A Desktop Quick Reference

Book Description:

Written by a leading developer and maintainer of the Linux kernel,Linux Kernel in a Nutshell is a comprehensiveoverview of kernel configuration and building, a critical task forLinux users and administrators.

No distribution can provide a Linux kernel that meets all users’needs. Computers big and small have special requirements that requirereconfiguring and rebuilding the kernel. Whether you are trying toget sound, wireless support, and power management working on a laptopor incorporating enterprise features such as logical volume managementon a large server, you can benefit from the insights in this book.

Linux Kernel in a Nutshell covers the entirerange of kernel tasks, starting with downloading the source and makingsure that the kernel is in sync with the versions of the tools youneed. In addition to configuration and installation steps, the bookoffers reference material and discussions of related topics such ascontrol of kernel options at runtime.

A key benefit of the book is a chapter on determining exactly what drivers are needed for your hardware. Also included are recipes thatlist what you need to do to accomplish a wide range of popular tasks.

A Desktop Quick Reference

Book Description:

The Tcl language and Tk graphical toolkit are simple and powerful building blocks for custom applications. The Tcl/Tk combination is increasingly popular because it lets you produce sophisticated graphical interfaces with a few easy commands, develop and change scripts quickly, and conveniently tie together existing utilities or programming libraries.One of the attractive features of Tcl/Tk is the wide variety of commands, many offering a wealth of options. Most of the things you’d like to do have been anticipated by the language’s creator, John Ousterhout, or one of the developers of Tcl/Tk’s many powerful extensions. Thus, you’ll find that a command or option probably exists to provide just what you need.And that’s why it’s valuable to have a quick reference that briefly describes every command and option in the core Tcl/Tk distribution as well as the most popular extensions. Keep this book on your desk as you write scripts, and you’ll be able to find almost instantly the particular option you need.Most chapters consist of alphabetical listings. Since Tk and mega-widget packages break down commands by widget, the chapters on these topics are organized by widget along with a section of core commands where appropriate. Contents include:

  • Core Tcl and Tk commands and Tk widgets
  • C interface (prototypes)
  • Expect
  • [incr Tcl] and [incr Tk]
  • Tix
  • TclX
  • BLT
  • Oratcl, SybTcl, and Tclodbc

A detailed and practical guide to DNS implementation, configuration, and administration

Book Description:

What This Book Covers

Chapter 1 begins to explain basic DNS principles. It introduces essential names, for example,domain and zone, explaining the difference between them. It describes the iteration principle by which the DNS translates names to IP addresses. It presents a configuration of a resolver both for UNIX and for Windows. The end of the chapter explains name server principles and describes various name server types.
Chapter 2 is fully focused on the most basic DNS procedure, the DNS query. Through this procedure, the DNS translates names to IP addresses. In the very beginning, however, this chapter describes in detail the Resource Record structure. At the end of this chapter, many practical examples of DNS exchanges are listed.
Chapter 3 deals with other DNS procedures (DNS Extensions), i.e., DNS Update, DNS Notify, incremental zone transfer, negative caching, IPv6 Extensions, IPsec, and TSIG.
Chapter 4 talks about the DNS implementation. It is derived from its historical evolution. From the historical point of view, the oldest DNS implementation that is still sometimes used is BIND version 4. This implementation is very simple so it is suitable to describe basic principles with it. Next, the new generations of BIND are discussed followed by the Windows 2000 implementation.
Chapter 5 discusses the tools for debugging DNS such as nslookup, dnswalk, and dig, how to control a name server using the rndc program, and the common errors that might occur while configuring DNS.
Chapter 6 deals with the creation of DNS domains (domain delegation) and with the procedure of domain registration.

A Project-based Introduction to Linux

Book Description:

Ubuntu brings Linux to the masses, but it can still be intimidating for newbies, neophytes, and geeks-in-training. With Ubuntu Made Easy by your side you’ll be ready to face any challenge, and you’ll discover just how fun Linux can be.Packed with tips, tricks, and helpful pointers, Ubuntu Made Easy will get you up and running with the world’s most popular free operating system. Authors Rickford Grant and Phil Bull walk you through common tasks like installing and playing games, accessing your favorite social networks, troubleshooting hardware and software problems, interacting with your Windows installation, and more.With the help of the book’s straightforward explanations and step-by-step projects, you’ll also learn how to: Set up printers, scanners, USB flash drives, and other hardware Install and play free games like Frets on Fire and Frozen Bubble as well as commercial hits like Braid and World of Goo Watch DVDs, lis

Book Description:

*Imparts good security doctrine, methodology, and strategies

*Each application-focused chapter will be able to be used as a stand-alone HOW-TO for that particular application.

