Unidade Curricular – Administração De Redes Prof. Eduardo Maroñas

Total Page:16

File Type:pdf, Size:1020Kb

Unidade Curricular – Administração De Redes Prof. Eduardo Maroñas SERVIÇO NACIONAL DE APRENDIZAGEM COMERCIAL FACULDADE DE TECNOLOGIA SENAC PELOTAS Unidade Curricular – Administração de Redes Prof. Eduardo Maroñas Monks Roteiro de Laboratório Backup – Parte II (Gerenciadores de Backup) Objetivo: Utilizar e descrever as características de funcionamento de backups em rede. Ferramentas: Wireshark, Vmware Player, Putty, OpenSSH, WinSCP, Apache Web Server, CentOS, Windows XP, FreeNAS, BackupPC, Clonezilla, MySQL, PostgreSQL Introdução: Neste roteiro de laboratório, serão utilizadas diversas ferramentas e sistemas operacionais para analisar o funcionamento dos sistemas de backup. O backup é essencial na administração de rede e deve ser aplicado onde dados importantes sejam utilizados. Atualmente, com o grande volume de dados realizar o backup de forma correta é cada vez mais complexo. Para isto, existem ferramentas que auxiliam nesta tarefa, tornando a vida do administrador de redes mais fácil. Tarefas: 1) Na máquina virtual CentOS, instalar o gerenciador de backups BackupPC. Para isto, devem ser seguidos os seguintes procedimentos: 1. Criar o diretório /backups onde será o repositório dos dados copiados. 2. Instalar os pacotes 1. Perl-setuid: yum install perl-suidperl 2. Archive-Zip: yum install perl-Archive-Zip.noarch 3. File-RsyncP: yum install perl-File-RsyncP Obs.: utilizar o proxy do Mussum (export http_proxy=”http://192.168.200.3:3128” 3. Fazer o download do código-fonte do BackupPC, disponível em http://192.168.200.3/emmonks/admredes4/BACKUP/BackupPC-3.3.0.tar.gz, para o diretório /usr/src 4. Criar o usuário backuppc e dar permissões para este usuário no diretório /backups. 5. Criar o diretório /var/www/html/imagens para ser o repositório de figuras do BackupPC. 6. Extrair o arquivo e compilar o código utilizando o seguinte comando: perl configure.pl 7. Responder aos questionamentos, figura 1, conforme as seguintes instruções: Faculdade de Tecnologia SENAC PELOTAS Credenciado pela Portaria nº 3.071, de 01 de outubro de 2004. Rua Gonçalves Chaves, 602 A – Centro. CEP 96015-560. Pelotas/RS–Brasil. Fone (053)3225-6918 - www.senacrs.com.br 1 SERVIÇO NACIONAL DE APRENDIZAGEM COMERCIAL FACULDADE DE TECNOLOGIA SENAC PELOTAS --> BackupPC will run on host [tiaomacale4]? 192.168.201.244 (IP do CentOS) --> Data directory (full path) [/data/BackupPC]? /backups --> CGI bin directory (full path) []? /var/www/cgi-bin --> Apache image directory (full path) []? /var/www/html/imagens --> URL for image directory (omit http://host; starts with '/')[]? /imagens 8. Dar permissões de execução para o arquivo /var/www/cgi-bin/BackupPC_Admin. 1. Usar o comando chmod +x /var/www/cgi-bin/BackupPC_Admin 9. Criar um arquivo de autenticação do Apache (.htaccess) em /var/www/cgi-bin/ para autenticação do BackupPC 1. Utilizar o usuário admin e a senha senac2010 2. Modificar o parâmetro AllowOverride None para AllowOverride All na entrada <Directory "/var/www/cgi-bin"> do arquivo /etc/httpd/conf/httpd.conf. 3. Comando para criar arquivo de senhas: htpasswd -c /etc/senhas.txt admin 4. Exemplo de arquivo .htaccess AuthName “Administracao” AuthType Basic AuthUserFile /etc/senhas.txt require valid-user 10. Adicionar o usuário admin como administrador do BackupPC. 