Te19 Emata Diplomovy19 Ych Prac19 2011/12

Total Page:16

File Type:pdf, Size:1020Kb

Te19 Emata Diplomovy19 Ych Prac19 2011/12 Na´vrh te´mat diplomovy´ch a rocˇnı´kovy´ch pracı´ pro akademicky´rok 2012/13 Vedoucı´pra´ce: RNDr. Sˇa´rka Vavrecˇkova´, Ph.D. Poslednı´aktualizace: 22. rˇı´jna 2012 Upozorneˇnı´: te´ma musı´ by´t prˇed vybra´nı´m konzultova´no s vedoucı´m pra´ce. Pokud ma´te vlastnı´na´pad, je nutne´s nı´m prˇijı´t co nejdrˇı´v. Tento seznam je v aktua´lnı´elektronicke´formeˇ k dispozici na http://fpf.slu.cz/~vav10ui/obsahy/dipl/temata.pdf. DNS a ENUM (DNS and ENUM) Komenta´rˇ: ENUM (Electronic Number Mapping) je protokol vydany´organizacı´IETF, ktery´ Rezervova´no umozˇnˇuje prˇekla´dat telefonnı´cˇı´sla podle standardu E.164 na ru˚zna´URI podle existujı´cı´ch mozˇnostı´ (e-mail – Mailto, SIP, H323, ICQ, IRC, HTTP, FTP, IP adresa, atd.). Jde vlastneˇ o vytvorˇenı´a pouzˇı´va´nı´relacı´mezi ru˚zny´mi identifikacemi te´zˇe identity. Za´sady pro vypracova´nı´: IETF ENUM (Electronic Number Mapping) je protokol popisujı´cı´prˇe- klad telefonnı´ch cˇı´sel podle standardu E.164 na URI, standardizova´n jako RFC 3761. Student v pra´ci popı´sˇe princip DNS a ENUM, jejich vza´jemny´vztah, typicke´protokoly/sluzˇby, jejichzˇ URI mohou by´t cı´lem prˇekladu, na´vaznost na PSTN a VoIP, potrˇebne´protokoly, zabezpecˇenı´ proti chyba´m a beˇzˇny´m u´toku˚m, mozˇnosti vyuzˇitı´, konfiguraci ve zvolene´m DNS serveru. Zdroje: • ENUM [online]. Stra´nky organizace ITU-T. Dostupne´na: http://www.itu.int/osg/spu/enum/ • The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM)[online]. IETF, Network Working Group. April 2004. Dostupne´na: http://www.ietf.org/rfc/rfc3761.txt • Welcome to E164.org [online]. Dostupne´na: http://www.e164.org/ • HUSTON, G. ENUM: Mapping the E.164 Number Space into the DNS [online]. Dostupne´ na: http://www.circleid.com/posts/enum mapping e164 into dns/ • Co je ENUM [online]. Stra´nky sdruzˇenı´CZ.NIC. Dostupne´na: http://enum.nic.cz/page/270/co- je-enum/ • Stra´nky DNS serveru BIND [online]. Dostupne´na: http://www.bind9.net/dns-links • How to install Bind9 as ENUM Server [online]. Typhoon Master. Dostupne´na: http://blog.tayfundogan.com/2009/06/how-to-install-bind9-as-enum-server.html 1 Windows 8 To Go vs. Linux Live USB Komenta´rˇ: Narozdı´l od prˇedchozı´ch verzı´lze Windows 8 instalovat take´na vy´meˇnne´me´dium Rezervova´no (USB flash disk) – drˇı´veˇjsˇı´verze bylo mozˇne´instalovat pouze na prima´rnı´oddı´ly pevne´ho disku. Pozor, Windows 8 Consumer Preview mu˚zˇeme volneˇpouzˇı´vat jen do 15. ledna 2013, tedy pokud si Windows 8 nechcete porˇı´dit za vlastnı´, je trˇeba prove´st vesˇkere´pokusy do tohoto data. Postup vytvorˇenı´Linux Live USB je naprˇı´klad v bakala´rˇce Luka´sˇe Zˇ u˚rka, pra´ce je u meˇ. Potrˇebna´investice: jeden nebo dva USB flash disky pouzˇitelne´pro dany´u´cˇel (pozor na kapacitu). Je trˇeba mı´t k dispozici pocˇı´tacˇcˇi notebook umozˇnˇujı´cı´bootovat z USB, idea´lneˇ vı´ce. USB flash s Windows 8 je trˇeba vytva´rˇet ve Windows 7. Za´sady pro vypracova´nı´: Cı´lem pra´ce je srovna´nı´postupu