Shell Scripting 5 57

Total Page:16

File Type:pdf, Size:1020Kb

Shell Scripting 5� 57 ﺑﻪ ﻧﺎم ﺧﺪا داﻧﺸﮕﺎه ﻛﺮدﺳﺘﺎن ﮔﺮوه ﻛﺎﻣﭙﻴﻮﺗﺮ درس آزﻣﺎﻳﺸﮕﺎه ﺳﻴﺴﺘﻢ ﻫﺎي ﻋﺎﻣﻞ ﺗﻬﻴﻪ : : ﺻﺎدق ﺳﻠﻴﻤﺎﻧﻲ < وﻳﺮاﻳﺶ ﺳﻮم > زﻣﺴﺘﺎن 89 89 آزﻣﺎﻳﺸﮕﺎه ﺳﻴﺴﺘﻢ ﻫﺎي ﻋﺎﻣﻞ 2 © داﻧﺸﮕﺎه ﻛﺮدﺳﺘﺎن آزﻣﺎﻳﺸﮕﺎه ﺳﻴﺴﺘﻢ ﻫﺎي ﻋﺎﻣﻞ 3 ﻓﻬﺮﺳﺖ 1 - ﭘﻴﺸﮕﻔﺘﺎر ................................ ................................ ................................ ......4 2 - ﺗﻨﻈﻴﻢ ﻛﺎراﻳﻲ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ................................ ................................ ...............9 3 - رﻓﻊ ﻋﻴﺐ ( Troubleshooting) ................................ ................................ ........ 21 4 - ﻧﻈﺎرت ﺑﺮ ﻛﺎراﻳﻲ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ................................ ................................ ........ 37 Shell Scripting 5- در وﻳﻨﺪوز ................................ ................................ ........... 47 6 - رﺟﻴﺴﺘﺮي ( Registry) ................................ ................................ ................... 57 7 - ﺳﻴﺴﺘﻢ ﻓﺎﻳﻞ در وﻳﻨﺪوز ................................ ................................ .................. 67 8 - آﺷﻨﺎﻳﻲ ﺑﺎ ﻟﻴﻨﻮﻛﺲ ................................ ................................ ....................... 87 9 - آﺷﻨﺎﻳﻲ ﺑﺎ ﻣﺪﻳﺮﻳﺖ ﻓﺮاﻳﻨﺪﻫﺎ در ﻟﻴﻨﻮﻛﺲ ................................ ........................ 111 10 - ارﺗﺒﺎط ﺑﻴﻦ ﻓﺮاﻳﻨﺪﻫﺎ در ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻟﻴﻨﻮﻛﺲ ................................ ............... 125 11 - ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﭘﻮﺳﺘﻪ ﻟﻴﻨﻮﻛﺲ ................................ ................................ ....... 139 12 - آﺷﻨﺎﻳ ﻲ و ﺑﻪ ﻛﺎرﮔﻴﺮي Samba Server 3.0 در ﻟﻴﻨﻮﻛﺲ ................................ .... 153 13 - ﮔﺰارش ﻛﺎر آزﻣﺎﻳﺶ ﻫﺎ ................................ ................................ ............. 