SSH Mastery

OpenSSH, PuTTY, Tunnels, and Keys

Author: Michael W Lucas

Publisher: N.A

ISBN: 9781642350029

Category:

Page: 242

View: 4472

DOWNLOAD NOW »

The best-selling sysadmin text, now revised and updated! SSH Mastery is the industry standard work on using Secure Shell on Unix-like systems

Mastery

Author: Robert Greene

Publisher: Profile Books

ISBN: 1847653316

Category: Business & Economics

Page: 612

View: 7049

DOWNLOAD NOW »

'Machiavelli has a new rival, and Sun-tzu had better watch his back' - New York Times Around the globe, people are facing the same problem - that we are born as individuals but are forced to conform to the rules of society if we want to succeed. To see our uniqueness expressed in our achievements, we must first learn the rules - and then how to change them completely. Charles Darwin began as an underachieving schoolboy, Leonardo da Vinci as an illegitimate outcast. The secret of their eventual greatness lies in a 'rigorous apprenticeship': by paying close and careful attention, they learnt to master the 'hidden codes' which determine ultimate success or failure. Then, they rewrote the rules as a reflection of their own individuality, blasting previous patterns of achievement open from within. Told through Robert Greene's signature blend of historical anecdote and psychological insight and drawing on interviews with world leaders, Mastery builds on the strategies outlined in The 48 Laws of Power to provide a practical guide to greatness - and how to start living by your own rules. From the internationally bestselling author of The 48 Laws of Power, The Art Of Seduction, and The 33 Strategies Of War.

Absolute OpenBSD, 2nd Edition

Unix for the Practical Paranoid

Author: Michael W. Lucas

Publisher: No Starch Press

ISBN: 1593275234

Category: Computers

Page: 536

View: 9593

DOWNLOAD NOW »

OpenBSD, the elegant, highly secure Unix-like operating system, is widely used as the basis for critical DNS servers, routers, firewalls, and more. This long-awaited second edition of Absolute OpenBSD maintains author Michael Lucas's trademark straightforward and practical approach that readers have enjoyed for years. You'll learn the intricacies of the platform, the technical details behind certain design decisions, and best practices, with bits of humor sprinkled throughout. This edition has been completely updated for OpenBSD 5.3, including new coverage of OpenBSD's boot system, security features like W^X and ProPolice, and advanced networking techniques. You'll learn how to: –Manage network traffic with VLANs, trunks, IPv6, and the PF packet filter –Make software management quick and effective using the ports and packages system –Give users only the access they need with groups, sudo, and chroots –Configure OpenBSD's secure implementations of SNMP, DHCP, NTP, hardware sensors, and more –Customize the installation and upgrade processes for your network and hardware, or build a custom OpenBSD release Whether you're a new user looking for a complete introduction to OpenBSD or an experienced sysadmin looking for a refresher, Absolute OpenBSD, 2nd Edition will give you everything you need to master the intricacies of the world's most secure operating system.

Network Flow Analysis

Author: Michael Lucas

Publisher: No Starch Press

ISBN: 1593272030

Category: Business & Economics

Page: 224

View: 8272

DOWNLOAD NOW »

A detailed and complete guide to exporting, collecting, analyzing, and understanding network flows to make managing networks easier. Network flow analysis is the art of studying the traffic on a computer network. Understanding the ways to export flow and collect and analyze data separates good network administrators from great ones. The detailed instructions in Network Flow Analysis teach the busy network administrator how to build every component of a flow-based network awareness system and how network analysis and auditing can help address problems and improve network reliability. Readers learn what flow is, how flows are used in network management, and how to use a flow analysis system. Real-world examples illustrate how to best apply the appropriate tools and how to analyze data to solve real problems. Lucas compares existing popular tools for network management, explaining why they don't address common real-world issues and demonstrates how, once a network administrator understands the underlying process and techniques of flow management, building a flow management system from freely-available components is not only possible but actually a better choice than much more expensive systems.