1. Modificar o parâmetro $Conf{CgiAdminUsers} = ' '; para $Conf{CgiAdminUsers} = 'admin'; no arquivo /etc/BackupPC/config.pl 11. Copiar o arquivo de inicialização do serviço do backuppc de /usr/src/BackupPC- 3.3.0/init.d/linux-backuppc para /etc/init.d/backuppc 1. Dar permissão de execução para o arquivo /etc/init.d/backuppc 2. Adicionar o script de inicialização do Backuppc ao scripts de inicialização do sistema por meio do comando chkconfig --add backuppc 1. Após o comando chkconfig, o script backuppc estará disponível na lista de scripts do utilitário setup 12. Iniciar o serviço do BackupPC com o comando /etc/init.d/backuppc start 1. Para acessar a console web, utilizar a URL http://IP_do CentOS/cgi- bin/BackupPC_Admin Faculdade de Tecnologia SENAC PELOTAS Credenciado pela Portaria nº 3.071, de 01 de outubro de 2004. Rua Gonçalves Chaves, 602 A – Centro. CEP 96015-560. Pelotas/RS–Brasil. Fone (053)3225-6918 - www.senacrs.com.br 2 SERVIÇO NACIONAL DE APRENDIZAGEM COMERCIAL FACULDADE DE TECNOLOGIA SENAC PELOTAS 13. Fazer login, por meio do utilitário su, com o usuário backuppc. 1. Executar o comando ssh-keygen -t rsa para criar os certificados Figura 1. Questionamentos do BackupPC 2) Realizar o backup dos diretórios /home e /etc dos servidores Linux dos colegas utilizando o Backuppc. 1. Adicionar a chave pública do usuário backuppc no arquivo authorized_keys do servidor do colega. 2. No servidor BackupPC, acessar com o usuário backuppc o servidor do colega. Isto deve ser feito ao adicionar um host Linux no BackupPC. 1. Exemplo de comando: [backuppc@tiaomacale4 ~]$ ssh -l root 192.168.201.244 3) Realizar o backup de um compartilhamento da VM Windows XP. 1. Deverá ser criado um usuário backup e senha senac2010 na VM Windows XP. Este usuário será utilizado para o backup. 2. Criar um compartilhamento de nome dados e configurar as permissões de leitura e escrita para o usuário backup. 4) Restaurar os backups realizados no diretório /restaura na VM CentOS. 1. Realizar backup de dados em servidores diferentes. Faculdade de Tecnologia SENAC PELOTAS Credenciado pela Portaria nº 3.071, de 01 de outubro de 2004. Rua Gonçalves Chaves, 602 A – Centro. CEP 96015-560. Pelotas/RS–Brasil. Fone (053)3225-6918 - www.senacrs.com.br 3 SERVIÇO NACIONAL DE APRENDIZAGEM COMERCIAL FACULDADE DE TECNOLOGIA SENAC PELOTAS 5) Utilizar um storage para armazenamento dos backups. 1. Instalar a distribuição FreeNAS (http://www.freenas.org/), disponível em ftp://192.168.200.3/FreeNAS-9.2.1.5-RELEASE-x86.iso em uma VM. 1. Configurações da VM: tipo FreeBSD 32 bits, 1GB de RAM, um disco de 8GB e outros de 30GB (dados), rede em modo bridge 2. Usuário e senha padrão: admin/admin ou root/admin 2. Criar um usuário backuppc no FreeNAS. 1. Verificar o UID do usuário backuppc no servidor BackupPC 2. Criar usuário backuppc no FreeNAS com o mesmo UID do servidor BackupPC 3. Criar um volume ZFS no HD de 30GB. 1. Criar um volume de nome backups 2. Modificar as permissões para o usuário backuppc e grupo backuppc, de acordo com a figura 2. Faculdade de Tecnologia SENAC PELOTAS Credenciado pela Portaria nº 3.071, de 01 de outubro de 2004. Rua Gonçalves Chaves, 602 A – Centro. CEP 96015-560. Pelotas/RS–Brasil. Fone (053)3225-6918 - www.senacrs.com.br 4 SERVIÇO NACIONAL DE APRENDIZAGEM COMERCIAL FACULDADE DE TECNOLOGIA SENAC PELOTAS Figura 2. Permissões do volume ZFS. 4. Exportar um volume em NFS. 1. Criar o compartilhamento de nome /mnt/backups 2. Modificar os mapeamentos de usuários de acordo com a figura 3. Figura 3. Mapeamentos de usuários e grupos. 5. Montar o compartilhamento NFS no servidor do BackupPC. 1. Criar um diretório /freenas no servidor do BackupPC. 2. Modificar as permissões para o usuário backuppc Faculdade de Tecnologia SENAC PELOTAS Credenciado pela Portaria nº 3.071, de 01 de outubro de 2004. Rua Gonçalves Chaves, 602 A – Centro. CEP 96015-560. Pelotas/RS–Brasil. Fone (053)3225-6918 - www.senacrs.com.br 5 SERVIÇO NACIONAL DE APRENDIZAGEM COMERCIAL FACULDADE DE TECNOLOGIA SENAC PELOTAS 3. Copiar o conteúdo do diretório /backups para /freenas. 6. Configurar o BackupPC para salvar os backups no volume exportado. 1. Modificar a entrada $Conf{TopDir} = '/backups'; no arquivo /etc/BackupPC/config.pl para $Conf{TopDir} = '/backups'; 7. Realizar testes com backup e restauração de arquivos usando o BackupPC com FreeNAS. Referências: • Material no servidor Mussum • BackupPC - http://backuppc.sourceforge.net/ • FreeNAS – http://www.freenas.org/ Faculdade de Tecnologia SENAC PELOTAS Credenciado pela Portaria nº 3.071, de 01 de outubro de 2004. Rua Gonçalves Chaves, 602 A – Centro. CEP 96015-560. Pelotas/RS–Brasil. Fone (053)3225-6918 - www.senacrs.com.br 6.
