Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell. Samba provides file and print services for various Microsoft Windows clients and can integrate with a Microsoft Windows Server domain, either as a Domain Controller or as a domain member.
앱서비스에서 결제를 하고 싶어하는 팀을 위한 안내서.
개념 잡기용이며 상세한 것은 링크를 참조하셔서 공부하세요.
- 독자 : 결제, 정산을 구현하고 싶은 개발자 (입문자 이상)
- 내용 : 결제를 개발할 때 내 서버에 구현해야 할 것들
- 특이사항 : 요즘은 '아임포트' 같은 걸 이용해서 쉽게 연동이 가능합니다만...
The document discusses two Rust-based full-text search engines: Tantivy and Bayard. It describes trying out Tantivy using its CLI tool to index 1000 Wikipedia articles and perform searches. It then discusses Bayard's features like supporting Japanese text, REST API, and clustering. The author shares their experience setting up Bayard with Docker to index and search Japanese sample data.
"손코딩뇌컴파일눈디버깅" 모임을 소개합니다.
백문이 불여일런, 트라이얼앤에러(Trial and Error) 식의 몹쓸 교육을 받아 온 개발자들이 코딩하기 전에 신중하고 꼼꼼하게 생각해보기란 쉽지 않습니다.
개발 시간 중 디버깅 시간이 절반 이상을 차지하고 있는 실정에 버그를 줄이기 위해 TDD니 유닛테스트니 많은 방법들이 개발되고 있지만 가장 일차적으로 중요한 것은 개발자들이 꼼꼼히 따져보는 것이 아니겠는지요?
미국의 선진 SW회사들은 이미 화이트보드에 PS문제를 푸는 것을 인터뷰 방식으로 채택하고 있습니다. 이는 이와 같은 풀이 방식이 개발자들의 기본 역량을 측정하기에 알맞은 지표라는 것이고, 개발자들이 기본적으로 갖춰야 할 역량이기도 하다는 것 입니다.
또한 자신의 생각을 명확하게 정리하고 다른 사람이 이해할 수 있도록 전달하는 Communication Skill 도 개발자가 갖춰야 할 역량 중 하나 입니다. 알고리즘을 어떻게 구현할 것인가를 팀원들과 소통하면서 자연스럽게 생각을 정리하고 전달하는 연습도 할 수 있습니다.
컴퓨터에 앉아 코딩하기 전 펜과 종이를 들고 눈과 머리와 손을 굴려 보시는 것은 어떠신지요??
앱서비스에서 결제를 하고 싶어하는 팀을 위한 안내서.
개념 잡기용이며 상세한 것은 링크를 참조하셔서 공부하세요.
- 독자 : 결제, 정산을 구현하고 싶은 개발자 (입문자 이상)
- 내용 : 결제를 개발할 때 내 서버에 구현해야 할 것들
- 특이사항 : 요즘은 '아임포트' 같은 걸 이용해서 쉽게 연동이 가능합니다만...
The document discusses two Rust-based full-text search engines: Tantivy and Bayard. It describes trying out Tantivy using its CLI tool to index 1000 Wikipedia articles and perform searches. It then discusses Bayard's features like supporting Japanese text, REST API, and clustering. The author shares their experience setting up Bayard with Docker to index and search Japanese sample data.
"손코딩뇌컴파일눈디버깅" 모임을 소개합니다.
백문이 불여일런, 트라이얼앤에러(Trial and Error) 식의 몹쓸 교육을 받아 온 개발자들이 코딩하기 전에 신중하고 꼼꼼하게 생각해보기란 쉽지 않습니다.
개발 시간 중 디버깅 시간이 절반 이상을 차지하고 있는 실정에 버그를 줄이기 위해 TDD니 유닛테스트니 많은 방법들이 개발되고 있지만 가장 일차적으로 중요한 것은 개발자들이 꼼꼼히 따져보는 것이 아니겠는지요?
미국의 선진 SW회사들은 이미 화이트보드에 PS문제를 푸는 것을 인터뷰 방식으로 채택하고 있습니다. 이는 이와 같은 풀이 방식이 개발자들의 기본 역량을 측정하기에 알맞은 지표라는 것이고, 개발자들이 기본적으로 갖춰야 할 역량이기도 하다는 것 입니다.
또한 자신의 생각을 명확하게 정리하고 다른 사람이 이해할 수 있도록 전달하는 Communication Skill 도 개발자가 갖춰야 할 역량 중 하나 입니다. 알고리즘을 어떻게 구현할 것인가를 팀원들과 소통하면서 자연스럽게 생각을 정리하고 전달하는 연습도 할 수 있습니다.
컴퓨터에 앉아 코딩하기 전 펜과 종이를 들고 눈과 머리와 손을 굴려 보시는 것은 어떠신지요??
서울시 챗봇팀이 개발한 ‘청년정책봇’은 시나리오 기반이 아닌 딥러닝 기반의 챗봇 서비스다. ETRI에서 개발한 KorBERT를 통해 언어 처리 모델을 대신하고, 형태소 분석 API를 통해 질문 문장에 대한 의도를 분석하였다. 카카오에서 배포한 khaii 형태소 분석기 적용을 통해 구문분석 정확도를 향상을 확인할 수 있었다. 또한, 위키 QA API를 통해 일반적인 질의응답을 위한 기능을 추가했다. 현재 상용화된 챗봇서비스의 대부분은 미리 구성된 시나리오(Flowchart)를 따라가는 방식을 활용하며, 자연어 처리 기술은 신뢰도가 낮아 사용되지 않고 있다. 그에 반해, ‘청년정책봇’은 cdQA 파이프라인을 접목해 유사도 높은 문서를 언어 처리 모델에 적용하는 방식으로 접근해 신뢰도를 높일 수 있었다. 기존 빌더를 통해, 상용화된 서비스 대비 두 가지 장점이 있다. 첫 번째 장점은 딥러닝 모델에 따른 발전 가능성으로써 ETRI KorBERT의 지속적인 개선에 따라 청년정책봇의 기계 독해 성능도 같이 개선된다는 것이다. 두 번째 장점은 서비스 지속 가능성으로써 cdQA 파이프라인에 기반해 주기적인 웹 크롤링을 통해 데이터 추가가 가능하기 때문에 소프트웨어 유지 보수에 필요한 자원을 최소화할 수 있다는 것이다. 청년정책 챗봇을 통해 cdQA 파이프라인과 ETRI BERT 모델을 활용해 기존의 데이터 인풋 제한을 극복하고 기계 독해에 대한 솔루션을 제시할 수 있었다.