vytvorˇenı´Live me´dia s Windows 8 a Linuxem a na´sledne´srovna´nı´mozˇnostı´takto instalovany´ch syste´mu˚(naprˇı´klad prˇı´stup k hardwaru vcˇetneˇpameˇt’ovy´ch me´diı´, pouzˇitelnost pro diagnostiku pocˇı´tacˇe). Student v pra´ci popı´sˇe postup vytvorˇenı´USB Live me´dia s Windows a Linuxem, popı´sˇe mozˇnosti a omezenı´, provede oveˇrˇenı´funkcˇnosti na tomte´zˇpocˇı´tacˇi a srovna´vy´stupy. Zdroje: • Zˇ U˚ REK, Luka´sˇ. Minimalisticka´distribuce Linuxu pro servisnı´u´cˇely. Opava, 2011. Bakala´rˇska´pra´ce. Slezska´univerzita v Opaveˇ. • IMRAN, Awais. How To Make Windows 8 Bootable USB Flash Drive The Easy Way. Redmond Pie [online]. September 16th, 2011 [cit. 2012-10-03]. Dostupne´na: http://www.redmondpie.com/how- to-make-windows-8-bootable-usb-flash-drive-the-easy-way/ • FactRocks. Run Windows 8 on a Flash Drive (Windows To Go). The Hacker’s Journal on YouTube, FactRocks Tutorials [online]. August, 2012 [cit. 2012-10-03]. Dostupne´na: http://www.youtube.com/watch?NR=1&v=Mnrf vFR3BA&feature=endscreen • WIFT. Instalujeme Windows 8 na USB disk aneb Windows To Go v akci. Deep in IT [online]. 2. 5. 2012 [cit. 2012-10-03]. Dostupne´na: http://diit.cz/clanek/windows-8-na-usb-disku-windows-to-go • LinuxLive USB Creator [online]. Dostupne´na: http://www.linuxliveusb.com/ Adobe DNG Komenta´rˇ: Adobe DNG (Digital Negative, rok 2004) je otevrˇeny´forma´t urcˇeny´pro archivaci Rezervova´no fotografiı´. Forma´t mu˚zˇeme cha´pat jako na´hradu proprieta´lnı´ch navza´jem odlisˇny´ch RAW. Pra´ce je urcˇena pro studenty,kterˇı´se zaby´vajı´fotografiı´a majı´v tomto smeˇru urcˇite´zkusˇenosti (take´s forma´ty RAW). Za´sady pro vypracova´nı´: Adobe DNG je otevrˇeny´forma´t urcˇeny´pro archivaci fotografiı´. Cı´lem pra´ce je popis mozˇnostı´forma´tu Adobe DNG a zhodnocenı´jeho vyuzˇitı´, take´ve vztahu k dnes beˇzˇny´m RAW forma´tu˚m. Student se v pra´ci bude zaby´vat forma´tem DNG, strukturou takto ukla´dany´ch dat, exis- tujı´cı´mi konvertery, mozˇnostmi vyuzˇitı´, srovna´s RAW. Zdroje: • Photoshop CS6/Podrobneˇ: Digita´lnı´negativ (DNG). Adobe.com [online]. [cit. 2012-10-03]. Do- stupne´na: http://www.adobe.com/cz/products/photoshop/extend.displayTab2.html • DNG Specification, Version 1.4.0.0 [online]. Adobe.com, June 2012. [cit. 2012-10-03]. Dostupne´na: http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/products/photoshop /pdfs/dng spec 1.4.0.0.pdf 2 • KOLCˇAVA, Miroslav. Digita´lnı´fotografie ma´jednotny´forma´t. Fotoapara´t.cz [online]. 27. 12. 2006 [cit. 2012-10-03]. Dostupne´na: http://www.fotoaparat.cz/article/10379/1 • PIHAN, Roman. Vsˇe o forma´tu RAW – 2. dı´l. Digimanie.cz [online]. 26. 3. 2008 [cit. 2012-10-03]. Dostupne´na: http://www.digimanie.cz/art doc-A7905E1BA1798352C12574170068F47C.html (dalsˇı´dı´ly naleznete na webu vlastnı´m vyhleda´va´nı´m) • SˇURKALA, Milan. Forma´t RAW: Jaky´m softwarem zpracova´vat? Digimanie.cz [online]. 15. 2. 