Friday, December 21, 2007

Networking Interview Questions-2nd part

Can you define protocol?
Can you explain the concept of Interlayer and multilayer approach?
What is a protocol stack or protocol suite?
Can you explain the concept of OSI layer?
Can you explain the different layers in OSI model?
Can you explain Application layer in OSI model?
Can you explain Presentation layer in OSI model?
Is it compulsory that compression, encryption and translation functions will be used during communication?
Can you explain Session layer in OSI model?
What’s the concept of Simplex, Half Duplex and Full Duplex dialogs?
What are the different types of dialogs in Session layer?
Can you explain Transport layer in OSI model?
Can you explain the concept of Congestion?
Can you explain Application layer in OSI model?
Can you explain the concept of DPU, Segments, Datagram, Frame and packet?Can you explain the concept of Repeaters, Hubs, Bridges, Switches, Routers, Layer 3 switches and CSU/DSUs?why does collision occur in HUBS and repeaters?
Can you explain the concept of Collision domain?
Can you explain the difference between Base band and Broad Band?

Networking Interview questions-1st part

Can you define protocol? 6
Can you explain the concept of Interlayer and multilayer approach? 6
What is a protocol stack or protocol suite? 6
Can you explain the concept of OSI layer? 6
Can you explain the different layers in OSI model? 7
Can you explain Application layer in OSI model? 8
Can you explain Presentation layer in OSI model? 8
Is it compulsory that compression, encryption and translation functions will be used during communication? 9
Can you explain Session layer in OSI model? 10
What’s the concept of Simplex, Half Duplex and Full Duplex dialogs? 10
What are the different types of dialogs in Session layer? 10
Can you explain Transport layer in OSI model? 11
Can you explain the concept of Congestion? 11
Can you explain Application layer in OSI model? 13
Can you explain what an IP address is? 14
How to convert Decimal to Binary? 14
How many IP addresses can come in IPV4? 17
Can you explain the concept of Unicast IP address? 17
Can you explain the concept of IP multicasting or multicast IP address? 18
How many different types of subnet classful networks are present? 18
What are the IP address ranges for public and private IP address? 18
Why do we need class and how many different types of class exists? 18
How are the IP addresses distributed between different classes? 19
Can you explain what is classful IP addressing? 19
Can you explain the concept of subnetting? 20
What are the advantages of using subneting? 21
If the host has the subnet ID why do we need a subnet mask? 21
What is the advantage of using classless addressing over classful addressing scheme? 21
Can you explain the concept of CIDR? 21
Twist :- Can you explain superneting ? 21
Can you explain concept of custom subneting? 24
What is the implication of increasing and decreasing subnet Bits? 24
Why do we need to subtract two from number of hosts? 24
Can you explain the concept of VLSM? 25
Routers 27
Can you explain the concept of DPU, Segments, Datagram, Frame and packet? 28
What is IP datagram fragmentation and MTU? 29
Can you explain in detail with example how data fragmentation works? 29
Larger the IP datagram less the overhead, is it true or false? 30
What is the minimum size of MTU bytes? 31
Can you explain how optimal MTU size is calculated? 31
How does the IP message finally reassemble? 32
Can you explain the concept of Repeaters, Hubs, Bridges, Switches and Routers? 33
Can you explain the concept of Layer 3 switches? 34
what are CSU, DSU and TSU? 35
what are the basic components of the router? 35
Can you explain the WAN and LAN Interface in Routers? 36
What are DB-15, DB-60 and RJ-45 in CISCO routers? 37
Can you explain the concept of TTL? 37
What is the concept of ICMP packets? 37
Which operating system does CISCO have? 38
Can you explain the concept of NAT? 38
Can you explain how actually NAT works? 39
why does collision occur in HUBS and repeaters? 41
Can you explain the concept of Collision domain? 41
What is the concept of routing tables? 41
what is the use of route print? 42
Can you explain how in detail how routing table looks like? 42
How can you see route tables on the router? 44
Can you explain the concept of static and dynamic routing? 44
When to use Static routes and dynamic routes? 44
How do you configure static routes on a router? 45
