Praise for Samba-3 by Example

Total Page:16

File Type:pdf, Size:1020Kb

Praise for Samba-3 by Example TitleandCR.fm Page i Thursday, March 4, 2004 11:55 AM Praise for Samba-3 by Example “John Terpstra has written what I think to be the definitive book on how to incorporate Samba into a heterogenous network. I like this book because, in a series of well defined "real-world" networking problem scenarios, it shows how Samba can help solve the problem, the steps for implementation, as well as the thinking behind the solution. Terpstra uses real-world networking examples to show how Samba could help solve networking problems. If you’re interested in using Samba in any way on your network, this is the book to have.” —Kent Dannehl, Engineer “This book does an excellent job at showing how Samba file and print serving solutions can grow with a company. These solutions are described in an way that is easy to understand and with enough examples that the book can be used as a reference.” —Michael MacIsaac, IBM Linux Technical Support “From a solutions perspective, Terpstra not only covers Samba-3, but he also primes you with examples of the critical tools and applications you will need for a complete solution. Whether it be small or large, a new network rollout or a migration, this book brings it all together with everything you need to start designing and strategizing your next implementation. If you just want to learn, you will be deploying Samba, DHCP, DNS, WINS, and LDAP before you know it. Well done!” —Ed Riddle, Business Technology Solutions Consultant “This book would make a great text or lab manual for an Information Technology course in network implementation and administration. I like the case study approach. The basic pattern of the book is one that ought to be followed by anyone writing a ‘How To’ guide for any aspect of information technology. A course based on this text would also be a great elective for Computer Science students who are interested in how all that theory they learn in the classroom manifests itself in the real world.” —Ron McCarty, Instructor and Chair of the Department of Computer Science, Penn State Erie, The Behrend College “This book goes one better than just presenting example configurations. It goes through step-by-step and gives you explanations on the justifications for each of the configured options. Case study books are a great companion to any reference text on a subject, especially when the examples are as relevant to so many people as these promise to be.” —Alan Munter, Physical Scientist “Installing Samba from scratch can be a daunting task, and being able to work off of someone else's blueprints can be a huge boon. On top of that, while there certainly are a large number of Samba books, there are very few that address the brand-new version of Samba, v. 3.0, and all that it offers. With the integration of Active Directory, and the ability to be a PDC in an NT-based domain network, Samba 3.0 is a substantial step forward, and this book can help pave the way to making use of it.” —Ken D’Ambrosio, Sr. System Administrator, Xanoptix, Inc. “John has masterfully created a technical book that is very informative yet fun to read. He quickly gets down to showing us how to use all the powerful tools surrounding the key technology that is Samba-3. It clearly addresses the major issues of how to leverage free software to the maximum effect in heterogeneous production environments that require you to use and extend a mixture of Windows server and client software. How lucky we are as readers to have John Terpstra right there at our virtual side, holding our hand the entire way.” —Ismet Kursunoglu, MD perens_series.fm Page 1 Wednesday, February 25, 2004 10:35 AM BRUCE PERENS’ OPEN SOURCE SERIES http://www.phptr.com/perens ◆ C++ GUI Programming with Qt 3 Jasmin Blanchette, Mark Summerfield ◆ Managing Linux Systems with Webmin: System Administration and Module Development Jamie Cameron ◆ Understanding the Linux Virtual Memory Manager Mel Gorman ◆ Implementing CIFS: The Common Internet File System Christopher R. Hertel ◆ Embedded Software Development with eCos Anthony J. Massa ◆ Rapid Application Development with Mozilla Nigel McFarlane ◆ The Linux Development Platform: Configuring, Using, and Maintaining a Complete Programming Environment Rafeeq Ur Rehman, Christopher Paul ◆ Intrusion Detection Systems with Snort: Advanced IDS Techniques with Snort, Apache, MySQL, PHP, and ACID Rafeeq Ur Rehman ◆ The Official Samba-3 HOWTO and Reference Guide John H. Terpstra, Jelmer R. Vernooij, Editors ◆ Samba-3 by Example: Practical Exercises to Successful Deployment John H. Terpstra TitleandCR.fm Page iii Monday, February 23, 2004 11:36 AM Samba-3 by Example Practical Exercises to Successful Deployment John H. Terpstra Prentice Hall PTR Upper Saddle River, New Jersey 07458 www.phptr.com TitleandCR.fm Page iv Friday, May 21, 2004 11:25 AM Library