Microsoft cria um MSN só para catástrofes
A epidemia de gripe suína já não assusta tanto, mas parece que os caras resolveram aproveitá-la para mostrar sua última invenção: o Microsoft Vine,
que ainda não está aberto ao público em geral mas já pode ser acessado por convidados. É uma espécie de Messenger, mas só para situações de emergência
e catástrofes em geral - o anúncio aí de cima, por exemplo, sugere o uso do Vine durante uma enchente. No lugar da sua lista de contatos, aparece um mapinha com todos eles, e ícones apontando se estão bem ou mal. Credo...
quinta-feira, abril 30, 2009
Está na hora de dizer tchau para o Adobe Reader
Que tal ouvir o conselho de especialistas em segurança, e se livrar de vez do Adobe Reader? Se você usa Mac ou Linux, é só desinstalar o bicho (o próprio sistema operacional já abre arquivos PDF). E para os usuários Windows, a dica é baixar e instalar o FoxIt Reader: é de graça, não bota o computador em risco -
e é umas 10 vezes mais rápido que o software da Adobe. Pode conferir.
Fone inteligente pode acabar com o roubo de iPod
Lembra daqueles fones de ouvido que captam os movimentos do rosto e usam essa informação pra controlar o iPod? Então olha só isso. Um cientista inglês está desenvolvendo fones com um sensor que mede as chamadas emissões otoacústicas - um barulhinho quase imperceptível que o ouvido faz. Como esse ruído é diferente em cada pessoa, poderia ser usado como identificador. Se os fones detectassem alguém estranho -no caso, o ladrão- tentando usar o iPod, simplesmente desligariam o aparelho (que teria de ser destravado na loja onde você o comprou). Boa sacada.
Windows 7 de graça por um ano!
É isso mesmo. O Windows 7 Release Candidate, que já pode ser baixado pelos amiguinhos da Microsoft e será liberado para o povão na próxima terça-feira, vai funcionar até junho de 2010. Ou seja: estão dando um ano (para ser mais exato, 13 meses) pra todo mundo experimentar o novo Windows sem pagar. Legal, né? Para quem usa o Windows Vista, a proposta é irresistível: o novo sistema é bem mais rápido e menos pentelho. E a atualização é supertranquila, sem sustos - na 2a. feira teremos um microguia ensinando a instalar o bagulho, ok? Até lá!
Agência Brasil - Pequenas empresas brasileiras de tecnologia da informação buscam parcerias no exterior - Internet
Agência Brasil - Especialistas da América Latina discutem no Rio políticas públicas para a juventude - Internet
Segue uma lista de livros eletrônicos, e-books, sobre Linux e Unix retirado do site Download Free Computer Ebooks - NET BOOKS.
Your one-stop guide to Linux–fully revised and expanded.
Get in-depth coverage of all Linux features, tools, and utilities from this thoroughly updated and comprehensive resource, designed for all Linux distributions. Written by Linux expert Richard Petersen, this book explains how to get up-and-running on Linux, use the desktops and shells, manage applications, deploy servers, implement security measures, and handle system and network administration tasks.
With full coverage of the latest platform, Linux: The Complete Reference, Sixth Edition includes details on the very different and popular Debian (Ubuntu) and Red Hat/Fedora software installation and service management tools used by most distributions. This is a must-have guide for all Linux users. Install, configure, and administer any Linux distributionWork with files and folders from the BASH, TCSH, and Z shellsUse the GNOME and KDE desktops, X Windows, and display managersSet up office, database, Internet, and multimedia applicationsSecure data using SELinux, netfilter, SSH, and KerberosEncrypt network transmissions with GPG, LUKS, and IPsec Deploy FTP, Web, mail, proxy, print, news, and database serversAdminister system resources using HAL, udev, and virtualization (KVM and Xen)Configure and maintain IPv6, DHCPv6, NIS, networking, and remote accessAccess remote files and devices using NFSv4, GFS, PVFS, NIS, and SAMBA.
As Linux continues to grow in market share as an enterprise operating system, system administrators need to solve problems in a wide range of applications and work environments. To help you get to the bottom of real-life problems quickly, Linux System Administration is organized around three common administration scenarios: Linux as a hub for a home or small office, Linux as LAMP system (Linux-Apache web server-MySQL database- PHP/Perl/Python scripting languages), and remote administration of Linux machines.