Can you explain static default routes? 46
What is the advantage of using Static default routes? 47
Why do workstations have route tables? 47
What is the concept of gateway of last resort? 49
Can you explain the concept of routing protocol? 49
What activities does routing protocol perform? 49
What metrics are used by routing protocols to determine the best path? 50
Can you explain what is interior and exterior routing protocols? 50
Can you explain the concept of intradomain and interdomain routing protocols? 51
Can you explain the concept of internetwork and intranetwork routing protocols? 51
Which method does routing protocol use to determine shortest path? 51
What is distance vector routing protocol? 51
How do router share information in Distance Vector routing? 52
What is the main issue with routing by rumor? 52
Can you explain the count-to-infinity problem in distance vector? 53
How is metric or the cost calculated for Distance Vector routing protocol? 53
What is the main issue with hop count metric issue? 54
Can you explain how Link-State routing protocols work? 56
Can you explain the concept of broad cast and multi-cast? 56
Can you tell which protocols lie in Distance vector and which in Link-State? 57
What’s the difference between distance vector and link-state protocol? 58
Can you explain difference between Single path and Multipath? 58
Can you explain route summarization? 59
How are the series of IP combined in to one route path in route summarization? 60
Can you explain RIP protocol? 62
How is route table populated by RIP protocol? 63
Can you explain convergence in networks? 64
Can you explain RIP timers in detail? 65
Can you explain routing loop issue in RIP protocol? 65
How do we avoid routing loop issue in RIP? 66
In RIP why do we have HOP count of 15? 67
How do we disable auto-summarization in RIP? 67
Can you explain IGRP? 68
How does IGRP work? 68
How many timers does IGRP have? 68
How does IGRP calculate metric? 69
Can multiple instance of IGRP run on one physical router? 71
How is load balancing done in IGRP? 71
What’s the command to configure IGRP? 72
Can you explain EIGRP? 73
What does neighbor terminology mean in EIGRP? 73
What are different types of packets in EIGRP? 73
How does EIGRP protocol update route information to its neighbors? 74
What is the concept of successor in EIGRP? 74
What is DUAL in EIGRP? 74
Can you explain reported distance (RD), feasibility distance (FD) and Feasibility condition (FC)? 74
Can you explain the concept of successor and feasible successor? 75
Can you explain passive and active route states? 75
What is SIA or stuck in active? 75
How do packets and timers in EIGRP work? 75
What are the different tables used in EIGRP? 76
Can you explain EIGRP metrics? 77
Can you explain how EIGRP finds its successor and feasible successor? 77
Can you explain Active and Passive route? 78
Can you explain OSPF? 79
How does OSPF populate route table? 80
What are the different tables in OSPF? 81
Can you explain different areas in OSPF? 82
Can you explain different router types in OSPF? 83
Can you explain Designated Router and Backup designated router? 83
Can you explain different router states in OSPF? 83
Can you explain different OSPF packet types? 84
What are the different types of OSPF timers? 85
How SPF algorithm does the route determination? 86
Can you explain autonomous system? 89
What are different types of dynamic protocols? 89
Can you explain autonomous numbers in EGP? 89
What is BGP? 89
What is the concept of BGP speakers and Peers? 90
What is EBGP and IBGP? 90
What is RIB? 90
Can you explain the concept of BGP confederations? 91
What are BGP path attributes? 91
What is the concept of NLRI? 92
How are routing neighbors discovered in BGP? 92
Can you explain how BGP does the decision process? 92
What is the concept of redistribution? 93
Can you explain the concept of one way redistribution and mutual distribution? 94
How does metric translation takes place in redistributing routes? 94
Can you explain the difference between Base band and Broad Band? 96
Firewall 113
Can you define what a FIREWALL is? 113
What are the different types of firewalls? 114
Can you explain packet filtering firewall? 118
Can you explain circuit level gateway? 118
Can you explain stateful inspection? 118
What is Application Gateway? 118
Is NAT a firewall? 118
Are personal firewall actually firewalls? 118
Can you explain the concept of demilitarized zone? 119
What is the meaning of bastion host? 119

