The document provides steps to install Ubuntu server in a VMware virtual machine, including:
1. Creating a new virtual machine in VMware Workstation and selecting Ubuntu as the guest operating system.
2. Configuring options like the virtual disk size, network settings, and language before installing Ubuntu.
3. Installing common server packages like OpenSSH, LAMP, and Samba after Ubuntu installation is complete.
Basic Security
@ Updates
-Update manager
-Enable automatic security updates(Update Setting)
=> Super windows => type the key word (System Setting) =>
@ Firewall
-In Ubuntu all ports are block by default
-Default firewall-ufw (turned off by default)
+sudo ufw status
+sudo ufw enable/disable
-Firestarter for graphical interface (recommanded)
+sudo apt-get install firestarter
+Preferences
@ User Accounts
-User & Groups
+Disable user guest
-Do not use root user (Disable by default)
+sudo passwd
+sudo passwd -l root (disable/changed expiry password)
-Use sudo instead of root (/etc/sudoers)
+sudo visudo OR sudo gedit /etc/sudoers(To set the privilege user authorized)
+sudo adduser tolaleng sudo
-Deleting Users
+sudo deluser canamall
-Removing world readable permission to home directory
+sudo chmod 0750 /home/username
-Locking/Unlocking user
+sudo passwd -l username (enable user expiry)
+sudo passwd -u username (disable user expiry)
-passwords
+sudo chage canamall (Set the password expiration)
+sudo chage-l canamall (show the password expiration)
@ Antivirus
-Clam TK (Under Accessories), other anti-virus
@ Unistall Applications
-Ubuntu Software Center-> Installed software section-> Select application and click remove
@ Processes
-To see processes
+ps aux or top
+system monitor(cacti, nagios,)
-
@ Logs
-Some of logs
+ /var/log/messages : general log messages
+ /var/log/boot : system boot log
+ /var/log/debug/ : debugging log messages
+ /var/log/auth.log : user login and authentication logs
+ /var/log/daemon.log : running services such as squid,ntpd and other log message to this file
+ /var/log/kern.log : kernel log file
-Viewing logs
+ tail, more, cat, less, grep
+ GNOME system log viewer
@Firewall
ufw
=> Security Host
* Create Standard User and enable user passwd (complexity password, strong passwd, passwd expired, invalid day of passwd, Lock and Unlock user, disable user Guest, )
* Secure remote network and host
-Telnet(Secure with the host and address connection)
-SSH (Secure with the authentication encryption key)
=> Security Backup (Data Hosting)
*Make a Full Backup of Your Machine
-Aptik (backup application)
-rsync (Remote synce)
-Gsync (Remote)
-Amanda
-Rsnapshot
Adam Polak: Websockety już na stałe zagościły w naszych systemach. Jeżeli gdzieś widzimy frazę “real-time app” to od razu wiemy, że prawdopodobnie mamy do czynienia z tym typem komunikacji. Tym razem, wspólnie przejdziemy przez wszystkie aspekty tworzenia aplikacji czasu rzeczywistego w JS. Będzie o tym jak zacząć, na co zwrócić uwagę oraz w jaki sposób skalować aplikacje tego typu.