171 © داﻧﺸﮕﺎه ﻛﺮدﺳﺘﺎن 1 - ﭘﻴﺸﮕﻔﺘﺎر ﺳﻴﺴﺘﻢ ﻫﺎي ﻋﺎﻣﻞ از ﭘﻴﭽﻴﺪه ﺗﺮﻳﻦ و ﺑﺰرﮔﺘﺮﻳﻦ ﻧﺮم اﻓﺰارﻫﺎ در ﺣﻴﻄﻪ ي ﻣﻬﻨﺪﺳﻲ ﻧﺮم اﻓﺰار ﺑﻪ ﺷﻤﺎر ﻣﻲ آﻳﻨﺪ ﻛﻪ در ﻣﻘﻴﺎس وﺳﻴﻊ و ﺗﻮﺳﻂ ﻛﺎرﺑﺮان ﺑﺎ ﺳﻄﺢ داﻧﺶ ﻫﺎي ﻣﺘﻔﺎوت ﻣﻮرد اﺳﺘﻔﺎده ﻗﺮار ﻣﻲ ﮔﻴﺮﻧﺪ . ﻧﻈﺮ ﺑﻪ ﭼﻨﻴﻦ اﻫﻤﻴﺘﻲ، درﺳﻲ ﺳﻪ واﺣﺪي ﺑﺮاي آﺷﻨﺎﻳﻲ ﺑﺎ ﻣﻔﺎﻫﻴﻢ ﺳﻴﺴﺘﻢ ﻫﺎي ﻋﺎﻣﻞ در دوره ي ﻛﺎرﺷﻨﺎﺳﻲ ﻣﻬﻨﺪﺳﻲ و ﻋﻠﻮم ﻛﺎﻣﭙﻴﻮﺗﺮ و ﻓﻨﺎوري اﻃﻼﻋﺎت در ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪه اﺳﺖ . آﺷﻨﺎﻳﻲ ﻣﻠﻤﻮس و ﻋﻤﻴﻖ ﺗـﺮ ﺑـﺎ ﻣﻔـﺎﻫﻴﻢ ﻧﻈـﺮي ﻣﻄـﺮح ﺷـﺪه در ﺳﻴﺴﺘﻢ ﻫﺎي ﻋﺎﻣﻞ ﺟﺰ ﺑﺎ ﻳﻚ دوره ي ﻋﻤﻠﻲ در اﻳﻦ زﻣﻴﻨﻪ اﻣﻜﺎن ﭘﺬﻳﺮ ﻧﻤﻲ ﺑﺎﺷﺪ . ﺗﺠﺮﺑﻪ ي ﺑﻴﺶ از ﺷﺶ ﺳﺎل ﺗﺪرﻳﺲ در راﺑﻄﻪ ﺑﺎ ﺳﻴﺴﺘﻢ ﻫﺎي ﻋﺎﻣﻞ و ﻓﻌﺎﻟﻴﺖ ﺣﺮﻓﻪ اﻳﻲ در زﻣﻴﻨﻪ ي ﺳﻴﺴﺘﻢ ﻋﺎﻣـﻞ و ﺷﺒﻜﻪ و ﺗﺄﻟﻴﻒ ﻛﺘﺎب " اﻓﺰاﻳﺶ ﻛﺎراﻳﻲ راﻳﺎ ﻧﻪ ﻫﺎي ﺷﺨﺼﻲ " و ﻓﻘﺪان ﻣﺮﺟﻊ ﻣﺘﻨﺎﺳﺐ در زﻣﻴﻨﻪ ي آزﻣﺎﻳﺸﮕﺎه ﺳﻴﺴﺘﻢ ﻫﺎي ﻋﺎﻣﻞ، ﺑﻨﺪه را ﺑﺮ آن داﺷﺖ ﻛﻪ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﻮارد زﻳﺮ، در اﻳﻦ زﻣﻴﻨﻪ ﻣﺴﺘﻨﺪي را ﺑﻪ ﺧـﺼﻮص ﺑـﺮاي داﻧﺸﮕﺎه ﻫﺎي ﻓﺎﻗﺪ آزﻣﺎﻳﺸﮕﺎه ﻣﺠﻬﺰ ﻣﺠﺰا ﺗﻬﻴﻪ ﻧﻤﺎﻳﻢ . در دوره ي ﻛﺎرﺷﻨﺎﺳﻲ ﻛﺎﻣﭙﻴﻮﺗﺮ، درس آزﻣﺎﻳﺸﮕﺎه ﺳﻴﺴﺘﻢ ﻫﺎي ﻋﺎﻣﻞ ﺑﺎ ﻣﺤﺪودﻳﺖ ﻫﺎي ﻣﻬﻤﻲ روﺑﺮو اﺳﺖ ﻛﻪ ﺑﺎﻳﺪ در ﺗﺪوﻳﻦ ﻣﺴﺘﻨﺪي ﺑﺮاي آن ﻣﺪ ﻧﻈﺮ ﻗﺮار ﮔﻴﺮد ﺗﺎ ﺑﻬﺮه وري ﻫﺮﭼـﻪ ﺑﻴـﺸﺘﺮي ﺑـﺮاي داﻧـﺸﺠﻮﻳﺎن ﺑـﻪ ﻫﻤـﺮاه داﺷﺘﻪ ﺑﺎﺷﺪ . ﺑﻪ ﻋﻨﻮان ﻣﺜﺎل زﻣﺎن اراﺋﻪ ﺑﺮاي ﭼﻨﻴﻦ درﺳﻲ ، ﻳﻚ واﺣﺪ ﻋﻤﻠﻲ ﻛﻪ در ﺑﻴﺸﺘﺮ داﻧﺸﮕﺎه ﻫـﺎ ﻣﻌـﺎدل ﺑـﺎ دو ﺳﺎﻋﺖ اﺳﺖ در ﻧﻈﺮ ﮔﺮﻓﺘـﻪ ﺷـﺪه ، ﻛـﻪ ﻣﺠـﺎل ﻋﺮﺿـﻪ ي ﺑـﺴﻴﺎري ﻣﻔـﺎﻫﻴﻢ ﺑـﻪ ﺻـﻮرت ﭘﻴﻮﺳـﺘﻪ را ﻣﺤـﺪود ﻣﻲ ﻧﻤﺎﻳﺪ . ﻫﻤﭽﻨﻴﻦ اﺷﺘﺮاك ﻛﺎﻣﭙﻴﻮﺗﺮﻫﺎي ﻣﻮرد اﺳﺘﻔﺎده ﺑﺮاي آزﻣﺎﻳﺸﮕﺎه ﺳﻴﺴﺘﻢ ﻫﺎي ﻋﺎﻣﻞ ﺑﺎ ﺳـﺎﻳﺮ دروس در ﺑﺴﻴﺎري از داﻧﺸﮕﺎه ﻫﺎ، ﻣﻤﻜﻦ اﺳﺖ اﻣﻜﺎن ﺗﻐﻴﻴﺮات ﻣﻬﻢ و ﺳﻴﺴﺘﻤﻲ را از داﻧﺸﺠﻮﻳﺎن ﺳﻠﺐ ﻧﻤﺎﻳﺪ . ﺳﻴﺴﺘﻢ ﻫﺎي ﻋﺎﻣﻞ ﻣﺨﺘﻠﻔﻲ د ر دﻧﻴﺎي اﻣﺮوز ﻣﻮرد اﺳﺘﻔﺎده ﻫﺴﺘﻨﺪ : : • Windows ﻛﻪ ﻣﺤﺼﻮل ﺷﺮﻛﺖ ﻣﺎﻳﻜﺮوﺳﺎﻓﺖ اﺳـﺖ و ﺧـﻮد داراي وﻳـﺮاﻳﺶ ﻫـﺎي ﻣﺘﻌـﺪدي ﺑـﺮاي ﻛﺎرﺑﺮان ﺧﺎﻧﮕﻲ و ﺳـﺎزﻣﺎن ﻫـﺎ و ﺷـﺮﻛﺖ ﻫـﺎي ﺑـﺰرگ اﺳـﺖ، ﻣﺎﻧﻨـﺪ : Windows ، Windows XP Windows 2003 Server ، Vista و .... اﻳــﻦ ﺳﻴــﺴﺘﻢ ﻋﺎﻣــﻞ ﮔﺰﻳﻨــﻪ ﻫــﺎي ﺟﺪﻳــﺪ و ﭘﻴــﺸﺮﻓﺘﻪ ي ﺳ ﻴــﺴﺘﻢ ﻋﺎﻣــﻞ ﻫــﺎي اﻣــﺮوزي از ﻗﺒﻴــﻞ Virtual Memory ، MultiTasking ، Multiuser و ... را داراﺳﺖ. • UIX ﻛﻪ ﺑﺮاي اوﻟﻴﻦ ﺑﺎر در ﺳﺎل 1968 درآزﻣﺎﻳﺸﮕﺎه AT&T Bell ﻋﺮﺿـﻪ ﺷـﺪ ﻧﻴـﺰ ﺧـﻮد داراي وﻳــﺮاﻳﺶ ﻫــﺎي ﻋﻤــﺪه اﻳــﻲ ﺑــﺮاي ﻛــﺎر درﻣﻘﻴــﺎس ﺧــﺎﻧﮕﻲ ( Linux ) و ﺻــﻨﻌﺘﻲ اﺳــﺖ. ﻫﻤﭽﻨــﻴﻦ اﻳــﻦ ﭘﻴﺸﮕﻔﺘﺎر 5 ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻧﻴﺰ ﮔ ﺰﻳﻨـﻪ ﻫـﺎي ﺟﺪﻳـﺪ و ﭘﻴـﺸﺮﻓﺘﻪ ي ﺳﻴـﺴﺘﻢ ﻋﺎﻣـﻞ ﻫـﺎي اﻣـﺮوزي از ﻗﺒﻴـﻞ Multiuser ، Virtual Memory ، MultiTasking و ... را داراﺳﺖ. • MAC Operating System ﻛﻪ در ﺳﺎل 1984 در ﺷﺮﻛﺖ Apple و ﺑـﺮاي ﻛﺎﻣﭙﻴﻮﺗﺮﻫـﺎي ﺷﺨـﺼﻲ Macintosh ﻋﺮﺿﻪ ﺷﺪ و ﺗﺎﻛﻨﻮن ﻧﺴﺨﻪ ﻫﺎي ﻣﺨﺘﻠﻔﻲ از آن ﻋﺮﺿﻪ ﺷﺪه اﺳﺖ و ﺑﺮاي اﻏﻠﺐ ﻛﺎر ﺑﺮان اﻳﺮاﻧﻲ ﻧﺎآﺷﻨﺎﺳﺖ. • Novell Netware ﻛﻪ در ﺳﺎل 1984 ﺑﺎ اﻧﮕﻴﺰه ﺗﺴﻬﻴﻞ اﺷﺘﺮاك ﻓﺎﻳﻞ و دﻳﺴﻚ در ﺑﺴﺘﺮ ﺷﺒﻜﻪ ﻋﺮﺿﻪ ﺷﺪ ، ﻣﺤﺼﻮﻟﻲ از ﺷﺮﻛﺖ Novell ﺑﺎ ﭘﺸﺘﻴﺒﺎﻧﻲ IBM اﺳﺖ ﻛﻪ ﻃﺮﻓﺪاران زﻳﺎدي ﺣﺘﻲ در ﻛﺸﻮر اﻳﺮان ﭘﻴﺪا ﻛﺮد وﻟﻲ اﻛﻨﻮن ﺑﻪ ﺗﺪرﻳﺞ در ﺣﺎل ﺑﺮﭼﻴﺪه ﺷﺪن اﺳﺖ. • ﻧﺴﺨﻪ ﻫـﺎي ﻣ ﺨﺘﻠـﻒ ﺳﻴـﺴﺘﻢ ﻋﺎﻣـﻞ ﻫـﺎي دﻳﮕـﺮ ﻣﺎﻧﻨـﺪ Solaris ﻛـﻪ ﻣﺒﺘﻨـﻲ ﺑـﺮ UNIX اﺳـﺖ و ﺳـﺎﻳﺮ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻫﺎي ﺧﺎص ﻣﻨﻈﻮره ﺑﺮاي اﺳﺘﻔﺎده ﻫﺎي ﻣﺨﺘﻠـﻒ ﻣﺎﻧﻨـﺪ دﺳـﺘﮕﺎه ﻫـﺎي ﺗﻠﻔـﻦ ﻫﻤـﺮاه، اﻧـﻮاع دﺳﺘﮕﺎه ﻫﺎ و ﻟﻮازم ﺻﻨﻌﺘﻲ و ﺧﺎﻧﮕﻲ ﺑﺮاي اﺳﺘﻔﺎده ﻫﺎي ﻣﻌﻤﻮل ﻳﺎ ﺑﻼدرﻧﮓ1 و ... ﺑﺎ اﻳﻦ ﺣﺎل ﺑـﺮ ﻛـﺴﻲ ﭘﻮﺷـﻴﺪه ﻧﻴـﺴﺖ ﻛـ ﻪ ﺑـﻪ دﻟﻴـﻞ ﺷـﺮاﻳﻂ ﺧـﺎص ﺣـﻖ ﻛﭙـﻲ 2 در اﻳـﺮان، ﭘﺮﻃﺮﻓـﺪارﺗﺮﻳﻦ و ﭘﺮﻛﺎرﺑﺮدﺗﺮﻳﻦ ﺳﻴـﺴﺘﻢ ﻋﺎﻣـﻞ ﻣـﻮرد اﺳـﺘﻔﺎده، ﻧـﺴﺨﻪ ﻫـﺎي ﻣﺨﺘﻠـﻒ ﺳﻴـﺴﺘﻢ ﻋﺎﻣـﻞ وﻳﻨـﺪوز ﻣﺤـﺼﻮل ﺷـﺮﻛﺖ ﻣﺎﻳﻜﺮوﺳﺎﻓﺖ اﺳﺖ . ﺟﻬﺖ ﺗﺴﻬﻴﻞ و ﺗﺴﺮﻳﻊ آزﻣﺎﻳﺶ ﻫﺎ، اﻳﻦ ﻧﻜﺘﻪ ﻧﻴﺰ در ﺗـﺄﻟﻴﻒ اﻳـﻦ ﻣـﺴﺘﻨﺪ ﻣـﻮرد ﻧﻈـﺮ ﺑـﻮده اﺳﺖ . اﻳﻦ ﺗﺄﻟﻴﻒ ﺑﺎ در ﻧﻈﺮ ﮔﺮﻓﺘﻦ ﻣﺤﺪودﻳﺖ ﻫﺎي ذﻛﺮ ﺷﺪه ﺗﺪوﻳﻦ ﺷﺪه اﺳﺖ و ﻣﻮارد زﻳـﺮ از وﻳﮋﮔـﻲ ﻫـﺎي آن ﺑﻪ ﺷﻤﺎر ﻣﻲ آﻳﻨﺪ : : • اﻣﻜﺎن اراﺋﻪ ي اﻏﻠﺐ آزﻣﺎﻳﺶ ﻫﺎ در ﺟﻠﺴﺎت ﻧﺰدﻳﻚ ﺑﻪ دو ﺗﺎ ﺳﻪ ﺳﺎﻋﺘﻪ • اﻣﻜﺎن اراﺋﻪ ي درس آزﻣﺎﻳﺸﮕﺎه ﺳﻴﺴﺘﻢ ﻫﺎي ﻋﺎﻣﻞ در ﺳﺎﻳﺖ ﻫﺎي ﻛﺎﻣﭙﻴﻮﺗﺮ ﻣﺸﺘﺮك ﺑﺎ ﺳﺎﻳﺮ دروس • ﺗﻜﻴﻪ ﺑﺮ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻫﺎي راﻳﺞ در ﻣﺤﻴﻂ داﻧﺸﮕﺎه و ﻛﺎر، ﺑﺮاي آزﻣﺎﻳﺶ ﻫﺎ • ﺗﻜﻴﻪ ﺑﺮ ﻧﻜﺎت دوﺳﻮﻳﻪ داراي ﺟﻨﺒﻪ ﻫﺎي ﻋﻠﻤﻲ و ﻓﻨﻲ، ﺑﻪ اﻣﻴﺪ اﺳﺘﻔﺎده ي ﺳﻮدﻣﻨﺪ آن ﺑﺮاي داﻧﺸﺠﻮﻳﺎن در ﻫﺮ دو ﻣﺤﻴﻂ ﻋﻠﻢ و ﻛﺎر • اﺷﺎره ﺑﻪ ﻣﻔﺎﻫﻴﻢ ﻣﻔﻴﺪ دﻳﮕﺮ ﻣﺮﺗﺒﻂ ﺑﺎ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻣﺎﻧﻨﺪ BIOS ، ﻧﺮم اﻓﺰارﻫﺎي ﺳﻮدﻣﻨﺪ و ... • ﺗﻜﻴﻪ ﺑﺮ ﺗﻤﺮﻳﻦ يﻫﺎ اﺿﺎﻓﻲ ﻣﻔﻴﺪ و ﻣﻜﻤﻞ در ﺻﻮرت ﻋﺪم وﺟﻮد ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻧﺼﺐ ﺷﺪه و آﻣﺎده ﺑﺮاي اﺳﺘﻔﺎده در آزﻣﺎﻳﺸﮕﺎه، اﺳﺘﻔﺎده از ﻧﺮم اﻓﺰارﻫـﺎي ﻣﺎﺷﻴﻦ ﻣﺠﺎزي ﻣﺎﻧﻨﺪ Microsoft Virtual PC ﻳﺎ Sun Virtual Box ﭘﻴﺸﻨﻬﺎد ﻣﻲ ﺷﻮد . ﻫﻤﺎﻧﮕﻮﻧﻪ ﻛﻪ ﻣـﺎ ﻧﻴـﺰ 1 RealTime 