Wireless Hacking Projects for Wi-Fi Enthusiasts.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Wireless Hacking Projects for Wi-Fi Enthusiasts.Pdf 308_WiFi_Hack_FM.qxd 10/1/04 10:37 AM Page i Register for Free Membership to [email protected] Over the last few years, Syngress has published many best-selling and critically acclaimed books, including Tom Shinder’s Configuring ISA Server 2000, Brian Caswell and Jay Beale’s Snort 2.0 Intrusion Detection, and Angela Orebaugh and Gilbert Ramirez’s Ethereal Packet Sniffing. One of the reasons for the success of these books has been our unique [email protected] program. Through this site, we’ve been able to provide readers a real time extension to the printed book. As a registered owner of this book, you will qualify for free access to our members-only [email protected] program. Once you have registered, you will enjoy several benefits, including: I Four downloadable e-booklets on topics related to the book. Each booklet is approximately 20-30 pages in Adobe PDF format. They have been selected by our editors from other best-selling Syngress books as providing topic coverage that is directly related to the coverage in this book. I A comprehensive FAQ page that consolidates all of the key points of this book into an easy to search web page, pro- viding you with the concise, easy to access data you need to perform your job. I A “From the Author” Forum that allows the authors of this book to post timely updates links to related sites, or addi- tional topic coverage that may have been requested by readers. Just visit us at www.syngress.com/solutions and follow the simple registration process. You will need to have this book with you when you register. Thank you for giving us the opportunity to serve your needs. And be sure to let us know if there is anything else we can do to make your job easier. 308_WiFi_Hack_FM.qxd 10/1/04 10:37 AM Page ii 308_WiFi_Hack_FM.qxd 10/1/04 10:37 AM Page iii WIRELESS HACKING Projects for Wi-Fi Enthusiasts By the SoCalFreeNet.org Wireless Users Group Lee Barken with Eric Bermel, John Eder, Matthew Fanady Michael Mee, Marc Palumbo, Alan Koebrick 308_WiFi_Hack_FM.qxd 10/1/04 10:37 AM Page iv Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or conse- quential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™, “Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. KEY SERIAL NUMBER 001 HJCV184764 002 PO5FGHJ887 003 82JH26765V 004 VBHF43299M 005 C23NMVCXZ3 006 VB5T883E4F 007 HJJ3EBNBB6 008 2987GMKKMM 009 629JT5678N 010 IMWT6T3456 PUBLISHED BY Syngress Publishing, Inc. 800 Hingham Street Rockland, MA 02370 Wireless Hacking: Projects for Wi-Fi Enthusiasts Copyright © 2004 by Syngress Publishing, Inc.All rights reserved. Printed in the United States of America. Except as per- mitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication. Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 ISBN: 1-931836-37-X Publisher:Andrew Williams Page Layout and Art: Patricia Lupien Acquisitions Editor: Christine Kloiber Copy Editor: Mike McGee Technical Editor: Lee Barken Indexer: Odessa&Cie Cover Designer: Michael Kavish Distributed by O’Reilly Media, Inc. in the United States and Canada. For information on rights and translations, contact Matt Pedersen, Director of Sales and Rights, at Syngress Publishing; email [email protected] or fax to 781-681-3585. 308_WiFi_Hack_FM.qxd 10/1/04 10:37 AM Page v Acknowledgments Syngress would like to acknowledge the following people for their kindness and support in making this book possible. Syngress books are now distributed in the United States and Canada by O’Reilly Media, Inc.The enthusiasm and work ethic at O’Reilly is incredible and we would like to thank everyone there for their time and efforts to bring Syngress books to market:Tim O’Reilly, Laura Baldwin, Mark Brokering, Mike Leonard, Donna Selenko, Bonnie Sheehan, Cindy Davis, Grant Kikkert, Opol Matsutaro, Steve Hazelwood, Mark Wilson, Rick Brown, Leslie Becker, Jill Lothrop,Tim Hinton, Kyle Hart, Sara Winge, C. J. Rayhill, Peter Pardo, Leslie Crandell, Valerie Dow, Regina Aggio, Pascal Honscher, Preston Paull, Susan Thompson, Bruce Stewart, Laura Schmier, Sue Willing, Mark Jacobsen, Betsy Waliszewski, Dawn Mann, Kathryn Barrett, John Chodacki, and Rob Bullington. The