Developers and Speakers
|
|
- Tyler Whitehead
- 6 years ago
- Views:
Transcription
1 Honeywall CD-ROM
2 Developers and Speakers Dave Dittrich University of Washington Rob McMillen USMC Jeff Nathan Sygate William Salusky AOL
3 A case for Honeynets Research of attack technologies and methodologies Root-cause analysis of attack motives "Target of choice or target of chance?" Getting the problem statement right Dr. Dan Geer, Journal of the Advanced Computing Systems Association (USENIX) - June 2003, Volume 28, number 3 Self defense Incident response and forensic analysis Deception and deterrence
4 Problem: Simplify Honeynet deployment Current Honeynets deployments require considerable effort. Lack of standardized deployment platform. Lack of standardized configuration mechanism to faciliate large-scale Honeynet deployment. How can Honeynet deployment (especially largescale deployments) be simplified? How can Generation II Honeynet technologies be packaged into an easy to use system?
5 Solution: The Honeywall A self-contained Honeynet data control and data management system An easily configurable system Simplify deployment and management Build a system using a bootable CD-ROM. Simplify configuration and management using plain text files. Use commodity PC hardware to minimize costs. Offer routing and bridging functionality to ease network integration. Minimize customization efforts with built-in customization hooks.
6 Honeywall overview Bootable Linux CD-ROM Utilizes existing Honeynet data control and data capture technologies. iptables (custom Honeywall configuration via rc.firewall) Snort-inline Snort Menu-driven configuration interface for easy configuration. Single configuration file for interactive or automated configuration.
7 Honeywall implementation Bootable Linux system from ramdisk, logging to hard disk Boot image consists of Linux kernel Kernel image contains compressed (800K) initial ramdisk image to bootstrap system Second stage boot process contains more complete Linux system Generation II Honeynet gateway in a box Data control system using iptables Operates as a routing or bridging device Makes a reasonable attempt to prevent stepping stones
8 Honeywall implementation (continued) Complex attack detection/mitigation using Snortinline Hooks into iptables using queues (libipqueue), performs Gateway Intrusion Detection Detects low-level protocol attacks abuses Can modify outgoing attacks to prevent compromise of third-party systems Data capture facilities using Snort and Snort-inline Captures every packet traversing the Honeywall
9 Honeywall implementation (continued) (Data capture..) Generates alerts for events matching conditions within the Snort and Snort-inline Facilitates forensic analysis of network data to identify new tools, techniques, trend and behavioral analysis of attack incidents Utilizes rc.conf (BSD) style configuration file to simplify system management. Leverages commodity PC hardware and a CD- ROM for minimal deployment effort Extensible Unix-like shell scripting architecture
10 Honeywall boot process Boot Linux system from initial ramdisk (initrd) Load minimal kernel into memory Bootstrap Honeywall using linuxrc initialization script Mount root filesystem read-write Mount /proc Attempt to mount CD-ROM Mount cramfs (compressed) filesystem from CD- ROM on loop device
11 Honeywall boot process (continued) Continue Honeywall initialization Probe hardware devices and load kernel modules Extracts tar/gzip compressed archive of supplemental commands Update shared library cache (ldconfig) look for pre-configured Honeywall hard disk Instantiate default Honeywall packet filter Perform final configuration of data control components Execute custom.sh Start administration interface
12 Honeywall customization Floppy disk configuration file Modify ISO w/custom script before burning Just use custom.sh to set variables, start things Use custom.sh to communicate with central server Use SSH to set variables from central management host Rip ISO apart, modify file system, then rebuild Allows adding new programs, new services, new capabilities Supports development independant of the Honeynet Project
13 Honeywall deployment Requires a PC hardware with 3 network interfaces using IDE disks and 256MB RAM Connected to an existing network of hosts by placing the Honeywall systems between possible attackers and the Honeynet systems
14 Honeynet deployment (continued)
15 Honeywall demonstration
16 Future work (a production system) Integration of Honey Inspector UI Web interface to customize ISO Command shell for remote mangement Remote Honeywall Manager