of Congress Cataloging-in-Publication Data A CIP catalog record for this book can be obtained from the Library of Congress. Editorial/production supervision: Mary Sudul Cover design director: Jerry Votta Cover design: DesignSource Manufacturing manager: Maura Zaldivar Acquisitions editor: Jill Harry Editorial assistant: Brenda Mulligan Marketing manager: Dan DePasquale © 2004 John H. Terpstra Published by Prentice Hall PTR Upper Saddle River, New Jersey 07458 This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, v1.0 or later (the latest version is presently available at <http://www.opencontent.org/openpub/>). Prentice Hall books are widely used by corporations and government agencies for training, marketing, and resale. The publisher offers discounts on this book when ordered in bulk quantities. For more information, contact Corporate Sales Department, Phone: 800-382-3419; FAX: 201-236-7141; E-mail: [email protected] Or write: Prentice Hall PTR, Corporate Sales Dept., One Lake Street, Upper Saddle River, NJ 07458. Printed in the United States of America 2nd Printing ISBN 0-13-147221-6 Pearson Education LTD. Pearson Education Australia PTY, Limited Pearson Education Singapore, Pte. Ltd. Pearson Education North Asia Ltd. Pearson Education Canada, Ltd. Pearson Educación de Mexico, S.A. de C.V. Pearson Education — Japan Pearson Education Malaysia, Pte. Ltd. ABOUT THE COVER ARTWORK The cover artwork of this book continues a theme chosen for the book, The Official Samba-3 HOWTO and Reference Guide, the cover of which features a Confederate scene. Samba has had a major impact on the network deployment of Microsoft Windows desktop systems. The cover artwork of the two official Samba books tells of events that likewise had a major impact on the future. Samba-3 by Example Cover Artwork: King Alfred the Great (born 849, ruled 871-899) was one of the most amazing kings ever to rule England. He defended Anglo-Saxon England from Viking raids, formulated a code of laws, and fostered a rebirth of religious and scholarly activity. His reign exhibits military skill and innovation, sound governance and the ability to inspire men to plan for the future. Alfred liberated England at a time when all resistence seemed futile. Samba is a network interoperability solution that provides real choice for network admin- istrators. It is an adjunct to Microsoft Windows networks that provides interoperability of UNIX systems with Microsoft Windows desktop and server systems. You may use Samba to realize the freedom it provides for your network environment thanks to a dedicated team who work behind the scenes to give you a better choice. The efforts of these few dedicated developers continues to shape the future of the Windows interoperability landscape. Enjoy! v ACKNOWLEDGMENTS Samba-3 by Example would not have been written except as a result of feedback provided by reviewers of the book The Official Samba-3 HOWTO and Reference Guide. I hope this book more than answers the challenge and fills the void that was brought to my attention. I am deeply indebted to a large group of diligent people. Space prevents me from listing all of them, but a few stand out as worthy of mention. Jelmer Vernooij made the notable contribution of building the XML production environment and thereby made possible the typesetting of this book. Samba would not have come into existence if Andrew Tridgell had not taken the first steps. He continues to lead the project. Under the shadow of his mantle are some great guys who never give up and are always ready to help. Thank you to: Jeremy Allison, Jerry Carter, Andrew Bartlett, Jelmer Vernooij, Alexander Bokovoy, Volker Lendecke, and other team members who answered my continuous stream of questions — all of which resulted in improved content in this book. My heartfelt thanks go out also to a small set of reviewers (alphabetically listed) who gave substantial feedback and significant suggestions for improvement: Roland Gruber, Luke Howard, Jon Johnston, Alan Munter, Tarjei Huse, Mike MacIsaac, Scott Mann, Ed Riddle, Santos Soler, Mark Taylor, and J´erˆome Tournier. My appreciation is extended to a team of over 30 additional reviewers who helped me to find my way around dark corners. Particular mention is due to Lyndell, Amos and Melissa who gave me the latitude necessary to spend nearly a entire year writing Samba documentation. vi FOREWORD By Dan Kusnetzky, IDC IDC’s software research group has been conducting research on the market for software, including operating environments, for over twenty years. In 1994, the system software research team started to field questions from its subscribers on Linux. We had very little empirical data to offer when these queries first were heard, so IDC added Linux to its operating environment research agenda. The first demand and supply side research containing IDC’s findings on Linux started to appear in early 1995.
Recommended publications
  • LDAP Authentication for IBM DS8000 Systems Updated for DS8000 Release 9.1
    Front cover LDAP Authentication for IBM DS8000 Systems Updated for DS8000 Release 9.1 Bjoern Wesselbaum Claudio Di Celio Bert Dufrasne Connie Riggins Robert Tondini Alex Warmuth Redpaper IBM Redbooks LDAP Authentication for IBM DS8000 Systems March 2021 REDP-5460-01 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. Second Edition (March 2021) This edition applies to IBM DS8900F storage systems that are available with IBM DS8000 Licensed Machine Code (LMC) 7.9.10 (bundle version 89.10.xx.x), referred to as Release 9.1 or later. © Copyright International Business Machines Corporation 2018, 2021. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. ix Now you can become a published author, too! . .x Comments welcome. .x Stay connected to IBM Redbooks . xi Chapter 1. IBM DS8000 user authentication. 1 1.1 Introduction to the DS8000 user authentication . 2 1.2 Storage Authentication Service by using CSM as an LDAP proxy . 2 1.3 Remote authentication by using the native implementation . 4 1.4 Benefits of using remote authentication for a DS8000 system . 5 1.5 Determining the remote authentication solution . 5 Chapter 2. Lightweight Directory Access Protocol for IBM DS8000 administrators . 7 2.1 Directory services and LDAP . 8 2.2 Basic LDAP and directory services terms explained. 9 2.2.1 Directory entry. 9 2.2.2 Groups . 10 Nested groups . 12 2.2.3 The directory structure .
    [Show full text]
  • Ldap Server Interview Questions
    By OnlineInterviewQuestions.com Ldap Server Interview Questions Q1. What is the port no of LDAP ? LDAP uses CLDAP as its transport protocol. The Default Port no. LDAP is on Http is 389 and 636 over SSL. Q2. What is LDAP? Lightweight Directory Access Protocol (LDAP) is a light weighted client-server protocol used for accessing the directory services particularly the X. 500 based directory services. It runs over the TCP/IP or the other connection-oriented transfer services. Q3. Where is LDAP used? This protocol is mainly used for querying and modification purposes and it is used in places such as Microsoft Active Directory, OPEN LDAP, and many more. Q4. What is LDIF? The LDIF (LDAP Data Interchange Files) are used to exchange data between the LDAP directory servers. This plain text data interchange format was designed by Tim Howes in the early 1990s for representing LDAP directory content and update requests. The content in this file is represented as a group of attributes. Here, the records are separated from one another by blank lines while the attributes of the record itself are represented as single logical lines. There are many tools that deploy LDIF such as Microsoft Windows 2000 Server, Windows 2003 Server, JXplorer, Netscape Communicator, and OpenLDAP. Q5. Name object class types in Ldap? There are three object class types present in LDAP. They are, Structural - It is used to define the primary entry type. Auxiliary - It is used to define the characteristics of an LDAP entry. Abstract - This type is not used to create entries directly but is subclassed by the Auxiliary class.
