This document discusses automating system administration tasks through shell scripting. It begins by outlining common tasks that can be automated, such as installing patches, managing accounts and configuration files. It then covers tools for automation like cron, find, and rdist. The rest of the document discusses different methods for distributing system information, such as the push and pull methods, and provides examples of rdist and package files used for automation.
This document provides an overview of formatting and editing features in Microsoft Excel, including how to format values, change fonts and formatting, adjust columns and rows, apply colors and borders, use conditional formatting, name and move sheets, and check spelling. The objectives are covered in multiple sections with descriptions and screenshots illustrating each task.
This document discusses serial ports and their management. Serial ports are universal I/O ports that can connect terminals, printers, modems and other devices. The most common standard is RS-232, which defines pinouts and voltage levels. Serial port configuration involves setting parameters like baud rate, parity and stop bits. Management involves starting processes like getty on ports to allow logins and monitoring modem connections. Solaris uses the Service Access Facility (SAF) to configure ports and monitors like ttymon that direct data to ports.
This document provides an overview of various networking hardware components, including their functions and how they operate at different layers of the OSI model. It describes network adapters, repeaters, hubs, bridges, switches, routers, and gateways. It covers topics such as installing and configuring network adapters, choosing the right adapter, VLANs, and common routing protocols.
World War II involved major battles in the European Theater between November 1942 and May 1945. Allied forces led by generals Montgomery, Clark, Alexander, Patton, Bradley, and Devers fought against Axis forces in campaigns across Western, Central, and Eastern areas of engagement. Through coordinated operations between multiple army groups consisting of airborne, armored, and infantry divisions, the Allies were ultimately able to defeat Nazi Germany.
This document discusses the benefits of reciting Aayathul Qursi. It states that reciting it when leaving the house will result in 70,000 angels protecting from all sides. Reciting it 40 times daily at sunset earns the reward of 40 Hajj pilgrimages. Reciting it before bed will result in an angel guarding the person until morning. Reciting it after returning home and after ablution increases a person's rank with every word. Sharing it with others also provides reward from God.
Indian soldiers who were wounded fighting in World War 1 on the Western Front were sent to England for treatment. Many towns on the south coast of England, including Brighton, Bournemouth, Brockenhurst and New Milton helped care for the large numbers of wounded Indian soldiers. It is estimated that over 64,000 Indian soldiers died or went missing and more than 65,000 were wounded by the end of the war.
The document discusses system security and provides seven common sense rules for security. It covers account security, file permissions, data encryption, single user security, dialup modems, security tools, and an overview of viruses, trojans, and worms. Monitoring logs, using security scanning tools, and educating yourself on security best practices are emphasized as important ways to help secure systems.
This document discusses automating system administration tasks through shell scripting. It begins by outlining common tasks that can be automated, such as installing patches, managing accounts and configuration files. It then covers tools for automation like cron, find, and rdist. The rest of the document discusses different methods for distributing system information, such as the push and pull methods, and provides examples of rdist and package files used for automation.
This document provides an overview of formatting and editing features in Microsoft Excel, including how to format values, change fonts and formatting, adjust columns and rows, apply colors and borders, use conditional formatting, name and move sheets, and check spelling. The objectives are covered in multiple sections with descriptions and screenshots illustrating each task.
This document discusses serial ports and their management. Serial ports are universal I/O ports that can connect terminals, printers, modems and other devices. The most common standard is RS-232, which defines pinouts and voltage levels. Serial port configuration involves setting parameters like baud rate, parity and stop bits. Management involves starting processes like getty on ports to allow logins and monitoring modem connections. Solaris uses the Service Access Facility (SAF) to configure ports and monitors like ttymon that direct data to ports.
This document provides an overview of various networking hardware components, including their functions and how they operate at different layers of the OSI model. It describes network adapters, repeaters, hubs, bridges, switches, routers, and gateways. It covers topics such as installing and configuring network adapters, choosing the right adapter, VLANs, and common routing protocols.
World War II involved major battles in the European Theater between November 1942 and May 1945. Allied forces led by generals Montgomery, Clark, Alexander, Patton, Bradley, and Devers fought against Axis forces in campaigns across Western, Central, and Eastern areas of engagement. Through coordinated operations between multiple army groups consisting of airborne, armored, and infantry divisions, the Allies were ultimately able to defeat Nazi Germany.