17 Resources and questions Watch the tools section on Questions?
18 Customization in more detail How a CD-ROM is born Modification of ISO image De/reconstruction of ISO image
Computer. Operating Systems Introduction to Operating System (OS)
Computer Operating Systems Introduction to Operating System (OS) A computer is a system composed of two major components: hardware and software. Hardware is the physical equipment. Software is the collection
More informationHoneypot Hacker Tracking and Computer Forensics
Honeypot Hacker Tracking and Computer Forensics Manfred Hung manfred.hung@pisa.org.hk Agenda Honeypot History Value of Honeypot Honeypot Technology Common Honypot products/solutions Honeypot deployment
More informationJournal Online Jaringan COT POLIPD (JOJAPS) Network Defender with Fake Server: A New Way for Network Protection
JOJAPS eissn 2504-8457 Abstract Journal Online Jaringan COT POLIPD (JOJAPS) Network Defender with Fake Server: A New Way for Network Protection Mohd Tamizan Abu Bakar 1, Mariati bt Mad Samad 1 & Akhyari
More informationSetting-up WAN Emulation using WAN-Bridge Live-CD v1.10
Setting-up WAN Emulation using WAN-Bridge Live-CD v1.10 Contents Document version 0.1 Overview... 2 What s New in Version 1.10... 2 Software Installed on the CD... 2 License... 3 Sample Lab Configurations...
More informationAllen Harper Edward Balas
Allen Harper is a Security Engineer for the US Department of Defense in Northern Virginia. He holds a MS in Computer Science from the Naval Post Graduate School. As a member of the Honeynet Project, Allen
More informationHoney Pot Be afraid Be very afraid
Honey Pot Be afraid Be very afraid Presented By Shubha Joshi M.Tech(CS) Problems with internet Why? Problems The Internet security is hard New attacks every day Our computers are static targets What should
More informationFile System Hierarchy Standard (FHS)
File System Hierarchy Standard (FHS) Filesystem hierarchy standard describes directory structure and its content in Unix and Unix like operating system. It explains where files and directories should be
More informationLinux+ Guide to Linux Certification, Third Edition. Chapter 6 Advanced Installation
Linux+ Guide to Linux Certification, Third Edition Chapter 6 Advanced Installation Objectives Describe the types and structure of SCSI devices Explain the different levels of RAID and types of RAID configurations
More informationLinux Files and the File System
Linux Files and the File System 1. Files a. Overview A simple description of the UNIX system, also applicable to Linux, is this: "On a UNIX system, everything is a file; if something is not a file, it
More informationIf you don't care about how it works but you just would like that it works read here. Other wise jump to the next chapter.
Boot Linux from USB Hard Disk Written 01/04/07 by Urs_Lindegger@Bluewin.Ch About this Document I have a laptop where I'm not allowed to install Linux. However on business trips I'd like to use Linux with
More informationLinux+ Guide to Linux Certification, Third Edition
Linux+ Guide to Linux Certification, Third Edition Chapter 14 Troubleshooting, Performance, and Security Objectives Describe and outline good troubleshooting practices Effectively troubleshoot common hardware-
More informationKnow Your Enemy: Honeynets What a Honeynet is, its value, how it works, and risk/issues involved.
Know Your Enemy: Honeynets What a Honeynet is, its value, how it works, and risk/issues involved. Honeynet Project http://project.honeynet.org Last Modified: 14 January, 2002 Over the past several years
More informationSOURCEFIRE 3D SYSTEM RELEASE NOTES
SOURCEFIRE 3D SYSTEM RELEASE NOTES Version 4.7.0.6 August 14, 2008 These release notes are valid for Version 4.7.0.6 of Sourcefire Defense Centers and Master Defense Centers. This patch is not available
More informationalcasar_documentation Documentation
alcasar_documentation Documentation Release 0.1 Bettyna Bourcier March 29, 2016 Contents 1 Installation 1 1.1 Introduction............................................... 1 1.2 Installation................................................
