طراحی و پیاده سازی سیستم کنترل هوشمند آبیاری گیاهان و باغچه (IoT) Behnaz Motavali
دفاع کارشناسی مهندسی کامپیوتر گرایش سخت افزار
دانشگاه صنعتی امیرکبیر (پلی تکنیک تهران)
استاد راهنما: دکتر محمود ممتازپور
آبان 1395
Design and Implementation of Smart Irrigation System for Plants and Garden (IOT)
B.Sc. Thesis Presentation
Amirkabir University of Technolo
Supervisor: Dr. Mahmoud Momtazpour
Nov 2016
In Persian
اینترنت اشیا و چالش های امنیتی پیش رو
معرفی فناوری اینترنت اشیا و کاربردهای آن و چالش های امنیتی و نحوه مقابله با آنها
فیلم وبینار مربوطه در:
http://www.quickheal.co.ir/webinar/webinar-videos/
Internet of Things - Future & Opportunities * اینترنت اشیاء - فرصتهای پیش روMasoud Zamani
Internet of Things - Future & Opportunities
اینترنت اشیاء به شبکهای از اجسام (اشیاء) فیزیکی اطلاق میشود که به کمک قطعات الکترونیکی، سنسورها و نرمافزارهای درون خودشان، با گردآوری و تحلیل دادههای مختلف، میتوانند ارزشی فراتر از کاربری معمول خود را خلق کنند. این ارائه تلاش دارد تا با آشناسازی مخاطبان با اینترنت اشیاء روندها و فرصتهای آتی بازار این حوزه را مشخص سازد.
-----
Videos:
Part 1: http://www.aparat.com/v/gGqhj
Part 2: http://www.aparat.com/v/EGe0f
Part 3: http://www.aparat.com/v/gAF0R
پلتفرمهای نرم افزاری و سخت افزاری پیاده سازی راهکارهای اینترنت اشیاءstartupIoT
در این گزارش پلتفرمهای نرم افزاری و سخت افزاری پیاده سازی راهکارهای اینترنت اشیاء مورد بررسی قرار گرفته است. حجم گزارش 56 صفحه. تهیه شده توسط مهندس علیرضا عبدشاه
طراحی و پیاده سازی سیستم کنترل هوشمند آبیاری گیاهان و باغچه (IoT) Behnaz Motavali
دفاع کارشناسی مهندسی کامپیوتر گرایش سخت افزار
دانشگاه صنعتی امیرکبیر (پلی تکنیک تهران)
استاد راهنما: دکتر محمود ممتازپور
آبان 1395
Design and Implementation of Smart Irrigation System for Plants and Garden (IOT)
B.Sc. Thesis Presentation
Amirkabir University of Technolo
Supervisor: Dr. Mahmoud Momtazpour
Nov 2016
In Persian
اینترنت اشیا و چالش های امنیتی پیش رو
معرفی فناوری اینترنت اشیا و کاربردهای آن و چالش های امنیتی و نحوه مقابله با آنها
فیلم وبینار مربوطه در:
http://www.quickheal.co.ir/webinar/webinar-videos/
Internet of Things - Future & Opportunities * اینترنت اشیاء - فرصتهای پیش روMasoud Zamani
Internet of Things - Future & Opportunities
اینترنت اشیاء به شبکهای از اجسام (اشیاء) فیزیکی اطلاق میشود که به کمک قطعات الکترونیکی، سنسورها و نرمافزارهای درون خودشان، با گردآوری و تحلیل دادههای مختلف، میتوانند ارزشی فراتر از کاربری معمول خود را خلق کنند. این ارائه تلاش دارد تا با آشناسازی مخاطبان با اینترنت اشیاء روندها و فرصتهای آتی بازار این حوزه را مشخص سازد.