This document discusses the benefits of reciting Aayathul Qursi. It states that reciting it when leaving the house will result in 70,000 angels protecting from all sides. Reciting it 40 times daily at sunset earns the reward of 40 Hajj pilgrimages. Reciting it before bed will result in an angel guarding the person until morning. Reciting it after returning home and after ablution increases a person's rank with every word. Sharing it with others also provides reward from God.
Indian soldiers who were wounded fighting in World War 1 on the Western Front were sent to England for treatment. Many towns on the south coast of England, including Brighton, Bournemouth, Brockenhurst and New Milton helped care for the large numbers of wounded Indian soldiers. It is estimated that over 64,000 Indian soldiers died or went missing and more than 65,000 were wounded by the end of the war.
The document discusses system security and provides seven common sense rules for security. It covers account security, file permissions, data encryption, single user security, dialup modems, security tools, and an overview of viruses, trojans, and worms. Monitoring logs, using security scanning tools, and educating yourself on security best practices are emphasized as important ways to help secure systems.
The document discusses the benefits of meditation for reducing stress and anxiety. Regular meditation practice can help calm the mind and body by lowering heart rate and blood pressure. Studies have shown that meditating for just 10-20 minutes per day can have significant positive impacts on both mental and physical health.
1) Salat Tasbeeh is a four rakat prayer where in each posture of the rakat (standing, bowing, prostrating, sitting), the phrase "Subhan Allah-e-Wal Hamd-o-lillah-e-Wala-Ilaha -Ilallaho-Wallaho-Akbar" is uttered a specified number of times.
2) In each rakat, the phrase must be uttered 75 times total across the seven postures - with 15 times while standing after recitation, 10 times while bowing, 10 times in each prostration, and 10 times while sitting between prostrations.
3) The specified numbers of times the phrase
The document discusses disk drives and file systems. It provides an overview of disk components like platters, heads, and sectors. It explains disk geometry including cylinders, tracks, and how addressing schemes allow unique identification of each sector. Different disk interfaces like SCSI, IDE, and Fibre Channel are covered. The document also discusses disk formatting, partitioning, and techniques for optimizing performance like load balancing and RAID.
The document discusses reasons why the Prophet Muhammad had multiple wives. It states that he had 12 wives total, with 10 being with him when he passed away. It argues that lust was not the reason, pointing out that he married his first wife Khadijah at age 25 and stayed with her alone for 25 years until her death when he was 52. It says the marriages were for political, social and religious reasons like spreading Islamic culture, strengthening bonds with companions, and having ties with other nations.
This document takes the reader on a trip through scales of size from micro to macro, jumping distances by factors of 10. It starts at 1 meter and increases the scale up to 10 million light years, observing different objects that come into view like planets, galaxies, and nebulae. It then returns back down to the micro scale, decreasing distances by factors of 10 until it reaches the scale of femtometers, observing subatomic particles. The document emphasizes the constancy of natural laws across all scales and encourages contemplating humanity's place in the vast universe.
This document defines operating system concepts and terminology, and explores the history of operating systems. It discusses early and modern operating systems, distinguishing features like resource sharing, storage access control, and memory protection. The document also covers UNIX and Windows architecture, hardware considerations, and the development history of UNIX, Windows, and Mac OS to provide context for system administration tasks.
The document discusses managing files and directories in Linux/Unix systems. It covers topics such as using directories to organize files, listing and accessing files in directories, creating and removing directories, using pathnames to navigate between directories, and managing files located in multiple directories.
1) A liter of water contains enough mass to produce 9 x 1016 Joules of energy if converted entirely, which could power a 1 Watt lightbulb for around 3 billion years.
2) The sun produces its energy through nuclear fusion, where hydrogen nuclei fuse into helium. A little bit of mass is lost in this process, appearing as energy according to E=mc2.
3) Scientists are trying to create controlled nuclear fusion on Earth for a sustainable energy source, but it requires maintaining temperatures over 15 million degrees, which is technically challenging.