Go 語言 (又稱Golang) 是 Google 推出新一代的強大語言,今年 3 月 Google 公佈了去年底統計的問卷結果,發現 63% 用 Go 來寫網站,38% 用來開發系統程式,35% 用來做 DevOps,本次議題將會帶您瞭解為什麼 Go 語言適合打造微服務架構,Go 語言大給微服務什麼樣的特性以及 Go 語言適合用來開發什麼樣的系統?
Windows subsystem for linuxで始める組み込みlinux ラズパイ3のブートイメージを作ってみる-Toyohiko Komatsu
組み込みLinuxをビルドする場合、通常であればLinux環境の用意が必要です。Windows 10 Anniversary UpdateからWSL(Windows Subsystem for Linux)が提供され、Ubuntu 14.04(64ビット版)のバイナリパッケージがそのまま実行可能となりました。そこで、WSLを使って組み込みLinuxをビルドする方法を紹介します。組み込みLinuxのビルドにはbuildrootを使用し、Raspberry Pi 3をターゲットとした既定のブートイメージの作成を例に説明します。
July Tech Festa 2015にて登壇した際の資料です。
なお後日、小河さんがOpen VASのCLI操作の解説について以下のスライドを追加投稿してくれました!
「フリーでできるセキュリティチェック OpenVAS CLI編」
http://www.slideshare.net/abend_cve_9999_0001/openvas-cli-51048313
Research Assignment For Active DirectoryJessica Myers
This document discusses moving enterprise systems from on-premises to cloud services. Moving to the cloud provides value to corporations for several reasons, as professionals need to focus on activities that drive business rather than maintaining infrastructure. The document examines the benefits of cloud services and how they allow companies to focus on their core competencies.
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...Louis Göhl
You're excited about the new features in App-V 4.5, but where do you get started? This talk is meant to guide IT administrators through the App-V deployment decision process. Specifically, we discuss the various deployment types, pros and cons for each type of deployment, and performance and scalability issues. By the end of the presentation, IT administrators will be able to identify the deployment that is best suited for their preferences and infrastructure.
서울시 챗봇팀이 개발한 ‘청년정책봇’은 시나리오 기반이 아닌 딥러닝 기반의 챗봇 서비스다. ETRI에서 개발한 KorBERT를 통해 언어 처리 모델을 대신하고, 형태소 분석 API를 통해 질문 문장에 대한 의도를 분석하였다. 카카오에서 배포한 khaii 형태소 분석기 적용을 통해 구문분석 정확도를 향상을 확인할 수 있었다. 또한, 위키 QA API를 통해 일반적인 질의응답을 위한 기능을 추가했다. 현재 상용화된 챗봇서비스의 대부분은 미리 구성된 시나리오(Flowchart)를 따라가는 방식을 활용하며, 자연어 처리 기술은 신뢰도가 낮아 사용되지 않고 있다. 그에 반해, ‘청년정책봇’은 cdQA 파이프라인을 접목해 유사도 높은 문서를 언어 처리 모델에 적용하는 방식으로 접근해 신뢰도를 높일 수 있었다. 기존 빌더를 통해, 상용화된 서비스 대비 두 가지 장점이 있다. 첫 번째 장점은 딥러닝 모델에 따른 발전 가능성으로써 ETRI KorBERT의 지속적인 개선에 따라 청년정책봇의 기계 독해 성능도 같이 개선된다는 것이다. 두 번째 장점은 서비스 지속 가능성으로써 cdQA 파이프라인에 기반해 주기적인 웹 크롤링을 통해 데이터 추가가 가능하기 때문에 소프트웨어 유지 보수에 필요한 자원을 최소화할 수 있다는 것이다. 청년정책 챗봇을 통해 cdQA 파이프라인과 ETRI BERT 모델을 활용해 기존의 데이터 인풋 제한을 극복하고 기계 독해에 대한 솔루션을 제시할 수 있었다.
Go 語言 (又稱Golang) 是 Google 推出新一代的強大語言,今年 3 月 Google 公佈了去年底統計的問卷結果,發現 63% 用 Go 來寫網站,38% 用來開發系統程式,35% 用來做 DevOps,本次議題將會帶您瞭解為什麼 Go 語言適合打造微服務架構,Go 語言大給微服務什麼樣的特性以及 Go 語言適合用來開發什麼樣的系統?
Windows subsystem for linuxで始める組み込みlinux ラズパイ3のブートイメージを作ってみる-Toyohiko Komatsu
組み込みLinuxをビルドする場合、通常であればLinux環境の用意が必要です。Windows 10 Anniversary UpdateからWSL(Windows Subsystem for Linux)が提供され、Ubuntu 14.04(64ビット版)のバイナリパッケージがそのまま実行可能となりました。そこで、WSLを使って組み込みLinuxをビルドする方法を紹介します。組み込みLinuxのビルドにはbuildrootを使用し、Raspberry Pi 3をターゲットとした既定のブートイメージの作成を例に説明します。
July Tech Festa 2015にて登壇した際の資料です。
なお後日、小河さんがOpen VASのCLI操作の解説について以下のスライドを追加投稿してくれました!
