Mysql Installation Guide Abstract

Total Page:16

File Type:pdf, Size:1020Kb

Mysql Installation Guide Abstract MySQL Installation Guide Abstract This is the MySQL Installation Guide from the MySQL 5.7 Reference Manual. For legal information, see the Legal Notices. For help with using MySQL, please visit the MySQL Forums, where you can discuss your issues with other MySQL users. Document generated on: 2021-09-30 (revision: 70940) Table of Contents Preface and Legal Notices .................................................................................................................. v 1 Installing and Upgrading MySQL ...................................................................................................... 1 2 General Installation Guidance .......................................................................................................... 3 2.1 Supported Platforms ............................................................................................................. 3 2.2 Which MySQL Version and Distribution to Install .................................................................... 3 2.3 How to Get MySQL .............................................................................................................. 4 2.4 Verifying Package Integrity Using MD5 Checksums or GnuPG ................................................ 5 2.4.1 Verifying the MD5 Checksum ..................................................................................... 5 2.4.2 Signature Checking Using GnuPG .............................................................................. 5 2.4.3 Signature Checking Using Gpg4win for Windows ...................................................... 13 2.4.4 Signature Checking Using RPM ............................................................................... 17 2.5 Installation Layouts ............................................................................................................. 18 2.6 Compiler-Specific Build Characteristics ................................................................................ 18 3 Installing MySQL on Unix/Linux Using Generic Binaries .................................................................. 19 4 Installing MySQL from Source ....................................................................................................... 23 4.1 Source Installation Methods ................................................................................................ 23 4.2 Source Installation Prerequisites .......................................................................................... 24 4.3 MySQL Layout for Source Installation .................................................................................. 25 4.4 Installing MySQL Using a Standard Source Distribution ........................................................ 25 4.5 Installing MySQL Using a Development Source Tree ............................................................ 29 4.6 Configuring SSL Library Support ......................................................................................... 31 4.7 MySQL Source-Configuration Options ................................................................................. 32 4.8 Dealing with Problems Compiling MySQL ............................................................................ 56 4.9 MySQL Configuration and Third-Party Tools ........................................................................ 57 5 Installing MySQL on Microsoft Windows ......................................................................................... 59 5.1 MySQL Installation Layout on Microsoft Windows ................................................................. 62 5.2 Choosing an Installation Package ........................................................................................ 63 5.3 MySQL Installer for Windows .............................................................................................. 64 5.3.1 MySQL Installer Initial Setup .................................................................................... 65 5.3.2 Setting Alternative Server Paths with MySQL Installer ................................................ 69 5.3.3 Installation Workflows with MySQL Installer ............................................................... 70 5.3.4 MySQL Installer Product Catalog and Dashboard ...................................................... 78 5.3.5 MySQLInstallerConsole Reference ..................................................................... 84 5.4 Installing MySQL on Microsoft Windows Using a noinstall ZIP Archive ............................. 89 5.4.1 Extracting the Install Archive .................................................................................... 89 5.4.2 Creating an Option File ............................................................................................ 89 5.4.3 Selecting a MySQL Server Type .............................................................................. 91 5.4.4 Initializing the Data Directory .................................................................................... 91 5.4.5 Starting the Server for the First Time ........................................................................ 91 5.4.6 Starting MySQL from the Windows Command Line .................................................... 92 5.4.7 Customizing the PATH for MySQL Tools .................................................................. 93 5.4.8 Starting MySQL as a Windows Service ..................................................................... 