Project Management Interview Questions

Project Management Interview Questions
Basics
Define project?
Who is a stakeholder?
Can you explain Scope triangle?
Can you explain what’s a vision and a goal?
What is ROI?
Can you explain project life cycle?
You have people in your team who do not meet there deadlines or do not perform what are the actions you will take?
Are risk constant through out the project?
Explain SDLC (Software development Life Cycle) in detail?
Can you explain waterfall model?
Can you explain big-bang waterfall model?
Can you explain phased waterfall model?
Explain Iterative model, Incremental model, Spiral model, Evolutionary model and V-Model?
Explain Unit testing, Integration tests, System testing and Acceptance testing?
what’s the difference between system and acceptance testing?
Which is the best model?
What is CAR (Causal Analysis and Resolution)?
What is DAR (Decision Analysis and Resolution)?
Can you explain the concept of baseline in software development?
What is the software you have used for project management?
What does a project plan consist?
When do you say the project has finished?
Can you explain what a PMO office is?
How many members in your team you have handled?
Is GANTT chart a project plan?
Two resources are having issues how do you handle the same?
What is a change request?
How did you manage change request in your project?
Can you explain traceability matrix?
what is configuration management?
What is CI?
Define stakeholders?
Can you explain versioning?
Can you explain the concept of sign off?
How will you start a project?
what is an MOU?
What where the deliverables in your project?
Can you explain your project?
Do you also participate in technical activities?
How did you manage code reviews?
you have team member who does not meets his deadlines how do you handle it?
did you have project audits if yes how was it handled?
What is a non-conformance report (NCR)?
How did you estimate your project?
How did you motivate your team members?
did you create leaders in your team if yes how?
how did you confirm that your modules are resource independent?
Was your project show cased for CMMI or any other project process standardization?
what are the functions of the Quality Assurance Group (QAG)?
Can you explain milestone?
How did you do assessment of team members?
What does entry and exit criteria mean in a project?
Risk Management
Define risk?
What is risk break down structure?
How did you plan your risk?
what is DR, BCP and contingency planning?
Schedule Management
Can you explain WBS?
Can you explain WBS numbering?
How did you do resource allocation?
Can you explain the use of WBS?
Can you explain network diagram?
What are the different types of network diagram?
What is the advantage of using network diagrams?
Can you explain Arrow diagram and Precendence diagram?
What are the different types of Network diagrams?
Can you explain Critical path?
Can you define EST, LST, EFT, LFT?
Can you explain Float and Slack?
Can you explain PERT?
Can you explain GANTT chart?
What is the disadvantage of GANTT chart?
What is Monte-Carlo simulation?
Costing
Can you explain PV, AC and EV?
Can you explain BCWS, ACWS and BCWP?
What are the derived metrics from Earned Value?
Can you explain earned value with a sample?
Estimation, Metrics and Measure
What is meant by measure and metrics?
Which metrics have you used for tracking purpose?
What are the various common ways of estimation?
Can you explain LOC method of estimation?
How do we convert LOC in to effort?
Can you explain COCOMO?
Can you explain Intermediate COCOMO and COCOMO II?
How do you estimate using LOC?
Can you explain in brief Function points?
Can you explain the concept Application boundary?
Can you explain the concept of elementary process?
Can you explain the concept of static and dynamic elementary process?
Can you explain concept of FTR, ILF, EIF, EI, EO , EQ and GSC ?
How can you estimate number of acceptance test cases in a project?
Can you explain the concept of Use Case’s?
Can you explain the concept of Use case points?
What is a use case transaction?
How do we estimate using Use Case Points?
Can you explain on what basis does TPA actually work?
How did you do estimation for black box testing?
How did you estimate white box testing?
Is there a way to estimate acceptance test cases in a system?
Can you explain Number of defects measure?
Can you explain number of production defects measure?
Can you explain defect seeding?
Can you explain DRE?
Can you explain Unit and system test DRE?
How do you measure test effectiveness?
Can you explain Defect age and Defect spoilage?
Software process
What is a Software process?
what are the different cost element involved in implementing process in an organization?
What is a model?
What is maturity level?
Can you explain the concept of process area in CMMI?
Can you explain the concept of tailoring?
CMMI
What is CMMI?
what’s the difference between implementation and Institutionalization?
what are different models in CMMI?
Can you explain staged and continuous models in CMMI?
Can you explain the different maturity levels in staged representation?
Can you explain capability levels in continuous representation?
which model should we use and under what scenarios?
How many process areas are present in CMMI and in what classification do they fall in?
What the difference between every level in CMMI?
what different sources are needed to verify authenticity for CMMI implementation?
Can you explain SCAMPI process?
How is appraisal done in CMMI?
which appraisal method class is the best?
Can you explain the importance of PII in SCAMPI?
Can you explain implementation of CMMI in one of the Key process areas?
Explanation of all process areas with goals and practices?
Can you explain the process areas?
Six Sigma
What is six sigma?
Can you explain the different methodology for execution and design process in SIX sigma?
What does executive leaders, champions, Master Black belt, green belts and black belts mean?
What are the different kinds of variations used in six sigma?
Can you explain the concept of standard deviation?
Can you explain the concept of fish bone/ Ishikawa diagram?
What is Pareto principle?
Can you explain QFD?
Can you explain FMEA?
Can you explain X bar charts?
Can you explain Flow charting and brain storming?
Agile Development
What does Agile mean?
Can you explain Agile modelling?
What are core and supplementary principles in Agile modeling?
What is the main principle behind Agile documentation?
What are the different methodologies to implement Agile?
What is XP?
What are User Stories in XP and how different are they from requirement?
Who writes User stories?
When do we say a story is valid?
When are test plans written in XP?
Can you explain the XP development life cycle?
Can you explain how planning game works in Extreme Programming?
How do we estimate in Agile?
On What basis can stories be prioritized?
Can you point out simple differences between Agile and traditional SDLC?
Can you explain the concept of refactoring?
What is a feature in Feature Driven Development?
Can you explain the overall structure of FDD project?
Can you explain the concept of time boxing?
When to choose FDD and when to choose XP?
What is SCRUM?
What does product owner, product back log and sprint mean in SCRUM?
Can you explain how SCRUM flows?
Can you explain different roles in SCRUM?
Can you explain DSDM?
Can you explain different phases in DSDM?
Can you explain in detail project life cycle phase in DSDM?
Can you explain LSD?
Can you explain ASD?

