C O M P U T I N G N E

Total Page:16

File Type:pdf, Size:1020Kb

C O M P U T I N G N E U n i v e r s i t y o f O r e g o n C O M P U T I N G N E W S FALL 2003 Get your free copy of Duckware 2003 for Mac or PC! The discs are distributed at numerous campus locations. New this year is a special supplementary Windows Security CD for Windows users. See stories on pp. 2, 17. IN THIS ISSUE… Security Welcome to Campus! What You Need to Know about the New Windows Security CD...................................................................... 17 Free Duckware 2003 and Windows Security CDs.............2 Simple Passwords Expose Your PC to ‘Backdoor’ Attack.. 13 How to Start Using Your UO Computing Account............3 Update to Avoid Axis Network Camera Vulnerabilities .. 13 Get Acquainted with UO Computing Resources: A Guide to Protecting System Integrity ............................ 14 Consulting Help, Campus Computing Labs ....................4 Security Alerts ................................................................... 18 Computing Center Electronics Shop Services...................6 Technology Updates Computing Center Documents Room Resources...............7 Information Technology Workshops..................................7 UO Prepares for Increasing Wireless Use on Campus...... 11 Large Timesharing Systems................................................8 UO Libraries’ Tech Services Continue to Grow................ 12 Blackboard Upgrade Introduced this Fall......................... 12 UO Web Email.....................................................................9 Mathematica 5.0 is Here .................................................................23 Administrative Computing Update: Web-Based Banner.........10 Selected Elements of the 2003 University Home Page A Broad Overview of Statisical Computing at the UO....20 Study................................................................................ 25 Email Interesting Sites Prepare to Move from Oregon to Darkwing.....................10 Sites Worth Seeing............................................................. 23 Non-Delivery Notices for Mail You Didn’t Send.............22 Industry News.................................................................... 26 Get Your Free Duckware 2003—and WindowsWindows Security!—CDs The latest edition of Duckware has just what you need for computing at the UO. For Windows users, a special supplemental security CD is part of the deal this year. and is free to all currently enrolled • Microcomputer Support Center students, faculty, and staff. (151 McKenzie Hall) Both versions contain step-by-step • Documents Room Library (175 AsAs itit hhasas eeveryvery ffallall fforor tthehe ppastast McKenzie Hall) seven years, the Computing Center’s instructions on how to use the Microcomputer Services group university’s modem pool, wireless • CC-McKenzie Lab (101 has released a new edition of the network, and VPN connections. McKenzie Hall) Duckware CD-ROM. Windows Users. This year’s Windows • CC-EMU Microcomputing Lab (22 EMU) Duckware 2003, a collection of the edition includes Norton AntiVirus latest antiviral, network, and word- 2003, OpenOffi ce 1.1 for Windows, • CC-Klamath Lab (B13 Klamath processing software designed to help Internet Explorer 6, Netscape 7, Hall) Mozilla 1.4, and more. you with computing at the UO, is • CC-Millrace Lab (113 Millrace I) available in both Mac and PC versions New! Windows Security CD: UO • Knight Library Information Windows users will also need to Technology Center (second fl oor) pick up a copy of the new Windows Security CD, which contains vital • Science Library Information antiviral updates and system patches Technology Center (lower level, specifi c to Windows machines. Be Onyx Bridge Building) sure to run this CD before you COMPUTING CENTER Campus housing distribution. connect to the campus network!! Students living in campus housing COMPUTING NEWS Mac Users. The Mac Duckware CD can get Duckware at Residence Hall VOL. 18 #4 contains Norton AntiVirus 9, Fugu 1.0, and Family Housing area desks in the Mozilla, Internet Explorer, Netscape, University Inn, Carson, Spencer View Computing News is pub lished quar ter ly by and an updated and improved VPN and Westmoreland. the User Services and Network Applications client, among other offerings. staff of the Computing Center. Reuse and Recycling © University of Oregon 2003 Because the Mac operating system If you decide you no longer want Contact: Joyce Winslow is immune to the Blaster worm and your copy of Duckware 2003, please [email protected] other viruses that target Microsoft don’t throw it away! We’ll gladly take Photography: Dave Ragsdale products, Mac users do not need a it back and give it to someone else. [email protected] supplemental security CD. Just drop it off at the Microcomputer Joe St Sauver, Ph.D. System Requirements Support Center, or mail it via campus Director, User Services mail to “Microcomputer Services, 151 PC users: To use Duckware 2003 for and Network Applications McKenzie Hall.” [email