800-6C, 144 pages (November 2016) CODEN: NSPUE2 Organizations are encouraged to review all draft publications during
    [Show full text]
  • Wazuh Ruleset
    [email protected] https://wazuh.com Wazuh Ruleset Rule Description Source Updated by Wazuh apache Apache is the world's most used web server software. Out of the box ✔ AppArmor is a Linux kernel security module that allows the system administrator to restrict programs's capabilities with per -program apparmor Out of the box ✔ profiles. arpwatch ARPWatch is a computer software tool for monitoring Address Resolution Protocol traffic on a computer network. Out of the box ✔ asterisk Asterisk is a software implementation of a telephone private branch exchange (PBX). Out of the box ✔ attack_rules.xml Signatures of different attacks detected by Wazuh Out of the box ✔ cimserver Compaq Insight Manager Server Out of the box ✔ cisco-ios Cisco IOS is a software used on most Cisco Systems routers and current Cisco network switches. Out of the box ✔ Clam AntiVirus (ClamAV) is a free and open-source, cross-platform antivirus software tool-kit able to detect many types of malicious clam_av software. Out of the box ✔ courier IMAP/POP3 server Out of the box ✔ dovecot Dovecot is an open-source IMAP and POP3 server for Linux/UNIX-like systems, written primarily with security in mind. Out of the box ✔ Dropbear is a software package that provides a Secure Shell-compatible server and client. It is designed as a replacement for standard dropbear OpenSSH for environments with low memory and processor resources, such as embedded systems. Out of the box ✔ FirewallD provides a dynamically managed firewall with support for network/firewall zones to define the trust level of networ k firewalld connections or interfaces.
    [Show full text]
  • Make QMAIL with Vpopmail Vchkpw, Courier-Authlib and Courier-Imap Auth Work Without Mysql on Debian Linux Qmailrocks Thibs Install
    Walking in Light with Christ - Faith, Computing, Diary Articles & tips and tricks on GNU/Linux, FreeBSD, Windows, mobile phone articles, religious related texts http://www.pc-freak.net/blog Make QMAIL with vpopmail vchkpw, courier-authlib and courier-imap auth work without MySQL on Debian Linux qmailrocks Thibs install Author : admin Recently installed a new QMAIL, following mostly Thibs Qmailrocks install guide. I didn't followed literally Thibs good guide, cause in his guide in few of the sections like Install Vpopmail he recommends using MySQL as a Backend to store Vpopmail email data and passwords; I prefer storing all vpopmail data on the file system as I believe it is much better especially for tiny QMAIL mail servers with less than 500 mail box accounts. In this little article I will explain, how I made Vpopmail courier-authlib and courier-imap play nice together without storing data in SQL backend. 1. Compile vpopmail with file system data storage support So here is how I managed to make vpopmail + courier-authlib + courier-imap, work well together: First its necessery to compile Vpopmailin store all its users data and mail data on file system. For this in Thibs Vpopmail Intsall step compiled Vpopmail without support for MySQL, e.g. instead of using his pointed compile time ./configure, arguments I used: # cd /downloads/vpopmail-5.4.33 # ./configure \ --enable-qmaildir=/var/qmail/ \ --enable-qmail-newu=/var/qmail/bin/qmail-newu \ --enable-qmail-inject=/var/qmail/bin/qmail-inject \ --enable-qmail-newmrh=/var/qmail/bin/qmail-newmrh \ --enable-tcprules-prog=/usr/bin/tcprules \ --enable-tcpserver-file=/etc/tcp.smtp \ --enable-clear-passwd \ 1 / 7 Walking in Light with Christ - Faith, Computing, Diary Articles & tips and tricks on GNU/Linux, FreeBSD, Windows, mobile phone articles, religious related texts http://www.pc-freak.net/blog --enable-many-domains \ --enable-qmail-ext \ --enable-logging=y \ --enable-auth-logging \ --enable-libdir=/usr/lib/ \ --disable-roaming-users \ --disable-passwd \ --enable-domainquotas \ --enable-roaming-users ...