Basic Security
@ Updates
-Update manager
-Enable automatic security updates(Update Setting)
=> Super windows => type the key word (System Setting) =>
@ Firewall
-In Ubuntu all ports are block by default
-Default firewall-ufw (turned off by default)
+sudo ufw status
+sudo ufw enable/disable
-Firestarter for graphical interface (recommanded)
+sudo apt-get install firestarter
+Preferences
@ User Accounts
-User & Groups
+Disable user guest
-Do not use root user (Disable by default)
+sudo passwd
+sudo passwd -l root (disable/changed expiry password)
-Use sudo instead of root (/etc/sudoers)
+sudo visudo OR sudo gedit /etc/sudoers(To set the privilege user authorized)
+sudo adduser tolaleng sudo
-Deleting Users
+sudo deluser canamall
-Removing world readable permission to home directory
+sudo chmod 0750 /home/username
-Locking/Unlocking user
+sudo passwd -l username (enable user expiry)
+sudo passwd -u username (disable user expiry)
-passwords
+sudo chage canamall (Set the password expiration)
+sudo chage-l canamall (show the password expiration)
@ Antivirus
-Clam TK (Under Accessories), other anti-virus
@ Unistall Applications
-Ubuntu Software Center-> Installed software section-> Select application and click remove
@ Processes
-To see processes
+ps aux or top
+system monitor(cacti, nagios,)
-
@ Logs
-Some of logs
+ /var/log/messages : general log messages
+ /var/log/boot : system boot log
+ /var/log/debug/ : debugging log messages
+ /var/log/auth.log : user login and authentication logs
+ /var/log/daemon.log : running services such as squid,ntpd and other log message to this file
+ /var/log/kern.log : kernel log file
-Viewing logs
+ tail, more, cat, less, grep
+ GNOME system log viewer
@Firewall
ufw
=> Security Host
* Create Standard User and enable user passwd (complexity password, strong passwd, passwd expired, invalid day of passwd, Lock and Unlock user, disable user Guest, )
* Secure remote network and host
-Telnet(Secure with the host and address connection)
-SSH (Secure with the authentication encryption key)
=> Security Backup (Data Hosting)
*Make a Full Backup of Your Machine
-Aptik (backup application)
-rsync (Remote synce)
-Gsync (Remote)
-Amanda
-Rsnapshot
Adam Polak: Websockety już na stałe zagościły w naszych systemach. Jeżeli gdzieś widzimy frazę “real-time app” to od razu wiemy, że prawdopodobnie mamy do czynienia z tym typem komunikacji. Tym razem, wspólnie przejdziemy przez wszystkie aspekty tworzenia aplikacji czasu rzeczywistego w JS. Będzie o tym jak zacząć, na co zwrócić uwagę oraz w jaki sposób skalować aplikacje tego typu.
Apresentação realizada pelo Bernardo Rodrigues aka bernardomr durante a 2a.edição da Nullbyte Securite Conference em 21/11/2015.
Resumo:
A tecnologia de de Internet à Cabo evoluiu consideravelmente nos últimos anos, trazendo novos desafios de segurança. A transição para o DOCSIS 3.0 introduziu equipamentos mais modernos, com maior capacidade e novas funcionalidades. Os clientes acessam a Internet com "caixas pretas" e confiam que os fabricantes e provedores vão mantê-los seguros. A ideia da palestra é discutir a segurança dos modems a cabo, assim como a tecnologia de gerência dos dispositivos, transporte das informações e atualizações de firmware.
Setup ephemeral password for TURN, Learn RTC in less than 200 Lines of codeAmitesh Madhur
TURN is used for relaying data from source to target. TURN consumes bandwidh and it is expensive.
Therefore there is a need for authorizing the TURN connection. However given that the connection is made from a client using javascript, use of a static username/password can be easily compromised.
Ephemeral password comes to the rescue here.
Learn WebRTC in 200 Line of code:
You will need a lot of patience going through libraries that are present today simply because they have thousands of line of code. So I will highly encourage you all to refer the source code located here: github.com/amiteshawa/learn-rtc
Openstack 3 node setup using RDO on top of RHEL 7.
Complete steps which will give you more convenience to work on top of Openstack without any installation issues.
A presentation about how to make MySQL highly available, presented at the San Francisco MySQL Meetup (http://www.sfmysql.org/events/15760472/) on January 26th, 2011.
A video recording of this presentation is available from Ustream: http://ustre.am/fyLk
oracle enterprise manager training | oracle enterprise manager course | orac...Nancy Thomas
Website : http://www.todaycourses.com
Oracle Enterprise Manager Online Training Concepts :
Introduction
Understanding what today’s Data Center looks like
Explaining Enterprise Manager
Explaining how to use Enterprise Manager in business driven IT management
Discussing key features of Enterprise Manager
Describing Enterprise Manager capabilities to manage the complete enterprise application stack
Discussing Management Plug-ins and Connectors available for Enterprise Manager
Enterprise Manager Architecture
Describing the components of Enterprise Manager
Explaining the architecture of Enterprise Manager
Describing the target types managed by Enterprise Manager
Explaining the Enterprise Manager Console pages and its functionalities
Discussing the application of the Maximum Availability Architecture to a Enterprise Manager environment
oracle enterprise manager training, oracle enterprise manager training course, oracle enterprise manager training 11g, oracle enterprise manager 12c training, oracle enterprise manager 10g training, oracle enterprise manager free training, oracle enterprise manager online training, oracle enterprise asset management training, oracle enterprise manager ops center training, oracle enterprise manager grid control training
Apresentação realizada pelo Bernardo Rodrigues aka bernardomr durante a 2a.edição da Nullbyte Securite Conference em 21/11/2015.
