Bonus Content

Total Page:16

File Type:pdf, Size:1020Kb

Bonus Content 0672328755_Bonus_Overview.qxd 6/27/06 5:09 PM Page 1 FreeBSD 6 Unleashed Michael Urban Brian Tiemann ISBN: 0-672-32875-5 Copyright © 2006 by Sams Publishing www.samspublishing.com BONUS CONTENT Chapter 30 Network Security PDF:799 Chapter 31 Virtual Private Networks (VPNs) PDF:845 Chapter 32 The Domain Name Server PDF:861 Chapter 33 The Network Filesystem (NFS) PDF:883 Chapter 34 File and Print Sharing with Microsoft Windows PDF:895 Chapter 35 Dynamic Host Configuration Protocol (DHCP) PDF:911 Appendix A Command Reference and Configuration File Reference PDF:921 Appendix B Hardware Compatibility Lists PDF:929 Appendix C Troubleshooting Installation and Boot Problems PDF:945 Appendix D Sources for More Information PDF:951 36_0672328755_ch30.qxd 5/9/06 4:51 PM Page 799 CHAPTER 30 IN THIS CHAPTER • Choosing a Security Model Network Security Based on Your Security Risks • Security Models • The Security Risks You Face System security is arguably the most important part of any administrator’s job, whether it applies to a Windows • Password Policies server, a commercial UNIX system, Linux, or FreeBSD. More • Avoiding Problems with books have probably been written about security issues Clear-Text Services than about any other topic—and with good reason. It’s an immensely complex subject, but one that’s crucially impor- • Securing Terminal Traffic (SSH) tant to the success of a networked system. Although this • Securing Email Services (POP3 chapter can’t cover every facet of system security, it offers a good, general overview of the topic and includes informa- and IMAP) tion on all critical aspects of the topic. • Securing FTP This chapter helps you develop a security policy for your • Securing Apache FreeBSD system based on the risk factors it faces in its role as a server or workstation. This chapter will give you the • System Security Profiles and tools you need to monitor your system’s perimeter, keep on Kernel Security (Securelevels) top of alerts that are raised in the field, patch your system • Using a Firewall in response to those alerts, and make sure the services you provide to your users are not opening your system up to • Preventing Intrusions and attack. It also gives you some idea of what you can do to Compromises recover when—not if—your machine is hacked. • Denial of Service (DOS) Choosing a Security Model Based on Attacks Your Security Risks • Physical Security The Internet today is not an especially friendly place for • Other Security Resources servers, and as an administrator you must always fear and prepare for the worst. The proliferation of “rootkit” tools— prepackaged weapons that attackers can use to gain super- user access to your system—and published attack scripts provides unfortunate fodder for countless individuals with nothing better to do than pursue destructive hobbies. You must assume that your system is being probed for security weaknesses at all times and expect the situation to grow more dangerous with each new published exploit. Your 36_0672328755_ch30.qxd 5/9/06 4:51 PM Page 800 800 CHAPTER 30 Network Security only defense is to keep your system as up to date as possible, act on new security advi- sories as soon as they’re released, run only what services are necessary, and be educated about the real dangers that threaten your system and where the greatest risks lie. Security Models You can adopt one of several models of security for your system, based on your system’s setup and use patterns and your philosophy toward the security needs the system presents. The security model you choose will dictate how careful you must be about certain administrative duties, such as password policies, open services, encrypted traffic, and so on. Here’s a short list of some security models, each defined by a general statement that sums up the administrator’s assessment of security risks: • I trust everybody on the Internet. Most certainly an inadvisable model under any circumstances, this is nonetheless the philosophy that guides the lack of security safeguards surrounding many amateur servers, and the administrators of those systems—who seldom maintain them properly—ultimately pay the price for it. Often found on university systems, especially those that have been around since before the Internet became so rich in hacker activity, systems administered with this philosophy have many open services, don’t require encrypted logins, have loose account and password policies, and are easy targets for hack attacks. • I trust anybody on my system’s network. This philosophy is common in small enter- prise networks where the server is protected from the general Internet by a firewall or NAT router, and the internal network is made up of employees of a single company or department at a university. In this model, malicious users on the inter- nal network are rare, especially if the organization is small, so the system can afford