Cisco Documentation DVD August 2006

Image Hosted by ImageShack.us


Contents:
Introduction
Application Networking Services
Broadband Cable
Cisco Interfaces and Modules
Cisco IOS Software
Cisco IOS XR Software
Interoperability Systems
Network Management
Optical Networking
Routers
Security and VPN
Server Networking and Virtualization
Service Exchange
Storage Networking
Switches
Universal Gateways and Access Servers
Video
Voice and Unified Communications
Wireless
Obtaining Documentation

Cisco.com
Product Documentation DVD
Ordering Documentation
Documentation Feedback
Cisco Product Security Overview
Reporting Security Problems in Cisco Products
Product Alerts and Field Notices
Obtaining Technical Assistance
Cisco Support Website
Submitting a Service Request
Definitions of Service Request Severity
Obtaining Additional Publications and Information.

Download:
rapidshare.com/files/44690232/CDA2oo6.part01.rar
rapidshare.com/files/44694727/CDA2oo6.part02.rar
rapidshare.com/files/44698985/CDA2oo6.part03.rar
rapidshare.com/files/44703268/CDA2oo6.part04.rar
rapidshare.com/files/44707684/CDA2oo6.part05.rar
rapidshare.com/files/44713002/CDA2oo6.part06.rar
rapidshare.com/files/44718169/CDA2oo6.part07.rar
rapidshare.com/files/44723396/CDA2oo6.part08.rar
rapidshare.com/files/44728619/CDA2oo6.part09.rar
rapidshare.com/files/44733670/CDA2oo6.part10.rar
rapidshare.com/files/44739198/CDA2oo6.part11.rar
rapidshare.com/files/44745412/CDA2oo6.part12.rar
rapidshare.com/files/44751095/CDA2oo6.part13.rar
rapidshare.com/files/44757027/CDA2oo6.part14.rar
rapidshare.com/files/44763584/CDA2oo6.part15.rar
rapidshare.com/files/44770281/CDA2oo6.part16.rar
rapidshare.com/files/44800957/CDA2oo6.part17.rar
rapidshare.com/files/44834766/CDA2oo6.part18.rar
rapidshare.com/files/44839752/CDA2oo6.part19.rar
rapidshare.com/files/44843445/CDA2oo6.part20.rar
rapidshare.com/files/44846564/CDA2oo6.part21.rar
rapidshare.com/files/44849501/CDA2oo6.part22.rar
rapidshare.com/files/44853139/CDA2oo6.part23.rar
rapidshare.com/files/44855986/CDA2oo6.part24.rar
rapidshare.com/files/44859021/CDA2oo6.part25.rar
rapidshare.com/files/44861520/CDA2oo6.part26.rar
rapidshare.com/files/44864078/CDA2oo6.part27.rar
rapidshare.com/files/44866551/CDA2oo6.part28.rar
rapidshare.com/files/44868790/CDA2oo6.part29.rar
rapidshare.com/files/44870978/CDA2oo6.part30.rar
rapidshare.com/files/44873329/CDA2oo6.part31.rar
rapidshare.com/files/44875509/CDA2oo6.part32.rar
rapidshare.com/files/44878009/CDA2oo6.part33.rar
rapidshare.com/files/44880058/CDA2oo6.part34.rar
rapidshare.com/files/44882115/CDA2oo6.part35.rar
rapidshare.com/files/44888252/CDA2oo6.part36.rar
rapidshare.com/files/44892008/CDA2oo6.part37.rar
rapidshare.com/files/44896122/CDA2oo6.part38.rar
rapidshare.com/files/44900776/CDA2oo6.part39.rar
rapidshare.com/files/44905505/CDA2oo6.part40.rar
rapidshare.com/files/44919647/CDA2oo6.part41.rar
rapidshare.com/files/44925072/CDA2oo6.part42.rar
rapidshare.com/files/44931489/CDA2oo6.part43.rar
rapidshare.com/files/44938136/CDA2oo6.part44.rar
rapidshare.com/files/44943850/CDA2oo6.part45.rar
rapidshare.com/files/44949926/CDA2oo6.part46.rar
rapidshare.com/files/44963965/CDA2oo6.part47.rar
rapidshare.com/files/44970869/CDA2oo6.part48.rar
rapidshare.com/files/44977799/CDA2oo6.part49.rar
rapidshare.com/files/44983863/CDA2oo6.part50.rar
rapidshare.com/files/44989621/CDA2oo6.part51.rar
rapidshare.com/files/44994970/CDA2oo6.part52.rar
rapidshare.com/files/45000231/CDA2oo6.part53.rar
rapidshare.com/files/45006164/CDA2oo6.part54.rar
rapidshare.com/files/45012088/CDA2oo6.part55.rar
rapidshare.com/files/45018360/CDA2oo6.part56.rar
rapidshare.com/files/45024408/CDA2oo6.part57.rar
rapidshare.com/files/45030617/CDA2oo6.part58.rar
rapidshare.com/files/45036251/CDA2oo6.part59.rar
rapidshare.com/files/45041563/CDA2oo6.part60.rar
rapidshare.com/files/45046560/CDA2oo6.part61.rar
rapidshare.com/files/45049535/CDA2oo6.part62.rar