incredibly hard working team at Elsevier Science, including Jonathan Bunkell, Ian Seager, Duncan Enright, David Burton, Rosanna Ramacciotti, Robert Fairbrother, Miguel Sanchez, Klaus Beran, Emma Wyatt, Rosie Moss, Chris Hossack, Mark Hunt, and Krista Leppiko, for making certain that our vision remains worldwide in scope. David Buckland, Marie Chieng, Lucy Chong, Leslie Lim,Audrey Gan, Pang Ai Hua, and Joseph Chan of STP Distributors for the enthusiasm with which they receive our books. Kwon Sung June at Acorn Publishing for his support. David Scott,Tricia Wilden, Marilla Burgess, Annette Scott, Andrew Swaffer, Stephen O’Donoghue, Bec Lowe, and Mark Langley of Woodslane for distributing our books throughout Australia, New Zealand, Papua New Guinea, Fiji Tonga,Solomon Islands, and the Cook Islands. Winston Lim of Global Publishing for his help and support with distribution of Syngress books in the Philippines. v 308_WiFi_Hack_FM.qxd 10/1/04 10:37 AM Page vi 308_WiFi_Hack_FM.qxd 10/1/04 10:37 AM Page vii Technical Editor & Contributor Lee Barken CISSP,CCNA, MCP,CPA, is the co-director of the Strategic Technologies And Research (STAR) Center at San Diego State University (SDSU) and the President and co-founder of SoCalFreeNet.org, a non-profit community group dedicated to building public wireless networks. Prior to SDSU, he worked as an IT consultant and network security specialist for Ernst & Young’s Information Technology Risk Management (ITRM) practice and KPMG’s Risk and Advisory Services (RAS) practice. Lee is the technical editor for Mobile Business Advisor Magazine, and writes and speaks on the topic of wireless LAN technology and security. He is the author of How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN (ISBN 0131402064) and co-author of Hardware Hacking: Have Fun While Voiding Your Warranty (ISBN 1932266836). Lee is the author of Chapter 1 “A Brief Overview of the Wireless World,” Chapter 2 “SoCalFreeNet.org:An Example of Building Large Scale Community Wireless Networks,” Chapter 4 “Wireless Access Points,” Chapter 8 “Low-Cost Commercial Options,” and Appendix A “Wireless 802.11 Hacks.” “The most precious possession that ever comes to a man in this world is a woman’s heart.” —Josiah G. Holland To the love of my life, Stephanie: Thank you for your never-ending love and encouragement. vii 308_WiFi_Hack_FM.qxd 10/1/04 10:37 AM Page viii Contributors Eric Bermel is an RF Engineer and Deployment Specialist. He has many years of experience working for companies such as Graviton, Western US, Breezecom, Alvarion, and PCSI. Eric has extensive experience developing and implementing RF site surveys, installation and optimization plans for indoor and outdoor ISM and U-NII band systems. Eric is the author of Chapter 10 “Antennas.” John Eder (CISSP,CCNA) is a security expert with Experian. He currently pro- vides strategic and technical consulting on security policy and implementation. His specialties involve: risk profiling, wireless security, network security, encryption technologies, metrics development and deployment, and risk analysis. John’s back- ground includes a position as a consultant in the Systems and Technology Services (STS) practice at Ernst & Young,LLP. John holds a bachelor’s degree from San Diego State University. He actively participates in the security community, making presentations and writing numerous articles on wireless security. John is a proud member of SoCalFreeNet. John enjoys the support of his loving wife Lynda, a caring family (Gabriel, Lyn, and Genevieve), and a great friendship with his director, Michael Kurihara.The security information in this book was made possible through the help of the m0n0wall team, the Soekris Engineering team, the West Sonoma County Internet Cooperative Corporation, and the many members of SoCalFreeNet. John is the author of Chapter 3 “Securing Our Wireless Community.” Matthew Fanady is a gear-head turned networking and computer enthusiast, and has been wrenching on cars and building computers since he was 16 years old. He is currently employed designing and constructing electric vehicles for a small startup company in San Diego, and spends his free time troubleshooting computers and exploring new ways to incorporate the latest communications technologies into everyday life.