Resumo:
A tecnologia de de Internet à Cabo evoluiu consideravelmente nos últimos anos, trazendo novos desafios de segurança. A transição para o DOCSIS 3.0 introduziu equipamentos mais modernos, com maior capacidade e novas funcionalidades. Os clientes acessam a Internet com "caixas pretas" e confiam que os fabricantes e provedores vão mantê-los seguros. A ideia da palestra é discutir a segurança dos modems a cabo, assim como a tecnologia de gerência dos dispositivos, transporte das informações e atualizações de firmware.
Setup ephemeral password for TURN, Learn RTC in less than 200 Lines of codeAmitesh Madhur
TURN is used for relaying data from source to target. TURN consumes bandwidh and it is expensive.
Therefore there is a need for authorizing the TURN connection. However given that the connection is made from a client using javascript, use of a static username/password can be easily compromised.
Ephemeral password comes to the rescue here.
Learn WebRTC in 200 Line of code:
You will need a lot of patience going through libraries that are present today simply because they have thousands of line of code. So I will highly encourage you all to refer the source code located here: github.com/amiteshawa/learn-rtc
Openstack 3 node setup using RDO on top of RHEL 7.
Complete steps which will give you more convenience to work on top of Openstack without any installation issues.
A presentation about how to make MySQL highly available, presented at the San Francisco MySQL Meetup (http://www.sfmysql.org/events/15760472/) on January 26th, 2011.
A video recording of this presentation is available from Ustream: http://ustre.am/fyLk
oracle enterprise manager training | oracle enterprise manager course | orac...Nancy Thomas
Website : http://www.todaycourses.com
Oracle Enterprise Manager Online Training Concepts :
Introduction
Understanding what today’s Data Center looks like
Explaining Enterprise Manager
Explaining how to use Enterprise Manager in business driven IT management
Discussing key features of Enterprise Manager
Describing Enterprise Manager capabilities to manage the complete enterprise application stack
Discussing Management Plug-ins and Connectors available for Enterprise Manager
Enterprise Manager Architecture
Describing the components of Enterprise Manager
Explaining the architecture of Enterprise Manager
Describing the target types managed by Enterprise Manager
Explaining the Enterprise Manager Console pages and its functionalities
Discussing the application of the Maximum Availability Architecture to a Enterprise Manager environment
oracle enterprise manager training, oracle enterprise manager training course, oracle enterprise manager training 11g, oracle enterprise manager 12c training, oracle enterprise manager 10g training, oracle enterprise manager free training, oracle enterprise manager online training, oracle enterprise asset management training, oracle enterprise manager ops center training, oracle enterprise manager grid control training
برد هوشمند جهت استفاده در کلاسهای آموزشی و سالنهای کنفرانس می باشد. این وایت برد الکترونیکی جایگزین مناسبی جهت تخته وایت بردهای معمولی است. استفاده از این وایت بردهوشمند در کلاسها و سالنها ،امکان نمایش مطالب بصورت کاملا" پویا را برای کاربر مهیا می نماید. استفاده از وایت برد هوشمند که با عناوین دیگری نظیر برد الکترونیکی یا اسمارت برد نیز شناخته می شود ، در بسیاری از مراکز آموزشی و دانشگاهی و نیز اتاقهای جلسات و کنفرانس رایج گردیده است . وایت برد هوشمند با قرار گرفتن در کنار تجهیزاتی نظیر ویدئو پروژکتور و ویژوالایزر میتواند سیستم کمک آموزشی بسیار کار آمدی را در اختیار کاربر قرار دهد .وایت برد هوشمند علاوه بر بخش سخت افزاری که از یک سطح الکترونیکی (مجموعه ای از سنسور های لمسی) تشکیل شده است دارای یک هسته ی نرم افزاری اصلی نیز می باشد که اغلب قابلیت ها و ویژگیهای منحصر به فرد برد را پشتیبانی می کند . نرم افزار وایت برد هوشمند ضمن رعایت اصول سهولت کاربری ، محیطی مناسب جهت تدریس ، سمینار و حتی جلسات عملیاتی را فراهم می نماید .