You will be able to move beyond the basics of individual Linux tools in order to competently support users and maintain systems in actual work environments. Linux System Administration provides a solid background for Linux desktop users who want to move beyond the basics of Linux, and for experienced system administrators who are looking to gain more advanced skills.
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you’re new to the job or have years of experience. With Linux Networking Cookbook, you’ll dive straight into the gnarly hands-on work of building and maintaining a computer network. Running a network doesn’t mean you have all the answers. Networking is a complex subject with reams of reference material that’s difficult to keep straight, much less remember. If you want a book that lays out the steps for specific tasks, that clearly explains the commands and configurations, and does not tax your patience with endless ramblings and meanderings into theory and obscure RFCs, this is the book for you. You will find recipes for: Building a gateway, firewall, and wireless access point on a Linux network Building a VoIP server with Asterisk Secure remote administration with SSH Building secure VPNs with OpenVPN, and a Linux PPTP VPN server Single sign-on with Samba for mixed Linux/Windows LANs Centralized network directory with OpenLDAP Network monitoring with Nagios or MRTG Getting acquainted with IPv6 Setting up hands-free networks installations of new systems Linux system administration via serial console And a lot more. Each recipe includes a clear, hands-on solution with tested code, plus a discussion on why it works. When you need to solve a network problem without delay, and don’t have the time or patience to comb through reference books or the Web for answers, Linux Networking Cookbook gives you exactly what you need.
Linux, like all Unix variants, was built for networking above all. As a result, its networking features are flexible and reliable and daunting to Linux newcomers who aren’t familiar enough with terms and concepts even to know what to look for in the documentation. Bryan Pfaffenberger does a service to people new to Linux networking with Linux Networking Clearly Explained, an assume-nothing guide to local area networks (LANs) and Internet connectivity under the open-source operating system. Pfaffenberger shows how to do everything file sharing, printer sharing, inter-machine backups, and Internet connection sharing that most home and office computer users want to do with their LANs. He explains how Linux fits into an environment of diverse equipment, showing how to make Linux machines talk to Mac OS units and Windows computers.
Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log the system to detect potential security problems. Backup and recovery policies that provide a structure for secure operations are also considered, and information related to configuring an Apache server, e-mail service, and the Internet gateway using a proxy server, an FTP server, DNS server for mapping DNS names to IP addresses, and firewall for system protection is provided.
Beginning Fedora: From Novice to Professional guides you through the tasks most new Linux users desire to perform while explaining potentially confusing concepts along the way. It will steer you through system customization opportunities and common tasks like listening to audio CDs and MP3s, watching movies, and performing office- and Internet-related jobs. A large part of the book is dedicated to advanced command-line techniques necessary to maintain your system and become a true Linux master!
Highlights of this title include the following:
* Provides an illustrated, step-by-step guide to Fedora installation and hardware configuration.
* Includes a DVD consisting of the latest Fedora operating system. Just place the disk into your drive and begin.
* Eases the transition from the Windows to the Linux desktop by focusing on key everyday tasks such as file management, peripheral configuration, MP3/video playback, and office tasks.
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.
Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You’ll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.
Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics:
* Passive network authentication and OS fingerprinting.
* iptables log analysis and policies.
* Application layer attack detection with the iptables string match extension.
* Building an iptables ruleset that emulates a Snort ruleset.
* Port knocking vs. Single Packet Authorization (SPA).
* Tools for visualizing iptables logs.
Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you’re responsible for keeping a network secure, you’ll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables along with psad and fwsnort to detect and even prevent compromises.
[quote]If you think Knoppix is just a Linux demo disk, think again. Klaus Knopper created an entire Linux distribution on a bootable CD (and now a DVD) so he could use his favorite open source tools on any computer. This book includes a collection of tips and techniques for using the enormous amount of software Knoppix offers-not just to work and play, but also to troubleshoot, repair, upgrade, and disinfect your system without having to install a thing.