More informationChapter 7 Forensic Duplication
Chapter 7 Forensic Duplication Ed Crowley Spring 10 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool
More informationChapter 02 Linux Installation and Usage
Chapter 02 Linux Installation and Usage TRUEFALSE 1. A swap partition contains a filesystem. 2. When a user interacts with his computer, he interacts directly with the kernel of the computer's operating
More informationNetwork Drawing. Computer Specs, I ve used. Installing a Network-Based Intrusion Detection
HS1 HS2 OK1 OK2 PS 1 2 3 4 5 6 7 8 9 101112 COL- ACT- STA.- CONSOLE SD Installing a Network-Based Intrusion Detection created by: Rainer Bemsel Version 1.0 Dated: Apr/10/2003 The purpose of this document
More informationFile Systems. File system interface (logical view) File system implementation (physical view)
File Systems File systems provide long-term information storage Must store large amounts of data Information stored must survive the termination of the process using it Multiple processes must be able
More informationIPCop Installation and Management. By: Kritsada Pinato (Bugfly)
IPCop Installation and Management By: Kritsada Pinato (Bugfly) Introduction to IPCop What is IPCop? IPCop is a firewall; first, last and always. IPCop is a specialized Linux Distribution; complete, configured,
More informationManage Directories and Files in Linux. Objectives. Understand the Filesystem Hierarchy Standard (FHS)
Manage Directories and Files in Linux Objectives Understand the Filesystem Hierarchy Standard (FHS) Identify File Types in the Linux System Change Directories and List Directory Contents Create and View
More informationConfiguring and Building Palacios/Linux
Configuring and Building Palacios/Linux 1/3/2011 1. Check out the Palacios repository The central Palacios repository is directly accessible from newskysaw.cs.northwestern.edu and newbehemoth.cs.northwestern.edu.
More informationGuide to Computer Forensics. Third Edition. Chapter 11 Chapter 11 Network Forensics
Guide to Computer Forensics and Investigations Third Edition Chapter 11 Chapter 11 Network Forensics Objectives Describe the importance of network forensics Explain standard procedures for performing a
More informationMODULE 02. Installation
MODULE 02 Installation Identify the type of system, hardware, and network settings necessary for Linux installation Describe the need for pre-installation procedures Identify the different types of file
More informationChapter 7 Forensic Duplication
Chapter 7 Forensic Duplication Ed Crowley Spring 11 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool
More informationRocket RAID 2644 SAS Controller opensuse Linux Installation Guide
Rocket RAID 2644 SAS Controller opensuse Linux Installation Guide Version 1.1 Copyright 2012 HighPoint Technologies, Inc. All rights reserved. Last updated on June 12, 2012 Table of Contents 1 Overview...
More informationWomp Howto. William Daniau 1st January 2004
Womp Howto William Daniau 1st January 2004 1 Introduction I ve tried to make Womp as self-exponent as possible, nevertheless a user documentation will be written... one day. Hereafter you ll find some
More informationLinux for IT Managers and System Administrators Training Workshop
Linux for IT Managers and System Administrators Training Workshop Dates: 4th 6th May 2011 Venue: Futuristic Labs, Woodlands Road Call Now- +254202729313 / +254720349420 Or Register Online at http://tinyurl.com/5toxjeh
More informationDiskless Linux Clusters
Diskless Linux Clusters Ciro Cattuto ciro.cattuto@pg.infn.it Outline: Why diskless operation? Issues with diskless nodes Our choices Configuring the Linux kernel The boot sequence Pros and cons 1 Cost
More informationRocketRAID 2522 SATA Controller Ubuntu Linux Installation Guide
RocketRAID 2522 SATA Controller Ubuntu Linux Installation Guide Version 1.0 Copyright 2008 HighPoint Technologies, Inc. All rights reserved. Last updated on February 16, 2009 Table of Contents 1 Overview...1
More informationHoneynet Data Analysis: A technique for correlating sebek and network data
Honeynet Data Analysis: A technique for correlating sebek and network data Edward G. Balas Indiana University Advanced Network Management Lab 6/15/2004 About the Author Edward G. Balas Security Researcher
More informationFile System Case Studies. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University
File System Case Studies Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today s Topics The Original UNIX File System FFS Ext2 FAT 2 UNIX FS (1)
More informationHONEYNET SOLUTIONS. A deployment guide 1. INTRODUCTION. Ronald C Dodge JR, Richard T Brown, Daniel J Ragsdale
HONEYNET SOLUTIONS A deployment guide Ronald C Dodge JR, Richard T Brown, Daniel J Ragsdale United States Military Academy Abstract: Key words: Honeynets provide network and system managers a unique intrusion
More informationFile System Case Studies. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University
File System Case Studies Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today s Topics The Original UNIX File System FFS Ext2 FAT 2 UNIX FS (1)
More informationWireless Honeypots. Created by: Sponsored by: Final Documentation. Volume 2 Product and Process Documentation
Wireless Honeypots Created by: Sponsored by: Final Documentation Volume 2 Product and Process Documentation April 25, 2005 Product and Process Documentation Introduction A honeypot is a node on a network
More informationGetting Started. System Requirements. Installation
Getting Started NexentaOS is an OpenSolaris distribution for your x86/x64 desktop, laptop, or server - with a fast and easy-to-install regular releases and a selection of tightly-integrated excellent applications.