2010 [cit. 2012-10-03]. Dostupne´na: http://www.digimanie.cz/art doc-EA088B875569DB47C12576C 60068CACC.html?lotus=1&Highlight=0,v%C5%A1e,o,form%C3%A1tu,raw Tvorba a spra´va hudebnı´ch knihoven (Creation and Administration of Music Libraries) Komenta´rˇ: Mozˇnosti: ID3 tag v podcastu, spolupra´ce s neˇktery´m multimedia´lnı´m centrem Rezervova´no (MythTV, XBMC, MediaPortal, Moovida, apod.) Za´sady pro vypracova´nı´: Student se v pra´ci bude zaby´vat spra´vou a editacı´hudebnı´ch kniho- ven, u´pravou hudebnı´ch ID3 tagu˚a mozˇnostı´rozpozna´vat a doplnˇovat tyto informace z da- taba´ze. Cı´lem je vytvorˇenı´komplexnı´ho na´stroje, ktery´umozˇnı´uzˇivateli celkovou spra´vu hudebnı´ch kolekcı´v ra´mci jednoho programu s mozˇnostı´jednoduche´ho trˇı´deˇnı´knihoven a skladeb. Program bude tvorˇen v programovacı´m jazyku C# s vyuzˇitı´m technologie .NET Framework 4.5. Zdroje: • SLOBODA, Tilo. Side-by-side Comparison of ID3 Versions, Fields/Frames. UnixGods.org [online]. 2011 [cit. 2012-10-01]. Dostupne´z: http://www.unixgods.org/~tilo/ID3/docs/ID3 comparison2.html • ZACHAR, Martin. Jak na ID3 tagy - prˇehra´vejte pı´snicˇky pohodlneˇ. Centrum.cz [online]. 2009 [cit. 2012-10-01]. Dostupne´z: http://magazin.stahuj.centrum.cz/jak-na-id3-tagy-prehravejte-pisnicky- pohodlne/ • FARRAR, Richard. What ID3 Tags Should you use in a Podcast? Richard Farrar’s blog [online]. 28 June 2009 [cit. 2012-10-05]. Dostupne´z: http://www.richardfarrar.com/what-id3-tags-should-you-use-in-a-podcast/ • FARRAR, Richard. Alternative ID3 Tags for Adding Artwork to MP3 Files. Richard Farrar’s blog [online]. 20 July 2009 [cit. 2012-10-05]. Dostupne´z: http://www.richardfarrar.com/alternative-id3-tags-for-adding-artwork-to-mp3-files/ Vyuzˇitı´xxxx prˇi vy´uce hardwaru Komenta´rˇ: Rezervova´no Za´sady pro vypracova´nı´: Bude Zdroje: uprˇesneˇno • xxx Firefox OS Komenta´rˇ: Firefox OS, pu˚vodneˇpojmenova´n Boot to Gecko, je projekt spolecˇnosti Mozilla – projekt vyvı´jejı´cı´operacˇnı´syste´m pro mobilnı´telefony zalozˇeny´na Linuxu. Firefox OS je mysˇlen jako svobodna´konkurence Androidu a iOSu. Prvnı´zarˇı´zenı´s tı´mto syste´mem by 3 meˇla by´t v prodeji v roce 2013, ale vy´vojove´verze jsou k dispozici ted’(mu˚zˇeme je spustit bud’ v neˇktery´ch konkre´tnı´ch mobilnı´ch telefonech – po portaci, a nebo v emula´toru na pocˇı´tacˇi). Za´sady pro vypracova´nı´: Firefox OS (Boot to Gecko, B2G) je novy´mobilnı´operacˇnı´syste´m zalozˇeny´na Linuxu. Cı´lem pra´ce je popsat tento syste´m a mozˇnosti programova´nı´aplikacı´ pro neˇj. Student popı´sˇe strukturu a zabezpecˇenı´ tohoto syste´mu, vyzkousˇı´, provede srovna´nı´ s jiny´mi mobilnı´mi platformami (Android, prˇı´p. dalsˇı´ – naprˇı´klad iOS, WebOS), proveˇrˇı´ mozˇnosti programova´nı´ aplikacı´ pro tento syste´m, vyuzˇitı´ HTML5, licencova´nı´. Soucˇa´stı´ pra´ce je popis zpu˚sobu testova´nı´tohoto syste´mu na pocˇı´tacˇi. Zdroje: • Firefox OS. Mozilla Developer Network [cit. 2012-10-01]. Dostupne´na: https://developer.mozilla.org/en-US/docs/Mozilla/Firefox OS • VOKA´ Cˇ, Ludeˇk. Vyzkousˇeli jsme operacˇnı´syste´m Firefox pro mobily. Vy mu˚zˇete take´. IDnes.cz [online]. 15. srpna 2012 [cit. 2012-10-01]. Dostupne´z: https://developer.mozilla.org/en-US/docs/Mozilla/Firefox OS • HAWKES, Rob. There is something magical about Firefox OS.