-قابلیت ذخیره مطالب نوشته شده،در کامپیوتر و چاپ آن توسط پرینتر
-مجهز به تکنولوژی صفحه سخت و مقاوم در برابر ضربه و خش
-دارای نرم افزار بسیار ساده
-در دو نوع حساس به تماس دست و حساس به قلم
رایانش ابری یک مدل معماری برای گسترش و دسترسی به امکانات رایانه از طریق خطوط اینترنت است. یک سرویس دهنده ی ابری قادر است دسترسی همه جایی به سرویس های نرم افزاری که در مرکز داده ابری اجرا می شوند، را از طریق مرورگرهای اینترنتی عرضه کند. این نرم افزار نیاز های مصرف کنندگان و کسب و کار ها را تامین خواهد کرد“
Oracle DataGuard Online Training in USA | INDIAXoom Trainings
Xoom Trainings providing Best Oracle DataGuard Online Training with complete tutorial by 10 years experienced professionals worldwide
For More online training Demo Please Reach the below link:
https://www.youtube.com/watch?v=2zXZPh4agwE
For More Information please follow the below link:
http://www.xoomtrainings.com/course/oracle-dataguard
For General Queries Email us at sales@xoomtrainings.com or +1-610-686-8077
Final ProjectFinal Project Details Description Given a spec.docxAKHIL969626
Final Project
Final Project Details:
Description: Given a specific scenario, create an appropriate IP addressing scheme, document a given network by creating a logical network diagram and create the appropriate access lists for use on the routers. Deliverables:
· Demonstrate the theory and practice of Cisco networking, routing, and switching strategies as outlined in the Cisco CCENT Certification exam
Prior to implementing any design we need to first write-up our proposed network design on paper. With that in mind, we begin by performing a network discovery. Once we have identified all the network devices and the needs of the organization, we can document the TCP/IP information that is needed for our design. In this exercise you will determine the subnet information for each department and assign IP addresses for the network devices.
You have been assigned as a networking tech for a new client, AAA Fabricating. The network is configured with a Class C network and the current allocation of IP addresses has been depleted. You have been tasked to reconfigure the network with a Class B address and assign a subnet to each of the 10 departments and the three routers.
Your network audit consists of the following information:
AAA Fabrication consists of 10 departments spread across three buildings.
Each building is connected using three Cisco 2800 Series routers. The three routers are located in the MIS wiring closet in Building 2.
Each department has its own Cisco 2950 switch.
There are at least two workstations in each department.
The company plans to use a class B address range starting at 172.16.0.0.
Each department must be assigned a subnet. Subnets should be designed to allow for the maximum number of hosts on each department subnet using classful subnetting.
The company also wants the three routers to communicate on the minimum quantity of IP addresses using three subnets.
Building 1
Subnet
Department
Subnet ID
Host ID Range
Broadcast Address
0
Warehouse
1
Receiving
2
shipping
3
Maintenance
Building 2
Subnet
Department
Subnet ID
Host ID Range
Broadcast Address
4
Accounting
5
Human Resources
6
Payroll
7
MIS
8
Employee Training
Building 3
Subnet
Department
Subnet ID
Host ID Range
Broadcast Address
9
R&D
10
Marketing
Routers
Building 1
Ethernet and Serial Interfaces
IP Address
Subnet Mask
Router
Fast Ethernet 0/0
Building 1
Serial 0/0
To Building 2
Serial 0/1
To Building 3
Building 2
Ethernet and Serial Interfaces
IP Address
Subnet Mask
Router
Fast Ethernet 0/0
Building 2
Serial 0/0
To Building 1
Serial 0/1
To building 3
Building 3
Ethernet and Serial Interfaces
IP Address
Subnet Mask
Router
Fast Ethernet 0/0
Building 3
Serial 0/0
To Building 1
Serial 0/1
To Building 2
Part 2
Create a logical Network Diagram
Logical Network topology represents a high level overview of the signal topology of the network. Every LAN has two different topologies, or the way that the devices on a networ ...
