28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 519

2 3 INDEX 4 5 6 7 8 9

A remote monitoring, 185–92 sound effects and filtering, ac3dec, 500 coding, 186–89 377–80 Accent, 424 compiling, 189–91 system preparation for, 370 Accounts, root, 11 testing, 191–92 types of digital audio, 366–69 ack (Snort rule option), 257 Apex DVD player, 419–20 amplitude-based, 366–67 Actions, Snort, 252 API, Apache, 182–85 frequency-based, 367, 369, activate (Snort action), 252 apxs tool, 189 380–81 Active reconnaissance, 233 arch directory, 17 MP3 (MPEG Layer 3) add command (CVS), 123 , 6 format, 368–69, 381 2 Aeromail, 158 aRts, 407 Ogg Vorbis format, 369, 2 installation of, 165 ASF files, 500, 501 381 2 using, 171–75 Aspect ratio, 446 RAW format, 368 2 agetty command, 81–82 Attachments, e-mail, 174 WAV format, 368 2 AIM (AOL Instant Messenger), Attacks on networks, 232–34 vinyl record transfer to CDs, 2 54 browser-based, 288 384–95 2 under , 339–40, 345 denial-of-service (DoS), 50, audio system and, 386–87 2 Albing, Greg, 477 232 CD creation, 393–94 2 alert (Snort action), 252 “Man in the Middle” (MITM), MP3 file creation, 394–95 2 AllowUsers (SSH server option), 269 preparation for, 385–86 277 profiles of, 260 recording, 387–89 3 Amplifier, audio, 386 scripted, 234 removing clicks, pops, and 3 Amplitude-based method for by sniffing, 217 hisses, 389–90 3 storing digital audio waveform editor, trimming cuts, 390–93 3 (PCM), 366–67 375–77, 380, 387, 413 writing audio to CDs, 3 Analog-to-digital (A-D) Audio CDs, burning, 363 382–84 3 conversion, 366 Audio processing, 365–97. See Authentication, RSA/DSA, 3 Animation, 461–62 also Music production 285–87 3 Anthem, 402 audio files from CD, 372–73 Autoconf, 12–13 3 Antisniff, 228 editing (cut and paste), AvantGo, 330–31 3 Apache, 114, 158, 162, 177, 375–77 avifile, 497 4 179–93 format conversions, 380–82 avifile-0.53.2, 499–500 API, 182–85 mixer properties, 370–72 AVI files, 483, 497, 498–501 4 module basics, 180–81 recording, 371, 374–75 AVI-XMMS-1.2.1, 501 4 4 4

519 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 520

520 INDEX

B Capital cost of checkout command (CVS), 122 Backdoor software, 54 distribution, 507 Chorus sound effect, 380 backup switch (pilot-xfer), 310, Capture, video, 484, 487–88, Client-server configuration 4 312–13 492–93 for NAT, 72–74 BacteriuM, 407 Cathedral and the Bazaar, The, 7 for PLIP networking, 70–71 6 bash, 298 CCD, 447 Client/server model, CVS, Berkeley DB, 220 cdda2wav, 352–53 120 Berkeley Software Distribution cdparanoia, 372–73 Clipping, 370–72 (BSD) licenses, 6 cdrdao, 382–83 Close-up, 32 9 BIOS, 14 cdrecord, 352–53, 356, 358, COAST project, 236 0 Bit depth, 366 382–83, 393–94 Codecs Bit rate, 368–69 CDs audio, 369 , 302 audio, 363 video, 483, 487, 500 BlackICE, 222 files from, 372–73 Color balance, 453 4 bladeenc, 381 MP3 on, 418 Colors, in PovRay, 466, 473–75 , 459, 460, 461, 475, 476 writing, 382–84 Comer, Douglas E., 73 6 BMP, 444 remote burning of, 347–63 Command line, 2 Bootable CDs, 363 audio CDs, 363 Commercial music, 497 /boot directory, 15 blanking CD-RW, 355–58 commit command (CVS), 122 the kernel, 22–23 bootable CDs, 363 Communications, 59–84. 9 Boot loader, LILO, 13–15 burning data, 358–59 See also Network(s)/ 0 Boot sector viruses, 14 duplicating CDs, 359–62 networking; Secure Bourne-again (bash), 298 80-min/700 mb CDs, 363 connectivity Brahms, 402, 406 finding drive, 355 non-IP dialup, 74–84 Broadcast 2000, 494 iso images, 353–55 /etc/inittab file, 77–80 4 Browser-based attacks, 288 kernel modification for, getty, 76–77, 81–84 Browsers 348–52 Parallel Line Internet 6 network, 96–98 mkisofs, 352, 354 Protocol (PLIP) Web, 185–92 using GUID for, 359–61 networking, 60–71 BSD licenses, 6 verifying, 359, 363 kernel compilation to BTTV chip set, 486 video (VCDs), 504–5 enable, 64–69 9 Buffer underruns, 353 vinyl record transfer to, NAT set up for, 71–74 0 Building blocks (primitives), 469 384–95 PLIP tunnel set up, 69–71 b[un]zip2, 296 audio system and, 386–87 Compiling, 8–10 Burn All GIFs Web site, 441 CD creation, 393–94 autoconf, 12–13 bzImage kernel, 21 MP3 file creation, 394–95 as encryption, 507 4 bzip, 21 preparation for, 385–86 Imakefiles, 11 recording to hard disk, make files, 11–12 6 387–89 Compression Cable modems, 48 removing clicks, pops, and in JPEG, 441–43 Cable providers, 46 hisses, 389–90 LZW, 440–41 9 Cables, two-way printer port, trimming tracks, 390–93 Compression/decompression 63–64 Censorware, 223 program, 296 0 Cameras Certificates, 163 CompressionLevel (SSH client digital, 447–48 on Netscape, 166–70 option), 275 positioning, 468 Change-coupled device (CCD), Compression (SSH client video, 484 447 option), 275 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 521

