GNU/Linux for Admins

Total Page:16

File Type:pdf, Size:1020Kb

GNU/Linux for Admins KNOPPERKNOPPER.NET.NET Dipl.-Ing. Klaus Knopper Linux-Administration (LINUX4ADMINS, 03/2006) Eine Kurzeinfuhrung¨ von Klaus Knopper (Knopper.Net) c 2006 Klaus Knopper Erstellt fur:¨ FH Kaiserslautern/Zweibrucken¨ INHALTSVERZEICHNIS InhaltsverzeichnisKNOPPERKNOPPER.NET.NET 1 Einfuhrung¨ Dipl.-Ing. Klaus Knopper 6 1.1 Zusammenfassung ................................ 6 1.2 Ein wenig Geschichte ............................... 6 1.3 Die GNU General Public License ......................... 7 1.4 Andere Lizenzen ................................. 8 1.5 Eigenschaften von Unix .............................. 9 1.6 Verschiedene Unix-Betriebssysteme ....................... 9 1.7 Client/Server-Prinzip ............................... 10 1.8 Linux-Internals .................................. 10 1.9 Die Shell ..................................... 11 1.10 Unterschiede zu DOS/Windows ......................... 12 1.11 Navigieren im Dateisystem mit der Shell ..................... 13 1.12 Linux Benutzer und Administrator ........................ 13 1.13 Benutzer anlegen und Passwort setzen ...................... 14 1.14 Wechsel des Benutzerstatus ............................ 15 1.15 Graphische (Remote-)Administration mit Webmin ............... 16 1.16 vi – Seitenorientierter Texteditor ......................... 17 2 Bootvorgang, Zustandsmanagement mit init 19 2.1 Booten von Linux ................................. 19 2.2 Aufgaben von init ............................... 19 2.3 Ablauf von init ................................. 20 2.4 Was sind Runlevel? ................................ 20 2.5 Auslosen¨ eines Runlevels ............................. 21 2.6 Vorgange¨ beim Wechsel .............................. 21 c 2006 Klaus Knopper Erstellt fur:¨ FH Kaiserslautern/Zweibrucken¨ Seite 1 von 88 INHALTSVERZEICHNIS 3 AllgemeinesKNOPPERKNOPPER.NET.NET 23 4 DateisystemeDipl.-Ing. Klaus Knopper 25 5 Datentragerverwaltung¨ 28 5.1 Eine Reise durch das Unix-Dateisystem ..................... 28 5.2 Everything is a file“ ............................... 29 ” 5.3 fdisk – Partitionieren von Medien ....................... 30 5.4 mkfs – Anlegen von Dateisystemen ....................... 31 5.5 fsck – Uberpr¨ ufen¨ von Dateisystemen ..................... 32 5.6 mount – Einbinden von Dateisystemen ..................... 32 5.7 quota und edquota – Einschrankung¨ des zulassigen¨ Plattenplatzverbrauches 33 5.8 /etc/fstab – Die Dateisystem-Konfigurationsdatei ............. 34 5.9 Einbinden von Datentragern¨ – Schritte ...................... 34 5.10 Loopback-Device (Disk) ............................. 36 6 Arten von Dateien im Unix-Dateisystem 38 6.1 Einfache Dateien ................................. 38 6.2 Verzeichnisse ................................... 38 6.3 Symlinks ..................................... 39 6.4 Hardlinks ..................................... 39 6.5 Character und Block Devices ........................... 39 6.6 Fifos und Sockets ................................. 40 c 2006 Klaus Knopper Erstellt fur:¨ FH Kaiserslautern/Zweibrucken¨ Seite 2 von 88 INHALTSVERZEICHNIS 7 DateirechteKNOPPERKNOPPER.NET.NET 41 7.1 chownDipl.-Ing.– Setzen des DateibesitzersKlaus........................Knopper 41 7.2 chgrp – Andern¨ der Gruppenzugehorigkeit¨ ................... 41 7.3 chmod – Andern¨ von Rechten .......................... 42 7.4 Beispiele zu chmod ................................ 42 7.5 Spezielle Dateiattribute .............................. 43 8 Netzwerk-Konfiguration 44 8.1 Hardware ..................................... 44 8.2 Layer-2 (Ethernet) Parameter einstellen ..................... 45 8.3 IP-Adresse, Netzmaske und Default-Gateway setzen .............. 46 8.4 TCP/IP und andere ................................ 