to provide unencrypted services, give accounts to anybody who asks for them, and even have disabled login security and passwords. Unfortunately, in large organizations, it has become the case that attacks on servers maintained under this model—attacks from within the network, by people who are supposed to be trustworthy—are more frequent than attacks from outside. If your organization is large, you must assume that you cannot trust everybody on your system’s network, and instead choose a different security model. • I trust my local users. Administrators who maintain this philosophy tend to be more paranoid than administrators of the systems described previously in this list’s first two models. This security model is characterized by a tight network security policy: screening of users before new accounts are granted, encrypted network services (either required or encouraged), unnecessary services turned off, and crack-resistant passwords. However, local users are allowed to access internal services and see sensi- tive information (such as encrypted password strings). The idea is that once users are approved and given accounts, they can have the run of the system, and betrayal of that trust is grounds for removal from the system. This model is appropriate for hobbyist systems that serve a “low-risk” audience (for example, a fan website or community email service), or for high-profile commercial Internet servers where only a few trusted people actually have user accounts. 36_0672328755_ch30.qxd 5/9/06 4:51 PM Page 801 The Security Risks You Face 801 • I trust only myself and other administrators. The model favored by the most paranoid system administrators, this model not only has tight network security as in the preceding model, but tight local security as well. Regular users are denied access to system configuration files and server-side program code through carefully crafted permissions, Access Control Lists, and even Mandatory Access Control (MAC) labels (an advanced mechanism for controlling user access to files, sockets, and processes throughout the system). The administrator must watch each user carefully to make sure nothing unauthorized is being done, and special measures (such as custom shells, chroot jails, and the disabling of certain commands) are often taken to restrict each user’s access to the system’s resources. This model is useful for high- profile servers that provide email or web hosting services to hundreds or thousands of users from indeterminate or anonymous backgrounds. After you’ve decided what model is appropriate for you and your system for network and user-level security, you need to decide where the risk areas are for that model and what you can do to combat the exploitability of those areas. The Security Risks You Face “Perfect security” is a myth; only superhuman effort can keep a system so completely buttoned up that no attack can ever get through. The next best thing, however, is to know which areas of your system are at greatest risk and how those risks can be combated. Security risks for a network server can be grouped into three major categories: • Root compromise—An attacker takes advantage of unencrypted transmissions or known programming weaknesses in server software (most commonly buffer overflows, or weaknesses in input boundary checking in server software) to gain super-user access to the system. He then installs tools of his own to conceal his pres- ence from your system-monitoring tools (such as last and ps) and can steal any of your critical data or use your system as a base point for further hacking activities. • Privacy compromise—If network traffic to and from your system is not encrypted (scrambled), an attacker can view any of it, including passwords (potentially leading to root compromise) or any user’s critical or private communications. • Denial of service—An attacker (or a widespread network of attackers, often comprised of unwitting “zombies”) uses brute-force methods such as flooding your server with large amounts of legitimately constructed traffic, thus swamping its ability to serve 30 traffic to normal clients and potentially crashing the system. Within each of these categories of security risks, the most common threats result from these specific security weaknesses: • Insecure (weak) passwords—Passwords that can be guessed by software using common words and sequences. 36_0672328755_ch30.qxd 5/9/06 4:51 PM Page 802 802 CHAPTER 30 Network Security • Clear-text services—Services in which passwords and other sensitive information can be obtained just by “sniffing” the unencrypted data packets on the wire. • Unnecessary and exploit-prone services—If you don’t need to provide a service, don’t. It can only cost you in the end. • Open SMTP relaying—Allowing spammers to use your SMTP server as an open relay for broadcasting junk mail. • Unfiltered network access—Run a firewall to prevent unauthorized or undesirable traffic from getting to your machine.