    [Show full text]
  • Fortiauthenticator - Administration Guide VERSION 5.3.1 FORTINET DOCUMENT LIBRARY
    FortiAuthenticator - Administration Guide VERSION 5.3.1 FORTINET DOCUMENT LIBRARY https://docs.fortinet.com FORTINET VIDEO GUIDE https://video.fortinet.com FORTINET KNOWLEDGE BASE http://kb.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT https://support.fortinet.com http://cookbook.fortinet.com/how-to-work-with-fortinet-support/ FORTINET COOKBOOK http://cookbook.fortinet.com FORTINET TRAINING AND CERTIFICATION PROGRAM https://www.fortinet.com/support-and-training/training.html NSE INSTITUTE https://training.fortinet.com/ FORTIGUARD CENTER https://fortiguard.com FORTICAST http://forticast.fortinet.com END USER LICENSE AGREEMENT https://www.fortinet.com/doc/legal/EULA.pdf June 5, 2018 FortiAuthenticator - Administration Guide 23-531-493255-20180605 TABLE OF CONTENTS Change log 8 What's new in FortiAuthenticator 5.3.1 9 What's new in FortiAuthenticator 5.3 9 Introduction 17 Before you begin 18 How this guide is organized 19 Registering your Fortinet product 19 Setup 20 Initial setup 20 FortiAuthenticator VM setup 20 Administrative access 21 Adding FortiAuthenticator to your network 22 Maintenance 23 Backing up the configuration 23 Upgrading the firmware 24 Licensing 24 CLI commands 24 Standardized CLI 27 Troubleshooting 27 FortiAuthenticator settings 28 FortiGate settings 28 System 29 Dashboard 29 Customizing the dashboard 30 System information widget 31 System resources widget 35 Authentication activity widget 35 User inventory widget 35 License information widget 35 Top user lockouts widget 35 Network 36
    [Show full text]
  • LDAP-Based Authentication for Samba Install and Configure Samba As a Primary Domain Controller with LDAP on Linux
    LDAP-based authentication for Samba Install and configure Samba as a primary domain controller with LDAP on Linux Skill Level: Intermediate Keith Robertson ([email protected]) Advisory software engineer IBM 31 Jan 2006 This tutorial demonstrates how to install and configure Samba as a primary domain controller with a secure LDAP-based authentication mechanism. It also describes how to configure the LDAP server, OpenLDAP, for PAM-based authentication and how to secure the link between Samba and OpenLDAP with Transport Layer Security (TLS). The completed system boasts a secure file- and print-sharing setup, in addition to a robust LDAP server that could be used for purposes beyond those required by Samba. Additionally, Windows® clients are able to logon to your Samba server which acts as a primary domain controller and have shared drives automatically mounted for them based on their group membership. Section 1. Before you start About this tutorial In this tutorial -- about how to install and configure Samba as a primary domain controller with a secure LDAP-based authentication mechanism -- I'll: • Introduce LDAP, show how it integrates with Samba, and discuss security concerns LDAP-based authentication for Samba © Copyright IBM Corporation 1994, 2008. All rights reserved. Page 1 of 32 developerWorks® ibm.com/developerWorks • Go through the steps of configuring LDAP, including installing OpenLDAP and the IDEALX LDAP Samba toolkit; configuring OpenLDAP necessities, the slapd.conf file, the /etc/ldap.conf file, and the Pluggable Authentication
    [Show full text]
  • List of Applications Updated in ARL #2571
    List of Applications Updated in ARL #2571 Application Name Publisher Nomad Branch Admin Extensions 7.0 1E M*Modal Fluency Direct Connector 3M M*Modal Fluency Direct 3M M*Modal Fluency Direct Connector 10.0 3M M*Modal Fluency Direct Connector 7.85 3M Fluency for Imaging 3M M*Modal Fluency for Transcription Editor 7.6 3M M*Modal Fluency Flex 3M M*Modal Fluency Direct CAPD 3M M*Modal Fluency for Transcription Editor 3M Studio 3T 2020.2 3T Software Labs Studio 3T 2020.8 3T Software Labs Studio 3T 2020.3 3T Software Labs Studio 3T 2020.7 3T Software Labs MailRaider 3.69 Pro 45RPM software MailRaider 3.67 Pro 45RPM software FineReader Server 14.1 ABBYY VoxConverter 3.0 Acarda Sales Technologies VoxConverter 2.0 Acarda Sales Technologies Sample Master Accelerated Technology Laboratories License Manager 3.5 AccessData Prizm ActiveX Viewer AccuSoft Universal Restore Bootable Media Builder 11.5 Acronis Knowledge Builder 4.0 ActiveCampaign ActivePerl 5.26 Enterprise ActiveState Ultimate Suite for Microsoft Excel 18.5 Business Add-in Express Add-in Express for Microsoft Office and .NET 7.7 Professional Add-in Express Office 365 Reporter 3.5 AdminDroid Solutions Scout 1 Adobe Dreamweaver 1.0 Adobe Flash Professional CS6 - UNAUTHORIZED Adobe Illustrator CS6 Adobe InDesign CS6 - UNAUTHORIZED Adobe Fireworks CS6 Adobe Illustrator CC Adobe Illustrator 1 Adobe Media Encoder CC - UNAUTHORIZED Adobe Photoshop 1.0 Adobe Shockwave Player 1 Adobe Acrobat DC (2015) Adobe Flash Professional CC (2015) - UNAUTHORIZED Adobe Acrobat Reader DC Adobe Audition CC (2018)