Career Academy SQL Server 2005

Free Image Hosting at www.ImageShack.us



Schedule our instructor led classroom training at your convenience and never miss another lecture or fall behind. You are in complete control. We invited the best SQL Trainers in the industry to help us develop the ultimate training & certification program.

This is the only SQL Server 2005 package you will need. Its diverse courses will satisfy the needs of anyone wishing to take there SQLl Server 2005 skills to the next level. This package includes the insights of Mark Russell, and provides specially proven ideologies that allow you to learn all aspects of the SQL Server 2005 Environment. This course uses a combination of instructor lectures, computer demonstrations and interactive hands-on lab simulations to illustrate the Best Practices and mastery of Microsoft SQL Server 2005.

Download:
rapidshare.com/files/35848701/Career_Academy_SQL_Server_2005.part01.rar
rapidshare.com/files/35850805/Career_Academy_SQL_Server_2005.part02.rar
rapidshare.com/files/35852760/Career_Academy_SQL_Server_2005.part03.rar
rapidshare.com/files/35854531/Career_Academy_SQL_Server_2005.part04.rar
rapidshare.com/files/35856147/Career_Academy_SQL_Server_2005.part05.rar
rapidshare.com/files/35857945/Career_Academy_SQL_Server_2005.part06.rar
rapidshare.com/files/35859537/Career_Academy_SQL_Server_2005.part07.rar
rapidshare.com/files/35861072/Career_Academy_SQL_Server_2005.part08.rar
rapidshare.com/files/35862764/Career_Academy_SQL_Server_2005.part09.rar
rapidshare.com/files/35864278/Career_Academy_SQL_Server_2005.part10.rar
rapidshare.com/files/35865838/Career_Academy_SQL_Server_2005.part11.rar
rapidshare.com/files/35867161/Career_Academy_SQL_Server_2005.part12.rar
rapidshare.com/files/35868706/Career_Academy_SQL_Server_2005.part13.rar
rapidshare.com/files/35870332/Career_Academy_SQL_Server_2005.part14.rar
rapidshare.com/files/35871970/Career_Academy_SQL_Server_2005.part15.rar
rapidshare.com/files/35873597/Career_Academy_SQL_Server_2005.part16.rar
rapidshare.com/files/35875244/Career_Academy_SQL_Server_2005.part17.rar
rapidshare.com/files/35876826/Career_Academy_SQL_Server_2005.part18.rar
rapidshare.com/files/35878222/Career_Academy_SQL_Server_2005.part19.rar
rapidshare.com/files/35879463/Career_Academy_SQL_Server_2005.part20.rar
rapidshare.com/files/35880759/Career_Academy_SQL_Server_2005.part21.rar
rapidshare.com/files/35882000/Career_Academy_SQL_Server_2005.part22.rar
rapidshare.com/files/35883185/Career_Academy_SQL_Server_2005.part23.rar
rapidshare.com/files/35884351/Career_Academy_SQL_Server_2005.part24.rar
rapidshare.com/files/35885629/Career_Academy_SQL_Server_2005.part25.rar
rapidshare.com/files/35887032/Career_Academy_SQL_Server_2005.part26.rar
rapidshare.com/files/35888456/Career_Academy_SQL_Server_2005.part27.rar
rapidshare.com/files/35892402/Career_Academy_SQL_Server_2005.part28.rar
rapidshare.com/files/35846454/Career_Academy_SQL_Server_2005.part29.rar