-----
Videos:
Part 1: http://www.aparat.com/v/gGqhj
Part 2: http://www.aparat.com/v/EGe0f
Part 3: http://www.aparat.com/v/gAF0R
پلتفرمهای نرم افزاری و سخت افزاری پیاده سازی راهکارهای اینترنت اشیاءstartupIoT
در این گزارش پلتفرمهای نرم افزاری و سخت افزاری پیاده سازی راهکارهای اینترنت اشیاء مورد بررسی قرار گرفته است. حجم گزارش 56 صفحه. تهیه شده توسط مهندس علیرضا عبدشاه
کاربردهای اینترنت اشیاء در حوزه سازمانی و صنعت startupIoT
مروری بر کاربردهای اینترنت اشیاء در برخی صنایع مانند بانکداری، خودروسازی، نفت و گاز و همچنین مروری بر بیگ دیتا و اینترنت اشیاء. این اسلاید برای ارائه در گروه تلگرامی استارتاپ اینترنت اشیاء (10 بهمن 94 ساعت 22 الی 23) آپلود شده است. برای تبادل نظر در این خصوص به گروه استارتاپ اینترنت اشیاء بپیوندید. لینک عضویت در گروه http://bit.ly/1PKPKIs
The technology is facing enormous changes these days. All the objects and all issue can connect to the internet announce their location. To comprehend this vast science, Internet of Things (IoT), one needs to understand and get all the information about the sensors used in the IoT, collect the data (receive and transmit), and get all the information about the wireless sensors and network. All of the sensors used in this field, IoT, the RFID and NFC are the mostly used ones. The reason that IoT is in progress in this decade is its using and producing the complex sensors; hence re-ducing the production, service and utility cost. The IoT is applica-ble in almost all industries.
بیکان نوعی سنسور است که با شناسایی گوشی هوشمند در فواصل مشخص امکان تبادل داده بین گوشی و سیستم پشتیبان را بواسطه خود امکان پذیر می کند و بر این اساس کاربردهای مختلفی را میتوان مبتنی بر آن به کار گرفت
Network-security muhibullah aman-first edition-in PersianMuhibullah Aman
امنیت شبکه ها -یکی از دغدغه های اصلی متخصصین شبکه امروزی ُ امنیت شبکه ها است و امنیت شبکه عبارت از راه و روش های که بتوان دست هکر ها را از شبکه محدود و کوتاه کرد
Internet of Things (IoT) will enable dramatic society transformation. This seminar presents an introduction to the IoT and explains why IoT Security is important.
Then it presents security issues in wireless sensor networks that constitute a main ingredient of IoT.
Seminar given at Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) on 28 January 2015.
More and more IoT vulnerabilities are found and showcased at security events. From connected thermostats to power plants!
Insecurity became the favorite subject for creating catchy IoT headlines: "Connected killer toaster", "Fridges changed into spamming machines","Privacy concerns around connected home".
We will explore the five challenges one has to face when building a secure IoT solution:
- hardware security: how to avoid rogue firmwares and keep your security keys safe?
- upgrade strategy: you can't secure what you can't update!
- secure transport: no security without secure transports.
- security credentials distribution: how to distribute security keys to a fleet with millions of devices?
- cloud vulnerability mitigation, how to keep your fleet of devices safe from the next Heartbleed?
Current enterprise infrastructure provides solutions for handling application security but are they really matching the IoT challenge? Could running a PKI client on a low power wireless sensor node be an option?
Despite those difficulties, we will show how a modern IoT device management standard like Lightweight M2M with DTLS is the way for building a secur-first IoT solutions. It provides a solution for upgrading your device, distributing your security keys and comes with a full range of cryptography cipher suites, from PSK algorithm for very constrained devices to high level of security using X.509 certificates.
Furthermore for adding security to your solution we will present you ready to use opensource libraries for implementing secure IoT servers and devices. The way for quickly releasing your next catchy connected product.!
Ultimately we will showcase Wakaama and Leshan, the Eclipse IoT Lightweight M2M implementation maybe your next best friend in the troubled water of Internet-Of-Things security!
Internet of Things means every household or handy device which is used to make our world easy and better and connected with IP which transmit some data.
This slide covers IOT description, OWASP Top 10 2014 & its recommendations.
