Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt

Znajdź zawartość

Wyświetlanie wyników dla tagów 'linuxcbt' .



Więcej opcji wyszukiwania

  • Wyszukaj za pomocą tagów

    Wpisz tagi, oddzielając je przecinkami.
  • Wyszukaj przy użyciu nazwy użytkownika

Typ zawartości


Forum

  • DarkSiders
    • Dołącz do Ekipy forum jako
    • Ogłoszenia
    • Propozycje i pytania
    • Help
    • Poradniki / Tutoriale
    • Wszystko o nas
  • Poszukiwania / prośby
    • Generowanie linków
    • Szukam
  • DSTeam no Limits (serwery bez limitów!)
  • Download
    • Kolekcje
    • Filmy
    • Muzyka
    • Gry
    • Programy
    • Ebooki
    • GSM
    • Erotyka
    • Inne
  • Hydepark
  • UPandDOWN-Lader Tematy

Szukaj wyników w...

Znajdź wyniki, które zawierają...


Data utworzenia

  • Od tej daty

    Do tej daty


Ostatnia aktualizacja

  • Od tej daty

    Do tej daty


Filtruj po ilości...

Dołączył

  • Od tej daty

    Do tej daty


Grupa podstawowa


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Gadu Gadu


Skąd


Interests


Interests


Polecający

Znaleziono 17 wyników

  1. LinuxCBT - RedCacheD Edition English | Size: 1.28 GB Category: Tutorial Intro to Key | Value Caching - RedCacheD Introduction - Redis - Features Explain key features Contrast with MemCache Discuss data limits Enumerate important Data Types Install Redis Explore environment CLI | GETs | SETs| Basics Query Redis Server non-interactively Ascertain key server stats Set string key | values Confirm existence of Keys Enumerate Data Type Determine Key Life Alter Key TTL and Test Increment | Decrement Values Get and Set Values Delete superfluous Keys Lists Describe features Enumerate common list manipulation commands Build basic list Prepend list with strings Append values and evaluate Discover numerical length of lists Sort the contents as needed Return subset of list Strip list values and evaluate Reduce list to desired values Sets Discuss features and applicability Contrast with lists Enumerate key commands Define and extend set Enumerate members of set Determine set cardinality Remove set items Find set union and intersection Define sorted set Contrast with standard set Return sorted set items Hashes Discuss features Contrast with lists and sets Enumerate key commands Define hash with common keys Retrieve all and groups of keys Increment | Decrement hash values Remove hash keys Extend hash with new keys Confirm the existence of hash keys Simple Authentication Discuss default behaviour and caveats Use openssl to generate unique password Update configuration accordingly Test client access with | sans password Confirm functionality Persistence Discuss supported strategies Query Redis for current persistence configuration Increase snapshot frequency Confirm RDB snapshot changes Enable Append Only persistence Confirm persistence strategies Disaster Recovery Discuss and contrast recovery options Confirm current persistence configuration Perform snapshot-based recovery Confirm restoration Perform append only recovery Confirm restoration Replication | Key Migration | Pipelining Discuss features and caveats Alter master configuration Update slave configuration Ensure AUTH mode enabled Define interdependent slave configuration Create new keys and ensure replication Update slave to permit writes Create new keys and ensure locality Discuss Implications Disable slave config post-replication Confirm key | values Migrate key | values to remote servers Confirm source | destination post-migration Copy-migrate keys and confirm Contrast standard processing with pipelining Compare timed results Transactions Discuss features and caveats Enumerate key commands Start and discard a transaction Confirm expected results Start and complete a transaction | confirm CLI - generate transactions with and sans errors Confirm expected behaviour Use 'WATCH' to perform conditional transactions Confirm results Python Integration Discuss features Ensure replication configuration Install 'redis-py' Python module Use interactive interface to build connection Confirm server stats Set various Python vars to Redis structures Add | Update | Remove keys Pipeline requests Snapshot Redis instance via Python Connect to remote replicas | confirm Download link: http://rapidgator.net/file/db737f394e48f619000d9d6d1b28f3bd/p6w4p.LinuxCBT..RedCacheD.Edition.part1.rar.html]p6w4p.LinuxCBT..RedCacheD.Edition.part1.rar.html http://rapidgator.net/file/b23f684d60369d1222a052a420fb9e25/p6w4p.LinuxCBT..RedCacheD.Edition.part2.rar.html]p6w4p.LinuxCBT..RedCacheD.Edition.part2.rar.html http://nitroflare.com/view/5D61DE5BFD56DE0/p6w4p.LinuxCBT..RedCacheD.Edition.part1.rar]p6w4p.LinuxCBT..RedCacheD.Edition.part1.rar http://nitroflare.com/view/01F9F8D77B1CACE/p6w4p.LinuxCBT..RedCacheD.Edition.part2.rar]p6w4p.LinuxCBT..RedCacheD.Edition.part2.rar http://uploaded.net/file/j4tdjocq/p6w4p.LinuxCBT..RedCacheD.Edition.part1.rar]p6w4p.LinuxCBT..RedCacheD.Edition.part1.rar http://uploaded.net/file/oklrpivz/p6w4p.LinuxCBT..RedCacheD.Edition.part2.rar]p6w4p.LinuxCBT..RedCacheD.Edition.part2.rar https://www.bigfile.to/file/cwfuNaP6e7qa/p6w4p.LinuxCBT..RedCacheD.Edition.part1.rar]p6w4p.LinuxCBT..RedCacheD.Edition.part1.rar https://www.bigfile.to/file/2QgmrhgRx6xs/p6w4p.LinuxCBT..RedCacheD.Edition.part2.rar]p6w4p.LinuxCBT..RedCacheD.Edition.part2.rar Links are Interchangeable - No Password - Single Extraction
  2. LinuxCBT mDB5x Edition English | mp4 | H264 1358x766 | AAC 2 ch | 7 hrs 57 min | 1.23 GB eLearning Course Objective MariaDB - DBMS MariaDB Installation - Introduction to MariaDB5x - Explore topology | target systems - Install MariaDB on targets - Highlight important directories | files - Contrast with MySQL - Identify key MariaDB clients Terminal Monitor Shell Client - Explore Terminal Monitor interface - Explore defaults - Escape to and use SHELL as needed - Secure installation MariaDB Client - Identify primary client - Use client to connect to MariaDB targets - Execute SQL queries as needed - Interact interactively | non-interactively Secure Client - Implement secure connectivity with SSH - Ensure client | server communications are secure - Contrast connection options - Perform queries as needed - Confirm equal functionality - Enable TLS security - Force TLS | SSL connectivity - Contrast both secure methods GUI Management | PHPMyAdmin - Obtain and install latest PHPMyAdmin Web Management Tool - Secure connection with TLS - Test connectivity using multiple users - Explore the rich PHPMyAdmin Interface - Import data via GUI interface Data Dump - Explain available options - Connect and dump data to flat files - Import | Export dumped data - Dump DBs | Tables selectively - Encrypt dumped data Data Import - Format data for import - Perform SHELL-based imports - Compare imported structures - Debug malformations - Tie imports to specific tables - Evaluate performance Miscellaneous Queries - Identify system stats - Identify available users - Enumerate processes - Find various LOG data - JOIN as needed Indexes - Discuss performance enhancements - Discuss current limitations - Implement indexes on key columns - Evaluate performance improvements - Import large sets - Compare post-index performance - Use Aria storage engine for Full-Text Index support VIEWS - Find use-cases for Views - Implement as desired - Compare required queries Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me Download ( NitroFlare ) http://nitroflare.com/view/C898EAE7095D07F/fbm97.LinuxCBT.mDB5x.Edition.part1.rar http://nitroflare.com/view/914AA33B4C6A0C5/fbm97.LinuxCBT.mDB5x.Edition.part2.rar http://nitroflare.com/view/428E05F02102864/fbm97.LinuxCBT.mDB5x.Edition.part3.rar Download ( Uploaded http://uploaded.net/file/7iz5tflz/fbm97.LinuxCBT.mDB5x.Edition.part1.rar http://uploaded.net/file/2hfop4v1/fbm97.LinuxCBT.mDB5x.Edition.part2.rar http://uploaded.net/file/29yncika/fbm97.LinuxCBT.mDB5x.Edition.part3.rar Download ( Rapidgator ) http://rapidgator.net/file/3ffa7157ec9f17783ce466bc06349a46/fbm97.LinuxCBT.mDB5x.Edition.part1.rar.html http://rapidgator.net/file/1792e4e374fadda81431c151e7d10504/fbm97.LinuxCBT.mDB5x.Edition.part2.rar.html http://rapidgator.net/file/83748c80a310a053ecce6ef0d78d3b18/fbm97.LinuxCBT.mDB5x.Edition.part3.rar.html Download ( Uploadable ) http://www.uploadable.ch/file/cnT2G7GR29bg/fbm97.LinuxCBT.mDB5x.Edition.part1.rar http://www.uploadable.ch/file/CtAgQ2er3EYU/fbm97.LinuxCBT.mDB5x.Edition.part2.rar http://www.uploadable.ch/file/3fA2wRxqFBJG/fbm97.LinuxCBT.mDB5x.Edition.part3.rar Download (Turbobit) http://turbobit.net/xsl9mumx39nw/fbm97.LinuxCBT.mDB5x.Edition.part1.rar.html http://turbobit.net/ekm5n8bxbxsn/fbm97.LinuxCBT.mDB5x.Edition.part2.rar.html http://turbobit.net/6opedhsbx352/fbm97.LinuxCBT.mDB5x.Edition.part3.rar.html
  3. LinuxCBT Moni-Zab Edition English | mp4 | H264 1356x766 | AAC 2 ch | 4 hrs 8 min | 647 Mb Genre: eLearning Course Objective Intro to Zabbix Monitoring Environment Introduction - Zabbix - Features - Discuss features and benefits - Explain supported protocols - Discuss polling mechanism - Explore Zabbix process architecture - Examine simplicity of deployment - Identify target Zabbix HOST - Explore classroom environment Zabbix Installation - Identify and obtain packages - Install Zabbix server for MySQL - Install Web Front-End - Explore package footprint - Identify key configuration files - Install Zabbix Agent where applicable - Explore Agent configuration directives - Setup Agent environment - Evaluate configuration Web Front-End - Ensure dependencies are met - Install and configure Web Front-End - Correct problems during installation - Access web interface - Update default credentials - Briefly peruse web front-end environment - Prepare for general usage Monitor HOSTs - Identify targets for monitoring - Obtain and deploy appropriate agents - Debug configuration as needed - Add new HOSTs to Zabbix monitoring environment - Identify broken dependencies - Rectify problems as they arise SELinux Integration - Debuge CentOS SELinux problems - Identify AVC errors related to Zabbix - Propose workarounds - Implement workaround on SELinux-enabled HOSTs - Confirm changes have positively impacted the configuration - Evaluate and discuss findings Notifications Logic - Explore defaults - Invoke service failures - Debug missing messages | notifications - Enable message deliveryI - Discuss applicable message notification components - Unfail services and debug messages - Fail services and identify messages - Contrast scenarios and discuss applicability Maintenance Window - Discuss benefits - Identify configuration interface components - Define maintenance window with recurring schedule - Examine notifications delivery response as a result - Contract maintenance window to impact notifications delivery - Evaluate system response - Discuss and explain behavior DevOps | Operations User Definition - Discuss benefits of offloading responsibilities - Define DevOps user with appropriate privileges - Assign requisite permissions as needed - Confirm DevOps access to Zabbix - Alter Super Admin's notification schedule accordingly - Test message | notification delivery to DevOps - Evaluate setup Zabbix Reports Overview - Discuss available reports - Identify available reports - Peruse SLA reports - Discuss possibilities for bar reports DOWNLOAD http://rapidgator.net/file/5a74957cd7b5878e9378ada85753c325/8Moni.part1.rar.html http://rapidgator.net/file/f02419b48da20c51c57e47044c798ee2/8Moni.part2.rar.html http://rapidgator.net/file/b9d876942725c4c7102bfecee75d6e73/8Moni.part3.rar.html http://rapidgator.net/file/33993ae26ecb9dec284a348f2f8ecd50/8Moni.part4.rar.html http://rapidgator.net/file/ce66c154468cca5d199ce9e929623a33/8Moni.part5.rar.html http://rapidgator.net/file/6a4b278998b4ddb471ace6b1358b7dc5/8Moni.part6.rar.html http://rapidgator.net/file/b105c088ac9895c77c83e87d2968f2c1/8Moni.part7.rar.html http://uploaded.net/file/uzz65sp7/8Moni.part1.rar http://uploaded.net/file/5flzpz35/8Moni.part2.rar http://uploaded.net/file/oxdvqqcu/8Moni.part3.rar http://uploaded.net/file/phfuvayt/8Moni.part4.rar http://uploaded.net/file/ptnjmmt0/8Moni.part5.rar http://uploaded.net/file/zfe6sizq/8Moni.part6.rar http://uploaded.net/file/7qpsqrjx/8Moni.part7.rar http://www.hitfile.net/00nx/8Moni.part1.rar.html http://www.hitfile.net/01Am/8Moni.part2.rar.html http://www.hitfile.net/01QG/8Moni.part3.rar.html http://www.hitfile.net/02qs/8Moni.part4.rar.html http://www.hitfile.net/02ij/8Moni.part5.rar.html http://www.hitfile.net/00bE/8Moni.part6.rar.html http://www.hitfile.net/00te/8Moni.part7.rar.html http://www.uploadable.ch/file/ZjhwWw39q7wj/8Moni.part1.rar http://www.uploadable.ch/file/xFBMKT6eWZ2P/8Moni.part2.rar http://www.uploadable.ch/file/cUzekkGNnZMZ/8Moni.part3.rar http://www.uploadable.ch/file/nKtVBpCpCfC5/8Moni.part4.rar http://www.uploadable.ch/file/XcbcGFmuUhxh/8Moni.part5.rar http://www.uploadable.ch/file/JN3Mrp[beeep]YUs/8Moni.part6.rar http://www.uploadable.ch/file/VY3ugFTxbAvu/8Moni.part7.rar
