The Complete Reference Enterprise Linux & Fedora Edition

Total Page:16

File Type:pdf, Size:1020Kb

The Complete Reference Enterprise Linux & Fedora Edition Red Hat: The Complete Reference Enterprise Linux & Fedora Edition Richard Petersen McGraw-Hill/Osborne New York Chicago San Francisco UlnLjo n Lisbon London Madrid Mexico City Milan NewDelhi San uan mmm* Se°ul Sinsapore Sydney Toront' ° Contents Acknowledgments i xxvii Introduction xxix Parti Getting Started 1 Introduction to Red Hat Linux 3 Red Hat and Fedora Linux 5 The Fedora Project 6 Red Hat Enterprise Linux 6 Red Hat Documentation 7 Red Hat Linux Fedora Core 8 Operating Systems and Linux 10 History of Linux and Unix 10 Unix 11 Linux .." 11 Linux Overview 12 Open Source Software 13 Linux Software 14 Linux Office and Database Software 15 Internet Servers 15 Development Resources ; 16 Online Information Sources 18 Documentation 19 2 Installing Red Hat and Fedora Core Linux ;. 21 Hardware, Software, and Information Requirements .'•. 22 Hardware Requirements '. 22 Hard Drive Configuration > 23 Information Requirements I 23 Creating the Boot Disks 25 VJ Red Hat: The Complete Reference Enterprise Linux & Fedora Edition Installing Linux 27 Starting the Installation Program 27 Partitions, RAID, and Logical Volumes 28 Boot Loaders 30 Network Configuration 30 System Configuration 31 Software Installation 31 X Window System Configuration (Red Hat only) 32 Finishing Installation 33 Setup 33 Login and Logout 34 Boot Disks 35 3 Interface Basics 37 User Accounts 37 Accessing Your Linux System 38 The Display Manager: GDM 38 Accessing Linux from the Command Line Interface 39 Bluecurve: The GNOME and KDE Desktops 41 GNOME 41 KDE 42 Window Managers for Linux 43 Command Line Interface 43 Help 44 4 Red Hat System Configuration 47 Red Hat Administrative Tools 47 Configuring Users 48 Printer Configuration 50 X Window System Configuration: redhat-config-xfree86 52 Updating Red Hat and Fedora Linux with RHN, Yum and APT ... 52 Installing Software Packages 54 Installing Packages with redhat-config-packages 55 Installing Packages with the rpm Command 57 Package Security Check 58 Installing Source Code Applications 59 Security Configuration 60 Security Services 60 Authentication Configuration 63 Unsupported Drivers 63 Bluetooth 64 Bluetooth Configuration 65 Personal Area Networks: PAN 65 Contents VM 5 Red Hat Network Configuration 67 Network Information: Dynamic and Static 68 Network Configuration with Red Hat Network Tools 69 redhat-config-network 69 Network Device Control 73 The Internet Configuration Wizard 73 Virtual Private Networks 75 Interface Configuration Scripts: /etc/sysconfig/network-scripts 75 Command Line PPP Access: wvdial 76 Wireless Tools 78 iwconfig 78 iwpriv 79 iwspy 80 iwlist 80 linux-wlan 80 Setting Up Your Firewall: redhat-config-securitylevel 81 Configuring a Local Area Network 82 Physical Configuration 83 IP Addressing 83 Assigning IP Addresses: static and dynamic 84 Squid Proxy Server 86 Implementing a DNS Server 86 Configuring the DNS Server with redhat-config-bind 88 Part II Environments 6 GNOME 95 GNOME Enhancements 96 GTK+ 97 The GNOME Interface 97 GNOME Components 98 Start Here Window 99 Quitting GNOME 99 GNOME Help 99 The GNOME Desktop 100 Drag and Drop 100 Application Links 100 Desktop Drive Icons 101 Desktop Menu 101 Window Manager 102 The GNOME File Manager: Nautilus 102 Nautilus Window 102 Nautilus Sidebar: Tree, History, and Notes 103 VJii Red Hat: The Complete Reference Enterprise Linux & Fedora Edition Nautilus Views 103 Nautilus Menu 104 Navigating Directories 104 Managing Files 105 File and Directory Properties 106 Nautilus Preferences 107 Nautilus as a Web Browser 107 The GNOME Panel 108 Panel Properties 108 Displaying Panels 109 Adding Panels 109 Panel Objects 109 