47 8.5 Netzdienste .................................... 48 8.6 Der Internet-Metadamon¨ inetd ......................... 48 8.7 Zugriffskontrolle auf Dienste mit tcpd ..................... 49 8.8 sendmail als Standalone-Server ........................ 49 8.9 Mailinglisten ................................... 50 9 Das Netzwerk Dateisystem NFS 52 10 Das Common Internet File System (CIFS) 54 11 SSH 55 11.1 SSL - Secure Socket Layer ............................ 56 12 Prozess- und Jobverwaltung 58 12.1 ps – Prozessinformationen anzeigen ....................... 58 12.2 ps – Prozessinformationen anzeigen ....................... 58 12.3 Shell-interne Jobverwaltung ........................... 58 c 2006 Klaus Knopper Erstellt fur:¨ FH Kaiserslautern/Zweibrucken¨ Seite 3 von 88 INHALTSVERZEICHNIS 13 Kernel KNOPPERKNOPPER.NET.NET 60 13.1 Kernel-KonfigurationDipl.-Ing................................Klaus Knopper 60 13.2 Kernel-Update ................................... 61 14 Der System-Logger Damon¨ syslogd 63 15 Der Timer-Damon¨ crond 65 15.1 crond und atd ................................. 65 15.2 crontab ..................................... 65 A Datentragerverwaltung¨ und Dateisysteme 67 B Shell – Umgebungsvariablen, Aliase & Co. 70 C Tipps & Tricks fur¨ die Shell 72 D Kernel konfigurieren und installieren 76 E RPM – Der RedHat Package Manager 78 F dpkg und apt – Softwareverwaltung unter Debian 79 G Kurz-HOWTO: dhcpd einrichten 81 H Kurz-HOWTO: DNS einrichten 82 I Kurz-HOWTO: Einrichten von /etc/hosts.allow 83 J Kurz-HOWTO: LDAP-Authentifikationsdienst einrichten 84 K Kurz-HOWTO: Forwarding/Masquerading einrichten 85 L Kurz-HOWTO: SAMBA einrichten (Server & Client 86 c 2006 Klaus Knopper Erstellt fur:¨ FH Kaiserslautern/Zweibrucken¨ Seite 4 von 88 INHALTSVERZEICHNIS M Kurz-HOWTO:KNOPPERKNOPPER Swap-FILE einrichten .NET.NET 87 N Links Dipl.-Ing. Klaus Knopper 88 c 2006 Klaus Knopper Erstellt fur:¨ FH Kaiserslautern/Zweibrucken¨ Seite 5 von 88 1 Einf ¨uhrungKNOPPERKNOPPER.NET.NET In der Einfuhrung¨ Dipl.-Ing. lernen Sie zunachst¨ LinuxKlaus in seinem historischen,Knopper politischen und techni- schen Umfeld kennen. 1.1 Zusammenfassung Notizen: Zusammenfassung Linux ist ein leistungsfahiges,¨ stabiles und außerst¨ um- fangreiches Betriebssystem. Im Rahmen dieses Kur- ses sollen die grundlegenden Merkmale von Linux als Server-Plattform, insbesondere die Einrichtung und Wartung haufig¨ genutzter Serverdienste erlautert¨ so- wie ein Einblick in die wichtigsten Konfigurations- und Administrationsaufgaben des Linux-Administrators ge- geben werden. Folie 1 1.2 Ein wenig Geschichte um 1970: In den Bell Labs wird von Ken Thompson ein Dokumentenverwaltungssystem (MUL- TICS) auf einer PDP-7 fur¨ kleine, modulare Aufgaben umgeschrieben, ☞ Unix Ende der 70er: Diverse innovative Universitaten¨ benutzen und erweitern das System. An der University of California in Berkeley (UCB) entsteht die Berkeley System Distribution (BSD). Sie enthalt¨ u. a. Ansatze¨ zur Netzwerkfahigkeit¨ und zum virtuellen Speicher. 70er-80er: Zwischen den beiden Hauptderivaten System V Unix (aus dem AT&T-Zweig her- vorgegangen) und der Berkeley-Version BSD zieht sich der Streit uber¨ die Vorherrschaft wahrend¨ der gesamten 80er und Anfang der 90er Jahre hin. 1984 Richard Stallman grundet¨ die Free Software Foundation, eine Gesellschaft, die freie Software (mit offenen Quelltexten) fordert,¨ und mit Hilfe einer speziellen Lizenz, der GNU General Public License, die Offenheit und freie Verteilbarkeit der Software ga- rantiert. Langfristiges Ziel ist es, ein Betriebssystem und eine Suite von Anwendungen zur Verfugung¨ zu stellen, die vollstandig¨ frei sind von proprietarem¨ oder nutzungslizenz- pflichtigem Material. 