protected] Windows, you’ll need Windows 98, ME, 2000, or XP. Website: Help http://cc.uoregon.edu/cnews/ Mac users: The Macintosh version For additional Duckware help Telephone: (541) 346-1724 is compatible with Mac OS 9 and or information, contact the Mac OS X. Microcomputer Support Center at [email protected] or Got Extras? Where to Get Your CDs call 346-4412. If your campus de part ment Campus locations. Students, faculty, re ceives sur plus copies of Com put ing News, you and staff may pick up a copy of the You can also drop by 151 McKenzie may return them to the Duckware 2003 CD and Windows Hall weekdays from 9 A.M. to 5 P.M., UO Com put ing Cen ter for Security CD at the following campus or visit their website at re dis tri bu tion. locations: http://micro.uoregon.edu/ computing news fall 2003 computing news fall 2003 2 NEW USER SECTION NEW USER SECTION 3 Welcome to Campus! How to Start Using Your UO Computing Account When you register for classes, we automatically generate a computing account for you that consists of a username Note: Your modem access is for casual use—no more than and password. Your com put ing account provides both a few hours a day on average. If you need ded i cat ed or email and dialin access. near-ded i cat ed network ac cess, you’ll want to con tact a com mer cial Internet Ser vice Pro vid er. You should also (If for some reason you don’t have a UO computing be aware that we have recently installed security fi lters account, pick up a copy of the handout, “How to Get that inhibit the use of Microsoft networking from dialup a Computing Account,” available in the Documents modems. If you really need to use Microsoft networking, Room Library (175 McKenzie Hall), or online at the workaround is to install and run the VPN software http://cc.uoregon.edu/policy/get_account.html) included on Duckware. How Do I Start Using Email? High-speed DSL or cable modem connections. If you There are three ways to get your email information: have an account with a commercial Internet Service • via DuckWeb ( http://duckweb.uoregon.edu/ ) Provider, you may want to log in to your UO account • in person, by going to the Microcomputer Support using the UO’s Virtual Private Network (VPN) software. Center (151 McKenzie Hall) and presenting your VPN allows you to securely access resources normally photo I.D. restricted to on-campus use—such as the UO’s software • by accessing the AUTHORIZE program from your web distribution sites, UO Usenet News servers, or restricted browser ( https://password.uoregon.edu/authorize/ ) library databases. If you do not use VPN, for security purposes we recommend using end-to-end encryption What About Passwords? tools (such as the SSL included in your web browser, or We recommend you select your own password instead of SSH for shell and fi le transfer). using the one that’s generated for you when you register For a good overview of VPN, see Microcomputer for classes. Here’s how: Services’ general information page at 1. Open your network browser (e.g., Netscape, Internet http://micro.uoregon.edu/getconnected/vpn_overview.html Explorer) and go to https://password.uoregon.edu/ Instructions for connecting to VPN are available at 2. If you remember your old pass word, enter your http://micro.uoregon.edu/getconnected/ username and old password in the spaces provided. Type in your new password and en ter it again for What About Wireless? verifi cation. You can also access UOnet throughout several public 3. If you don’t know your old pass word, you’ll need areas on campus via an 802.11a or 802.11b card in your to know your student ID number and PAC code. Go laptop computer. Your device must have appropriate to https://password.uoregon.edu/authorize/ Enter your drivers for your wireless card and a web browser that student ID and PAC code in the spaces provided, and supports SSL encryption. To connect to UOnet, you will follow the in struc tions for creating a new pass word. need to authenticate with your Darkwing or Gladstone account username and password. Password security: Passwords should be 6 to 14 characters long and must be very secure. We Security Note: Wireless users are especially vulnerable recommend choosing a password that includes a to electronic eavesdroppers. If you’re using a wireless mixture of mixed-case letters and numbers. Dictionary device and an application that lacks end-to-end words and any part of your name are not allowed. For encryption, you may wish to use the VPN software for more detailed information on password policy, see added protection. http://cc.uoregon.edu/policy/passwd_policy.html For more in for ma tion on campus wireless and current What About Off-Campus Connections? areas of coverage, including detailed set-up instructions, see http://micro.uoregon.edu/wireless/ Your computing account username and password are the same ones you’ll use for accessing UOnet from off-campus, What About Campus Housing whether you’re dialing in with a traditional modem or Connections? connecting via the UO’s VPN service through commercial DSL or cable modem service.