Recommended publications
  • Proceedings of the Bsdcon 2002 Conference
    USENIX Association Proceedings of the BSDCon 2002 Conference San Francisco, California, USA February 11-14, 2002 THE ADVANCED COMPUTING SYSTEMS ASSOCIATION © 2002 by The USENIX Association All Rights Reserved For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Flexible Packet Filtering: Providing a Rich Toolbox Kurt J. Lidl Deborah G. Lidl Paul R. Borman Zero Millimeter LLC Wind River Systems Wind River Systems Potomac, MD Potomac, MD Mendota Heights, MN [email protected] [email protected] [email protected] Abstract The BSD/OS IPFW packet filtering system is a well engineered, flexible kernel framework for filtering (accepting, rejecting, logging, or modifying) IP packets. IPFW uses the well understood, widely available Berkeley Packet Filter (BPF) system as the basis of its packet matching abilities, and extends BPF in several straightforward areas. Since the first implementation of IPFW, the system has been enhanced several times to support additional functions, such as rate filtering, network address translation (NAT), and traffic flow monitoring. This paper examines the motivation behind IPFW and the design of the system. Comparisons with some contemporary packet filtering systems are provided. Potential future enhancements for the IPFW system are discussed. 1 Packet Filtering: An Overview might choose to copy only this data.
    [Show full text]
  • Análise De Usabilidade Da Ferramenta Ipfirewall Para Firewall
    Furin e Machado Junior (2011). ANÁLISE DE USABILIDADE DA FERRAMENTA IPFIREWALL PARA FIREWALL Marcelo Antonio Ferreira Furin Graduado em Sistemas de Informação pela LIBERTAS Faculdades Integradas. Dorival Moreira Machado Junior Mestra em Sistemas de Informação e professor da LIBERTAS Faculdades Integradas. 1. INTRODUÇÃO A importância do firewall evidencia-se pela expansão da internet e o consequente aumento de usuários, muitas vezes, sem o conhecimento acerca da proteção de sua rede e sua máquina. Com isso, por meio da ferramenta IPFIREWALL, um filtro de pacotes do sistema operacional FreeBSD, será analisado suas funcionalidades nativas. Outro ponto de destaque para a importância do firewall é evitar que o craker (é o termo usado para designar quem pratica a quebra (ou cracking) de um sistema de segurança, de forma ilegal ou sem ética) invadam os arquivos não autorizados. Dentre as razões para se utilizar o firewall é ajudar a proteger à rede ou computador do usuário de acessos maliciosos de hacker (são indivíduos que elaboram e modificam software e hardware de computadores, seja desenvolvendo funcionalidades novas, seja adaptando as antigas). 2. PROBLEMA DE PESQUISA Utilizando a ferramenta IPFIREWALL para firewall, sem usar quaisquer, ferramentas para auxílio, tem-se o ambiente no qual se origina a pergunta de pesquisa que norteará o presente estudo: No que é possível fazer com as funcionalidades nativas do IPFW? 2.1 OBJETIVO GERAL O objetivo deste trabalho é descrever todas as funcionalidades nativas do IPFW, o qual vem como firewall padrão no sistema operacional FreeBSD, e comprovar que é 100 Furin e Machado Junior (2011). possível fazer o mesmo trabalho realizado pelo IPTABLES gerando um script com as regras.