「フリーでできるセキュリティチェック OpenVAS CLI編」
http://www.slideshare.net/abend_cve_9999_0001/openvas-cli-51048313
Research Assignment For Active DirectoryJessica Myers
This document discusses moving enterprise systems from on-premises to cloud services. Moving to the cloud provides value to corporations for several reasons, as professionals need to focus on activities that drive business rather than maintaining infrastructure. The document examines the benefits of cloud services and how they allow companies to focus on their core competencies.
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...Louis Göhl
You're excited about the new features in App-V 4.5, but where do you get started? This talk is meant to guide IT administrators through the App-V deployment decision process. Specifically, we discuss the various deployment types, pros and cons for each type of deployment, and performance and scalability issues. By the end of the presentation, IT administrators will be able to identify the deployment that is best suited for their preferences and infrastructure.
Project implements a complex intra-networking system of various devices and modules working on IPv4 and IPv6 protocols providing various services like DNS, DHCP, HTTP, FTP, and SMTP. Information is routed among various client on the network with the use of protocols RIP, IMAP and OSPF. Project comprises of sub-netting, LAN switching and VLAN techniques to manage the number of hosts present in the network communicating with least network collision and congestion.
Web375 course project web architecture plan for the de vry daily tribune new...bestwriter
The DeVry Daily Tribune is merging two newspaper companies and needs a new secure web architecture. The student is to design the architecture and provide step-by-step instructions for setting up: an email server, secure and anonymous FTP servers, a LAMP stack, firewalls, DHCP server and DNS. The architecture must support 100 employees accessing email, photographers uploading images securely, public downloading photos, and reporters submitting stories through a dynamic website. The instructions will be given to the newspaper's system administrator to implement.
- The presentation introduces WS-VLAM, a workflow management system that aims to enable end-users to define, execute, and monitor e-science applications in a location-independent way.
- WS-VLAM adopts a service-oriented approach, implementing the workflow engine and repository as WSRF services using Globus Toolkit 4. This allows for interoperability with other workflow systems.
- Current work involves testing on rapid prototyping environments and planned integration with Taverna and Kepler to allow executing predefined VLAM workflows from within those systems.
The document proposes a host simulation approach to developing embedded applications on desktop computers. This allows leveraging high-performance processors and host resources to validate applications earlier without waiting for IP specifications or simulated platforms. Specifically, it involves virtualizing an entire system-on-chip on the host debugger by identifying a common layer above the target hardware and porting the software development environment, enabling execution of a full application using host peripherals. This reduces time to market by facilitating faster software development and validation on more powerful hardware before silicon samples are available.
This document outlines deploying IBM Notes in VMware View and Microsoft RemoteApp environments. It discusses the benefits of each approach and provides an overview of the infrastructure required. It also provides guidance on installing Notes clients and tips for ensuring optimal performance on both platforms. VMware View allows full virtualized workstations on zero clients, while RemoteApp streams individual applications. The document aims to help administrators deliver the Notes client while reducing support overhead and infrastructure complexity.
Vijay Kumar is seeking a position as a System Administrator. He has over 6 years of experience working with GSM networks and maintaining various telecom products including SMSC, MMSC, SDP, WAPGW, RBT and CBC. He is proficient in Linux, Solaris, databases, and protocols used in telecom networks. His experience includes implementation, testing, troubleshooting and providing support for various telecom products.
The document is a resume for P. Yogendrasingh detailing his experience as a middleware administrator. He has over 3 years of experience administering IBM WebSphere Application Server, IBM HTTP Server, and Apache Tomcat across UNIX, Linux, Solaris, AIX, and Windows environments. His responsibilities include installation, configuration, performance monitoring, load balancing, clustering, troubleshooting, and providing 24/7 on-call support for production applications. He is currently working as a middleware consultant for MindCraft Software Pvt. Ltd. in Mumbai, India.
WebSphere App Server vs JBoss vs WebLogic vs Tomcat (InterConnect 2016)Roman Kharkovski
This document provides a competitive comparison of WebSphere Application Server (WAS) versus Tomcat, JBoss and WebLogic. It discusses each product's capabilities in areas like runtimes, API management, development tools, cloud support, and more. Gartner research is referenced showing IBM holds the #1 position in the middleware software market for the past 13 years. The document aims to help organizations choose the best application server for their needs.
Chicago Docker Meetup Presentation - MediaflyMediafly
This document discusses how Bryan Murphy uses Docker at his company Mediafly. It begins by introducing Bryan and his background. It then describes what Mediafly does, including content management systems, secure content delivery, document and video processing, and customizable user interfaces. The document highlights aspects of Mediafly that make it interesting, such as being multi-device, multi-tenant, service oriented, and distributed. It provides examples of technologies used at Mediafly and some key metrics. The document then discusses why Docker is used at Mediafly, covering benefits like being developer friendly, enabling faster iteration and testing, managing dependencies, sharing environments, standardization, isolation, and infrastructure freedom.
This document discusses client/server computing. It defines client/server computing as a model based on distributing functions between server and client processes. A client is a process that requests services, while a server provides requested services. Clients and servers can reside on the same or different networked computers. Different types of servers are discussed, including file servers, print servers, application servers, mail servers, and fax servers, each providing a specific type of service to client processes over a network.
Konrad Brunner discusses keys to consider when moving to next generation databases in the cloud. ARM templates are key for defining infrastructure as code and managing infrastructure together with applications. Automation is key for streamlining deployments, scaling resources, and saving money. Identities, network configuration, and application management are also important to consider for security and governance when adopting next generation databases in the cloud.