Recommended publications
  • The Child As Hacker: Building More Human-Like Models of Learning by Joshua S
    The child as hacker: Building more human-like models of learning by Joshua S. Rule Submitted to the Department of Brain and Cognitive Sciences in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Cognitive Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY September 2020 © Massachusetts Institute of Technology 2020. All rights reserved. Author...................................................................... Department of Brain and Cognitive Sciences September 5, 2020 Certified by. Joshua B. Tenenbaum Professor of Computational Cognitive Science Thesis Supervisor Accepted by................................................................. Rebecca Saxe John W. Jarve (1978) Professor of Brain and Cognitive Sciences Associate Head, Department of Brain and Cognitive Sciences Affiliate, McGovern Institute for Brain Science Chairman, Department Committee on Graduate Theses 2 The child as hacker: Building more human-like models of learning by Joshua S. Rule Submitted to the Department of Brain and Cognitive Sciences on September 5, 2020, in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Cognitive Science Abstract Cognitive science faces a radical challenge in explaining the richness of human learning and cognitive development. This thesis proposes that developmental theories can address the challenge by adopting perspectives from computer science. Many of our best models treat learning as analogous to computer programming because symbolic programs provide the most compelling account of sophisticated mental representations. We specifically propose that learning from childhood onward is analogous to a style of programming called hacking— making code better along many dimensions through an open-ended and internally-motivated set of diverse values and activities. This thesis also develops a first attempt to formalize and assess the child as hacker view through an in-depth empirical study of human and machine concept learning.
    [Show full text]
  • Building a Beowulf Cluster
    Building a Beowulf cluster Åsmund Ødegård April 4, 2001 1 Introduction The main part of the introduction is only contained in the slides for this session. Some of the acronyms and names in this paper may be unknown. In Appendix B we includ short descriptions for some of them. Most of this is taken from “whatis” [6] 2 Outline of the installation ² Install linux on a PC ² Configure the PC to act as a install–server for the cluster ² Wire up the network if that isn’t done already ² Install linux on the rest of the nodes ² Configure one PC, e.g the install–server, to be a server for your cluster. These are the main steps required to build a linux cluster, but each step can be done in many different ways. How you prefer to do it, depends mainly on personal taste, though. Therefor, I will translate the given outline into this list: ² Install Debian GNU/Linux on a PC ² Install and configure “FAI” on the PC ² Build the “FAI” boot–floppy ² Assemble hardware information, and finalize the “FAI” configuration ² Boot each node with the boot–floppy ² Install and configure a queue system and software for running parallel jobs on your cluster 3 Debian The choice of Linux distribution is most of all a matter of personal taste. I prefer the Debian distri- bution for various reasons. So, the first step in the cluster–building process is to pick one of the PCs as a install–server, and install Debian onto it, as follows: ² Make sure that the computer can boot from cdrom.
    [Show full text]
  • Hacker's Handbook Ok Just a Quick Note, This Is a Very Early Version of the Book and Was Later Banned
    Hacker's Handbook Ok just a quick note, this is a very early version of the book and was later banned. We've done our best in converting it to ASCII. It's taken us some time to put it together because of the reformatting, so I hope it's appreciated. We have kept to the original page numbering for so that the index will be correct. Compliments Electronic Images - Gizmo Century Communications - T H E - - H A C K E R ' S - - H A N D B O O K - Copyright (c) Hugo Cornwall All rights reserved First published in Great Britain in 1985 by Century Communications Ltd Portland House, 12-13 Greek Street, London W1V 5LE. Reprinted 1985 (four times) ISBN 0 7126 0650 5 Printed and bound in Great Britain by Billing & Sons Limited, Worcester. CONTENTS Introduction vii First Principles 2 Computer-to-computer communications 7 3 Hackers' Equipment 15 4 Targets: What you can find on mainframes 30 5 Hackers' Intelligence 42 6 Hackers' Techniques 57 7 Networks 69 8 Viewdata systems 86 9 Radio computer data 99 10 Hacking: the future 108 file:///E|/Books/Hackers Handbook.htm (1 of 133) [11/28/2000 5:58:48 AM] Hacker's Handbook Appendices I troubleshooting 112 II Glossary 117 III CCITT and related standards 130 IV Standard computer alphabets 132 V Modems 141 VI Radio Spectrum 144 VII Port-finder flow chart 148 INTRODUCTION The word 'hacker' is used in two different but associated ways: for some, a hacker is merely a computer enthusiast of any kind, who loves working with the beasties for their own sake, as opposed to operating them in order to enrich a company or research project --or to play games.