More informationovirt Node June 9, 2012 Mike Burns ovirt Node 1
ovirt Node June 9, 2012 Mike Burns ovirt Node 1 Agenda Introduction Architecture Overview Deployment Modes Installation and Configuration Upgrading Configuration Persistence Future Features Discussion
More informationChapter 6. Boot time configuration. Chapter 6 Boot time configuration
Chapter 6. Boot time configuration Chapter 6 Boot time configuration Last revised: 20/6/2004 Chapter 6 Outline In this chapter we will learn about: How the system boots How to configure the boot loaders
More informationInitial Bootloader > Flash Drive. Warning. If not used carefully this process can be dangerous
Initial Bootloader > Flash Drive Warning If not used carefully this process can be dangerous Running the script used in this article with an incorrect argument can cause loss of data and potentially damage
More informationA Distributed Intrusion Alert System
A Distributed Intrusion Alert System Chih-Yao Lin, Hsiang-Ren Shih, and Yomin Hou Taiwan National Computer Emergency Response Team {chinyao, shr, yominhou}@twncert.org.tw Abstract In this paper, a distributed
More informationServer Consolidation with Xen Farming
with Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen Am Fassberg, 37077 Göttingen ulrich.schwardmann@gwdg.de Linux Kongress 2008, 9.10.2008 1 2 3 4 5 6 7 8 9 Content should be more than
More informationINSTALLATION. Security of Information and Communication Systems
Security of Information and Communication Systems INSTALLATION Table of contents 1.Introduction...2 2.Installation...3 2.1.Hardware requirement...3 2.2.Installation of the system...3 2.3.Installation of
More informationSOURCEFIRE 3D SYSTEM RELEASE NOTES
SOURCEFIRE 3D SYSTEM RELEASE NOTES Version 5.3.0.2 Original Publication: April 21, 2014 Last Updated: April 25, 2016 These release notes are valid for Version 5.3.0.2 of the Sourcefire 3D System. Even
More informationCHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed.
CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed. File-System Structure File structure Logical storage unit Collection of related information File
More informationDeploying Cisco UCS Central
This chapter includes the following sections: Obtaining the Cisco UCS Central Software from Cisco, page 1 Using the Cisco UCS Central OVA File, page 2 Using the Cisco UCS Central ISO File, page 4 Logging
More informationminit Felix von Leitner September 2004 minit
minit Felix von Leitner felix-minit@fefe.de September 2004 minit What is this all about? This talk is about a new init program called minit. Several itches needed scratching: 1. Typical Linux distributions
More information"Charting the Course... Enterprise Linux System Administration Course Summary
Course Summary Description This is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal to every workstation and server.
More informationThe Early System Start-Up Process. Group Presentation by: Tianyuan Liu, Caiwei He, Krishna Parasuram Srinivasan, Wenbin Xu
The Early System Start-Up Process Group Presentation by: Tianyuan Liu, Caiwei He, Krishna Parasuram Srinivasan, Wenbin Xu 1 Boot Process Booting is the initialization of a computerized system In Linux,
More informationTurboCap Installation Guide
TurboCap Installation Guide Linux Fedora 10 May 2013 2013 Riverbed Technology. All rights reserved. Accelerate, AirPcap, BlockStream, Cascade, Cloud Steelhead, Granite, Interceptor, RiOS, Riverbed, Shark,
More informationFirewall Identification: Banner Grabbing
Honey POt Firewall Identification: Banner Grabbing Banners are messages sent out by network services during the connection to the service. Banners announce which service is running on the system. Banner
More informationWelcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions
Welcome to getting started with Ubuntu 12.04 Server. This System Administrator Manual guide to be simple to follow, with step by step instructions with screenshots INDEX 1.Installation of Ubuntu 12.04
More informationovirt Node November 1, 2011 Mike Burns Alan Pevec Perry Myers ovirt Node 1
ovirt Node November 1, 2011 Mike Burns Alan Pevec Perry Myers ovirt Node 1 Agenda Introduction Architecture Overview Deployment Modes Installation and Configuration Upgrading Configuration Persistence
More informationHoneynets and Darknets. What good are they?