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
As a novel computing platform in network, IoT will bring many security challenges to enterprise networks, and create new opportunities for security industry. This talk will provide a general overview of enterprise network security problems, especially the data security, caused by IoT. After that, a few existing security technologies are evaluated as necessary elements of a holistic network security that cover IoT devices. These technologies include : (a) IoT security monitoring and control; (b) FOTA for firmware vulnerability management; (c) NetFlow based big data security analysis. In the end, the practice of standard security protocols (such as OpenIoC and IODEF) will be strongly advocated for delivering effective IoT security solutions.
Security in the Internet Of Things.
Every IoT project must be designed with security in mind. Identity Relationship Management is a must for a successful IoT implementation.
Understanding what is IoT security
What is the scope of IoT security
Uses of IoT and where do we see it in our daily life
Possible attack surface and likelihood of IoT-related attacks
IoT specific security assessment (understanding approach, IoT protocols, how it is a combination of different type assessments)
The myths of IoT security and the way it has progressed in past few years and how far fetched it can be.
Available Resources and Tools
Yesterday Pierluigi Paganini, CISO Bit4Id and founder Security Affairs, presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. The presentation highlights the security and privacy issues for the Internet of Things, a technology that is changing user’s perception of the technology.
استفاده از مفهوم نرمافزار آزاد، پیشرفتهای شگرفی را در حوزههای مرتبط با علوم کامپیوتری در دو دههٔ اخیر به همراه داشته است. بهبود عملکرد و پیشرفت در قابلیت اطمینان و صحت کارکرد، از مهمترین دستاوردهای ورود مفاهیم نرمافزارهای آزاد و متنباز به حوزه علوم کامپیوتری بود. در چندین سال اخیر، این مفاهیم به حوزهٔ الکترونیک و سختافزار نیز وارد شده و با ورود خود موجب افزایش قابلیت اطمینان، بهبود در راندمان، کاهش زمان طراحی (از ایده تا اجرا) و افزایش سرعت تولید محصولات الکترونیکی و مکاترونیکی شده است. در واقع تاریخ در این حوزه نیز تکرار شده است. در این میان، نقش سیستمهای عامل متنباز همانند گنو/لینوکس، که دقیقاً به علت آزاد و متنباز بودن به راحتی به معماریهای مختلف سختافزاری پورت شدهاند، بسیار پررنگ و حائز اهمیت است. در سالهای اخیر، گنو/لینوکس و مشتقات آن، با قدرتی بینظیر، به شکلی متفاوت و بسیار ساده به حوزه سختافزار وارد شده است. انتظار میرود با ورود شرکتهای بزرگ سختافزاری دنیا همانند اینتل، سامسونگ و بسیاری از شرکتهای مهم دیگر در سالهای پیش رو، حوزههای الکترونیک، اینترنت اشیا (IoT)، نرمافزارهای آزاد و جامعه آنها، سیستمهای بر روی تراشه (SoC) و کامپیوترهای فوق کوچک دارای سیستمعامل، با یکدیگر ترکیب و بیش از پیش موجب تحول در کسب و کارهای سنتی و مبتنی بر روشهای قدیمی طراحی سختافزار شود. در این مقاله نگاهی به پیشرفتهای حاصل شده در این زمینه و انتظارات سالهای پیش رو خواهیم داشت.
سرفصلها:
نرمافزارهای آزاد و راهیابی به به دنیای سیستمهای نهفته
الکترونیک دیجیتال و ورود سیستمعامل
سیستمهای نهفته و چالش کاربردهای بیدرنگ
اینترنت اشیاء، محلی برای نمایش قدرت نرمافزارهای آزاد
کاربردهای اینترنت اشیاء در حوزه سازمانی و صنعت startupIoT
مروری بر کاربردهای اینترنت اشیاء در برخی صنایع مانند بانکداری، خودروسازی، نفت و گاز و همچنین مروری بر بیگ دیتا و اینترنت اشیاء. این اسلاید برای ارائه در گروه تلگرامی استارتاپ اینترنت اشیاء (10 بهمن 94 ساعت 22 الی 23) آپلود شده است. برای تبادل نظر در این خصوص به گروه استارتاپ اینترنت اشیاء بپیوندید. لینک عضویت در گروه http://bit.ly/1PKPKIs
The technology is facing enormous changes these days. All the objects and all issue can connect to the internet announce their location. To comprehend this vast science, Internet of Things (IoT), one needs to understand and get all the information about the sensors used in the IoT, collect the data (receive and transmit), and get all the information about the wireless sensors and network. All of the sensors used in this field, IoT, the RFID and NFC are the mostly used ones. The reason that IoT is in progress in this decade is its using and producing the complex sensors; hence re-ducing the production, service and utility cost. The IoT is applica-ble in almost all industries.