Recommended publications
  • Resurrect Your Old PC
    Resurrect your old PCs Resurrect your old PC Nostalgic for your old beige boxes? Don’t let them gather dust! Proprietary OSes force users to upgrade hardware much sooner than necessary: Neil Bothwick highlights some great ways to make your pensioned-off PCs earn their keep. ardware performance is constantly improving, and it is only natural to want the best, so we upgrade our H system from time to time and leave the old ones behind, considering them obsolete. But you don’t usually need the latest and greatest, it was only a few years ago that people were running perfectly usable systems on 500MHz CPUs and drooling over the prospect that a 1GHz CPU might actually be available quite soon. I can imagine someone writing a similar article, ten years from now, about what to do with that slow, old 4GHz eight-core system that is now gathering dust. That’s what we aim to do here, show you how you can put that old hardware to good use instead of consigning it to the scrapheap. So what are we talking about when we say older computers? The sort of spec that was popular around the turn of the century. OK, while that may be true, it does make it seem like we are talking about really old hardware. A typical entry-level machine from six or seven years ago would have had something like an 800MHz processor, Pentium 3 or similar, 128MB of RAM and a 20- 30GB hard disk. The test rig used for testing most of the software we will discuss is actually slightly lower spec, it has a 700MHz Celeron processor, because that’s what I found in the pile of computer gear I never throw away in my loft, right next to my faithful old – but non-functioning – Amiga 4000.
    [Show full text]
  • Ubuntu UNLEASHED 2012 Edition Covering 11.10 and 12.04
    Matthew Helmke with Andrew Hudson and Paul Hudson Ubuntu UNLEASHED 2012 Edition Covering 11.10 and 12.04 800 East 96th Street, Indianapolis, Indiana 46240 USA Ubuntu Unleashed 2012 Edition: Covering Ubuntu 11.10 and 12.04 Editor-in Chief Copyright © 2012 by Pearson Education, Inc. Mark Taub All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, Executive Editor or otherwise, without written permission from the publisher. No patent liability is Debra Williams assumed with respect to the use of the information contained herein. Although every Cauley precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for Senior Development damages resulting from the use of the information contained herein. Editor ISBN-13: 978-0-672-33578-5 Chris Zahn ISBN-10: 0-672-33578-6 Managing Editor Library of Congress Cataloging-in-Publication Data: Kristy Hart Helmke, Matthew. Ubuntu unleashed / Matthew Helmke. — 2012 ed. Project Editor p. cm. Andrew Beaster “Covering 11.10 and 12.04.” ISBN-13: 978-0-672-33578-5 (pbk. : alk. paper) Copy Editor ISBN-10: 0-672-33578-6 (pbk. : alk. paper) Keith Cline 1. Ubuntu (Electronic resource) 2. Linux. 3. Operating systems (Computers) I. Title. QA76.76.O63U36 2012 Indexer 005.4’32—dc23 Christine Karpeles 2011041953 Printed in the United States of America Proofreader First Printing: January 2012 Water Crest Trademarks Publishing All terms mentioned in this book that are known to be trademarks or service marks Technical Editors have been appropriately capitalized.