The shift to cloud computing means that organizations are undergoing a major shift as they develop scale-out infrastructure that can respond to apace of business change faster than ever before. Opscode Chef® is an open-source systems integration framework build specifically for
automating the cloud by making it easy to deploy and scale servers and applications throughout your infrastructure. Join us for this session
containing an introduction to Chef including:
An Overview of Chef
The Chef Architecture
Cookbook Components
System Integration
Live demo launching a Java Stack on Amazon EC2, Rackspace, Ubuntu, and
CentOS
[Presented as part of the Open Source Build a Cloud program on 2/29/2012 - http://cloudstack.org/about-cloudstack/cloudstack-events.html?categoryid=6]
While probably the most prominent, Docker is not the only tool for building and managing containers. Originally meant to be a "chroot on steroids" to help debug systemd, systemd-nspawn provides a fairly uncomplicated approach to work with containers. Being part of systemd, it is available on most recent distributions out-of-the-box and requires no additional dependencies.
This deck will introduce a few concepts involved in containers and will guide you through the steps of building a container from scratch. The payload will be a simple service, which will be automatically activated by systemd when the first request arrives.
Getting Started
This guide will help you deploy a Cloudtenna DirectShare virtual appliance (VA) using VMware ESXi.
Assumptions
• It is assumed that the reader has a working knowledge of VMware vSphere system administration,
Microsoft® Windows® desktop and server administration, SAN network design, basic Ubuntu Linux
commands and basic SAN storage operations.
• This is not a complete “how to” guide. Step by step setup is covered in part, examples of screen shots
and settings should be sufficient for the reader to apply the right changes to implement the steps outlined
in this guide.
Limitations and Other Considerations
External File Sharing and Collaboration can be setup in multiple different fashions. This solution guide will
address a specific scenario and how to build around it.
For information on how to setup a NON-PRODUCTION Windows Server 2012R2 demo environment in
conjunction with a DirectShare virtual appliance, download the “How to setup a Fresh Windows Server
for a DirectShare EasyDemo” at https://channel.ctna.co/downloads/ .
CLOUDTENNA DIRECTSHARE QUICK-START GUIDE 4
DirectShare Virtual Appliance Sizing
Optimal performance of the DirectShare VA (Virtual Appliance) is dependent on several factors. Sizing of
the VA is determined by number of concurrent users accessing files at max load.
Production sizing of compute resources should be determined by monitoring of the VA during initial usage
and onboarding of users. Although system administrators are accustomed to this best practice, more
frequent checks of resource utilization are recommended, as each environment has different success criteria
and usage, activity varies throughout different times of day, days of week, and seasonal demands on the
network may vary.
A deescalating resource monitoring check is recommended similar to this example:
Day 1+: Once every few until all users are on boarded and have successfully connected at least once.
Day 2: Twice daily.
Day 3 - 7: Once daily.
Day 8+: Notifications configured to alert administrators at 80% of vCPU and/or RAM reached.
Minimum VA resources:
• 1 vCPU, 2 GB RAM, 40 GB local volume (few users with limited file transfer requests).
• < 25 concurrent file transfers
Medium VA resources:
• 2 vCPU, 4 GB RAM, 40 GB local volume (light file transfers evenly throughout the day).
• < 75 concurrent file transfers
Large VA resources:
• 4 vCPU, 8 GB RAM, 40 GB local volume (increased file transfers at different peak times of day).
• < 150 concurrent file transfers
Maximum VA sizing:
• 8 vCPU, 16 GB RAM, 40 GB local volume (heavy concurrent file transfers all day long).
• <= 300 concurrent file transfers
The above-recommended resource allocations are for a single DirectShare VA. Local volume size
of 40 GB may be increased to accommodate longer audit log retention requirements, but not
required for performance.
Toradex's latest blog post written by Leonardo Graboski Veiga, FAE, Toradex Brasil, shows you how to provision an Ubuntu Server 16.04 LTS virtual machine in Microsoft Azure, and use Yocto/OpenEmbedded to generate an embedded Linux image. Read on here: https://www.toradex.com/blog/cloud-aided-yocto-build-speedup
Keeping DNS server up-and-running with “runitMen and Mice
A traditional Unix/Linux init system like SystemV-Init or BSD rc does start a DNS server process on server boot, but it does not restart the service in case of an abnormal termination. Modern init replacements like systemd provide process supervision, but bring extra complexities and possible stability and security issues.
This webinar demonstrates an alternative, open source process supervision system called “runit”.
“runit” is lean and fast and sticks to the Unix tradition to do one thing, and do that right.
In this webinar you will learn how to manage DNS server processes such as BIND 9, Unbound and NSD from runit.