1988: POSIX 1003.1 wird verabschiedet, ein Standard, der die Mindestanforderungen beider Lager vereint. Fast alle modernen Unices sind POSIX-compliant. c 2006 Klaus Knopper Erstellt fur:¨ FH Kaiserslautern/Zweibrucken¨ Seite 6 von 88 1.3 Die GNU General Public License 1993- Der finnischeKNOPPERKNOPPER Student Linus Torvalds schreibt eine.NET virtuelle Speicherverwaltung fur¨ i386-basierte Rechner. Er entscheidet sich dafur,¨ den Quelltext.NET seiner Arbeit zu veroffent-¨ lichen, wasDipl.-Ing. eine zuvor selten gekannteKlaus KooperationKnopper zwischen Entwicklern uber¨ das In- ternet weltweit auslost,¨ und schafft damit die Grundlage fur¨ das heute popularste¨ freie Unix-artige Betriebssystem fur¨ kostengunstige¨ Desktop-PCs und andere. Auf Anwen- dungsebene wird die bereits fur¨ andere Unix-Systeme vorhandene GNU-Software por- tiert und verwendet, so dass nach kurzer Entwicklungszeit ein vollstandiges¨ Set an An- wendersoftware inclusive Entwicklungsumgebungen zur Verfugung¨ steht. 1995- Das Linux-Betriebssystem und auf Unix-Betriebssystemen basierende Anwendungen wie SAMBA und Apache verbreiten sich vor allem als preisgunstige¨ Server-Systeme, zunachst¨ nur als Geheimtipp unter Technikern, spater¨ im regularen¨ Ersatz als File, Print- und Informationsserver sowie Gateways in heterogenen Netzwerkumgebungen. 1998-heute Neben dem zunehmenden Einsatz als Desktop/Client-System mit KDE oder GNO- ME halt¨ Linux auch Einzug als embedded Betriebssystem in Handhelds, Kameras, MP3- Spielern und anderen Geraten¨ der Unterhaltungs- und Kommunikationsindustrie. Notizen: Ein wenig Geschichte 1970- Erste Unix-Betriebssysteme auf Großrechnern, vor allem an Universitaten.¨ 1988- POSIX 1003.1 als Standard verabschiedet. 1993- Linus Torvalds gibt den Quelltext fur¨ Kernel 0.1 frei. Das System wird zusammen mit der GNU-Software der Free Software Foundation von vielen Entwicklern weltweit uber¨ das Internet weiterentwickelt. heute- “Linux World Domination“? (Im Einsatz als kleines und mittleres Server-System auf kostengunstigen¨ PCs im Intranet/Internet-Bereich bereits erreicht.) Folie 2 1.3 Die GNU General Public License
Recommended publications
  • Amazon's Antitrust Paradox
    LINA M. KHAN Amazon’s Antitrust Paradox abstract. Amazon is the titan of twenty-first century commerce. In addition to being a re- tailer, it is now a marketing platform, a delivery and logistics network, a payment service, a credit lender, an auction house, a major book publisher, a producer of television and films, a fashion designer, a hardware manufacturer, and a leading host of cloud server space. Although Amazon has clocked staggering growth, it generates meager profits, choosing to price below-cost and ex- pand widely instead. Through this strategy, the company has positioned itself at the center of e- commerce and now serves as essential infrastructure for a host of other businesses that depend upon it. Elements of the firm’s structure and conduct pose anticompetitive concerns—yet it has escaped antitrust scrutiny. This Note argues that the current framework in antitrust—specifically its pegging competi- tion to “consumer welfare,” defined as short-term price effects—is unequipped to capture the ar- chitecture of market power in the modern economy. We cannot cognize the potential harms to competition posed by Amazon’s dominance if we measure competition primarily through price and output. Specifically, current doctrine underappreciates the risk of predatory pricing and how integration across distinct business lines may prove anticompetitive. These concerns are height- ened in the context of online platforms for two reasons. First, the economics of platform markets create incentives for a company to pursue growth over profits, a strategy that investors have re- warded. Under these conditions, predatory pricing becomes highly rational—even as existing doctrine treats it as irrational and therefore implausible.