Honeynets and Darknets What good are they? Presented by 11:20-11:50am Friday, November 14th, 2008 and Aidan Carty HEAnet 1 Content Introduction and Overview Honeynet activities at ITB Honeynet activities
More informationLINUX Developers Conference, Cologne, 9/6/2002. M. Finkenzeller A. Kirstädter. Siemens AG, Corporate Technology Munich, Germany
LINUX Developers Conference, Cologne, 9/6/2002 Voxilla Phone M. Finkenzeller A. Kirstädter Siemens AG, Corporate Technology Munich, Germany michael.finkenzeller@siemens.com Contents introduction Voice-over-IP
More informationPerformance Considerations of Network Functions Virtualization using Containers
Performance Considerations of Network Functions Virtualization using Containers Jason Anderson, et al. (Clemson University) 2016 International Conference on Computing, Networking and Communications, Internet
More informationCST Algonquin College 2
Partitions Lab due dates: Labs are due as specified usually on Page1 of the Lab document Lab due dates are expressed as: 10 min before the end of the lab period during a certain week There is a grace period
More informationPL-I Assignment Broup B-Ass 5 BIOS & UEFI
PL-I Assignment Broup B-Ass 5 BIOS & UEFI Vocabulary BIOS = Basic Input Output System UEFI = Unified Extensible Firmware Interface POST= Power On Self Test BR = Boot Record (aka MBR) BC =Boot Code (aka
More informationUbuntu Linux Installation Guide
RocketRAID 278x SAS Controller Ubuntu Linux Installation Guide Version 1.1 Copyright 2012 HighPoint Technologies, Inc. All rights reserved. Last updated on May 29, 2012 Table of Contents 1 Overview...
More informationParanoid Penguin Running Network Services under User-Mode Linux, Part III Mick Bauer Abstract Fine-tune and firewall your UML guest systems. In the last two Paranoid Penguin columns, I walked you through
More informationHow to Deploy a Barracuda NG Vx using Barracuda NG Install on a VMware Hypervisor
How to Deploy a Barracuda NG Vx using Barracuda NG Install on a VMware Hypervisor The OVA package uses a default configuration that may not be suitable for your deployment. If you want to use multiple
More informationRunning Network Services under User-Mode
Running Network Services under User-Mode Linux, Part I Mick Bauer Abstract Leverage the Linux kernel's virtualization features to isolate network dæmons. In my May 2006 Paranoid Penguin column, I expounded
More informationInstalling caos with Cinch on Floppy Disk
Installing caos with Cinch on Floppy Disk Troy Andrew Johnson May 21, 2004 Abstract cinch is the caos Linux (http://www.caosity.org/) installer. Prerequisites What you need: two floppy disks (at least)
More informationUsing Dell Repository Manager to Create a Deployment Media (Bootable ISO) to Perform Systems Updates
Using Dell Repository Manager to Create a Deployment Media (Bootable ISO) to Perform Systems This Dell Technical White Paper addresses how to leverage configuration scripts while updating Dell servers.
More informationDell OpenManage Deployment Toolkit 5.5 for Embedded Linux Release Notes
Dell OpenManage Deployment Toolkit 5.5 for Embedded Linux Release Notes This document describes the new features, enhancements, and fixed issues in Dell Openmanage Deployment Toolkit 5.5 for Embedded Linux
More informationRocketRAID 231x/230x SATA Controller Debian Linux Installation Guide
RocketRAID 231x/230x SATA Controller Debian Linux Installation Guide Version 1.0 Copyright 2008 HighPoint Technologies, Inc. All rights reserved. Last updated on September 17, 2008 Table of Contents 1
More informationA+ Guide to Managing and Maintaining Your PC. How Hardware and Software Work Together
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 2 How Hardware and Software Work Together You Will Learn About operating systems, what they are, and what they do How an OS interfaces
More informationDell OpenManage Deployment Toolkit 5.3 for Embedded Linux Release Notes
Dell OpenManage Deployment Toolkit 5.3 for Embedded Linux Release Notes This document describes the new features, enhancements, and fixed issues in Dell Openmanage Deployment Toolkit 5.3 for Embedded Linux
More informationCompTIA Linux+ Guide to Linux Certification Fourth Edition. Chapter 2 Linux Installation and Usage
CompTIA Linux+ Guide to Linux Certification Fourth Edition Chapter 2 Linux Installation and Usage Objectives Prepare for and install Fedora Linux using good practices Outline the structure of the Linux
More informationLong-term Information Storage Must store large amounts of data Information stored must survive the termination of the process using it Multiple proces
File systems 1 Long-term Information Storage Must store large amounts of data Information stored must survive the termination of the process using it Multiple processes must be able to access the information