    [Show full text]
  • Guide to Open Source Solutions
    White paper ___________________________ Guide to open source solutions “Guide to open source by Smile ” Page 2 PREAMBLE SMILE Smile is a company of engineers specialising in the implementing of open source solutions OM and the integrating of systems relying on open source. Smile is member of APRIL, the C . association for the promotion and defence of free software, Alliance Libre, PLOSS, and PLOSS RA, which are regional cluster associations of free software companies. OSS Smile has 600 throughout the World which makes it the largest company in Europe - specialising in open source. Since approximately 2000, Smile has been actively supervising developments in technology which enables it to discover the most promising open source products, to qualify and assess them so as to offer its clients the most accomplished, robust and sustainable products. SMILE . This approach has led to a range of white papers covering various fields of application: Content management (2004), portals (2005), business intelligence (2006), PHP frameworks (2007), virtualisation (2007), and electronic document management (2008), as well as PGIs/ERPs (2008). Among the works published in 2009, we would also cite “open source VPN’s”, “Firewall open source flow control”, and “Middleware”, within the framework of the WWW “System and Infrastructure” collection. Each of these works presents a selection of best open source solutions for the domain in question, their respective qualities as well as operational feedback. As open source solutions continue to acquire new domains, Smile will be there to help its clients benefit from these in a risk-free way. Smile is present in the European IT landscape as the integration architect of choice to support the largest companies in the adoption of the best open source solutions.
    [Show full text]
  • Referência Debian I
    Referência Debian i Referência Debian Osamu Aoki Referência Debian ii Copyright © 2013-2021 Osamu Aoki Esta Referência Debian (versão 2.85) (2021-09-17 09:11:56 UTC) pretende fornecer uma visão geral do sistema Debian como um guia do utilizador pós-instalação. Cobre muitos aspetos da administração do sistema através de exemplos shell-command para não programadores. Referência Debian iii COLLABORATORS TITLE : Referência Debian ACTION NAME DATE SIGNATURE WRITTEN BY Osamu Aoki 17 de setembro de 2021 REVISION HISTORY NUMBER DATE DESCRIPTION NAME Referência Debian iv Conteúdo 1 Manuais de GNU/Linux 1 1.1 Básico da consola ................................................... 1 1.1.1 A linha de comandos da shell ........................................ 1 1.1.2 The shell prompt under GUI ......................................... 2 1.1.3 A conta root .................................................. 2 1.1.4 A linha de comandos shell do root ...................................... 3 1.1.5 GUI de ferramentas de administração do sistema .............................. 3 1.1.6 Consolas virtuais ............................................... 3 1.1.7 Como abandonar a linha de comandos .................................... 3 1.1.8 Como desligar o sistema ........................................... 4 1.1.9 Recuperar uma consola sã .......................................... 4 1.1.10 Sugestões de pacotes adicionais para o novato ................................ 4 1.1.11 Uma conta de utilizador extra ........................................ 5 1.1.12 Configuração
    [Show full text]
  • Ubuntu® 1.4Inux Bible