    [Show full text]
  • GNU/Linux for Admins
    KNOPPERKNOPPER.NET.NET Dipl.-Ing. Klaus Knopper Linux-Administration Zusammengestellt fur¨ die FH Kaiserslautern/Zweibrucken¨ im Marz¨ 2006 •First •Prev •Next •Last •Full Screen •Quit c 2006 Klaus Knopper Erstellt fur:¨ FH Kaiserslautern/Zweibrucken¨ Folie 1 von ?? KNOPPERKNOPPER.NET.NET Dipl.-Ing. Klaus Knopper Zusammenfassung Linux ist ein leistungsfahiges,¨ stabiles und außerst¨ um- fangreiches Betriebssystem. Im Rahmen dieses Kur- ses sollen die grundlegenden Merkmale von Linux als Server-Plattform, insbesondere die Einrichtung und Wartung haufig¨ genutzter Serverdienste erlautert¨ so- wie ein Einblick in die wichtigsten Konfigurations- und Administrationsaufgaben des Linux-Administrators ge- geben werden. •First •Prev •Next •Last Folie 1 •Full Screen •Quit c 2006 Klaus Knopper Erstellt fur:¨ FH Kaiserslautern/Zweibrucken¨ Folie 2 von ?? KNOPPERKNOPPER.NET.NET Dipl.-Ing. Klaus Knopper Ein wenig Geschichte 1970- Erste Unix-Betriebssysteme auf Großrechnern, vor allem an Universitaten.¨ 1988- POSIX 1003.1 als Standard verabschiedet. 1993- Linus Torvalds gibt den Quelltext fur¨ Kernel 0.1 frei. Das System wird zusammen mit der GNU-Software der Free Software Foundation von vielen Entwicklern weltweit uber¨ das Internet weiterentwickelt. heute- “Linux World Domination“? (Im Einsatz als kleines und mittleres Server-System auf kostengunstigen¨ PCs im Intranet/Internet-Bereich bereits erreicht.) •First •Prev •Next •Last Folie 2 •Full Screen •Quit c 2006 Klaus Knopper Erstellt fur:¨ FH Kaiserslautern/Zweibrucken¨ Folie 3 von ?? KNOPPERKNOPPER.NET.NET Dipl.-Ing. Klaus Knopper Die GNU General Public License Gibt den Empfangern¨ der Software das Recht, ohne Lizenzgebuhren¨ • den Quelltext zur Software zu erhalten, um diese analysieren und nach eigenen Wunschen¨ modifizieren zu konnen,¨ • die Software in beliebiger Anzahl zu kopieren, • die Software zu modifizieren (s.o.), • die Software im Original oder in einer modifizierten Version weiterzugeben oder zu verkaufen, auch kommerziell, wobei die Empfanger¨ der Software diese ebenfalls unter den Konditionen der GPL erhalten.