This document provides a high-level overview of the shuttle processing steps before flight, including:
1) The external tank arrives by barge and is moved to the Vertical Assembly Building (VAB) for preparation.
2) Solid rocket boosters and shuttle engines are attached to the external tank in the VAB.
3) The shuttle is then lifted and attached to the external tank.
4) The payload is prepared separately in the Payload Preparation Room and then transported to the launch pad for insertion into the shuttle.
This document provides guidance on securing Solaris servers through hardening and configuration best practices. It recommends removing unnecessary software and services, enabling detailed system logging, installing the latest security patches regularly, and configuring services like sendmail securely based on checklists from SANS and CIS. Key steps include a minimal OS installation, removing unneeded packages and services, setting secure permissions and logging levels, and installing tools like Tripwire and SSH.
The document provides a history of the internet and explains how it works and some common tools used on it. It began as a US military network called ARPANET and later expanded. The Domain Name System translates website names to IP addresses. Web browsers allow viewing web pages while email and listservs allow communication. Search engines and portals help users find information and HTML defines webpage formatting.
1. Project management is important for network implementation projects and involves determining feasibility, assessing needs, setting goals, planning tasks and timelines, managing communication, and contingency planning.
2. Network management includes monitoring performance and faults, tracking assets, and regularly maintaining and upgrading both hardware and software.
3. Careful planning is required for any network changes, including software updates, client and server upgrades, and adding or replacing physical equipment. Changes must be thoroughly tested and plans should allow for reverting changes if needed.
This document summarizes security risks and mitigation techniques for computer networks. It discusses risks associated with people, transmission, hardware, protocols, software, and internet access. It also outlines the goals of an effective security policy and describes physical security, firewalls, proxy servers, remote access, network operating system security, encryption, and wireless security. Key risks include social engineering, unauthorized access, transmission interception, insecure protocols, denial-of-service attacks, and improper firewall/remote access configurations. The chapter recommends conducting security audits, restricting physical access, using firewalls/proxy servers for access control, enforcing secure authentication/access, and encrypting sensitive data and wireless transmissions.
The document discusses ensuring integrity and availability in networks. It covers viruses, fault tolerance techniques like redundant components and UPS systems, data backup strategies, and disaster recovery plans. Integrity ensures the soundness of network programs, data, services and connections, while availability refers to consistent access. General guidelines include limiting administrator access and regularly monitoring performance.
The document discusses a methodology for effectively troubleshooting networking problems which includes identifying symptoms, determining the scope of the problem, establishing what has changed, selecting the most probable cause, verifying physical and logical connectivity, recognizing potential solution effects, implementing and testing a solution, and documenting the problem and resolution. It also discusses various software and hardware tools that can be used to diagnose networking issues, including cable testers, network monitors, protocol analyzers, and wireless network testing tools.
This chapter discusses TCP/IP network design including subnetting, CIDR, and NAT. It describes protocols for email delivery and access like SMTP, POP, and IMAP. It also explains using TCP/IP networks for voice transmission (VoIP) and provides details on TCP/IP utilities like netstat, nslookup, traceroute, and ifconfig that can be used for network discovery and troubleshooting.
The document discusses NetWare, a network operating system developed by Novell. It provides an overview of NetWare's history and versions. The key advantages of NetWare include centralized management, support for multiple protocols, and integration with other network operating systems. The document also describes planning and installing a NetWare server, including hardware requirements, the installation process, establishing user accounts and groups, and providing client access and interoperability with other operating systems.
This chapter discusses the history and varieties of UNIX and Linux operating systems. It describes how to install Linux, configure users and permissions, and interconnect Linux with other network operating systems using tools like Samba, WINE, VMware and Telnet. The chapter also provides examples of basic Linux commands and how to set up a Linux server with the required hardware specifications.
Chapter08 -- network operating systems and windows server 2003-based networkingRaja Waseem Akhtar
ย
This chapter discusses network operating systems and Windows Server 2003. It covers the functions of a network OS like managing resources and users. Windows Server 2003 editions are examined along with installation requirements. Features like Active Directory, file systems, and integration with other OSs are described. The chapter concludes with instructions for a basic Windows Server 2003 installation and configuration of users and groups.