Knoppix Hacks is just like the distribution it covers: a veritable Swiss Army knife packed full of tools. Scores of industrial-strength hacks-many of them new to this second edition-cover both the standard Knoppix CD and the feature-rich DVD “Maxi” distribution, which is included with this book. Discover how to use Knoppix to its full potential as your desktop, rescue CD, or as a launching point for your own live CD.
With Knoppix Hacks, you can:
* Investigate features of the KDE desktop and its Internet applications.
* Save your settings and data between reboots with persistent storage.
* Employ Knoppix as a system administration multitool to replace failed servers and more.
* Use the CD/DVD as a rescue disc to repair filesystems or a system that won’t boot.
* Rescue Windows systems with Knoppix to back up files and settings, hack the registry, and more.
* Explore other live CDs based on Knoppix that could augment your system.
* Easily install the popular Debian GNU/Linux distribution with all of your hardware detected and configured.
* Remaster Knoppix to include your favorite software and custom branding.
Whether you’re a new Linux user, power user, or system administer, this book helps you take advantage of Knoppix and customize it to your needs. You may just find ways to use Knoppix that you never considered.
The Linux Network Administrator’s Guide, Third Edition dispenses all the practical advice you need to join a network. Along with some hardware considerations, this highly acclaimed guide takes an in-depth look at all of the essential networking software that comes with the operating system–including basic infrastructure (TCP/IP, wireless networking, firewalling) and the most popular services on Linux systems. But as the follow-up to a classic, the third edition of the Linux Network Administrator’s Guide does more than just spruce up the basics. It also provides the very latest information on the following cutting-edge services:
* Wireless hubs.
* Spam filtering.
Featuring a litany of insider tips and techniques, the Linux Network Administrator’s Guide, Third Edition is an invaluable companion for any network administrator interested in integrating Linux into their Windows environment Authored by Terry Dawson, Tony Bautts, and Gregor N. Purdy, the Linux Network Administrator’s Guide, Third Edition emerged from the Linux Documentation Project (LDP). The LDP’s goal is to centralize all of the issues of Linux documentation, ranging from online documentation topics such as installing, using, and running Linux.
Ubuntu Linux is a state-of-the-art operating system, and you need a book that’s just as advanced. Along with being the most comprehensive reference to installing, configuring, and working with Ubuntu, A Practical Guide to Ubuntu Linux« also provides extensive server coverage you won’t find in any other Ubuntu book.
Best-selling author Mark Sobell begins by walking you through every feature and technique you need to know, from installing Ubuntu using the DVD included with the book to working with GNOME, Samba, exim4, Apache, DNS, NIS, firestarter, and iptables. Sobell’s exceptionally clear explanations demystify everything from system security to Windows file/printer sharing.
Make the Most of Today’s Smallest, Fastest Desktop Linux Distribution Damn Small Linux!
Damn Small Linux (DSL) is a super-efficient platform for everything from custom desktops to professional servers. Now, DSL’s creator and lead developer have written the first definitive, practical guide to this remarkable system. The Official Damn Small Linux Book brings together everything you need to put DSL to work in just minutes. Simply learn a few essentials, boot the live CD-ROM, and master the rest…one step at a time, hands-on.
If you’re new to Linux, you can quickly discover how to use DSL to take your data on the road, safely running your programs and personal environment on nearly any computer. Easily adapt DSL to run on anything from an alternative device (Internet appliance, hand-held, diskless PC, or mini-ITX system) to an older PC that might otherwise be headed for landfill.
Use this book to:
* Run DSL at blazing speed, from CD, USB pen drive, or directly from RAM.
* Run DSL from your hard drive or in a virtual environment within Windows.
* Add applications and create shareable extensions.
* Customize and remaster DSL to create your own distribution.
* Build a complete music and multimedia server.
* Use Skype VoIP phone service in DSL.
* Quickly set up an XAMPP Web server, complete with MySQL, PHP, and Perl, to host your personal Web pages.
The Linux operating system is widely used for networking and software development. It includes features to identify and control breaches of security, both internal and external. Linux Security gives you the knowledge to maximize the benefits of Linux products, keep your business safe, and gain a competitive edge!
GNU/Linux is an immensely popular operating system that is both extremely stable and reliable. But it can also induce minor headaches at the most inopportune times, if you’re not fully up to speed with its capabilities.