Drupal Continuous Integration with Jenkins - The BasicsJohn Smith
Please check out our new SlideShow of setting up and configuring a Jenkins Continuous Integration server for use within a Drupal development environment. We walk you through the steps of installing Ubuntu 10.04 LTS, Jenkins, Drush and several other PHP coding tools and Drupal Modules to help check your code against current Drupal standards. Then we walk you through creating a git post-receive script, and Jenkins job to pull it all together.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
2. Instala Ubuntu server iha vmware
Workstation
Husi Start Menu loke
aplikasaun Vmware
workstation
1
2Dillak@ CS2003 IT Outsourcing
3. Kria Virtual machine hodi
instala ubuntu
Husi menu File, hili opsaun
New Virtual Machine hodi kria
makina virtual foun ba
servedor Ubuntu
2
3
4
3Dillak@ CS2003 IT Outsourcing
4. Opsaun hodi detemina media
instalasaun ba makina virtual
foun…
Opsaun systema operasaun
nebe prefere ba makina
virtual foun nebe atu kria
5
7
6
4Dillak@ CS2003 IT Outsourcing
5. Opsaun ba naran no fatin husi
makina virtaul nebe refere
Opsaun kapasidade disco ka
HDD nebe aloka makina
virtual
9
8 10
11
5Dillak@ CS2003 IT Outsourcing
6. Karik iha mudansa ruma kona
ba makina virtual, bele
kostumiza ho opsaun ida nee.
Exemplu kostumiza virtual
Network card ( iha modelu
bridged, Nat no host-only)
12
13
14
6Dillak@ CS2003 IT Outsourcing
7. Karik laiha kostumizasaun
ruma bele remata prosesu
kria makina virtual ho butaun
Finish
Informasaun husi Makina virtual
nebe ita kria ona maibe sedauk
iha sistema operasaun ruma,
husi opsaun CD/DVD ita bele hili
cd/dvd OS nebe atu insatala ba
makina virtual ida nee.
15
7Dillak@ CS2003 IT Outsourcing
8. 16
17
8Dillak@ CS2003 IT Outsourcing
Exemplu iha ita determina media
instalasaun ita foti husi opsaun Use
ISO image File, no ita determina
fatin husi media instalasaun ne rasik
husi butaun Browse, keta haluha hili
opsaun connect at power on no
remata ho butaun OK
9. Waihira konfigurasaun ba media
instalasaun ne remata ita bele
hamoris ita nia makina virtual ho
opsaun power on this virtual
machine
Prosesu welcome screen ba
instalasaun ubuntu server sei
mosu no ita bele kontinua
prosesu instalasaun ho nia
opsaun horak mai nee…
18
9Dillak@ CS2003 IT Outsourcing
10. Prosesu welcome screen ba
instalasaun ubuntu server
Opsaun Lingua atu uja ba
prosesu instalasaun..
10Dillak@ CS2003 IT Outsourcing
11. Opsaun husi zona ba tempu
Modelu husi lingau nebe ita
hili ona iha etapa opsaun
lingua iha leten..
11Dillak@ CS2003 IT Outsourcing
12. Opsaun modelu keyboard nebe ita
prefere, iha nee ita hili English US
ba Country no layout
12Dillak@ CS2003 IT Outsourcing
13. 13Dillak@ CS2003 IT Outsourcing
• Opsaun ba
Hostname
• kria user
foun ba ita
nia
servedor
ubuntu ida
nee
14. 14Dillak@ CS2003 IT Outsourcing
• Fo Password ba
user nebe foin
kria
• opsaun atu
bele encrypt ita
nia home
directory husi
user sira iha iha
ita nia makina
idanee, iha
exemplu nee ita
lakoi atu
encrypt
15. 15Dillak@ CS2003 IT Outsourcing
• Opsaun ba
partisi husi ita
nia HDD, iha
metodu hat
nebe ita bele
hili, iha exemplu
ne ida uja
opsaun
premeiru..