94 5.4.9 Testing The MySQL Installation ................................................................................ 97 5.5 Troubleshooting a Microsoft Windows MySQL Server Installation .......................................... 97 5.6 Windows Postinstallation Procedures ................................................................................... 99 5.7 Windows Platform Restrictions .......................................................................................... 101 6 Installing MySQL on macOS ........................................................................................................ 103 6.1 General Notes on Installing MySQL on macOS .................................................................. 103 6.2 Installing MySQL on macOS Using Native Packages .......................................................... 104 6.3 Installing a MySQL Launch Daemon .................................................................................. 111 6.4 Installing and Using the MySQL Preference Pane .............................................................. 114 iii MySQL Installation Guide 7 Installing MySQL on Linux ........................................................................................................... 121 7.1 Installing MySQL on Linux Using the MySQL Yum Repository ............................................. 122 7.2 Replacing a Third-Party Distribution of MySQL Using the MySQL Yum Repository ................ 126 7.3 Installing MySQL on Linux Using the MySQL APT Repository ............................................. 128 7.4 Installing MySQL on Linux Using the MySQL SLES Repository ........................................... 128 7.5 Installing MySQL on Linux Using RPM Packages from Oracle ............................................. 129 7.6 Installing MySQL on Linux Using Debian Packages from Oracle .......................................... 134 7.7 Deploying MySQL on Linux with Docker ............................................................................ 135 7.7.1 Basic Steps for MySQL Server Deployment with Docker .......................................... 135 7.7.2 More Topics on Deploying MySQL Server with Docker ............................................. 140 7.7.3 Deploying MySQL on Windows and Other Non-Linux Platforms with Docker .............. 145 7.8 Installing MySQL on Linux from the Native Software Repositories ....................................... 145 7.9 Installing MySQL on Linux with Juju .................................................................................. 148 7.10 Managing MySQL Server with systemd ............................................................................ 148 8 Installing MySQL on Solaris ......................................................................................................... 155 8.1 Installing MySQL on Solaris Using a Solaris PKG .............................................................. 156 9 Postinstallation Setup and Testing ................................................................................................ 159 9.1 Initializing the Data Directory ............................................................................................. 159 9.2 Starting the Server ............................................................................................................ 165 9.2.1 Troubleshooting Problems Starting the MySQL Server ............................................. 165 9.3 Testing the Server ............................................................................................................ 167 9.4 Securing the Initial MySQL Account ................................................................................... 169 9.5 Starting and Stopping MySQL Automatically ...................................................................... 171 10 Upgrading MySQL ..................................................................................................................... 173 10.1 Before You Begin ..........................................................................................................
Recommended publications
  • Postgis 3.1.0Alpha1 Manual I
    PostGIS 3.1.0alpha1 Manual i PostGIS 3.1.0alpha1 Manual PostGIS 3.1.0alpha1 Manual ii Contents 1 Introdução 1 1.1 Comitê Diretor do Projeto . .1 1.2 Contribuidores Núclero Atuais . .2 1.3 Contribuidores Núclero Passado . .2 1.4 Outros Contribuidores . .2 2 Instalação do PostGIS 5 2.1 Versão Reduzida . .5 2.2 Compilando e instalando da fonte: detalhado . .5 2.2.1 Obtendo o Fonte . .6 2.2.2 Instalando pacotes requeridos . .6 2.2.3 Configuração . .7 2.2.4 Construindo . .9 2.2.5 Contruindo extensões PostGIS e implantado-as . .9 2.2.6 Testando . 11 2.2.7 Instalação . 20 2.3 Instalando e usando o padronizador de endereço . 21 2.3.1 Instalando Regex::Montar . 21 2.4 Instalando, Atualizando o Tiger Geocoder e carregando dados . 21 2.4.1 Tiger Geocoder ativando seu banco de dados PostGIS: Usando Extensão . 22 2.4.1.1 Convertendo uma Instalação Tiger Geocoder Regular para Modelo de Extensão . 24 2.4.2 Tiger Geocoder Ativando seu banco de dados PostGIS: Sem Utilizar Extensões . 24 2.4.3 Usando Padronizador de Endereço com Tiger Geocoder . 25 2.4.4 Carregando Dados Tiger . 25 2.4.5 Atualizando sua Instalação Tiger Geocoder . 26 2.5 Problemas comuns durante a instalação . 26 PostGIS 3.1.0alpha1 Manual iii 3 PostGIS Administration 28 3.1 Tuning your configuration for performance . 28 3.1.1 Startup . 28 3.1.2 Runtime . 29 3.2 Configuring raster support . 29 3.3 Creating spatial databases . 30 3.3.1 Spatially enable database using EXTENSION .