Assessment itemManaging Services and SecurityValue 15Due D.docxgalerussel59292
Assessment item
Managing Services and Security
Value: 15%
Due Date: 01-Oct-2018
Return Date: 21-Oct-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
Your job in this assignment is to create two Virtual machines each running a different but the latest distribution of Linux e.g. Ubuntu Server and CentOS. Each of these VM’s is to offer services to a user base.
The Virtual Machines can be implemented using any hypervisor e.g. VMWare Player, Virtual Box or anything else you think is appropriate.
You can use bridged or host only networking when setting up these Virtual Machines. When implementing the Virtual Machines, rather then obtaining an address from the HyperVisors DHCP server you should ensure the addresses used are static and assigned from your network. YOU WILL NEED TO WORK OUT WHAT ADDRESS SPACE YOU ARE USING AND HOW IT WILL IMPACT YOUR LAN.
Part 1: Virtual Machine One – DNS & SSH Server (5 marks)
The first Virtual Machine should be installed and have the BIND (DNS) server installed on it. While you do not own any address space/ name space your name server should manage the following domains:
saffioti.org.au
The name server should answer queries for this domain. In addition to the saffioti.org.au zone, a zone should be set up for the reverse zone – the reverse zone would be whatever the address range is of your virtual machine. You should do some research on how Bind handles reverse zones.
You should set up the saffioti.org.au zone with the usual information including SOA, NS and other records where appropriate. The address used for this should be the address of the virtual machine. You should give this Virtual Machine an A record with the name server1. You should also create a A record for server2 (part 2 of this task)
In addition to this you should create an CNAME record with the name www. When a user does a lookup on www.saffioti.org.au- the address returned should be that of the other virtual machine (Virtual Machine Two).
Be sure to create the appropriate reverse (PTR) records for the machines and to help other administrators be sure to put in place appropriate TXT records.
Once complete, you should fine tune your DNS Servers Virtual machine. Do this by disabling services that were installed but are not required. Be very careful not to break anything here. As a tip you will want to keep both DNS and SSH services active. Ensure both DNS and SSH are invoked at startup.
Finally harden this Virtual Machine using a firewall. Set up filters which allow access to the services possibly being access on the Virtual Machine from other hosts – specifically SSH and DNS. You can assume this incoming traffic can come from anywhere. You will need to make sure these rules always take affect at boot.
Test your virtual machine by setting your Host computer (i.e. the computer that is running the VM) Name Server to the address of the Virtual Machine. See if you can resolve queries.
The document discusses database security for MySQL databases. It covers types of security threats to databases like server compromise, data theft, and denial of service. It then discusses best practices for securing the database server location, installation, configuration, user accounts, and operations. Specific topics covered include choosing a secure MySQL version, restricting network access to the database, using secure remote administration techniques, and optimizing database types and permissions.
This document describes the design and implementation of a real-time network monitoring system. The system allows a network administrator to monitor network resources in real-time from both client and server interfaces. It was developed using a waterfall software engineering model and uses technologies like Java, MySQL, and Linux to enable cross-platform functionality with low hardware requirements. Testing was conducted and future enhancements are proposed to expand the system's monitoring capabilities.
The purpose of developing attendance
management system is to computerized the tradition way of
taking attendance. Another purpose for developing this
software is to generate the report automatically at the end of
the session or in the between of the session
This document provides a quick-start guide for installing and configuring Cloudtenna DirectShare, a file sharing and collaboration solution. It outlines the necessary pre-installation information, steps for deploying the DirectShare virtual appliance using VMware ESXi, and configuring the appliance through its GUI to integrate with Active Directory, set up file shares, and enable guest access and shared links. The guide is intended to help users get DirectShare set up and operational in their environment for secure external file sharing and collaboration.
The project Remote Web Desk deals with remote control of computer over some form of network usually a LAN or the Internet. It allows friend or an administrator to fix problem on your computer or you can use it to show your desk top to somebody at a remote location
Surekha Kadi has over 7 years of experience in software testing and automation. She has expertise in agile methodologies, scripting languages like Perl and Python, and testing domains including mobile applications, virtualization, cloud computing, and big data using tools like Hadoop, Informatica, Hive, and Vector. She has led testing projects for various clients, developing frameworks, automating test cases, and ensuring quality standards like CMMI level 3.
Similar to Samba server Pts report pdf by Rohit malav (20)
Abstract:
Extensive research has been done in prefetching techniques that hide memory latency in microprocessors leading to performance improvements. However, the energy aspect of prefetching is relatively unknown. While aggressive prefetching techniques often help to improve performance, they increase energy consumption by as much as 30% in the memory system. This paper provides a detailed evaluation on the energy impact of hardware data prefetching and then presents a set of new energy-aware techniques to overcome prefetching energy overhead of such schemes. These include compiler-assisted and hardware-based energy-aware techniques and a new power-aware prefetch engine that can reduce hardware prefetching related energy consumption by 7-11 ×. Combined with the effect of leakage energy reduction due to performance improvement, the total energy consumption for the memory system after the application of these techniques can be up to 12% less than the baseline with no prefetching.
operating system calls input and output by (rohit malav)Rohit malav
Introduction of System Call
In computing, a system call is the programmatic way in which a computer program requests a service from the kernel of the operating system it is executed on. A system call is a way for programs to interact with the operating system. A computer program makes a system call when it makes a request to the operating system’s kernel. System call provides the services of the operating system to the user programs via Application Program Interface(API). It provides an interface between a process and operating system to allow user-level processes to request services of the operating system. System calls are the only entry points into the kernel system. All programs needing resources must use system calls.
Services Provided by System Calls :
Process creation and management
Main memory management
File Access, Directory and File system management
Device handling(I/O)
Protection
Networking, etc.
In computer programming, pandas is a software library written for the Python programming language for data manipulation and analysis. In particular, it offers data structures and operations for manipulating numerical tables and time series. It is free software released under the three-clause BSD license.
pandas is a fast, powerful, flexible and easy to use open source data analysis and manipulation tool,
built on top of the Python programming language.