    [Show full text]
  • BSD UNIX Toolbox 1000+ Commands for Freebsd, Openbsd
    76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page i BSD UNIX® TOOLBOX 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iv BSD UNIX® Toolbox: 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD® Power Users Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-37603-4 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data is available from the publisher. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permis- sion should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
    [Show full text]
  • Sound Blaster AWE 32/64 HOWTO
    Sound Blaster AWE 32/64 HOWTO di Marcus Brinkmann < [email protected] > v1.2, 11 gennaio 1998, tradotto il 2 agosto 1998 Questo documento descrive come installare e configurare una Soundblaster 32 (SB AWE 32, SB AWE 64) della Creative Labs inc. sotto Linux utilizzando l’Awe Sound Driver Extension scritto da Takashi Iwai. Viene trattato inoltre l’utilizzo di tools e player particolari per la serie AWE della SB. Il sistema operativo di riferimento utilizzato per questo HOWTO `eDebian GNU/Linux System, ma dovrebbe funzionare su ogni altra distribuzione Linux. Traduzione di Samuele Tonon< Samuele Tonon > Contents 1 Introduzione 2 1.1 Ringraziamenti ............................................ 2 1.2 Nota per la versione italiana ..................................... 2 1.3 Politica di distribuzione ....................................... 2 2 Prima di iniziare 3 2.1 Introduzione .............................................. 3 2.2 Note generali sulle schede SB AWE ................................. 3 2.3 Note sulle schede PnP (Plug and Play) ............................... 3 2.4 Note generali sul caricamento dei moduli del kernel ........................ 4 2.5 Note generali sui driver sonori del kernel .............................. 4 3 Come installare il supporto SB AWE per il suono 5 3.1 Requisiti ................................................ 5 3.2 Iniziamo ................................................ 5 3.3 Compilare il kernel .......................................... 6 3.4 Riavvio ...............................................
    [Show full text]
  • Foundations for Music-Based Games
    Die approbierte Originalversion dieser Diplom-/Masterarbeit ist an der Hauptbibliothek der Technischen Universität Wien aufgestellt (http://www.ub.tuwien.ac.at). The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology (http://www.ub.tuwien.ac.at/englweb/). MASTERARBEIT Foundations for Music-Based Games Ausgeführt am Institut für Gestaltungs- und Wirkungsforschung der Technischen Universität Wien unter der Anleitung von Ao.Univ.Prof. Dipl.-Ing. Dr.techn. Peter Purgathofer und Univ.Ass. Dipl.-Ing. Dr.techn. Martin Pichlmair durch Marc-Oliver Marschner Arndtstrasse 60/5a, A-1120 WIEN 01.02.2008 Abstract The goal of this document is to establish a foundation for the creation of music-based computer and video games. The first part is intended to give an overview of sound in video and computer games. It starts with a summary of the history of game sound, beginning with the arguably first documented game, Tennis for Two, and leading up to current developments in the field. Next I present a short introduction to audio, including descriptions of the basic properties of sound waves, as well as of the special characteristics of digital audio. I continue with a presentation of the possibilities of storing digital audio and a summary of the methods used to play back sound with an emphasis on the recreation of realistic environments and the positioning of sound sources in three dimensional space. The chapter is concluded with an overview of possible categorizations of game audio including a method to differentiate between music-based games.