    [Show full text]
  • CIS Debian Linux 7 Benchmark V1.0.0 - 12-31-2015
    CIS Debian Linux 7 Benchmark v1.0.0 - 12-31-2015 http://benchmarks.cisecurity.org The CIS Security Benchmarks division provides consensus-oriented information security products, services, tools, metrics, suggestions, and recommendations (the “SB Products”) as a public service to Internet users worldwide. Downloading or using SB Products in any way signifies and confirms your acceptance of and your binding agreement to these CIS Security Benchmarks Terms of Use. CIS SECURITY BENCHMARKS TERMS OF USE BOTH CIS SECURITY BENCHMARKS DIVISION MEMBERS AND NON-MEMBERS MAY: Download, install, and use each of the SB Products on a single computer, and/or Print one or more copies of any SB Product that is in a .txt, .pdf, .doc, .mcw, or .rtf format, but only if each such copy is printed in its entirety and is kept intact, including without limitation the text of these CIS Security Benchmarks Terms of Use. UNDER THE FOLLOWING TERMS AND CONDITIONS: SB Products Provided As Is. CIS is providing the SB Products “as is” and “as available” without: (1) any representations, warranties, or covenants of any kind whatsoever (including the absence of any warranty regarding: (a) the effect or lack of effect of any SB Product on the operation or the security of any network, system, software, hardware, or any component of any of them, and (b) the accuracy, utility, reliability, timeliness, or completeness of any SB Product); or (2) the responsibility to make or notify you of any corrections, updates, upgrades, or fixes. Intellectual Property and Rights Reserved. You are not acquiring any title or ownership rights in or to any SB Product, and full title and all ownership rights to the SB Products remain the exclusive property of CIS.
    [Show full text]
  • Vefþjónustur SFR
    Vefþjónustur SFR Vefþjónustur SÍ - SFR Efnisyfirlit Vefþjónustur SÍ - SFR Efnisyfirlit 1. Almennt 2. Slóðir 2.1. Skyggnir 2.1.1. Prófunarumhverfi Skyggnir 2.1.2. Raunumhverfi Skyggnir 2.2. TR/SÍ 2.2.1. Prófunarumhverfi TR/SÍ 2.2.2. Raunumhverfi TR/SÍ 3. Umslag : sfr 3.1. profun 3.2. stadasjuklings 3.3. vistaskjal 3.4. tryggingaskra 4. Stoðgögn 4.1. Villulisti 4.2. Staða sjúklings : tafla 4.3. Þjónustuflokkar sjúkrahúsa 4.4. Þjónustflokkar heilsugæslu (hér bætist oft nýtt við með nýjum sendendum) 4.5. TR-kóði: 5. SFR-soap köll 5.1. SFR-profun 5.2. SFR-stadasjuklings 5.3. SFR-vistaskjal 5.4. profun: 5.5. stadasjuklings: 5.6. vistaskjal: 1. Almennt Föll sem viðskiptavinir geta sent SÍ eru móttekin í gegnum SOAP-umslag. Umslag sfr Umslag fyrir upplýsingar tengdar ýmsum lækniskostnaði og útreikningi á komugjöldum. Upplýsingar sem fara á milli grunnkerfa SÍ og kerfa viðskiptavina SÍ. 2. Slóðir 2.1. Skyggnir Föll sem eru uppsett hjá Skyggni eru: profun stadasjuklings tryggingaskra Þau eru uppsett á eftirfarandi slóðum: 2.1.1. Prófunarumhverfi Skyggnir Prófunarumhverfi : https://pws.sjukra.is/sfr/sfr.svc Schema skilgreining : https://pws.sjukra.is/sfr/sfr.svc?wsdl 2.1.2. Raunumhverfi Skyggnir Raunumhverfi : https://ws.sjukra.is/sfr/sfr.svc Schema skilgreining : https://ws.sjukra.is/sfr/sfr.svc?wsdl 2.2. TR/SÍ Föllin sem eru uppsett hjá TR/SÍ eru: profun stadasjuklings vistaskjal Þau eru uppsett á eftirfarandi slóðum 2.2.1. Prófunarumhverfi TR/SÍ Prófunarumhverfi : https://huld.sjukra.is/p/sfr Schema skilgreining : https://huld.sjukra.is/p/sfr?wsdl 2.2.2.