A recommender system, or a recommendation system, is a subclass of information filtering system that seeks to predict the "rating" or "preference" a user would give to an item. They are primarily used in commercial applications.
Deep learning in python by purshottam vermaRohit malav
In this chapter, you'll become familiar with the fundamental concepts and terminology used in deep learning, and understand why deep learning techniques are so powerful today. You'll build simple neural networks and generate predictions with them.
Atm Security System Using Steganography Nss ptt by (rohit malav)Rohit malav
This document describes an ATM security system that uses steganography to securely transmit files. The system encrypts files using a random bit-shift encryption algorithm and embeds them into audio or video files for transmission. At the receiving end, the encrypted file is extracted from the carrier file after entering the correct password. The system aims to provide stronger security than regular encryption by hiding encrypted files within innocent-looking media during transmission.
System calls operating system ppt by rohit malavRohit malav
System call
a system call is the programmatic way in which a computer program requests a service from the kernel of the operating system it is executed on. This may include hardware-related services, creation and execution of new processes, and communication with integral kernel services such as process scheduling.
A project on spring framework by rohit malavRohit malav
The Spring Framework provides a comprehensive programming and configuration model for modern Java-based enterprise applications - on any kind of deployment platform.
A key element of Spring is infrastructural support at the application level: Spring focuses on the "plumbing" of enterprise applications so that teams can focus on application-level business logic, without unnecessary ties to specific deployment environments.
android text encryption Network security lab by rohit malavRohit malav
Open the Android Market app on your device and install the Secret Message app. Enter a secret key into the Secret Key box at the top of the app's screen, type the message you want to encrypt into the Message box, tap “Encrypt” and tap “Send via SMS” to send the encrypted message.
samba server setup Pts ppt (rohit malav)Rohit malav
Samba
Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell. Samba provides file and print services for various Microsoft Windows clients and can integrate with a Microsoft Windows Server domain, either as a Domain Controller or as a domain member.
Spring frame work by rohit malav(detailed)Rohit malav
Spring Framework The Spring Framework is an application framework and inversion of control container for the Java platform. The framework's core features can be used by any Java application, but there are extensions for building web applications on top of the Java EE platform detailed in ppt.
The document provides an overview of the Spring framework, including its history, key features, architecture and files used in Spring projects. It discusses how Spring is a lightweight Java application development framework that reduces code and speeds up development. The core features of Spring include inversion of control (IOC) container and aspect-oriented programming (AOP) support. The Spring architecture is made of modular layers including web, data access, ORM and AOP. It also outlines the typical steps for creating a Spring MVC project in Eclipse, including configuring the application context XML, dispatcher servlet XML and web XML files.
Samba server linux (SMB) BY ROHIT MALAVRohit malav
Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell. Samba provides file and print services for various Microsoft Windows clients and can integrate with a Microsoft Windows Server domain, either as a Domain Controller or as a domain member.
The Payroll Management System deals with the financial aspects of employee's salary, allowances, deductions, gross pay, net pay etc. and generation of pay-slips for a specific period. The outstanding benefit of Payroll Management System is its easy implementation.
Payroll system ppt2 (rohit malav) version point 2Rohit malav
The Payroll Management System deals with the financial aspects of employee's salary, allowances, deductions, gross pay, net pay etc. and generation of pay-slips for a specific period. The outstanding benefit of Payroll Management System is its easy implementation.
The document describes an online student management system implemented using C++ that allows storing student data in a text file database. The system provides different views of the data for users like students, faculty, proctors and administrators. It allows adding, editing and viewing student details like registration number, name, marks in subjects and proctor ID. The source code implements the various user interfaces and file handling for performing CRUD operations on the text file database according to the user type.
Digital Unlocked is an initiative by Google in collaboration with the Indian School of Business and Ministry of Electronics and Information Technology to promote digital awareness and to help small scale businesses and startups to go digital in India.[1][2] It was announced and launched by Google's CEO Sundar Pichai during his visit to India in January 2017.[3][4] Digital Unlocked is a training program for small and medium businesses in India. The programme is built across the different formats of online, offline and mobile. The Digital Unlocked's offline training is being conducted in partnership with Federation of Indian Chambers of Commerce & Industry and Indian School of Business.[5][6]
The training program allows the users to set their own goals and then recommends the courses which will help them achieve their own set goals. After completing the goals, or in-between, the users can also choose to complete and learn other courses which are of interest to them. The courses cover a wide range of topics from using the opportunities which the digital media and world have to offer to the advanced tools which can help businesses in many ways. The training program also offer a Certification to those who complete all the courses and qualify in the final assessment.
Rohit android lab projects in suresh gyan viharRohit malav
Overview. 1.1. Labs v Projects. 1.2. Do As Many As You Can. 1.3. Local Lab Setup.
Getting Started.
Android Development.
Android Internals. 4.1. Project: Android OS Monitor. 4.2. Task: IGLearner.
Android Networking.
Build an Android ROM.
KeyLogger.
Malicious Apps.
The document provides code for a Snake game written in Java. It includes requirements for hardware and software, source code for the Snake.java file, and a brief conclusion acknowledging guidance from a professor. The code implements a Snake game with menus for new game, exit, help, and creator details. It uses threads to continuously move the snake forward according to arrow key input and checks for collisions with walls or its body segments.