2 Copy Right © داﻧﺸﮕﺎه ﻛﺮدﺳﺘﺎن آزﻣﺎﻳﺸﮕﺎه ﺳﻴﺴﺘﻢ ﻫﺎي ﻋﺎﻣﻞ 6 در اﻳﻦ درس از Sun Virtual Box ﺑﺮاي اﺟﺮا و اﺳﺘﻔﺎده ي ﺳ ﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻟﻴﻨﻮﻛﺲ وﻳـﺮاﻳﺶ Ubuntu ﺟﻬـﺖ آزﻣﺎﻳﺶ ﻫﺎي ﻣﺮﺗﺒﻂ در داﻧﺸﮕﺎه ﻛﺮدﺳﺘﺎن اﺳﺘﻔﺎده ﻛﺮدﻳﻢ . ﻻزم ﺑﻪ ذﻛﺮ اﺳﺖ ﻛﻪ در اﻳﻦ وﻳﺮاﻳﺶ ﺗﻌـﺪاد ده آزﻣـﺎﻳﺶ ﺗـﺪوﻳﻦ ﺷـﺪه ﻛـﻪ ﺑـﺮاي ﻳـﻚ ﺗـﺮم درس ﻛﻔﺎﻳـﺖ ﻧﻤﻲ ﻛﻨﺪ و ﻻزم اﺳـﺖ دﺳـﺖ ﻛـﻢ ﭼﻨـﺪ آزﻣـﺎﻳﺶ دﻳﮕـﺮ ﺑـﺮ آن اﻓـﺰوده ﺷـﻮد ﺗـﺎ ﻫـﻢ ﻣـﺪرس در اﻧﺘﺨـﺎب و اوﻟﻮ ﻳﺖ ﺑﻨﺪي آزﻣﺎﻳﺶ ﻫﺎ، آزادي ﻋﻤﻞ ﺑﻴﺸﺘﺮي داﺷﺘﻪ ﺑﺎﺷﺪ و ﻫـﻢ ﻣﺒﺎﺣـﺚ ﻣﻬـﻢ ﺑﻴـﺸﺘﺮي ﭘﻮﺷـﺶ داده ﺷـﻮد . ﻣﻮارد زﻳﺮ از اﻫﺪاف آﺗﻲ اﻳﻦ ﻣﺴﺘﻨﺪ ﺑﻪ ﺣﺴﺎب ﻣﻲ :آﻳﺪ :آﻳﺪ • ﮔﻨﺠﺎﻧﺪن ﺟﻠﺴﺎﺗﻲ در راﺑﻄﻪ ﺑﺎ ﺳﺎﻳﺮ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻫﺎي ﻏﻴﺮ از وﻳﻨﺪوز و ﻟﻴﻨﻮﻛﺲ • ﮔﻨﺠﺎﻧﺪن آزﻣﺎﻳﺶ ﻫﺎي ﻣﺮﺑﻮط ﺑﻪ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﺳﻴﺴﺘﻢ در وﻳﻨ ﺪوز و ﻣﺮﺗﺒﻂ ﺑـﺎ ﻣﻔـﺎﻫﻴﻢ ﺑﺮﻧﺎﻣـﻪ ﻧﻮﻳـﺴﻲ ﭼﻨﺪ ﻧﺨﻲ، ﭘﺮدازش روﻳﺪاد در وﻳﻨﺪوز و اﺑﺰارﻫﺎي ﻫﻤﺰﻣﺎﻧﻲ در ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ( راﻫﻨﻤﺎ1 و ﻧﺎﻇﺮ2) و ... ... ﺗﺎ در ﺻﻮرت ﻋﺪم ﭘﺮداﺧﺖ ﺑﻪ آن ﻫﺎ در ﺳﺎﻳﺮ دروس از ﺟﻤﻠﻪ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳـﺴﻲ ﭘﻴـﺸﺮﻓﺘﻪ، در اﻳـﻦ درس ﭘﻮﺷﺶ داده ﺷﻮد. • اﻓﺰودن Socket Programming ، ﺗﺎ در ﺻﻮرت ﺻﻼﺣﺪﻳﺪ ﻣﺪرس و ﻋﺪم ﻃﺮح اﻳﻦ ﻣﺴﺄﻟﻪ در ﺳـﺎﻳﺮ دروس از ﻗﺒﻴﻞ ﺷﺒﻜﻪ ﻳﺎ ﻣﻬﻨﺪﺳﻲ ﻓﻨﺎوري اﻃﻼﻋﺎت، در اﻳﻦ آزﻣﺎﻳﺸﮕﺎه ﻣﻄﺮح ﺷﻮد. • ﺑﻪ ﻫﻨﮕﺎم ﺳﺎزي آزﻣﺎﻳﺶ ﻫﺎي ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ وﻳﻨﺪوز، ﻣﻨﻄﺒﻖ ﺑﺮوﻳﺮاﻳﺶ ﻫﺎي ﺟﺪﻳﺪ و ﻗﺎﺑﻠﻴﺖ ﻫﺎي ﺟﺪﻳـﺪ ﻣﻄﺮح ﺷﺪه . -1-1 ﻧﺴﺨﻪ اﻟﻜﺘﺮوﻧﻴﻜﻲ ﻛﺘﺎب و راﻫﻨﻤﺎي ﻣﺮﺑﻲ ﺑﻲ ﺷـﻚ ﻣﻄﺎﻟـﺐ ﻋﺮﺿـﻪ ﺷـﺪه ﺧـﺎﻟﻲ از اﺷـﻜﺎل ﻧﻴـﺴﺖ و ﻣﻄﺎﻟـﺐ ﻣﺤـﺪودي از ﺳﻴـﺴﺘﻢ ﻋﺎﻣـﻞ را در اﺧﺘﻴـﺎر داﻧﺸﺠﻮﻳﺎن راﻏﺐ ﻗﺮار ﻣﻲ دﻫﺪ . از اﻳﻦ رو، ﺗﻼش ﻣﺴﺘﻤﺮي ﺑﺮاي ﺗﻜﻤﻴﻞ و ﻏﻨﻲ ﺗﺮ ﺷﺪن آن در ﺟﺮﻳﺎن اﺳﺖ و در اﻳــــﻦ ﻣــــﺴﻴﺮ ﻣﺆﻟــــﻒ، ﭘﻴــــﺸﺎﭘﻴﺶ از ﻧﻈــــﺮات و ﭘﻴــــﺸﻨﻬﺎدات ارﺳــــﺎﻟﻲ ﺷــــﻤﺎ ﺑــــﻪ آدرس اﻳﻤﻴــــﻞ [email protected] اﺳﺘﻘﺒﺎل ﻣﻲ ﻧﻤﺎﻳﺪ . ﺧﻮاﻫﺸﻤﻨﺪ اﺳﺖ اﻳﻤﻴﻞ ﻫﺎي ﺧﻮد را ﺗﺤﺖ ﻋﻨـﻮان OS-Lab Manual ارﺳﺎل ﻧﻤﺎﻳﻴﺪ . ﻫﻤﭽﻨﻴﻦ ﻧﺴﺨﻪ ي راﻫﻨﻤﺎي ﻣﺮﺑﻲ ﺑﺮاي اﺳﺎﺗﻴﺪ ﻣﺤﺘﺮﻣﻲ ﻛﻪ ﻗﺼﺪ اﺳﺘﻔﺎده از اﻳﻦ ﻣـﺴﺘﻨﺪ را ﺑـﻪ ﻋﻨـﻮان ﻣﺮﺟـﻊ ﻳـﺎ ﻛﻤﻚ درﺳﻲ در ﻧﻈﺮ دارﻧﺪ، آﻣﺎده اﺳﺖ و اﻳﺸﺎن در ﺻﻮرت ﺗﻤﺎﻳﻞ ﻣﻲ ﺗﻮاﻧﻨﺪ د ر اﻳﻤﻴﻠﻲ ﺑـﺎ ﻋﻨـﻮان OS-Lab Manual Guide ، راﻫﻨﻤﺎي ﻣﺬﻛﻮر را درﻳﺎﻓﺖ دارﻧﺪ . 