    [Show full text]
  • Darwin Release 3.0.1
    Using Darwin Release 3.0.1 Thinking Machines Corporation First printing, May 1998 The information in this document is subject to change without notice and should not be construed as a commitment by Thinking Machines Corporation. Thinking Machines reserves the right to make changes to any product described herein. Although the information in this document has been reviewed and is believed to be reliable, Thinking Machines Corporation assumes no liability for errors in this document. Thinking Machines does not assume any liability arising from the application or use of any information or product described herein. Thinking Machines and Darwin are registered trademarks of Thinking Machines Corporation. Note: Darwin" is a registered trademark of Thinking Machines Corporation in the United States. Darwin" is a registered trademark of Science in Finance Ltd. in the United Kingdom. Therefore Darwin" is not available from Thinking Machines Corporation in the United Kingdom. In the United Kingdom, Thinking Machines Corporation sells its product under the name LoyaltyStream." HPĆUX and HPĆUX 10.20 are trademarks of HewlettĆPackard Company. INFORMIX is a trademark of Informix Software, Inc. InstallShield is a trademark of InstallShield Corporation. INTERSOLV is a trademark of INTERSOLV, Inc. Microsoft, Windows, Windows NT, and Windows 95 are trademarks of Microsoft Corporation. Oracle is a trademark of Oracle Corporation. Open Windows is a trademark of Sun Microsystems, Inc. Sun, Solaris, Sun Ultra, Ultra, and Sun Workstation are trademarks of Sun Microsystems, Inc. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc., in the United States and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc.
    [Show full text]
  • 1 Introduction
    Technical report, IDE1202, February 2012 Enhancing Network Security in Linux Environment Master Thesis in Computer Network Engineering By Ali Mohammed, Sachin Sama and Majeed Mohammed School of Information Science, Computer and Electrical Engineering Halmstad University i Enhancing Network Security in Linux Environment Master Thesis in Computer Network Engineering School of Information Science, Computer and Electrical Engineering Halmstad University Box 823, S-301 18 Halmstad, Sweden February 2012 ii Preface First of all, we would like to express our sincere gratitude to our Supervisor Philip Heimer and Professor Tony Larsson for their supervision and assistance in the entire thesis work. We are also thankful to IDE department, Halmstad University for providing this opportunity to complete this thesis. Ali Mohammed Sachin Sama Majeed Mohammed iii iv Abstract Designing a secured network is the most important task in any enterprise or organization development. Securing a network mainly involves applying policies and procedures to protect different network devices from unauthorized access. Servers such as web servers, file servers, mail servers, etc., are the important devices in a network. Therefore, securing these servers is the first and foremost step followed in every security implementation mechanism. To implement this, it is very important to analyse and study the security mechanisms provided by the operating system. This makes it easier for security implementation in a network. This thesis work demonstrates the tasks needed to enhance the network security in Linux environment. The various security modules existing in Linux makes it different from other operating systems. The security measures which are mainly needed to enhance the system security are documented as a baseline for practical implementation.
    [Show full text]
  • Fortran Resources 1
    Fortran Resources 1 Ian D Chivers Jane Sleightholme May 7, 2021 1The original basis for this document was Mike Metcalf’s Fortran Information File. The next input came from people on comp-fortran-90. Details of how to subscribe or browse this list can be found in this document. If you have any corrections, additions, suggestions etc to make please contact us and we will endeavor to include your comments in later versions. Thanks to all the people who have contributed. Revision history The most recent version can be found at https://www.fortranplus.co.uk/fortran-information/ and the files section of the comp-fortran-90 list. https://www.jiscmail.ac.uk/cgi-bin/webadmin?A0=comp-fortran-90 • May 2021. Major update to the Intel entry. Also changes to the editors and IDE section, the graphics section, and the parallel programming section. • October 2020. Added an entry for Nvidia to the compiler section. Nvidia has integrated the PGI compiler suite into their NVIDIA HPC SDK product. Nvidia are also contributing to the LLVM Flang project. Updated the ’Additional Compiler Information’ entry in the compiler section. The Polyhedron benchmarks discuss automatic parallelisation. The fortranplus entry covers the diagnostic capability of the Cray, gfortran, Intel, Nag, Oracle and Nvidia compilers. Updated one entry and removed three others from the software tools section. Added ’Fortran Discourse’ to the e-lists section. We have also made changes to the Latex style sheet. • September 2020. Added a computer arithmetic and IEEE formats section. • June 2020. Updated the compiler entry with details of standard conformance.
    [Show full text]
  • Access Control Framework
    This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author (s) and do not necessarily reflect the views of the National Science Foundation C5L1S1 When working for an institution as a Linux Administrator, you may be required to protect certain information based on its sensitivity. For instance, most organizations will have an internal network in which data contained in certain directories or drives are made public—employees can access the contents. However, certain kinds of information such as employee salaries, classified research, secret prototypes, health information, military secrets, and private communications are considered highly sensitive and are usually restrictedU the from everyone except very few people authorized to access the data. In this lesson, we will explore processes, tools, and control lists that make it possible to limit access to sensitive data on a Linux-based system. Understanding this topic is important for any system administrator configuring systems in the workplace that require access control mechanisms. C5L1S2 You should know what will be expected of you when you complete this lesson. These expectations are presented as objectives. Objectives are short statements of expectations that tell you what you must be able to do, perform, learn, or adjust after reviewing the lesson. Lesson Objective: U the Given the need to secure a Linux server, the student will recommend a set of standard Linux tools such as PAM, Access Control Lists, and TCP Wrappers to effectively secure a Linux system and demonstrate the use of one set of tools for system lock-down.
    [Show full text]
  • Cygwin User's Guide
    Cygwin User’s Guide Cygwin User’s Guide ii Copyright © Cygwin authors Permission is granted to make and distribute verbatim copies of this documentation provided the copyright notice and this per- mission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this documentation under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this documentation into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the Free Software Foundation. Cygwin User’s Guide iii Contents 1 Cygwin Overview 1 1.1 What is it? . .1 1.2 Quick Start Guide for those more experienced with Windows . .1 1.3 Quick Start Guide for those more experienced with UNIX . .1 1.4 Are the Cygwin tools free software? . .2 1.5 A brief history of the Cygwin project . .2 1.6 Highlights of Cygwin Functionality . .3 1.6.1 Introduction . .3 1.6.2 Permissions and Security . .3 1.6.3 File Access . .3 1.6.4 Text Mode vs. Binary Mode . .4 1.6.5 ANSI C Library . .4 1.6.6 Process Creation . .5 1.6.6.1 Problems with process creation . .5 1.6.7 Signals . .6 1.6.8 Sockets . .6 1.6.9 Select . .7 1.7 What’s new and what changed in Cygwin . .7 1.7.1 What’s new and what changed in 3.2 .
    [Show full text]
  • Oracle® Developer Studio 12.6
    ® Oracle Developer Studio 12.6: C++ User's Guide Part No: E77789 July 2017 Oracle Developer Studio 12.6: C++ User's Guide Part No: E77789 Copyright © 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • My Name Is Robert Kudyba and I Am the System Administrator for The
    My name is Robert Kudyba and I am the System Administrator for the Department of Computer Science here at Fordham University and a recent graduate of the Master’s in Cybersecurity. The lab will require you to install VirtualBox with Ubuntu preferable from osboxes.org. The commands listed in the lab will assume you have installed this image. Any Ubuntu version will work but if you installed from ubuntu.com then you will have to substitute the username you created for every place I reference osboxes. If you use Kali, you will be using the root user and there may be other issues as I’ve only confirmed everything works on Ubuntu. 1 In this lab, I will be gong over Linux remote access protocols Telnet and SSH, providing a history, the various encryption methods used, the concept of security through obscurity, a program called Fail2ban, how to use a Certificate Authority in OpenSSH, TCPWrapper, and Port Knocking. 2 • Telnet is a simple, text-based network protocol that is used for accessing remote computers over TCP/IP networks like the Internet. Telnet was created and launched in 1969. • Prior to telnet, you had to physically walk to a server in order to access its data. This meant, among other things, that you had to spend some time arriving at the server's location and then you had to wait for your turn to work with the server. Even if the server had the hardware power to do multiple things at the same time, you were blocked from using if someone was before you so you had to wait for others to finish their work first.