Cisco Routers for the Desperate, 2nd Edition

Router Management, the Easy Way

Author: Michael W. Lucas

Publisher: No Starch Press

ISBN: 1593272235

Category: Computers

Page: 144

View: 6679

DOWNLOAD NOW »

Cisco routers and switches are the cornerstones of many networks. But when things break, repairs can intimidate even the most competent administrator. Luckily, just knowing the "in case of emergency" basics will take you far. Just like the original, this second edition of the highly acclaimed Cisco Routers for the Desperate is written for the administrator in crisis mode. Updated to cover switches and the latest Cisco terminology, with a tighter focus on the needs of the small network administrator, this second edition gives you what you need to know to provide reliable network services and fix problems fast. You'll find coverage of: –Installation—how to get your router and network connections up and running right the first time –Troubleshooting routers and switches, so that you can determine whether your hardware or the Internet is broken –Security concerns, like how to keep your network equipment safe from hackers and install a private network between two offices –How to implement basic network redundancy to reduce the risk of network downtime Cisco Routers for the Desperate, 2nd Edition is designed to be read once and left alone until something breaks. When it does, you'll have everything you need to know in one easy-to-follow guidebook.

Freebsd Mastery

Advanced Zfs

Author: Michael W Lucas,Allan Jude

Publisher: Tilted Windmill Press

ISBN: 9780692688687

Category:

Page: 244

View: 7638

DOWNLOAD NOW »

ZFS improves everything about systems administration. Once you peek under the hood, though, ZFS' bewildering array of knobs and tunables can overwhelm anyone. ZFS experts can make their servers zing-and now you can, too, with "FreeBSD Mastery: Advanced ZFS." This small book teaches you to: Use boot environments to make the riskiest sysadmin tasks boring Delegate filesystem privileges to users Containerize ZFS datasets with jails Quickly and efficiently replicate data between machines split layers off of mirrors optimize ZFS block storage handle large storage arrays select caching strategies to improve performance manage next-generation storage hardware identify and remove bottlenecks build screaming fast database storage dive deep into pools, metaslabs, and more! Whether you manage a single small server or international datacenters, simplify your storage with "FreeBSD Mastery: Advanced ZFS.""

PGP & GPG

Email for the Practical Paranoid

Author: Michael Lucas

Publisher: No Starch Press

ISBN: 1593270712

Category: Computers

Page: 216

View: 4651

DOWNLOAD NOW »

No, you are not paranoid. They are out to read your email. In this engaging and oddly reassuring text, practitioner Lucas describes Pretty Good Privacy (PGP) and Open Source GPG for moderately skilled computer geeks who are unfamiliar with public-key cryptography but want a cheap solution to security woes. He covers cryptography, installing OPENPGP

Ed Mastery (Manly McManface Edition)

The Standard Unix Text Editor

Author: Michael W Lucas

Publisher: N.A

ISBN: 9781642350043

Category: Computers

Page: 106

View: 8270

DOWNLOAD NOW »

Let me be perfectly clear: ed is the standard Unix text editor. If you don't know ed, you're not a real sysadmin. Forty years after ed's introduction, internationally acclaimed author Michael W Lucas has finally unlocked the mysteries of ed for everyone. With Ed Mastery, you too can become a proper sysadmin. Ed Mastery will help you: understand buffers and addresses insert, remove, and mangle text master file management and shell escapes comprehend regular expressions, searches, and substitutions create high-performance scripts for transforming files You must be at least this competent to use this computer. Read Ed Mastery today! Every so often, men contact the author complaining that his books use both male and female pronouns. This special edition, using only male third person pronouns, is for those special people. As the market is so much smaller, it's unfortunately priced higher. For each copy of the Manly McManface edition sold, the author will donate one dollar to his local chapter of Soroptomists International.

Sudo Mastery

User Access Control for Real People

Author: Michael Warren Lucas

Publisher: CreateSpace

ISBN: 9781493626205

Category: Computers

Page: 144

View: 1196

DOWNLOAD NOW »

Unix-like operating systems have a primitive access control system. The root account can do anything. Other users are peasants with only minimal system access. This worked fine in UNIX's youth, but today, system administration responsibilities are spread among many people and applications. Each person needs a tiny slice of root's power. Sudo lets you divide root's monolithic power between the people who need it, with accountability and auditability. Sudo Mastery will teach you to: * design a sudo policy rather than slap rules together * simplify policies with lists and aliases * use non-Unix information sources in policies * configure alternate sudo policies * manage shell environments * verify system integrity and perform intrusion detection * have a common sudo policy across your server farm * manage sudo policies via LDAP * log and debug sudo * log and replay full sudo sessions * use authentication systems other than passwords While many people use sudo, most use only a small part of it's features. Chances are, you're doing it wrong. Master sudo with Sudo Mastery.