    [Show full text]
  • Qmail Quickstarter: Install, Set up and Run Your Own Email Server
    Qmail Quickstarter Install, Set Up, and Run your own Email Server A fast-paced and easy-to-follow, step-by-step guide that gets you up and running quickly Kyle Wheeler BIRMINGHAM - MUMBAI Qmail Quickstarter Install, Set Up, and Run your own Email Server Copyright © 2007 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, Packt Publishing, nor its dealers or distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: June 2007 Production Reference: 1040607 Published by Packt Publishing Ltd. 32 Lincoln Road Olton Birmingham, B27 6PA, UK. ISBN 978-1-847191-15-1 www.packtpub.com Cover Image by Vinayak Chittar ([email protected]) [ FM- ] Credits Author Editorial Manager Kyle Wheeler Dipali Chittar Reviewer Project Coordinator Russell Nelson Abhijeet Deobhakta Development Editor Indexer Nanda Padmanabhan Bhushan Pangaonkar Assistant Development Editor Proofreader Rashmi Phadnis Chris Smith Technical Editor Production Coordinator Saurabh Singh Manjiri Nadkarni Code Testing Cover Designer Ankur Shah Manjiri Nadkarni Project Manager Patricia Weir [ FM- ] About the Author Kyle Wheeler is a PhD candidate at the University of Notre Dame in the Computer Science and Engineering Department.
    [Show full text]
  • Network Security & Auditing BSD Magazine
    CONTENTS Dear Readers, The January issue opens another year with BSD Magazine. We hope you enjoyed the last few. We start with a second part of our new light-hearted and non- Editor in Chief: technical column. Its aim is not to learn but to entertain and to Ewa Dudzic [email protected] inspire some reflection and (maybe) action. In Developers Corner Dru Lavigne reviewed the 2012 of BSD. Supportive Editor Read it to recall the most important events, publications and Patrycja Przybyłowicz releases of the last year. [email protected] This time the flag article is about panoramic photography. You Contributing: will have an opportunity to try it out with tools available under a Dru Lavigne, Rob Somerville, Luca Ferrari, William Olson, BSD or any Unix like system, using only free open source software. Carlos E. G. Carvalho In the ‘How To’ section you have a chance to read another part Top Betatesters & Proofreaders: of PostgreSQL series about users and permissions managements. Barry Grumbine, Darren Pilgrim, Eric Geissinger, From the tutorials you will also learn how to ignore spam in Henrik Andersén, Imad Soltani, Luca Ferrari, Luiz Claudio 2013, since we get it more and more with each year. Pacheco, Mani Kanth, Rob Cabrera, Zander Hill Especially for administrators we start a new series, where Rob Somerville will look at the tools, processes and methods involved Special Thanks: in writing software, including developing a Content Management Denise Ebery System (CMS) which will run under an AMP stack on FreeBSD, Art Director: OpenBSD and Linux. Ireneusz Pogroszewski We wish you a good read! DTP: Ireneusz Pogroszewski [email protected] Post Scriptum Senior Consultant/Publisher: Many thanks to iXsystems Company and its employees for their Paweł Marciniak [email protected] support and contribution.
    [Show full text]
  • Creation of Two Modules for the Network Authentication Cracking
    Creation of two modules for the Network Authentication Cracking Tool Ncrack Ilias Panagiotis SID: 3306150004 SCHOOL OF SCIENCE & TECHNOLOGY A thesis submitted for the degree of Master of Science (MSc) in Mobile and Web Computing OCTOBER 2015-2016 THESSALONIKI – GREECE Ilias Panagiotis SID: 3306150004 Supervisor: Prof. Papadopoulos Apostolos Supervising Committee Members: SCHOOL OF SCIENCE & TECHNOLOGY A thesis submitted for the degree of Master of Science (MSc) in Mobile and Web Computing OCTOBER 2015-2016 THESSALONIKI – GREECE Contents CONTENTS........................................................................................................ 1 INTRODUCTION ................................................................................................ 4 INFORMATION SECURITY..................................................................................... 4 NCRACK OVERVIEW .......................................................................................... 5 PROBLEM ANALYSIS ...................................................................................... 6 ANALYSIS OF NCRACK ARCHITECTURE...................................................... 7 OPERATING SYSTEM OF CHOICE ............................................................... 11 ARCH LINUX .................................................................................................. 11 ARCH LINUX ADVANTAGES ....................................................................................... 12 Simplicity........................................................................................................