*Offers users a selection of resources (websites, mailing lists, and books) to further their knowledge.

Book Description:

Linux can be configured as a networked workstation, a DNS server, a mail server, a firewall, a gateway router, and many other things. These are all part of administration tasks, hence network administration is one of the main tasks of Linux system administration. By knowing how to configure system network interfaces in a reliable and optimal manner, Linux administrators can deploy and configure several network services including file, web, mail, and servers while working in large enterprise environments.

Starting with a simple Linux router that passes traffic between two private networks, you will see how to enable NAT on the router in order to allow Internet access from the network, and will also enable DHCP on the network to ease configuration of client systems. You will then move on to configuring your own DNS server on your local network using bind9 and tying it into your DHCP server to allow automatic configuration of local hostnames. You will then future enable your network by setting up IPv6 via tunnel providers.

Moving on, we’ll configure Samba to centralize authentication for your network services; we will also configure Linux client to leverage it for authentication, and set up a RADIUS server that uses the directory server for authentication.

Toward the end, you will have a network with a number of services running on it, and will implement monitoring in order to detect problems as they occur.

What you will learn

  • Route an IPv6 netblock to your local network
  • Modify your named instance to support setting hostnames for your IPv6 addresses
  • Use SSH for remote console access
  • Configure NGINX with TLS
  • Secure XMPP with TLS
  • Leverage iptables6 to firewall your IPv6 traffic
  • Configure Samba as an Active Directory compatible directory service

Configuring, Securing and Integrating Directory Services

Book Description:

This book is the ideal introduction to using OpenLDAP for Application Developers and will also benefit System Administrators running OpenLDAP. It prepares the reader to build a directory using OpenLDAP, and then employ this directory in the context of the network, taking a practical approach that emphasizes how to get things done. On occasion, it delves into theoretical aspects of LDAP, but only where understanding the theory helps to answer practical questions. The reader requires no knowledge of OpenLDAP, but even readers already familiar with the technology will find new things and techniques. The target audience will require basic Linux system administration knowledge, but no prior knowledge of LDAP or OpenLDAP is assumed. If you are web savvy and are interested in using OpenLDAP for web applications and services like client interaction then this is the book for you.

Getting Started with Networking, Scripting, and Security in Kali

Book Description:

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.

If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you’ll learn the basics of using the Linux operating system and acquire the tools and techniques you’ll need to take control of a Linux environment.

First, you’ll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you’ll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You’ll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to:

– Cover your tracks by changing your network information and manipulating the rsyslog logging utility
– Write a tool to scan for network connections, and connect and listen to wireless networks
– Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email
– Write a bash script to scan open ports for potential targets
– Use and abuse services like MySQL, Apache web server, and OpenSSH
– Build your own hacking tools, such as a remote video spy camera and a password cracker

Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Book Description:

Linux in Action is a task-based tutorial that will give you the skills and deep understanding you need to administer a Linux-based system. This hands-on book guides you through 12 real-world projects so you can practice as you learn. Each chapter ends with a review of best practices, new terms, and exercises.

Including Container-Based Deployment with Docker and Kubernetes

Book Description:

Get SQL Server up and running on the Linux operating system and containers. No database professional managing or developing SQL Server on Linux will want to be without this deep and authoritative guide by one of the most respected experts on SQL Server in the industry. Get an inside look at how SQL Server for Linux works through the eyes of an engineer on the team that made it possible.

Microsoft SQL Server is one of the leading database platforms in the industry, and SQL Server 2017 offers developers and administrators the ability to run a database management system on Linux, offering proven support for enterprise-level features and without onerous licensing terms. Organizations invested in Microsoft and open source technologies are now able to run a unified database platform across all their operating system investments. Organizations are further able to take full advantage of containerization through popular platforms such as Docker and Kubernetes.

Pro SQL Server on Linux walks you through installing and configuring SQL Server on the Linux platform. The author is one of the principal architects of SQL Server for Linux, and brings a corresponding depth of knowledge that no database professional or developer on Linux will want to be without. Throughout this book are internals of how SQL Server on Linux works including an in depth look at the innovative architecture.