A unique approach to running and administering Linux systems, Linux Annoyances for Geeks addresses the many poorly documented and under-appreciated topics that make the difference between a system you struggle with and a system you really enjoy. This book is for power users and system administrators who want to clear away barriers to using Linux for themselves and for less-trained users in their organizations.
This book meticulously tells you how to get a stubborn wireless card to work under Linux, and reveals little-known sources for wireless driversand information. It tells you how to add extra security to your systems, such as boot passwords, and how to use tools such as rescue disks to overcome overly zealous security measures in a pinch. In every area of desktop and server use, the book is chock full of advice based on hard-earned experience.
Author Michael Jang has spent many hours trying out software in a wide range of environments and carefully documenting solutions for the most popular Linux distributions. (The book focuses on Red Hat/Fedora, SUSE, and Debian.) Many of the topics presented here are previously undocumented or are discussed only in obscure email archives.
One of the valuable features of this book for system administrators and Linux proponents in general is the organization of step-by-step procedures that they can customize for naive end-users at their sites. Jang has taken into account not only the needs of a sophisticated readership, but the needs of other people those readers may serve.
Sometimes, a small thing for a user (such as being able to play a CD) or for an administrator (such as updating an organizations’ systems from a central server) can make or break the adoption of Linux. This book helps you overcome the most common annoyances in deploying Linux, and trains you in the techniques that will help you overcome other problems you find along the way.
In keeping with the spirit of the Annoyances series, the book adopts a sympathetic tone that will quickly win you over. Rather than blaming you for possessing limited Linux savvy, Linux Annoyances for Geeks takes you along for a fun-filled ride as you master the system together.
This practical guide teaches you how to implement effective network protection by using your own customized firewall solution. Based on extensive practical experience, this book distills a unique set of scenario based scripts and guidelines for a proven firewall solution, into one succinct and precise book. This book shows you how to implement Linux firewalls and Quality of Service using practical examples from very small to very large networks.
After giving us a background of network security, the book moves on to explain the basic technologies we will work with, namely netfilter, iproute2, NAT and l7-filter. These form the crux of building Linux firewalls and QOS.Providing only necessary theoretical background, the book takes a practical approach, presenting case studies and plenty of illustrative examples.
The Best Fully Integrated Study System Available.
With hundreds of practice questions and hands-on exercises, RHCE Red Hat Certified Engineer Linux Study Guide, Fifth Edition covers what you need to know–and shows you how to prepare–for this challenging exam.
* 100% complete coverage of all objectives for exam RH302.
* Exam Readiness Checklist at the front of the book–you’re ready for the exam when all objectives on the list are checked off.
* Inside the Exam sections in every chapter highlight key exam topics covered.
* Real-world exercises modeled after hands-on exam scenarios.
* Two complete lab-based exams simulate the format, tone, topics, and difficulty of the real exam.
* Bonus content (available for download) includes installation screen review, basic instructions for using VMware and Xen as testbeds, and paper and pencil versions of the lab exams.
Covers all RH302 exam topics, including:
* Hardware installation and configuration.
* The boot process.
* Linux filesystem administration.
* Package management and Kickstart.
* User and group administration.
* System administration tools.
* Kernel services and configuration.
* Apache and Squid.
* Network file sharing services (NFS, FTP, and Samba).
* Domain Name System (DNS).
* E-mail (servers and clients).
* Extended Internet Services Daemon (xinetd), the Secure package, and DHCP.
* The X Window System.
* Firewalls, SELinux, and troubleshooting.
Maximum Linux Security: A Hacker’s Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems’ integrity. Written by an experienced hacker–someone who knows which systems are vulnerable and how crackers get into them–this unique guide to Linux security identifies existing and potential security holes and faults, and then describes how to go about fixing them.
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.
Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and deployment through maintenance and troubleshooting. Fox shows how to maximize your efficiency and effectiveness by automating day-to-day maintenance through scripting, deploying security updates via Red Hat Network, implementing central identity management services, and providing shared data with NFS and Samba.
Red Hat Enterprise Linux 5 Administration Unleashed contains extensive coverage of network and web services, from the Apache HTTP server and Sendmail email services to remote login with OpenSSH. Fox also describes Red Hat’s most valuable tools for monitoring and optimization and presents thorough coverage of security including a detailed introduction to Security-Enhanced Linux (SELinux).