    [Show full text]
  • Secure Content Distribution Using Untrusted Servers Kevin Fu
    Secure content distribution using untrusted servers Kevin Fu MIT Computer Science and Artificial Intelligence Lab in collaboration with M. Frans Kaashoek (MIT), Mahesh Kallahalla (DoCoMo Labs), Seny Kamara (JHU), Yoshi Kohno (UCSD), David Mazières (NYU), Raj Rajagopalan (HP Labs), Ron Rivest (MIT), Ram Swaminathan (HP Labs) For Peter Szolovits slide #1 January-April 2005 How do we distribute content? For Peter Szolovits slide #2 January-April 2005 We pay services For Peter Szolovits slide #3 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We enlist volunteers For Peter Szolovits slide #5 January-April 2005 Fast content distribution, so what’s left? • Clients want ◦ Authenticated content ◦ Example: software updates, virus scanners • Publishers want ◦ Access control ◦ Example: online newspapers But what if • Servers are untrusted • Malicious parties control the network For Peter Szolovits slide #6 January-April 2005 Taxonomy of content Content Many-writer Single-writer General purpose file systems Many-reader Single-reader Content distribution Personal storage Public Private For Peter Szolovits slide #7 January-April 2005 Framework • Publishers write➜ content, manage keys • Clients read/verify➜ content, trust publisher • Untrusted servers replicate➜ content • File system protects➜ data and metadata For Peter Szolovits slide #8 January-April 2005 Contributions • Authenticated content distribution SFSRO➜ ◦ Self-certifying File System Read-Only
    [Show full text]
  • Prelude User Manual General Configuration
    Prelude User Manual [[PreludeForeword|Foreword]] 1. Introduction 1. [[PreludeGlossary|Glossary]] 2. [[PreludeComponents|Prelude Components]] 3. [[PreludeArchitecture|Prelude Architecture]] 4. [[PreludeStandards|Prelude Standards]] 5. [[PreludeCompatibility|Prelude Compatibility]] 2. Installation 1. [[InstallingPreludeRequirement|Installation Requirements]] 2. [[InstallingPrelude|Installation from sources]] 1. [[InstallingPreludeLibrary|Libprelude]] 2. [[InstallingPreludeDbLibrary|LibpreludeDB]] 3. [[InstallingPreludeManager|Prelude Manager]] 4. [[InstallingPreludeCorrelator|Prelude Correlator]] 5. [[InstallingPreludeLml|Prelude LML]] 6. [[InstallingPreludePrewikka|Prewikka]] 3. [[InstallingPackage|Installation from packages]] 4. [[AgentsInstallation|Agents Installation]] 1. [[InstallingAgentRegistration|Agents Registration]] 2. [[InstallingAgentThirdparty|3rd Party Agents Installation]] 3. Configuration 1. [[ConfigurationGeneral|General Configuration]] 2. [[PreludeComponentsConfiguration|Prelude Components Configuration]] 1. [[PreludeManager|Prelude-Manager]] 2. [[PreludeCorrelator|Prelude-Correlator]] 3. [[PreludeLml|Prelude-LML]] 4. [[PreludeImport|Prelude-Import]] 3. [[HowtoHACentralServices|Howto Configure High Availability Central Services]] 4. Optimisation 1. [[DatabaseOptimisation|Database Optimisation]] 5. User Manuals 1. [[ManualPrewikka|Prewikka Manual]] 2. [[ManualPreludeAdmin|Prelude-Admin Manual]] 3. [[ManualPreludeDbAdmin|PreludeDB-Admin Manual]] 6. Development 1. [[DevelopmentGuidelines|Development guidelines]] 2. [[SourceOrganization|Source
    [Show full text]
  • National Infrastructure Protection Center Cybernotes: 2001 Year End Summary Issue #2001-26 December 31, 2001
    National Infrastructure Protection Center CyberNotes: 2001 Year End Summary Issue #2001-26 December 31, 2001 CyberNotes is published every two weeks by the National Infrastructure Protection Center (NIPC). Its mission is to support security and information system professionals with timely information on cyber vulnerabilities, malicious scripts, information security trends, virus information, and other critical infrastructure-related best practices. You are encouraged to share this publication with colleagues in the information and infrastructure protection field. Electronic copies are available on the NIPC web site at http://www.nipc.gov. Please direct any inquiries regarding this publication to the Editor-CyberNotes, National Infrastructure Protection Center, FBI Building, Room 11719, 935 Pennsylvania Avenue, NW, Washington, D.C., 20535. Bugs, Holes & Patches The following table provides a year-end summary of software vulnerabilities identified between December 12, 2000 and December 14, 2001. The table provides the vendor, software name, operating system, common name of the vulnerability, potential risk at the time of publication, and the CyberNotes issue in which the vulnerability appeared. Software versions are identified if known. This information is presented only as a summary; complete details are available from the source indicated in the endnote. Please note that even if the method of attack has not been utilized or an exploit script is not currently widely available on the Internet, a potential vulnerability has been identified. Updates to items appearing in previous issues of CyberNotes are listed in bold. New information contained in the update will appear in italicized colored text. Where applicable, the table lists a “CVE number” (in red) which corresponds to the Common Vulnerabilities and Exposures (CVE) list, a compilation of standardized names for vulnerabilities and other information security exposures.
    [Show full text]