1 Semaphore 2 Monitor © داﻧﺸﮕﺎه ﻛﺮدﺳﺘﺎن ﭘﻴﺸﮕﻔﺘﺎر 7 در ﺻﻮرت ﻧﻴﺎز آزﻣﺎﻳﺶ ﻫﺎ ﺑﻪ اﺳﺘﻔﺎده از ﻧﺮم اﻓﺰار ﻳﺎ ﻓﺎﻳﻠﻲ ﺧﺎص، آن ﻓﺎﻳﻞ ﻳﺎ ﻧﺮم اﻓﺰار در ﺻـﻔﺤﻪ ي درس، در وب ﺳﺎﻳﺖ www.ITVirtualLab .com در دﺳﺘﺮس ﻗﺮار ﺧﻮاﻫﺪ ﮔﺮﻓﺖ . -2-1 ﺑﺮﻧﺎﻣﻪ درﺳﻲ ﺑﺮاي ﺑﺮﮔﺰار ﺷﺪن ﻫﺮﭼ ﻪ ﺑﻬﺘﺮ اﻳﻦ درس و دﺳﺘﻴﺎﺑﻲ ﺑﻪ اﻫﺪاف آﻣﻮزﺷﻲ ﻣﻮرد ﻧﻈ ﺮ آن، ﭘﻴﺸﻨﻬﺎد ﻫﺎي زﻳـﺮ ﻗﺎﺑـﻞ ﻟﺤﺎظ ﻧﻤﻮدن اﺳﺖ . ﻻزم ﺑﻪ ذﻛﺮ اﺳﺖ ﭘﻴﺸﻨﻬﺎدﻫﺎي ﻣﺬﻛﻮر ﺑﺮ اﺳﺎس ﺗﺠﺮﺑﻪ ﻋﻤﻠـﻲ ﺑﺮﮔـﺰاري درس و ﮔـﺮﻓﺘﻦ ﺑﺎزﺧﻮردﻫﺎي ﻣﺜﺒﺖ، ﺗﺪوﻳﻦ ﺷﺪه اﺳﺖ : : • آزﻣﺎﻳﺶ ﻫﺎ در ﮔﺮوه ﻫﺎي ﺣﺪاﻛﺜﺮ ﺳﻪ ﻧﻔﺮه و ﺣﺪاﻗﻞ دو ﻧﻔﺮه ﺑﺎﻳﺪ اﻧﺠ ﺎم ﺷﻮد و ﮔﺮوه ﻳﻚ ﻧﻔﺮه ﻗﺎﺑـﻞ ﻗﺒﻮل ﻧﻴﺴﺖ. • در ﺻﻮرت ﻋﺪم وﺟﻮد ﺗﻤﻬﻴﺪات ﻣﻨﺎﺳﺐ در ﺳﺎﻳﺖ، داﻧﺸﺠﻮ ﻣﻮﻇﻒ اﺳﺖ ﭘـﺲ از ﻫـﺮ آزﻣـﺎﻳﺶ در ﭘﺎﻳﺎن ﺳﺎﻋﺖ، ﺗﻐﻴﻴﺮات ﺳﻴﺴﺘﻢ را ﺑﻪ ﺣﺎﻟﺖ اول ﺑﺮﮔﺮداﻧﺪ. • ﭘﻴﺶ از ﺣﻀﻮر در ﻫﺮﺟﻠﺴﻪ ﺑﺎﻳﺪ ﭘﻴﺶ آﮔﺎﻫﻲ ﺧﻮاﻧﺪه ﺷﻮد و از آن ﻛﻮﻳﻴﺰ ﮔﺮﻓﺘﻪ ﺧﻮاﻫﺪ ﺷﺪ. • ﺑﻪ ازاي ﻫﺮ ﺟﻠﺴ ،ﻪ ﺑﺎﻳﺪ ﮔﺰارش ﻛﺎر ﺑﺮاي آزﻣﺎﻳﺶ ﻫﺎﻳﻲ ﻛﻪ داراي ﮔـﺰارش ﻛـﺎر ﻫـﺴﺘﻨﺪ ﭘـﺮ ﺷـﻮد و ﺗﺤﻮﻳﻞ داده ﺷﻮد. • ﭘﺮﺳﺶ ﻫﺎي ﺗﻜﻤﻴﻠﻲ ﺑﺎ رﻋﺎﻳﺖ ﻣﻬﻠﺖ ﺗﻌﻴﻴﻦ ﺷﺪه، ﺑﺮاي ﺗﻜﻤﻴﻞ درك آزﻣﺎﻳﺶ ﻫـﺎي اﻧﺠـﺎم ﭘﺬﻳﺮﻓﺘـﻪ، ﺑﺎﻳﺴﺘﻲ ﺗﺤﺖ ﻋﻨﻮان ﺗﻜﻠﻴﻒ، ﺗﺤﻮﻳﻞ داده ﺷﻮد. • اﻣﻜﺎن ﺗﻌﺮﻳ ﻒ ﻳﻚ ﭘﺮوژه ي ﻣﻜﻤﻞ ﻧﻴﺰ ﻫﻤﺮاه ﺑﺎ اﻳﻦ درس وﺟﻮد دارد، ﻛﻪ ﺑـﻪ ﺧـﺎﻃﺮ ﻣﺤـﺪود ﺑـﻮدن ﺗﻌﺪاد آزﻣﺎﻳﺶ ﻫﺎي اﻳﻦ وﻳﺮاﻳﺶ از ﻣﺴﺘﻨﺪ، ﻣﻲ ﺗﻮان اﻧﻮاع ﻣﺴﺎﻳﻞ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳـﺴﻲ ﻣـﺮﺗﺒﻂ ﺑـﺎ ﻫﻤـﺎﻫﻨﮕﻲ ﻓﺮاﻳﻨﺪﻫﺎ ، ﺷﻨﺎﺧﺖ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻫﺎي ﺟﺪﻳﺪ ﻳﺎ ﺧﺎص ﻣﻨﻈﻮره و ... را ﺑﻪ ﻋﻨﻮان ﻣﻮﺿﻮع ﻋﺮﺿﻪ ﻧﻤﻮد. • ﺟﻠﺴﻪ ي آزﻣﻮن ﻧﻬﺎﻳﻲ ﻧﻈﺮي و ﻋﻤﻠﻲ، آﺧﺮﻳﻦ ﺟﻠﺴﻪ ي ﻛﻼ س ﻫﺎ ﻃﺒﻖ اﻋﻼم آﻣﻮزش داﻧﺸﮕﺎه اﺳﺖ . ﺟﻠﺴﻪ ي آزﻣﻮن ﻋﻤﻠﻲ در ﻫﻤﺎن ﺳﺎﻋﺖ ﻛﻼس و آز ﻣﻮن ﻧﻈﺮي ﺑـﻪ ﻣـﺪت ﻧـﻴﻢ ﺳـﺎﻋﺖ و ﺑـﻪ ﺻـﻮرت ﻫﻤﺎﻫﻨﮓ ﺑﺮاي ﺗﻤﺎم ﮔﺮوهﻫ ﺎﺳﺖ. • ﺣﺪاﻛﺜﺮ ﺗﻌﺪاد ﻏﻴﺒﺖ ﻫﺎي ﻣﻮﺟﻪ 2 ﺟﻠﺴﻪ اﺳﺖ و ﺑـﻴﺶ از آن ﺑـﻪ ﺻـﻮرت ﺧﻮدﻛـﺎر داﻧـﺸﺠﻮ ﺣـﺬف ﺧﻮاﻫﺪ ﺷﺪ . ﺟﻠﺴﻪ ي ﭘﻴﺶ از آزﻣﻮن ﻧﻬﺎﻳﻲ، ﺟﻠﺴﻪ ي ﺟﺒﺮاﻧـﻲ اﺳـﺖ و داﻧـﺸﺠﻮﻳﺎﻧﻲ ﻛـﻪ ﻳـﻚ ﻳـﺎ دو ﻏﻴﺒﺖ ﻣﺠﺎز داﺷﺘﻪ اﻧﺪ ﻣﻮﻇﻒ اﻧﺪ، آزﻣﺎﻳﺶ ﻫﺎي اﻧﺠﺎم ﻧ ﺸﺪ ه را در اﻳﻦ ﺟﻠﺴﻪ اﻧﺠﺎم داده و ﮔﺰارش ﻛﺎر ﻣﺮﺑﻮﻃﻪ را ﺗﺤﻮﻳﻞ دﻫﻨﺪ . © داﻧﺸﮕﺎه ﻛﺮدﺳﺘﺎن آزﻣﺎﻳﺸﮕﺎه ﺳﻴﺴﺘﻢ ﻫﺎي ﻋﺎﻣﻞ 8 • ﺑﻪ ﺧﺎﻃﺮ اﻫﻤﻴﺖ ﺗﻜﺎﻟﻴﻒ در ﻓﻬﻢ درو س ﭘﻴﺸﻴﻦ و ﭘﺴﻴﻦ، اﻛﻴﺪ اً ﺗﻮﺻـﻴﻪ ﻣـﻲ ﺷـﻮد، ﺗﻜـﺎﻟﻴﻒ در زﻣـﺎن ﻣﻘﺮر ﺗﺤﻮﻳﻞ داده ﺷﻮد. -3-1 ﺳﭙﺎﺳﮕﺰاري ﻻزم ﻣﻲ داﻧﻢ ﺑﺪﻳﻨﻮﺳﻴﻠﻪ از ﺧﺎﻧﻢ ﻫﺎ آرزواﻳﺰدﻧﻴﺎ و ﻧﻴﻠﻮﻓﺮﺧﺎﻧﻘﺎﻫﻲ، داﻧﺸﺠﻮﻳﺎن ﻣﻘﻄﻊ ﻛﺎرﺷﻨﺎﺳـﻲ داﻧـﺸﮕﺎه آزاد اﺳﻼﻣﻲ واﺣﺪ دﻣﺎوﻧﺪ، ﺧﺎﻧﻢ ﻃﺎﻫﺮه اﺣﻤﺪﻳﺎن ، آﻗﺎﻳﺎن ﻳﺎﺳﺮ ﻗﺎدري، ﺿـﻴﺎءاﻟﺪﻳﻦ ﻧﺠﻔﻴـﺎن، ﻣﺎزﻳـﺎر ﻣﻨـﻮﭼﻬﺮي و ﻣﺠﺘﺒﻲ ﻣﻠﻚ ﭘﻮر داﻧﺸﺠﻮي ﻛﺎرﺷﻨﺎﺳﻲ ﻣﻬﻨﺪﺳﻲ ﻓﻨﺎوري اﻃﻼﻋﺎت داﻧﺸﮕﺎه ﻛﺮدﺳـﺘﺎن و آﻗـﺎي ﻣﺤﻤـﺪ ﺳـﻌﻴﺪ ﻣﺆذن داﻧﺸﺠﻮي ﻛﺎرﺷﻨﺎﺳﻲ ﻣﻬﻨﺪﺳﻲ ﻓﻨﺎوري اﻃﻼﻋﺎت داﻧﺸﮕﺎه ﺗﺒﺮﻳﺰ ﻛﻪ در ﺗﻬﻴﻪ ي ﭘﻴﺸﻨﻮﻳﺲ ﻫﺎي اوﻟﻴﻪ اﻳـﻦ ﻣﺴﺘﻨﺪ و وﻳﺮاﻳﺶ آن ﻫﻤﻜﺎري ﻧﻤﻮدﻧﺪ ﺗﺸﻜﺮ ﻧﻤﺎﻳﻢ .
Recommended publications
  • Page 1 of 2 KB296944
    KB296944 - HOW TO: Use File Replication Service File and Folder Filters in Windows 2000 Page 1 of 2 Knowledge Base HOW TO: Use File Replication Service File and Folder Filters in Windows 2000 PSS ID Number: 296944 Article Last Modified on 10/28/2003 The information in this article applies to: l Microsoft Windows 2000 Server l Microsoft Windows 2000 Advanced Server This article was previously published under Q296944 IMPORTANT: This article contains information about modifying the registry. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base: 256986 Description of the Microsoft Windows Registry IN THIS TASK l SUMMARY l ¡ Overview ¡ Using Dfs File and Folder Filters ¡ Setting the File and Folder Filters on an FRS Replica in Active Directory ¡ n Setting Filters for Sysvol n Setting Filters for Dfs Replicas ¡ Using Registry Entries SUMMARY This article describes how to use file and folder filters for content that is replicated by the File Replication service (FRS). FRS is a multithreaded, multiple-master replication engine that replaces the LAN Manager Replication (LMREPL) service in Microsoft Windows NT versions 3.x and 4.0. Windows 2000-based domain controllers and servers use FRS to replicate system policies and logon scripts for Windows 2000-based and earlier clients. FRS can also replicate content between Windows 2000-based servers that host the same fault-tolerant distributed file system (Dfs) roots or child node replicas.