Recommended publications
  • Sentry Firewall CD HOWTO Sentry Firewall CD HOWTO Table of Contents
    Sentry Firewall CD HOWTO Sentry Firewall CD HOWTO Table of Contents Sentry Firewall CD HOWTO............................................................................................................................1 Stephen A. Zarkos, Obsid@Sentry.net....................................................................................................1 1. Introduction..........................................................................................................................................1 2. How the CD Works (Overview)..........................................................................................................1 3. Obtaining the CDROM........................................................................................................................1 4. Using the Sentry Firewall CDROM.....................................................................................................1 5. Overview of Available Configuration Directives................................................................................1 6. Setting Up a Firewall...........................................................................................................................2 7. Troubleshooting...................................................................................................................................2 8. Building a Custom Sentry CD.............................................................................................................2 9. More About the Sentry Firewall Project..............................................................................................2
    [Show full text]
  • Linux Networking Cookbook.Pdf
    Linux Networking Cookbook ™ Carla Schroder Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux Networking Cookbook™ by Carla Schroder Copyright © 2008 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mike Loukides Indexer: John Bickelhaupt Production Editor: Sumita Mukherji Cover Designer: Karen Montgomery Copyeditor: Derek Di Matteo Interior Designer: David Futato Proofreader: Sumita Mukherji Illustrator: Jessamyn Read Printing History: November 2007: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. The Cookbook series designations, Linux Networking Cookbook, the image of a female blacksmith, and related trade dress are trademarks of O’Reilly Media, Inc. Java™ is a trademark of Sun Microsystems, Inc. .NET is a registered trademark of Microsoft Corporation. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
    [Show full text]
  • Montagem E Manutenção De Computadores Janaina Silva De Souza
    Montagem e Manutenção de Computadores Janaina Silva de Souza Curso Técnico em Manutenção e Suporte em Informática Montagem e Manutenção de Computadores Janaina Silva de Souza Manaus -AM 2011 Presidência da República Federativa do Brasil Ministério da Educação Secretaria de Educação a Distância © Centro de Educação Tecnológica do Amazonas Este Caderno foi elaborado em parceria entre o Centro de Educação Tecnológica do Amazonas e a Universidade Federal de Santa Catarina para o Sistema Escola Técnica Aberta do Brasil – e-Tec Brasil. Equipe de Elaboração Coordenação de Design Gráfico Centro de Educação Tecnológica do Amazonas André Rodrigues/UFSC – CETAM Design Instrucional Renato Cislaghi/UFSC Coordenação Institucional Adriana Lisboa Rosa/CETAM Web Master Laura Vicuña Velasquez/CETAM Rafaela Lunardi Comarella/UFSC Coordenação do Curso Web Design Helder Câmara Viana/CETAM Beatriz Wilges/UFSC Mônica Nassar Machuca/UFSC Professora-autora Janaina Silva de Souza/CETAM Diagramação Bárbara Zardo/UFSC Comissão de Acompanhamento e Validação Juliana Tonietto/UFSC Universidade Federal de Santa Catarina – UFSC Marília C. Hermoso/UFSC Nathalia Takeuchi/UFSC Coordenação Institucional Araci Hack Catapan/UFSC Revisão Júlio César Ramos/UFSC Coordenação do Projeto Silvia Modesto Nassar/UFSC Projeto Gráfico e-Tec/MEC Coordenação de Design Instrucional Beatriz Helena Dal Molin/UNIOESTE e UFSC Catalogação na fonte elaborada pela DECTI da Biblioteca Central da UFSC S729m Souza, Janaina Silva de Montagem e manutenção de computadores / Janaina Silva de Souza. – Manaus : Centro de Educação Tecnológica do Amazonas, 2011. 114p. : il. Inclui bibliografia Curso técnico em manutenção e suporte em informática ISBN: 978-85-63576-37-8 1. Informática – Estudo e ensino. 2. Microcomputadores – Manuten- ção e reparos.