CBT Nuggets Network+ Series

Free Image Hosting at www.ImageShack.us

Contains training for the CompTIA 2005 Network+ (Network plus) exam

Includes 30 Videos
Once you’ve obtained A+ certification to show you know computer basics, the natural progression in the IT career path is to learn networking and certify your knowledge with Network+. This makes current and future employers confident that you can be an integral part of developing and maintaining their business computer network. An individual certified as a Network+ technician has proven him or herself to be fundamentally competent; has proven a solid base of knowledge and expertise in networking technologies.

The 2005 Network+ Series builds on the quality instruction delivered in the A+ certification series. It covers all the networking knowledge crucial to Network+ certification standards, including the 2005 update to the Network+ certification exams. CompTIA designed this updated exam to ensure that you have the real world ability to work in the networking environments in use today and planned for tomorrow. Some of these important updates include wireless networking, gigabit Ethernet, and improved security practices.

The training is very good. You’ll be amazed at the amount of information presented in this series. True to the CBT Nuggets concept, nothing is taken for granted. The series starts very basic but then progresses through intermediate and advanced networking concepts to give you a full spectrum of networking knowledge.

The CBT Nuggets 2005 Network+ Series is thorough and comprehensive. Watching these videos is very similar to attending classroom instruction. You’ll get a combination of theory and practical instruction as you progress through the lessons. The innovative approach used by CBT Nuggets provides hands-on experience through the eyes of the instructor. To experience this approach, check out our free videos section to view videos from the Network+ series for free.

The 2005 Network+ Series contains the videos listed below:

- Network Topologies (Part 1)
- Network Topologies (Part 2)
- Media Connectors and Cabling
- Network Devices and Components (Part 1)
- Network Devices and Components (Part 2)
- OSI (Open Systems Interconnect) Model
- Media Access Control
- IP Addressing
- Network Layer Protocols
- TCP/IP Suite of Protocols and Services
- TCP/UDP Protocols and Services
- Additional Network Protocols and Services
- WAN Technologies
- Wireless Technologies
- Internet Access Technologies
- Remote Access Protocols and Services
- Server Remote Connectivity Configuration
- Security Protocols
- Authentication Protocols
- Network Operating Systems
- Client Workstation Connectivity
- Firewalls and Proxy Services
- VLAN’s
- Intranets and Extranets
- Antivirus Protection
- Fault Tolerance and Disaster Recovery
- Troubleshooting Strategies
- Troubleshooting Utilities
- Physical Network Troubleshooting
- Shooting Trouble in Client/Server Environments

Download:
http://rapidshare.com/files/10885908/f-cncntf.r00
http://rapidshare.com/files/10885957/f-cncntf.r01
http://rapidshare.com/files/10887132/f-cncntf.r02
http://rapidshare.com/files/10887378/f-cncntf.r03
http://rapidshare.com/files/10889312/f-cncntf.r04
http://rapidshare.com/files/10889313/f-cncntf.r05
http://rapidshare.com/files/10891692/f-cncntf.r06
http://rapidshare.com/files/10891665/f-cncntf.r07
http://rapidshare.com/files/10894570/f-cncntf.r08
http://rapidshare.com/files/10894585/f-cncntf.r09
http://rapidshare.com/files/10896750/f-cncntf.r10
http://rapidshare.com/files/10896769/f-cncntf.r11
http://rapidshare.com/files/10898313/f-cncntf.r12
http://rapidshare.com/files/10899358/f-cncntf.r13
http://rapidshare.com/files/10901331/f-cncntf.r14
http://rapidshare.com/files/10901316/f-cncntf.r15
http://rapidshare.com/files/10905029/f-cncntf.r16
http://rapidshare.com/files/10905017/f-cncntf.r17
http://rapidshare.com/files/11171509/f-cncntf.r18
http://rapidshare.com/files/10910398/f-cncntf.r19
http://rapidshare.com/files/10910399/f-cncntf.r20
http://rapidshare.com/files/10914485/f-cncntf.r21
http://rapidshare.com/files/11009235/f-cncntf.r22
http://rapidshare.com/files/11009232/f-cncntf.r23
http://rapidshare.com/files/11010709/f-cncntf.r24
http://rapidshare.com/files/11010710/f-cncntf.r25
http://rapidshare.com/files/11013757/f-cncntf.r26
http://rapidshare.com/files/11012433/f-cncntf.r27
http://rapidshare.com/files/11014455/f-cncntf.rar