    [Show full text]
  • Magazyn Dragonia
    Numer 19 – 2008 Wywiad z Jono Baconem z Canonical Jono Bacon to brytyjski pisarz, dzien- nikarz, twórca oprogramowania, filan- trop i adwokat ruchu wolnego opro- gramowania. [. ] Człowiek o wielu pasjach, obecnie także specjalista do spraw społeczności w Canonical. Za- praszamy do lektury wywiadu, które- go udzielił nam dosłownie parę dni te- mu. Całość na stronie 48 GIMP – retusz zdjęć Tekst ten rozpoczyna serię artyku- łów o tworzeniu grafiki w programie GIMP, która przede wszystkim będzie poświęcona obróbce zdjęć. Całość na stronie 36 Poznajemy Dosbox Wielu sporo słyszało o emulatorze sys- temu MS DOS, jakim jest Dosbox. Wie- lu miało okazję z niego już korzystać, jednak bardzo wielu użytkowników odstrasza jego z pozoru trudna kon- figuracja. [. ] Całość na stronie9 Wstępniak Spis treści Drodzy Czytelnicy System Tegoroczna zima nie rozpieszcza amato- GNU/cośtam...................................3 rów białego szaleństwa. Mam nadzieję, że ERP5 zgodny z SUSE Linux..............................7 lektura bieżącego numeru uśmierzy żal za Mandriva Xtreme dla użytkowników Windows – Xtreme Studio dla początkujących...........8 ośnieżonymi stokami, a jest co czytać! Poznajemy Dosbox – część pierwsza...........................9 Polecam artykuł GNU/cośtam, którego lek- Software tura pozwala na inne spojrzenie na systemy LATEX - piszemy pracę magisterską, ciąg dalszy........................ 18 operacyjne. Można rzec, że kończy wojny po- Torrentflux.................................... 24 między dystrybucjami, ale kto wie, czy nie Baza pod kontrolą konsoli – część 6........................... 28 będzie zarzewiem wojny o jedynie słuszne środowisko. Zaawansowana konfiguracja serwera WWW – część 5..................... 31 Początkujący czytelnicy również znajdą LightZone – kombajn dla fotografa?........................... 33 coś dla siebie, szczegóły w numerze. GIMP – retusz zdjęć – część 1............................. 36 Gdy wrócicie z ferii i urlopów artykuły Programowanie o obróbce zdjęć będą jak znalazł.
    [Show full text]
  • Linux Hardware Compatibility HOWTO
    Linux Hardware Compatibility HOWTO Steven Pritchard Southern Illinois Linux Users Group [email protected] 3.1.5 Copyright © 2001−2002 by Steven Pritchard Copyright © 1997−1999 by Patrick Reijnen 2002−03−28 This document attempts to list most of the hardware known to be either supported or unsupported under Linux. Linux Hardware Compatibility HOWTO Table of Contents 1. Introduction.....................................................................................................................................................1 1.1. Notes on binary−only drivers...........................................................................................................1 1.2. Notes on commercial drivers............................................................................................................1 1.3. System architectures.........................................................................................................................1 1.4. Related sources of information.........................................................................................................2 1.5. Known problems with this document...............................................................................................2 1.6. New versions of this document.........................................................................................................2 1.7. Feedback and corrections..................................................................................................................3 1.8. Acknowledgments.............................................................................................................................3
    [Show full text]
  • DN Print Magazine BSD News BSD Mall BSD Support Source Wars Join Us
    Mirrors Primary (US) Issues August 2001 August 2001 Get BSD Contact Us Search BSD FAQ New to BSD? DN Print Magazine BSD News BSD Mall BSD Support Source Wars Join Us T H I S M O N T H ' S F E A T U R E S From the Editor The Effects of Tuning a FreeBSD Box for High Open Packages Reaches Performance Milestone 2 by Gilbert Gong by Chris Coleman Each BSD project has its A stock FreeBSD installation delivers a system which is own 3rd party software designed to meet the needs of most users, and strives to packaging system. They are provide the best balance of safety, reliablity, and all based on the same code, performance in a multi-user environment. It is therefore not yet, each of them have optimized for use as a high performance dedicated network features that make one server. This article investigates the effect of tuning a better than the other. Open FreeBSD for use as a dedicated network server. Read More Packages is a volunteer project to unify that code base and incorporate the best features of each. The NetBSD rc.d system by Will Andrews Get BSD Stuff There's been a lot of hubbub the last few months about NetBSD's new rc.d system being the successor of 4.4BSD's. At the USENIX Annual Technical Conference 2001 in Boston, MA, I had the pleasure of sitting down to listen to Luke Mewburn of Wasabi Systems discuss the new rc system NetBSD introduced in their operating system in the 1.5 release earlier this year.