    [Show full text]
  • Sentry: a Multipourpose GNU/Linux
    last update: 25/ october / 2002 Sentry: a multipourpose GNU/Linux... [In this short article I'll try to explain how to made a good use of Sentry: an useful GNU/Linux distribution that can be considered like a swiss-knife tool. I'll also describe my setup experience with this distro (followed by a case-study to solve an inusual need).] What's sentry: As described in product's FAQ the "Sentry Firewall CD" is a bootable GNU/Linux based CD-ROM, useful for a number of different needs: from firewall to application server. What is meant for bootable CD-ROM is a media that contains an Operative System full installation and has a boot sector so, if PC BIOS allow it (and most recent ones do), it is possible to start PC directly from CD-ROM. The advantage to operate from CD is due, before all, to the unchangeability of the media and the consequent fast recovery of system. And therefore is impossible for a cracker (not "haker" as some newspaper define those informatical intruders) to destroy the system itself in a definitive way. One of preferred activities of cracker is, infact, the installation of a rootkit as soon as an host ahs been compromised. A root kit is, in simple words, a kit of modified programs and system utilities that allow an easy access to compromised system masking, at the same time, crackers activities. As You can understand these programs were, usually, installed on the compromised system hard disk and are very hard to remove so often is required to reinstall all system to gain a new safe situation.
    [Show full text]
  • Copyrighted Material
    23_579959 bindex.qxd 9/27/05 10:05 PM Page 373 Index Symbols alias command, 200, 331 - (dash), 109 Anaconda installer feature, 19 $ (dollar sign), 330 analog channel changing, 66–67 ! (exclamation mark), 332 Analog RBG/xVGA output, 69 # (pound sign), 330 analog SVideo output, 69 ~ (tilde), 330 analog television output, 69 antiword conversion application, 173 A Appearance settings, Web Photo Gallery New aa boot label, eMoviX boot prompt, 136 Albums page, 45 abiword word processing application, 173 appliance modules, X10 protocol, 188 abuse application, 176 applications ace application, 176 for pen drives ACL (Access Control List), 259 downloading, 171–172 acm application, 176 gaming applications, 176–177 ActiveHome project, 185 general applications, 173–174 admin directory checks, Internet radio, 287 multimedia applications, 175 Admin email address option, Web Photo running from workstations, 316–317 Gallery Email and Registration apt-get install lirc command, 92 tab, 43 ASF (Advanced Systems Format), 128 administration tools, desktop features, a_steroid application, 176 342–343 atrpms-kickstart package, 79–80 administrative settings, Heyu project, 203–204 audacity application, 175 Advanced Systems Format (ASF), 128 audio players, Internet radio, 269–270 albums authentication parameters, Icecast server, 274 adding photos to, 48, 55 Autodesk automation files, eMoviX recording bookmarking, 54 COPYRIGHTED MATERIALcontent, 129 browsing, 51 AVI (Audio Video Interleaf ) format, 128 comments, adding, 54–55 creating, 47 B naming, 47 backend setup and startup, MythTV project slideshow settings, 46 configuration, 62, 110–113 summary additions, 48 backups, 29, 291 thumbnail images, 51 bad flag options, BZFlag project, 229 title creation, 48 bad words, managing, BZFlag project, 233 23_579959 bindex.qxd 9/27/05 10:05 PM Page 374 374 Index ■ B bandwidth consumption, Internet radio, 273 burning barrage application, 176 CDs Basic option, Devil-Linux firewall Main eMoviX project, 134–135 Menu, 253 MoviX2 project, 142–143 Battle Zone capture the Flag.