The book covers day-to-day management and troubleshooting, including diagnostics and monitoring, the use of containers to manage deployments, and the use of self-tuning and the in-memory capabilities. Also covered are performance capabilities, high availability, and disaster recovery along with security and encryption. The book covers the product-specific knowledge to bring SQL Server and its powerful features to life on the Linux platform, including coverage of containerization through Docker and Kubernetes.

What You’ll Learn

  • Learn about the history and internal of the unique SQL Server on Linux architecture.
  • Install and configure Microsoft’s flagship database product on the Linux platform
  • Manage your deployments using container technology through Docker and Kubernetes
  • Know the basics of building databases, the T-SQL language, and developing applications against SQL Server on Linux
  • Use tools and features to diagnose, manage, and monitor SQL Server on Linux
  • Scale your application by learning the performance capabilities of SQL Server
  • Deliver high availability and disaster recovery to ensure business continuity
  • Secure your database from attack, and protect sensitive data through encryption
  • Take advantage of powerful features such as Failover Clusters, Availability Groups, In-Memory Support, and SQL Server’s Self-Tuning Engine
  • Learn how to migrate your database from older releases of SQL Server and other database platforms such as Oracle and PostgreSQL
  • Build and maintain schemas, and perform management tasks from both GUI and command line
Who This Book Is For

Developers and IT professionals who are new to SQL Server and wish to configure it on the Linux operating system. This book is also useful to those familiar with SQL Server on Windows who want to learn the unique aspects of managing SQL Server on the Linux platform and Docker containers. Readers should have a grasp of relational database concepts and be comfortable with the SQL language.

And Everyone Who Wants To Be One

Book Description:

Reveals and illustrates the awesome power and flexibility of the command line, and the design and usage philosophies that support those traits. This understanding of how to extract the most from the Linux command line can help you become a better SysAdmin. Understand why many things in the Linux and Unix worlds are done as they are, and how to apply the Linux Philosophy to working as a SysAdmin.

The original Unix/Linux Philosophy presented foundational and functional tenets – rules, guidelines, and procedural methods – that worked well. However, it was intended for the developers of those operating systems. Although System Administrators could apply many of the tenets to their daily work, many important tenets were missing.

Over the years that David Both has been working with Linux and Unix, he has formulated his own philosophy – one which applies more directly to the everyday life of the System Administrator. This book defines a philosophy, and then illuminates the practical aspects of that philosophy with real-world experiments you can perform. Inspired by David’s real mentors, and dedicated to them, The Linux Philosophy for System Administrators is a mentor to SysAdmins everywhere; remember – “If you fail you learn.”

What You Will Learn

  • Apply the Linux philosophy to working as a SysAdmin
  • Unlock the power of the knowledge you already have
  • Fully understand and access the vast power of the command line
  • Review the power of Linux as a function of the philosophies that built it

Who This Book Is For

If you want to learn the secrets that make the best Linux SysAdmins powerful far beyond that of mere mortals; if you want to understand the concepts that unlock those secrets; if you want to be the SysAdmin that everyone else turns to when the bytes hit the fan – then this book is for you.

Security Testing, Penetration Testing, and Ethical Hacking

Book Description:

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary.

Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You’ll discover different techniques for extending Kali tools and creating your own toolset.

  • Learn tools for stress testing network stacks and applications
  • Perform network reconnaissance to determine what’s available to attackers
  • Execute penetration tests using automated exploit tools such as Metasploit
  • Use cracking tools to see if passwords meet complexity requirements
  • Test wireless capabilities by injecting frames and cracking passwords
  • Assess web application vulnerabilities with automated or proxy-based tools
  • Create advanced attack techniques by extending Kali tools or developing your own
  • Use Kali Linux to generate reports once testing is complete

Book Description:

8 mini books chock full of Linux!

Inside, over 800 pages of Linux topics are organized into eight task-oriented mini books that help you understand all aspects of the latest OS distributions of the most popular open-source operating system in use today. Topics include getting up and running with basics, desktops, networking, internet services, administration, security, scripting, Linux certification, and more.

This new edition of Linux All-in-One For Dummies has a unique focus on Ubuntu, while still including coverage of Debian, Red Hat, SuSE, and others. The market is looking for administrators, and part of the qualifications needed for job openings is the authentication of skills by vendor-neutral third parties (CompTIA/Linux Professional Institute)—and that’s something other books out there don’t address.

  • Install and configure peripherals, software packages, and keep everything current
  • Connect to the internet, set up a local area network (including a primer on TCP/IP, and managing a local area network using configuration tools and files)
  • Browse the web securely and anonymously
  • Get everything you need to pass your entry-level Linux certification exams

This book is for anyone getting familiar with the Linux OS, and those looking for test-prep content as they study for the level-1 Linux certification!