Pro DNS and BIND 10

Author: Ron Aitchison

Publisher: Apress

ISBN: 1430230495

Category: Computers

Page: 692

View: 3248

DOWNLOAD NOW »

Pro DNS and BIND 10 guides you through the challenging array of features surrounding DNS with a special focus on the latest release of BIND, the world’s most popular DNS implementation. This book unravels the mysteries of DNS, offering insight into origins, evolution, and key concepts like domain names and zone files. This book focuses on running DNS systems based on BIND 10, the first stable release that includes support for the latest DNSSEC standards. Whether you administer a DNS system, are thinking about running one, or you simply want to understand the DNS system, then this book for you. Pro DNS and BIND 10 starts with simple concepts, then moves on to full security-aware DNSSEC configurations. Various features, parameters, and Resource Records are described and illustrated with examples. The book contains a complete reference to zone files, resource records, and BIND's configuration file parameters. You can treat the book as a simple paint-by-numbers guide to everything from a simple caching DNS to the most complex secure DNS (DNSSEC) implementation. Background information is included for when you need to know what to do and why you have to do it, and so that you can modify processes to meet your unique needs.

PAM Mastery

Author: Michael W Lucas

Publisher: N.A

ISBN: 9781642350197

Category: Computers

Page: 182

View: 2243

DOWNLOAD NOW »

Pluggable Authentication Modules: Threat or Menace? PAM is one of the most misunderstood parts of systems administration. Many sysadmins live with authentication problems rather than risk making them worse. PAM's very nature makes it unlike any other Unix access control system. If you have PAM misery or PAM mysteries, you need PAM Mastery! With PAM Mastery, you'll understand: the different versions of PAM the intricacies of Linux-PAM and OpenPAM how PAM policies make decisions how to debug PAM the most frequently seen PAM modules Linux-PAM extended controls and substacks time-based one-time passwords using SSH keys for more than SSH password quality testing policies from CentOS, Debian, and FreeBSD and more! Transform PAM from a headache to an ally with PAM Mastery

FreeBSD Mastery: Storage Essentials

Author: Michael Lucas

Publisher: N.A

ISBN: 9780692343203

Category:

Page: 240

View: 8324

DOWNLOAD NOW »

FreeBSD is one of the oldest and most featureful open-source Unix-like operating systems. FreeBSD Mastery: Storage Essentials takes you on a deep dive into FreeBSD's disk management systems.You'll learn about: identifying your storage hardware the Common Access Method GEOM-FreeBSD's powerful and flexible stackable storage system GUID Partition Tables, the modern disk partitioning standard MBR/disklabel partitioning, used by older and embedded systems avoiding common partitioning errors aligning partitions to the physical disk, for peak performance the high-performance Unix File System tuning UFS to fit your environment and load Two ways to journal filesystems, and when to use each The GELI and GBDE disk encryption systems, and when to use each Software-based disk mirroring, striping, RAID-5 and RAID-10. Custom FreeBSD installsAnd more!Don't just configure your storage. Understand it. Get FreeBSD Mastery: Storage Essentials today!

Building Internet Firewalls

Internet and Web Security

Author: Elizabeth D. Zwicky,Simon Cooper,D. Brent Chapman

Publisher: "O'Reilly Media, Inc."

ISBN: 9780596551889

Category: Computers

Page: 896

View: 7206

DOWNLOAD NOW »

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools.

The Linux Command Line

A Complete Introduction

Author: William E. Shotts, Jr.