* Streamline deployment with Kickstart.
* Find, install, update, remove, and verify software.
* Detect, analyze, and manage hardware.
* Manage storage with LVM, RAID, ACLs, and quotas.
* Use Red Hat Enterprise Linux 5 on 64-bit and multi-core systems.
* Administer users and groups more efficiently and securely.
* Ensure trustworthy backup and rapid recovery.
* Script and schedule tasks to run automatically.
* Provide unified identity management services.
* Configure Apache, BIND, Samba, and Sendmail.
* Monitor and tune the kernel and individual applications.
* Protect against intruders with SELinux and ExecShield.
* Set up firewalls with iptables.
* Enable the Linux Auditing System.
* Use virtualization to run multiple operating systems concurrently.
FreeBSD the powerful, flexible, and free Unix-like operating system is the preferred server for many enterprises. But it can be even trickier to use than either Unix or Linux, and harder still to master.
Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas considers this completely revised and rewritten second edition of his landmark work to be his best work ever; a true product of his love for FreeBSD and the support of the FreeBSD community. Absolute FreeBSD, 2nd Edition covers installation, networking, security, network services, system performance, kernel tweaking, filesystems, SMP, upgrading, crash debugging, and much more, including coverage of how to:
* Use advanced security features like packet filtering, virtual machines, and host-based intrusion detection.
* Build custom live FreeBSD CDs and bootable flash.
* Manage network services and filesystems.
* Use DNS and set up email, IMAP, web, and FTP services for both servers and clients.
* Monitor your system with performance-testing and troubleshooting tools.
* Run diskless systems.
* Manage schedulers, remap shared libraries, and optimize your system for your hardware and your workload.
* Build custom network appliances with embedded FreeBSD.
* Implement redundant disks, even without special hardware.
* Integrate FreeBSD-specific SNMP into your network management system.
Whether you’re just getting started with FreeBSD or you’ve been using it for years, you’ll find this book to be the definitive guide to FreeBSD that you’ve been waiting for.
Hong’s straightforward style makes it easy for the do-it-yourself crowd to build a server quickly using the ports collection (a software package management system). But rather than wade through the thousands of ports available, Hong focuses on the most popular and useful ones. Each package is treated as an independent project (and given a difficulty rating), so readers can dip into the book at any point to install just the packages they need, when they need them.
The book’s modules cover topics like:
* Running common FreeBSD admin commands and tasks.
* Managing the FreeBSD ports collection.
* Installing third-party apps like Apache, Courier-IMAP, SpamAssassin, CUPS, Cyrus SASL, MediaWiki, and WordPress.
* Setting up MySQL, NTP, ISC DHCP, ISC BIND DNS, PHP, OpenLDAP, OpenSSH, OpenSSL, and OpenVPN.
Appendixes explain user management, backup/restore, and network protocols.
From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions…
Learn how to think like a hacker in order to secure your Linux network.
In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software development, security is constantly being compromised. Linux has always been considered the digital playground for hackers. Many hacks, exploits, and network security tools are written on Linux because it’s readily available. Hacking Linux Exposed: Linux Security Secrets & Solutions shows you, step-by-step, how to defend against the latest Linux attacks by understanding the hacker’s methods and sinister thought processes. You’ll learn how your adversaries gather information, acquire targets, escalate privilege, gain control, plant back doors, and cover their tracks. Each chapter is divided into bite-sized chunks, covering highly publicized and little-known break-ins, tips on why they occurred, and detailed countermeasures that no Linux professional can afford to be without.
*Get details on the security features of each Linux distribution, including Red Hat Linux, SuSE, Debian, and Slackware.
*Zero in on vulnerable systems using whois, traceroute, DNS zone transfers, OS detection, ping sweeps, and port scans.
*Detect Trojan horses, backdoors, password cracking, IP spoofing, session hijacking, and trail hiding.
*Implement Log analysis tools such as the Advanced Intrusion Detection Environment (AIDE) and advanced kernel security patches, including the Linux Intrusion Detection System (LIDS).
*Learn how to prevent local users from getting root privileges.
*Prevent Denial of Service and other network attacks.