The document describes an Android app created for Gyan Vihar University. The app aims to provide all important university links and features in one place to save users time. It uses a GridView layout to make the app more visually appealing. The app was created by Sanjeed Alam, a 5th semester student, and brings together key university resources through an interactive mobile interface.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
1. A Report on
“samba servermessage block”
Submitted
In partial fulfillment
Of requirement for
Degree of Bachelor of Technology
In Department of computer Science & Engineering
2019
Submitted To: Submitted By:
Ms.Lavisha Sahu Name:- Rohit malav
Assistant Professor
2. Department of Computer Engineering & Information Technology
Suresh Gyan Vihar University
Mahal, Jagatpura, Jaipur-302017
Certificate
This certifies that the dissertation entitled
“samba server message block”
Is Submitted by
Rohit malav
B.TECH(CSE) in the year 2019 in partial fulfillment of
Degree in Bachelor of Technology in Computer Science & Engineering
Suresh Gyan Vihar University, Jaipur
Ms.Lavisha Sahu Date:
Assistant Professor Place:
3. CANDIDATES’S DECLARATION
I hereby declare that the work, which is being presented in the dissertation, entitled that is “samba server
message block ” in partial fulfillment for the award of Degree of “Bachelor of Technology” in Department
of Computer Science & Engineering with Specialization in Computer Science & Engineering, and
submitted to the Department of Computer Science & Engineering, Suresh Gyan Vihar University is a
record of my own investigation carried under the Guidance of Ms.Lavisha Sahu, Assistant Professor of
Department, Computer Science, Suresh Gyan Vihar University, India.
I have not submitted the matter presented in this Dissertation anywhere for the award of any other
degree.
Rohit malav
Computer Science and Information Technology Department
4. ACKNOWLEDGEMENT
I would like to express my sincere appreciation to this Computer graphics project co-ordinate
Ms.Lavisha Sahu who invented the platform for the ordinary student to educate themselves about
the Computer based application.
My sincerest gratitude goes to Ms.Lavisha Sahu Assistant professor of Department, Computer
Science & Information Technology and who guided, with her attention, expertise and knowledge
throughout the process of this dissertation.I thank her for her valuable guidance, her commitment
timely advice and constant support at each & every step in completion of my study. Without her
proper guidance I wouldn’t get any idea about computer graphics Program.
With her effort and trust I came to know about how much this program is necessary for any B.Tech
student.I express my sincere thanks to Mr. Manish Sharma, Head of Department (HOD),
Computer Science & Information Technology, Suresh Gyan Vihar University, Jaipur for his
encouragement.
Rohit malav
Computer Science and Information Technology Department
5. CERTIFICATE
This is to certify that Project Report entitled “samba servermessage block” which is submitted by Rohit
malav (B.TECH 7TH semester) in partial fulfillment of the requirement for the award B.TECH degree in
department of Computer Science is record of the candidate own work carried out by her under my
supervision. The matter embodied in this project report is original and has not been submitted for the
award of any other degree.
Signature:
Name of Supervisor: Ms.Lavisha Sahu
Designation: Assistant Professor
Date:
6. DECLARATION
I hereby declare that the Lab Project Report, enlisted “samba server message block” has been prepared
as the part for the completion of the degree of Bachelor of Technology from Gyan Vihar school of
Engineering & Technology and it is based on the original work and will be used only for academic
purpose.
It will not be protected in any condition as a source of Information to an Industry
Signature: Signature:
Ms.Lavisha Sahu Rohit malav
8. Table of Contents
1. CHAPTER - 1 7
1.1 ABSTRACT OF THE PROJECT 7
CHAPTER - 2 9
2. REQUIREMENT ANALYSIS
2.1 Platform and Operating Systems
2.2 Software Requirement
9
CHAPTER - 3 10
3. ADVANTAGES & DISADVANTAGES OF SAMBA
3.1 Advantages of samba
3.2 Disadvantages of samba
10
CHAPTER – 4 11
4. PROCEDURE FOR SAMBA
4.1 Machine and Network Overview
4.2 Steps for Server Side
4.2 Steps for Client Side
11
CHAPTER - 5 12
5 SERVER INTRODUCTION 12
5.1 WHY SERVER ? 13
CHAPTER - 6 14
6. THE MOTIVATION 14
CHAPTER - 7 15
7. EXPERIENCE AND KNOWLEDGE ACQUIRED 15
9. 7.1 KNOWLEDGE ON BASESAS 15
7.2 KNOWLEDGE ON SAMBA ENTERPRISE GUIDE (EG) 16
7.3 KNOWLEDGE ON SAMBA VISUAL ANALYTICS (VIYA) 17
7.4 KNOWLEDGE ON SAMBA SENTIMENTAL ANALYSIS 18
CHAPTER - 8 20
8. INTRODUCTION TO THE PROJECT 20
CHAPTER - 9 21
9. IMPLEMENTATION AND RESULT 21
9.1 PROJECT 1 (TEXT AND SENTIMENTAL ANALYSIS ON E-
NEWS)
21
9.2 PROJECT 2 ( CREATING DASHBOARD ON SCHOOL DATA ) 24
CHAPTER - 10 30
10. APPENDICES 30
10.1 CODE FOR MANIPULATION OF DATA IN SAS EG 30
CHAPTER - 11 34
11. CONCLUSION AND SELF-EVALUATION 34
11.1 CONCLUSION 34
11.1.1 COMPETENCY LEVEL : BEFORE 34
11.1.2 COMPETENCY LEVEL : AFTER 34
10. Abstract
A samba, which stands for Internet Small Computer System Interface, works on top of the Transport
Control Protocol (TCP) and allows the smb command to be sent end-to-end over local-area networks
(LANs), wide-area networks (WANs) or the Internet. IBM developed samba as a proof of concept and
presented the first draft of the samba standard to the Internet Engineering.
samba is a block-based set of commands that connects computing devices to networked storage and
file transfer, including spinning up storage media and data reads/writes.
Samba is reliable software that runs on reliable Unix operating systems, resulting in fewer problems and
a low cost of maintenance. Samba also offers better performance under heavy loads, outperforming
Windows 2000 Server by a factor of 2 to 1 on identical PC hardware, according to published third-party
benchmarks.