SAN Basics from NetApp CBT

Course Description:

SAN Administration Basics is an instructor-led course designed for those who provide support and administration for FC and IP SAN environments running the Data ONTAP® operating system. This course is delivered using Windows® and SUN® hosts. The course covers SAN infrastructure preparation, storage provisioning options, creation and management of LUNs and volumes, multipathing and high availability, Fibre Channel cf modes, and troubleshooting techniques.

Course Information:
Course Length: 3 days
Training Units: 30
Cost per Student:
North America: $2,250 (USD)

For more info:
www.netapp.com/education/courses/crs-desc-ontap-san-72.shtml

Prerequisites:
Introduction to NetApp Products
Data ONTAP Fundamentals or equivalent experience

Course Objectives:
Define the characteristics of a SAN environment and how LUNs relate to the storage system
Describe the components of FC and IP SANs
Describe size planning requirements for LUNs
Create and manage LUNs on a storage controller for both Windows and UNIX hosts
Explain FC and IP SAN multipathing options for Windows and UNIX operating systems
Explain how to troubleshoot common SAN issues

Download:
rapidshare.com/files/6997445/NetApp.rar

Emc, Veritas Storage Cbts

EMC Storage Host Integeration (3 CDs)

hxxp://www.megaupload.com/?d=JAOZXOSH
hxxp://www.megaupload.com/?d=619LC43W
hxxp://www.megaupload.com/?d=5U7GGJG0

Veritas Netbackup

hxxp://www.megaupload.com/?d=1J5KIQ4P

Shell Scripting Tutorial

hxxp://www.megaupload.com/?d=PLSGL6V8

Google Tutorial

www.megaupload.com/?d=EEW0L85I

Thursday, December 20, 2007

VMware ESX Server 3.0 - VI3 CBT

Free Image Hosting at www.ImageShack.us


Server consolidation, efficient and fast disaster recovery, cost savings, high availability and fast virtual server deployments are just some of the things you can accomplish with VMware ESX Server 3.0. ESX Server is the most powerful virtualization software on the market today and in this training CBT, Eli Khnaser will guide you through the planning, deployment and administration of your virtual infrastructure.

VMware is one of the fastest growing companies today and its virtualization software is the hottest technology in the computer world today, so if you are trying to advance your career and need the next hot thing, ESX Server is that technology that will give you the edge you need to get ahead. For those of you that are seeking certification, you are still required to attend the VMware class as that is a mandatory step in achieving your certification. You can use our CBT to reinforce what you learned.

If you are trying to learn VMware ESX Server 3.0 because of a job requirement, this CBT gives you practical, hands on training from someone who does it on a day to day basis and has implemented some large ESX deployments.

The CBT contains 10 videos as follows:

Lesson 1: Introduction to Virtualization & ESX Server 3.0
Lesson 2: Installing & Configuring ESX Server 3.0
Lesson 3: Virtual Networking Concepts
Lesson 4: Storage Concepts
Lesson 5: Installation & Administration with Virtual Center
Lesson 6: VM Creation, Gold Builds and Clones
Lesson 7: Resource Management
Lesson 8: VM Access Control
Lesson 9: Disaster Recovery & Backup
Lesson 10: Monitoring

VMware, ESX Server, VMotion, Virtual Center are registered trademarks of VMware, Inc. All other marks and names mentioned herein may be trademarks of their respective owners

Links:
http://rapidshare.com/files/61340136/h-esx3cbt.part01.rar
http://rapidshare.com/files/61345067/h-esx3cbt.part02.rar
http://rapidshare.com/files/61349947/h-esx3cbt.part03.rar
http://rapidshare.com/files/61355600/h-esx3cbt.part04.rar
http://rapidshare.com/files/61361085/h-esx3cbt.part05.rar
http://rapidshare.com/files/61366892/h-esx3cbt.part06.rar
http://rapidshare.com/files/61372815/h-esx3cbt.part07.rar
http://rapidshare.com/files/61377804/h-esx3cbt.part08.rar