Understand the Basics of Storage with ZFS

Book Description:

Learn the basics of do-it-yourself ZFS storage on Linux. This book delivers explanations of key features and provides best practices for planning, creating and sharing your storage.

ZFS as a file system simplifies many aspects of the storage administrator’s day-to-day job and solves a lot of problems that administrators face, but it can be confusing. Introducing ZFS on Linux addresses some of these issues and shows you how to resolve them.

This book explains the technical side of ZFS, through planning the hardware list to planning the physical and logical layout of the storage.

What You’ll Learn

  • Understand the gains ZFS gives system and storage administrators and utilize its features
  • Install and configure ZFS software
  • Create and maintain ZFS pool
  • Administer ZFS storage, including sharing

Who This Book is For

This book is ideal for those who already have experience working with Linux systems but want to understand the bare basics of ZFS before moving further.

Book Description:

  • This easy-to-understand book for beginning SUSE Linux users starts off with step-by-step installation instructions and a discussion of what happens when the system is started for the first time
  • Explains how to use SUSE on the desktop, work with the file manager, connect to the Internet, and set up a home network
  • Topics addressed include performing everyday tasks, such as browsing the Web; reading e-mail and newsgroups; and using the OpenOffice.org office productivity suite and multimedia applications
  • Offers details on basic system administration and security and shows how to add new software and keep the system up to date with YaST (Yet another Setup Tool) and YaST Online Update (YOU)
  • The DVD contains SUSE 9.3 Special Edition

Everything you need to know to start coding integrations with a content management server such as Alfresco in a standard way

Book Description:

Content Management Servers (CMS) have been around for a very long time, both proprietary and open source ones, but there has not been a standard way of talking to them until recently. The Content Management Interoperability Services (CMIS) standard provides both an application programming interface and a search language (based on SQL-92). Alfresco CMIS implementation is the basis for many existing CMIS applications, and you can use CMIS too to integrate your application with Alfresco.

Alfresco CMIS is a practical, hands-on guide that provides you with a number of clear step-by-step exercises that will help you take advantage of the real power of CMIS, and give you a good foundation in using it via HTTP/XML, Java, or scripting.It starts off with an introduction to the CMIS standard, in order to update you on the service API, object model, and query language.

The first part of the book explains how to use the service API with HTTP and XML/JSON; this is done in order to show that any library, system, or tool that can make HTTP calls and parse XML or JSON, is able to talk to a content management server that supports CMIS. Next, you learn to demonstrate how a higher abstraction library can be used to talk to a CMIS server in an easy way, hiding some of the complexities of the API using the OpenCMIS Java library. Since most of the applications that are built today are web applications, the book teaches readers how CMIS can be used from JavaScript and Groovy; enterprise application integration, taking Drupal and Mule as references.

Finally, you will learn how to talk to Alfresco Cloud service via CMIS!

Who This Book Is For

If you are a developer who wants to learn how to build applications that talk to content management servers in a standard way using CMIS, this book is ideal for you. It will be helpful if you have a bit of programming experience, although it is not necessary.

What You Will Learn

  • Add, update, delete, and search for content with increasing efficiency using HTTP and XML/JSON, OpenCMIS , JavaScript, and Groovy
  • Feed content directly into a JavaScript widget from a CMIS call JSON response, so you can see how content management servers can be accessed directly via AJAX calls from a web application
  • Integrate Drupal with a content management server via CMIS, so Drupal does not have to store documents and images
  • Integrate multiple content management systems in a standard way via an enterprise service bus and a CMIS connector
  • Handle advanced concepts such as versioning, permissions, and relationships between content items
  • Talk to the Alfresco Cloud service via CMIS, so you can make content available outside the company firewall

Build your own virtual environment from scratch using VirtualBox

Book Description:

Oracle VM VirtualBox is an open source, cross-platform virtualization software package. Desktop virtualization software gives you the ability to install and run multiple operating systems on your computer in a virtual environment without disturbing the host OS. VirtualBox helps you create a completely isolated virtual environment and therefore prevents viruses, malware, or any other kinds of threats spreading from the guest-to-host machine.

Getting Started with Oracle VM VirtualBox is a step-by-step guide designed to help you understand the concepts of virtualization and start running VirtualBox on your system. This book will show you how to install, configure, and manage VirtualBox. It will also show you how to install Oracle Enterprise Linux as a guest VM and make use of the essential features of VirtualBox.