INDEX 521

Concurrent Versioning System. Debian, 26 Driver(s) See CVS (Concurrent integrity checks by, 241–46 , 69 2 Versioning System) VNC on, 40 polling, 69 3 Configuration system, Web server implementation, video, 486 4 interactive, 18–20 115 drivers directory, 17 5 Connectivity, secure. See Secure Debian Guidelines Drives, mapping, 99–100 6 connectivity (DFSG), 7, 8 Drum machines, 407–8 7 Console-based applications Delay sound effect, 380 dsize (Snort rule option), 256 e-mail-based, 133–55 delete switch (pilot-xfer), 311 DSL, 48 8 connecting, 134–35 Demos, music, 408–9 dsniff, 218–23 9 e-mail concepts, 136–37 Denial-of-service (DoS) attack, compiling, 221–23 Fetchmail, 136, 137–39 50, 232 required packages, 218–21 Procmail, 134–35, 139–40, DenyUsers (SSH server DUMB, 462 147 option), 277 Duplication of CDs, 359–62 security issues, 135–36, dep, 20–21 DVD players, 419–20 147–54 Dia, 303 Dynamic loading, 180 MP3 player, 417–18 Dialect, 424 dynamic (Snort action), 252 Consoles, text-mode, 76–77 Dialup, non-IP, 74–84 content-list (Snort rule option), /etc/inittab file, 77–80 E 257 getty, 76–77, 81–84 ecasound, 413 content (Snort rule option), Dictionaries Echo sound effect, 380 256–57 phoneme, 427 ECP, 63 2 convert command pronunciation, 426, 427 Editing 2 (ImageMagick), 445–46 diff, 295 audio, 375–77 2 CPU requirement, 26 Digital audio. See Audio video, 488, 493–97 2 crontab, 138–39 processing Editors, 295 2 Cryptographic basics, 196–98 Digital cameras, 447–48 waveform, 375–77, 380, 387, 2 Crystal Space, 462, 475, 476 Digital signatures, 135, 148, 413 2 CuBase VST, 402 203–6, 235. See also elm, 301 2 Cumulus, 407 GPG (GNU Privacy GPG integration with, 211 2 cut, 297 Guard) ELM jukebox, 431 2 CVS (Concurrent Versioning encryption without, 210–11 E-mail System), 118, 120–28, 296 hashing functions for, 197 concepts, 136–37 3 commands, 121–23 passphrases and, 208 programs and utilities, 301–2 3 conflict resolution, 123–28 validating, 204–6 security issues. See GPG 3 core concepts, 120 direction, Snort, 254 (GNU Privacy Guard) 3 repository, 120–21 Directory Directives, 164 speech-driven checking at 3 CVSROOT, 121 DirectX, 345 login, 428–31 3 , 29 Discrete cosine transform tunneling through, 291 3 (DCT), 442–43, 444 video (V-mails), 505 3 D Display specification, 31 E-mail-based console 3 Data Encryption Standard distributed.net client, 53 application, 133–55 3 (DES), 196 DivX, 483 connecting, 134–35 4 Datagrams, fragmented, 72–73 Documentation directory, 17 Fetchmail, 136, 137–39, 301 Data-harvesting. See Sniffing Domain Naming System (DNS), Procmail, 134–35, 139–46, 147 4 DCT, 442–43, 444 54, 253 command execution, 147 4 dd, 295, 390–92 dpi (dots per inch), 438 recipes in, 140–46 4 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 522

522 INDEX

E-mail-based console ext, 121 ForwardX11 (SSH client option), application (cont.) Extreme Wave, 460, 475 275 security issues, 135–36, Fourier, Jean Baptiste Joseph, 4 147–54 F 367 GnuPG to encrypt results, False positives in Snort, fragbits (Snort rule option), 256 6 148 261–62 Frame grabbers, 484 GnuPG to handle Festival, 424, 426–28, 431 Fraunhofer Group, 369 authorizations, 147–48 Fetchmail, 134, 136, 137–39, 301 “Free,” defining, 3–8 E-mail clients, GPG integrated .fetchmailrc file, 137, 140 FreeAmp, 371, 382, 417–20 9 with, 211–13 fetch switch (pilot-xfer), 311 Freebirth, 407 0 E-mail servers, 287 File browser, speech-driven, Free Software, 3, 508–9 Employee watching with HTTP 431–36 licenses for, 4–7 proxy, 288 File management tools, 294–98 philosophy behind, 7 Emulators, 333 file (program), 297 Great Schism in, 7–8 4 Encapsulation, in JPEG Files, comparing, 295 encoding, 443 File Transfer Protocol. See FTP (FSF), 4 6 Encryption, 135, 196–98, 270. File transfer with SCP, 270–71 Frequency-based method of See also GPG (GNU Filtering storing audio, 367, 369, Privacy Guard) frequency, 377, 378–80 380–81 compilation as, 507 in Procmail, 141–42 Frequency filtering, 377, 378–80 9 passphrases for decryption, Filters, spam, 141 Freshmeat Web site, 24 0 209–10 find, 299 fs directory, 17 public key, 197–98, 268–70 Finding, tools for, 299–300 fstab configuration file, 295 without signature, 210–11 Firewall(s), 265 FTP, 53, 54, 267, 268 Endianness, 368 getting out of, 279–82 encrypted, 268 4 Enhanced capability port (ECP), getting through, 283–85 masquerading of, 72 63 hardware, 58 6 Entrenchment phase of network- http-proxy-only, 289 G based attack, 234 IP, 49 g3d, 460, 475 Entropy pool, 201 IP address of, 52 gAlan, 407 EPP (enhanced parallel port), maniacally restrictive, 285 Game engines, 3D, 462 9 62–63 network, 49 Game hosting, 56–57 0 EPS (Encapsulated PostScript), port forwarding by, 54–56 GatewayPorts (SSH client 441 rules, 73 option), 275 Equalizer, graphic, 378–80 secure connections to, 53 GatewayPorts (SSH server /etc/group file, 116 telecommuting through, option), 277–78 4 /etc/inittab file, 77–80 273–74 gcc (GNU C compiler), 5–6 /etc/lilo.conf file, 14–15 tunneling through, 273–74 getty, 76–77 6 /etc/tripwire/tw.config file, 236 flags (Snort rule option), 256 setting up, 81–84 Ethereal, 225–26, 227–28 Flowcharting, 303 Ghostscript package, 88 Ethernet card in promiscuous Folder management on IMAP, Gibbon, Edward, 507 9 mode, 216 172–74 GIMP (GNU Image Manipula- Ethernet networks, nonswitched, Forte Agent, 345 tion Program), 303, 445, 0 216 .forward file, 147 451–53, 454 exclude switch (pilot-xfer), 311 Forwarding OpenSSH server, Giram, 460, 475 Exim, 136 284 GNOME, 302