Recommended publications
  • Tomenet-Guide.Pdf
    .==========================================================================+−−. | TomeNET Guide | +==========================================================================+− | Latest update: 17. September 2021 − written by C. Blue ([email protected]) | | for TomeNET version v4.7.4b − official websites are: : | https://www.tomenet.eu/ (official main site, formerly www.tomenet.net) | https://muuttuja.org/tomenet/ (Mikael’s TomeNET site) | Runes & Runemastery sections by Kurzel ([email protected]) | | You should always keep this guide up to date: Either go to www.tomenet.eu | to obtain the latest copy or simply run the TomeNET−Updater.exe in your | TomeNET installation folder (desktop shortcut should also be available) | to update it. | | If your text editor cannot display the guide properly (needs fixed−width | font like for example Courier), simply open it in any web browser instead. +−−− | Welcome to this guide! | Although I’m trying, I give no guarantee that this guide | a) contains really every detail/issue about TomeNET and | b) is all the time 100% accurate on every occasion. | Don’t blame me if something differs or is missing; it shouldn’t though. | | If you have any suggestions about the guide or the game, please use the | /rfe command in the game or write to the official forum on www.tomenet.eu. : \ Contents −−−−−−−− (0) Quickstart (If you don’t like to read much :) (0.1) Start & play, character validation, character timeout (0.1a) Colours and colour blindness (0.1b) Photosensitivity / Epilepsy issues (0.2) Command reference
    [Show full text]
  • Combating Spyware in the Enterprise.Pdf
    www.dbebooks.com - Free Books & magazines Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our cus- tomers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you will find an assortment of value-added features such as free e-booklets related to the topic of this book, URLs of related Web site, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of exper- tise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE EBOOKS For readers who can’t wait for hard copy, we offer most of our titles in download- able Adobe PDF form. These eBooks are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our ebooks onto servers in corporations, educational institutions, and large organizations.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Global Appeal 2007
    Global Appeal 2007 Strategies and programmes Editorial team The editorial team wishes to acknowledge the outstanding contributions of colleagues at Headquarters and in the Field in the preparation of this document. The team wishes to thank especially Jill Mackechnie and Ian Myles for their help in reviewing all the texts and to Josiane Croset and her team for going out of their way to ensure the timely delivery of accurate financial data. Managing Editor: Maria Clara Martin Editors: Rohini Deshmukh, Kyle Matthews Data Coordinator and Editor: Robert Salin Contributing Editors: Shoko Shimozawa, Miroslav Medic, Joyce Munyao, Anja Papenfuss, Vibha Thapalyal Editorial Assistant: Sylvie Genhart-Maillot Intern: Katherine Meyer Editorial Consultant: Suresh Unny Photographs: Susan Hopper and Anne Kellner at the UNHCR Photolibrary, and UNHCR staff in the Field and in Headquarters. Cartography: Yvon Orand and Jordan Anastassov (Source: UNHCR Geographic Information Systems [GIS], Global Insight Digital Mapping © 1998 Europa Technologies Ltd.) Statistics: Henrik Pilgaard and Tarek Abou Chabake, Field Information and Coordination Support Section. Production Design, production and printing: Multimedia Design and Production, International Training Centre of the ILO, Turin - Italy Disclaimer The maps in this document do not imply the expression of any opinion on the part of UNHCR concerning the legal status of any country, territory, city or area, of its authorities, or the delimitation of frontiers or boundaries. All statistics are provisional and subject to change. UNHCR PO BOX 2500 1211 Geneva 2 Switzerland Tel: +41 22 739 8186 Fax +41 22 739 7358 Email: [email protected] www.unhcr.org Cover photo: Timor-Leste: Moving into a new lightweight emergency tent at the Don Bosco College IDP camp outside Dili.