    [Show full text]
  • Ldp Howto-Index
    LDP HOWTO-INDEX Guylhem Aznar Joshua Drake Greg Ferguson v9.0, 2005-12-29 This document contains an index to the Linux HOWTOs as well as other information about the HOWTO project. LDP HOWTO-INDEX Table of Contents Chapter 1. What Are Linux HOWTOs?...........................................................................................................1 Chapter 2. Where Can I Get Linux HOWTOs?..............................................................................................2 Chapter 3. HOWTO Translations.....................................................................................................................3 Chapter 4. Categorized List of HOWTOs........................................................................................................4 4.1. The Linux OS....................................................................................................................................4 4.1.1. Getting Started.........................................................................................................................4 4.1.2. Switching from Other Operating Systems...............................................................................4 4.1.3. Distributions............................................................................................................................5 4.1.4. Installation...............................................................................................................................5 4.1.5. Kernel......................................................................................................................................7
    [Show full text]
  • Linux Utilisation-Distributions-Linux
    Les distributions Par son mode de diffusion particulier, Linux est parfois déroutant. En effet, on ne se procure jamais le système Linux mais un système Linux. Chacun est libre d’assembler son propre système Linux et de le distribuer, gratuitement ou non. Il est même possible de prendre une distribution existante, d’en changer le nom, et de la redistribuer ainsi… Exemple de distributions disponibles: AbulÉdu, Adamantix, ADIOS, Admelix, Archie, ALT, Amber, AnNyung, ANTEMIUM, APODIO, Arabian, Arch, Ark, AsianLinux, Asianux, ASLinux, ASPLinux, Astaro, Asterisk@Home, Athene, ATmission, Auditor, Aurora, Aurox, AUSTRUMI, Hubworx, B2D, Bayanihan, BeatrIX, Berry, BIG LINUX, BioBrew, Bioknoppix, blackPanther, BLAG, Blin, Buffalo, Caixa Mágica, cAos, Càtix, CCux, CDlinux, Censornet, CentOS, ClarkConnect, Clusterix, clusterKNOPPIX, Condorux, Conectiva, Cosix, CRUX, Damn Small, Danix, DARKSTAR, DeadCD, Debian, Deep-Water, Defender, DeLi, AGNULA, DesktopBSD, Devil, Dizinha, DNALinux, DragonFly, P!tux, dyne:bolic, Eadem, Edubuntu, eduKnoppix, EduLinux, Ehad, eLearnix, Elive, ELX, EnGarde, ERPOSS, SME Server, ESware, Evinux, EzPlanet One, FAMELIX, Feather, Featherweight, Fedora, Fermi, Flash, Flonix, Foresight, FoRK, FoX Desktop, FreeBSD, Freedows, Freeduc, Freeduc-Sup, FreeSBIE, Frenzy, Frugalware, FTOSX, GeeXboX, Gelecek, Gentoo, GentooTH, Gentoox, GEOLivre, Gibraltar, GNIX, Gnoppix, gNOX, GNUstep, GobLinX, GoboLinux, grml, Guadalinex, GuLIC-BSD, h3knix, Haansoft, Hancom, Helix, Hikarunix, Hiweed, HKLPG, Holon, Honeywall, iBox, IDMS, Ignalum, Impi,
    [Show full text]
  • Linux Security Methods
    Network Security Using LINUX Michael Sweeney Network Security Using Linux by Michael Sweeney Copyright 2005 Michael Sweeney. All rights reserved Printed in the United States of America Published by PacketPress, 4917 Leeds Ave, Orange, CA 92867. PacketPress books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (www.packetpress.net). For more information contact our sales department at: 1-714-637-4235 or [email protected] Editor: Jeanne Teehan Technical Editor: Cover Designer: Amanda Sweeney Printing History: January 2005 First Edition. While every precaution has been taken in the preparation of this book, the publisher and the author assume no responsibility for errors, or omissions, or for damages resulting from the use of the information contained herein. "The idea is to try to give all the information to help others to judge the value of your contribution; not just the information that leads to judgment in one particular direction or another" Richard Feynman Table of Contents Network Security using Linux......................................................... Credits.............................................................................................X Preface............................................................................................xii Who is this book for?......................................................................................xiii How the book was written..............................................................................xiii