    [Show full text]
  • Open Source Magazine N°13
    Actualité édito =VhiVaVK^hiVWVWn erci Microsoft ! Merci Ce système de substitution à L’arrivée récente de Vista de de migrer leurs postes PC sous Apple ! Et surtout mer- Mac OS X d’Apple et à Windows Microsoft a donné un nou- Windows vers Mac OS X ou B ci Canonical ! Grâce à de Microsoft était relativement veau coup d’accélérateur à la Linux (selon King Research). vous, les solutions li- peu recherché par le commun diffusion de Linux notamment Ce n’est plus « l’effet halo » si bres connaissent un incroyable des mortels jusqu’à ce que la Ubuntu (et à ses variantes : cher à Apple mais bel et bien succès auprès des passionnés firme sud-africaine Canonical Kubunu, Edubuntu, Xubuntu, « l’effet Vista » ! d’informatique et des utilisa- ne se lance dans la distribution etc) en raison des problèmes Enfin et surtout, le monde du teurs près de leurs sous. gratuite d’Ubuntu sa propre rencontrés avec la nouvelle libre ne serait rien sans la phi- Les mauvais « gestes commer- distribution basée sur Debian, version du système d’exploi- losophie de l’open-source qui ciaux » de Microsoft et d’Apple un dérivé de Linux. tation de Microsoft. En 2007, permet à tout programmeur conduisent de plus en plus les le groupe automobiles PSA a d’apporter, gracieusement, utilisateurs à tester d’abord des Canonical a recherché la sim- migré ses 20 000 postes vers des améliorations à un logiciel logiciels libres alternatifs com- plicité, la clarté, la compatibili- Linux ainsi que l’Assemblée Na- ouvert et de les proposer à l’en- me le navigateur Firefox de la té et la stabilité.
    [Show full text]
  • Tesi Di Dottorato Di Pierpaolo Garofalo
    “Tesi˙pdf” — 2012/1/24 — 17:50 — page 1 — #1 “Tesi˙pdf” — 2012/1/24 — 17:50 — page 2 — #2 “Tesi˙pdf” — 2012/1/24 — 17:50 — page 3 — #3 Universita` Politecnica delle Marche Scuola di Dottorato di Ricerca in Scienze dell’Ingegneria Curriculum Energetica Valutazione della risorsa eolica di aree ad orografia complessa per mezzo di analisi fluidodinamica numerica di mesoscala Tesi di Dottorato di: Pierpaolo Garofalo Tutor: Ch.mo Prof. Renato Ricci Coordinatore del Curriculum: Ch.mo Prof. Massimo Paroncini X Ciclo - Nuova Serie “Tesi˙pdf” — 2012/1/24 — 17:50 — page 4 — #4 “Tesi˙pdf” — 2012/1/24 — 17:50 — page 5 — #5 Universita` Politecnica delle Marche Scuola di Dottorato di Ricerca in Scienze dell’Ingegneria Curriculum Energetica Valutazione della risorsa eolica di aree ad orografia complessa per mezzo di analisi fluidodinamica numerica di mesoscala Tesi di Dottorato di: Pierpaolo Garofalo Tutor: Ch.mo Prof. Renato Ricci Coordinatore del Curriculum: Ch.mo Prof. Massimo Paroncini X Ciclo - Nuova Serie “Tesi˙pdf” — 2012/1/24 — 17:50 — page 6 — #6 Universita` Politecnica delle Marche Scuola di Dottorato di Ricerca in Scienze dell’Ingegneria Facolta` di Ingegneria Via Brecce Bianche – 60131 - Ancona, Italy “Tesi˙pdf” — 2012/1/24 — 17:50 — page i — #7 Sommario Lo scopo della presente ricerca `estato lo sviluppo di un protocollo nu- merico volto allo studio di siti eolici ad orografia complessa al fine di valutarne la producibilit`aenergetica mediante l’uso di codici numerici di mesoscala. A tale proposito sono stati utilizzati i due codici numerici di mesoscala attualmente pi`uusati per effettuare delle simulazioni annuali basate sia su griglie lasche che fini, del sito di interesse.