    [Show full text]
  • Ubuntu: Powerful Hacks and Customizations
    Hacks, tips, and tricks to Krawetz put your OS into overdrive ubuntu Whether it’s speed, glitz, sounds, or security, you want to get the most out of your Ubuntu Linux system. This book shows you how to do just that. You’ll fi nd out how to customize the user interface, implement networking tools, optimize video, and more. You’ll then be able to build on these hacks to further tune, tweak, and customize Ubuntu to meet all your needs. The basic Ubuntu system is good, but with a few modifi cations, it can be made great. This book is packed with techniques that will help you: • Choose the right options when installing Ubuntu onto a Netbook, server, or other system • Install fi les for interoperability and collaborate with non-Linux systems • Tune the operating system for optimal performance ® • Enhance your graphics to take them to the next level Powerful Hacks and Customizations Powerful • Navigate the desktop, manage windows, and multitask between applications • Check for vulnerabilities and prevent undesirable access • Learn tricks to safely opening up the system with external network services Neal Krawetz, PhD, is a computer security professional with experience in computer forensics, ® profi ling, cryptography and cryptanalysis, artifi cial intelligence, and software solutions. Dr. Krawetz’s company, Hacker Factor, specializes in uncommon forensic techniques and anti-anonymity technologies. He has confi gured Ubuntu on everything from personal workstations to mission-critical servers. ubuntu Visit our Web site at www.wiley.com/compbooks $39.99 US/$47.99 CAN Powerful Hacks and Customizations ISBN 978-0-470-58988-5 Neal Krawetz Operating Systems / Linux Ubuntu® Powerful Hacks and Customizations Dr.
    [Show full text]
  • XMPP: the Definitive Guide Download at Boykma.Com XMPP: the Definitive Guide Building Real-Time Applications with Jabber Technologies
    XMPP: The Definitive Guide Download at Boykma.Com XMPP: The Definitive Guide Building Real-Time Applications with Jabber Technologies Peter Saint-Andre, Kevin Smith, and Remko Tronçon Beijing • Cambridge • Farnham • Köln • Sebastopol • Taipei • Tokyo Download at Boykma.Com XMPP: The Definitive Guide by Peter Saint-Andre, Kevin Smith, and Remko Tronçon Copyright © 2009 Peter Saint-Andre, Kevin Smith, Remko Tronçon. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://safari.oreilly.com). For more information, contact our corporate/ institutional sales department: (800) 998-9938 or [email protected]. Editor: Mary E. Treseler Indexer: Joe Wizda Production Editor: Loranah Dimant Cover Designer: Karen Montgomery Copyeditor: Genevieve d’Entremont Interior Designer: David Futato Proofreader: Loranah Dimant Illustrator: Robert Romano Printing History: April 2009: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. XMPP: The Definitive Guide, the image of a kanchil mouse deer on the cover, and related trade dress are trademarks of O’Reilly Media, Inc. JABBER® is a registered trademark licensed through the XMPP Standards Foundation. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information con- tained herein.
    [Show full text]
  • OSSEC Documentation Release 2.7.2B1
    OSSEC Documentation Release 2.7.2b1 Jeremy Rossi January 29, 2014 Contents 1 Manual & FAQ 3 1.1 Manual..................................................3 1.2 Frequently asked questions........................................ 64 2 Reference 77 2.1 Syntax and Options............................................ 77 2.2 Man pages................................................ 115 2.3 Rules/Decoders Documentation..................................... 141 2.4 Rootcheck / Syscheck Reference..................................... 141 2.5 Log Samples............................................... 146 2.6 Glossary................................................. 243 3 Indices and tables 245 i ii OSSEC Documentation, Release 2.7.2b1 OSPatrol is an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, real-time alerting and active response. It runs on most operating systems, including Linux, OpenBSD, FreeBSD, Mac OS X, Solaris and Windows. A list with all supported platforms is available at: Supported Systems Contents 1 OSSEC Documentation, Release 2.7.2b1 2 Contents CHAPTER 1 Manual & FAQ 1.1 Manual 1.1.1 Getting started with OSPatrol OSPatrol is a full platform to monitor and control your systems. It mixes together all the aspects of HIDS (host-based intrusion detection), log monitoring and SIM/SIEM together in a simple, powerful and open source solution. It is also backed and fully supported by Trend Micro. Key Benefits Compliance Requirements OSPatrol helps customers meet specific compliance requirements such as PCI, HIPAA etc. It lets customers detect and alert on unauthorized file system modifications and malicious behavior embedded in the log files of COTS products as well as custom applications. For PCI, it covers the sections of file integrity monitoring (PCI 11.5, 10.5), log inspection and monitoring (section 10) and policy enforcement/checking.