*Configure FTP sites, DNS servers, and other daemons securely.
*Plug common and obscure security holes in Sendmail, Qmail, Postfix, POP, and IMAP servers.
*Defend against Web server attacks using secure scripting techniques, user verification, and secure Apache Server configurations.
*Design, position, and test secure firewalls and other network access restrictions.
Pro DNS and BIND guides you through the challenging array of features surrounding DNS, with a special focus on BIND, the world’s most popular DNS implementation. This book unravels the mysteries of DNS, offering insight into origins, evolution, and key concepts like domain names and zone files. This book focuses on running DNS systems based on BIND 9.3.0—the first stable release that includes support for the latest DNSSEC (DNSSEC.bis) standards and a major functional upgrade from previous BIND 9 releases.
If you administer a DNS system or are thinking about running one, or if you need to upgrade to support IPv6 DNS, need to secure a DNS for zone transfer, dynamic update, or other reasons, or if you need to implement DNSSEC, or simply want to understand the DNS system, then this book provides you with a single point of reference. Pro DNS and BIND starts with simple concepts, then moves on to full security-aware DNSSEC configurations. Various features, parameters, and resource records are described and, in the majority of cases, illustrated with one or more examples.
The book contains a complete reference to zone files, Resource Records, and BIND’s configuration file parameters. You can treat the book as as a simple paint-by-numbers guide to everything from a simple caching DNS, to the most complex secure DNS (DNSSEC) implementation. Background information is still included for when you need to know what to do and why you have to do it, and so that you can modify processes to meet your unique needs.
Introduction to the DNS Basic DNS types with complete configuarion examples DNS and IPv6 Installing BIND on Linux, FreeBSD and Windows Subdomain delegation DNS and load balancing Reverse map delegation DNSSEC (DNSSEC.bis) and the DLV experimental service Key rollover and DNSSEC maintenance DNS tools and diagnostics.
Content management, blogs, and online forums are among the most significant online trends today, and Drupal, phpBB, and WordPress are three of the most popular open source applications facilitating these trends.
Drupal is a full content management system that allows you to create any type of website you desire, from an e-commerce to a community-based site. phpBB enables you to set up a bulletin board or forum. And WordPress is the software of choice for the exploding blog community. All three technologies are based on PHP and MySQL.
Building Online Communities with Drupal, phpBB, and Wordpress is authored by a team of experts. Robert T. Douglass recently created the Drupal-powered blog site NowPublic.com. Mike Little is a founder and contributing developer of the WordPress project. And Jared W. Smith has been a longtime support team member of phpBBHacks.com and has been building sites with phpBB since the first beta releases.
Fully updated for the most current Linux distributions, Linux Administration: A Beginner’s Guide, Fifth Edition, shows you how to set up, maintain, and troubleshoot Linux on a single server or an entire network. Get full details on granting user rights and permissions, configuring software and hardware, providing Internet and intranet services, and customizing Linux kernel 2.6. You’ll also learn how to get your network services IPv6 ready, implement sound security, create foolproof system backups, and use the latest virtualization technologies. Real-world, hands-on examples are included throughout.
*Install and configure popular Linux distributions, including Fedora 9, Red Hat Enterprise Linux, OpenSuSE, and Ubuntu.
*Manage users, permissions, files, folders, and applications.
*Administer Linux servers from the GUI or from the command line (shell).
*Understand and manage file systems in Linux.
*Compile, tune, and customize Linux kernel 2.6.
*Build robust firewalls and routers using netfilter and Linux.
*Manage the Linux TCP/IP networking stack and services for both IPv4 and IPv6.
*Build and deploy Web, e-mail, and FTP servers.
*Use NIS, NFS, LDAP, and Samba for resource sharing and identity management.
*Set up and administer print, DNS, POP3, IMAP3, and DHCP servers.
*Implement Linux virtualization technologies, including the native KVM platform.
Don’t believe the myth about Linux servers being more secure than Windows servers. With an increasing number of high-severity security vulnerabilities being discovered on Linux servers, which now account for a third of all network servers worldwide, administrators must act diligently to ensure system security. The latest in the How to Cheat series, How to Cheat at Securing Linux, is a highly relevant resource and the only book on Linux security to come out in the past few years. Discover why securing Linux means “measure twice, cut once” and get essential how-to on hardening the operating system, implementing an intrusion detection system and defending databases.