11. Requirement Analysis
Platform Requirement : Linux
Supportive Operating Systems :
The supported Operating Systems for client include:
• Any Linux Distro: -
Any Linux distro would work as this project is based on open source samba. So installation
would not be an issue as we will be using Linux to complete this project.
12. Software Requirement :
Server Side Software Requirement: -
The first step is the installation of the necessary packages to allow the Debian system to serve out samba
targets. This software package is known as Target Framework (TGT).
Client Side Software Requirement: -
For the client side we have to install, package “open- samba”.
13. Advantages of samba
Free and open-source
Portable across multiple platforms
Allows for easier networking of Windows workstations to computers running other platforms
SMB is still developing, so maintaining compatibility with Microsoft's implementation is a
constant battle
Threat of legal action against commercial users of Samba from Microsoft
Free and open source
Portable across multiple platforms Allows
for easier networking of Windows workstations to computers running other platforms.
samba offers much simpler network storage solutions.
Utilizing samba sharing Ethernet network components, organizations can significantly simplify
their network storage environments
14. Disadvantagesofsamba server
Platform choice is probably the big criteria. You get access to a lot more file systems than on
Windows. You also have access to a more exhaustive set of tunables, should you be interested in
going that route. Some people also prefer the Linux firewall to the Windows one.
Smb is still developing.
Maintaining compatibility with Microsoft’s implementation is a constant battle.
Threat of legal action against commercial users of Samba from Microsoft.
Samba operates on servermessage protocol (normally) and hence there is a chance that it might
be exposed to hackers who are more familiar with the widely used IP sharing Networks.
15. PROCEDURE:-
MACHINES: -
Debian iSCSI Target: 192.168.56.101/24
Storage: Contains two extra hard drives to be used as the
storage in the iSCSI setup
Debian iSCSI Initiator: 192.168.56.102/24
SAMBA SERVER SETUP:-
16. STEPS for SERVER SIDE : -
In the samba world, the target is considered the host that contains the storage devices to be used by the
initiator.
In this article the server with the IP of 192.168.56.101 is being used as the target. All
configurations will be done on that host for this section.
The first step is the installation of the necessary packages to allow the Debian system to serve out
SAMBA targets. This software package is known as Target Framework (TGT).
The other item that is being used for this guide is the Logical Volume Management (LVM) tools as
Logical Volumes (LVs) will be used as the storage backing for the iSCSI target. Both packages can be
installed with the following commands.
# apt-get update
# apt-get install tgt lvm2
Once the packages are installed, LVM will be used to prepare the hard disks on the target for use as an
smb LUN. The first command is used to prepare the disks for inclusion in a LVM setup. Be sure to modify
the command as needed for different scenarios!
# lsblk (Only used to confirm disks to be used in the LVM
setup)
# pvcreate /dev/sd{b,c}
Once the disks have been prepared with the above ‘pvcreate‘ command, it is time to create a volume
group out of these particular disks. The volume group is required in order to create the Logical
Volumes that will act as the samba sharing later.
To create a volume group, the ‘vgcreate‘ command is needed.
# vgcreate tecmint_samba /dev/sd{b,c}
# vgs (Only needed to confirm the creation of the volume
group)
17. The capacity of this volume group is only 9.99GB. While this is a particularly small volume group,
the process would be the same for disks of larger capacity!
The next step is the creation of the logical volume that will act as the disk to the samba client (initiator). For
this example the entirety of the the volume group will be used but isn’t necessary.
Once the logical volume has been created, it’s time to create the actual LUN (Logical Unit
Number). The LUN will be the storage device that the initiator will connect to and use later.
Creating a LUN is very simple and requires only a few steps. The first step will be the creation of
the configuration file. This file will reside in the ‘/etc/tgt/conf.d‘ directory and for this article it
will be called ‘TecMint_samba.conf‘.
To create this file use a text editor.
# nano /etc/tgt/conf.d/TecMint_samba.conf
Within this file, all the necessary configuration information for this LUN will be configured. There
are a lot of options that can be placed in this file but for now a basic LUN with mutual Challenge
Handshake Authentication Protocol (CHAP) will be configured.
The LUN’s definition will exist between two ‘target‘ statements. For more parameters that can go in
the target statement, review the manual page for the ‘targets.conf‘ file by issuing ‘man 5 targets.conf‘.
<target iqn.2019-10.rohit.com:lun1>
# Provided device as an samba target backing-store
/dev/mapper/tecmint_samba-tecmint_lun1 initiator-address
192.168.56.102
incominguser tecmint-samba-user password
outgoinguser debian-samba-target secretpass
</target>
18. There’s a lot going on above. A quick explanation may be helpful to most.
▪ The first line begins the particular samba LUN configuration. In this case
the LUN labeled ‘iqn.2019-10.rohit.com:lun1‘. The ‘iqn‘ part indicates that this will be an samba
qualified name. The ‘2019-10‘ is an arbitrarily chosen date combination. ‘samba.com‘ is the
domain that this particular LUN belongs. Finally, the ‘lun1‘ is used as the name for this particular
target.
▪ The second line above illustrates a comment. Comments can exist in the target
configuration files and must be prefaced with a ‘#‘ symbol.
▪ The third line is where the actual storage space that will be used by the initiator exists. In this
case the storage backing will be the logical volume that was created earlier in the guide.
▪ The fourth line is the IP address that is expected from the initiator. While this isn’t a required
configuration item, it can help increase security.
▪ The fifth line is the incoming username/password. Much like the initiator address above, this
parameter isn’t required either but can help to secure the LUN. Since this guide is also covering
samba mutual CHAP, this parameter is required. This line indicates the username and password
that the target will expect from the initiator in order to connect to this LUN.