More informationCymmetria MazeRunner INSTALLATION GUIDE
Cymmetria MazeRunner INSTALLATION GUIDE September 12, 2016 Supported environments (all must have nested virtualization enabled follow the links below to learn more) VMware Player (7 or higher) VMware Workstation
More informationCritical Analysis and last hour guide for RHCSA/RHCE Enterprise 7
Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7 Disclaimer: I haven t gone through RHCSA/RHCE EL 7. I am preparing for upgrade of my RHCE certificate from RHCE EL4 to RHCE EL7. I don
More informationDigital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS
Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS Digital Forensics Readiness: PREPARE BEFORE AN INCIDENT HAPPENS 2 Digital Forensics Readiness The idea that all networks can be compromised
More informationContents at a Glance COPYRIGHTED MATERIAL. Introduction...1 Part I: Becoming Familiar with Enterprise Linux...7
Contents at a Glance Introduction...1 Part I: Becoming Familiar with Enterprise Linux...7 Chapter 1: Getting Acquainted with Enterprise Linux...9 Chapter 2: Exploring the Desktop...17 Chapter 3: Putting
More informationIntrusion Detection. Vincent Brillault. October CERN (European Organization for Nuclear Research)
Vincent Brillault CERN (European Organization for Nuclear Research) October 2013 Content Log 1 2 Log 3 2/36 Contents Log 1 2 Log 3 3/36 Network-based IDS Log Existing solutions: Bro, snort... Need correct
More informationSPPEXA TEACHLET: GETTING STARTED WITH L4RE CARSTEN WEINHOLD
Faculty of Computer Science Institute of System Architecture, Operating Systems Group SPPEXA TEACHLET: GETTING STARTED WITH L4RE CARSTEN WEINHOLD AGENDA first contact with a microkernel OS getting to know
More informationComputer Center, CS, NCTU. Outline. FreeBSD version 8.2-RELEASE. Installing FreeBSD. From CD-ROM
FreeBSD changlp Outline FreeBSD version 8.2-RELEASE Installing FreeBSD From CD-ROM 2 FreeBSD Version FreeBSD Branches/Tags Three parallel development branches: -RELEASE Latest Release Version: 8.2 (Feb,
More informationCIT 470: Advanced Network and System Administration. Topics. Workstation Management. Workstations
CIT 470: Advanced Network and System Administration Workstations CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Machine Lifecycle 2. Automated Installs 3. Updates 4. Network Configuration
More informationDifferent attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT
Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT environment (e.g., Windows vs Linux) Levels of abstraction
More informationINSTALLING INSTALLING INSTALLING
Architect Version 6.0 Update 2 Release Notes April 2012 0898600-6.0-2 READ READ READ ME ME ME BEFORE BEFORE BEFORE INSTALLING INSTALLING INSTALLING THIS THIS THIS PRODUCT PRODUCT PRODUCT Disclaimer The
More informationV Workstation Imaging
V Workstation Imaging The following sections provide information on Novell ZENworks Desktop Management Workstation Imaging procedures and features. Chapter 50, Common Imaging Deployment Strategies, on
More informationChapter 2: System and Network Architecture. Chapter 4: Configuration of the Server and Client Machines. Chapter 5: Starting a Functional Test
Contents Chapter 1: Suggested Test Flow Chapter 2: System and Network Architecture Basic Deployment... 2-1 Minimum Server/Client Hardware Requirements... 2-2 Minimum Data Collection Client Requirement...
More informationChapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories
Chapter Two Exploring the UNIX File System and File Security Lesson A Understanding Files and Directories 2 Objectives Discuss and explain the UNIX file system Define a UNIX file system partition Use the
More informationINSTALLATION. Security of Information and Communication Systems. Table of contents
Security of Information and Communication Systems INSTALLATION Table of contents 1. Introduction...2 2....3 2.1. Hardware requirement...3 2.2. of the system...3 2.3. of ALCASAR...7 2.4. Connexion to the
More informationCST8177 Linux II. Linux Boot Process
CST8177 Linux II Linux Boot Process Reference information from the text, http://www.linuxdoc.org and several other web sites Linux Boot Process Topics covered in this slide-set Basic definition of the
More informationDell EqualLogic Red Hat Enterprise Linux 6.2 Boot from SAN
Dell EqualLogic Red Hat Enterprise Linux 6.2 Boot from SAN A Dell EqualLogic best practices technical white paper Storage Infrastructure and Solutions Engineering Dell Product Group November 2012 2012
More informationNI Linux Real-Time. Fanie Coetzer. Field Sales Engineer SA North. ni.com
1 NI Linux Real-Time Fanie Coetzer Field Sales Engineer SA North Agenda 1. Hardware Overview 2. Introduction to NI Linux Real-Time OS Background & Core Technology Filesystem Connectivity and Security 3.