    [Show full text]
  • Windows Poster 20-12-2013 V3
    Microsoft® Discover the Open Specifications technical documents you need for your interoperability solutions. To obtain these technical documents, go to the Open Specifications Interactive Tiles: open specifications poster © 2012-2014 Microsoft Corporation. All rights reserved. http://msdn.microsoft.com/openspecifications/jj128107 Component Object Model (COM+) Technical Documentation Technical Documentation Presentation Layer Services Technical Documentation Component Object Model Plus (COM+) Event System Protocol Active Directory Protocols Overview Open Data Protocol (OData) Transport Layer Security (TLS) Profile Windows System Overview Component Object Model Plus (COM+) Protocol Active Directory Lightweight Directory Services Schema WCF-Based Encrypted Server Administration and Notification Protocol Session Layer Services Windows Protocols Overview Component Object Model Plus (COM+) Queued Components Protocol Active Directory Schema Attributes A-L Distributed Component Object Model (DCOM) Remote Protocol Windows Overview Application Component Object Model Plus (COM+) Remote Administration Protocol Directory Active Directory Schema Attributes M General HomeGroup Protocol Supplemental Shared Abstract Data Model Elements Component Object Model Plus (COM+) Tracker Service Protocol Active Directory Schema Attributes N-Z Peer Name Resolution Protocol (PNRP) Version 4.0 Windows Data Types Services General Application Services Services Active Directory Schema Classes Services Peer-to-Peer Graphing Protocol Documents Windows Error Codes ASP.NET
    [Show full text]
  • Windows Server 2008 and Windows Vista Ebook
    ● ● ● ● ● ● ● ● ● ● ● How to access your CD files The print edition of this book includes a CD. To access the CD files, go to http://aka.ms/625143/files, and look for the Downloads tab. Note: Use a desktop web browser, as files may not be accessible from all ereader devices. Questions? Please contact: [email protected] Microsoft Press PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2008 by Derek Melber All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Library of Congress Control Number: 2008920568 Printed and bound in the United States of America. 1 2 3 4 5 6 7 8 9 QWT 3 2 1 0 9 8 Distributed in Canada by H.B. Fenn and Company Ltd. A CIP catalogue record for this book is available from the British Library. Microsoft Press books are available through booksellers and distributors worldwide. For further infor- mation about international editions, contact your local Microsoft Corporation office or contact Microsoft Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/mspress. Send comments to [email protected]. Microsoft, Microsoft Press, Active Desktop, Active Directory, ActiveX, BitLocker, Excel, FrontPage, HotStart, InfoPath, Internet Explorer, NetMeeting, OneNote, Outlook, PowerPoint, SideShow, Visio, Visual Basic, Visual Studio, Windows, Windows Live, Windows Media, Windows NT, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
    [Show full text]
  • Windows Server Firewall Configuration
    Windows Server Firewall Configuration • Windows Server Firewall, page 1 • Cisco Firewall Configuration Utility Prerequisites, page 2 • Run Cisco Firewall Configuration Utility, page 2 • Verify New Windows Firewall Settings, page 3 • Windows Server Firewall Communication with Active Directory, page 4 • CiscoICMfwConfig_exc.xml File, page 7 • Windows Firewall Troubleshooting, page 8 Windows Server Firewall Windows Server 2008 R2 includes Windows Firewall. Windows Firewall is a stateful host firewall that drops all unsolicited incoming traffic. This behavior of Windows Firewall provides some protection from malicious users and programs that use unsolicited incoming traffic to attack computers. More information can be found in the Microsoft Windows Firewall Operations Guide at http:// technet.microsoft.com/en-us/library/cc739696(WS.10).aspx. If you are using IPsec, consult the Microsoft TechNet article, Managing IPSec and Multicast Settings, at http:/ /technet.microsoft.com/en-us/library/cc779589(WS.10).aspx. Note Windows Firewall is disabled by default on systems that have been upgraded to SP1. Systems that have a new installation of Windows Server 2008 R2 have Windows Firewall enabled by default. When you enable Windows Firewall on your servers, open all ports that the Unified ICM/Unified CCE components require. Cisco provides a utility to automatically allow all traffic from Unified ICM/Unified CCE applications on a Windows Server 2008 R2. Additionally, the utility can open ports for common third-party applications used in the Unified ICM/Unified CCE environment. The script reads the list of ports in the file %SYSTEMDRIVE%\CiscoUtils\FirewallConfig\CiscoICMfwConfig_exc.xml and uses the directive contained therein to modify the firewall settings.
    [Show full text]
  • RSA Envision™ Windows Agentless Collection Troubleshooting
    RSA enVision™ Windows Agentless Collection Troubleshooting Copyright © 1996 - 2007 RSA Security Inc. enVision, Enterprise Dashboard, and Internet Protocol Database (IPDB) are trademarks of RSA Security Inc. LogSmart is a registered trademark of RSA Security Inc. All other trademarks, service marks, registered trademarks, registered service marks mentioned in this document are the property of their respective owners. Information in this document is subject to change without notice. The software described in this document is furnished under a license agreement or nondisclosure agreement. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of RSA Security Inc. RSA Security Inc. 200 Lowder Brook Drive, Suite 2000 Westwood, MA 02090 U.S.A. 781.375.9000 Windows Agentless Collection Troubleshooting Overview of Windows Collection Process The NIC Windows Service allows the envision system to retrieve Windows logs from remote Windows systems without installing any third-party software (agentless Windows). You can also use third-party Windows collection applications to collect the Windows events. See Envision Help for third-party windows collection The NIC Windows Service converts these messages into syslog events and sends them via shared memory to the NIC Collector Service. The NIC Windows Service tracks which events were read by event log type and by system so that old log information is not re-polled. By default, the NIC Windows Service polls 3 NIC log files types (Application, System, Security,) (Directory Service, DNS Server, File Replication Service are available but not set as a default).
    [Show full text]
  • Offline Assessment for Active Directory Services
    Offline Assessment for Active Directory Prerequisites How to prepare for your Offline Assessment for Active Directory. The Tools machine is used to connect to each of your Domain Controllers (DCs) and retrieve information from them, communicating over Remote Procedure Call (RPC), Server Message Block (SMB), Lightweight Directory Access Protocol (LDAP) and Distributed Component Object Model (DCOM). All data collection and analysis is done locally Once the data is collected and the survey answered, the Offline Assessment tool will analyze on the tools machine. the data locally. At a high level, your steps to success are: No data is transported 1. Install prerequisites on your Tools machine and configure your environment outside your 2. Run discovery and prerequisites checks Active Directory 3. Collect data from your DCs environment to help 4. Complete the survey protect your A checklist of prerequisite actions follows. Each item links to any additional software required data. Your data is for the Tools machine, and detailed steps included later in this document. analyzed using our RAP expert system that is part of the Offline Checklist Assessment client. Please ensure the following items have been completed before starting your engagement. 1. General Use Internet connectivity is needed to: A Microsoft Account is required to activate and sign in to the portal to download the toolset. Activate your account If you don’t have one already, you can create one at http://login.live.com To learn more about Microsoft Accounts, see: http://windows.microsoft.com/en-US/ Download the windows-live/sign-in-what-is-microsoft-account toolset Ensure access to https://services.premier.microsoft.com This document was last updated October 04, 2016.
    [Show full text]
  • A Records, 244–245, 279 -A Switch in Nbtstat, 190 in Netstat, 186 AAS Deployment Package, 710 .Aas Extension, 712 Abstract
    22_InsideWin_Index 13/3/03 9:50 AM Page 1269 Index A A records, 244–245, 279 ACEs (Access Control Entries) -a switch access masks in, 568–570 in Nbtstat, 190 command-line tools for, 572–576 in Netstat, 186 for cumulative permissions, 577 AAS deployment package, 710 for deny permissions, 578 .aas extension, 712 inheritance in, 579–580, 725–728 Abstract classes, 299–300 object ownership in, 572 Accelerated Graphics Port (AGP) adapters, 164 viewing and modifying, 570–571 Access Control Entries. See ACEs (Access ACKs in DHCP, 101–102 Control Entries) ACL Editor, 570, 723 Access control lists (ACLs) Advanced view in Active Directory security, 732–734 for inheritance, 578, 581 objects in, 339 for ownership, 572 in security descriptors, 559 for special permissions, 723–724 Access Control Settings window, 728 Edit view, 725–726 Access masks for permissions inheritance, 578 in ACEs, 568–570 blocking, 579 in DSOs, 733 settings for, 581 Access requests in Kerberos, 621 viewings, 582 Access rights. See also Permissions ACLs (access control lists) in Active Directory security in Active Directory security, 732–734 delegation, 729–732 objects in, 339 types of, 724–725 in security descriptors, 559 for group policies, 682 ACPI (Advanced Configuration and Power Access tokens Interface) contents of, 560–561 compatibility of, 23–28, 148–149 local, 559 kernel version for, 135 SIDs in, 559, 561, 581 for PnP,17, 147–149 ACCM (Asynchronous-Control- ACPIEnable option, 149 Character-Map), 1124 Activation Account domain upgrades, 496–498 in IA64, 130 BDC, 494–496 in installation, 49–50 PDC, 490–493 unattended setup scripts for, 95 Account lockout policies Active Directory, 238 in domain design, 429 bulk imports and exports in, 353–356 in password security, 593–594 DNS deployment in, 242–243 Account logons, auditing, 647 DNS integration in, 238–239 Account management, auditing, 511, 648 dynamic updates, 244–245 Accounts in domain migration.