    [Show full text]
  • Index Images Download 2006 News Crack Serial Warez Full 12 Contact
    index images download 2006 news crack serial warez full 12 contact about search spacer privacy 11 logo blog new 10 cgi-bin faq rss home img default 2005 products sitemap archives 1 09 links 01 08 06 2 07 login articles support 05 keygen article 04 03 help events archive 02 register en forum software downloads 3 security 13 category 4 content 14 main 15 press media templates services icons resources info profile 16 2004 18 docs contactus files features html 20 21 5 22 page 6 misc 19 partners 24 terms 2007 23 17 i 27 top 26 9 legal 30 banners xml 29 28 7 tools projects 25 0 user feed themes linux forums jobs business 8 video email books banner reviews view graphics research feedback pdf print ads modules 2003 company blank pub games copyright common site comments people aboutus product sports logos buttons english story image uploads 31 subscribe blogs atom gallery newsletter stats careers music pages publications technology calendar stories photos papers community data history arrow submit www s web library wiki header education go internet b in advertise spam a nav mail users Images members topics disclaimer store clear feeds c awards 2002 Default general pics dir signup solutions map News public doc de weblog index2 shop contacts fr homepage travel button pixel list viewtopic documents overview tips adclick contact_us movies wp-content catalog us p staff hardware wireless global screenshots apps online version directory mobile other advertising tech welcome admin t policy faqs link 2001 training releases space member static join health
    [Show full text]
  • Elmersolver Manual
    ElmerSolver Manual Juha Ruokolainen, Mika Malinen, Peter Råback, Thomas Zwinger, Antti Pursula and Mikko Byckling CSC – IT Center for Science August 23, 2019 ElmerSolver Manual About this document The ElmerSolver Manual is part of the documentation of Elmer finite element software. ElmerSolver Man- ual describes the Elmer Solver options common for all specific equation solvers. The different equations solver options are described separately in Elmer Models Manual. The ElmerSolver Manual is best used as a reference manual rather than a concise introduction to the matter. The present manual corresponds to Elmer software version 8.4 for Windows NT and Unix platforms. The latest documentation and program versions of Elmer are available (or links are provided) at http://www.csc.fi/elmer. Copyright information The original copyright of this document belongs to CSC – IT Center for Science, Finland, 1995–2019. This document is licensed under the Creative Commons Attribution-No Derivative Works 3.0 License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nd/3.0/. Elmer program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. Elmer software is distributed in the hope that it will be useful, but without any warranty. See the GNU General Public License for more details. Elmer includes a number of libraries licensed also under free licensing schemes compatible with the GPL license. For their details see the copyright notices in the source files.
    [Show full text]
  • By Lina Lecaro 2 | D     - ,  | La Weekly We Nowdeliver!! 3 La Weekly | D     - ,  |
    Miceli’s Turns 70 • Thurston Moore Brings Spirit Counsel to the MASses • 30 Years of Shepard Fairey ® DECEMBER 6-12, 2019 / VOL. 42 / NO. 3 / LAWEEKLY.COM FIGHTING FOR WHAT MATTERS From Black Lives Matter to Reform L.A. Jails, Patrisse Cullors’ approach to social justice is artful and powerful BY LINA LECARO 2 WWW.LAWEEKLY.COM LA WEEKLY | D - , | WE NOW DELIVER!! WE NOWDELIVER!! December 6-12, 2019 // Vol. 42 // No. 3 // laweekly.com THE 3 INJECTING SPECIALISTS LA L LA’S MOST WEEKLY CELEBRATED & PUBLISHER AND CEO FRIENDLY Brian Calle INJECTORS GENERAL MANAGER Jessica Mansour $150 OFF DUET EVENT! | D - , | VP, EVENTS AND PARTNERSHIPS DECEMBER 5 - 12, 2019 Erin Domash $150 OFF EDITORIAL DUET & Contents PURCHASE 24+ UNITS OF BOTOX AT EDITOR-IN-CHIEF AND CREATIVE DIRECTOR $8.95 PER UNIT & SAVE BIG ON JUVEDERM Darrick Rainey LOYALTY ARTS EDITOR FAMILY OF FILLERS 1st SYRINGE 2nd SYRINGE POINTS EARNED Shana Nys Dambrot ULTRA XC (1.0 cc) $270 $370 $20 CULTURE & ENTERTAINMENT EDITOR ULTRA+ XC (1.0 cc) $270 $370 $20 VOLUMA XC (1.0 cc) $445 $545 $30 Lina Lecaro VOLBELLA XC (1.0 cc) $345 $445 $30 FOOD EDITOR VOLLURE XC (1.0 cc) $345 $445 $30 Michele Stueven *EARN LOYALTY POINTS TOWARDS YOUR NEXT TREATMENT. VISIT OUBEAUTY.COM OR CALL FOR MINIMAL RESTRICTIONS MUSIC EDITOR WWW.LAWEEKLY.COM Brett Callwood COPY EDITOR & Avery Bissett $125 OFF LISTINGS DUET Falling James (music) PURCHASE 60+ UNITS OF DYSPORT AT CONTRIBUTING WRITERS ** Lisa Beebe, Nathaniel Bell, Michael Cooper, Lisa $2.95 PER UNIT + Earn $20 Restylane Bucks!* Derrick, Alex Destefano,
    [Show full text]
  • Elmersolver Manual