    Ubuntu® 1.4inux Bible William von Hagen 111c10,ITENNIAL. 18072 @WILEY 2007 •ICIOATENNIAl. Wiley Publishing, Inc. Acknowledgments xxi Introduction xxiii Part 1: Getting Started with Ubuntu Linux Chapter 1: The Ubuntu Linux Project 3 Background 4 Why Use Linux 4 What Is a Linux Distribution? 5 Introducing Ubuntu Linux 6 The Ubuntu Manifesto 7 Ubuntu Linux Release Schedule 8 Ubuntu Update and Maintenance Commitments 9 Ubuntu and the Debian Project 9 Why Choose Ubuntu? 10 Installation Requirements 11 Supported System Types 12 Hardware Requirements 12 Time Requirements 12 Ubuntu CDs 13 Support for Ubuntu Linux 14 Community Support and Information 14 Documentation 17 Commercial Support for Ubuntu Linux 18 Getting More Information About Ubuntu 19 Summary 20 Chapter 2: Installing Ubuntu 21 Getting a 64-bit or PPC Desktop CD 22 Booting the Desktop CD 22 Installing Ubuntu Linux from the Desktop CD 24 Booting Ubuntu Linux 33 Booting Ubuntu Linux an Dual-Boot Systems 33 The First Time You Boot Ubuntu Linux 34 Test-Driving Ubuntu Linux 34 Expioring the Desktop CD's Examples Folder 34 Accessing Your Hard Drive from the Desktop CD 36 Using Desktop CD Persistence 41 Copying Files to Other Machines Over a Network 43 Installing Windows Programs from the Desktop CD 43 Summary 45 ix Contents Chapter 3: Installing Ubuntu on Special-Purpose Systems 47 Overview of Dual-Boot Systems 48 Your Computer's Boot Process 48 Configuring a System for Dual-Booting 49 Repartitioning an Existing Disk 49 Getting a Different Install CD 58 Booting from a Server or Altemate
    [Show full text]
  • DRBL-Winroll: the Free Configuration Program for Microsoft Windows
    DRBL-Winroll: The Free configuration program for Microsoft Windows Ceasar Sun, Steven Shiau, Thomas Tsai http://drbl-winroll.org , http://drbl.org , http://clonezilla.org/ RMLL (LSM) 2015 Q3, 2015 1 Outline Introduction to DRBL-Winroll – Develop Team – Common Issues for Windows Replication – Feature/Framework Cases of Usages – Basic Installation and usage – How to do centralize management – Advanced usage Limitation/Development/Contribution Q&A 2 Outline Introduction to DRBL-Winroll – Develop Team – Common Issues for Windows Replication – Feature/Framework Cases of Usages – Basic Installation and usage – How to do centralize management – Advanced usage Limitation/Development/Contribution Q&A 3 About us • From Taiwan, working for the NPO NCHC (National Center for High- Performance Computing) • Developers of free/open-source software: – DRBL, Clonezilla – DRBL-Winroll, Tux2live – Partclone, Tuxboot, Cloudboot – ... more Taiwan image source: wikipedia.org 4 Developers/Contributor • Steven Shiau • Ceasar Sun • Thomas Tsai • Jazz Wang • Jean René Mérou Sánchez • K. L. Huang • Jean-Francois Nifenecker • Louie Chen • Nagappan Alagappan • … 5 Replication Issue 6 Copy & Paste ? • Data v.s Configurations – For small scale replication , it's easy. • Deployment is one thing, but configuration is another – Not only copy-and-paste 7 Configuration with Massive Scale • Not possible by hand , automatical configuration is better I©m Robot #1 Hello, I©m Robot #2 Hello, I©m Robot #3 Hello, I©m Robot #.. 8 Mass Deployment • What is “mass deployment”
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • 6.4.0-0 Release of SIMP, Which Is Compatible with Centos and Red Hat Enterprise Linux (RHEL)
    SIMP Documentation THE SIMP TEAM Sep 16, 2020 Contents 1 Level of Knowledge 3 1.1 Quick Start................................................4 1.2 Changelogs................................................4 1.3 SIMP Getting Started Guide....................................... 64 1.4 SIMP User Guide............................................ 81 1.5 Contributing to SIMP.......................................... 228 1.6 SIMP Security Concepts......................................... 263 1.7 SIMP Security Control Mapping..................................... 282 1.8 Vulnerability Supplement........................................ 642 1.9 Help................................................... 644 1.10 License.................................................. 652 1.11 Contact.................................................. 652 1.12 Glossary of Terms............................................ 652 Index 669 i ii SIMP Documentation This is the documentation for the 6.4.0-0 release of SIMP, which is compatible with CentOS and Red Hat Enterprise Linux (RHEL). This guide will walk a user through the process of installing and managing a SIMP system. It also provides a mapping of security features to security requirements, which can be used to document a system’s security conformance. Warning: Be EXTREMELY CAREFUL when performing copy/paste operations from this document! Different web browsers and operating systems may substitute incompatible quotes and/or line endings in your files. The System Integrity Management Platform (SIMP) is an Open Source