    [Show full text]
  • Dwarf's Guide to Debian GNU/Linux
    Dwarf’s Guide to Debian GNU/Linux 2001 Dale Scheetz Dwarf’s Guide to Debian GNU/Linux Copyright c 2001 Dale Scheetz Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with the Invariant Sections being Chapter 1 Introduction, with no Front-Cover Texts, and with the Back-Cover Texts being “The early development of the material in this work was produced with the financial support of Planet Linux. This support was intrumental in bringing this project to completion.” A copy of the license is included in the section entitled “Appendix 9: GNU Free Documentation License” which can be found on page 271. Trademark Acknowledgements All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. The publisher cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Apple and Macintosh are registered trademarks of Apple Computer, Inc. CP/M is a registered trademark of Caldera, Inc. IBM is a registered trademark of International Business Machines, Inc. MS is a trademark of Microsoft Corporation. Windows is a trademark of Microsoft Corporation. X Window System is a registered trademark of X Consortium, Inc. ii dedicated to Linux users everywhere iii CREDITS First I want to thank Ian Murdock for writing the History section. His per- spectives on those early years have helped latecomers like Dwarf understand the founding principles upon which Debian is based.
    [Show full text]
  • The DIY Careers of Techno and Drum 'N' Bass Djs in Vienna
    Cross-Dressing to Backbeats: The Status of the Electroclash Producer and the Politics of Electronic Music Feature Article David Madden Concordia University (Canada) Abstract Addressing the international emergence of electroclash at the turn of the millenium, this article investigates the distinct character of the genre and its related production practices, both in and out of the studio. Electroclash combines the extended pulsing sections of techno, house and other dance musics with the trashier energy of rock and new wave. The genre signals an attempt to reinvigorate dance music with a sense of sexuality, personality and irony. Electroclash also emphasizes, rather than hides, the European, trashy elements of electronic dance music. The coming together of rock and electro is examined vis-à-vis the ongoing changing sociality of music production/ distribution and the changing role of the producer. Numerous women, whether as solo producers, or in the context of collaborative groups, significantly contributed to shaping the aesthetics and production practices of electroclash, an anomaly in the history of popular music and electronic music, where the role of the producer has typically been associated with men. These changes are discussed in relation to the way electroclash producers Peaches, Le Tigre, Chicks on Speed, and Miss Kittin and the Hacker often used a hybrid approach to production that involves the integration of new(er) technologies, such as laptops containing various audio production softwares with older, inexpensive keyboards, microphones, samplers and drum machines to achieve the ironic backbeat laden hybrid electro-rock sound. Keywords: electroclash; music producers; studio production; gender; electro; electronic dance music Dancecult: Journal of Electronic Dance Music Culture 4(2): 27–47 ISSN 1947-5403 ©2011 Dancecult http://dj.dancecult.net DOI: 10.12801/1947-5403.2012.04.02.02 28 Dancecult 4(2) David Madden is a PhD Candidate (A.B.D.) in Communications at Concordia University (Montreal, QC).
    [Show full text]
  • Partition.Pdf
    Linux Partition HOWTO Anthony Lissot Revision History Revision 3.5 26 Dec 2005 reorganized document page ordering. added page on setting up swap space. added page of partition labels. updated max swap size values in section 4. added instructions on making ext2/3 file systems. broken links identified by Richard Calmbach are fixed. created an XML version. Revision 3.4.4 08 March 2004 synchronized SGML version with HTML version. Updated lilo placement and swap size discussion. Revision 3.3 04 April 2003 synchronized SGML and HTML versions Revision 3.3 10 July 2001 Corrected Section 6, calculation of cylinder numbers Revision 3.2 1 September 2000 Dan Scott provides sgml conversion 2 Oct. 2000. Rewrote Introduction. Rewrote discussion on device names in Logical Devices. Reorganized Partition Types. Edited Partition Requirements. Added Recovering a deleted partition table. Revision 3.1 12 June 2000 Corrected swap size limitation in Partition Requirements, updated various links in Introduction, added submitted example in How to Partition with fdisk, added file system discussion in Partition Requirements. Revision 3.0 1 May 2000 First revision by Anthony Lissot based on Linux Partition HOWTO by Kristian Koehntopp. Revision 2.4 3 November 1997 Last revision by Kristian Koehntopp. This Linux Mini−HOWTO teaches you how to plan and create partitions on IDE and SCSI hard drives. It discusses partitioning terminology and considers size and location issues. Use of the fdisk partitioning utility for creating and recovering of partition tables is covered. The most recent version of this document is here. The Turkish translation is here. Linux Partition HOWTO Table of Contents 1.