4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 523

INDEX 523

GNU Lilypond, 406 hdrbench, 413 inetd, 106 GnuPG, 135 Heads (monitor), 31 info, 301 2 authorizations handling by, Help, getting, 300–301 init directory, 17 3 147–48 Hewlett-Packard, 63 Innovation3D, 460, 475 4 encryption with, 148 High Color, 439 , 238 5 gpg4pine program, 212 Histogram, 451–52 Input gain, 370–72 6 GPG (GNU Privacy Guard), Home networks, 262–63 insmod, 94–95 7 195–213 Homepage, undernet, 128–30 install switch (pilot-xfer), cryptographic basics, 196–98 Host (SSH client option), 275 310 8 encrypting files using, 202–3, HTC program, 289–91 Integrity check mode 9 206–10 HTS program, 289 (Tripwire), 241 integrating with e-mail clients, HTTP, forwarding traffic, 56 International Phonetic 211–13 HTTP headers, 184 Alphabet, 424 key generation, 198–202 HTTP proxy servers, 287–88 International Standards key-signing and trust levels in, httptunnel, 289–91 Organization (ISO), 9 206 Human capital of software Internet Control Message private and public keys in, development, 507–8 Protocol (ICMP), 291 196–98 Internet-distributed software signing files using, 202–10 I development, 7 unsigned, encrypted messages, IANAL declaration, 4 Internet service providers 210–11 IBM, 216 (ISPs), 46, 134 gphoto package, 447–48 icmp_id (Snort rule option), Internetworking with TCP/IP 2 GPL (GNU Public License), 257 (Comer), 73 2 4–5 ICMP (Internet Control Interrupt driver, 69 2 Graphic equalizer, 378–80 Message Protocol), 291 , 69 2 Graphics file viewer, 303 ICMP Masquerading, 49 Intonation in speech synthesis, 2 Green Box, 407 icode (Snort rule option), 257 423–24 2 grep, 299 IDE-SCSI emulation, 384 Intruder detection, 231–66 2 gSculpt, 460, 475 id (Snort rule option), 254 evidence left behind, 234–35 2 Gseq, 402 IEEE 1284 Extended Snort for, 249–66 2 gserver, 121 Capabilities Port attack profiles, 260 2 GTK-1.2, 225 Protocol, 63 command line arguments, GUI tools, 302–3 ifconfig, 70–71 264 3 for CD burning, 359–61 ImageMagick, 445–46 false positives in, 261–62 3 pilot-manager, 317–20 Image resolution, 438 on home networks, 3 g[un]zip, 296 Imakefiles, 11 262–63 3 imapd service, 160 knowledgeability about, 3 H IMAP (Internet Message 264–65 3 Handler functions, 187 Access Protocol) server, output modules, 265 3 Handshaking, 62 159–60 packet monitoring, 3 Handspring Visor, 308–9 folder management on, logging, and triggering, 3 Hard disk recorders, multitrack, 172–74 250–51 3 412–13 IMP, 176 preprocessors, 265 4 Hard disk requirement, 26 import command (CVS), 122 rules, 251–59 Hardware requirements, 25–26 include directory, 17 rules library, 260–61 4 Hashing algorithm, 197 index.html, 115 running, 263–64 4 4 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 524

524 INDEX

Intruder detection (cont.) Joint Photographics Expert Kmail, GPG integration with, 212 Tripwire for, 231, 235–47, 265 Group, 441 kmix program, 371 configuration of, 236–39 Joliet extensions, 352 “Knapsack” algorithm, 197–98 4 database maintenance, 241 Joliet file system support, 349 kpilot, 320–26 database setup, 239–40 JPEG encoding, 367 applications conduits, 322–24 6 forensics, 246–47 jpilot, 326–30 daemon, 320 history of, 236 backup features, 329, 330 GUI client program, 320 operation of, 235–36 File menu, 326–29 setting up, 320–21 running, 241–46 pilot-link in, 309–17, 329 kserver, 121 9 IP address(es). See also 0 Network(s)/networking K L default gateway, 52 K-3D, 459, 460, 461, 475 LAME, 381 dynamic vs. static, 46 KDE, 302, 498 Laplink cable, 63–64 ipc directory, 17 KDE 2.0, 98, 99 lavplay, 488, 493 4 , 48, 49, 51–54, 73–74 KeepAlive (SSH client option), lavrec, 487, 492 port blocking, 54 275 lavtools, 487 6 rulesets, 51–52 Kernel 2.4, IP Masquerading on, Layered sounds, 403 security rules, 53 57–58 LGPL (Lesser GPL; Library IP datagrams, fragmented, 72–73 Kernel configuration, 13–23 GPL), 5–6 IP firewalling, 49 booting, 22–23 lib directory, 18 9 IP forwarding, 72 build step, 20–21 libnet, 221 0 ipmasqadm, 56, 57 disaster recovery, 23 libnids, 220–21 IP Masquerading, 46–47, 49. installation, 21–22 libpcap, 220, 224, 225 See also NAT (network interactive system of, 18–20 libphp4.a file, 163 address translation); LILO boot loader, 13–15 License(s) 4 Network(s)/networking: for networking with one IP for Free Software, 4–7 with one IP address address, 49–51 “viral”, 5 6 IP number, looking up, 300 for PLIP, 64–69 LILO boot loader, 13–15 ipopts (Snort rule option), 254 for port forwarding, 55–56 as a tool, 1–3 IP transparent proxy support, 49 for remote CD burning, Linux Audio Video Tools, 487 IPX, 86 348–52 Linux Document Project, 304 9 IPX/SPX, 86 /usr/src/linux base directory, Listall switch (pilot-xfer), 312 0 IRman infrared remote control, 16–18 ListenAddress (SSH server 431, 432, 435–36 kernel directory, 17 option), 278 ISA Interface Standard, 63 Kernels list switch (pilot-xfer), 311 ISO, 9 custom vs. generic, 9–10 LML33, 486 4 iso9660 file system, 352 upgrading, 10 LocalForward (SSH client isof, 299–300 Keyrings, 198 option), 275–76 6 iso images, making, 353–55 Keys, cryptographic, 196–97 Logging, Snort, 250–51 ispell, 296 expiration of, 200 login, 77 ISPs, 46, 134 generating, 198–202 log (Snort action), 252 9 itype (Snort rule option), 257 integrity of, 206 logto (Snort rule option), 254–56 passphrases and, 209–10 Loop-based sequencers, 410–12 0 J public, 196–98 LOpht, 218 Java, 131 exchanging, 206 Lossless compression, 439 Java VNC client, 41–42 session, 207 Lossy compression, 439 Jazz++, 402, 403 Kim, Gene, 236 LZW compression, 440–41 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 525