The document discusses wide area networks (WANs) and remote connectivity. It defines WANs and their essential components. It describes various WAN topologies including bus, ring, star, mesh and tiered. It also discusses several WAN transmission methods like PSTN, ISDN, T-carriers, DSL, cable, and SONET. The document concludes with an overview of remote connectivity options like dial-up networking, remote control, terminal services, web portals and virtual private networks.
This document provides an overview of network topologies and access methods. It describes physical topologies like bus, ring, and star, as well as hybrid topologies like star-wired ring and star-wired bus. It also covers backbone structures, switching methods, Ethernet, Token Ring, FDDI, ATM, and wireless networking standards like 802.11a, 802.11b, and 802.11g. Key aspects like frames, association, and quality of service are discussed for different network types.
The document discusses the benefits of meditation for reducing stress and anxiety. Regular meditation practice can help calm the mind and body by lowering heart rate and blood pressure. Studies have shown that meditating for just 10-20 minutes per day can have significant positive impacts on both mental and physical health.
1) Salat Tasbeeh is a four rakat prayer where in each posture of the rakat (standing, bowing, prostrating, sitting), the phrase "Subhan Allah-e-Wal Hamd-o-lillah-e-Wala-Ilaha -Ilallaho-Wallaho-Akbar" is uttered a specified number of times.
2) In each rakat, the phrase must be uttered 75 times total across the seven postures - with 15 times while standing after recitation, 10 times while bowing, 10 times in each prostration, and 10 times while sitting between prostrations.
3) The specified numbers of times the phrase
The document discusses disk drives and file systems. It provides an overview of disk components like platters, heads, and sectors. It explains disk geometry including cylinders, tracks, and how addressing schemes allow unique identification of each sector. Different disk interfaces like SCSI, IDE, and Fibre Channel are covered. The document also discusses disk formatting, partitioning, and techniques for optimizing performance like load balancing and RAID.
The document discusses reasons why the Prophet Muhammad had multiple wives. It states that he had 12 wives total, with 10 being with him when he passed away. It argues that lust was not the reason, pointing out that he married his first wife Khadijah at age 25 and stayed with her alone for 25 years until her death when he was 52. It says the marriages were for political, social and religious reasons like spreading Islamic culture, strengthening bonds with companions, and having ties with other nations.
This document takes the reader on a trip through scales of size from micro to macro, jumping distances by factors of 10. It starts at 1 meter and increases the scale up to 10 million light years, observing different objects that come into view like planets, galaxies, and nebulae. It then returns back down to the micro scale, decreasing distances by factors of 10 until it reaches the scale of femtometers, observing subatomic particles. The document emphasizes the constancy of natural laws across all scales and encourages contemplating humanity's place in the vast universe.
This document defines operating system concepts and terminology, and explores the history of operating systems. It discusses early and modern operating systems, distinguishing features like resource sharing, storage access control, and memory protection. The document also covers UNIX and Windows architecture, hardware considerations, and the development history of UNIX, Windows, and Mac OS to provide context for system administration tasks.
The document discusses managing files and directories in Linux/Unix systems. It covers topics such as using directories to organize files, listing and accessing files in directories, creating and removing directories, using pathnames to navigate between directories, and managing files located in multiple directories.
1) A liter of water contains enough mass to produce 9 x 1016 Joules of energy if converted entirely, which could power a 1 Watt lightbulb for around 3 billion years.
2) The sun produces its energy through nuclear fusion, where hydrogen nuclei fuse into helium. A little bit of mass is lost in this process, appearing as energy according to E=mc2.
3) Scientists are trying to create controlled nuclear fusion on Earth for a sustainable energy source, but it requires maintaining temperatures over 15 million degrees, which is technically challenging.
This document provides a high-level overview of the shuttle processing steps before flight, including:
1) The external tank arrives by barge and is moved to the Vertical Assembly Building (VAB) for preparation.
2) Solid rocket boosters and shuttle engines are attached to the external tank in the VAB.
3) The shuttle is then lifted and attached to the external tank.
4) The payload is prepared separately in the Payload Preparation Room and then transported to the launch pad for insertion into the shuttle.