  4. LinuxCBT systemd Edition English | mp4 | H264 1356x766 | AAC 2 ch | 4 hrs 20 min | 567 Mb Genre: eLearning Course Objective systemd System | Daemon (Services) Manager systemd Features | Boot - Discuss features and benefits - Contrast with SysV INIT - Explore boot environment - Highlight systemd functionality - Change systemd boot target - Evaluate startup environment - Draw parallels to SysV INIT where appropriate System Information - Identify important systemd utilities - Expose time | date related settings - Alter timezone settings and evaluate - Disucss locale control - Discuss available hostname settings - Identify default hostname configuration - Alter hostnames as needed and evalute changes - Confirm persistence of altered results - Identify logged-in users - Discuss various applicable systemd tools Targets | RunLevels - Contrast SysV RunLevels with systemd Targets - Identify default target | runlevel - Alter target as needed and contrast with runlevels - Transcend targets and track runlevel equivalents - Enumerate loaded | supported targets - Enter 'rescue' target and evaluate - Reduce services | enter 'emergency' target - Contrast both targets | discuss relevance - Change default target on managed nodes System Control - Identify key systemd utility - Explore power management commands | options - Contrast with historical tools - Dump ALL systemd-managed objects - Identify objects of interest - Enumerate failed objects - Expose systemd object status - Parse output by: sockets, devices and services - Manage services | Contrast with SysV - Disable | Enable services | Confirm persistence Remote Control - Setup SSH environment to support effortless remote control - List available remote systemd-managed objects - Ascertain default target on remote nodes - Alter default target on remote nodes and confirm persistence - Manipulate targets on remote nodes and evaluate LOG - Discuss important features of systemd logging - Reboot nodes and identify stored LOGs - Enable persistence of retained LOGs - Parse LOGs to obtain objects of interest - Find LOG entries pertaining to specific $USER - Monitor LIVE LOGs and contrast with 'watch' - Extract LOG ranges - Identify BOOT LOG data - Expose LOG footprint DOWNLOAD http://rapidgator.net/file/458ff8949efb31d2e5b4535f9c50084b/9systemd.part1.rar.html http://rapidgator.net/file/7e1f65edacf5c30e44d639ff7f7aa9f9/9systemd.part2.rar.html http://rapidgator.net/file/62cdca83b08d2275f0740d38d940ce2a/9systemd.part3.rar.html http://rapidgator.net/file/3ad278b1ba76c7724be95d0d678d64ee/9systemd.part4.rar.html http://rapidgator.net/file/99724103bfbf458859dc2debef856539/9systemd.part5.rar.html http://rapidgator.net/file/455f87d735283007f692de5a3fd489a1/9systemd.part6.rar.html http://uploaded.net/file/av069rmy/9systemd.part1.rar http://uploaded.net/file/dcvxyzb3/9systemd.part2.rar http://uploaded.net/file/ivenopkp/9systemd.part3.rar http://uploaded.net/file/2bcu3kly/9systemd.part4.rar http://uploaded.net/file/ytnw834v/9systemd.part5.rar http://uploaded.net/file/c2z8gxu5/9systemd.part6.rar http://www.hitfile.net/00z4/9systemd.part1.rar.html http://www.hitfile.net/01IG/9systemd.part2.rar.html http://www.hitfile.net/01k6/9systemd.part3.rar.html http://www.hitfile.net/00JR/9systemd.part4.rar.html http://www.hitfile.net/007w/9systemd.part5.rar.html http://www.hitfile.net/01e7/9systemd.part6.rar.html http://www.uploadable.ch/file/USDQjcRQYzPH/9systemd.part1.rar http://www.uploadable.ch/file/tBjeEFSyJN8x/9systemd.part2.rar http://www.uploadable.ch/file/5mFmpDEDnWrG/9systemd.part3.rar http://www.uploadable.ch/file/eDTHKWrMgZRS/9systemd.part4.rar http://www.uploadable.ch/file/w6YFw2uSQPbh/9systemd.part5.rar http://www.uploadable.ch/file/gJUgzgrbCCDd/9systemd.part6.rar
  5. LinuxCBT EL-7x Edition English | mp4 | H264 1356x764 | AAC 2 ch | 25 hrs 13 min | 3.53 Gb Genre: eLearning Course Objective Features | Installations - Discuss features of RedHat | CentOS Enterprise Linux 7 - Explore installation options - Perform GUI installation - Perform Text-Mode Installation - Provision Network Installation repository - Perform Network Installation - Perform Kickstart Installation - Peruse Rescue Mode Basic $SHELL Tools - 'pwd', 'touch', 'stat', 'ls', 'id' - 'echo', 'cat', 'head', 'tail', 'more', 'less' - 'cp', 'mv' - transport content as needed - 'tty' - Discuss terminals - 'tar' - explore features and advantages of tarballs - 'gzip', 'bzip2', 'zip' - Compress content - Use checksums to validate data pre|post-transmissions - 'file' - discuss logic used to ascertain file type - 'dd' - generate content as desired - Use 'w' commands - 'ps' - explore process lists - free & top - explore process management with top - Process lines with: 'grep' - Process fields with: 'awk' - Explore 'sed' - streams processing - User and group management concepts SystemD | System Control - Discuss new framework - Contrast with INITD - Identify FS footprint - Alter system run-states via system control - Manage services as needed - Peruse INITD support Storage Administration | File System (FS) Semantics | Features | Usage - Discuss latest default FS implementation - Identify common FS object types - Discuss the benefits of SyMbolic Links - Implement a variety of Soft Links and evaluate characteristics - Contrast Soft && Hard Links - Implement Hard Links and evaluate characteristics - Manipulate both Link forms and evaluate - Identify current virtual memory environment - Implement file-based additional virtual memory - Allocate partitions to virtual memory usage - Enable | Disable virtual memory as required - Explore default XFS implementation - Provision XFS storage blocks as needed - Expand XFS blocks as required - Explore default Logical Volume Management (LVM) Environment - Provision LVM storage components - Aggregate components into accessible blocks as desired - Manipulate LVM storage on-demand CRON - System Scheduler - Peruse Cron Implementation - Examine schedule options - System-wide && User-wide Cron Jobs - Run jobs as needed - Check Cron status periodically Syslog | Log Rotation Facilities - Explore LOG rules engine - Examine OS-provisioned LOG entries - Archive LOGs to remote system - Peruse Logrotate environment - Rotate LOGs as needed - Examine results Common | Invaluable Network Tools - 'ping' - availability - 'mtr' - interhost paths and metrics - 'telnet' - TCP socket availability - 'netstat' - examine sockets - 'arp' - L2 broadcast domain (VLAN) neighbors - 'dig', 'nslookup', 'host' - name resolution tools - 'wget', 'curl' - content retrieval agents Time Administration | ChronyD - Examine default environment - Contrast with prior versions - Explore 'chronyd' time service - Contrast 'chronyd' with 'ntpd' - Configure 'chronyd' to permit internal synching - Ensure synchronized time across nodes YUM | Package Management - Discuss features - Contrast with 'rpm' - Compare with similar tools - Explore default environment with 'yum' - Install | Remove packages as needed - Apply updates where applicable - Provision internal PROD YUM Repository - Ensure functionality - Manage packages IP Administration - Discuss features - Contrast with 'ifconfig' | alias method - Discuss 'NetworkManager' && 'ifcfg-*' scripts - Peruse appropriate config tree - Examine important directives - Add IP resources dynamically - Committ desired resources to persist - Test persistance of IP resources DHCPD | BIND DNS | Services - Provision dedicated virtual DHCP subnet - Setup DHCPD with basic configuration - Ensure address assignation - Trace administered resources - Provision DNS Caching-Only service - Test relayed resolution of proxied requests - Setup Primary DNS service && Test - Replicate Primary DNS records to Secondary instance - Test replication and resolution across nodes FTP Server - Identify && provision secure FTP server service - Explore default configuration - Alter configuration to suit hypothetical security policy - CHROOT user prin[beeep]les to heighten security - Test configuration - Move data HTTPD Server - Discuss features - Implement HTTPD server - Explore default configuration - Identify important directories, files and directives - Configure IP-based Virtual Hosts && Test configuration - Update configuration to support Name-based Virtual Hosts - Contrast configurations - Use 'apachectl' to validate && effect configuration changes MariaDB | RDBMS - Explain implementation - features | benefits - Implement on targets - Secure instances and test access - Explore defaults - Provision simple DB container with table and sample data - Test access - Purge sample DB container NMAP | Reconnaissance - Discuss features - Install NMap - Explore footprint - Analyze locally-published resources - Contrast with routable resources - Explore broadcast domain - Perform a variety of scans to obtain more intel - LOG results for post-processing Packet Capturing - Discuss sample use-cases - Capture default traffic set - LOG captured traffic for post-processing - Tune captures with BPF filters - Post-process with TCPDump && WireShark FirewallD - Discuss implementation - Relate to IPTables - Install GUI management tool - Explore default policies - Contrast Run-Time && Permanent Policies - Enter 'Panic' mode in hypothetical situation - Resume normal communications - Define PROD service group for rules-aggregation - Apply PROD service group and test communications MISC - Intro to SELinux Implementation - Examine default SSH behavior - Restrict SSH access to SFTP only connections - Enforce file nomenclature via SSH - Test functionality DOWNLOAD http://rapidgator.net/file/b87833299eecb3f7b860a6ccc4124c2e/gLinuxCBT.part1.rar.html http://rapidgator.net/file/28af4eb84bbb87bf3652f4e39bd71409/gLinuxCBT.part2.rar.html http://rapidgator.net/file/250661ad6ce79fc93de62f199d687bd3/gLinuxCBT.part3.rar.html http://rapidgator.net/file/cdcab32c2ba10f1910f549fe9e473175/gLinuxCBT.part4.rar.html http://rapidgator.net/file/c0c374acd47a30b6c0dff8608e584f7e/gLinuxCBT.part5.rar.html http://rapidgator.net/file/88b6a4262a1be1db1f5c38c15dac9eac/gLinuxCBT.part6.rar.html http://rapidgator.net/file/4507425dcd3c52dd7498d508705d5633/gLinuxCBT.part7.rar.html http://rapidgator.net/file/150a51f5502bde4961acd9c9bc303eb4/gLinuxCBT.part8.rar.html http://uploaded.net/file/rlb4ptxa/gLinuxCBT.part1.rar http://uploaded.net/file/kvcurc6d/gLinuxCBT.part2.rar http://uploaded.net/file/rd6kjlvo/gLinuxCBT.part3.rar http://uploaded.net/file/v554l9te/gLinuxCBT.part4.rar http://uploaded.net/file/0x6cvp69/gLinuxCBT.part5.rar http://uploaded.net/file/wf59igyb/gLinuxCBT.part6.rar http://uploaded.net/file/9d7f0o40/gLinuxCBT.part7.rar http://uploaded.net/file/xukicbbq/gLinuxCBT.part8.rar http://www.hitfile.net/6bh7/gLinuxCBT.part1.rar.html http://www.hitfile.net/6bt/gLinuxCBT.part2.rar.html http://www.hitfile.net/6br/gLinuxCBT.part3.rar.html http://www.hitfile.net/6bp/gLinuxCBT.part4.rar.html http://www.hitfile.net/6bs/gLinuxCBT.part5.rar.html http://www.hitfile.net/6bq/gLinuxCBT.part6.rar.html http://www.hitfile.net/6bm/gLinuxCBT.part7.rar.html http://www.hitfile.net/6boe/gLinuxCBT.part8.rar.html http://www.uploadable.ch/file/y2xr2CMAS3SD/gLinuxCBT.part1.rar http://www.uploadable.ch/file/w72MXApgen3p/gLinuxCBT.part2.rar http://www.uploadable.ch/file/GtZvbVgf3ccX/gLinuxCBT.part3.rar http://www.uploadable.ch/file/UudgW4aG48MN/gLinuxCBT.part4.rar http://www.uploadable.ch/file/4B9HZX3W3QrZ/gLinuxCBT.part5.rar http://www.uploadable.ch/file/6xv44nqQJjrH/gLinuxCBT.part6.rar http://www.uploadable.ch/file/GajcGurM7NSs/gLinuxCBT.part7.rar http://www.uploadable.ch/file/w3BkRXE9P39U/gLinuxCBT.part8.rar
  6. LinuxCBT CentOS7x Edition English | mp4 | H264 1356x764 | AAC 2 ch | 16 hrs 16 min | 2.12 Gb Genre: eLearning Course Objective OS Installation - Highlight key CentOS features - Confirm installation images - Install CentOS Desktop - Provision CentOS Server - Install CentOS Server with GUI - Carry-out Kickstart installation - Clone VMWare instances - Confirm node accessibility systemd System | Service Management - Discuss key features - Alter system state and evaluate - Identify managed objects - Manage services - Explore systemd LOG data $SHELL Basics | Commands - ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami - alias, cat, file, chmod, chown, history - STD(IN|OUT), Pipes, Redirection, Command Chaining - ps, df, top, free, /proc, /boot - less & more, head & tail, find, which & whereis, w, who - Compression | Archival Tools - Checksums - Awk | Sed | Grep Usage - User | Group Management File System Permissions | Ownership - Identify common file types - Identify default permissions applied to objects - Alter permissions | ownership on various objects and evaluate - SETUID | SETGID | Sticky Bit - Study SYMLINK behavior Storage Management - Identify SWAP environment - Provision dedicated SWAP partitions | Add to Pool - Add | Remove SWAP from pool as needed - Provision File System-based SWAP - Identify default storage configuration - Provision new storage as needed - Identify LVM defaults - Add new partitions to LVM management - Allocate storage to LVM Volume Groups - Create Logical Volumes (LVs) as needed - Overlay File System and mount where applicables System Scheduler - Discuss features | limitations - Identify default system-wide schedule - Peruse various default Cron Jobs - Schedule simple job and monitor recurrence - Evaluate results SYSLOG | Log Rotation - Peruse default syslog configuration - Discuss syslog rules mechanism - Trap externally-generated log data - Explore Log Rotate defaults - Ensure rotated logs are compressed - Extend default retention scheme - Force Log Rotation as needed Common Network Utilities - Identify important basic utilities - 'ping', 'traceroute', 'tracepath', 'mtr', 'telnet', 'netstat' - Use commands to obtain basic details from targets - Contrast similar tools Package Management - Explore default environment - Search for packages of interest and install - Dump important metadata from packages - Update YUM repository as needed - Setup internal YUM repo for expedited delivery - Apply updates as available IP Administration Identify default configuration Add IPs as needed Ensure IP persistence across resets Make nodes multi-homed and assign IPs as needed Contrast various interface management schemes DNS Services - Install BIND - Confirm Caching-Only upstream queries - Define Primary zone - Confirm resolution of records - Replicate Primary zone to slave nodes - Confirm resolution of changes on ALL nodes - Provision additional internal zone for management Apache HTTPD | Web Services - Identify key Apache features - Explore default environment - Peruse Apache LOG format - Provision IP-based Virtual Hosts - Provision Name-based Virtual Hosts - Contrast Virtual Hosts methods - Dedicate LOGs to Virtual Hosts - Evaluate VHost environment MariaDB Introducation | Usage - Install MariaDB - Identify key binaries | files - Secure installation - Connect and execute queries Security - Identify key Tools - Configure Passwordless AUTH across systems - Use: SSH | SCP | SFTP to communicate securely - Configure PuTTy SSH with Passwordless AUTH method - Use NMap to gather information from network - Sniff network traffic with TCPDump - Evaluate TCPDump data with TCPDump and WireShark DOWNLOAD http://rapidgator.net/file/fb439d401f155027da1f68f808aceb33/iCentOS7x.part01.rar.html http://rapidgator.net/file/3931f19266ea6ec9b202f0f78d8bb0fc/iCentOS7x.part02.rar.html http://rapidgator.net/file/c43ef4d890e396ad331ac3e05d06017a/iCentOS7x.part03.rar.html http://rapidgator.net/file/9f90f4b4a18eb98746a77d2e37247079/iCentOS7x.part04.rar.html http://rapidgator.net/file/2a52b6d157238142f4e1d0dfbf161378/iCentOS7x.part05.rar.html http://rapidgator.net/file/160ae89546d193d44a977c34ddcc4cb7/iCentOS7x.part06.rar.html http://rapidgator.net/file/6f336cf4720322595a59ccb2ce0e9505/iCentOS7x.part07.rar.html http://rapidgator.net/file/05b718245388b7419453853d838deb8e/iCentOS7x.part08.rar.html http://rapidgator.net/file/122bdd849b4ca152a39a34c874e86bcc/iCentOS7x.part09.rar.html http://uploaded.net/file/vslyckx7/iCentOS7x.part01.rar http://uploaded.net/file/3haglug4/iCentOS7x.part02.rar http://uploaded.net/file/nomzh87f/iCentOS7x.part03.rar http://uploaded.net/file/965g5qef/iCentOS7x.part04.rar http://uploaded.net/file/ktgjjdl7/iCentOS7x.part05.rar http://uploaded.net/file/cl5jp3b4/iCentOS7x.part06.rar http://uploaded.net/file/cz8r2oov/iCentOS7x.part07.rar http://uploaded.net/file/7mnt9tzs/iCentOS7x.part08.rar http://uploaded.net/file/bx74q9bd/iCentOS7x.part09.rar http://www.hitfile.net/6btC/iCentOS7x.part01.rar.html http://www.hitfile.net/6bqm/iCentOS7x.part02.rar.html http://www.hitfile.net/6bmd/iCentOS7x.part03.rar.html http://www.hitfile.net/6bp6/iCentOS7x.part04.rar.html http://www.hitfile.net/6bs0/iCentOS7x.part05.rar.html http://www.hitfile.net/6bpa/iCentOS7x.part06.rar.html http://www.hitfile.net/6br7/iCentOS7x.part07.rar.html http://www.hitfile.net/6bnf/iCentOS7x.part08.rar.html http://www.hitfile.net/6brt/iCentOS7x.part09.rar.html http://www.uploadable.ch/file/rSKDspM73hs6/iCentOS7x.part01.rar http://www.uploadable.ch/file/3gWyNDvAmFtd/iCentOS7x.part02.rar http://www.uploadable.ch/file/DgUuqrf5zRRy/iCentOS7x.part03.rar http://www.uploadable.ch/file/GNKTtAYkJ9GZ/iCentOS7x.part04.rar http://www.uploadable.ch/file/hfKY24PTP7da/iCentOS7x.part05.rar http://www.uploadable.ch/file/nnyjyepjRdHv/iCentOS7x.part06.rar http://www.uploadable.ch/file/qhRpCD7j2HPA/iCentOS7x.part07.rar http://www.uploadable.ch/file/9Vk7QFjJGzcf/iCentOS7x.part08.rar http://www.uploadable.ch/file/PWz5qCyE3nug/iCentOS7x.part09.rar
  7. LinuxCBT SLES-12x Edition English | mp4 | H264 1356x764 | AAC 2 ch | 16 hrs 3 min | 1.98 Gb Genre: eLearning Course Objective Installations - Identify and obtain ISO images - Prep VM GUEST - Perform Desktop installation - Tweak Desktop environment - Publish repository via HTTP - Perform Server installation via HTTP - Confirm setup and tweak - Discuss various installation methods - Perform SSH-based installation - Perform VNC-based installation - Confirm installation images - Evaluate SystemD Target - Clone GUEST installation - Evaluate results of various installation methods Basic Linux Skills - Command Line Interface (CLI) - BASH - Introduction to GNOME Terminal - Demonstrate usage of the following useful commands & concepts - ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami, man, info - alias, cat, file, chmod, chown, history - Standard in/out, UNIX Pipes, Redirection, Command Chaining - ps, df, free, vmstat, top, kill - less & more, head & tail, diff - which & whereis, w, who - Explore BASH configuration files - Use grep and awk to process text files - Archival & Compression Utilities: tar, gzip, bzip2, zip - Explore important facets of BASH environment Common Network Clients - File Transfer Protocol (FTP) client - Install and use LFTP - FTP Client to connect to FTP resources - Mirror and reverse mirror using LFTP to synchronize data - Wget - HTTP/HTTPS/FTP connectivity - Explore SSH clients - Discuss features - Identify key SSH-client files (.known_hosts, public/private key pairs,etc.) - Use Secure Copy Protocol (SCP) to move data between systems non-interactively - Use Secure File Transfer Protocol (SFTP) to move data between systems interactively - Demonstrate how to generate Public/Private key (RSA/DSA) pairs using ssh-keygen - Copy public keys to remote systems using: ssh-copy-id - Demonstrate using SSHto authenticate to remote Linux hosts without passwords - Authenticate to remote Linux systems using alternate credentials - Generate Public Key/Private Key pairs for use with file and E-mail encryption - Demonstrate using E-mail client with GNU Privacy Guard (GPG) Open PGP for E-Mail encryption - Use ping, netstat, arp, telnet, traceroute, ifconfig - network diagnostics - Use dig, host, nslookup, whois name resolution clients Users, Groups & Permissions - User and group creation & management concepts - passwd, shadow, group, gshadow files - Use lastlog to determine system-access to various terminals - Use YaST to create and manage users and groups - Use stat to ascertain file information - SETUID | SETGID | Sticky Bit - Discuss and Implement Hard and SyMbolic links SYSLOG | LOG ROTATE - Explore Boot log & System Log - Explanation of syslog facilities & levels - Discuss rSYSLOG features & enhancements - Demonstrate syslog administration - Enable rSYSLOG network listener - Explore automatic log rotation and customization via Logrotate - Configure Logrotate to rotate & compress sample log files Storage Administration - Provision additional SWAP storage paritions and files - Identify allocated swap space to the kernel - Committ changes to /etc/fstab for persistence - Disable swapping with swapoff as necessary - Introduction to BTRFS File System - Explore BTRFS defaults - Administer important aspects of BTRFS - Discuss features and benefits of LVM - Implement Logical Volume Management (LVM) - Manage LVM via GUI and CLI - Evaluate results Network - Physical & Logical Configuration - Identify key management tool - Explore interfaces across systems - Provision IP aliases and evaluate - Add network routes as needed - Confirm interface configuration CRON - System Scheduler - Explore Cron Implementation - Explain scheduling options - Global and scope-based Cron options - Schedules jobs to run & examine the output - Configure individual Crontab entries Implement Network Time Protocol Daemon (NTPD) Client/Server - Configure Network Time Protocol (NTP) to perform client/server time synchronization - Identify NTP bounded UDP interfaces - Synchronize with various NTP instancs - Confirm synchronization status Dynamic Host Configuration Protocol (DHCP) - Provision dedicated broadcast domain - Configure DHCP scope - Discuss various options - Confirm functional configuration - Add reservations and test Domain Name System (DNS) - Explore SUSE DNS configuration via YaST - Configure BIND as a caching-only DNS server - Implement Master DNS Zone - Configure Reverse Zone for local subnet - Implement Dynamic Domain Name System (DDNS) Zones (Forward/Reverse) - Explain DHCP and DNS update integration options - Integrate DHCP with DNS via Encypted Transaction Signatures (TSigs) - Evaluate results of BIND configuration using DIG & host - Implement DNS sub-domains (Third-level domains) FTP Service - Install FTP Server - Explore common options - Test anonymous and authenticated connectivity - Disable anonymous access - CHROOT authenticated users | debug where required Software Repository - Examine existing configuration - Provision HTTP repository | confirm HTTP access - Add Repos to configuration | evaluate Apache HTTPD Server - Install Apache HTTPD - Confirm content delivery - Enable IP-based Virtual Hosts - Test access to various content - Transition to Name-based Virtual Hosts - Contrast with IP-based Virtual Hosts Network Reconnaissance - Install NMap - Explore common features - Ascertain local resources - Contrast discrepancies - Find subnet-wide hosts - Perform comprehensive scan of subnet-wide hosts GPG Content Protection - Discuss features - Generate usage keys - Share public keys - Encrypt and share content - Decrypt and confirm integrity Packet Capturing - Discuss features - Capture various traffic - Store captures for analysis - Read captures with various filters - Capture using various BPFs WireShark | Packet Analysis - Discuss Usage - Install WireShark - Analyze TCPDump captures - Reconstruct streams - Identify interesting packet characteristics SuSE Firewall - Discuss features - Explore defaults - Apply custom rules - Apply rules to internal zone - Examine behavior DOWNLOAD http://rapidgator.net/file/85c7d9c8285060264c7488ee7fa362b3/4SLES.part1.rar.html http://rapidgator.net/file/b6543d5a8bc790097c2e53d2c263c7a6/4SLES.part2.rar.html http://rapidgator.net/file/e5e7d18b50697145e8a0411e6eb62cf1/4SLES.part3.rar.html http://rapidgator.net/file/1fdb2c6011f4455d03dc59a811a4cc27/4SLES.part4.rar.html http://rapidgator.net/file/37efcb1df4e738d304e2a9c186eff950/4SLES.part5.rar.html http://uploaded.net/file/yg84onas/4SLES.part1.rar http://uploaded.net/file/s9i50qun/4SLES.part2.rar http://uploaded.net/file/9zoaowdx/4SLES.part3.rar http://uploaded.net/file/gavxrpgo/4SLES.part4.rar http://uploaded.net/file/uv8q9hvm/4SLES.part5.rar http://www.hitfile.net/6Aq/4SLES.part1.rar.html http://www.hitfile.net/6AO/4SLES.part2.rar.html http://www.hitfile.net/6Ax/4SLES.part3.rar.html http://www.hitfile.net/6Bg/4SLES.part4.rar.html http://www.hitfile.net/69v/4SLES.part5.rar.html http://www.uploadable.ch/file/d6UMbFryUANH/4SLES.part1.rar http://www.uploadable.ch/file/gExMUYEVEptY/4SLES.part2.rar http://www.uploadable.ch/file/aRNe9GSMWXxd/4SLES.part3.rar http://www.uploadable.ch/file/9jux3QTcb7St/4SLES.part4.rar http://www.uploadable.ch/file/VJfUKpZHMQNS/4SLES.part5.rar
  8. LinuxCBT SLES-10 Edition English | .MOV | aac, 44100 Hz, stereo | h264, yuv420p, 750x334, 5.00 fps | 3.75 Gb Genre: eLearning Network-based (HTTP & SSH) Installations Enable Apache HTTPD on Installation server Configure SUSE Ent. 10 Server as an HTTP Installation source with Apache Discuss system requirements Install SUSE Ent. 10 Server via HTTP Confirm results Grand Unified Boot Loader (GRUB) & System V Linux Runlevel implementation Explore GRUB configuration Explain SUSE Linux System V Init Runlevel (0 - 6) concepts & applications Identify key startup files, including scripts (inittab,Sscripts,Kscripts,etc.) GNOME & YaST Explore the GNOME Desktop Interface Explore YaST, centralized management tool Install packages using Yast package manager Basic GNU/Linux Skills - Command Line Interface (CLI) - BASH Introduction to GNOME Terminal Demonstrate usage of the following useful commands & concepts ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami, man, info alias, cat, file, chmod, chown, history Standard in/out, UNIX Pipes, Redirection, Command Chaining ps, df, free, vmstat, top, kill less & more, head & tail, diff which & whereis, w, who Use grep and cut to process delimited log files find, locate tar, gzip/gunzip, bzip2, zcat Explore Pico text editor Install and explore Nano text editor Convert Windows text files to Unix format using dos2unix Convert Unix text files to Windows format using unix2dos Common Network Clients File Transfer Protocol (FTP) client Install and use LFTP - Sophisticated FTP Client to connect to FTP/HTTP servers Mirror and reverse mirror using LFTP to synchronize data Wget - HTTP/HTTPS/FTP connectivity Explain SSH concepts, implementation, etc. Use SSH Client to connect to remote Linux Systems using password authentication Identify key SSH-client files (.known_hosts, public/private key pairs,etc.) Authenticate to remote Linux systems using alternate credentials Use Secure Copy Protocol (SCP) to move data between systems non-interactively Use Secure File Transfer Protocol (SFTP) to move data between systems interactively Demonstrate how to generate Public/Private key (RSA/DSA) pairs using SSH-Keygen Demonstrate using SSH to authenticate to remote Linux hosts without passwords Generate Public Key/Private Key pairs for use with file and E-mail encryption Demonstrate using E-mail client with GNU Privacy Guard (GPG) Open PGP for E-Mail encryption Use Remote Desktop to connect to RDP & VNC remote Linux and Windows hosts Use ping, mtr & arp Use dig, host, nslookup name resolution clients NETSTAT IFCONFIG top RPM Package Management Tool Concepts & Usage Explain classes of SUSE Linux Packages Query existing packages Identify offline and online package repositories Install packages Upgrade packages Freshen packages Remove packages Identify package meMbership of files on the SUSE system Manage Users and Groups & Permissions User profile implementation logic and concepts - (Bash profile/etc/skel/aliases/PATH/etc.) User and group creation & management concepts - passwd, shadow, group, gshadow files Use YaST to create and manage users and groups SETUID SETGID - Group collaboration Sticky Bit Explore Hard and SyMbolic links including across disparate file systems Paritions, File Systems & Volumes (RAID|LVM) Provision new paritions with FDISK/Parted/YaST & ReiserFS Configure RAID 0/1/5/ Volumes Implement Logical Volume Management (LVM) Provision additional Swap storage paritions and files Use MKSWAP & SWAPON to enable additional Swap storage Identify allocated swap space to the kernel Committ changes for persistence Explore System Logging via SYSLOG-NG and Logrotate Explore Boot log & System Log Explanation of syslog facilities & levels Discuss SYSLOG-NG features & enhancements Demonstrate syslog administration Enable SYSLOG network listener Demonstrate Cisco PIX Firewall to SUSE Linux SYSLOG-NG functionality Explore automatic log rotation and customization via Logrotate Configure Logrotate to rotate & compress sample log files Network - Physical & Logical Configuration Identify key directories & files for static & dynamic communications Configure Linux client with static TCP/IP parameters for network communication Explore hotplug -> hwup -> ifup logic Use ifconfig to ascertain logical TCP/IP configuration Use hwinfo to ascertain installed hardware Configure Aliased Ethernet Interfaces to faciliate multiple IP addresses Implement Network Time Protocol (NTP) Client/Server Configure Network Time Protocol (NTP) to perform client/server time synchronization Identify NTP bounded UDP interfaces Synchronize SUSE Enterprise Linux NTP with RedHat Linux Stratum 2 NTP server Synchronize against Stratum 1 NTP servers Dynamic Host Configuration Protocol (DHCP) Explain DHCP Concepts & Applications Explore DHCP confiuration files Configure DHCP subnet with applicable options Configure DHCP Reservation based on layer-2 address Enable DHCP with DDNS Configure DHCP Failover between SUSE and RedHat Linux Servers Test DHCP Failover with Windows 2003 Host Domain Name System (DNS) Explore SUSE DNS configuration via YaST Configure BIND as a caching-only DNS server Implement Master DNS Zone Configure Reverse Zone for local subnet Implement Dynamic Domain Name System (DDNS) Zones (Forward/Reverse) Explain DHCP and DNS update integration options Integrate DHCP with DNS via Encypted Transaction Signatures (TSigs) Configure Windows 2003 Active Directory to publish DNS Records to SUSE Server Examine Windows 2003 SRV Records Configure Master/Slave Zones with RedHat Linux Server Evaluate results of BIND configuration using DIG & host Implement DNS sub-domains (Third-level domains) CRON - System Scheduler Explore Cron Implementation Explain scheduling options Global and scope-based Cron options Schedules jobs to run & examine the output Configure individual Crontab entries SaMba Implementation Implement Linux & Windows Integration via SaMba Explore SaMba Configuration files Implement SMbFS integration with SUSE Enterprise Linux File System Mount Windows shares seamlessly using SaMba File System (SMbFS) Configure FSTAB to support repetitive mounts Implement secure SMbFS credentials for mounting Install SaMba Server support Install SaMba Web-based Administration Tool (SWAT) Configure SaMba file sharing Configure SaMba with multiple NETBIOS aliases Install Active Directory on Windows 2003 Server Integrate SUSE Ent. 10 Server with Windows Active Directory (AD) Test SaMba-to-Windows integration using 'getent' and authentication Very Secure VSFTPD File Transfer Protocol (FTP) services Implement anonymous FTPD Implement user-level FTPD access Implement FTPD banners Disable anonymous access Configure VSFTPD to chroot jail users into their home directories Implement bandwidth rate-limiting to control bandwidth usage Implement & test banning of unwelcomed anonymous e-mail addresses Implement VSFTPD user with redirect to a SaMba share Network File System (NFS) Implementation Identify key services/daemons Configure NFS Client & Server Evaluate NFS connectivity to other Linux hosts RSYNC Implementation Discuss features and benefits Implement rsync Confirm results Apache Web Server Implementation Discuss Apache server's features and concepts Examine Apache-SUSE HTTPD CONF hierarchy Examine various configuration files Implement Apache Mod Alias and ScriptAlias Examine user home directories Discuss the Directory directive Explore redirects Configure .htacess file with directives Implement Basic and digest authentication schemes Configure IP-based Virtual Hosts Configure Name-based Virtual Hosts Explore Apache logging Implement Apache logging system per virtual host Webalizer Log Analysis software Implementation Generate web reports using Webalizer Implementation of PHP Dynamic Web Access Scripting Engine Evaluate PHP Dynamic Web Access Scripting Engine installation results Test basic PHP script-processing using sample scripts Create and test PHP-form with Apache MySQL Relational Database Management System Install MySQL Relational Database Management System Secure access to MySQL Explore MySQL monitor shell-based interface Create sample MySQL databases Load external data-set from Linux Load external data-set from Windows Integrate PHP with MySQL PHPMyAdmin - MySQL Web-based Management Interface Install PHPMyAdmin for web-based management of MySQL instances Explain & Secure access to PHPMyAdmin Explore PHPMyAdmin's interface Postfix Message Transfer Agent (MTA) Introduction to Postfix Message Transfer Agent (MTA) Explore the directives in the Postfix configuration files Define default values for the FQDN Alter myorigin and examine results Configure Postfix to route messages using a Smarthost Examine how Postfix delivers mail locally Configure SMTP Relaying in Postfix Use Mutt to demonstrate outbound mail handling using Postfix Define SMTP Virtual domains for hosting multiple DNS domains Configure Postfix with a production LinuxCBT DNS domain Examine Virtual domain routing with production and non-production DNS domains Post Office Protocol Version 3 (POP3) Explain POP3 concepts and applications Implement POP3 daemon Connect to POP3 daemon using Windows 2003 Outlook Express client Reroute inbound messages using Sendmail to POP3 account for retrieval Use Mutt to send SMTP-based messages to POP3 account Internet Messaging Access Protocol (IMAP) Explain IMAP concepts and applications in comparison to POP3 Implement IMAP services Connect to IMAP services from remote Windows Outlook Express client Squirrel-mail Web-based Mail Interface Implementation Describe required squirrel mail components for web-mail integration Install squirrel mail on SUSE Enterprise Linux system Configure Apache virtual directory for squirrel mail integration Configure Apache Virtual Host for squirrel mail integration Configure BIND DNS services for squirrel mail integration Explore squirrel mail's web-based interface PureFTPD Implementation Explore configuration & enable service Test various modes of operation Xen Virtualization Discuss features & benefits Implement Xen with instance of SUSE Ent. 10 Edition System Audit & Lockdown Identify tools to perform system audit Ascertain and document current system state Close all superflous services Bind necessary services (daemons) to necessary interfaces and logical addresses Establish security configuration baseline XINETD (Enhanced & Secure INETD Super Server Implementation) Identify key XINETD configuration files Explain the contents and structure of xinetd.conf Restrict access to various daemons/services based on hosts & subnets Lockdown XINETD-controlled services Configure XINETD to restrict nuMber of spawned instances of daemons/services Configure XINETD to bind daemons/services to specific sub-interfaces (Virtual IP addresses) XINETD logging Explore additional XINETD features TCP Wrappers concepts & applications Identify primary package and key TCP Wrappers configuration files Demonstrate disabled TCP Wrappers configurations by attempting connectivity Examine pre and post TCP Wrappers configuration effects Implement TCP Wrappers for common services Test local & remote access to TCP Wrappers-protected host & services IPTABLES (Netfilter Linux Kernel-based Firewall) Discuss IPTABLES/Netfilter Concepts Explain IPTABLES default chains/filters and policies Examine TCP/ICMP communications pre-IPTABLES chains Implement ICMP inbound filtration based on various hosts Use Cisco PIX Firewall to verify ICMP debugging Filter traffic based on Layer-4 TCP/UDP (Source/Destination Ports) information Restrict access to various daemons (SSH/FTP/HTTP/etc.) Test connectivity locally and remotely (RedHat/Windows/etc.) Network Mapper (NMAP) Obtain, compile and install current version of NMAP Identify commonly used NMAP options/switches/parameters Perform default TCP SYN-based ethical scans of local and remote resources Explain typical TCP handshake protocol while using NMAP Examine the results of scans on remote Cisco firewall with debugging mode enabled Perform default TCP Connect-based ethical scans of local and remote resources Examine the results of scans on remote Cisco PIX Firewall with debugging mode enabled Use NMAP to scan using aliased and spoofed IP addresses Peform local ethical scans Identifiy key NMAP configuration files Use NMAP to perform operating system fingerprinting Peform subnet-wide ethical scans Nessus Vulnerability Scanner Implementation Download & Install Nessus Client & Server Configure & test credentials Discuss plug-ins and scopes Perform vulnerability scans & evaluate results TCPDump Traffic Capture Discuss features Capture data in ASCII & Binary formats Implement Berkeley Packet Filters (BPFs) Analyze results Ethereal Traffic Analysis Discuss features Install using YaST Analyze TCPDump binary file Rebuild interesting TCP sessions Snort 2.x Network Intrusion Detection System (NIDS) Obtain, and install Snort pre-requisites (libpcap/libpcre/etc.) Obtain, compile and install the Snort Intrusion Detection System (NIDS) Identify and explain key operating modes (Sniffer/Logger/NIDS) Explore Snort in network sniffer mode Explain OSI Model and relevant Snort sniffing options Explore Snort in ASCII and Binary (TCPDUMP) logging modes Output Snort logs to ASCII text format and examine the results Output Snort logs to binary format and examine the results Implement Snort with BPF to filter traffic Generate traffic from remote Windows 2003 and Linux hosts Use Snort with Berkeley Packet Filter (BPF) to parse logs Implement Snort in NIDS modes Explore the snort.conf file and discuss rules Explain Logging and Alerting output options Perform port-scans from remote Linux systems and analyze Alerts Configure MySQL with Snort-compliant schema Configure Snort to log to MySQL Download & Install BASE web analysis application Configure BASE to read alerts from MySQL Evaluate results DOWNLOAD http://rapidgator.net/file/e05924921ec78d6f0b12a21b7e74e93e/8SLES.part1.rar.html http://rapidgator.net/file/44b9245b695e3a757cd4e8f397141fe3/8SLES.part2.rar.html http://rapidgator.net/file/ca02f796929f36540bb79d7c0f9aedb8/8SLES.part3.rar.html http://rapidgator.net/file/a6a1d4417c620b8098e9a78a15acd406/8SLES.part4.rar.html http://rapidgator.net/file/e0c259e547355c451ebc9938f6b4a643/8SLES.part5.rar.html http://rapidgator.net/file/c573d2ef4134796ad5fa9767d17230a2/8SLES.part6.rar.html http://rapidgator.net/file/7916b7ef537e81c155b5126e83f47b22/8SLES.part7.rar.html http://rapidgator.net/file/d01c1c0b930e022cd25a8f3f6f0a705f/8SLES.part8.rar.html http://uploaded.net/file/t85wfc4f/8SLES.part1.rar http://uploaded.net/file/exiz19pi/8SLES.part2.rar http://uploaded.net/file/f977vmx6/8SLES.part3.rar http://uploaded.net/file/rytggklk/8SLES.part4.rar http://uploaded.net/file/fbvibl6l/8SLES.part5.rar http://uploaded.net/file/z82aa6pq/8SLES.part6.rar http://uploaded.net/file/qqz9c90s/8SLES.part7.rar http://uploaded.net/file/m02rwxfh/8SLES.part8.rar http://www.uploadable.ch/file/jW5Taxu3SZ45/8SLES.part1.rar http://www.uploadable.ch/file/B5Qpnd6h64uf/8SLES.part2.rar http://www.uploadable.ch/file/sTmwu76MjNYP/8SLES.part3.rar http://www.uploadable.ch/file/HYtG29h8XNpH/8SLES.part4.rar http://www.uploadable.ch/file/jdmumTA844ry/8SLES.part5.rar http://www.uploadable.ch/file/fAEZCU4kXQse/8SLES.part6.rar http://www.uploadable.ch/file/FQnUPBTEsDXz/8SLES.part7.rar http://www.uploadable.ch/file/GMedjMq63pQR/8SLES.part8.rar http://www.hitfile.net/2NMw/8SLES.part1.rar.html http://www.hitfile.net/2NOp/8SLES.part2.rar.html http://www.hitfile.net/2NMQ/8SLES.part3.rar.html http://www.hitfile.net/2NIg/8SLES.part4.rar.html http://www.hitfile.net/2O6u/8SLES.part5.rar.html http://www.hitfile.net/2NNA/8SLES.part6.rar.html http://www.hitfile.net/2NIX/8SLES.part7.rar.html http://www.hitfile.net/2Nxr/8SLES.part8.rar.html
  9. LinuxCBT SLES-10 Edition English | .MOV | aac, 44100 Hz, stereo | h264, yuv420p, 750x334, 5.00 fps | 3.75 Gb Genre: eLearning Network-based (HTTP & SSH) Installations Enable Apache HTTPD on Installation server Configure SUSE Ent. 10 Server as an HTTP Installation source with Apache Discuss system requirements Install SUSE Ent. 10 Server via HTTP Confirm results Grand Unified Boot Loader (GRUB) & System V Linux Runlevel implementation Explore GRUB configuration Explain SUSE Linux System V Init Runlevel (0 - 6) concepts & applications Identify key startup files, including scripts (inittab,Sscripts,Kscripts,etc.) GNOME & YaST Explore the GNOME Desktop Interface Explore YaST, centralized management tool Install packages using Yast package manager Basic GNU/Linux Skills - Command Line Interface (CLI) - BASH Introduction to GNOME Terminal Demonstrate usage of the following useful commands & concepts ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami, man, info alias, cat, file, chmod, chown, history Standard in/out, UNIX Pipes, Redirection, Command Chaining ps, df, free, vmstat, top, kill less & more, head & tail, diff which & whereis, w, who Use grep and cut to process delimited log files find, locate tar, gzip/gunzip, bzip2, zcat Explore Pico text editor Install and explore Nano text editor Convert Windows text files to Unix format using dos2unix Convert Unix text files to Windows format using unix2dos Common Network Clients File Transfer Protocol (FTP) client Install and use LFTP - Sophisticated FTP Client to connect to FTP/HTTP servers Mirror and reverse mirror using LFTP to synchronize data Wget - HTTP/HTTPS/FTP connectivity Explain SSH concepts, implementation, etc. Use SSH Client to connect to remote Linux Systems using password authentication Identify key SSH-client files (.known_hosts, public/private key pairs,etc.) Authenticate to remote Linux systems using alternate credentials Use Secure Copy Protocol (SCP) to move data between systems non-interactively Use Secure File Transfer Protocol (SFTP) to move data between systems interactively Demonstrate how to generate Public/Private key (RSA/DSA) pairs using SSH-Keygen Demonstrate using SSH to authenticate to remote Linux hosts without passwords Generate Public Key/Private Key pairs for use with file and E-mail encryption Demonstrate using E-mail client with GNU Privacy Guard (GPG) Open PGP for E-Mail encryption Use Remote Desktop to connect to RDP & VNC remote Linux and Windows hosts Use ping, mtr & arp Use dig, host, nslookup name resolution clients NETSTAT IFCONFIG top RPM Package Management Tool Concepts & Usage Explain classes of SUSE Linux Packages Query existing packages Identify offline and online package repositories Install packages Upgrade packages Freshen packages Remove packages Identify package meMbership of files on the SUSE system Manage Users and Groups & Permissions User profile implementation logic and concepts - (Bash profile/etc/skel/aliases/PATH/etc.) User and group creation & management concepts - passwd, shadow, group, gshadow files Use YaST to create and manage users and groups SETUID SETGID - Group collaboration Sticky Bit Explore Hard and SyMbolic links including across disparate file systems Paritions, File Systems & Volumes (RAID|LVM) Provision new paritions with FDISK/Parted/YaST & ReiserFS Configure RAID 0/1/5/ Volumes Implement Logical Volume Management (LVM) Provision additional Swap storage paritions and files Use MKSWAP & SWAPON to enable additional Swap storage Identify allocated swap space to the kernel Committ changes for persistence Explore System Logging via SYSLOG-NG and Logrotate Explore Boot log & System Log Explanation of syslog facilities & levels Discuss SYSLOG-NG features & enhancements Demonstrate syslog administration Enable SYSLOG network listener Demonstrate Cisco PIX Firewall to SUSE Linux SYSLOG-NG functionality Explore automatic log rotation and customization via Logrotate Configure Logrotate to rotate & compress sample log files Network - Physical & Logical Configuration Identify key directories & files for static & dynamic communications Configure Linux client with static TCP/IP parameters for network communication Explore hotplug -> hwup -> ifup logic Use ifconfig to ascertain logical TCP/IP configuration Use hwinfo to ascertain installed hardware Configure Aliased Ethernet Interfaces to faciliate multiple IP addresses Implement Network Time Protocol (NTP) Client/Server Configure Network Time Protocol (NTP) to perform client/server time synchronization Identify NTP bounded UDP interfaces Synchronize SUSE Enterprise Linux NTP with RedHat Linux Stratum 2 NTP server Synchronize against Stratum 1 NTP servers Dynamic Host Configuration Protocol (DHCP) Explain DHCP Concepts & Applications Explore DHCP confiuration files Configure DHCP subnet with applicable options Configure DHCP Reservation based on layer-2 address Enable DHCP with DDNS Configure DHCP Failover between SUSE and RedHat Linux Servers Test DHCP Failover with Windows 2003 Host Domain Name System (DNS) Explore SUSE DNS configuration via YaST Configure BIND as a caching-only DNS server Implement Master DNS Zone Configure Reverse Zone for local subnet Implement Dynamic Domain Name System (DDNS) Zones (Forward/Reverse) Explain DHCP and DNS update integration options Integrate DHCP with DNS via Encypted Transaction Signatures (TSigs) Configure Windows 2003 Active Directory to publish DNS Records to SUSE Server Examine Windows 2003 SRV Records Configure Master/Slave Zones with RedHat Linux Server Evaluate results of BIND configuration using DIG & host Implement DNS sub-domains (Third-level domains) CRON - System Scheduler Explore Cron Implementation Explain scheduling options Global and scope-based Cron options Schedules jobs to run & examine the output Configure individual Crontab entries SaMba Implementation Implement Linux & Windows Integration via SaMba Explore SaMba Configuration files Implement SMbFS integration with SUSE Enterprise Linux File System Mount Windows shares seamlessly using SaMba File System (SMbFS) Configure FSTAB to support repetitive mounts Implement secure SMbFS credentials for mounting Install SaMba Server support Install SaMba Web-based Administration Tool (SWAT) Configure SaMba file sharing Configure SaMba with multiple NETBIOS aliases Install Active Directory on Windows 2003 Server Integrate SUSE Ent. 10 Server with Windows Active Directory (AD) Test SaMba-to-Windows integration using 'getent' and authentication Very Secure VSFTPD File Transfer Protocol (FTP) services Implement anonymous FTPD Implement user-level FTPD access Implement FTPD banners Disable anonymous access Configure VSFTPD to chroot jail users into their home directories Implement bandwidth rate-limiting to control bandwidth usage Implement & test banning of unwelcomed anonymous e-mail addresses Implement VSFTPD user with redirect to a SaMba share Network File System (NFS) Implementation Identify key services/daemons Configure NFS Client & Server Evaluate NFS connectivity to other Linux hosts RSYNC Implementation Discuss features and benefits Implement rsync Confirm results Apache Web Server Implementation Discuss Apache server's features and concepts Examine Apache-SUSE HTTPD CONF hierarchy Examine various configuration files Implement Apache Mod Alias and ScriptAlias Examine user home directories Discuss the Directory directive Explore redirects Configure .htacess file with directives Implement Basic and digest authentication schemes Configure IP-based Virtual Hosts Configure Name-based Virtual Hosts Explore Apache logging Implement Apache logging system per virtual host Webalizer Log Analysis software Implementation Generate web reports using Webalizer Implementation of PHP Dynamic Web Access Scripting Engine Evaluate PHP Dynamic Web Access Scripting Engine installation results Test basic PHP script-processing using sample scripts Create and test PHP-form with Apache MySQL Relational Database Management System Install MySQL Relational Database Management System Secure access to MySQL Explore MySQL monitor shell-based interface Create sample MySQL databases Load external data-set from Linux Load external data-set from Windows Integrate PHP with MySQL PHPMyAdmin - MySQL Web-based Management Interface Install PHPMyAdmin for web-based management of MySQL instances Explain & Secure access to PHPMyAdmin Explore PHPMyAdmin's interface Postfix Message Transfer Agent (MTA) Introduction to Postfix Message Transfer Agent (MTA) Explore the directives in the Postfix configuration files Define default values for the FQDN Alter myorigin and examine results Configure Postfix to route messages using a Smarthost Examine how Postfix delivers mail locally Configure SMTP Relaying in Postfix Use Mutt to demonstrate outbound mail handling using Postfix Define SMTP Virtual domains for hosting multiple DNS domains Configure Postfix with a production LinuxCBT DNS domain Examine Virtual domain routing with production and non-production DNS domains Post Office Protocol Version 3 (POP3) Explain POP3 concepts and applications Implement POP3 daemon Connect to POP3 daemon using Windows 2003 Outlook Express client Reroute inbound messages using Sendmail to POP3 account for retrieval Use Mutt to send SMTP-based messages to POP3 account Internet Messaging Access Protocol (IMAP) Explain IMAP concepts and applications in comparison to POP3 Implement IMAP services Connect to IMAP services from remote Windows Outlook Express client Squirrel-mail Web-based Mail Interface Implementation Describe required squirrel mail components for web-mail integration Install squirrel mail on SUSE Enterprise Linux system Configure Apache virtual directory for squirrel mail integration Configure Apache Virtual Host for squirrel mail integration Configure BIND DNS services for squirrel mail integration Explore squirrel mail's web-based interface PureFTPD Implementation Explore configuration & enable service Test various modes of operation Xen Virtualization Discuss features & benefits Implement Xen with instance of SUSE Ent. 10 Edition System Audit & Lockdown Identify tools to perform system audit Ascertain and document current system state Close all superflous services Bind necessary services (daemons) to necessary interfaces and logical addresses Establish security configuration baseline XINETD (Enhanced & Secure INETD Super Server Implementation) Identify key XINETD configuration files Explain the contents and structure of xinetd.conf Restrict access to various daemons/services based on hosts & subnets Lockdown XINETD-controlled services Configure XINETD to restrict nuMber of spawned instances of daemons/services Configure XINETD to bind daemons/services to specific sub-interfaces (Virtual IP addresses) XINETD logging Explore additional XINETD features TCP Wrappers concepts & applications Identify primary package and key TCP Wrappers configuration files Demonstrate disabled TCP Wrappers configurations by attempting connectivity Examine pre and post TCP Wrappers configuration effects Implement TCP Wrappers for common services Test local & remote access to TCP Wrappers-protected host & services IPTABLES (Netfilter Linux Kernel-based Firewall) Discuss IPTABLES/Netfilter Concepts Explain IPTABLES default chains/filters and policies Examine TCP/ICMP communications pre-IPTABLES chains Implement ICMP inbound filtration based on various hosts Use Cisco PIX Firewall to verify ICMP debugging Filter traffic based on Layer-4 TCP/UDP (Source/Destination Ports) information Restrict access to various daemons (SSH/FTP/HTTP/etc.) Test connectivity locally and remotely (RedHat/Windows/etc.) Network Mapper (NMAP) Obtain, compile and install current version of NMAP Identify commonly used NMAP options/switches/parameters Perform default TCP SYN-based ethical scans of local and remote resources Explain typical TCP handshake protocol while using NMAP Examine the results of scans on remote Cisco firewall with debugging mode enabled Perform default TCP Connect-based ethical scans of local and remote resources Examine the results of scans on remote Cisco PIX Firewall with debugging mode enabled Use NMAP to scan using aliased and spoofed IP addresses Peform local ethical scans Identifiy key NMAP configuration files Use NMAP to perform operating system fingerprinting Peform subnet-wide ethical scans Nessus Vulnerability Scanner Implementation Download & Install Nessus Client & Server Configure & test credentials Discuss plug-ins and scopes Perform vulnerability scans & evaluate results TCPDump Traffic Capture Discuss features Capture data in ASCII & Binary formats Implement Berkeley Packet Filters (BPFs) Analyze results Ethereal Traffic Analysis Discuss features Install using YaST Analyze TCPDump binary file Rebuild interesting TCP sessions Snort 2.x Network Intrusion Detection System (NIDS) Obtain, and install Snort pre-requisites (libpcap/libpcre/etc.) Obtain, compile and install the Snort Intrusion Detection System (NIDS) Identify and explain key operating modes (Sniffer/Logger/NIDS) Explore Snort in network sniffer mode Explain OSI Model and relevant Snort sniffing options Explore Snort in ASCII and Binary (TCPDUMP) logging modes Output Snort logs to ASCII text format and examine the results Output Snort logs to binary format and examine the results Implement Snort with BPF to filter traffic Generate traffic from remote Windows 2003 and Linux hosts Use Snort with Berkeley Packet Filter (BPF) to parse logs Implement Snort in NIDS modes Explore the snort.conf file and discuss rules Explain Logging and Alerting output options Perform port-scans from remote Linux systems and analyze Alerts Configure MySQL with Snort-compliant schema Configure Snort to log to MySQL Download & Install BASE web analysis application Configure BASE to read alerts from MySQL Evaluate results DOWNLOAD http://rapidgator.net/file/e05924921ec78d6f0b12a21b7e74e93e/8SLES.part1.rar.html http://rapidgator.net/file/44b9245b695e3a757cd4e8f397141fe3/8SLES.part2.rar.html http://rapidgator.net/file/ca02f796929f36540bb79d7c0f9aedb8/8SLES.part3.rar.html http://rapidgator.net/file/a6a1d4417c620b8098e9a78a15acd406/8SLES.part4.rar.html http://rapidgator.net/file/e0c259e547355c451ebc9938f6b4a643/8SLES.part5.rar.html http://rapidgator.net/file/c573d2ef4134796ad5fa9767d17230a2/8SLES.part6.rar.html http://rapidgator.net/file/7916b7ef537e81c155b5126e83f47b22/8SLES.part7.rar.html http://rapidgator.net/file/d01c1c0b930e022cd25a8f3f6f0a705f/8SLES.part8.rar.html http://uploaded.net/file/t85wfc4f/8SLES.part1.rar http://uploaded.net/file/exiz19pi/8SLES.part2.rar http://uploaded.net/file/f977vmx6/8SLES.part3.rar http://uploaded.net/file/rytggklk/8SLES.part4.rar http://uploaded.net/file/fbvibl6l/8SLES.part5.rar http://uploaded.net/file/z82aa6pq/8SLES.part6.rar http://uploaded.net/file/qqz9c90s/8SLES.part7.rar http://uploaded.net/file/m02rwxfh/8SLES.part8.rar http://www.uploadable.ch/file/jW5Taxu3SZ45/8SLES.part1.rar http://www.uploadable.ch/file/B5Qpnd6h64uf/8SLES.part2.rar http://www.uploadable.ch/file/sTmwu76MjNYP/8SLES.part3.rar http://www.uploadable.ch/file/HYtG29h8XNpH/8SLES.part4.rar http://www.uploadable.ch/file/jdmumTA844ry/8SLES.part5.rar http://www.uploadable.ch/file/fAEZCU4kXQse/8SLES.part6.rar http://www.uploadable.ch/file/FQnUPBTEsDXz/8SLES.part7.rar http://www.uploadable.ch/file/GMedjMq63pQR/8SLES.part8.rar http://www.hitfile.net/2NMw/8SLES.part1.rar.html http://www.hitfile.net/2NOp/8SLES.part2.rar.html http://www.hitfile.net/2NMQ/8SLES.part3.rar.html http://www.hitfile.net/2NIg/8SLES.part4.rar.html http://www.hitfile.net/2O6u/8SLES.part5.rar.html http://www.hitfile.net/2NNA/8SLES.part6.rar.html http://www.hitfile.net/2NIX/8SLES.part7.rar.html http://www.hitfile.net/2Nxr/8SLES.part8.rar.html
  10. LinuxCBT Key-Files Edition English | .MOV | aac, 44100 Hz, mono | h264, yuv420p, 1280x720, 5.00 fps | 785 Mb Genre: eLearning Introduction - Topology - Features Discuss areas of concern Expose available systems Prepare to study important files Boot Partition Identify /boot setup on various systems Enumerate key files regarding boot sequence Peruse various configuration files Present hypothetical areas of failure Contrast with Windows boot implementation INIT Environment Discuss traditional INIT implementation Identify important files across distributions Examine INIT.D and RC hierarchies Propose methods of ensuring integrity of environment Kernel Modules Environment Identify key directory hierarchy Discuss applicability Explore various modules related configuration files Enumerate loaded modules and correlate to FS taxonomy Correlate detected modules to loaded and available modules PROC File System Discuss usage and applicability Descend PROC hierarchy accordingly Identify PID tree and related descriptors Recover Kernel invocation method Expose supported Paritions, File Systems & Devices Dump CPU & Memory configuration Peruse other applicable PROC entries SBIN Executables Identify available SBIN containers Expose SETGID and SETUID SBIN entries Enumerate relevant client system binaries Locate important SBIN daemons | services Discuss storage management SBIN entries Find interface and network related SBIN entries System Control Configuration Explain applicability Identify user space process Enumerate default configuration directives Define common variables influencing system behavior Committ variables for persistence Discuss potential areas of concern with system configuration Evaluate results INETD | XINETD Configuration Explain super server usage Identify both INETD and XINETD on relevant systems Expose controlled services Disable superfluous super-server controlled services User Accounts Environment Discuss relevance of securing related files Explain default files Suggest areas of concern regarding compromised entries Tighten default security policy related to user accounts Pluggable Authentication Modules (PAM) Identify key files related to PAM AUTH Expose baseline configuration based on current definition Locate baseline PAM libraries and discuss strategies Compare and contrast environmental differences across accounts Hosts | Protocols | Services Explain relevance of these key files Discuss typical name resolution process Identify baseline confguration Affect changes to relevant files and evaluate Discuss typical malware impact on key files NSSWITCH Configuraton Explain importance and relevance Identify various implementations Make changes to name resolver configuration Evaluate results DNS Client Resolution Configuration Identify key files governing client resolution Perform queries with incorrect resolution Correct resolution accordingly Vary configuration and evaluate results User Profiles Environment Discuss applicable entries related to profiles Delineate between system-wide and user-wide configurations Examine relevant profile files for $SHELL and GUI environments Posit suggestions to tighten baseline Evaluate accordingly System Scheduler Environment Discuss importance of CRON Identify system and user-wide configuration files Propose methods of tightening configuration Evaluate resuls DNS Server Configuration Discuss importance of traffic direction services Identify key files across distributions Suggest areas to enhance security posture Intersperse corrupt DNS values and evaluate influence SYSLOG Configuration Discuss applicability Review baseline configuration Hypothesize possible data-leakage opportunities Propose methods of configuration augmentation SSH | Client | Server | Files Discuss importance of file correlation Identify key client files Change client file data and evaluate behavior Identify outdated key file information Generate usage keys and propagate Test communications Identify key server files Discuss implications of SSH configuration DOWNLOAD http://rapidgator.net/file/cb88ffc790727a59c78620abd22c2693/aKey.part1.rar.html http://rapidgator.net/file/59a54843515b4f4e06e355b29383f3c6/aKey.part2.rar.html http://rapidgator.net/file/8a9a0dfe0d8f0ba498fb932bbd1535bf/aKey.part3.rar.html http://rapidgator.net/file/1c267abd8bee4e4c7fe94d44f9d468d9/aKey.part4.rar.html http://rapidgator.net/file/5b6b1380bd7953a6cc66c64b9419a662/aKey.part5.rar.html http://rapidgator.net/file/ce2fec287d0da0fae0e5abeb65616bf1/aKey.part6.rar.html http://rapidgator.net/file/c7b62ff8f19c992c694a49ac98edce73/aKey.part7.rar.html http://rapidgator.net/file/c621dd70f3b96918d1009614120e8f64/aKey.part8.rar.html http://uploaded.net/file/c8nfcf10/aKey.part1.rar http://uploaded.net/file/qkzxhjw3/aKey.part2.rar http://uploaded.net/file/yy5j6xwb/aKey.part3.rar http://uploaded.net/file/jsp1eqk6/aKey.part4.rar http://uploaded.net/file/x11u5oeg/aKey.part5.rar http://uploaded.net/file/2mudlqw0/aKey.part6.rar http://uploaded.net/file/gdmzj1ez/aKey.part7.rar http://uploaded.net/file/zj1oq1ef/aKey.part8.rar http://www.uploadable.ch/file/asrfCCuyMQgA/aKey.part1.rar http://www.uploadable.ch/file/2BbQyY68NShH/aKey.part2.rar http://www.uploadable.ch/file/vAyfetuJfz7N/aKey.part3.rar http://www.uploadable.ch/file/7RJcwFG6p4Mm/aKey.part4.rar http://www.uploadable.ch/file/zwNhU5Z2EWyq/aKey.part5.rar http://www.uploadable.ch/file/wJBN7y4wTFCN/aKey.part6.rar http://www.uploadable.ch/file/b85DSmsUzMH5/aKey.part7.rar http://www.uploadable.ch/file/cAdJj8j7BkDZ/aKey.part8.rar http://www.hitfile.net/2Nur/aKey.part1.rar.html http://www.hitfile.net/2NoB/aKey.part2.rar.html http://www.hitfile.net/2NIu/aKey.part3.rar.html http://www.hitfile.net/2O4I/aKey.part4.rar.html http://www.hitfile.net/2NkQ/aKey.part5.rar.html http://www.hitfile.net/2NFy/aKey.part6.rar.html http://www.hitfile.net/2Nz1/aKey.part7.rar.html http://www.hitfile.net/2NiQ/aKey.part8.rar.html
