Cover image for Open Source for Windows Administrators.
Open Source for Windows Administrators.
Title:
Open Source for Windows Administrators.
Author:
Gross, Christian.
ISBN:
9781584506621
Personal Author:
Physical Description:
1 online resource (689 pages)
Contents:
Contents -- 1 Introduction to Open Source -- About this Book -- The Origins of Open Source -- The Three Cs -- Should an Administrator Care About Open Source? -- Understanding the Open Source Licenses -- What Hardware and Software Should an Administrator Use? -- Understanding Open Source Packages -- Summary -- 2 Writing Scripts Using a Shell and Its Associated Tools -- About this Chapter -- Understanding the Windows Shell -- Filesystems -- Mounting a Device in a Directory -- Modern File Management in Windows -- Windows Shell and Environment -- Integration: Registry -- Project: Cygwin -- Additional Notes -- Impatient Installation -- Deployment: File Server Variant -- Deployment: Automated Installation of Cygwin -- Deployment: Tweaking the Environment -- Technique: Understanding Command-Line Applications -- Technique: Managing Files and Directories -- Technique: Running the Shell -- Technique: Getting Help Using man -- Technique: Editing Files with Vi (VIM) -- Technique: Writing BASH Scripts -- Technique: Using Regular Expressions -- Technique: Some Additional Commands -- Technique: Using awk to Process Data -- Summary -- 3 Using Python to Write Scripts -- About this Chapter -- Project: Python -- Additional Notes -- Impatient Installation -- Deployment: Simple Python Distribution -- Deployment: Python.org Distribution -- Deployment: External Python Modules -- Technique: Learning the Python Shell -- Technique: Writing Python Code -- Technique: Interacting with the Environment -- Technique: Integrating with BASH Scripts -- Summary -- 4 Managing Security Using Encryption and Privacy Tools -- About this Chapter -- Securing a Windows Computer -- Managing a Windows Computer Security Policy -- Managing Updates -- Project: GNU Privacy Guard and Windows Privacy Tray -- Additional Notes -- Impatient Installation -- Deployment.

Technique: Trusting Content Using PKI -- Technique: Creating and Deleting Keys -- Technique: Encrypting and Decrypting Content -- Technique: Passing the Passphrase on the Console -- Technique: Signing Documents -- Technique: I Lost My Public or Private Key, Help! -- Technique: Using WinPT -- Project: OpenPGP Public Key Server -- Impatient Installation -- Deployment -- Technique: Adding Keys to the Key Server -- Technique: Deleting Keys from the Key Server -- Project: STunnel and OpenSSL -- Impatient Installation -- Deployment -- Technique: Generating a Server Certificate -- Technique: Signing a Certificate By a CA -- Technique: Becoming a Signing Authority -- Technique: Enabling SSL on a Non-SSL Enabled Application -- Technique: Redirecting a Port -- Technique: Port Redirection and Authentication -- Project: OpenVPN -- Additional Notes -- Deployment and Impatient Installation -- Technique: Installing OpenVPN as a Service -- Technique: Creating a Static Key -- Technique: Creating a Peer-to-Peer Network -- Technique: Setting Up a Network -- Technique: Using Certificates for Authentication -- Technique: Disabling a VPN User -- Summary -- 5 Running Tasks on a Local Computer -- About this Chapter -- Automated Script Execution -- Computer Startup and Shutdown Scripts -- Profile and Login Scripts -- Running Tasks Periodically -- Project: XYNTService -- Additional Notes -- Impatient Installation and Deployment -- Technique: Running a Console Program -- Technique: Restarting the Processes -- Technique: Restarting Services and XYNTService -- Project: VNC Server -- Additional Notes -- Impatient Installation -- Deployment -- Technique: Tweaking the Server -- Project: Unison -- Additional Notes -- Deployment and Impatient Installation -- Technique: Setting Up a Unison Server -- Technique: Running a Client Process -- Technique: How Unison Synchronizes.