    [Show full text]
  • Information Security
    A SA Research Information Security J. Carlton Collins ASA Research - Atlanta, Georgia 770.734.0950 [email protected] Information Security Table of Contents Chapter Chapter Title & Page Count Page Number 1 Locks ‐ (2 Pages) 6 2 Government Compliance ‐ (3 Pages) 8 3 Securing Hard Drives and Laptop Computers ‐ (16 Pages) 11 4 Encryption ‐ (12 Pages) 27 5 Strong Passwords ‐ (7 Pages) 39 6 Windows ‐ Files and Folders ‐ (8 Pages) 46 7 System Restore ‐ (3 Pages) 54 8 Firewalls ‐ (7 Pages) 57 9 Wireless Security ‐ (8 Pages) 64 10 Checking the Security of your PC ‐ (4 Pages) 72 11 Online Security Tests ‐ (3 Pages) 76 12 Windows ‐ User Accounts & Groups ‐ (6 Pages) 79 13 Windows ‐ Screen Savers ‐ (4 Pages) 85 14 Pornography ‐ (4 Pages) 89 15 Sample Contracts ‐ (9 Pages) 93 16 Computer Bread Crumbs ‐ (6 Pages) 102 17 Computer Disposal ‐ (5 Pages) 108 18 Backup Strategy ‐ (14 Pages) 113 19 Viruses ‐ (6 Pages) 127 20 Phishing ‐ (7 Pages) 133 21 Spy Stuff ‐ (14 Pages) 140 22 Privacy Test ‐ (6 Pages) 154 23 Fake IDs ‐ (7 Pages) 160 24 National ID Cards ‐ (4 Pages) 167 25 Fake Social Security Cards ‐ (5 Pages) 171 26 Identity Theft ‐ (14 Pages) 176 27 Employee Theft ‐ (6 Pages) 190 28 Background Checks ‐ (5 Pages) 196 29 Bonding Employees ‐ (3 Pages) 201 30 Asterisk Key ‐ (2 Pages) 204 31 Encryption Analyzer & Passware ‐ (3 Pages) 206 32 Securing Desktop Computers ‐ (3 Pages) 209 33 Windows ‐ Windows Services ‐ (6 Pages) 212 34 Risk of Fire ‐ (3 Pages) 218 35 Credit Card Fraud ‐ (11 Pages) 221 36 Counterfeit Money ‐ (9 Pages) 232 37 Cracking and
    [Show full text]
  • While IRC Is Easy to Get Into and Many People Are Happy to Use It Without
    < Day Day Up > • Table of Contents • Index • Reviews • Reader Reviews • Errata • Academic • Top Ten Tricks and Tips for New IRC Users IRC Hacks By Paul Mutton Publisher: O'Reilly Pub Date: July 2004 ISBN: 0-596-00687-X Pages: 432 While IRC is easy to get into and many people are happy to use it without being aware of what's happening under the hood, there are those who hunger for more knowledge, and this book is for them. IRC Hacks is a collection of tips and tools that cover just about everything needed to become a true IRC master, featuring contributions from some of the most renowned IRC hackers, many of whom collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net). < Day Day Up > < Day Day Up > • Table of Contents • Index • Reviews • Reader Reviews • Errata • Academic • Top Ten Tricks and Tips for New IRC Users IRC Hacks By Paul Mutton Publisher: O'Reilly Pub Date: July 2004 ISBN: 0-596-00687-X Pages: 432 Copyright Foreword Credits About the Author Contributors Acknowledgments Preface Why IRC Hacks? How to Use This Book How This Book Is Organized Conventions Used in this Book Using Code Examples How to Contact Us Got a Hack? Chapter 1. Connecting to IRC Introduction: Hacks #1-4 Hack 1. IRC from Windows Hack 2. IRC from Linux Hack 3. IRC from Mac OS X Hack 4. IRC with ChatZilla Chapter 2. Using IRC Introduction: Hacks #5-11 Hack 5. The IRC Model Hack 6. Common Terms, Abbreviations, and Phrases Hack 7.