More informationCdboot Cannot Boot From Cd Error Code 5 Windows 7
Cdboot Cannot Boot From Cd Error Code 5 Windows 7 I can boot normal with the same cd on Windows 7 64Bit. DVD-R, DVD-RW, DVD R, DVD RW, DVD-R DL, DVD R DL br / Config Manager Error Code Device. If it does
More informationFlash Drive Won T Mount Windows 7 Won T Recognize
Flash Drive Won T Mount Windows 7 Won T Recognize So after inserting the flash drive, if I go to Start _ Computer, I won't see anything there for Windows 7 Professional doesn't mount my usb flash drive
More informationA fault tolerance honeypots network for securing E-government
A fault tolerance honeypots network for securing E-government Shahriar Mohammadi Bahman Nikkhahan smohammadi40@yahoo.com Nikkhahan@sina.kntu.ac.ir Information Technology Engineering Group, Department of
More information: XEN WORLDS: XEN AND THE ART OF COMPUTER ENGINEERING EDUCATION
2006-2300: XEN WORLDS: XEN AND THE ART OF COMPUTER ENGINEERING EDUCATION Benjamin Anderson, Iowa State University Thomas Daniels, Iowa State University Dr. Thomas E. Daniels is an Assistant Professor in
More informationDisplay Modules (DL-DM) Application Developer's Guide
Display Modules (DL-DM) Application Developer's Guide PART NUMBER: 101198 VERSION: 3.0 P Page 1 of 11 Revision Status Revision Date Part Number Description 1.0 2011-08-31 DL-DM700-DGAPPL Initial release
More informationKernel Boot-Time Optimization
Kernel Boot-Time Optimization Nicholas Mc Guire Distributed & Embedded Systems Lab Lanzhou Universtiy, P.R.China dslab.lzu.edu.cn Funded by Siemens CTSE2 under contract FMU654213 Schedule 1 Schedule Starting
More informationSLES Linux Installation Guide
Rocket RAID 278x SAS Controller SLES Linux Installation Guide Version 1.1 Copyright 2012 HighPoint Technologies, Inc. All rights reserved. Created on May 29, 2012 Table of Contents 1 Overview... 1 2 Installing
More informationSysadminSG RHCSA Study Guide
SysadminSG RHCSA Study Guide This is the RHCSA Study Guide for the System Administration Study Group. The study guide is intended to be printed by those who wish to study common tasks performed by many
More informationCOMPUTER FORENSICS (CFRS)
Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 7.4 Firewalls CSC 474/574 Dr. Peng Ning 1 Outline What are firewalls? Types Filtering Packet filtering Session filtering Proxy Circuit Level Application Level
More informationBoot. How OS boots
Boot How OS boots 67 1 Booting sequence 1. Turn on 2. CPU jump to address of BIOS (0xFFFF0) 3. BIOS runs POST (Power-On Self Test) 4. Find bootable devices 5. Loads and execute boot sector from MBR 6.
More informationExperiences with Building, Deploying and Running a remotecontrolled
Corporate Technology Experiences with Building, Deploying and Running a remotecontrolled easily installable Network Sensor Bernd Grobauer, Siemens CERT Copyright Siemens AG 2007. All rights reserved. Imagine
More informationFilesystem Hierarchy and Permissions
and Linux Prepared by Steven Gordon on 19 April 2017 Common/Reports/linux-file-permissions.tex, r1417 1/15 Multiuser and Server Operating System Linux systems are commonly used as a multi-user system E.g.
More informationVirtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE
International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April-2013 1492 Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE,
More informationSystems Programming. The Unix/Linux Operating System
Systems Programming The Unix/Linux Operating System 1 What is UNIX? A modern computer operating system Operating system: a program that acts as an intermediary between a user of the computer and the computer
More information