This book is a guide to FreeBSD for network administrators; therefore it does not cover basic installation and configuration of FreeBSD, but is about using FreeBSD to build, secure, and maintain networks.
After introducing the basic tools for monitoring the performance and security of the system the book moves on to cover using jails—FreeBSD virtual environments—to virtually run multiple instances of FreeBSD on the same hardware. Then it shows how to overcome the different bottlenecks that you may meet depending on the services you are running by tweaking different parameters to maintain a high performance from your FreeBSD server. Next it covers using the ifconfig utility to configure interfaces with different layer protocols and about connectivity testing and debugging tools. After covering using User PPP or Kernel PPP for Point-to-Point Protocol network configuration it explains basic IP forwarding in FreeBSD and the use of the built-in routing daemons, routed and route6d, which support RIPv1, RIPv2, RIPng, and RDISC. Next it covers the OpenOSPFD and OpenBGPD daemons that you can install to run OSPF and BGP on your host. Then it covers setup and configuration of IPFW and PF, and finally looks at some important internet services and how to set them up on your FreeBSD server.
This is my 1st thread on *nix (and anything related to it) ebooks and I plan to update this thread whenever I get more useful stuff on it.
To extract these files, use WinRAR 3.71 or 7-Zip freely available from:
quarta-feira, abril 29, 2009
Agência Brasil - Estudantes passam menos tempo na escola que o recomendado pela Lei de Diretrizes e Bases - Banda Larga
terça-feira, abril 28, 2009
Uma péssima notícia para os fãs de Fórmula 1
Não, não tô falando do patético desempenho do Rubinho (que mais uma vez falou e fez bobagem, e ganhou um ataque de hackers como resposta). Tô falando do game da Fórmula 1. A empresa inglesa Codemasters, que é a responsável pelo desenvolvimento do jogo, acaba de anunciar o lançamento dele: mas só numa versão bem pobre básica, para os consoles Wii e PSP. O game de verdade, com jogabilidade e gráficos de verdade, foi adiado para 2010 - que é quando ele chegará ao PC, Xbox e PlayStation 3. Que barrichelada...
Windows 7 virá de fábrica com o XP embutido
Com o Windows 7 praticamente pronto (ele chega ao mercado daqui a alguns meses, e semana que vem será possível baixar uma versão quase final), a Microsoft revelou uma novidade bombástica: o novo sistema tem o Windows XP embutido! Quando você tentar rodar algum programa incompatível com o Windows 7, ele vai acionar o recurso XP Mode - e o bom e velho Windows XP começará a rodar numa janelinha separada, só para si, dentro de uma máquina virtual. Mais ou menos como a Apple fez no Mac OS X (que inclui o ambiente Classic).
Tacada de mestre da Microsoft, pois tira o medo que as pessoas têm de fazer
o upgrade - e deixa até os mais reacionários, como eu, com vontade de instalar
o novo Windows. O único porém é que o tal XP Mode só estará presente no Windows 7 Business, que vai custar uns 400 reais (R$ 100 a mais que a versão Home Premium, pra uso doméstico) e será difícil de encontrar nos computadores vendidos no varejo. Mas é um passo na direção certa. Boa, Mico.
Sky lança serviço de alta definição
Eu adoro televisão. Tanto é que, assim que a TV digital começou a operar no Brasil, gastei meu dinheirinho num lcd para assistir às transmissões em alta definição (HDTV). E me dei mal... pois até hoje, um ano depois, pouquíssima coisa é transmitida em HD. Mas isso começou a mudar: a operadora Sky lançou, hoje, um serviço que inclui dez canais em alta definição. E ele vem com um decoder muito avançado, que realmente impressiona e tem recursos jamais vistos no Brasil - e também uma falha mortal. Vamos por partes:
1. A programação melhorou muito. O novo serviço, que se chama Sky HDTV, inclui os seguintes canais em alta definição: Fox HD, National Geographic HD, Discovery Theater HD, TNT HD, MGM HD, HBO Prime HD, HBO Full HD, Space HD, Voom HD e o pornô Sex Zone HD. Fox e NatGeo transmitem 12 horas por dia, e o HBO Prime só durante durante o horário nobre. Os demais são 24 horas. Os canais HBO, MGM, Sex Zone e Voom transmitem com 1080 linhas de resolução (1080i). Os demais, em 720p. Isso não é nenhuma maravilha, claro.