بیکان نوعی سنسور است که با شناسایی گوشی هوشمند در فواصل مشخص امکان تبادل داده بین گوشی و سیستم پشتیبان را بواسطه خود امکان پذیر می کند و بر این اساس کاربردهای مختلفی را میتوان مبتنی بر آن به کار گرفت
Network-security muhibullah aman-first edition-in PersianMuhibullah Aman
امنیت شبکه ها -یکی از دغدغه های اصلی متخصصین شبکه امروزی ُ امنیت شبکه ها است و امنیت شبکه عبارت از راه و روش های که بتوان دست هکر ها را از شبکه محدود و کوتاه کرد
Internet of Things (IoT) will enable dramatic society transformation. This seminar presents an introduction to the IoT and explains why IoT Security is important.
Then it presents security issues in wireless sensor networks that constitute a main ingredient of IoT.
Seminar given at Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) on 28 January 2015.
More and more IoT vulnerabilities are found and showcased at security events. From connected thermostats to power plants!
Insecurity became the favorite subject for creating catchy IoT headlines: "Connected killer toaster", "Fridges changed into spamming machines","Privacy concerns around connected home".
We will explore the five challenges one has to face when building a secure IoT solution:
- hardware security: how to avoid rogue firmwares and keep your security keys safe?
- upgrade strategy: you can't secure what you can't update!
- secure transport: no security without secure transports.
- security credentials distribution: how to distribute security keys to a fleet with millions of devices?
- cloud vulnerability mitigation, how to keep your fleet of devices safe from the next Heartbleed?
Current enterprise infrastructure provides solutions for handling application security but are they really matching the IoT challenge? Could running a PKI client on a low power wireless sensor node be an option?
Despite those difficulties, we will show how a modern IoT device management standard like Lightweight M2M with DTLS is the way for building a secur-first IoT solutions. It provides a solution for upgrading your device, distributing your security keys and comes with a full range of cryptography cipher suites, from PSK algorithm for very constrained devices to high level of security using X.509 certificates.
Furthermore for adding security to your solution we will present you ready to use opensource libraries for implementing secure IoT servers and devices. The way for quickly releasing your next catchy connected product.!
Ultimately we will showcase Wakaama and Leshan, the Eclipse IoT Lightweight M2M implementation maybe your next best friend in the troubled water of Internet-Of-Things security!
Internet of Things means every household or handy device which is used to make our world easy and better and connected with IP which transmit some data.
This slide covers IOT description, OWASP Top 10 2014 & its recommendations.
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
As a novel computing platform in network, IoT will bring many security challenges to enterprise networks, and create new opportunities for security industry. This talk will provide a general overview of enterprise network security problems, especially the data security, caused by IoT. After that, a few existing security technologies are evaluated as necessary elements of a holistic network security that cover IoT devices. These technologies include : (a) IoT security monitoring and control; (b) FOTA for firmware vulnerability management; (c) NetFlow based big data security analysis. In the end, the practice of standard security protocols (such as OpenIoC and IODEF) will be strongly advocated for delivering effective IoT security solutions.
Security in the Internet Of Things.
Every IoT project must be designed with security in mind. Identity Relationship Management is a must for a successful IoT implementation.
Understanding what is IoT security
What is the scope of IoT security
Uses of IoT and where do we see it in our daily life
Possible attack surface and likelihood of IoT-related attacks
IoT specific security assessment (understanding approach, IoT protocols, how it is a combination of different type assessments)
The myths of IoT security and the way it has progressed in past few years and how far fetched it can be.