    [Show full text]
  • Atviro Kodo (Atvirosios) Programinės Įrangos Vartojimo Situacijos Ir Patikimo Aptarnavimo Infrastruktūros Sukūrimo Galimybių Lietuvoje Tyrimo Ataskaita
    VILNIAUS UNIVERSITETAS Atviro kodo (atvirosios) programin ės įrangos vartojimo situacijos ir patikimo aptarnavimo infrastrukt ūros suk ūrimo galimybi ų Lietuvoje tyrimo A T A S K A I T A VILNIUS, 2018 Tyrim ą atliko ir ataskait ą pareng ė: Valentina Dagien ė, Tolmantas Dagys, Viktoras Dagys, Egl ė Jasut ė, Tatjana Jevsikova, Gabriel ė Stupurien ė, Lina Vinikien ė. Redagavo Renata Valotkien ė. ĮVADAS 4 ATVIRO KODO PROGRAMINĖS ĮRANGOS ŠALTINI Ų ANALIZ Ė 9 1. Atviro kodo program ų naudojimo tendencij ų kaita 9 2. Užsienio šali ų patirtis 16 3. Atviro kodo program ų naudojimo Lietuvoje patirtis 24 4. Populiariausios atviro kodo programos 36 5. Atviro kodo program ų lokalizavimas 46 6. Atviro kodo programin ės įrangos saugumas ir jo užtikrinimo b ūdai 56 LIETUVOS VISUOMEN ĖS SLUOKSNI Ų NUOMONI Ų TYRIMAS 77 7. Ekspert ų strukt ūrizuoto interviu analiz ės rezultatai 78 8. Institucij ų internetin ė apklausa 104 9. Moksleivi ų ir student ų internetin ė apklausa 121 10. Interviu ir internetini ų apklaus ų rezultat ų apibendrinimas 128 BENDROSIOS IŠVADOS IR REKOMENDACIJOS 141 Šaltiniai 144 PRIEDAI 153 1 priedas. Populiariausios atviro kodo programos 153 2 priedas. Operacini ų sistem ų ir raštin ės paketo lokalizavimo užbaigtumas 163 3 priedas. Institucij ų internetin ės apklausos klausimynas 165 4 priedas. Moksleivi ų ir student ų internetin ės apklausos klausimynas 169 Įvadas Atvirosios, arba atviro kodo, programos tampa m ūsų kasdien naudojamais produktais, j ų sukuriama vis daugiau ir vis įvairesni ų. Labiausiai akcentuotina atviro kodo program ų savyb ė – aplink jas telkiasi bendruomen ės, vyksta bendradarbiavimas, generuojami nauji sprendimai, kurie skatina ir nuosavybini ų program ų tobul ėjim ą.
    [Show full text]
  • Doporučení Strategie
    Správa serverů a počítačových sítí 2020/2021 Přednáška č.3 ( ver. 2021-03-02-1 ) 1 / 27 4. Zálohy napájení ● Výpadek elektřiny nejde ovlivnit ani předpo- vědět – většinou ● Nekorektní ukončení systému může vést k poškození dat ● neuzavřené soubory ● pidy starých procesů ● Nemusí se zapsat data z cache ● Důvodem výpadku napájení: ● Porucha na zdroji ● Výpadek el. energie 2 / 27 4.1. Redundantní zdroj napájení ● Vznikne „špička“ v sítí a dojde ke spálení zdroje a následně k nekorektnímu ukončení systému ● Řešením je použití stroje s dvěma a více zdroji, ideálně hot-plugovými ● U dražších značkových serverů obvyklé ● Více náročné stroje potřebují pro svůj chod více než jeden ze zdrojů – například disková pole 3 / 27 4.2. UPS ● Zařízení sloužící jako záložní zdroj pro pří- pad výpadku energie ● Tři typy: ● Off-line – používá relé, nemá filtry, nereguluje na- pětí ● Line-interactive – dokáže omezeně vyrovnávat kolísání v el. síti ● Online – vyšší cena, používá filtry, velmi vý- hřevné, ale bezpečné, nepřepíná zdroj, ale funguje stále z baterií 4 / 27 4.2. UPS ● Klasicky umí ● Překlenout výpadek napájení ● Číst info z UPS ● Nadstandard (RS ) ● Vypnout server či skupinu serverů ● Spustit se zpožděním 5 / 27 4.3. Diesel agregát ● Využívám pro rozsáhlé systémy, kde už běžné UPS kapacitně nestačí ● Je schopen udržet v chodu celé počítačové sály ● Většinou velmi nákladné zařízení ● Cca před třemi roky způsobil opakované havarie ve všech velkých pražských hostingových centrech 6 / 27 4.3. Diesel agregát 7 / 27 5. Vzdálená správa ● Nejedná se o vzdálenou plochu Windows :) ● Jde o možnost ovládat server na nižší úrovni, tedy i ve stavu kdy nefunguje operační sys- tém ● Existuje ve dvou variantách: ● Interně řešená v serveru ● Externí řešení nezávislé na serveru 8 / 27 5.1.