▪ The sixth line is the username/password that the target will provide to the initiator to allow
for mutual CHAP authentication to take place. Normally this parameter is not required but
this article is covering mutual CHAP authentication so this parameter is required.
▪ The final line is the closing statement for the target definition. Pay attention to the closing slash in
front of the keyword target!
Once the configuration file has been created, the tgt service should be restarted so tgt is aware of the new
targets and the associated configuration.
This can be done with one of the following commands and is dependent on the init system in use.
# service tgt restart (For sysv init systems)
# systemctl restart tgt (For systemd init systems)
Once tgt has been restarted, it is important to check to ensure that the samba target is being made available
according to the configuration file created.
This can be accomplished with the ‘tgtadm‘ command.
# tgtadm --mode target --op show (This will show all
targets)
19. This concludes the configuration of the target. The next section will work through the
configuration of the initiator.
STEPS for CLIENT SIDE : -
The first step in this process for this Debian initiator is the installation of the proper packages for
samba.
# apt-get update
# apt-get install open-samba
Once apt has finished the configuration of the open-iscsi packages, the samba
initiator configuration can begin. The first step will be to communicate with the target to get the initial
configuration information for the target prepared.
# sambaadm -m discovery -t st -p 192.168.56.101
When this command runs, it will respond back with the name of the lun configured earlier for this
particular host.
Now the file created for this node will need to have the CHAP information configured in order for this
samba target to actually be accessible by the initiator.
Technically this information could be setup for the entire system as a whole but in the event that a host
connects to different LUNs with different credentials, placing those credentials in the specific node
configuration file can mitigate any issues.
The node configuration file will exist in the directory ‘/etc/iscsi/nodes/‘ and will have a directory per
LUN available. In the case of this article (note that paths will change if names/IP addresses are changed).
# /etc/samba/nodes/iqn.201-
10.rohit.com:lun1/192.168.56.101,3260,1/default
20. To work with this file, any text editor can be used.
# nano /etc/samba/nodes/iqn.2019-
10.rohit.com:lun1/192.168.56.101,3260,1/default
Within this file there will be several already configured options for the respective target that were
determine during the ‘samba adm‘ command run earlier.
Since this particular Debian target/initiator setup is using mutual CHAP, some more options need to be
changed and added to this file and then a login to the samba target performed. The changes to this file are:
node.session.auth.authmethod = CHAP
#Enable CHAP Authentication
node.session.auth.username = tecmint-samba-user
#Target to Initiator authentication
node.session.auth.password = password
#Target to Initiator authentication
node.session.auth.username_in = debian-samba-target
#Initiator to Target authentication
node.session.auth.password_in = secretpass
#Initiator to Target authentication
The above options will allow this target to authenticate to the initiator as well as allow the
initiator to authenticate to the target.
There is another option in this particular file that may need to be changed depending on the
administrator’s preferences and that is the ‘node.startup‘ parameter.
If following this guide, the ‘node.startup‘ option will be set to ‘manual‘ at this point. This may not be
desired. If the administrator wishes to have the samba target connected when the system starts up,
change ‘manual‘ to ‘automatic‘.
tomatic
21. Once the above changes have been made, save the file and exit. At this point the open-samba initiator
service needs to be restarted in order to read these new changes and connect to the samba target.
This can be accomplished with one of the following commands depending on the init system in use.
# service open-samba restart (For sysv init systems)
# systemctl restart open-samba (For systemd init systems)
To further confirm that the samba target is indeed available to the initiator, we can check the system for
extra disk drives that are available using the ‘lsblk‘ command and checking the output for extra drives.
# lsblk
The other command that can be used on the initiator to confirm a connection to the target is ‘samba
adm‘ as such:
# samba adm -m session
The final place to confirm a connection would be on the target itself using the ‘tgtadm‘ command to list
any samba connections.
# tgtadm --mode conn --op show --tid 1
From this point, the newly attached samba device can be used similar to any normally attached disk!
Partitioning, filesystem creation, mounting, and/or persistent mounting can all able be handled
normally.
22. SCREENSHOTS BY STEP TO STEP
STEP 1
Go to the Start menu and search for notepad. Now right click on Notepad icon and click on Run as
administrator.
STEP 2
Now press <Ctrl> + o to go to File > Open… and select the
file C:WindowsSystem32Driversetchosts
23. STEP 4
Now add the above line to the end of the file. Now press <Ctrl> + s or go to File > Save to save the file.
STEP 5
Accessing Samba Shares from Windows Client:
From windows, just open the File Explorer and type in HOSTNAMESHARENAME in your
location as marked in the screenshot below. Once you’re done, press <Enter>.
24. STEP 6
Now type in your Samba USERNAME and PASSWORD and click on OK.
STEP 7
You should be logged in to your share as you can see.
25. CONCLUSION
This project includes a large variety of technical domains such as Networking, Open Source
Technology, File Systems and many more. With this project we learned how to use samba for sharing
block of storage over the network. This essentially is very important.
Using samba server, we can create centralized storage solutions which could be really helpful in current
scenario of technological evolution. Creating centralized storage solution is more cost friendly and
secure way as we can see that there are many threats in IT companies which could be really harmful.
As we noticed samba uses TCP/IP for transferring the block of storage across the network which
allows it to transfer data without data loss as TCP/IP ensures that no packet is lost during the
transmission. Also, it uses IP for authentication of the clients to which the block of storage is to be
shared which makes it more secure and reliable.
Now a days, samba server is very important and hence it is necessary for every client who are not
capable to attach a physical hard disk or storage device with system because they want to less
everything and request to server to provide remotely to TCP/IP internet environment.
As we are using Linux distros as our operating system, we are cutting down the cost to very large extent
and this project itself is very useful in cutting down the costs for any industry which require a large
number of computer systems.