This document provides guidance on securing Solaris servers through hardening and configuration best practices. It recommends removing unnecessary software and services, enabling detailed system logging, installing the latest security patches regularly, and configuring services like sendmail securely based on checklists from SANS and CIS. Key steps include a minimal OS installation, removing unneeded packages and services, setting secure permissions and logging levels, and installing tools like Tripwire and SSH.
The document provides a history of the internet and explains how it works and some common tools used on it. It began as a US military network called ARPANET and later expanded. The Domain Name System translates website names to IP addresses. Web browsers allow viewing web pages while email and listservs allow communication. Search engines and portals help users find information and HTML defines webpage formatting.
1. Project management is important for network implementation projects and involves determining feasibility, assessing needs, setting goals, planning tasks and timelines, managing communication, and contingency planning.
2. Network management includes monitoring performance and faults, tracking assets, and regularly maintaining and upgrading both hardware and software.
3. Careful planning is required for any network changes, including software updates, client and server upgrades, and adding or replacing physical equipment. Changes must be thoroughly tested and plans should allow for reverting changes if needed.
This document summarizes security risks and mitigation techniques for computer networks. It discusses risks associated with people, transmission, hardware, protocols, software, and internet access. It also outlines the goals of an effective security policy and describes physical security, firewalls, proxy servers, remote access, network operating system security, encryption, and wireless security. Key risks include social engineering, unauthorized access, transmission interception, insecure protocols, denial-of-service attacks, and improper firewall/remote access configurations. The chapter recommends conducting security audits, restricting physical access, using firewalls/proxy servers for access control, enforcing secure authentication/access, and encrypting sensitive data and wireless transmissions.
The document discusses ensuring integrity and availability in networks. It covers viruses, fault tolerance techniques like redundant components and UPS systems, data backup strategies, and disaster recovery plans. Integrity ensures the soundness of network programs, data, services and connections, while availability refers to consistent access. General guidelines include limiting administrator access and regularly monitoring performance.
The document discusses a methodology for effectively troubleshooting networking problems which includes identifying symptoms, determining the scope of the problem, establishing what has changed, selecting the most probable cause, verifying physical and logical connectivity, recognizing potential solution effects, implementing and testing a solution, and documenting the problem and resolution. It also discusses various software and hardware tools that can be used to diagnose networking issues, including cable testers, network monitors, protocol analyzers, and wireless network testing tools.
This chapter discusses TCP/IP network design including subnetting, CIDR, and NAT. It describes protocols for email delivery and access like SMTP, POP, and IMAP. It also explains using TCP/IP networks for voice transmission (VoIP) and provides details on TCP/IP utilities like netstat, nslookup, traceroute, and ifconfig that can be used for network discovery and troubleshooting.
The document discusses NetWare, a network operating system developed by Novell. It provides an overview of NetWare's history and versions. The key advantages of NetWare include centralized management, support for multiple protocols, and integration with other network operating systems. The document also describes planning and installing a NetWare server, including hardware requirements, the installation process, establishing user accounts and groups, and providing client access and interoperability with other operating systems.
This chapter discusses the history and varieties of UNIX and Linux operating systems. It describes how to install Linux, configure users and permissions, and interconnect Linux with other network operating systems using tools like Samba, WINE, VMware and Telnet. The chapter also provides examples of basic Linux commands and how to set up a Linux server with the required hardware specifications.
Chapter08 -- network operating systems and windows server 2003-based networkingRaja Waseem Akhtar
ย
This chapter discusses network operating systems and Windows Server 2003. It covers the functions of a network OS like managing resources and users. Windows Server 2003 editions are examined along with installation requirements. Features like Active Directory, file systems, and integration with other OSs are described. The chapter concludes with instructions for a basic Windows Server 2003 installation and configuration of users and groups.
The document discusses wide area networks (WANs) and remote connectivity. It defines WANs and their essential components. It describes various WAN topologies including bus, ring, star, mesh and tiered. It also discusses several WAN transmission methods like PSTN, ISDN, T-carriers, DSL, cable, and SONET. The document concludes with an overview of remote connectivity options like dial-up networking, remote control, terminal services, web portals and virtual private networks.