Technique: Selectively Synchronizing Files and Paths -- Technique: Backing Up Original Versions of the Files -- Project: 7-Zip -- Additional Notes -- Impatient Installation -- Deployment -- Technique: Expanding an Archive from the Console -- Technique: Creating and Updating an Archive from the Console -- Technique: Assigning a Password -- Technique: Creating a Self-Extracting Archive -- Tweaking Your Environment -- Additional Notes -- Summary -- 6 Authentication and Managing Files -- About this Chapter -- Why Linux? -- Project: OpenLDAP -- Impatient Installation -- Deployment: OpenLDAP Server -- Technique: Initializing the OpenLDAP security -- Technique: Structuring an LDAP Database -- Technique: Managing LDAP Database Content Using LDIF Files -- Technique: Manipulating LDAP Data in a Script -- Technique: Securing the LDAP Server -- Technique: Replicated Directory Service -- Technique: Indexing -- Technique: Some Common Configuration Tips -- Project: Samba -- Additional Notes -- Documentation -- Impatient Installation -- Deploying Samba -- Technique: Starting and Restarting Samba -- Technique: Guest File Sharing -- Technique: Sharing Files Using File-Based Security -- Technique: Managing a Closed Group Global Share -- Technique: Using Macros to Create Dynamic Shares -- Technique: Adding a Samba Server to an Existing Domain -- Technique: Resolving Network Servers Using WINS -- Technique: Defining a Primary Domain Controller (PDC) -- Technique: More Advanced Techniques -- Summary -- 7 Managing Data Stores -- About this Chapter -- Project: MySQL -- Additional Notes -- Impatient Installation -- Deployment: MySQL Server -- Deployment: MySQL APIs -- Technique: Managing the MySQL Service -- Technique: Using the MySQL Control Center -- Technique: Querying a Database -- Technique: Automating Queries Using Scripts -- Technique: Creating a Database.

Technique: Creating and Managing Tables -- Technique: Managing Users and Security -- Technique: Backing Up and Dumping a Database -- Technique: Replicating a Database -- Technique: Performance Tuning and Profiling -- Summary -- 8 Generating Web Content -- About this Chapter -- Project: Apache HTTPD -- Impatient Installation -- Deployment: Apache HTTPD Server and Modules -- Technique: Managing the Configuration File -- Technique: Stopping the Apache Process -- Technique: Multi-Processing Modules (MPM) Tuning -- Technique: Block Defined Configuration Files for Dynamic Configuration -- Technique: Cross-Referencing Directives with Modules -- Technique: Defining URLs -- Technique: Running CGI Programs and Modules -- Technique: Logging Requests -- Technique: Virtual Hosting -- Technique: Serving Content in Multiple Languages and Formats -- Technique: Custom Error Pages -- Technique: Activating SSL -- Technique: Authentication -- Authenticating Using Passwords -- Technique: Providing a User Home Access -- Technique: User Tracking -- Technique: URL Rewriting -- Technique: Installing PHP -- Technique: Sharing Files Using WebDAV -- Summary -- 9 Processing E-mail -- About this Chapter -- An E-mail Strategy -- Project: XMail Server -- Impatient Installation and Deployment -- Technique: Controlling Relay -- Technique: Configuring the XMail Server Programmatically -- Technique: Adding a Domain -- Technique: Adding a User to a Domain -- Technique: Assigning User Filters and Properties -- Technique: Using Scripting and Local E-mails to Implement Autoresponders -- Technique: Mail Scanning, Verified Responder, and Other Tasks -- Technique: Managing Mailing Lists -- Technique: Routing and Managing Domains and Aliases -- Technique: Changing a Port, Logging Requests, Performance Tuning, and Controlling Relay -- Technique: Synchronizing with a POP3 Account.

Technique: Custom Authentication -- Project: ASSP -- Understanding the Spam Problem -- Solution: ASSP -- Impatient Installation and Deployment -- Technique: Rebuilding a Spam Database -- Technique: Building a Ring of Trust -- Technique: Additional Processing Techniques to Determine Spam Level -- Technique: Managing Processed E-mails -- Technique: Managing and Allowing Relaying -- Technique: Adding, Deleting, and Modifying White Lists or Spam Databases -- Project: E-mailRelay -- Impatient Installation and Deployment -- Technique: Using E-mailRelay as a Proxy -- Technique: Using E-mailRelay as a Spooler -- Technique: Assigning Logging, Port Definition, and Other Settings -- Technique: Using E-mailRelay as a Filter -- Technique: Using E-mailRelay for User Authentication -- Summary -- 10 Productivity Applications -- About this Chapter -- Are Mozilla and OpenOffice Usable? -- OpenOffice Issues -- Mozilla Issues -- Project: OpenOffice -- Impatient Installation -- Deployment -- Technique: Other Languages and Dictionaries -- Technique: Managing Document Templates -- Technique: Creating and Binding a Macro -- Technique: Analyzing the Document Structure -- Technique: Using Auto Pilots -- Technique: Writing Automation Scripts Using OpenOffice Basic or Python -- Technique: Creating Database Bindings in OpenOffice -- Project: Mozilla -- Impatient Installation -- Deployment -- Technique: Relocating an Installation -- Technique: Managing Security Policies -- Technique: Managing Accounts and Folders -- Technique: Using the Spam Filters -- Technique: Installing and Managing Plug-ins such as Java or Flash -- Technique: Relocating User Profiles -- Technique: Using Profiles -- Summary -- Appendix A: About the DVD -- Appendix B: Open Source License -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W.

X.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: