cormanos
Sunset Riders - tips & tricks
quinta-feira, 24 de fevereiro de 2011
wsus registry automatic updates
KB2393802 - windows restarting - SOLVE
segunda-feira, 21 de fevereiro de 2011
samba centos-ds
change logo zimbra
domingo, 20 de fevereiro de 2011
linux vtc red hat video training rhct rhce rhcsa
| Introduction | |||
| | (05:28) | ||
| | (02:54) | ||
| Additional Information for the RHCE Exam | |||
| | (02:09) | ||
| | (04:07) | ||
| | (06:00) | ||
| | (02:20) | ||
| | (06:09) | ||
| | (04:49) | ||
| | (03:48) | ||
| | (06:23) | ||
| | (04:35) | ||
| | (07:36) | ||
| | (05:01) | ||
| System Monitoring and Fault Analysis | |||
| | (04:46) | ||
| | (05:00) | ||
| | (03:03) | ||
| | (03:20) | ||
| | (02:24) | ||
| System Service Analysis | |||
| | System Service Access Controls | (06:48) | |
| | Service and Network Access Controls | (04:30) | |
| | Service and Application Access Controls | (03:06) | |
| | tcp_wrappers Configuration | (04:11) | |
| | Security Enhanced Linux (SELinux) | (05:09) | |
| Network Configuration and Security | |||
| | Network Resource Access Controls | (03:20) | |
| | Dynamic Interface Configuration | (03:48) | |
| | Static Interface Configuration | (03:10) | |
| | Routing Configuration Pt.1 | (02:28) | |
| | Routing Configuration Pt.2 | (05:52) | |
| | Netfilter Overview | (06:11) | |
| | iptables Firewall Rules | (06:09) | |
| | Firewall Rules by IP address | (06:21) | |
| | Network Access Translation (NAT) | (03:17) | |
| Network Support Services | |||
| | Organizing Networked Systems | (02:08) | |
| | Host Name Resolution | (03:07) | |
| | Trace a DNS Query with the dig command | (02:47) | |
| | Exploring DNS with the host command | (02:49) | |
| | An Overview of Domain Name Services | (03:15) | |
| | DNS Packages | (05:14) | |
| | Configuring a BIND Caching Nameserver | (06:40) | |
| | Setting up a Slave Nameserver | (05:17) | |
| | BIND in sysconfig and command support | (04:04) | |
| | The DHCP Service | (05:57) | |
| | Configuring an NTP Server | (05:37) | |
| Sharing on a Network | |||
| | Network File Sharing Services | (02:26) | |
| | FTP – Basic Server Configuration | (05:05) | |
| | FTP – Security Options | (06:09) | |
| | NFS – Basic Server Configuration | (03:47) | |
| | NFS – Security Options | (04:49) | |
| | Samba – Basic Server Configuration | (06:10) | |
| | More on Samba | (06:25) | |
| | Samba Security Options | (03:59) | |
| | File Server Security | (03:28) | |
| Apache Web Services and More | |||
| | Apache Web Services | (03:02) | |
| | Critical Apache Configuration Directives | (06:28) | |
| | Creating a Virtual Host | (06:55) | |
| | Limiting Access to an Apache Website | (05:33) | |
| | Apache and SELinux | (03:39) | |
| | Creating a Secure Apache Host | (07:24) | |
| | Configuring the Squid Web Proxy | (05:27) | |
| Configuring Email Services | |||
| | Email Protocols and Agents | (04:02) | |
| | Basic sendmail Configuration Pt.1 | (04:33) | |
| | Basic sendmail Configuration Pt.2 | (03:38) | |
| | Basic Postfix Configuration | (04:33) | |
| | Switching Between SMTP Services | (02:47) | |
| | Mail Retrieval Protocols | (03:39) | |
| Creating Secure Remote Access | |||
| | A Secure Shell Server | (06:17) | |
| | Configuring Secure Certificates | (05:24) | |
| | Secure Shell Keys | (07:10) | |
| Account Security | |||
| | Basic Account Management | (03:02) | |
| | Name Service Switching | (04:19) | |
| | Pluggable Authentication Modules (PAM) | (04:19) | |
| | Utilities and Authentication | (04:52) | |
| | Making PAM Work For You | (05:57) | |
| Troubleshooting and System Maintenance | |||
| | Use the Rescue Environment | (06:38) | |
| | Diagnose and Correct Boot Failures | (06:04) | |
| | Address Problems with Network Services | (06:04) | |
| | Add, Remove, and Resize Logical Volumes | (03:22) | |
| | Diagnose SELinux Network Problems | (02:32) | |
| Installation and Configuration | |||
| | Install Packages for Network Services | (04:08) | |
| | Configure SELinux for Network Services | (02:49) | |
| | Configure Services to Start on Boot | (03:43) | |
| | Configure Basic Service Operation | (03:29) | |
| | Configure User/Host-based Security | (03:52) | |
| | Configure Kickstart Installations | (02:45) | |
| | Add Logical Volumes during Installation | (03:47) | |
| | Use iptables to for Firewalls and NAT | (04:33) | |
| | Use PAM for User-Level Restrictions | (03:35) | |
| Wrap-up | |||
| | Wrap-up Pt.1 | (03:33) | |
| | Wrap-up Pt.2 | (05:36) | |
| Credits | |||
| | About the Author | (01:23) | |