    [Show full text]
  • Seleccione Un Host... Aceptar Backuppc
    BackupPC BackupPC Introduction Hosts Overview Backup basics Seleccione un host... Resources Road map You can help Installing BackupPC Requirements What type of storage space do I need? Aceptar How much disk space do I need? Step 1: Getting BackupPC Servidor Step 2: Installing the distribution Step 3: Setting up config.pl Estado Step 4: Setting up the hosts file Resumen PC Step 5: Client Setup Edit Config Step 6: Running BackupPC Edit Hosts Step 7: Talking to BackupPC Opciones de Step 8: Checking email delivery administración Step 9: CGI interface Archivo Registro How BackupPC Finds Hosts Registros antiguos Other installation topics Resumen correo Fixing installation problems Colas actuales Restore functions Documentación CGI restore options Wiki Command-line restore options SourceForge Archive functions Configuring an Archive Host Starting an Archive Starting an Archive from the command line Other CGI Functions Configuration and Host Editor RSS BackupPC Design Some design issues BackupPC operation Storage layout Compressed file format Rsync checksum caching File name mangling Special files Attribute file format Optimizations Limitations Security issues Configuration File Modifying the main configuration file Configuration Parameters General server configuration What to backup and when to do it How to backup a client 1 de 75 Email reminders, status and messages CGI user interface configuration settings Version Numbers Author Copyright Credits License BackupPC Introduction This documentation describes BackupPC version 3.1.0, released on 25 Nov 2007. Overview BackupPC is a high-performance, enterprise-grade system for backing up Unix, Linux, WinXX, and MacOSX PCs, desktops and laptops to a server's disk. BackupPC is highly configurable and easy to install and maintain.
    [Show full text]
  • Towards Detection and Prevention of Malicious Activities Against Web Applications and Internet Services
    Towards Detection and Prevention of Malicious Activities Against Web Applications and Internet Services Dissertation zur Erlangung des Grades eines Doktor-Ingenieurs der Fakult¨at fur¨ Elektrotechnik und Informationstechnik an der Ruhr-Universit¨at Bochum vorgelegt von Apostolos Zarras aus Athen, Griechenland Bochum, August 2015 Tag der mundlichen¨ Prufung:¨ 27.08.2015 Gutachter: Prof. Dr. Thorsten Holz, Ruhr-Universit¨at Bochum Zweitgutachter: Prof. Dr. Herbert Bos, Vrije Universiteit Amsterdam Abstract The Internet has witnessed a tremendous growth the last years. Undoubtedly, its services and mostly the World Wide Web have become an integral part in the lives of hundreds of millions of people, who use it in daily basis. Unfortunately, as the Internet's popularity increases, so does the interest of attackers who seek to exploit vulnerabilities in users' machines. What was primary meant to be mainly a competition among computer experts to test and improve their technical skills has turned into a multi-billion dollar business. Nowadays, attackers try to take under their control vulnerable computers that will allow them to perform their nefarious tasks, such as sending spam emails, launching distributed denial-of-service (DDoS) attacks, generate revenue from online advertisements by performing click-frauds, or stealing personal data like email accounts and banking credentials. In this dissertation, we address the security issues online users face every day from two points of view. First, we investigate how infected computers that constitu- te a botnet|network of compromised machines which are remotely controlled by an entity, known as botmaster|perform their malicious activities and we propose countermeasures against them. We study two of the most fundamental Internet pro- tocols, SMTP and HTTP, and leverage the fact that numerous entities, including cybercriminals, implement these protocols with subtle but perceivable differences, which we can accurately detect.