INDEX 525

M Windows, 1, 32 MP3 files, 368–69, 381, 413–14 madplay, 417 applications running under burning to CDs, 418 2 MagicLight, 459, 460, 475 Linux. See wine creating, 394–95 3 Magix MusicMaker, 410–11 interoperability with. See players for, 416, 417–18 4 Mail. See E-mail; E-mail-based Samba MP3 (MPEG Layer 3) format, 5 console application; X-servers for, 29–30 442 6 Web-mail service Microsoft Windows 2000, MPEG-1, 483 7 Mail delivery agent (MDA), 136, 106 MPEG-2, 483 141 Microsoft Windows XP, 369 MPEG playback, 497, 501–2 8 mail (program), 213 Microsoft Word 97, under wine, mpg123, 417 9 Mailsnarf, 222 342–43, 346 mpg3218, 417 Mail transport agent (MTA), MIDI, 400–408 MPU-401 MIDI board, 401 136 computer hardware required, Msgsnarf, 222 mailtunnel, 291 401 msg (Snort rule option), 254 Mail user agent (MUA), 136 drum machines, 407–8 MTA, 136 mailx, 301 musical notation on, 406 MTU, 72 GPG integration with, 213 recording, 405–6 MUA, 136 MainActor, 494 sequencing, 402–5 Mudge, Dr., 228 MAKEDEV command, 370 software synthesis, 406–7 MuLinux, 226–28, 303–4 Make files, 11–12 MindsEye, 460, 461, 475, 476 Multimedia system, cross- malsync, 330–31 mingetty, 77 platform, 303 man, 300 mIRC runs, 345 Multiple-image Network 2 Management information Miridonov, Sergei, 486 Graphics (MNG), 443–44 2 systems (MIS), 508 MIS, 508 Multitrack hard disk recorders, 2 Mandrake, 26 MITM attack, 269 412–13 2 “Man in the Middle” attack Mixers, audio, 370–72 MusE, 402 2 (MITM), 269 MixMagic, 411–12 Music 2 Manufacturing model, 508 MJPEG, 483 commercial, 497 2 Maximum transmission unit MJPEG Tools package, 487 in videos, 496, 497 2 (MTU), 72 mkdictdb, 426 Musical notation, 406 2 MBR (master boot record), 14 mkisofs, 352, 354 Music production, 399–420. 2 MDA, 136, 141 mm directory, 18 See also Audio Medical model, 508 MNG, 443–44 processing 3 Melys, 402 Modelers, 3D graphics, loop-based sequencers, 3 Memory handling, in Apache 460–61 410–12 3 API, 184–85 Modems MIDI, 400–408 3 menuconfig, 18–20 cable, 48 computer hardware 3 merge switch (pilot-xfer), networking using dial-up, required, 401 3 310–11 47–48 drum machines, 407–8 3 Message digest functions, 197, as tunneling devices, 288–89 musical notation on, 406 3 235 MOD files, 408–9 recording, 405–6 3 Message hashing algorithm, Modules, 19 sequencing, 402–5 3 197 Apache, 180–81 software synthesis, 406–7 4 mg^2, 460, 475 modules, 21 MP3s, 413–14 mgetty command, 82–84 modules_install, 21 burning to CDs, 418 4 Microsoft Corporation, 63, 195, Monaural, 367 creating, 394–95 4 500 more, 297 players for, 416, 417–18 4 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 526