Special Panel Objects Ill GNOME Applets Ill Workspace Switcher 112 GNOME Tasklist 112 GNOME Configuration 112 GNOME Directories and Files 113 GNOME User Directories 114 GConf 114 7 The K Desktop Environment: KDE 115 Qt Library 117 KDE Desktop 117 KDE Menus 118 Quitting KDE 118 KDE Desktop Operations 119 Configuring Your Desktop 119 Desktop Files 120 KDE Windows 121 Virtual Desktops: The KDE Desktop Pager 122 KDE Panel: Kicker 123 The KDE Help Center 124 Applications 124 Application Standard Links 124 Application Desktop Links 125 Mounting CD-ROMs and Floppy Disks from the Desktop 125 KDE File Manager and Internet Client: Konqueror 126 Konqueror Window 126 Navigation Panel 127 Search 128 Navigating Directories 128 Copy, Move, Delete, Rename, and Link Operations 129 Web and FTP Access 130 Contents ix KDE Configuration: KDE Control Center 130 .kde and Desktop User Directories 132 MIME Types and Associated Applications 132 KDE Directories and Files 132 8 The Shell 135 The Command Line 135 Command Line Editing 136 Command and Filename Completion 137 History 137 History Events 138 History Event Editing 140 Configuring History: HISTFILE and HISTSAVE 141 Filename Expansion: *,?,[] 141 Matching Multiple Characters 142 Matching Single Characters 143 Matching a Range of Characters 143 Matching Shell Symbols 144 Generating Patterns 144 Standard Input/Output and Redirection 145 Redirecting the Standard Output: > and » 145 The Standard Input 148 Pipes: I 148 Redirecting and Piping the Standard Error: >&, 2> 149 Jobs: Background, Kills, and Interruptions 150 Running Jobs in the Background 150 Job Notification 151 Bringing Jobs to the Foreground 152 Stopping and Suspending Jobs 152 Shell Variables 153 Definition and Evaluation of Variables: =, $, set, unset 153 Shell Scripts: User-Defined Commands 155 Executing Scripts 155 Script Arguments 155 Control Structures 156 Test Operations 157 Conditional Control Structures 158 Loop Control Structures 160 Filters and Regular Expressions 161 Searching Files: grep 162 Regular Expressions 163 9 Shell Configuration 165 Aliases 165 Aliasing Commands and Options 166 Red Hat: The Complete Reference Enterprise Linux & Fedora Edition Aliasing Commands and Arguments 166 Aliasing Commands 167 Controlling Shell Operations 167 Environment Variables and Subshells: export 169 Configuring Your Shell with Shell System Variables 169 System Variables 170 Configuring Your Login Shell: .bash_profile 174 Configuring the BASH Shell: .bashrc 177 The BASH Shell Logout File: .bashjogout 178 Initialization and Configuration Files 178 Configuration Directories and Files 179 10 Managing Linux Files, Directories, and Archives 181 Linux Files 182 The File Structure 184 Home Directories 185 Pathnames 185 System Directories 186 Listing, Displaying, and Printing Files: Is, cat, more, less, and lpr 187 Displaying Files: cat, less, and more 188 Printing Files: lpr, lpq, and lprm 188 Managing Directories: mkdir, rmdir, Is, cd, and pwd 189 Creating and Deleting Directories 190 Displaying Directory Contents 190 Moving Through Directories 191 Referencing the Parent Directory 191 File and Directory Operations: find, cp, mv, rm, and In 192 Searching Directories: find 192 Copying Files 193 Moving Files 195 Copying and Moving Directories 196 Erasing Files and Directories: the rm Command 196 Links: the In Command 197 - The mtools Utilities: msdos 199 Copying Files to a DOS Floppy 199 mtools Commands 200 Configuring mtools: /etc/ mtools.conf 201 Copying Files to a DOS Partition 202 Archiving and Compressing Files 202 Archiving and Compressing Files with File Roller 202 Archive Files and Devices: tar 203 File Compression: gzip, bzip2, and zip 207 Contents xi Part 111 Applications 11 Office and Database Applications 213 Accessibility to Microsoft Office 214 