    [Show full text]
  • Portabilidade Do Linux E Viabilidade Em Desktop
    JERRY METZ PORTABILIDADE DO LINUX E VIABILIDADE EM DESKTOP Trabalho de Conclusão apresentado ao Departamento de Ciência da Computação da Universidade Federal de Lavras, como parte das exigências do curso de Pós-Graduação Lato Sensu em Administração em Redes Linux, para a obtenção do título de especialista em Administrador em Redes Linux. Orientador Profo Wilian Soares Lacerda LAVRAS MINAS GERAIS - BRASIL 2004 JERRY METZ PORTABILIDADE DO LINUX E VIABILIDADE EM DESKTOP Trabalho de Conclusão apresentado ao Departamento de Ciência da Computação da Universidade Federal de Lavras, como parte das exigências do curso de Pós-Graduação Lato Sensu em Administração em Redes Linux, para a obtenção do título de especialista em Administrador em Redes Linux. APROVADA em 18 de setembro de 2004. Profo Giovanni Francisco Rabelo Profo Luciano Mendes dos Santos Profo Wilian Soares Lacerda UFLA (Orientador) LAVRAS MINAS GERAIS - BRASIL À minha família. AGRADECIMENTOS A todos que contribuíram para a realização e conclusão desta especialização tão profícua, aos colegas que prestaram apoio, aos professores do ARL, em especial ao prof. Joaquim e ao prof. Wilian, coordenador do curso e orientador deste trabalho respectivamente, e às empresas Universo Informática e Copagril, pelas estruturas disponibilizadas, um muito obrigado! RESUMO Este trabalho tem como objetivo apresentar algumas informações que auxiliem na identificação de dispositivos de hardware e software compatíveis com o Linux. A portabilidade em diferentes arquiteturas de hardware, aplicações e recursos de software e a possibilidade de migrar para um ambiente gráfico com o Linux são temas abordados na presente monografia. Com base em pesquisas bibliográficas foi possível identificar os principais ports de hardware, a diversidade de software para Linux e as distribuições recomendadas para desktops.
    [Show full text]
  • In the Search Box Or Start>All Programs>Accessor Ies>Command
    Go to start menu and type “cmd” in the search box or Start>all programs>accessor ies>command prompt. Open the infected drive such as write , g: to go to G drive. Now type dir/w/a . It will show all the files of the drive including hidden files. Locate AUTORUN.INF or any Virus and other suspicious files in the directory. there was no virus in my drive so only autorun.inf is been highlighted. Type command attrib -r –a –s –h to remove attributes of corresponding file. Type del autorun.inf to delete autorun.inf file. Now type del virus name.exe t delete it, eg : del newfolder.exe . (You can also delete viruses by using following steps: When you find an Autorun.inf file or any other unusual .exe file just rename it. Syntax for rename is (rename filename.extension new name , for example: (rename autorun.inf virus) to rename autorun.inf file. Here I have renamed it by “virus”. Now you can access the defected drive without affecting the virus. To delete the renamed file go to the defected drive and select the file you renamed. Now delete the harmful renamed files.) You have deleted that virus successfully but sometimes virus resides in the Recy cler folder.To locate this folder: Type cd recycler command. Again type dir/w/a to locate all file of the folder. Identify malicious files and delete them using above commands. Follow the above steps carefully and i think this information is enough to remov e a virus using command prompt easily.
    [Show full text]