526 INDEX

Music production (cont.) nonrouting, 287–91 O multitrack hard disk recorders, HTTP proxies, 287–88 Obfuscation phase of network- 412–13 tunneling through, 288–91 based attack, 234 4 shell scripts for, 418–20 nonswitched Ethernet, 216 Octal dump, 296 text-only commands for, with one IP address, 45–58 od, 296 6 417–18 game hosting, 56–57 .o files, 180 Trackers, 408–10 hardware firewall/NAT Ogg Vorbis format, 369, 381 XMMS multimedia player, boxes, 58 One-way functions, 196 303, 371, 382, 414–16, IPChains installation, “Open Source Certification and 9 431, 435, 498 51–54 Mark” program, 8 0 , 301 IP Masquerading, 46–47, 49 Open source development, 7 GPG integration with, 211 kernel 2.4 and, 57–58 “Open Source” licenses, 5–6 kernel configuration for, “Open Source” philosophy, 7 N 49–51 OpenSSH, 53, 229, 267, 4 NAT (network address on modem connection, 268–79 translation), 46, 47. 47–48 file transfer with SCP, 270–71 6 See also IP Masquerading network address translation public key encryption in, NAT boxes, 58 (NAT), 46, 47 268–70 for PLIP networking, 71–74 port forwarding, 54–56 telecommuting with, 273–74 NetBEUI, 86 on router connection (cable as virtual private network, 9 NetBIOS, 87 or DSL), 48 274–79 0 net directory, 18 stand-alone router, 47 client options, 274–77 Netfilter, 57 PLIP, 60–71 server options, 277–79 Netscape kernel compilation to X11 forwarding, 271–72 certificate acceptance , enable, 64–69 OpenSSH server, 280 4 166–70 NAT set up for, 71–74 forwarding, 284 GPG integration with, 213 PLIP tunnel set up, 69–71 OpenSSL, 220 6 Network (NFS), scanning for hosts and Optimization as a router 260 services, 300 (kernel configuration Network firewalls, 49 sniffing. See Sniffing option), 49 Network Neighborhood with Windows. See Samba OS/2, 28 9 (Windows), 90 Windows applications under OS/2 PMX server, 29 0 Network(s)/networking. See also wine, 345 OSD (Open Source Definition), Communications NFS, 260 7 attacks on, 232–34 nmap, 233, 300 Outlook, 195 browser-based, 288 nmblookup, 90–91 Output volume, 370–72 4 denial-of-service (DoS), 50, Nonrouting networks, 287–91 232 HTTP proxies, 287–88 P 6 “Man in the Middle” tunneling, 288–91 Packet monitoring, 250–51 (MITM), 269 through e-mail, 291 Palm-connected organizers, profiles of, 260 httptunnel package, 307–32 9 scripted, 234 289–91 Handspring Visor, 308–9 defending, 265. See also in ICMP messages, 291 jpilot, 326–30 0 Firewall(s); Intruder Nonswitched Ethernet networks, backup features, 329, 330 detection 216 File menu, 326–29 home, 262–63 nslookup, 300 pilot-link in, 329

4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 527

INDEX 527

kpilot, 320–26 Personal digital assistants Ports applications conduits, (PDAs). See Palm- blocking, 54 2 322–24 connected organizers “exporting” to outside world, 3 daemon, 320 PGP, 196 283–84 4 GUI client program, 320 Pharmaceutical companies, 508 parallel, 61–63 5 setting up, 320–21 Phoneme dictionaries, 427 PLIP networking and, 65 6 malsync, 330–31 Phonemes, 424–25 wine support for, 345 7 pilot-link tools, 309–17 Phonetics, 424–25 Port (SSH client option), 276 pilot-manager, 317–20 Photoshop, 445 Port (SSH server option), 278 8 Palm organizer, VNC client for, PHP, 177 PostScript, 441 9 36 PHP4, 161–64, 177 PovRay, 457–58, 459 PalmOS devices. See Palm- testing installation of, 170 camera positioning in, 468 connected organizers Phrasing in speech synthesis, colors and textures in, 466, Parallel Line Internet Protocol 423–24 473–75 (PLIP) networking, pidof, 298–99 front-ends for, 459–60 60–71 pilot-dedupe program (pilot-xfer), lighting in, 466–68 kernel compilation to enable, 311 3D logo (example), 471–73 64–69 pilot-link, 309–17, 329 2D logo (example), 469–71 NAT set up for, 71–74 pilot-manager, 317–20 PPP, 47 PLIP tunnel set up, 69–71 PILOTPORT environment Preprocessors, Snort, 265 Parallel ports, 61–63 variable, 309 (PGP), 196 PLIP networking and, 65 PILOTRATE environment Prime numbers, public-key 2 wine support for, 345 variable, 309 cryptography and, 198, 2 parport, 69 pilot-xfer, 309–17 207 2 Partition table, 14 PIMP, 176 Primitives (building blocks), 469 2 Passive reconnaissance, Pine, GPG integration with, 212 Printer port cables, two-way, 2 232–33 Pinnacle Systems Studio DC10 63–64 2 Passphrases, 163–64, 200 Plus video capture card, Printer sharing, 88, 95–96 2 for decryption, 209–10 483–84, 486 Private key, 196–98 2 digital signatures and, 208 Pipes, 294 , 50 2 pass (Snort action), 252 Pixels, 438 Procmail, 134–35, 139–46, 147 2 PasswordAuthentication (SSH Playlists, 417–18 command execution, 147 server option), 278 PLIP. See Parallel Line Internet recipes in, 140–46 3 Passwords, 105 Protocol (PLIP) for filtering, 141–42 3 Pathologically eclectic rubbish networking for processing commands, 3 lister. See PNG (Portable Network 142 3 PC Anywhere, 32 Graphics), 440, 441, 444 scripts, 142–46 3 PCM, 366–67 PocketQuicken, 331 .procmailrc file, 152 3 PDAs. See Palm-connected Point-to-Point Protocol (PPP), Programmers, 508 3 organizers 47 Promiscuous mode, Ethernet 3 Perens, Bruce, 7–8 Polling, 69 card in, 216 3 Perl, 2–3, 6, 225, 297 Port 21, blocking, 54 Pronunciation dictionaries, 426, 3 PermitEmptyPasswords (SSH Port 80/TCP, 166, 170 427 4 server option), 278 Port 443/TCP, 166, 170 PROTUX, 413 PermitRootLogin (SSH server Port forwarding, 54–56, 280–82 PS/2 parallel port, 62 4 option), 278 PORTFW, 57 pserver, 121 4 4 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 528