    [Show full text]
  • How to Accelerate Your Internet
    How To Accelerate Your Internet A practical guide to Bandwidth Management and Optimisation using Open Source Software How To Accelerate Your Internet For more information about this project, visit us online at http://bwmo.net/ Editor: Flickenger R. Associate Editors: Belcher M., Canessa E., Zennaro M. Publishers: INASP/ICTP © 2006, BMO Book Sprint Team First edition: October 2006 ISBN: 0-9778093-1-5 Many designations used by manufacturers and vendors to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the authors were aware of a trademark claim, the designations have been printed in all caps or initial caps. All other trademarks are property of their respective owners. The authors and publisher have taken due care in preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibil- ity for errors or omissions. No liability is assumed for incidental or consequen- tial damages in connection with or arising out of the use of the information con- tained herein. This work is released under the Creative Commons Attribution-ShareAlike 2.5 license. For more details regarding your rights to use and redistribute this work, see http://creativecommons.org/licenses/by-sa/2.5/ Contents Preface ix About This Book xi Introduction 1 Bandwidth, throughput, latency, and speed.............................................................................. 2 Not enough to go around........................................................................................................
    [Show full text]
  • Handling Freebsd's Latest Firewall Semantics and Frameworks
    Handling FreeBSD's latest firewall semantics and frameworks by Adrian PENIS¸OARA˘ ∗ Abstract Despite having a powerful firewall service in its base system since early versions, known as the IPFW facility, FreeBSD has imported over time another popular packet filtering framework, the IPF system, and now has just imported the new kid on the packet filtering block, namely the open PF framework raised on the OpenBSD grounds. Having three packet filtering frameworks at your feet might sound delightful, but actually choosing one of them or making them cooperate might give you the shivers. Each framework has its strengths and weaknesses and often has it's own different idea on how to handle certain aspects. Note: an extended version of this article will appear on the conference's website. 1 Introduction 1.1 The players For quite some time the FreeBSD users have been stuck with the traditional IPFW fire- wall service which had its strengths and weaknesses. The last years though have brought the project two new packet filtering services: Darren Reed's IPFilter and OpenBSD's Packet Filter. The IPFW framework appeared in FreeBSD in the early 2.0 releases and has been extended and reworked over time. The dummynet(4) traffic shaping module has been introduced in FreeBSD 2.2.8 and statefull extensions have been committed around FreeBSD 4.0. In summer 2002 the IPFW engine has seen a major overhaul under the \ipfw2" codename. The IPFilter framework is the work of Darren Reed, a packet filtering service that was designed to be portable across several Unix distributions.
    [Show full text]
  • Alsa-Sound-Mini-HOWTO
    Alsa−sound−mini−HOWTO Alsa−sound−mini−HOWTO Table of Contents Alsa−sound−mini−HOWTO..............................................................................................................................1 Valentijn Sessink valentyn@alsa−project.org.........................................................................................1 1. Introduction..........................................................................................................................................1 2. NOWTO − a quick install guide..........................................................................................................1 3. Before you start....................................................................................................................................1 4. How to install ALSA sound drivers.....................................................................................................1 5. Loading the driver................................................................................................................................1 6. Testing and using.................................................................................................................................2 7. Tips and Troubleshooting....................................................................................................................2 1. Introduction..........................................................................................................................................2 1.1 Acknowledgments..............................................................................................................................2
    [Show full text]
  • Linux Hardware Compatibility HOWTO Linux Hardware Compatibility HOWTO
    Linux Hardware Compatibility HOWTO Linux Hardware Compatibility HOWTO Table of Contents Linux Hardware Compatibility HOWTO........................................................................................................1 Patrick Reijnen, <[email protected] (remove both "antispam.")>..1 1.Introduction...........................................................................................................................................1 2.Computers/Motherboards/BIOS...........................................................................................................1 3.Laptops..................................................................................................................................................1 4.CPU/FPU..............................................................................................................................................1 5.Memory.................................................................................................................................................1 6.Video cards...........................................................................................................................................2 7.Controllers (hard drive).........................................................................................................................2 8.Controllers (hard drive RAID)..............................................................................................................2 9.Controllers (SCSI)................................................................................................................................2
    [Show full text]