    [Show full text]
  • Microsoft Windows Common Criteria Evaluation Security Target
    Microsoft Common Criteria Security Target Microsoft Windows Common Criteria Evaluation Microsoft Windows 10 (Fall Creators Update) Microsoft Windows Server (Fall Creators Update) Security Target Document Information Version Number 0.04 Updated On March 23, 2018 Microsoft © 2018 Page 1 of 104 Microsoft Common Criteria Security Target Version History Version Date Summary of changes 0.01 January 27, 2018 Initial draft 0.02 February 24, 2018 Updates from security target evaluation 0.03 March 23, 2018 Updates from assurance activity evaluation 0.04 April 19, 2018 Prepared copy for publication Microsoft © 2018 Page 2 of 104 Microsoft Common Criteria Security Target This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs- NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.
    [Show full text]
  • Microsoft Certification Exam 74-409: Server Virtualization with Windows Server Hyper-V and System Center
    Microsoft Certification Exam 74-409: Server Virtualization with Windows Server Hyper-V and System Center Study Guide by Orin Thomas Exam 74-409 Server Virtualization with Windows Server Hyper-V and System Center Contents Chapter 1: Virtual Machine Settings . 7 Configure dynamic memory . 7. Configure smart paging . 9. Configure resource metering . 11 Configure guest integration services . 11 Create and configure generation 1 and generation 2 virtual machines . 13 Configure and use Enhanced Session Mode . 14 Configure RemoteFX . 16 Summary . 16 Review . 17 Chapter 2: Virtual Machine Storage . 18 Creating virtual hard disks in VHD and VHDx format . 19 Configuring differencing drives . 21 Modifying virtual hard disks . 22 Configuring pass-through disks . 24 Managing checkpoints . 26 Implementing virtual Fibre Channel adapters . 27 Configuring Storage Quality of Service . 28 Configuring Hyper-V host clustered storage . 29 Configuring guest cluster storage . 30 Planning for storage optimization . 32 Deduplication . 32. Storage tiering . 34. Review . 35 2 Exam 74-409 Server Virtualization with Windows Server Hyper-V and System Center Chapter 3: Hyper-V Virtual Networks and Virtualization Networking . 36 Hyper-V virtual switches . 36 Optimizing network performance . 39 Virtual machine MAC addresses . 42 Configuring network isolation . 44 Virtual machine network adapters . 45 Virtual machine NIC teaming . 47 VMM logical networks . 49 VMM port profiles and logical switches . 50 Network Virtualization . 52 VMM virtual machine networks . 53 VMM MAC and IP address pools . 53 Windows Server Gateway . 55 Private Virtual Local Area Networks . 56 Review . 57 Chapter 4: Implementing Virtual Machines . 58 Highly available virtual machines . 58 Guest resource optimization . 61 Intelligent placement . 61. Dynamic optimization .
    [Show full text]
  • Windows Server 2003 Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Security Settings for Domain Controllers
    Windows Server 2003 Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Security Settings for Domain Controllers Version 2.0 November 2007 Copyright ©2007, The Center for Internet Security http://www.cisecurity.org Editors: Jeff Shawgo Sidney Faber Collin Greene [email protected] The Center for Internet Security Table of Contents Table of Contents ....................................................................................................................2 Terms of Use Agreement ........................................................................................................3 Quick Start Instructions ..........................................................................................................6 For The Seasoned Security Professional ........................................................................... 6 For the Windows User Seeking Enlightenment ................................................................. 6 Windows Server 2003 – Domain Controller Benchmark .......................................................7 Intended Audience ..................................................................................................................7 Practical Application ...............................................................................................................7 Keeping Score .........................................................................................................................8 Security Levels........................................................................................................................9
    [Show full text]
  • Management Through Firewalls in Relation to Microsoft NT and Windows 2000
    Management through firewalls in relation to Microsoft NT and Windows 2000 Claus Jespersen Hewlett-Packard A/S Vestre Kongevej 4-6 DK-8260 Viby J Denmark Direct: (45) 4599 1829 Fax: (45) 8733 1888 e-mail: Mobile: (45) 4060 1829 [email protected] Solution Architect OpenView/Internet specialist Prepared by: Claus Jespersen Solution Architect Openview/Internet specialist Date Prepared: Februar 2000 Windows 2000 management Management through firewalls in relation to Microsoft NT and Windows 2000 ÿ Document Information Project Name: Management through firewalls in relation to Windows 2000 Project Manager: Document Version No: 1.0 FocusPM Phase: Document Version Date: 17. February 2000 Quality Review Method: Prepared By: Claus Jespersen Preparation Date: 17. February 2000 Reviewed By: Review Date: Distribution List From Date Phone/Fax Claus Jespersen, Hewlett-Packard Denmark, 17. February +4545991829 [email protected] 2000 To Action* Due Date Phone/Fax * Action Types: Approve, Review, Inform, File, Action Required, Attend Meeting, Other (please specify) Version History Ver. No. Ver. Date Revised By Description Filename 1.0 17. First finished version after a few drafts win2kfwmgt-v1.0.doc February 2000 FocusPM White paper by Claus Jespersen, HP Denmark Page2of2 Template (3 /2-Apr-1999) win2kfwmgt-v1.0 Last printed 16-Feb-00 21:58 Windows 2000 management Management through firewalls in relation to Microsoft NT and Windows 2000 ÿ 1. Proprietary Notice..............................................................................................................................................7
    [Show full text]
  • Copyrighted Material
    Contents Introduction ....................................................................... xxix Chapter 1 • What’s New in Windows Server 2008 and 2008 R2 . 1. Server 2008 and R2 Goals . 1 AD Changes . .2 Read-Only Domain Controllers . 2 New Windows Backup . 2 Fine-Grained Password Policies . 3 PowerShell and AD Administrative Center . 4 DCPromo Improvements . 5 OS Changes Under the Hood . .5 R2 Is 64-Bit Only . .6 Server Core . 6 Hyper-V . 7 Networking Changes . 8 TCP . 8 Network Access Protection (NAP) . 9 Secure Socket Tunneling Protocol (SSTP) VPN . .9 New Setup Technologies . .9 New Management Tools . 10 Server Manager . 10 The New Remote Tools: WinRM and WinRS . 11 Remote Desktop Services: Terminal Services with a New Name and New Features . 11 New Group Policies and Tools . 12 New Event Viewer . 12 File and Print Sharing . 13 SMB 2 0. 13 More Reliable SYSVOL Replication . 13 Print Management Console and Printer Driver Isolation . .13 Web-Based Services . 14 Web Server (IIS) . 14 FTPCOPYRIGHTED Server . MATERIAL. .15 Windows Server Update Services (WSUS) . 15 Chapter 2 • Installing and Upgrading to Windows Server 2008 R2 . 1. 7 What Has Changed Since 2000 and 2003? . .17 The Media . .18 Installation Requirements . 19 64-bit Support . 21 32867ftoc.indd 11 12/14/09 3:16:19 PM XII | CONTENTS Installing the Operating System . .22 Performing a Clean Installation . .23 Performing an Upgrade Installation . .33 Initial Configuration Tasks Utility . .46 Using Server Manager to Configure Your Servers . 47 Changes to Server Manager . 49 Common Configuration Tasks . 50 Adding and Removing Roles . .58 Troubleshooting Roles and Features . 78 Remote Management . 80 Wrapping Up Server Manager .
    [Show full text]