528 INDEX

Public domain software, 4, 6 through forwarded OpenSSH RSAAuthentication (SSH server Public key encryption, 197–98, server, 284–85 option), 278 268–70 VNC, 29, 30, 32–43 RSA/DSA authentication 4 Public keys, 196–98 clients, 41–43 method, 285–87 exchanging, 206 environment, 33 RSH (remote shell), 268 6 Purdue University, 236 with Linux, 37–43 Rsynth, 425–26 purge switch (pilot-xfer), 312 server, 40–41 R tools, 268 Pygmalion, 460 Xvnc, 34–36 Runlevels, 77 X basics, 31–32 9 Q Remote copy (RCP), 229, 268 S 0 qt-2.2.2, 498 RemoteForward (SSH client Samba, 85–112 QuakeForge, 462 option), 276 accessing shares, 92–96 Quantization, 443 Remote monitoring through as client, 89–90 Quicken under wine, 346 Web browser, 185–92 graphical clients, 96–98 4 Quicktime, 483, 502 coding, 186–89 listing shares, 91–92 compiling, 189–91 local network discovery, 90 6 R testing, 191–92 nmblookup, 90–91 Raster image format, 458 Remote shell (RSH), 268 practical application, 101–2 RAW format, 368 remove command (CVS), 123 printer sharing, 88, 95–96 Raymond, Eric, 7–8 Request structure, Apache API, as server, 102–10 9 Ray tracing, 458–59, 466 182–83 in existing domain, 105–6 0 RCP, 229, 268 Resolution of image, 438 options, 103–4 react (Snort rule option), 259 Resource pools, Apache, 183 smbpasswd, 105 RealPlayer, 502 resp (Snort rule option), 258–59 SWAT Web Administration The Real Thud, 407 REs (regular expressions), 294 Tool, 106–10 4 Rebooting in Linux, 348 restore command (pilot-xfer), Windows 2000 issues, 106 Recipes, Procmail, 140–46 310, 315–16 SMB (Server Message Block) 6 for filtering, 141–42 Reverb sound effect, 380 and, 86–88 for processing commands, RGB (red-green-blue), 439, 442 workstation replacement, 142 RhythmLab, 407 99–101 scripts, 142–46 Rio Volt, 419–20 Sample files, 409 9 Reconnaissance phase of Ripping CDs, 372–73 Sandboxes (working directories), 0 network-based attacks, Rogue Spear games, 56–57 120, 130 232–33 Roland XP-30 synthesizer, 403–5 SANE plug-ins, 446 Recorders, multitrack hard disk, Jazz++ interoperability with, Saturation, color, 452 412–13 404 Scanners, 447 4 Recording, audio, 371, 374–75 Root accounts, 11 Scanning halftone images, MIDI, 405–6 Root authority, 246 453–54 6 with SOX, 387, 388 Rosegarden, 402, 406 Sced, 460 vinyl records, 387–89 Routers SCP (secure copy), 229 RedHat, 9, 10, 26 cable or DSL, 48 file transfer with, 270–71 9 VNC on, 41 stand-alone, 47, 58 port forwarding and, 282 Redirection, 294 rpc (Snort rule option), 258 Screenshots!, 502 0 Regular expressions (REs), 294 RPM, 9 Scripted attacks on networks, Remote computing, 27–43 RS-232 serial devices, 61 234 CD burning. See CDs: remote RSAAuthentication (SSH client scripts directory, 18 burning of option), 277 SCSI emulation, 384 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 529

INDEX 529

SDL, 499 Sendmail, 136, 178 smbspool, 95 Searching tools, 299–300 September 11, 2001 attacks, smpeg, 501 2 Secure connectivity, 267–92 270 smpeg-XMMS, 502 3 alternate authentication seq (Snort rule option), 257 Sniffing, 215–29 4 methods, 285–87 Sequencers, loop-based, attacking by, 217 5 getting out of firewall, 279–82 410–12 countermeasures against, 6 getting through firewall, Sequencing, MIDI, 402–5 228–29. See also Intruder 7 283–85 Serial devices, 61 detection to nonrouting networks, Serial port, wine support for, defending by, 217–18 8 287–91 345 tools for, 218–28 9 HTTP proxies, 287–88 Server(s). See also Web servers dsniff, 218–23 tunneling, 288–91 e-mail, 287 Ethereal, 225–26, 227–28 secure shell. See Secure shell HTTP proxy, 287–88 MuLinux, 226–28, 303–4 (SSH) IMAP, 159–60 Sniffit, 218, 219, 226 Secure copy. See SCP (secure OpenSSH, 280 Supersniffer, 223–24 copy) forwarding, 284 TCPDump, 224–25 Secure shell daemon (SSHD), OS/2 PMX, 29 troubleshooting by, 217 280 Samba as, 102–10 Sniffit, 218, 219, 226 Secure shell (SSH), 267, 268–79, in existing domain, 105–6 Snort, 249–66 298. See also OpenSSH options, 103–4 attack profiles, 260 file transfer with SCP, 270–71 smbpasswd, 105 command line arguments, over httptunnel, 291 SWAT Web Administration 264 2 public key encryption in, Tool, 106–10 false positives in, 261–62 2 268–70 Windows 2000 issues, 106 on home networks, 262–63 2 telecommuting with, 273–74 SSH (SSHD), 269 knowledgeability about, 2 as VPN, 274–79 testing, 166–70 264–65 2 client options, 274–77 Session key, 207 output modules, 265 2 server options, 277–79 session (Snort rule option), packet monitoring, logging, 2 X11 forwarding, 271–72 258 and triggering, 250–51 2 Secure socket layer (SSL), 161, setgid attribute, 117–18 preprocessors, 265 2 177 setuid attribute, 118 rules, 251–59 2 Secure tunnel to insecure service, Setuid root files, 247 header, 251–54 281 Sharp Viewcam VL-E650, options, 254–59 3 Security. See also Firewall(s); 484 rules library, 260–61 3 Intruder detection Shells, 298–99 running, 263–64 3 e-mail. See GPG (GNU Signatures, digital. See Digital .so files, 180 3 Privacy Guard) signatures Software distribution, capital 3 of e-mail-based console Site blocking, 288 cost of, 507 3 application, 135–36, SMB2WWW, 98 Software industry, 507–8 3 147–54 smbclient, 91–93 Software requirement, 26 3 GnuPG to encrypt results, smbfs, 93–95 Solitaire, 341 3 148 smbmount, 94–95 Song, Dug, 218 3 GnuPG to handle smbpasswd, 105 Soundcards, 370 4 authorizations, 147–48 smbprint, 95–96 with MIDI support, 401 in IPChains, 53 SMB (Server Message Block), Sound effects, 377–80 4 of precompiled kernels, 10 86–88 Sounds, layered, 403 4 sed, 295 smbsh, 93–95 SoundTracker, 409, 410 4 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 530