This book will show you how to install and configure VirtualBox on your desktop. You will then learn how to create a guest machine as well as features like starting, stopping, removal, and cloning of the guest machine. This book will also introduce you to some advanced features like snapshot, Clone, and VM Groups.

You will then discover how you can install Oracle Enterprise Linux 6.0 as a guest OS and also how to share a folder both in Windows and Linux operating systems. You will then learn about the different networking options available on VirtualBox and discover how they work. Finally, this book will introduce you to the different virtual storage options available in VirtualBox and show you how they work.

What you will learn from this book

  • Install VirtualBox on your desktop and create a guest virtual machine
  • Discover advanced features like snapshot, Clone, and VM Groups
  • Install Oracle Enterprise Linux 6.0 as a guest OS
  • Explore the different networking and storage options available in VirtualBox
  • Discover the memory management techniques available in VirtualBox

Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers

Book Description:

Microsoft Windows is one of the two most common OS and managing its security has spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Kali is built on the Debian distribution of Linux and shares the legendary stability of that OS. This lets you focus on using the network penetration, password cracking, forensics tools and not the OS.

This book has the most advanced tools and techniques to reproduce the methods used by sophisticated hackers to make you an expert in Kali Linux penetration testing. First, you are introduced to Kali’s top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities to be able to exploit a system remotely. Next, you will prove that the vulnerabilities you have found are real and exploitable. You will learn to use tools in seven categories of exploitation tools. Further, you perform web access exploits using tools like websploit and more. Security is only as strong as the weakest link in the chain. Passwords are often that weak link. Thus, you learn about password attacks that can be used in concert with other approaches to break into and own a network. Moreover, you come to terms with network sniffing, which helps you understand which users are using services you can exploit, and IP spoofing, which can be used to poison a system’s DNS cache. Once you gain access to a machine or network, maintaining access is important.

Thus, you not only learn penetrating in the machine you also learn Windows privilege’s escalations. With easy to follow step-by-step instructions and support images, you will be able to quickly pen test your system and network.

Who This Book Is For

If you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge about Linux operating systems and the BASH terminal emulator along with Windows desktop and command line would be highly beneficial.

What You Will Learn

  • Set up Kali Linux for pen testing
  • Map and enumerate your Windows network
  • Exploit several common Windows network vulnerabilities
  • Attack and defeat password schemes on Windows
  • Debug and reverse-engineer Windows programs
  • Recover lost files, investigate successful hacks and discover hidden data in innocent-looking files
  • Catch and hold admin rights on the network, and maintain backdoors on the network after your initial testing is done

Running Applications on Container Linux

Book Description:

CoreOS in Action is a clear tutorial for deploying container-based systems on CoreOS Container Linux.

CoreOS in Action is a clear tutorial for deploying container-based systems on CoreOS Container Linux. Inside, you’ll follow along with examples that teach you to set up CoreOS on both private and cloud systems, and to practice common sense monitoring and upgrade techniques with real code. You’ll also explore important container-aware application designs, including microservices, web, and Big Data examples with real-world use cases to put your learning into perspective.

Summary

  • Handling scaling and failures gracefully
  • Container-driven application designs
  • Cloud, on-premises, and hybrid deployment
  • Smart logging and backup practices

Book Description:

Certified Information Systems Security Professional (CISSP) is an internationally recognized and coveted qualification. Success in this respected exam opens the door to your dream job as a security expert with an eye-catching salary. But passing the final exam is challenging. This happens when they cover everything but do not revise properly and hence lack confidence.

This simple yet informative book provides concise explanations of important concepts in all 10 domains of the CISSP Common Body of Knowledge (CBK). This book will take you through the final weeks before the exam with a day-by-day plan covering all of the exam topics. It will build your confidence and enable you to crack the Gold Standard exam, knowing that you have done all you can to prepare for the big day. This book is not a replacement for full study guides; instead, it builds on and re-emphasizes concepts learned from them.

What You Will Learn

  • Review Exam Cram and Practice review questions to reinforce the required concepts
  • Follow the day-by-day plan to revise important concepts a month before the CISSP® exam
  • Boost your time management for the exam by attempting the mock question paper
  • Develop a structured study plan for all 10 CISSP® domains
  • Build your understanding of myriad concepts in the information security domain
  • Practice the full-blown mock test to evaluate your knowledge and exam preparation