    ElmerSolver Manual Juha Ruokolainen, Mika Malinen, Peter Råback, Thomas Zwinger, Antti Pursula and Mikko Byckling CSC – IT Center for Science April 1, 2021 ElmerSolver Manual About this document The ElmerSolver Manual is part of the documentation of Elmer finite element software. ElmerSolver Man- ual describes the Elmer Solver options common for all specific equation solvers. The different equations solver options are described separately in Elmer Models Manual. The ElmerSolver Manual is best used as a reference manual rather than a concise introduction to the matter. The present manual corresponds to Elmer software version 9.0. The latest documentation and program versions of Elmer are available (or links are provided) at http://www.csc.fi/elmer. Copyright information The original copyright of this document belongs to CSC – IT Center for Science, Finland, 1995–2019. This document is licensed under the Creative Commons Attribution-No Derivative Works 3.0 License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nd/3.0/. Elmer program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. Elmer software is distributed in the hope that it will be useful, but without any warranty. See the GNU General Public License for more details. Elmer includes a number of libraries licensed also under free licensing schemes compatible with the GPL license. For their details see the copyright notices in the source files. All information and specifications given in this document have been carefully prepared by the best ef- forts of CSC, and are believed to be true and accurate as of time writing.
    [Show full text]
  • Session Presentation
    #CLUS Troubleshooting Firepower Threat Defense like a TAC Engineer Kevin Klous, Technical Leader, CX John Groetzinger, Technical Leader, CX Foster Lipkey, Technical Leader, CX TECSEC-3004 #CLUS Why is FTD troubleshooting so important? • ASA and Firepower technologies have merged into a unified solution: FTD • FTD is more complex to troubleshoot; an understanding of both ASA and Firepower technologies is needed. • Without expertise, there is more risk of network downtime or security breaches. Both are frustrating and impact the business. #CLUS TECSEC-3004 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Presentation Objectives and Outcomes • To combat this, today we're going to arm you with knowledge, skills, and tools to more effectively troubleshoot and resolve incidents on the Cisco FTD platform • We encourage you to think about past or potential future experiences where you can apply these skills Goal: Fewer late night troubleshooting calls #CLUS TECSEC-3004 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Agenda • Introduction • Architecture Overview • Path of the Packet • Troubleshooting Tools • Interactive Troubleshooting • Q&A TECSEC-3004 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Your Presenters Foster Lipkey • Firepower TAC TL • Snort Expert • Sourcefire Veteran • Automation Enthusiast Foster Lipkey #CLUS TECSEC-3004 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Your Presenters John Groetzinger • Technical Leader for Firepower TAC • 6+ Years experience with Firepower and Snort • Original Sourcefire employee • Network security and Linux enthusiast #CLUS TECSEC-3004 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 Your Presenters Kevin Klous • Firewall/NGFW Cisco Security TAC for 7 years • Cisco Certified Internetwork Expert (Security – CCIE #43604) • TAC Security Podcast host & panelist • Pursuing M.S.
    [Show full text]
  • TECSEC-3004.Pdf
    Troubleshooting Firepower Threat Defense like a TAC Engineer Kevin Klous, Technical Leader, CX Justin Roberts, Technical Leader, CX John Groetzinger, Technical Leader, CX Foster Lipkey, Technical Leader, CX TECSEC-3004 Cisco Webex Teams Questions? Use Cisco Webex Teams to chat with the speaker after the session How 1 Find this session in the Cisco Events Mobile App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space TECSEC-3004 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Why is FTD troubleshooting so important? • ASA and Firepower technologies have merged into a unified solution: FTD • FTD is more complex to troubleshoot; an understanding of both ASA and Firepower technologies is needed. • Without expertise, there is more risk of network downtime or security breaches. Both are frustrating and impact the business. TECSEC-3004 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Presentation Objectives and Outcomes • To combat this, today we're going to arm you with knowledge, skills, and tools to more effectively troubleshoot and resolve incidents on the Cisco FTD platform • We encourage you to think about past or potential future experiences where you can apply these skills Goal: Fewer late night troubleshooting calls TECSEC-3004 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Agenda • Introduction • Architecture Overview • Path of the Packet • Troubleshooting Tools • Interactive Troubleshooting • Q&A TECSEC-3004 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Abstract The Cisco Firepower Threat Defense (FTD) next-generation firewall (NGFW) solution combines battle-proven ASA firewall functionality with industry leading Firepower IDS/IPS, malware detection, and content filtering capabilities.