    [Show full text]
  • IBM Tivoli Storage Resource Manager: Messages Preface
    IBM Tivoli Storage Resource Manager Messages Version 1 Release 2 SC32-9079-00 IBM Tivoli Storage Resource Manager Messages Version 1 Release 2 SC32-9079-00 Note! Before using this information and the product it supports, be sure to read the general information under “Notices”, on page 119. Second Edition (April 2003) | This edition applies to Version 1 Release 2 of the IBM Tivoli Storage Resource Manager (product numbers | 5698-SRM, 5698-SRC, and 5698-SRD) and to any subsequent releases until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2003. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Preface ...............v Getting help ..............1 IBM Tivoli Storage Resource Manager Publications . v IBMLink Assistance ...........1 || Related Publications ...........v Describing an error with keywords ......2 IBM International Technical Support Center Publications (Redbooks) ..........vi Chapter 2. Messages .........5 IBM Tivoli Storage Resource Manager Web Site . vi Translations ..............vi Appendix. Notices .........119 Contacting customer support ........vi Trademarks ..............120 Reporting a problem ..........vii Glossary .............123 Chapter 1. Introduction ........1 Understanding messages ..........1 © Copyright IBM Corp. 2003 iii iv IBM Tivoli Storage Resource Manager: Messages Preface This publication contains explanations and suggested actions for messages issued
    [Show full text]
  • Protection Handbook
    1 YEAR UPGRADE BUYER PROTECTION PLAN E-MAIL VIRUS PROTECTION HANDBOOK FREE Monthly “The E-mail Virus Protection Handbook is the only book that shows you what might Technology Updates be lurking in your e-mail. It's our e-mail Bible and it should be yours!” One-year Vendor —Brad Goodyear, Product Upgrade President Protection Plan www.virus.com FREE Membership to Access.Globalknowledge Brian Bagnall, Sun Certified Java Programmer and Developer Chris O. Broomes, MCSE, MCP+I, CCNA Ryan Russell, CCNP, and author of the best-selling Hack Proofing Your Network Technical Editor: James Stanger, MCSE, MCT, CIW Security Professional 119_email_FM 10/6/00 12:07 AM Page 1 [email protected] With over 1,500,000 copies of our MCSE, MCSD, CompTIA, and Cisco study guides in print, we have come to know many of you personally. By listening, we've learned what you like and dislike about typical computer books. The most requested item has been for a web-based service that keeps you current on the topic of the book and related technologies. In response, we have created [email protected], a service that includes the following features: I A one-year warranty against content obsolescence that occurs as the result of vendor product upgrades. We will provide regular web updates for affected chapters. I Monthly mailings that respond to customer FAQs and provide detailed explanations of the most difficult topics, written by content experts exclusively for [email protected]. I Regularly updated links to sites that our editors have determined offer valuable additional information on key topics.
    [Show full text]
  • Red Hat Linux 7.3 the Official Red Hat Linux X86
    Red Hat Linux 7.3 The Official Red Hat Linux x86 Installation Guide Red Hat Linux 7.3: The Official Red Hat Linux x86 Installation Guide Copyright © 2002 by Red Hat, Inc. Red Hat, Inc. 1801 Varsity Drive Raleigh NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park NC 27709 USA rhl-ig-x86(EN)-7.3-HTML-RHI (2002-04-05T13:43-0400) Copyright © 2002 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of the work or derivative of the work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. The admonition graphics (note, tip, and so on) were created by Marianne Pecci <[email protected]>. They may be redistributed with written permission from Marianne Pecci and Red Hat, Inc.. Red Hat, Red Hat Network, the Red Hat "Shadow Man" logo, RPM, Maximum RPM, the RPM logo, Linux Library, PowerTools, Linux Undercover, RHmember, RHmember More, Rough Cuts, Rawhide and all Red Hat-based trademarks and logos are trademarks or registered trademarks of Red Hat, Inc. in the United States and other countries. Linux is a registered trademark of Linus Torvalds. Motif and UNIX are registered trademarks of The Open Group.