    [Show full text]
  • Botnets. the Killer Web
    363_Web_App_FM.qxd 12/19/06 10:46 AM Page ii 427_Botnet_FM.qxd 1/9/07 12:05 PM Page i Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our cus- tomers. We are also committed to extending the utility of the book you pur- chase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you may find an assort- ment of value-added features such as free e-books related to the topic of this book, URLs of related Web sites, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of expertise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE E-BOOKS For readers who can’t wait for hard copy, we offer most of our titles in down- loadable Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings.
    [Show full text]
  • ERC Manual a Full-Featured IRC Client for GNU Emacs and Xemacs This Manual Is for ERC Version 5.3
    ERC manual a full-featured IRC client for GNU Emacs and XEmacs This manual is for ERC version 5.3. Copyright c 2005, 2006, 2007, 2008 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, with the Front-Cover texts being \A GNU Manual," and with the Back-Cover Texts as in (a) below. A copy of the license is included in the section entitled \GNU Free Documentation License". (a) The FSF's Back-Cover Text is: \You have the freedom to copy and modify this GNU manual. Buying copies from the FSF supports it in developing GNU and promoting software freedom." All Emacs Lisp code contained in this document may be used, distributed, and modified without restriction. i Table of Contents 1 Introduction::::::::::::::::::::::::::::::::::::: 1 2 Obtaining ERC ::::::::::::::::::::::::::::::::: 2 2.1 Releases ::::::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2.2 Development ::::::::::::::::::::::::::::::::::::::::::::::::::: 2 3 Installation :::::::::::::::::::::::::::::::::::::: 4 4 Getting Started ::::::::::::::::::::::::::::::::: 5 4.1 Sample Session ::::::::::::::::::::::::::::::::::::::::::::::::: 5 4.2 Special Features:::::::::::::::::::::::::::::::::::::::::::::::: 6 5 Keys Used in ERC:::::::::::::::::::::::::::::: 7 6 Modules ::::::::::::::::::::::::::::::::::::::::: 9 7 Advanced Usage ::::::::::::::::::::::::::::::: 11 7.1 Connecting
    [Show full text]
  • Balu Wiki Documentation Release 0.42
    BaLu Wiki Documentation Release 0.42 Balle & Lilu Mar 05, 2021 Contents 1 Arch Linux 1 2 Cgroups 3 3 Debian 7 4 Debugging 9 5 Fedora 11 6 Filesystem 13 7 Gnome3 15 8 Grub2 19 9 Inotify 23 10 IPMI 25 11 Kernel 29 12 LVM 33 13 Memory Management 35 14 OpenPandora 37 15 Redhat 41 16 Systemd 47 17 Xorg 55 18 OpenBSD 57 19 MacOS 71 20 Tools 77 i 21 Network 113 22 Security 141 23 Hacking 163 24 Cluster 173 25 Databases 241 26 Virtualization 263 27 Programming 279 28 Misc 349 29 Indices and tables 357 ii CHAPTER 1 Arch Linux 1.1 Install yaourt • Edit /etc/pacman.conf [archlinuxfr] Server= http://repo.archlinux.fr/$arch • Install yaourt pacman -Sy yaourt • Now you can install packages from aur.archlinux.org with yaourt -S <pkg> 1 BaLu Wiki Documentation, Release 0.42 2 Chapter 1. Arch Linux CHAPTER 2 Cgroups 2.1 Overview • Cgroups group processes so that you can define ressource limits and get stats for it • Processes are called tasks • Every process can only be in one cgroup • A cgroup can inherit the properties of another cgroup mkdir /cgroup/ mount -t cgroup -o memory nodev /cgroup/ 2.2 Installation yum install libcgroup 2.3 Create a new cgroup • Temporarily mkdir /cgroup/<groupname> • Or cgcreate -a <user> -g memory,cpu:<groupname> • Permanent by editing /etc/cgconfig.conf 3 BaLu Wiki Documentation, Release 0.42 group <name>{ [<permissions>] <controller>{ <param name>= <param value>; } } • e.g. mount{ cpuset= /cgroup/cpuset; cpu= /cgroup/cpu; cpuacct= /cgroup/cpuacct; memory= /cgroup/memory; devices= /cgroup/devices; freezer= /cgroup/freezer;
    [Show full text]