Available Resources and Tools
Yesterday Pierluigi Paganini, CISO Bit4Id and founder Security Affairs, presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. The presentation highlights the security and privacy issues for the Internet of Things, a technology that is changing user’s perception of the technology.
استفاده از مفهوم نرمافزار آزاد، پیشرفتهای شگرفی را در حوزههای مرتبط با علوم کامپیوتری در دو دههٔ اخیر به همراه داشته است. بهبود عملکرد و پیشرفت در قابلیت اطمینان و صحت کارکرد، از مهمترین دستاوردهای ورود مفاهیم نرمافزارهای آزاد و متنباز به حوزه علوم کامپیوتری بود. در چندین سال اخیر، این مفاهیم به حوزهٔ الکترونیک و سختافزار نیز وارد شده و با ورود خود موجب افزایش قابلیت اطمینان، بهبود در راندمان، کاهش زمان طراحی (از ایده تا اجرا) و افزایش سرعت تولید محصولات الکترونیکی و مکاترونیکی شده است. در واقع تاریخ در این حوزه نیز تکرار شده است. در این میان، نقش سیستمهای عامل متنباز همانند گنو/لینوکس، که دقیقاً به علت آزاد و متنباز بودن به راحتی به معماریهای مختلف سختافزاری پورت شدهاند، بسیار پررنگ و حائز اهمیت است. در سالهای اخیر، گنو/لینوکس و مشتقات آن، با قدرتی بینظیر، به شکلی متفاوت و بسیار ساده به حوزه سختافزار وارد شده است. انتظار میرود با ورود شرکتهای بزرگ سختافزاری دنیا همانند اینتل، سامسونگ و بسیاری از شرکتهای مهم دیگر در سالهای پیش رو، حوزههای الکترونیک، اینترنت اشیا (IoT)، نرمافزارهای آزاد و جامعه آنها، سیستمهای بر روی تراشه (SoC) و کامپیوترهای فوق کوچک دارای سیستمعامل، با یکدیگر ترکیب و بیش از پیش موجب تحول در کسب و کارهای سنتی و مبتنی بر روشهای قدیمی طراحی سختافزار شود. در این مقاله نگاهی به پیشرفتهای حاصل شده در این زمینه و انتظارات سالهای پیش رو خواهیم داشت.
سرفصلها:
نرمافزارهای آزاد و راهیابی به به دنیای سیستمهای نهفته
الکترونیک دیجیتال و ورود سیستمعامل
سیستمهای نهفته و چالش کاربردهای بیدرنگ
اینترنت اشیاء، محلی برای نمایش قدرت نرمافزارهای آزاد
Son algunas caratulas de historia que he elaborado para poder facilitar la decoración de cada inicio de tu cuaderno :D donde tambien podras editarlo(a) son de tamaño A4
Next Generation Embedded Systems Security for IOT: Powered by KasperskyL. Duke Golden
In an increasingly connected world full of new IOT technologies, the security risks are becoming the single biggest challenge as we advance toward a fully tech-enabled society. Kaspersky's security strategy is always - SECURE BY DESIGN.
Dalam rangka membuat perencanaan pemenuhan penjaminan mutu pendidikan di satuan pendidikan diharapkan berpedoman pada indikator Standar Nasional Pendidikan (SNP)
اتوماسیون اداری تحت وب به سیستم ها و نرم افزارهای متنوعی که به صورت دیجیتالی برای ایجاد؛ جمع آوری؛ ذخیره؛ دستکاری و انتقال اطلاعات دفتری مورد نیاز برای انجام کارهای اصلی مورد استفاده قرار می گیرد؛ اشاره دارد. ذخیرهسازی داده های پردازش نشده؛ انتقال الکترونیکی داده ها و فرآیندها و مدیریت اطلاعات در سازمان ها، از جمله اقدامات و وظایف مهم و اصلی یک سیستم اتوماسیون اداری را تشکیل می دهد.