530 INDEX

Source code, 8–24 SPP (standard parallel port), applications. See Palm- compiling, 8–10 61–62 connected organizers autoconf, 12–13 SquirrelMail, 176 sync command (pilot-xfer), 310, 4 Imakefiles, 11 ~/.ssh/authorized_keys file, 286 313–15 make files, 11–12 .ssh/config file, 274 Synthesizers, 400–401, 403–5 6 finding, 24 SSHD (secure shell daemon), Sysctl, 51 GPL philosophy on, 5 280 System compromise, 232, 233 kernel customization, 13–23 ssh-keygen, 285–86 System V initialization model, 77 booting, 22–23 SSH (secure shell), 267, 268–79, 9 build step, 20–21 298. See also OpenSSH T 0 disaster recovery, 23 file transfer with SCP, 270–71 Tagged Image File Format installation, 21–22 over httptunnel, 291 (TIFF), 441, 444 interactive configuration public key encryption in, Tape archive, 296 system, 18–20 268–70 tar, 296 4 LILO boot loader, 13–15 telecommuting through Tarballs, 11 /usr/src/linux base directory, firewalls with, 273–74 TCPDump, 224–25 6 16–18 as VPN, 274–79 TCP/IP protocol, 32, 86 Sourceforge Web site, 24 client options, 274–77 TCP Syncookie support, 50 SOX server options, 277–79 TechTV, 505 equalization with, 379–80 X11 forwarding, 271–72 tektracker, 409 9 file conversions with, SSH server (SSHD), 269 Telecommuting, 273–74. See also 0 380–81 SSL, 161, 177 Remote computing; recording with, 387, 388 Stallman, Richard M., 4–5, 6, Secure connectivity vinyl record cleanup with, 7, 8 Telnet, 53, 229, 267, 268 389–90 Stars!, 343–44 encrypted, 268 4 volume adjustment with, Stellar Legacy, 343 secure, 283–84 377–78 Stereo, 367 Text files, 294–95 6 Spafford, Eugene, 236 Stereo offset, 380 Text-mode consoles, 76–77 Spam filters, 141 Storyboard, 489 Textures, in PovRay, 466, 473–75 Speech synthesis, 421–36 Stream editor program (sed), 295 TFTP, 260 analyzing, 422–25 StrictModes (SSH server 3dom, 460, 475 9 phonetics, 424–25 option), 279 3dPM, 460, 475 0 phrasing and intonation, String handling, in Apache API, 3D graphics production, 457–80 423–24 182, 183, 184–85 animation, 461–62 tokenization, 422–23 strings command, 298 game engines, 462 waveform generation, 425 Stuffed routing, 54 modelers, 460–61 4 examples, 428–36 sudo, 298 more tools for, 475–76 checking Internet mail at Superblock, 14 PovRay, 457–58, 459 6 login, 428–31 Supersniffer, 223–24 camera positioning in, 468 file browser, 431–36 SuSE, 9, 26 colors and textures in, 466, hardware vs. software, 421 Web server implementation, 473–75 9 software packages, 425–28 115 front-ends for, 459–60 Festival, 424, 426–28, 431 svncviewer, 41–42 lighting in, 466–68 0 Rsynth, 425–26 SWAT Web Administration 3D logo (example), 471–73 Spell checkers, 296 Tool, 106–10 2D logo (example), 469–71 in MS Word, 343 Symmetric-key cryptographic raster and vector painting, 458 SpiralSynth, 407 system, 196, 206–7 ray tracing, 458–59, 466 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 531

INDEX 531

TIFF, 441, 444 maintenance of, 118–31 software, 485–88 Timeline, video, 495 CVS, 120–28 capture and playback tools, 2 TiMidity, 405–6 homepage creation, 128–30 487–88 3 tin, 302 sandboxes (working drivers, 486 4 Titles, video, 496 directories), 120, 130 nonlinear editing tools, 488 5 TkSMB, 96, 97 needs for, 114 storyboard, 489 6 Tokenization in speech synthesis, structure of, 114–15 studio setup, 491 7 422–23 Unisys, 440–41 timeline, 495 tos (Snort rule option), 254 Universal Disk Format (UDF) titles, 496 8 Total Annihilation, 345 file system, 356 transitions, 495 9 towav utility, 382 Universal naming convention, 88 Video4Linux, 482–83 Trackers, 408–10 , 1, 2–3 video sequence guide, 489, 490 Traffic analysis, 270 Unix Remote Copy (RCP), 229, voice-overs and music, 496, Translations, in graphics 268 497 production, 471 update command (CVS), 123 Videotape, transferring digital Tridgell, Andrew, 86 update command (pilot-xfer), 310 video to, 504 Triggering Snort, 250–51 Update mode (Tripwire), 241 vidrec, 492 Trinux, 47 URLsnarf, 223 Vinyl record transfer to CDs, Tripwire, 231, 235–47, 265 USB ports, 447 384–95 configuration of, 236–39 USB sync cradle, 309 audio system and, 386–87 database maintenance, 241 UsePrivilegedPort (SSH client CD creation, 393–94 database setup, 239–40 option), 277 MP3 file creation, 394–95 2 forensics, 246–47 User accounts, 105 preparation for, 385–86 2 history of, 236 User (SSH client option), 277 recording, 387–89 2 operation of, 235–36 removing clicks, pops, and 2 purpose of, 235 V hisses, 389–90 2 running, 241–46 Validating digital signatures, trimming tracks, 390–93 2 Trivial File Transfer Protocol 204–6 “Viral” license, 5 2 (TFTP), 260 Vector image format, 458 Virtual consoles, 76–77 2 True Color, 439 vi, 295 Virtual network console. See 2 trueSpace, 476 Video4Linux, 482–83 VNC 2 ttl (Snort rule option), 254 Video cameras, 484 Virtual private network (VPN), Tunneling, 288–91 Video card requirement, 26 274–79 3 through e-mail, 291 Video CDs (VCDs), 504–5 client options, 274–77 3 through firewalls, 273–74 Video production, 481–505 server options, 277–79 3 httptunnel package, 289–91 capturing video, 484, 492–93 SSH as, 274–79 3 in ICMP messages, 291 editing clips, 493–97 Viruses 3 secure, 281 file formats, 483 boot sector, 14 3 TWIG, 176 final rendering, 496 via e-mail. See GPG (GNU 3 Two-way printer port cables, gopher for, 488 Privacy Guard) 3 63–64 hardware, 483–85 V-mails (video e-mails), 505 3 playback, 497–503 VNC, 29, 30, 32–43 3 U AVI, ASF, WMV, 498–501 clients, 41–43 4 Undernets, 113–32 MPEG, 501–2 environment, 33 benefits of, 131 other formats, 502–3 with Linux, 37–43 4 for individual empowerment, publishing, 504–5 server, 40–41 4 115–18 shooting, 490–91 Xvnc, 34–36 4 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 532