    [Show full text]
  • Understanding LDAP Design and Implementation
    Front cover Understanding LDAP Design and Implementation LDAP concepts and architecture Designing and maintaining LDAP Step-by-step approach for directory Steven Tuttle Ami Ehlenberger Ramakrishna Gorthi Jay Leiserson Richard Macbeth Nathan Owen Sunil Ranahandola Michael Storrs Chunhui Yang ibm.com/redbooks International Technical Support Organization Understanding LDAP Design and Implementation June 2004 SG24-4986-01 Note: Before using this information and the product it supports, read the information in “Notices” on page xv. Second Edition (June 2004) This edition applies to Version 5, Release 2 of IBM Tivoli Directory Server. © Copyright International Business Machines Corporation 1998, 2004. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xv Trademarks . xvi Preface . xvii The team that wrote this redbook. xvii Become a published author . xix Comments welcome. xx Summary of changes . xxi June 2004, Second Edition . xxi Part 1. Directories and LDAP . 1 Chapter 1. Introduction to LDAP . 3 1.1 Directories . 5 1.1.1 Directory versus database . 5 1.1.2 LDAP: Protocol or directory. 7 1.1.3 Directory clients and servers. 8 1.1.4 Distributed directories . 9 1.2 Advantages of using a directory . 10 1.3 LDAP history and standards . 12 1.3.1 OSI and the Internet . 12 1.3.2 X.500 the Directory Server Standard . 13 1.3.3 Lightweight Access to X.500 . 14 1.3.4 Beyond LDAPv3 . 15 1.4 Directory components . 16 1.5 LDAP standards . 20 1.6 IBM’s Directory-enabled offerings .
    [Show full text]
  • Certified Ethical Hacker Version 8 Study Guide
    ffirs.indd 2 22-07-2014 17:23:44 CEHv8 Certified Ethical Hacker Version 8 Study Guide ffirs.indd 1 22-07-2014 17:23:44 ffirs.indd 2 22-07-2014 17:23:44 CEHv8 Certified Ethical Hacker Version 8 Study Guide Sean-Philip Oriyano ffirs.indd 3 22-07-2014 17:23:44 Senior Acquisitions Editor: Jeff Kellum Development Editor: Richard Mateosian Technical Editors: Albert Whale and Robert Burke Production Editor: Dassi Zeidel Copy Editors: Liz Welch and Tiffany Taylor Editorial Manager: Pete Gaughan Vice President and Executive Group Publisher: Richard Swadley Associate Publisher: Chris Webb Media Project Manager I: Laura Moss-Hollister Media Associate Producer: Marilyn Hummel Media Quality Assurance: Doug Kuhn Book Designer: Judy Fung Proofreader: Sarah Kaikini, Word One New York Indexer: Ted Laux Project Coordinator, Cover: Patrick Redmond Cover Designer: Wiley Cover Image: ©Getty Images Inc./Jeremy Woodhouse Copyright © 2014 by John Wiley & Sons, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-1-118-64767-7 ISBN: 978-1-118-76332-2 (ebk.) ISBN: 978-1-118-98928-9 (ebk.) No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
    [Show full text]
  • Free and Open Source Software
    Free and open source software Copyleft ·Events and Awards ·Free software ·Free Software Definition ·Gratis versus General Libre ·List of free and open source software packages ·Open-source software Operating system AROS ·BSD ·Darwin ·FreeDOS ·GNU ·Haiku ·Inferno ·Linux ·Mach ·MINIX ·OpenSolaris ·Sym families bian ·Plan 9 ·ReactOS Eclipse ·Free Development Pascal ·GCC ·Java ·LLVM ·Lua ·NetBeans ·Open64 ·Perl ·PHP ·Python ·ROSE ·Ruby ·Tcl History GNU ·Haiku ·Linux ·Mozilla (Application Suite ·Firefox ·Thunderbird ) Apache Software Foundation ·Blender Foundation ·Eclipse Foundation ·freedesktop.org ·Free Software Foundation (Europe ·India ·Latin America ) ·FSMI ·GNOME Foundation ·GNU Project ·Google Code ·KDE e.V. ·Linux Organizations Foundation ·Mozilla Foundation ·Open Source Geospatial Foundation ·Open Source Initiative ·SourceForge ·Symbian Foundation ·Xiph.Org Foundation ·XMPP Standards Foundation ·X.Org Foundation Apache ·Artistic ·BSD ·GNU GPL ·GNU LGPL ·ISC ·MIT ·MPL ·Ms-PL/RL ·zlib ·FSF approved Licences licenses License standards Open Source Definition ·The Free Software Definition ·Debian Free Software Guidelines Binary blob ·Digital rights management ·Graphics hardware compatibility ·License proliferation ·Mozilla software rebranding ·Proprietary software ·SCO-Linux Challenges controversies ·Security ·Software patents ·Hardware restrictions ·Trusted Computing ·Viral license Alternative terms ·Community ·Linux distribution ·Forking ·Movement ·Microsoft Open Other topics Specification Promise ·Revolution OS ·Comparison with closed
    [Show full text]
  • Policy Server Installation Guide 12.51
    CA SiteMinder® Policy Server Installation Guide 12.51 Fourth Edition This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the “Documentation”), is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be disclosed by you or used for any purpose other than as may be permitted in (i) a separate agreement between you and CA governing your use of the CA software to which the Documentation relates; or (ii) a separate confidentiality agreement between you and CA. Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT.