جابجایی غیر قانونی داده ها (نشت اطلاعات ) تهدیدی جدی برای سازمانها است . مطالعه اخیر از 350شرکت نشان می دهد که بطور متوسط هزینه کل اخلال داده ها در امریکا برابر 8/3 میلیون دلار است . برای جلوگیری از این تهدید ، شرکتها مکانیسم محیط امنیتی خود را مانند فایروال را به منظور جلوگیری از جریان ناخواسته داده ها گسترش داده اند
در حوزه تجارت الکترونیک پروژهای دریافت شده است. این پروژه، پیادهسازی وب سایت ناشری آنلاین است؛ آنها به دنبال پیدا کردن بهترین ساختار، معماری، استاندارد، تکنولوژی، تکنیک و ... برای پیاده کردن راه حل خود میگردند.
Ceph: A Powerful, Scalable, and Flexible Storage SolutionYashar Esmaildokht
## Ceph: A Powerful, Scalable, and Flexible Storage Solution
Ceph is an open-source, distributed storage platform that offers a range of features, including object storage, block storage, and file systems. It provides a highly scalable, reliable, and flexible solution for managing your data.
Ceph's Key Components:
* RADOS (Reliable Autonomic Distributed Object Storage): Ceph's core storage component. It provides object storage capabilities and forms the basis for other services.
* RBD (RADOS Block Device): Ceph's block storage service. Allows you to create and manage block devices that can be attached to virtual machines or containers.
* CephFS (Ceph File System): Ceph's distributed file system. Offers scalable and reliable shared file system access for applications and users.
Ceph Backfill:
Backfill is a process used to repopulate data onto newly added OSDs (Object Storage Devices) in a Ceph cluster. Here's how it works:
1. Data Imbalance: When new OSDs are added, the cluster may have an imbalance in data distribution. Some OSDs might have more data than others.
2. Backfill Process: Ceph identifies the underutilized OSDs and starts copying data from overloaded OSDs to these new OSDs.
3. Data Balancing: The backfill process aims to achieve an even distribution of data across all OSDs in the cluster.
Ceph Scrub:
Scrubbing is a data integrity check that Ceph performs to detect and repair errors in stored data. Here's the process:
1. Data Verification: Ceph compares the data stored on different OSDs that hold replicas of the same object.
2. Error Detection: Any discrepancies between the data replicas are flagged as errors.
3. Data Repair: Ceph attempts to repair the errors by copying the correct data from another OSD.
Ceph Erasure Coding (EC):
Erasure coding is a technique used to increase data resilience and reduce storage overhead in a Ceph cluster.
* Data Chunking: Data is divided into smaller chunks, and a parity chunk is generated.
* Data Distribution: These chunks and parity chunks are distributed across multiple OSDs in the cluster.
* Data Recovery: Even if some OSDs fail, the lost data can be recovered from the remaining chunks and parity chunks.
Benefits of EC:
* Increased Data Resilience: Can tolerate more OSD failures without losing data.
* Reduced Storage Overhead: Reduces the total storage capacity required for storing data replicas.
* Improved Performance: Can enhance performance by spreading the data load across more OSDs.
Understanding Ceph, backfill, scrub, and EC is crucial for efficient operation and maintenance of a Ceph cluster. These mechanisms ensure data integrity, availability, and scalability, making Ceph a robust and powerful solution for storage management.
Software-Defined Networking (SDN) is a novel approach to network management that separates the control plane and data plane in network devices, allowing for centralized planning and control of networks. In traditional networks, routing decisions and network settings are made on individual switches and routers. In SDN, however, these decisions are made through a centralized software controller.
One key aspect of SDN is its high programmability. This means that network administrators can dynamically adjust network settings and controls using programming interfaces (APIs). This programmability enhances network flexibility and adaptability to changing needs.
SDN enables increased network efficiency, cost savings, and improved reliability and security through centralized management and software-based planning. This new approach to network architecture provides organizations with solutions and opportunities to enhance network performance and management. It is considered a leading-edge solution in information technology, offering greater capabilities for network improvement and management.
Service registry and service discovery are two important concepts in the field of distributed systems and microservices architecture.