This document provides an overview of network topologies and access methods. It describes physical topologies like bus, ring, and star, as well as hybrid topologies like star-wired ring and star-wired bus. It also covers backbone structures, switching methods, Ethernet, Token Ring, FDDI, ATM, and wireless networking standards like 802.11a, 802.11b, and 802.11g. Key aspects like frames, association, and quality of service are discussed for different network types.
The document summarizes key network protocols including TCP/IP, IPX/SPX, NetBIOS, and AppleTalk. It describes the layers of the TCP/IP protocol suite and how they correspond to the OSI model. It also discusses important TCP/IP protocols like TCP, IP, UDP, ICMP, and ARP as well as addressing schemes, dynamic host configuration protocol (DHCP), and port numbers.
This document discusses networking basics, including the two main types of networks (circuit-switched and packet-switched), how data is transmitted over networks using baseband and broadband signaling, common factors that can distort transmissions like attenuation and interference, different types of transmission media like copper cables, fiber optic, and wireless, and the function of the network interface card.
This chapter discusses transmission basics and networking media. It describes analog and digital signaling, modulation, transmission direction, multiplexing, throughput and bandwidth, baseband and broadband transmission, flaws like noise and attenuation, and characteristics of common media like coaxial cable, twisted-pair cable, fiber-optic cable, and wireless transmission. It also covers topics like cable installation, management, and choosing the right transmission medium based on factors like environment, distance, security, and growth needs.
The document discusses networking standards organizations and the OSI model. It describes the seven layers of the OSI model and their functions. The layers are application, presentation, session, transport, network, data link, and physical. Data moves down through the layers of one system and up through the layers of the receiving system. Standards organizations like IEEE, ISO, and IETF help establish networking standards and protocols.
Networks connect computers and devices to share resources. Peer-to-peer networks allow direct communication between devices while client/server networks rely on centralized servers with more power. Common network elements include clients, servers, protocols, and transmission media. Networks provide services like file/print sharing, email, internet access, and remote management. Becoming a network professional requires technical skills, soft skills, certification, and involvement in professional associations.
This document provides an overview and syllabus for an AIX System Administration class that will take place over 5 days from 9:30am to 5:30pm. The class will cover topics such as Unix and AIX overviews, IBM POWER servers, installing the AIX operating system, and logging into the system. Hands-on experience will be provided through virtualized AIX systems on IBM POWER7 blades in the classroom lab network.
9. โซืชืขืจืืืช ืืืืืืืช ืฉื ืืืื ืฆ'ืืืืื ืฉืืืฆืื ืืืืื ืืื ืืื ืืฉื ืื 1002-9991 ืืืืืงื ืืฉืื ืขืืืื ืฉื ืืืงืจืื ืืชืขืจืืืช ืืื ืืชโ ืืขื ืืืืืืื ืืืฉ!โฌ
โซโช!! Chihouliโs glass art exhibition โ A world record of visitors in an art exhibition : over a million visitorsโฌโฌ
11. (โซืื ืกืืช ืืช ืฉืื ืื )ืื ืืขืืื( ืืืืจื ืืจ ืืืืชืื )ื ืื ืงืืจืืโฌ
(The โchurch of all nationsโ in Gathsemane (Kidron valley
12. โซืืกืื ืื ืืงืฆื )ืืฉืืื( ืืืืคืช ืืกืืข )ืืืืื ื ืืืขืืช ืืกืื ืขืืืจ( ืืืจ ืืืืช โ ืืื ืืืจ ืืืืชืืโฌ
โซโชMosques on the Temple mount, viewd from the mount of olivesโฌโฌ
13. (โซืืคืื ื ืืืจืื ืืืจืืืช ืฉื ืืจ ืืืืช- ืืกืื ืื ืืงืฆื ืืฉืขืจื ืืืืื )ืืืืชื ืืืจืืืโฌ
The south eastern corner of the temple mount โ the southern wall and gates of Hulda
14. โซืืืคืช ืืกืืข ื ืื ืชื ืืฉื ืช 196 ืืกืคืืจื ืื ืืฉืืช ืืืื ืืืื ืื ืืฉืืืื ืืืขืชืืงืื ืืืื"ืชโฌ
โซโชDome of the rock โ built in 691 C.Eโฌโฌ