532 INDEX

vncserver, 37–43 Web servers. See Apache; World Foundry, 462 vncviewer, 41 Undernets www.freshmeat.net, 304 Voice-overs in videos, 496, 497 Web sites www.google.com, 24, 305 4 Volume, output, 370–72 images on, 437 www.jabber.org, 305–6 Volume adjustment, 377–78 for software, 26 www.linux.com, 304 6 Voodoo Tracker, 409 for source code, 24 www.linuxdoc.org, 304 Vorbis codec, 369 as tools, 304–6 www.linuxgames.com, 305 wget, 300, 426 www.lokigames.com, 305 W which (program), 299 www.lwn.net, 305 9 Wavelet transforms, 444 Window manager, 28–29, 31 www.slashdot.org, 305 0 WAV format, 368 Windows. See Microsoft www..net, 305 Web browser, remote Windows monitoring through, Windows Media Format, 369 X 185–92 Wine, 331, 333–36 X11 forwarding, 271–72 4 coding, 186–89 AIM client under, 339–40, X11Forwarding (SSH server compiling, 189–91 345 option), 279 6 testing, 191–92 DirectX under, 345 X-CD-Roast, 359–63 Webcams, 484–85 getting, 334 xconfig, 18–20, 349 Web-clipping application, 330 MS Word 97 via, 342–43, 346 XFree86, 11 Web-mail service, 157–78 network applications under, XMMS multimedia player, 303, 9 Aeromail installation, 165 345 371, 382, 414–16, 431, 0 Aeromail use, 171–75 Quicken under, 346 435, 498 IMAP server, 159–60 serial- and parallel-port xscanimage program, 446 other software packages, support, 345 X-server 176 Solitaire via, 341 for Windows, 29–30 4 PHP4 support, 161–64, 170, Stars! under, 343–44 Xvnc as, 34–35 177 status of, 333–34 XSMBrowser, 96, 97 6 resources on, 177–78 Total Annihilation under, 345 xv, 303 SSL libraries configuration, wine.conf, 335–39 xvncviewer, 41 161 WMV files, 501 X-windows, 27, 28–29, 31–32, system preparation, 159 Word 97, under wine, 342–43, 349 9 testing server, 166–70 346 0 Web pages, command line tool Workstation replacement, Z to retrieve, 300 99–101 zImage kernel, 21

4

6

9 0

4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 533

2 3 4 5 6 7 8 9

2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 4 4 4 4 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 534

4

6

9 0

4

6

9 0

4

6

9 0

4

6

9 0

4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 535

2 3 4 5 6 7 8 9

2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 4 4 4 4 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 536

4

6

9 0

4

6

9 0

4

6

9 0

4

6

9 0

4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 537

2 3 4 5 6 7 8 9

2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 4 4 4 4 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 538

4

6

9 0

4

6

9 0

4

6

9 0

4

6

9 0

4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 539

2 3 4 5 6 7 8 9

2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 4 4 4 4 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 540

4

6

9 0

4

6

9 0

4

6

9 0

4

6

9 0

4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 541

2 3 4 5 6 7 8 9

2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 4 4 4 4 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 542

4

6

9 0

4

6

9 0

4

6

9 0

4

6

9 0

4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 543

2 3 4 5 6 7 8 9

2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 4 4 4 4 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 544

4

6

9 0

4

6

9 0

4

6

9 0

4

6

9 0

4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 545

2 3 4 5 6 7 8 9

2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 4 4 4 4 4 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 546

Also from Addison-Wesley

Linux System Administration A User’s Guide 4 Marcel Gagné

6 0-201-71934-7 Paperback 560 pages 9 © 2002 0 This comprehensive, hands-on guide to Linux system administration provides you with the deeper understanding of the inner workings of Linux. 4

6 The Linux Companion for System Administrators, Second Edition 9 Jochen Hein 0 0-201-67525-0 Paperback 592 pages © 2001 4 Focusing on the use of Linux in a private or 6 corporate environment, this book will help the experienced Linux user attain a more efficient level of system administration. 9 0 Understanding Open Source Software Development 4 Joseph Feller, Brian Fitzgerald

6 0-201-73496-6 Paperback 224 pages © 2002 9 0 The first complete and objective synthesis of the available literature, offering a unique one-stop reference for developers, researchers, managers and anyone else needing to grasp the key issues 4 about OSS. 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 547

2 www.informit.com 3 4 Articles Books Free Library Expert Q&A Training News Downloads 5 6 OPERATING SYSTEMS Free, indepth articles and 7 WEB DEVELOPMENT 8 supplements 9 PROGRAMMING Solutions Master the skills you need, NETWORKING when you need them CERTIFICATION from experts Choose from industry leading AND MORE… you know books, ebooks, and training products Expert Access. and trust. 2 . Achieve industry certification 2 and advance your career 2 2 2 Get answers when you 2 need them from live 2 2 experts or InformIT’s 2 2 comprehensive library 3 3 3 3 3 3 Visit 3 3 and get great content 3 3 from 4 4 4 4 4

Addison-Wesley and InformIT are trademarks of Pearson plc / Copyright©2000 pearson www.informit.com 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 548

4

6

9 0

4

6

9 0

4

6

9 0

4

6

9 0

4