    [Show full text]
  • STOC-AGENT 講習会 (コンパイル編) 海岸港湾研究室(有川研究室) Installer
    STOC-AGENT 講習会 (コンパイル編) 海岸港湾研究室(有川研究室) Installer 1) • MSMPI(Microsoft MPI v10.0 (Archived)) -msmpisdk.msi 前回配布分との変更点 -msmpisetup.exe 2) • gfortran Compiler(Mingw-w64) -mingw-w64-install.exe 3) • GNU MAKE -make-3.81.exe 4) • CADMAS-VR -CadmasVR_3.1.1_Setup_21050622.exe • CADMAS-MESH-MULTI 4) -CADMAS-MESH-MULTI-1.3.4-x64-setup.exe REFERED 1) https://www.microsoft.com/en-us/download/details.aspx?id=56727 2) http://mingw-w64.org/doku.php/download/mingw-builds 3) http://www.gnu.org/software/make/ http://gnuwin32.sourceforge.net/packages/make.htm 4) https://www.pari.go.jp/about/ MinGW-gfortran 1.以下のサイトからMingw-w64のダウンロードを行うため画面のSourceforgeをク リック. http://mingw-w64.org/doku.php/download/mingw-builds 2.MingW-W64-build を選択し、一番右図のような画面に移る. MinGW-gfortran 3. ダウンロードしたmingw-w64-installを実行インストールします. 基本的には変更なし 3. mingw-w64がインストールされていることを確認 MinGW-gfortran 5. コントロール パネル¥システムとセキュリティ¥システム¥システムの詳細設定 6. 環境変数を開き、ユーザーの環境変数,PATHを編集(PATHもしくはpathがなけれ ば新規で変数名にPATH,変数値に8.のアドレスを入力) 7. 環境変数名の編集→新規をクリック 8. gfortran.exeのあるフォルダのアドレスを入力(おそらくC:¥Program Files (x86) ¥mingw-w64¥i686-8.1.0-posix-dwarf-rt_v6-rev0¥mingw32¥bin) C:¥Program Files (x86)¥mingw-w64¥i686-8.1.0- posix-dwarf-rt_v6-rev0¥mingw32¥bin MinGW-gfortran 9.コマンドプロンプト(cmd)を開き,gfortran –v のコマンドを入力.以下 のような画面になれば環境設定完了(gfortranのPATHが通りました) GNU MAKE 1.以下のサイトからのmake.exeのダウンロードを行うため、画面のComplete packageのSetupをクリック. http://gnuwin32.sourceforge.net/packages/make.htm 2. make-3.8.1.exeを実行しインストールしてください. GnuWin32がインストールされていることを確認します. (おそらくC:¥Program Files (x86)¥) GNU MAKE 3. コントロール パネル¥システムとセキュリティ¥システム¥システムの詳細設定 4. 環境変数を開き、ユーザーの環境変数,PATHを編集(PATHもしくはpathがなけれ ば新規で変数名にPATH,変数値に6.のアドレスを入力) 5. 環境変数名の編集→新規をクリック 6. make.exeのあるフォルダのアドレスを入力 (おそらくC:¥Program Files (x86)¥GnuWin32¥bin) C:¥Program Files (x86)¥GnuWin32¥bin MSMPI 1.以下のサイトからMicrosoft MPI v10.0のダウンロードをクリック. https://www.microsoft.com/en-us/download/details.aspx?id=57467 2.msmpisdk.msi とmsmpisetup.exe をダウンロード. 3.
    [Show full text]
  • Nessus 8.11 User Guide
    Nessus 8.11.x User Guide Last Updated: October 29, 2020 Table of Contents Welcome to Nessus 8.11.x 13 Get Started with Nessus 16 Navigate Nessus 18 System Requirements 19 Hardware Requirements 20 Software Requirements 23 Licensing Requirements 26 Deployment Considerations 27 Host-Based Firewalls 28 IPv6 Support 29 Virtual Machines 30 Antivirus Software 31 Security Warnings 32 Manage SSL Certificates 33 Custom SSL Certificates 34 SSL Client Certificate Authentication 35 Create a New Custom CA and Server Certificate 36 Upload a Custom CA Certificate 38 Add a Root CA 39 Create Nessus SSL Certificates for Login 40 Enable Connections with Smart Card or CAC Card 43 Connect with Certificate or Card Enabled Browser 44 Copyright © 2020 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade- marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective Install Nessus and Nessus Agents 46 Download Nessus 47 Install Nessus 49 Install Nessus on Linux 50 Install Nessus on Windows 52 Install Nessus on Mac OS X 54 Install Nessus Agents 56 Retrieve the Linking Key 57 Install a Nessus Agent on Linux 58 Install a Nessus Agent on Windows 62 Install a Nessus Agent on Mac OS X 66 Link an Agent to Nessus Manager 70 Upgrade Nessus and Nessus Agents 73 Upgrade Nessus 74 Upgrade from Evaluation 75 Update Nessus Software 76 Upgrade Nessus on Linux 79 Upgrade Nessus on Windows 80 Upgrade Nessus on Mac OS X 81 Upgrade a Nessus Agent 82 Downgrade Nessus Software 85 Configure Nessus 86 Install Nessus Essentials, Professional, or Manager 87 Link to Tenable.io 89 Copyright © 2020 Tenable, Inc.
    [Show full text]