16. 16Dillak@ CS2003 IT Outsourcing
• Opsaun hodi
determina HDD nebe
atu uja ba
instalasaun Sistema
operasaun ubuntu
nee,
• Systema sei halo
partisi ba HDD nebe
ida hili ona ba
partisun 2, ext4 no
swap, wainhira
konkorda ho
konfigurasaun ne’e
hili YES hodi aplika
no kontinua
17. 17Dillak@ CS2003 IT Outsourcing
• Opsaun ba
Proxy karik iha,
no opsaun
prosesu update
wainhira iha
ligasaun ho
Internet
18. 18Dillak@ CS2003 IT Outsourcing
Opsaun sistema saida maka saida maka ita prefere atu
instala ba Ubuntu ,iha simulasaun ida nee ita presija
instala OpenSSH server, LAMP server no Samba file
Server
19. 19Dillak@ CS2003 IT Outsourcing
Determina no foo password ba MYSQL root User
* Password ida nee uja hodi maneija base de dadus MYSQL
20. 20Dillak@ CS2003 IT Outsourcing
Informasaun Katak instalasaun ba ubuntu server ramata,
continua hodi login
21. 21Dillak@ CS2003 IT Outsourcing
Login uja User nebe ita
kria ona iha etapa
instalasaun
* Laos uja password ba mysql user
nian
22. Konfigura Network iha Ubuntu
Login ba ubuntu nudar root (ho
command sudo su) hodi Konfigura
static IP address ba ubuntu,
sekarik iha ligasaun internet, bele
koko ping ba internet (bele koko
ping ba google.com)
22Dillak@ CS2003 IT Outsourcing
23. Teste ba web
server
Se karik konfigurasun
Network loos no lao
diak, ita bele koko
asesu servedor WEB
husi Internet Browser
ho asesu dereita ba
IP ita nia servedor
Karik mosu haresan
figura iha sorin karak
ita nia web server lao
ho diak no prontu
ona.
23Dillak@ CS2003 IT Outsourcing
25. Preense MYSQL
Password root
Wainhira istalasaun ba
phpmyadmin systema
sei husu password ba
user root MYSQL nian
nebe ita kria ona iha
etapa instalasaun
LAMP.iha figura
segundu determina
password hodi login
ba phpmyadmin
*user login ba ubuntu,mysql
no phpmyadmin bele uja
password nebe ketak-ketak
25Dillak@ CS2003 IT Outsourcing
26. Koko
Phpmyadmin
Istalasaun ramata , koko
hodi asesu ba phpmyadmin
no inderesu :
http:// IP server/phpmyadmin
exp:
http://192.168.10.18/phpmyadmin
26Dillak@ CS2003 IT Outsourcing
27. Instala
WEBMIN
Amenta source list webmin
sudo vi /etc/apt/sources.list
Hatama lista ida nee iha linya okos
liu
deb
http://download.webmin.com/downloa
d/repository sarge contrib
Exekuta command:
wget -q
http://www.webmin.com/jcameron-
key.asc -O- | sudo apt-key add –
sudo apt-get update
sudo apt-get install webmin
27Dillak@ CS2003 IT Outsourcing
28. Koko
WEBMIN
Koko asesu ba webmin
ho inderesu:
https://ip server:port ba webmin
Exp:
https://192.168.10.18:10000
Depois login uja user
ubuntu nian
28Dillak@ CS2003 IT Outsourcing
32. Mount Windows
Share drive /folder ba
Linux
Koko mount share
drive ida husi
kompudor windows
nebe iha ligasaun
network ho servedor
ubuntu ida nee, logi
ba webmin, husi menu
system, Disk and
network file system,
hili opsaun add mount
, no hili common
internet file system
(cfs)
1
2
4
5
3
32Dillak@ CS2003 IT Outsourcing
33. 7
7
9
10 11
12
33Dillak@ CS2003 IT Outsourcing
Fatin no Naran
ba mount point
iha linux
Naran share drive
iha komputador
10.69
IP ka hostname
husi komputador
share drive nian
Password husi
komputdar
10.69
Naran User nebe
login no fo share
iha komputador
10.69
Aplika prosesu kria
mount poin ba share
drive iha linux uja
webmin
34. Asesu no konfigura
ba subsonic
• Asesu ba subsonic husi web
browser ho inderesu : http://IP
server:4040
• Login ba subsonic ho defaul user
name no password Admin
• Husi menu Settings ba opsaun
Media folder iha opsaun name
foo naran ba media folder nebe
kria,
• Iha opsaun Folder ita preense ho
fatin no naran husi folder nebe
ita tau nia file multimedia sira
hodi bele asesu husi subsonic,
(exemplu iha ne katak ita mount
ona ita nia folder multimedia dira
iha directory /mnt/music) tuir ho
activu tia opsaun enable no fast
access mode , remata ho butaun
Save hodi aplika konfigurasaun
34Dillak@ CS2003 IT Outsourcing
2
1
3
4
65