OpenOffice 214 KOffice 216 KOffice Applications 216 KParts 217 GNOME Office and Ximian 217 Document Viewers (PostScript, PDF, and DVI) 219 Database Management Systems 220 SQL Databases (RDMS) 220 Xbase Databases 223 Editors 223 GNOME Editor: gedit 224 K Desktop Editors: Kate, KEdit, and KJots 225 The Emacs Editor 225 The Vi Editor: Vim and gvim 226 12 Graphics Tools and Multimedia 231 Graphics Tools 232 KDE Graphics Tools 232 GNOME Graphics Tools 232 X Window System Graphic Programs 233 Multimedia 234 Sound Applications 234 CD Burners 235 Video Applications 236 13 Mail and News Clients 237 Mail Clients 237 MIME 238 Evolution 239 GNOME Mail Clients: Evolution, Balsa, and Others 240 The K Desktop Mail Client: KMail 241 X Mail Clients: Mozilla and Emacs 241 Command Line Mail Clients 242 Notifications of Received Mail 245 Accessing Mail on Remote POP Mail Servers 246 Usenet News 247 News Transport Agents 250 Mailing Lists 250 Newsreaders 251 XJi Red Hat: The Complete Reference Enterprise Linux & Fedora Edition 14 Web, FTP, and Java Clients 253 Web Clients 254 URL Addresses 254 Web Browsers 256 Creating Your Own Web Site 259 Java for Linux: Blackdown 260 The Java 2 Software Development Kit: SDK 261 FTP Clients 262 Network File Transfer: FTP 262 Web Browser-Based FTP: Mozilla 263 The K Desktop File Manager: Konqueror 263 GNOME Desktop FTP: Nautilus 264 gFTP 264 NcFTP 265 NcFTP Download Features 268 Bookmarks and Macros 269 ftp 270 Automatic Login and Macros: .netrc 274 lftp 276 15 Network Tools 277 Network Information: ping, finger, traceroute, and host 277 ping 277 finger and who 278 host 279 traceroute 279 Network Talk and Messenger Clients: ICQ, IRC, AIM, and Talk ... 280 ICQ 281 Instant Messenger 281 Telnet 282 RSH, Kerberos, and SSH Remote Access Commands 283 Remote Access Permission: .rhosts and .k51ogin 284 rlogin, slogin, rep, scp, rsh, and ssh 284 Part IV Security 16 Encryption, Integrity Checks, and Signatures: GNU Privacy Guard 289 Public Key Encryption, Integrity Checks, and Digital Signatures .. 289 Public-Key Encryption 289 Digital Signatures 290 Integrity Checks 290 Combining Encryption and Signatures
Recommended publications
  • 18 Free Ways to Download Any Video Off the Internet Posted on October 2, 2007 by Aseem Kishore Ads by Google
    http://www.makeuseof.com/tag/18-free-ways-to-download-any-video-off-the-internet/ 18 Free Ways To Download Any Video off the Internet posted on October 2, 2007 by Aseem Kishore Ads by Google Download Videos Now download.cnet.com Get RealPlayer® & Download Videos from the web. 100% Secure Download. Full Movies For Free www.YouTube.com/BoxOffice Watch Full Length Movies on YouTube Box Office. Absolutely Free! HD Video Players from US www.20north.com/ Coby, TV, WD live, TiVo and more. Shipped from US to India Video Downloading www.VideoScavenger.com 100s of Video Clips with 1 Toolbar. Download Video Scavenger Today! It seems like everyone these days is downloading, watching, and sharing videos from video-sharing sites like YouTube, Google Video, MetaCafe, DailyMotion, Veoh, Break, and a ton of other similar sites. Whether you want to watch the video on your iPod while working out, insert it into a PowerPoint presentation to add some spice, or simply download a video before it’s removed, it’s quite essential to know how to download, convert, and play these videos. There are basically two ways to download videos off the Internet and that’s how I’ll split up this post: either via a web app or via a desktop application. Personally, I like the web applications better simply because you don’t have to clutter up and slow down your computer with all kinds of software! UPDATE: MakeUseOf put together an excellent list of the best websites for watching movies, TV shows, documentaries and standups online.