Service registry is a centralized database that contains information about available services in a distributed system. Each service instance registers itself with the service registry upon startup, providing metadata such as its network location, endpoint, and health status. This allows other services to discover and communicate with each other without hardcoding IP addresses or endpoints.
Service discovery is the process of dynamically locating and connecting to services in a distributed system. Instead of relying on static configurations or hardcoded endpoints, services use a service discovery mechanism to query the service registry and retrieve the necessary information to establish connections with other services. This allows for more flexible and resilient communication between services, as instances can be added or removed from the system without affecting the overall functionality.
Service registry and service discovery are essential components of modern microservices architectures, enabling services to be loosely coupled, scalable, and easily deployable. Popular tools for implementing service registry and service discovery include Consul, etcd, Zookeeper, and Kubernetes.
In Linux, a process is an instance of a running computer program. It's the basic unit of execution where a program is executed. Every process in Linux is assigned a unique Process ID (PID) which is used to identify the process.
Processes in Linux can be either in the foreground or background. Foreground processes are those that interact with the user, while background processes run without user intervention.
Linux processes inherit attributes and resource limits from their parent processes, and new processes can be created using the fork() system call. Child processes can further replace their memory space with a new program using the exec() system call.
Processes can be managed using various commands like ps (to display information about processes), top (to show currently running processes), kill (to terminate processes), and many others.
Linux provides a robust set of process management features, allowing for efficient multitasking and resource utilization. The Linux scheduler handles process scheduling, ensuring that CPU time is allocated effectively among running processes.
Overall, processes in Linux form the backbone of the operating system, enabling it to manage various tasks and run multiple programs concurrently.
NBD (Network Block Device) and nbdkit are related technologies in the realm of virtualization and storage. They allow you to work with remote block devices and create flexible storage solutions. Here's an overview of each:
1. NBD (Network Block Device):
NBD is a protocol that allows you to access remote block devices over a network, as if they were local block devices. It provides a way to export disk images or block devices from a server to clients, enabling remote access and manipulation of these devices.
Key features of NBD include:
Block-Level Access: NBD operates at the block level, allowing you to read from and write to specific blocks on a remote device.
Flexibility: It's used in various scenarios such as diskless booting, live migration of virtual machines, and remote disk access for storage solutions.
Network Transport: NBD operates over the network and typically uses TCP/IP as the underlying transport.
Read-Only and Read-Write Modes: You can access remote devices in both read-only and read-write modes.
2. nbdkit:
nbdkit is a pluggable NBD server, providing a flexible and extensible way to serve remote block devices. It acts as an NBD server that can be extended using various plugins, allowing you to create custom storage solutions tailored to your needs.
MariaDB and MySQL are both popular open-source relational database management systems (RDBMS) that are used to store, organize, and manage data. They are both based on the same core software, which was originally developed by MySQL AB, but MariaDB is a fork of MySQL that was created in 2009 due to concerns about the acquisition of MySQL by Oracle Corporation.
MariaDB and MySQL have many similarities, including their architecture, syntax, and functionality. Both databases use SQL (Structured Query Language) to manage data and support a wide range of programming languages. They also offer features such as replication, clustering, and partitioning to improve performance and scalability.
However, there are also some differences between MariaDB and MySQL. MariaDB has some additional features and improvements over MySQL, such as better performance, improved security, and more storage engines. MariaDB also supports more data types than MySQL and has more built-in functions.
Overall, both MariaDB and MySQL are powerful and reliable RDBMS options for managing data, and the choice between them may depend on specific needs and preferences.
OpenStack Designate is a DNS as a Service (DNSaaS) solution that is part of the OpenStack cloud computing platform. It provides a scalable, reliable, and highly available DNS infrastructure for cloud-based applications and services.
Designate enables users to manage their domain names and DNS records through a RESTful API or a web-based dashboard. It supports various record types, including A, AAAA, CNAME, MX, NS, PTR, SRV, and TXT. Users can also create and manage zones, which are collections of DNS records that define a domain name's authoritative name servers.
Designate integrates with other OpenStack services such as Keystone, Nova, Neutron, and Horizon. It also supports integration with external DNS providers, allowing users to easily switch between providers or use multiple providers for redundancy.