    [Show full text]
  • Linux Professional Institute Tutorials LPI Exam 101 Prep: Hardware and Architecture Junior Level Administration (LPIC-1) Topic 101
    Linux Professional Institute Tutorials LPI exam 101 prep: Hardware and architecture Junior Level Administration (LPIC-1) topic 101 Skill Level: Introductory Ian Shields ([email protected]) Senior Programmer IBM 08 Aug 2005 In this tutorial, Ian Shields begins preparing you to take the Linux Professional Institute® Junior Level Administration (LPIC-1) Exam 101. In this first of five tutorials, Ian introduces you to configuring your system hardware with Linux™. By the end of this tutorial, you will know how Linux configures the hardware found on a modern PC and where to look if you have problems. Section 1. Before you start Learn what these tutorials can teach you and how you can get the most from them. About this series The Linux Professional Institute (LPI) certifies Linux system administrators at two levels: junior level (also called "certification level 1") and intermediate level (also called "certification level 2"). To attain certification level 1, you must pass exams 101 and 102; to attain certification level 2, you must pass exams 201 and 202. developerWorks offers tutorials to help you prepare for each of the four exams. Each exam covers several topics, and each topic has a corresponding self-study tutorial on developerWorks. For LPI exam 101, the five topics and corresponding developerWorks tutorials are: Hardware and architecture © Copyright IBM Corporation 1994, 2008. All rights reserved. Page 1 of 43 developerWorks® ibm.com/developerWorks Table 1. LPI exam 101: Tutorials and topics LPI exam 101 topic developerWorks tutorial Tutorial summary Topic 101 LPI exam 101 prep (topic (This tutorial). Learn to 101): configure your system Hardware and architecture hardware with Linux.
    [Show full text]
  • The Linux System Administrators' Guide
    The Linux System Administrators’ Guide Version 0.6.1 Lars Wirzenius <[email protected]> The Linux System Administrators’ Guide: Version 0.6.1 by Lars Wirzenius An introduction to system administration of a Linux system for novices. Copyright 1993–1998 Lars Wirzenius. Trademarks are owned by their owners. Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to process the document source code through TeX or other formatters and print the results, and distribute the printed document, provided the printed document carries copying permission notice identical to this one, including the references to where the source code can be found and the official home page. Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another language, under the above conditions for modified versions. The author would appreciate a notification of modifications, translations, and printed versions. Thank you. Table of Contents Dedication...................................................................................................................................................7 Source and pre-formatted versions available..........................................................................................8
    [Show full text]
  • La Clé Des Champs Urbains En Gironde
    SPIL a c l é d e s c h a m pRIT s u r b a i n s e n G i r o n d e 20 #26 Jan 2007 07GRATUIT Jan #26 In memoriam : James Brown (1928 ? 1933 ? 2006) Plaît-il? L’œil en faim Magasinage 04 « La boussole doit rester le dépassement du 12 Guadalupe Echevarria raconte les 20 Belle aux sports d’hivers, c’est possible. capitalisme. » Jean-Marie Harribey Beaux-Arts. Bruit du Frigo repense l’urbain. Mais vivre sans acheter de vêtements... Sono En garde! Tables & Comptoirs 06 Le souffle italien d’Enrico Rava saura-t-il 14 Parce qu’il reste toujours 22 Des tables chic et raffinées, des goups rivaliser avec le jeu de guitare du geogien assez d’argent pour la belle de gueule et un infâme ragoût de pie ! Russell Malone ? mais exigente sélection mensuelle. Cours & Jardins Formes Agenda & Peti’potin 08 Eric Chevance se livre, Xavier Boussiron 18 A la recherche du vintage. 24 Un truc utile pour sacrifier aussi. On danse en Gironde ce mois-ci. Des facteurs d’orgue, kesako ? à la civilisation des loisirs. Et le carnet mondain d’Yves-Noël Genod. Spirit Gironde est publié par Directeur de la publication : Rédaction : Nadège Alezine, Luc Bourousse, José Darroquy (Jean-Marie Harribey), Régie publicitaire : Dépôt légal à parution PROXIMÉDIA José Darroquy Cécile Broqua, Emmanuelle Debur, Isabelle Marc Domage (Yves-Noël Genod), PUB.L.I.C © Spirit Gironde 2007 31-33, rue Buhan Directeur associé : Cristian Tripard Jelen, Serge Latapy, Philippe-Henri Martin, Isabelle Jelen (La main à la pâte), McLaughin 05 56 520 994 - Fax 05 56 52 12 98 Impression : Rotimpres 33 000 Bordeaux Rédacteur en chef : Marc Bertin Florent Mazzoleni, Céline Musseau, José Ruiz, (Entertaining the boys with fancy dancing on [email protected] ISSN 1954-1155 Fax : 05 56 52 12 98 Tél.
    [Show full text]