  11. LinuxCBT Block-Replica Edition English | .MOV | aac, 44100 Hz, mono | h264, yuv420p, 1358x766, 25.00 fps | 476 Mb Genre: eLearning Introduction - DRBD - Features Discuss features and benefits Discuss Disk Block Clustering Explore application to various applications Identify Target Hosts Explore topography Explore environment Cluster Initialization | Installation | General Usage Gather resources for usage in Cluster Discuss Cluster Resources in DRBD Install DRBD on target Hosts Provision Block Devices Update configuration accordingly Define Resources per Cluster Node Synchronize Blocks Allocate File System (FS) Resources Confirm Disk IO within Cluster Evaluate accordingly Discuss common implementation Cluster IO Highlight important IO concepts Confirm Node Status Attempt various mounts Evaluate responses from various Cluster Nodes Provision additional Cluster Resource Weave additional resource into environment Confirm current Cluster status Evaluate results DRBD Cluster Utilities Discuss use cases Identify key Cluster client tools Enumerate important details via tools Discuss important client options Evaluate current Cluster configuration Discuss possible applications Manual Cluster Failover Express usage features and concerns Highlight automated alternatives Create failover scenarios Failover Cluster as needed and evaluate Confirm data synchronization status Continue with failover exercises Evaluate outcomes concerning failovers Synchronization Throttling Discuss defaults and applicable benefits Down Secondary as needed Create out-of-synch scenario Examine default synch timeline Tweak configuration-based synchronization bandwidth Alter Cluster configuration and examine synchronization updates Contrast with defaults Enable temporary synchronization configuration Generate out-of-synch scenario Force synch of Cluster Nodes Evaluate results DRBD | Cluster | Application | Examples Recap key features of DRBD Highlight common usage scenarios Tweak Apache configuration to use DRBD resources Failover and ensure availability of resources Update MySQL configuration to use DRBD resources Generate new MySQL information Failover accordingly Evaluate results DOWNLOAD http://rapidgator.net/file/dd85a885a06971c9eb1d6abb4af6231d/bBlock.part1.rar.html http://rapidgator.net/file/061b8408788f1121b8cdec4a9a68e38f/bBlock.part2.rar.html http://rapidgator.net/file/71c1d0dc9b392ed2b891397059c81420/bBlock.part3.rar.html http://rapidgator.net/file/e65dee6c570eb081e9dfce6ccd60c057/bBlock.part4.rar.html http://rapidgator.net/file/286a6471aded057dd42ae4c50bb823e9/bBlock.part5.rar.html http://uploaded.net/file/iu7nsej5/bBlock.part1.rar http://uploaded.net/file/4gypy4um/bBlock.part2.rar http://uploaded.net/file/kiszf31f/bBlock.part3.rar http://uploaded.net/file/8ii8djj8/bBlock.part4.rar http://uploaded.net/file/t82r185n/bBlock.part5.rar http://www.uploadable.ch/file/U6sCxDcMmZXZ/bBlock.part1.rar http://www.uploadable.ch/file/2PmKAPdTYJzJ/bBlock.part2.rar http://www.uploadable.ch/file/TMHjadFF6S9j/bBlock.part3.rar http://www.uploadable.ch/file/pTM64p8tDxBS/bBlock.part4.rar http://www.uploadable.ch/file/dM47UvcPcqwP/bBlock.part5.rar http://www.hitfile.net/2NoW/bBlock.part1.rar.html http://www.hitfile.net/2O7l/bBlock.part2.rar.html http://www.hitfile.net/2NYG/bBlock.part3.rar.html http://www.hitfile.net/2NLD/bBlock.part4.rar.html http://www.hitfile.net/2NPZ/bBlock.part5.rar.html
  12. LinuxCBT Config-Mgmt Edition English | .MOV | aac, 44100 Hz, mono | h264, yuv420p, 1280x720, 5.00 fps | 707 Mb Genre: eLearning Introduction - Puppet - Features Identify key systems in topology Discuss Puppet Features Relate Configuration Management to Common Security Prin[beeep]les Discuss relevant Internet Sockets Puppet Installation Identify available downloads Download platform-dependent packages Install Puppet Master Install Puppet Agents (Nodes | Clients) Enable Agents for Puppet Management Evaluate accordingly Console Management Access Puppet Console (Dashboard) Explore interface and discuss capabilities Provision and Test Users Peruse Agents' Configuration Details Live Management Discuss MCollective Identify on-the-wire resources in Real-Time Compare relevant system components Contrast cross-platform resources Identify same-platform common properties Clone resources on-demand Evaluate accordingly Modules | Classes Discuss Class | Module Model Identify default Classes | Modules Explain Puppet inheritance options Explore default inheritance Identify Nodes and Groups Node | Agent Provisioning Discuss applicabilitiy Explore templates for inheritance Add Nodes (Agents) across platforms Peruse applicable inheritance Evaluate results Standardize Resources Use Live Management to identify discrepancies Rectify discrepancies according to platform similarities Confirm provisioned resources across Nodes (Agents) Achieve a consistent configuration of resources across Nodes Identify remaining discrepancies Evaluate results LogRotate Module Discuss features and benefits Identify currently install modules Peruse Puppet Forge and relevant modules Install LogRotate Module Standardize configuration across systems Confirm configurations HOSTS Module Discuss features and benefits Identify cross-host discrepancies Normalize HOSTS configuration accordingly Confirm applied entries on disparate instances Secure FTP Server Module Discuss features and beneftis Group Nodes (Agents) for application Identify and Install FTP Server Module Explore default configuration Tweak default configuration accordingly Apply changes to a single Test Node Confirm results Apply changes to group of Nodes Re-confrm ramifications Secure $SHELL Module Discuss features and benefits Identify desirable module on the Forge Install module and explore configuration Discuss Client | Server Configuration options Default to widespread Client | Server Configuration changes Apply to Test Node Confirm results Apply to applicable Nodes Confirm normalized application of configuration across Agents DenyHosts Module Discuss features and benefits Identify available modules on the Forge Install accordingy Explore default options Apply to Test scenario Confirm results match organizational policy Apply to desired Agents and re-confirm applicability DOWNLOAD http://rapidgator.net/file/522e09b497bf506790dd34627ec8c93b/cConfig.part1.rar.html http://rapidgator.net/file/6f5d97b3e3f75bcf0688998a4113b1a8/cConfig.part2.rar.html http://rapidgator.net/file/2123a904899440a0ecd112782949aabd/cConfig.part3.rar.html http://rapidgator.net/file/10868f212112e58f921cf96707495067/cConfig.part4.rar.html http://rapidgator.net/file/cfa27530231c6d29c3b054a9fc7b5696/cConfig.part5.rar.html http://rapidgator.net/file/ebd21b165a5fa50f51fcbbc824096482/cConfig.part6.rar.html http://rapidgator.net/file/00da64b02815d5fd12c72b8208d8023f/cConfig.part7.rar.html http://rapidgator.net/file/a6e72d73d243bd4444eb30fe4f85357b/cConfig.part8.rar.html http://uploaded.net/file/5imq5ukr/cConfig.part1.rar http://uploaded.net/file/92m0qoq7/cConfig.part2.rar http://uploaded.net/file/6znrihx9/cConfig.part3.rar http://uploaded.net/file/66zrlcti/cConfig.part4.rar http://uploaded.net/file/byoyb5ca/cConfig.part5.rar http://uploaded.net/file/ooszkjtb/cConfig.part6.rar http://uploaded.net/file/3esx3khx/cConfig.part7.rar http://uploaded.net/file/7jimup1i/cConfig.part8.rar http://www.uploadable.ch/file/sTtjhKt5HvVB/cConfig.part1.rar http://www.uploadable.ch/file/EqPxrJMzcTmD/cConfig.part2.rar http://www.uploadable.ch/file/nDKP6VPw9PCf/cConfig.part3.rar http://www.uploadable.ch/file/a8RpUgVphEkv/cConfig.part4.rar http://www.uploadable.ch/file/uptjt3YnCHWt/cConfig.part5.rar http://www.uploadable.ch/file/zER7ch24WUNH/cConfig.part6.rar http://www.uploadable.ch/file/vECuMRF6mCeh/cConfig.part7.rar http://www.uploadable.ch/file/ZbsvxhmdMsHf/cConfig.part8.rar http://www.hitfile.net/2Nv1/cConfig.part1.rar.html http://www.hitfile.net/2NYd/cConfig.part2.rar.html http://www.hitfile.net/2Nr4/cConfig.part3.rar.html http://www.hitfile.net/2NfL/cConfig.part4.rar.html http://www.hitfile.net/2ODw/cConfig.part5.rar.html http://www.hitfile.net/2NTr/cConfig.part6.rar.html http://www.hitfile.net/2NmV/cConfig.part7.rar.html http://www.hitfile.net/2Nii/cConfig.part8.rar.html
  13. LinuxCBT - XenVM Edition (2013) English | mov | H264 1360x764 | AAC 1 ch 64 kbps | 4 hrs 23 min | 605 Mb Genre: eLearning Course Objective Intro to Xen Hypervisor Management Introduction - Xen - Features Discuss features and benefits Explain various hypervisor tiers Compare and contrast supported GUEST models Explain abstractions: DOM0 and DOMUs Cover supported platforms, features and limitations Discuss importance of VNC in Xen model Explore classroom environment Nework Bridging Discuss networking concepts Identify current configuration Highlight ideal and common configuration Explain inter-DOM communications Implement Network Bridging Confirm Bridge support Reset as needed and evaluate Ensure traffic flows normally Xen Installation Discuss concepts Explain ideal storage configuration Highlight affected system areas post-installation Install Xen Hypervisor Update boot environment Peruse Xen footprint Reset system accordingy and evaluate new environment Use common Xen tools to ascertain system information Discuss networking caveats Confirm Network Bridge and general communications Hardware Virtual Machine (HVM) DOMU | GUEST | VM Discuss applicability Provision target VM ISO image for installation Allocate LVM storage for GUEST | DOMU Preparge GUEST | DOMU configuration file Highlight important directives for HVM functionality Ensure key resources are present per DOMU Create DOMU | GUEST Debug unanti[beeep]ted maladies Complete DOMU OS installation and evaluate Re-configure DOMU accordingly for initialization Identify Xen Domains Start Domain Access DOMU remotely Explore DOMU options GUEST | DOMU | VM Management with XM Identify key tools Enumerate system details and known DOMUs Ascertain useful Xen metadata Find system availability and state data Initiate console connections as needed Identify busy DOMUs Alter DOMU state as needed and evaluate Peruse evaluated results Virtual Manager | GUI Discuss applicability Install on Xen HOST Test connectivity and debug accordingly Alter Xend configuration as required Ensure Virtual Manager connectivity Explore interface and discuss relevant areas Manage | Provision DOMUDiscuss findings Para-Virtualised (PV) DOMUs | GUESTs | VMs with 'xen-tools' Contrast with HVM DOMUs Dicuss provisioning benefits Install xen-tools Configure pre-requisites as needed Reset and ensure pre-requisites are available Attempt to provision PV environment Debug on-demand Generate PV configuration and launch Discuss PV environment caveats and benefits Explore as needed DOWNLOAD http://rapidgator.net/file/a044f8266b9a8926dd81a7daf1c3577e/cXenVM.part1.rar.html http://rapidgator.net/file/5ce3e97f39980043768bbee1510c2555/cXenVM.part2.rar.html http://rapidgator.net/file/1cc7d49cbb87ab3a520b346c1f718049/cXenVM.part3.rar.html http://rapidgator.net/file/b05fdfd80af74231984e95f74288b3d5/cXenVM.part4.rar.html http://rapidgator.net/file/ed5a6d2b8e79bbea9f29ff061c7cdab6/cXenVM.part5.rar.html http://rapidgator.net/file/be810e791506e66ebaec69a4b3a360f1/cXenVM.part6.rar.html http://uploaded.net/file/j98pleby/cXenVM.part1.rar http://uploaded.net/file/ei6bhzhq/cXenVM.part2.rar http://uploaded.net/file/sbc01sxd/cXenVM.part3.rar http://uploaded.net/file/42pcsx1g/cXenVM.part4.rar http://uploaded.net/file/why78ip6/cXenVM.part5.rar http://uploaded.net/file/wfcfnzvn/cXenVM.part6.rar http://www.uploadable.ch/file/sRq5QFbuRuCm/cXenVM.part1.rar http://www.uploadable.ch/file/aRTQtwwYc2mA/cXenVM.part2.rar http://www.uploadable.ch/file/yvSpSsHVPFc5/cXenVM.part3.rar http://www.uploadable.ch/file/parWHVRSyhG6/cXenVM.part4.rar http://www.uploadable.ch/file/ytRnhnHT6Rp3/cXenVM.part5.rar http://www.uploadable.ch/file/nBAh7jYpktKY/cXenVM.part6.rar http://www.hitfile.net/0weK/cXenVM.part1.rar.html http://www.hitfile.net/0w0h/cXenVM.part2.rar.html http://www.hitfile.net/0xf4/cXenVM.part3.rar.html http://www.hitfile.net/0yut/cXenVM.part4.rar.html http://www.hitfile.net/0yTA/cXenVM.part5.rar.html http://www.hitfile.net/0yGu/cXenVM.part6.rar.html