    [Show full text]
  • Running an Openstreetmap Cache Server in Asia
    Running an OpenStreetMap cache server in Asia Steven Shiau, Ceasar Sun, Thomas Tsai NCHC, Taiwan Q3, 2015 Outline OSM Cache server Why? NCHC's capacity Hardware, network OS, services Maintenance Q&A 2 OpenStreetMap • A free, editable map of the whole world. • Built by volunteers largely from scratch and released with an open-content license. • Allows free access to map images and all of the underlying map data. * Image source: http://www.openstreetmap.org 3 Why? - Background • OSC 2013 Aug Kansai@Kyoto • No any cache server in Asia at that time – Long loading time • Daniel Kastl from Georepublic asked, and mentioned: – “Universities here have a terrible administrative overhead with lots of formal requirements. Even community members working at universities seem to try to avoid the paperwork.” – “Data center providers we talked to are mostly "scared" about the data traffic. In general internet speed in Japan is super fast, and traffic is unlimited for private users. But it seems the mix of "power-users" and "low-traffic" users, which makes "unlimited traffic" possible. After talking to data center providers it seemed to me, that internet traffic in fact is quite expensive in Japan. Hardware costs were not really an issue for them.” 4 Background – network bandwidth • The traffic is distributed by tile.openstreetmap.org using GeoDNS to pick the "local" server. In partnership with the cache provider we (OSM sysadmins) decide which countries are best served by a particular server. See: http://dns.openstreetmap.org/tile.openstreetmap.org.html for current setup. • Traffic: – Using May 2012 statistics, Japan uses around 312 Kilobytes/s (inbound+outbound) of tile traffic (averaged over 7 days) – Peak will be around double that, low being around half.
    [Show full text]
  • Vergleichstest:Scanner
    NR. 5/2015 | MAI 2015 | FR. 4.90 | € 4,80 www.onlinepc.ch 00005 985503 ONLINE PC 71422 97 e DAS COMPUTER-MAGAZIN eig Anz 51 rich Zü 8051 to AZB ay2014 ckpho to is / Arbeiten im Homeoffice Windows 10 Server Blueb Big Data für KMU o / tt Neun Tipps für die produktive und Die neue Server-Version setzt auf lia Auch der Mittelstand profitiert von sorbe Foto : effiziente Heimarbeit S. 57 Cloud und Sicherheit S. 14 : systematischen Datenanalysen S. 54 to to Fo Fo Die Cloud Was Firmen bei den Services Profi-Tools beachten müssen S. 50 ay2014 für PC und Netzwerk blueb / lia Das Network Foto : to Fo Security Toolkit Spotlight ist ein überaus The Dash nützlicher S. 24 Werkzeug- kasten S. 34 agi Br : Br to Fo Foto: Fotolia / Rawpixel Downloads Vergleichstest: Scanner Aktuelle Software zum Gratis-Download S. 59 Schnelle Scanner fürs Büro gibt es schon für gut 400 Franken S. 40 Editorial / Inhalt Inhalt 5/2015 t ele Niv ay2014 Blueb Michael / / lia lia Foto Foto : : to to Fo Fo 14 18 Big Data Windows Server Windows Server 10 – das ist neu 2003 umziehen ig Data wird immer mehr zum Main- B stream: Globale Hersteller wie Google, el Microsoft und IBM haben den Kampf um die wpix Ra efks / IT-Technologie der Zukunft aufgenommen / lia lia to Foto und investieren in die Entwicklung der Big- Fo : : to Data-Analyse. Ihr Credo: „Wer aus Daten die to Fo Fo richtigen Schlüsse zieht, hat die Macht.“ Die 28 34 gesammelten Geschäfts- und Kundendaten Gehobener Network Security von Banken, Ladenketten und Online-Händ- Standard Toolkit lern sollen sich in bare Münze umwandeln las- sen, wenn man aus ihnen nur die richtigen Rückschlüsse zieht.
    [Show full text]