Se os canais pagos já têm dificuldade em achar coisa boa para exibir, imagine em alta definição-, mas está anos-luz à frente do que existe hoje (a Telefônica só tem dois canais pagos em HD, e a Net apenas um). O mercado brasileiro ainda tem o que evoluir -nos EUA, as empresas de tv paga oferecem mais de 100 canais em HD-, mas é um começo. E vai forçar as outras empresas do setor a reagir.
2. O aparelho é espetacular. É um receptor de satélite, que vai ligado à miniparabólica da Sky. Ele tem saída HDMI, claro, e memória interna para você gravar os programas - como nos sintonizadores da Telefônica e da NET. Mas sua capacidade é muito maior: são 500 gigabytes, mais que o triplo dos outros (160 GB). Eu tenho o aparelho da NET e ele vive com a memória lotada, pois cabem apenas 20 horas de vídeo em alta definição. No Sky, esse problema não existiria.
- O guia de programação eletrônico, que aparece na tela da tv, também é muito melhor: ele roda mais rápido e mostra a programação dos próximos 10 dias (o da NET, apenas três). E também dá para programar gravações via computador ou celular: você entra no site da Sky, clica no que quer gravar - e essa ordem é enviada para o aparelho na sua casa. Legal, né?
- Tem mais: a gravação recorrente. Com apenas um clique, o programa grava todos os episódios da sua série ou programa preferido, e sem repetir episódios. Os outros aparelhos não fazem isso (não diferenciam estréia de reprise, e é preciso gravar os episódios um a um). O decoder também tem uma ferramenta de busca inteligente: se você quiser ver/gravar todos os filmes do Tom Hanks, por exemplo, basta digitar as primeiras letras do nome dele - e aparece tudo.
- Mas o mais legal de tudo é a viagem no tempo. Quando o Sky HDTV é desligado, ele continua gravando o último canal que vc assistiu - e mantém na memória os últimos 90 minutos. Sabe quando vc chega em casa e está passando aquele programa superlegal, mas ele já está acabando? Dá para retroceder no tempo, pois o aparelho gravou tudo - sem que vc sequer pedisse.
Enfim, um show. O lançamento do ano. E o aparelho não será cobrado: enquanto é preciso pagar R$ 800 para ter o decoder da NET, a Sky só cobra a mensalidade.
3. O preço é altíssimo. Mas é competitivo. O Sky HDTV tem dois pacotes: um que custa R$ 230 menais e outro de R$ 253,90, com os canais HBO. Essa mensalidade inclui, além do ponto principal, dois pontos adicionais - que não são de alta definição, e não recebem o gravador. É uma fortuna. Mas é mais negócio que assinar o superpacote de tv da NET, que custa quase a mesma coisa (R$ 214,90) e tem muito menos canais. Além disso, o serviço da Sky funciona em qualquer lugar do Brasil - não é como os concorrentes ou a própria tv digital aberta, que só estão disponíveis em algumas poucas cidades. E por falar em tv aberta...
4. Há um grande problema. O serviço não inclui os canais abertos em alta definição, como Globo HD, Band HD, Record HD, etc... Se você quiser ver esses canais, vai ter que comprar um sintonizador digital e uma antena, e ficar fazendo um malabarismo com vários controles remotos. Pra mim, isso é inadmissível. Afinal, tanto a NET quanto a Telefônica incluem os canais abertos, em alta definição, nos seus pacotes (exceto a Record HD, né NET?).
Um cara da Sky me disse que eles vão lançar um "módulo de expansão", para que o aparelho sintonize também os canais abertos. Mas sabe lá como isso vai funcionar. E nem sei se é mesmo necessário... afinal, eles já não transmitem a Globo e os outros canais em resolução normal? Então o que custaria mandar também os canais em HD? Só existe uma explicação para isso: quiseram economizar banda de transmissão no satélite (que é superlimitada e custa caro). Será?