Designate is designed to be highly scalable and fault-tolerant. It uses a distributed architecture that allows it to handle millions of DNS queries per second and ensures high availability even in the event of node failures.
Overall, OpenStack Designate provides a flexible and powerful DNSaaS solution that simplifies the management of domain names and DNS records in cloud-based environments.
Rados Gateway (radosgw) is an object storage gateway that provides RESTful (Representational State Transfer) API interface to access Ceph Storage Cluster. It allows applications to store and retrieve objects in the cluster using popular S3 and Swift APIs, making it compatible with a wide range of existing applications and libraries. Radosgw also supports multi-site replication, lifecycle management, cross-origin resource sharing (CORS), and other advanced features that make it a versatile solution for building distributed object storage systems. Radosgw is a part of the Ceph distributed storage system and can be deployed as a standalone service or as part of a Ceph Storage Cluster.
CacheFS is a filesystem caching technology developed for UNIX-like operating systems .It is designed to cache the contents of a remote filesystem onto the local disk to improve performance by reducing the number of network requests needed to access frequently used files. CacheFS works by intercepting requests to access remote files and serving them from the local disk cache, rather than accessing them over the network every time they are needed.
CacheFS is used primarily in situations where network bandwidth is limited or where the latency of remote access is high, such as in WAN or satellite link scenarios. It is often used to speed up access to file servers, such as Network File System (NFS) servers.
some of its features have been incorporated into other caching technologies, such as the Squid web proxy cache.
2. In the name of god
Biography :
My name is : yashar esmaildokht
I am Gnu/Linux Sys/net/sec Admin & Oracle Dba
my tel : 09141100257
my resume :http://www.nofa.ir/Resume-royaflash.aspx
website :
●
http://unixmen.ir
●
http://oraclegeek.ir
●
http://webmom.ir
my nick name : royaflash
29. What is SHODAN?
● SHODAN (http://www.shodanhq.com/) is a
● computer search engine designed by web
developer John Matherly
● While SHODAN is a search engine, it is
● much different than content search
● engines like Google, Yahoo or Bing
30. Typical search engines crawl for data on
● web pages and then index it for searching
● SHODAN interrogates ports and grabs the
● resulting banners, then indexes the
● banners (rather than the web content) for
● searching
●
31.
32. Basic Operations: Login
● Create and login using a SHODAN account;
● or
● Login using one of several other options
● (Google, Twitter, Yahoo, AOL, Facebook,
● OpenID
● Login is not required, but country and net
● filters are not available unless you login
● Export requires you to be logged in
●
33. Basic Operations: Filters
● country: filters results by two letter country code
● hostname: filters results by specified text in the
● hostname or domain
● net: filter results by a specific IP range or subnet
● os: search for specific operating systems
● port: narrow the search for specific services
●
34.
35.
36.
37. Basic Operations: Hostname Filter
● Search results can be filtered using any portion
of
● a hostname or domain name
38. Basic Operations: Export
● SHODAN lets you export up to 1,000
● results per credit in XML format
● Credits can be purchased online
● Sample data export file is available
39. Pen Testing Applications
● Using SHODAN for penetration testing
● requires some basic knowledge of
● banners including HTTP status codes
● Banners advertise service and version
● Banners can be spoofed (unlikely?)
40.
41. Case Study: Cisco Devices
● Here is a typical “401 Unauthorized” banner
● when using the simple search term “cisco”:
Take note of the Www-authenticate line which indicates the
requirement for a
username and password
42. Case Study: Cisco Devices
● A comparison of the two banners finds the
second banner
● to include the Last-modified line which does not
appear
● when Www-authenticate appears:
43. Case Study: Default Passwords (1)
● The „default password search locates
● servers that have those words in the
● banner
● This doesn t suggest that these results will
● be using the defaults, but since they re
● advertising the defaults they would
● potentially be the lowest hanging fruit
44. An example of a „default password result:
The server line indicates this is likely to be a print server; also note
the “401” and Www-authenticate which indicates the likelihood of
a username and password pop-up box