Publisher: No Starch Press

ISBN: 1593273894

Category: COMPUTERS

Page: 480

View: 3564

DOWNLOAD NOW »

You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you'll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more. In addition to that practical knowledge, author William Shotts reveals the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix supercomputers of yore. As you make your way through the book's short, easily-digestible chapters, you'll learn how to: * Create and delete files, directories, and symlinks * Administer your system, including networking, package installation, and process management * Use standard input and output, redirection, and pipelines * Edit files with Vi, the world’s most popular text editor * Write shell scripts to automate common or boring tasks * Slice and dice text files with cut, paste, grep, patch, and sed Once you overcome your initial "shell shock," you'll find that the command line is a natural and expressive way to communicate with your computer. Just don't be surprised if your mouse starts to gather dust. A featured resource in the Linux Foundation's "Evolution of a SysAdmin"

Networking for Systems Administrators

Author: Michael Lucas

Publisher: N.A

ISBN: 9780692376942

Category:

Page: 206

View: 3823

DOWNLOAD NOW »

Stop waiting for the network team! If basic TCP/IP was hard, network administrators couldn't do it. Servers give sysadmins a incredible visibility into the network-once they know how to unlock it. Most sysadmins don't need to understand window scaling, or the differences between IPv4 and IPv6 echo requests, or other intricacies of the TCP/IP protocols. You need only enough to deploy your own applications and get easy support from the network team. This book teaches you: * How modern networks really work * The essentials of TCP/IP * The next-generation protocol, IPv6 * The right tools to diagnose network problems, and how to use them * Troubleshooting everything from the physical wire to DNS * How to see the traffic you send and receive * Connectivity testing * How to communicate with your network team to quickly resolve problems A systems administrator doesn't need to know the innards of TCP/IP, but knowing enough to diagnose your own network issues transforms a good sysadmin into a great one.

Linux Firewalls

Attack Detection and Response with iptables, psad, and fwsnort

Author: Michael Rash

Publisher: No Starch Press

ISBN: 1593271417

Category: Computers

Page: 336

View: 3547

DOWNLOAD NOW »

Addressing the firewall capabilities of Linux, a handbook for security professionals describes the Netfilter infrastruction in the Linux kernel and explains how to use Netfilter as an intrusion detection system by integrating it with custom open source software and Snort rulesets, discussin such topics as Linux firewall log analysis and policies, passive network authentication and authorization, and more. Original. (Intermediate)

Absolute BSD

The Ultimate Guide to FreeBSD

Author: Michael Lucas

Publisher: No Starch Press

ISBN: 1886411743

Category: Computers

Page: 565

View: 6069

DOWNLOAD NOW »

FreeBSD is a powerful, flexible, and cost-effective UNIX-based operating system, and the preferred server platform for many enterprises. Includes coverage of installation, networking, add-on software, security, network services, system performance, kernel tweaking, file systems, SCSI & RAID configurations, SMP, upgrading, monitoring, crash debugging, BSD in the office, and emulating other OSs.

How Linux Works, 2nd Edition

What Every Superuser Should Know

Author: Brian Ward

Publisher: No Starch Press

ISBN: 1593276451

Category: Computers

Page: 392

View: 1202

DOWNLOAD NOW »

Unlike some operating systems, Linux doesn’t try to hide the important bits from you—it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does. In this completely revised second edition of the perennial best seller How Linux Works, author Brian Ward makes the concepts behind Linux internals accessible to anyone curious about the inner workings of the operating system. Inside, you’ll find the kind of knowledge that normally comes from years of experience doing things the hard way. You’ll learn: –How Linux boots, from boot loaders to init implementations (systemd, Upstart, and System V) –How the kernel manages devices, device drivers, and processes –How networking, interfaces, firewalls, and servers work –How development tools work and relate to shared libraries –How to write effective shell scripts You’ll also explore the kernel and examine key system tasks inside user space, including system calls, input and output, and filesystems. With its combination of background, theory, real-world examples, and patient explanations, How Linux Works will teach you what you need to know to solve pesky problems and take control of your operating system.

Pro OpenSSH

Author: Michael Stahnke

Publisher: Apress

ISBN: 1430200766

Category: Computers

Page: 312

View: 715

DOWNLOAD NOW »

* Authored by two Fortune 100 system administrators responsible for the architecture and deployment of OpenSSH across several hundred corporate servers. * Covers commonplace yet often confusing deployment scenarios that come up daily in enterprise environments, large and small. * Focuses upon the worlds most prevalent SSH implementation, OpenSSH.