    [Show full text]
  • The GNOME Census: Who Writes GNOME?
    The GNOME Census: Who writes GNOME? Dave Neary & Vanessa David, Neary Consulting © Neary Consulting 2010: Some rights reserved Table of Contents Introduction.........................................................................................3 What is GNOME?.............................................................................3 Project governance...........................................................................3 Why survey GNOME?.......................................................................4 Scope and methodology...................................................................5 Tools and Observations on Data Quality..........................................7 Results and analysis...........................................................................10 GNOME Project size.......................................................................10 The Long Tail..................................................................................11 Effects of commercialisation..........................................................14 Who does the work?.......................................................................15 Who maintains GNOME?................................................................17 Conclusions........................................................................................22 References.........................................................................................24 Appendix 1: Modules included in survey...........................................25 2 Introduction What
    [Show full text]
  • Release Notes for Fedora 15
    Fedora 15 Release Notes Release Notes for Fedora 15 Edited by The Fedora Docs Team Copyright © 2011 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries. All other trademarks are the property of their respective owners.
    [Show full text]
  • THE 2003 Editionlinux
    SUBSCRIBE or renew your subscription to APC for your chance to WIN the new Alfa 156 JTS, valued at over $54,000 Only $65 for 12 issues THE 2003 edition linux POCKETBOOK Subscribe ... www.apcmag.com Online at magshop.com.au or Call 13 61 16 Authorised under NSW Permit No. L02/09075 VIC: 02/2531 SA: T02/3553 ACT: TP02/3650 NT: NT02/3286 For terms and conditions refer to www.xmas.magshop.au. Expiry date: 24/12/02 Contents CHAPTER 1 Customising Gnome 57 CHAPTER 6 Editorial INTRODUCTION 11 Exploring KDE 60 WORKING WITH WINDOWS 131 The origins of the Customising KDE 64 What about Windows? 132 Welcome back to The Linux Pocketbook 2003 edition! penguin 12 Windows connectivity 138 Many of you will probably remember the original print ver- CHAPTER 4 sions of The Linux Pocketbook on newsstands across the country. Why Linux? 18 Basic security 145 The original versions sold so well that we ran out of copies. We’ve The ways of the world 20 USING LINUX 67 had countless requests for reprints, so we’ve decided to bundle the Connecting to the Net 68 CHAPTER 7 entire book into this single resource. This version of the pocketbook relies heavily on Mandrake Linux 9.0 or Red Hat 8.0. Both were CHAPTER 2 Applications 71 PLAYING WITH LINUX 151 released late in 2002, and can be easily found for sale at www.everyth INSTALLING LINUX 21 Conjuring Linux 75 Linux multimedia 152 inglinux.com.au, or for download from either mandrakelinux.com or First published December 2000.
    [Show full text]
  • Université De Montréal Context-Aware
    UNIVERSITE´ DE MONTREAL´ CONTEXT-AWARE SOURCE CODE IDENTIFIER SPLITTING AND EXPANSION FOR SOFTWARE MAINTENANCE LATIFA GUERROUJ DEPARTEMENT´ DE GENIE´ INFORMATIQUE ET GENIE´ LOGICIEL ECOLE´ POLYTECHNIQUE DE MONTREAL´ THESE` PRESENT´ EE´ EN VUE DE L'OBTENTION DU DIPLOME^ DE PHILOSOPHIÆ DOCTOR (GENIE´ INFORMATIQUE) JUILLET 2013 ⃝c Latifa Guerrouj, 2013. UNIVERSITE´ DE MONTREAL´ ECOLE´ POLYTECHNIQUE DE MONTREAL´ Cette th`ese intitul´ee: CONTEXT-AWARE SOURCE CODE IDENTIFIER SPLITTING AND EXPANSION FOR SOFTWARE MAINTENANCE pr´esent´eepar: GUERROUJ Latifa en vue de l'obtention du dipl^ome de: Philosophiæ Doctor a ´et´ed^ument accept´eepar le jury d'examen constitu´ede: Mme BOUCHENEB Hanifa, Doctorat, pr´esidente M. ANTONIOL Giuliano, Ph.D., membre et directeur de recherche M. GUEH´ ENEUC´ Yann-Ga¨el, Ph.D., membre et codirecteur de recherche M. DESMARAIS Michel, Ph.D., membre Mme LAWRIE Dawn, Ph.D., membre iii This dissertation is dedicated to my parents. For their endless love, support and encouragement. iv ACKNOWLEDGMENTS I am very grateful to both Giulio and Yann for their support, encouragement, and intel- lectual input. I worked with you for four years or even less, but what I learned from you will last forever. Giulio, your passion about research was a source of inspiration and motivation for me. Also, your mentoring and support have been instrumental in achieving my goals. Yann, your enthusiasm and guidance have always been a strength for me to keep moving forward. Research would not be as much fun without students and researchers to collaborate with. It has been a real pleasure and great privilege working with Massimiliano Di Penta (University of Sannio), Denys Poshyvanyk (College of William and Mary), and their teams.
    [Show full text]
  • Designing a User Interface for the Innovative E-Mail Client Semester Thesis
    Designing a User Interface for the Innovative E-mail Client Semester Thesis Student: Alexandra Burns Supervising Professor: Prof. Bertrand Meyer Supervising Assistants: Stephanie Balzer, Joseph N. Ruskiewicz December 2005 - April 2006 1 Abstract Email Clients have become a crucial application, both in business and for per- sonal use. The term information overload refers to the time consuming issue of keeping up with large amounts of incoming and stored email. Users face this problem on a daily basis and therefore benefit from an email client that allows them to efficiently search, display and store their email. The goal of this thesis is to build a graphical user interface for the innovative email client developed in a previous master thesis. It also explores the possibilities of designing a user interface outside of the business rules that apply for commercial solutions. 1 Contents 1 Introduction 4 2 Existing Work 6 2.1 ReMail ................................. 6 2.1.1 Methods ............................ 6 2.1.2 Problems Identified ...................... 7 2.1.3 Proposed Solutions ...................... 7 2.1.4 Assessment .......................... 8 2.2 Inner Circle .............................. 8 2.2.1 Methods ............................ 8 2.2.2 Problems Identified ...................... 9 2.2.3 Proposed Solutions ...................... 9 2.2.4 Assessment .......................... 10 2.3 TaskMaster .............................. 10 2.3.1 Methods ............................ 10 2.3.2 Problems Identified ...................... 11 2.3.3 Proposed Solution ...................... 11 2.3.4 Assessment .......................... 12 2.4 Email Overload ............................ 12 2.4.1 Methods ............................ 12 2.4.2 Problems Identified ...................... 13 2.4.3 Proposed Solutions ...................... 13 2.4.4 Assessment .......................... 14 3 Existing Solutions 16 3.1 Existing Email Clients .......................
    [Show full text]
  • Using Your Desktop
    Valade_06.qxd 3/31/05 2:58 PM Page 73 CHAPTER 6 Using Your Desktop inux provides two basic types of interface for you to use when working with your computer: GUI (graphical user interface) and CLI (command-line interface). An L overview of the interface types is provided in Chapter 5. In this chapter, the most common type of interface, a GUI called a desktop, is discussed in detail. The CLI is dis- cussed in detail in Chapter 7. Linux can start without a desktop, but most users prefer to have Linux start with a desk- top. The installation instructions provided in Chapter 4 result in a desktop opening at startup. A desktop interface functions as the top of your desk, supplying an empty work- ing surface and a set of tools. Different distributions provide different desktops, but most provide KDE (K Desktop Environment) and/or GNOME (Gnu Network Object Model Environment)—the Big Two of Linux desktops. The default desktop differs by distribution. For instance, Fedora defaults to GNOME, and Mandrake/SuSE defaults to KDE. However, you can change the default once you decide which desktop you prefer. KDE and GNOME are open source software, each developed in a project of its own. New versions are released independently of Linux releases or the release of any specific Linux distribution. As a result, different distributions include different KDE and/or GNOME versions. In addition, KDE and GNOME are very configurable. Almost everything about them can be changed. Consequently, KDE and GNOME don’t look exactly the same in different distributions or versions of distributions.
    [Show full text]
  • Unix and Linux System Administration and Shell Programming
    Unix and Linux System Administration and Shell Programming Unix and Linux System Administration and Shell Programming version 56 of August 12, 2014 Copyright © 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2009, 2010, 2011, 2012, 2013, 2014 Milo This book includes material from the http://www.osdata.com/ website and the text book on computer programming. Distributed on the honor system. Print and read free for personal, non-profit, and/or educational purposes. If you like the book, you are encouraged to send a donation (U.S dollars) to Milo, PO Box 5237, Balboa Island, California, USA 92662. This is a work in progress. For the most up to date version, visit the website http://www.osdata.com/ and http://www.osdata.com/programming/shell/unixbook.pdf — Please add links from your website or Facebook page. Professors and Teachers: Feel free to take a copy of this PDF and make it available to your class (possibly through your academic website). This way everyone in your class will have the same copy (with the same page numbers) despite my continual updates. Please try to avoid posting it to the public internet (to avoid old copies confusing things) and take it down when the class ends. You can post the same or a newer version for each succeeding class. Please remove old copies after the class ends to prevent confusing the search engines. You can contact me with a specific version number and class end date and I will put it on my website. version 56 page 1 Unix and Linux System Administration and Shell Programming Unix and Linux Administration and Shell Programming chapter 0 This book looks at Unix (and Linux) shell programming and system administration.
    [Show full text]
  • Multiresolution Recurrent Neural Networks: an Application to Dialogue Response Generation
    Multiresolution Recurrent Neural Networks: An Application to Dialogue Response Generation Iulian Vlad Serban∗◦ Tim Klinger University of Montreal IBM Research 2920 chemin de la Tour, T. J. Watson Research Center, Montréal, QC, Canada Yorktown Heights, NY, USA Gerald Tesauro Kartik Talamadupula Bowen Zhou IBM Research IBM Research IBM Research T. J. Watson Research Center, T. J. Watson Research Center, T. J. Watson Research Center, Yorktown Heights, Yorktown Heights, Yorktown Heights, NY, USA NY, USA NY, USA Yoshua Bengioy◦ Aaron Courville◦ University of Montreal University of Montreal 2920 chemin de la Tour, 2920 chemin de la Tour, Montréal, QC, Canada Montréal, QC, Canada Abstract We introduce the multiresolution recurrent neural network, which extends the sequence-to-sequence framework to model natural language generation as two parallel discrete stochastic processes: a sequence of high-level coarse tokens, and a sequence of natural language tokens. There are many ways to estimate or learn the high-level coarse tokens, but we argue that a simple extraction procedure is sufficient to capture a wealth of high-level discourse semantics. Such procedure allows training the multiresolution recurrent neural network by maximizing the exact joint log-likelihood over both sequences. In contrast to the standard log- likelihood objective w.r.t. natural language tokens (word perplexity), optimizing the joint log-likelihood biases the model towards modeling high-level abstractions. We apply the proposed model to the task of dialogue response generation in arXiv:1606.00776v2 [cs.CL] 14 Jun 2016 two challenging domains: the Ubuntu technical support domain, and Twitter conversations. On Ubuntu, the model outperforms competing approaches by a substantial margin, achieving state-of-the-art results according to both automatic evaluation metrics and a human evaluation study.