    [Show full text]
  • Autor: Aicniel López Pérez. Tutor: M.Sc. Manuel Castro Artiles
    Departamento De Computación Título: Propuesta de servicios básicos de redes con software libre. Autor: Aicniel López Pérez. Tutor: M.Sc. Manuel Castro Artiles Curso 2017-2018 "Año 60 de la Revolución" Este documento es Propiedad Patrimonial de la Universidad Central “Marta Abreu” de Las Villas, y se encuentra depositado en los fondos de la Biblioteca Universitaria “Chiqui Gómez Lubian” subordinada a la Dirección de Información Científico Técnica de la mencionada casa de altos estudios. Se autoriza su utilización bajo la licencia siguiente: Atribución- No Comercial- Compartir Igual Para cualquier información contacte con: Dirección de Información Científico Técnica. Universidad Central “Marta Abreu” de Las Villas. Carretera a Camajuaní. Km 5½. Santa Clara. Villa Clara. Cuba. CP. 54 830 Teléfonos.: +53 01 42281503-1419 El que suscribe Aicniel López Pérez, hago constar que el trabajo titulado Propuesta de servicios básicos de redes con software libre. fue realizado en la Universidad Central “Marta Abreu” de Las Villas como parte de la culminación de los estudios de la especialidad de Licenciatura en Ciencia de la Computación, autorizando a que el mismo sea utilizado por la institución, para los fines que estime conveniente, tanto de forma parcial como total y que además no podrá ser presentado en eventos ni publicado sin la autorización de la Universidad. ______________________ Firma del Autor Los abajo firmantes, certificamos que el presente trabajo ha sido realizado según acuerdos de la dirección de nuestro centro y el mismo cumple con los requisitos que debe tener un trabajo de esta envergadura referido a la temática señalada. ____________________________ ___________________________ Firma del Tutor Firma del Jefe del Laboratorio PENSAMIENTO Hay hombres que luchan un día y son buenos.
    [Show full text]
  • Documanage Administrator's Guide
    Start Oracle® Documanage Documanage Administrator’s Guide version 6.6 Part number: E14904-01 March 2009 s Notice Copyright © 2009, Oracle. All rights reserved. The Programs (which include both the software and documentation) contain proprietary information; they are provided under a license agreement containing restrictions on use and disclosure and are also protected by copyright, patent, and other intellectual and industrial property laws. Reverse engineering, disassembly, or decompilation of the Programs, except to the extent required to obtain interoperability with other independently created software or as specified by law, is prohibited. The information contained in this document is subject to change without notice. If you find any problems in the documentation, please report them to us in writing. This document is not warranted to be error-free. Except as may be expressly permitted in your license agreement for these Programs, no part of these Programs may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose. If the Programs are delivered to the United States Government or anyone licensing or using the Programs on behalf of the United States Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the Programs, including documentation and technical data, shall be subject to the licensing restrictions set forth in the applicable Oracle license agreement, and, to the extent applicable, the additional rights set forth in FAR 52.227-19, Commercial Computer Software--Restricted Rights (June 1987).
    [Show full text]
  • CA Directory Release Summary
    CA Directory Release Summary r12.0 SP8 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the “Documentation”) is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be disclosed by you or used for any purpose other than as may be permitted in (i) a separate agreement between you and CA governing your use of the CA software to which the Documentation relates; or (ii) a separate confidentiality agreement between you and CA. Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT.
    [Show full text]