  14. LinuxCBT PackCapAnal Edition 2012 English | .MOV | aac, 44100 Hz, mono | h264, yuv420p, 800x600, 5.00 fps | 856 Mb Genre: eLearning Introduction - Topology - Features Discuss course outline Explore system configuration Identify key network interfaces to be used for captures Identify connected interfaces on Cisco Switch Explore network topology - IPv4 & IPv6 Identify Ethereal installation Enumerate and discuss key Ethereal features Ethereal Graphical User Interface (GUI) Identify installation footprint Differentiate between promiscuous and non-promiscuous modes Configure X.org to permit non-privileged user to write output to screen Launch Ethereal GUI Identify the primary GUI components /Packet List | Packet Details | Packet Bytes/ Discuss defaults Explore key menu items TCPDump | WinDump - Packet Capturing for /Linux|Unix|Windows/ Discuss defaults, features and applications Use TCPDump on Linux to capture packets Log traffic using default PCAP/TCPDump format Discuss Berkeley Packet Filters (BPFs) Capture and log specific packets using BPFs for analysis with Ethereal Connect to Windows 2003 Server using Remote Desktop (RDesktop) utility Install WinDump and WinPCAP on Windows 2003 Server Identify available network interfaces using WinDump Capture and log packets using WinDump Capture and log specific packets using BPFs with WinDump for analysis with Ethereal Upload captures to Linux system for analysis in Ethereal Snort NIDS Packet Capturing & Logging Discuss Snort NIDS's features Confirm prerequisites - /PCRE|LibPCAP|GCC|Make/ Download and Import Snort G/PGP key and MD5SUM for Snort NIDS Download, verify, compile and install Snort NIDS Discuss BPF directional, type, and protocol qualifiers Identify clear-text based network applications and define appropriate BPFs Execute Snort NIDS in sniffer mode with BPFs enabled to match interesting traffic Log to the active pseudo-terminal console and examine the packet flows CoMbine BPF qualifiers to increase packet-matching capabilities Use logical operators to define more flexible BPFs Create captures for further analysis with Ethereal Sun Snoop Packet Capturing & Logging Connect to Solaris 10 system and prepare to use Snoop Draw parallels to TCPDump Enumerate key features Sniff and log generic traffic Sniff and log specific traffic using filters Sniff using Snoop, HTTP and FTP traffic Save filters for analysis by Ethereal Snoop various Solaris interfaces for interesting traffic Layer-2 & Internet Control Messaging Protocol (ICMP) Captures Launch Ethereal Identify sniffing interfaces Capture Address Resolution Protocol (ARP) Packets using Capture Filters Discuss and Identify Protocol Data Units (PDUs) Identify default Ethereal capture file Peruse packet capture statistics Identify Cisco VOIP router generating ARP requests Peruse time precision features - deci - nano-seconds Discuss time manipulations - relative to first packet - actual time Reveal protocol information from layer-1 through 7 Identify network broadcasts in the packet stream Generate Layer-2 ARP traffic using PING and capture and analyze results Sniff traffic based on MAC addresses using Ethereal and Capture FIlters User Datagram Protocol (UDP) Captures & Analyses Discuss UDP Characteristics Focus on Network Time Protocol (NTP) Setup NTP strata for testing between multiple systems Analyze NTP - UDP traffic using Ethereal Focus on Domain Name Service (DNS) Install a BIND DNS Caching-Only Server Analyze DIG queries Analyze 'nslookup' queries DOWNLOAD http://rapidgator.net/file/9a30f981192a4097c15c2cc4e16a1fea/3LinuxCBT.part1.rar.html http://rapidgator.net/file/997e81aec31461b851bda9c3562abcce/3LinuxCBT.part2.rar.html http://rapidgator.net/file/1c2709de8a78520c99936545e9491997/3LinuxCBT.part3.rar.html http://rapidgator.net/file/c931b8aad4f7b250162274344694e937/3LinuxCBT.part4.rar.html http://uploaded.net/file/tyl121pn/3LinuxCBT.part1.rar http://uploaded.net/file/dtvmvwuw/3LinuxCBT.part2.rar http://uploaded.net/file/xl7w6hj6/3LinuxCBT.part3.rar http://uploaded.net/file/eib86bdp/3LinuxCBT.part4.rar http://www.uploadable.ch/file/hqMKjKfudDDu/3LinuxCBT.part1.rar http://www.uploadable.ch/file/pDKSwCMzf4Fy/3LinuxCBT.part2.rar http://www.uploadable.ch/file/UWaPgkqqFs6E/3LinuxCBT.part3.rar http://www.uploadable.ch/file/qTbnQRM5947K/3LinuxCBT.part4.rar http://www.hitfile.net/4eNn/3LinuxCBT.part1.rar.html http://www.hitfile.net/4eLG/3LinuxCBT.part2.rar.html http://www.hitfile.net/4eO4/3LinuxCBT.part3.rar.html http://www.hitfile.net/4eHN/3LinuxCBT.part4.rar.html
  15. LinuxCBT SQLite Edition Training English | .MOV | aac, 44100 Hz, mono | h264, yuv420p, 1358x766, 5.00 fps | 543 Mb Genre: eLearning Intro to SQLite - RDBMS - Usage - Administration Introduction - SQLite - Features Discuss features and benefits Identify installation footprint Contrast SQLite with Client | Server RDBMSs Discuss pros and cons of facility Explore environment SQLite Terminal Monitor Client Pinpoint key invocation options Enter SQLite Terminal Monitor Contrast with MySQL Terminal Monitor Expose RDBMS structure Explore default schema Create sample DBs with sample Table structures Use various terminal features accordingly Evaluate results Data Types | Manifest Typing Discuss features and benefits Implement various Redirects Trace behavior in appropriate logs Contrast Redirects and other forms of URL Handling Data Transportation Highlight useful features Consider transportation scenarios Export data to a variety of formats Import data from various sources Ensure target DBMS configuration Dump to MySQL and evaluate Import from MySQL accordingly Consider implications of pure SQL transports SQLite - Bits and Bobs - Miscellany Examine cross-platform operability Compounded Queries Table auto-incrementation considerations Alter Table support Table populations via $SHELL File System space reclamation with SQL VACUUM Witness SQL VIEWS support Attach | Detach databases Perform appropriate queries against sources BASH $SHELL - SQLite Support Discuss applicabilitiy Generate DB and Table-space Test manual data-captures Author script with appropriate trappings Alter Table space accordingly to reflect hypothetical shifts Parse useful system data Automate procedure Python - SQLite - Integration Consider features Discuss sample usage scenarios Review Python Interactive Mode Generate sample connection string blocks Test Python-SQLite connectivity Automate data collection with Python | SQLite Debug as needed Evaluate results DOWNLOAD http://rapidgator.net/file/2728690d7f416f0d0933a97e079337c5/LinuxCBT_SQLite_Edition.part1.rar.html http://rapidgator.net/file/4055809c6fa646df535713cdf1974c58/LinuxCBT_SQLite_Edition.part2.rar.html http://rapidgator.net/file/dcdad4e60c572f12c9b373af1f9ce678/LinuxCBT_SQLite_Edition.part3.rar.html http://rapidgator.net/file/5b92975bf7b287b6c368a45c0e79ec74/LinuxCBT_SQLite_Edition.part4.rar.html http://rapidgator.net/file/a35c0a0e2f7a87167dc440b71ca30ac9/LinuxCBT_SQLite_Edition.part5.rar.html http://rapidgator.net/file/e464c9f82babf78e331fdd930ac9ca28/LinuxCBT_SQLite_Edition.part6.rar.html http://uploaded.net/file/yk473m1o/LinuxCBT_SQLite_Edition.part1.rar http://uploaded.net/file/4tno3jt1/LinuxCBT_SQLite_Edition.part2.rar http://uploaded.net/file/qpjs3go4/LinuxCBT_SQLite_Edition.part3.rar http://uploaded.net/file/iqh5obdo/LinuxCBT_SQLite_Edition.part4.rar http://uploaded.net/file/yb9ja0l4/LinuxCBT_SQLite_Edition.part5.rar http://uploaded.net/file/3g5i34o7/LinuxCBT_SQLite_Edition.part6.rar http://www.uploadable.ch/file/wTpJ6qpkdES4/LinuxCBT_SQLite_Edition.part1.rar http://www.uploadable.ch/file/ts993cTD9wdY/LinuxCBT_SQLite_Edition.part2.rar http://www.uploadable.ch/file/j6zCmxWYMp3u/LinuxCBT_SQLite_Edition.part3.rar http://www.uploadable.ch/file/f5AFhuYu8Yrq/LinuxCBT_SQLite_Edition.part4.rar http://www.uploadable.ch/file/63MrUA7uJYkK/LinuxCBT_SQLite_Edition.part5.rar http://www.uploadable.ch/file/2e9vcd65vETH/LinuxCBT_SQLite_Edition.part6.rar http://www.hitfile.net/1vtE/LinuxCBT_SQLite_Edition.part1.rar.html http://www.hitfile.net/1vXK/LinuxCBT_SQLite_Edition.part2.rar.html http://www.hitfile.net/1vw1/LinuxCBT_SQLite_Edition.part3.rar.html http://www.hitfile.net/1t80/LinuxCBT_SQLite_Edition.part4.rar.html http://www.hitfile.net/1vz6/LinuxCBT_SQLite_Edition.part5.rar.html http://www.hitfile.net/1u6u/LinuxCBT_SQLite_Edition.part6.rar.html
  16. LinuxCBT - MemCacheD Edition English | .MOV | aac, 44100 Hz, mono | h264, yuv420p, 1358x766, 5.00 fps | 563 Mb Genre: eLearning Intro to Key | Value Caching - MemCacheD - Usage Introduction - MemCacheD - Features Discuss features and benefits Discuss Caching Applicability Identify Cache Hosts Install MemCacheD Confirm Configuration Explore environment MemCacheD - General Usage Install MemCache Clients Reveal various daemon statistics Generate sample data Insert sample data into cache Evaluate Keys arbitrarily Flush Key | Value Pairs and evaluate Reload subset of sample data and evaluate Discuss various storage commands Generate and store arbitrary data Evaluate accordingly Cache Synchronization Highlight important cross-application concepts Discuss importance of Client Code Vary source data accordingly and compare with Cache Update Cache with latest data and evaluate Insert arbitrary data with finite expiration Test data access Write $SHELL script to use Cache and Refresh accordingly Evaluate results MemCacheD - Cluster of Hosts Discuss applicability Highlight available targets and confirm configuration Update targets accordingly Invalidate Cache Populate Cache with various data and evaluate Confirm Key | Value pairs on various Cluster Nodes Flush Results on targets Reload and explore targets Discuss concepts related to MemCacheD Clustering of Key | Value Pairs MemCacheD - Python - Integration Express usage features and concerns Enable modular support for MemCacheD Use Interactive interface to source MemCache objects Issue common commands via Python against the Cache Explore and discuss behaviour across Nodes Author simple script to interact with MemCacheD Automate procedure MemCacheD - PHP - Includes Consider features Discuss sample usage scenarios Generate usage files for inclusion Ensure PHP support for MemCacheD Author PHP script to Load Cached Key | Value pairs Handle Cache Misses programatically Debug as needed Evaluate results MemCacheD - PHP - SQL Queries Discuss sample usage scenarios Confirm MySQL DB | Table structure Connect to MySQL via PHP Confirm DBMS-provided results Cache results if not present in Cache Vary timers and monitor Cache behaviour Evaluate results MemCacheDB - Persistent - Key | Value - Storage Contrast with MemCacheD Discuss sample usage scenarios Install MemCacheDB Compare and Contrast footprint with MemCacheD Test accessibility Migrate sample scripts to use MemCacheDB Debug as needed Evaluate results DOWNLOAD http://rapidgator.net/file/320e1cb863922f7cea20dc5d0999a1c8/MemCacheD_Edition.part1.rar.html http://rapidgator.net/file/679136d5b6b18ad0062c1eb6295ba750/MemCacheD_Edition.part2.rar.html http://rapidgator.net/file/eee5a866614cdcd00a250bd16557a223/MemCacheD_Edition.part3.rar.html http://rapidgator.net/file/dd565a967da03d4c0b918fd5261cc884/MemCacheD_Edition.part4.rar.html http://rapidgator.net/file/d67940172a19a5976cfd8e629c15a01b/MemCacheD_Edition.part5.rar.html http://rapidgator.net/file/7155a31a904d6dfe2a848c24be51237c/MemCacheD_Edition.part6.rar.html http://uploaded.net/file/tv0ljfj9/MemCacheD_Edition.part1.rar http://uploaded.net/file/60jb16sl/MemCacheD_Edition.part2.rar http://uploaded.net/file/2i3ardwc/MemCacheD_Edition.part3.rar http://uploaded.net/file/ul80ej5q/MemCacheD_Edition.part4.rar http://uploaded.net/file/bl0j1gt8/MemCacheD_Edition.part5.rar http://uploaded.net/file/37i0d4xk/MemCacheD_Edition.part6.rar http://www.uploadable.ch/file/ASsMhtMP37xB/MemCacheD_Edition.part1.rar http://www.uploadable.ch/file/9QJ6sw7ZzsCT/MemCacheD_Edition.part2.rar http://www.uploadable.ch/file/9xs3ZMZhazsm/MemCacheD_Edition.part3.rar http://www.uploadable.ch/file/7hVKKtRs5FcD/MemCacheD_Edition.part4.rar http://www.uploadable.ch/file/sPaByETRB54J/MemCacheD_Edition.part5.rar http://www.uploadable.ch/file/T6UzbkGRf75e/MemCacheD_Edition.part6.rar http://www.hitfile.net/1v63/MemCacheD_Edition.part1.rar.html http://www.hitfile.net/1v7o/MemCacheD_Edition.part2.rar.html http://www.hitfile.net/1uCD/MemCacheD_Edition.part3.rar.html http://www.hitfile.net/1uaJ/MemCacheD_Edition.part4.rar.html http://www.hitfile.net/1v5t/MemCacheD_Edition.part5.rar.html http://www.hitfile.net/1vzB/MemCacheD_Edition.part6.rar.html
  17. LinuxCBT - Postfix Edition MTA English | .MOV | h264, yuv420p, 800x600, 77 kb/s, 5.00 fps | aac, 44100 Hz, 1 channels, s16, 62 kb/s | 1.22 GB Genre: eLearning Lesson Postfix - Installation Identify a geographically close Postfix mirror location Discuss Postfix nomenclature Download Postfix Download From NitroFlare http://www.nitroflare.com/view/3197DAF074547E5/lcbt.Postfix.Ed.part1.rar http://www.nitroflare.com/view/902B9156233C261/lcbt.Postfix.Ed.part2.rar http://www.nitroflare.com/view/AB02D2970284CFF/lcbt.Postfix.Ed.part3.rar http://www.nitroflare.com/view/29CEA7DEA3DAD7B/lcbt.Postfix.Ed.part4.rar http://www.nitroflare.com/view/7798212BBAE3951/lcbt.Postfix.Ed.part5.rar Download From Rapidgator http://rapidgator.net/file/558793dba78b189ddb44e5a5139cebb9/lcbt.Postfix.Ed.part1.rar.html http://rapidgator.net/file/c3d58df09e31fb90777b7ecb6f5204c0/lcbt.Postfix.Ed.part2.rar.html http://rapidgator.net/file/c016617633c4b3f8b2ba58842efbff04/lcbt.Postfix.Ed.part3.rar.html http://rapidgator.net/file/3a6a2a0b451afa3640a53c24a9d7d2d3/lcbt.Postfix.Ed.part4.rar.html http://rapidgator.net/file/ca57131f2bdfd5f2bd6cba7567673870/lcbt.Postfix.Ed.part5.rar.html
×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.