    [Show full text]
  • Guidelines on Electronic Mail Security
    Special Publication 800-45 Version 2 Guidelines on Electronic Mail Security Recommendations of the National Institute of Standards and Technology Miles Tracy Wayne Jansen Karen Scarfone Jason Butterfield NIST Special Publication 800-45 Guidelines on Electronic Mail Security Version 2 Recommendations of the National Institute of Standards and Technology Miles Tracy, Wayne Jansen, Karen Scarfone, and Jason Butterfield C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 February 2007 U .S. Department of Commerce Carlos M. Gutierrez, Secretary Technology Administration Robert C. Cresanti, Under Secretary of Commerce for Technology National Institute of Standards and Technology William Jeffrey, Director Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security, and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-45 Version 2 Natl. Inst. Stand. Technol. Spec. Publ. 800-45 Version 2, 139 pages (Feb.
    [Show full text]
  • Latexsample-Thesis
    INTEGRAL ESTIMATION IN QUANTUM PHYSICS by Jane Doe A dissertation submitted to the faculty of The University of Utah in partial fulfillment of the requirements for the degree of Doctor of Philosophy Department of Mathematics The University of Utah May 2016 Copyright c Jane Doe 2016 All Rights Reserved The University of Utah Graduate School STATEMENT OF DISSERTATION APPROVAL The dissertation of Jane Doe has been approved by the following supervisory committee members: Cornelius L´anczos , Chair(s) 17 Feb 2016 Date Approved Hans Bethe , Member 17 Feb 2016 Date Approved Niels Bohr , Member 17 Feb 2016 Date Approved Max Born , Member 17 Feb 2016 Date Approved Paul A. M. Dirac , Member 17 Feb 2016 Date Approved by Petrus Marcus Aurelius Featherstone-Hough , Chair/Dean of the Department/College/School of Mathematics and by Alice B. Toklas , Dean of The Graduate School. ABSTRACT Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah.
    [Show full text]
  • Indicators for Missing Maintainership in Collaborative Open Source Projects
    TECHNISCHE UNIVERSITÄT CAROLO-WILHELMINA ZU BRAUNSCHWEIG Studienarbeit Indicators for Missing Maintainership in Collaborative Open Source Projects Andre Klapper February 04, 2013 Institute of Software Engineering and Automotive Informatics Prof. Dr.-Ing. Ina Schaefer Supervisor: Michael Dukaczewski Affidavit Hereby I, Andre Klapper, declare that I wrote the present thesis without any assis- tance from third parties and without any sources than those indicated in the thesis itself. Braunschweig / Prague, February 04, 2013 Abstract The thesis provides an attempt to use freely accessible metadata in order to identify missing maintainership in free and open source software projects by querying various data sources and rating the gathered information. GNOME and Apache are used as case studies. License This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0) license. Keywords Maintenance, Activity, Open Source, Free Software, Metrics, Metadata, DOAP Contents List of Tablesx 1 Introduction1 1.1 Problem and Motivation.........................1 1.2 Objective.................................2 1.3 Outline...................................3 2 Theoretical Background4 2.1 Reasons for Inactivity..........................4 2.2 Problems Caused by Inactivity......................4 2.3 Ways to Pass Maintainership.......................5 3 Data Sources in Projects7 3.1 Identification and Accessibility......................7 3.2 Potential Sources and their Exploitability................7 3.2.1 Code Repositories.........................8 3.2.2 Mailing Lists...........................9 3.2.3 IRC Chat.............................9 3.2.4 Wikis............................... 10 3.2.5 Issue Tracking Systems...................... 11 3.2.6 Forums............................... 12 3.2.7 Releases.............................. 12 3.2.8 Patch Review........................... 13 3.2.9 Social Media............................ 13 3.2.10 Other Sources..........................
    [Show full text]