    [Show full text]
  • ABSTRACT INTELLIGENT SIMULINK MODELING ASSISTANCE VIA MODEL CLONES and MACHINE LEARNING by Bhisma Adhikari Source Code Auto-Comp
    ABSTRACT INTELLIGENT SIMULINK MODELING ASSISTANCE VIA MODEL CLONES AND MACHINE LEARNING by Bhisma Adhikari Source code auto-completion has been pursued extensively by the research community, and has benefited software engineering to a great extent. In contrast, analogous research in Model Driven Engineering (MDE), that is, model auto-completion has not been explored as extensively. As a result, there does not exist sufficient MDE tooling that allows for automatic completion of models. This thesis aims to fill that gap by developing a prototype modeling assistant for Simulink using Simone as the underlying model clone detector and machine learning algorithms. The modeling assistant provides two types of suggestions: (1) Simulink block-level suggestions, and (2) Simulink (sub)system-level suggestions, to help modelers auto-complete or extend their Simulink models. It uses machine learning algorithms to produce block-level suggestions and model clone detection to produce (sub)system-level suggestions. Simulink and Simone are chosen over other tools due to their greater maturity and wider adoption. Although this prototype modeling assistant is developed specifically for Simulink, the results and knowledge gained from this research are extendable to any modeling environment for which a text-based model clone detector is available. INTELLIGENT SIMULINK MODELING ASSISTANCE VIA MODEL CLONES AND MACHINE LEARNING A Thesis Submitted to the Faculty of Miami University in partial fulfillment of the requirements for the degree of Master of Science by Bhisma Adhikari Miami University Oxford, Ohio 2021 Advisor: Dr. Matthew Stephan Reader: Dr. Eric J. Rapos Reader: Dr. Christopher Vendome ©2021 Bhisma Adhikari This Thesis titled INTELLIGENT SIMULINK MODELING ASSISTANCE VIA MODEL CLONES AND MACHINE LEARNING by Bhisma Adhikari has been approved for publication by The College of Engineering and Computing and The Department of Computer Science & Software Engineering Dr.
    [Show full text]
  • Studying Main Differences Between Linux & Windows Operating Systems
    International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:12 No:04 25 Studying Main Differences Between Linux & Windows Operating Systems Lecturer/ Hadeel Tariq Al-Rayes Abstract—Comparisons between the Microsoft Windows and II. THE ESSENTIAL DIFFERENCES BETWEEN LINUX & Linux computer operating systems are a long-running discussion WINDOWS (BEGINNERS LEVEL) topic within the personal computer industry. Throughout the 1- Drives don’t have letters, they have mountpoints entire period of the Windows 9x systems through the introduction of Windows 7, Windows has retained an extremely The first thing that usually trips up people who come from large retail sales majority among operating systems for personal Windows to Linux is that filesystems aren’t assigned letters desktop use, while Linux has sustained its status as the most prominent Free Software and Open Source operating system. the way they are in Windows. Instead, there is a single root After their initial clash, both operating systems moved beyond filesystem whose path is “/”. If you must use the Windows the user base of the personal computer market and share a analogy to help you conceptualize it, you can think of this as rivalry on a variety of other devices, with offerings for the server the C:\ drive; it’s the top of the filesystem. The Disk Analyzer and embedded systems markets, and mobile internet access. Shows your Filesystem Usage and Layout Linux mounts new drives in folders inside the root filesystem. You’ll notice that Linux and Microsoft Windows differ in philosophy, cost, if you plug in a USB key, it will be mounted to a path like versatility and stability, with each seeking to improve in their “/media/partition-name”.
    [Show full text]