SharePoint Server 2007 Training Videos

Free Image Hosting at www.ImageShack.us

cd-1
http://rapidshare.com/files/71695259/tssp1.part1.rar
http://rapidshare.com/files/71695210/tssp1.part2.rar
http://rapidshare.com/files/71694539/tssp1.part3.rar
cd-2
http://rapidshare.com/files/71695228/tssp2.part1.rar
http://rapidshare.com/files/71695185/tssp2.part2.rar
http://rapidshare.com/files/71695222/tssp2.part3.rar
http://rapidshare.com/files/71694547/tssp2.part4.rar

Password: tra1n$1gn@l

Train Signal - Cisco 642-845 ONT - CCNP Training

Free Image Hosting at www.ImageShack.us

http://rapidshare.com/files/71695080/Train.Signal.Cisco.CCNP.ONT.part1.rar
http://rapidshare.com/files/71695201/Train.Signal.Cisco.CCNP.ONT.part2.rar
http://rapidshare.com/files/71694860/Train.Signal.Cisco.CCNP.ONT.part3.rar
http://rapidshare.com/files/71694518/Train.Signal.Cisco.CCNP.ONT.part4.rar

password-----epaloids

Monday, December 17, 2007

The PrepLogic 15-Minute Complete IT Study Guide

Clear and Concise Directives
"Must Know" Terms & Subjects
Essential Procedures
Overlooked Topics
No Fluff, Easy Navigation
and Much More...

70-270

http://rapidshare.com/files/49343724/70-270_15_Min.rar


70-290

http://rapidshare.com/files/49343725/70-290_15_Min.rar


70-291

http://rapidshare.com/files/49343726/70-291_15_Min.rar


70-293

http://rapidshare.com/files/49343727/70-293_15_Min.rar


Pass: electronicsouls

[boot.ini] ... In Depth

Note: to see what options I system has booted with examine HKLM\System\CurrentControlSet\Control\SystemStartOptions.

/3GB
Increases the size of the user process address space from 2 GB to 3 GB (and therefore reduces the size of system space from 2 GB to 1 GB). Giving virtual-memory- intensive applications such as database servers a larger address space can improve their performance. For an application to take advantage of this feature, however, two additional conditions must be met: the system must be running Windows XP, Windows Server 2003, Windows NT 4 Enterprise Edition, Windows 2000 Advanced Server or Datacenter Server and the application .exe must be flagged as a 3-GB-aware application. Applies to 32-bit systems only.

/BASEVIDEO
Causes Windows to use the standard VGA display driver for GUI-mode operations.

/BAUDRATE=
Enables kernel-mode debugging and specifies an override for the default baud rate (19200) at which a remote kernel debugger host will connect. Example: /BAUDRATE=115200.

/BOOTLOG
Causes Windows to write a log of the boot to the file %SystemRoot%\Ntbtlog.txt.

/BOOTLOGO
Use this switch to have Windows XP or Windows Server 2003 display an installable splash screen instead of the standard splash screen. First, create a 16-color (any 16 colors) 640x480 bitmap and save it in the Windows directory with the name Boot.bmp. Then add "/bootlogo /noguiboot" to the boot.ini selection.

/BREAK
Causes the hardware abstraction layer (HAL) to stop at a breakpoint at HAL initialization. The first thing the Windows kernel does when it initializes is to initialize the HAL, so this breakpoint is the earliest one possible. The HAL will wait indefinitely at the breakpoint until a kernel-debugger connection is made. If the switch is used without the /DEBUG switch, the system will Blue Screen with a STOP code of 0x00000078 (PHASE0_ EXCEPTION).

/BURNMEMORY=
Specifies an amount of memory Windows can't use (similar to the /MAXMEM switch). The value is specified in megabytes. Example: /BURNMEMORY=128 would indicate that Windows can't use 128 MB of the total physical memory on the machine.

/CHANNEL=
Used on conjunction with /DEBUGPORT=1394 to specify the IEEE 1394 channel through which kernel debugging communications will flow. This can be any number between 0 and 62 and defaults to 0 if not set.

/CLKLVL
Causes the standard x86 multiprocessor HAL (Halmps.dll) to configure itself for a level-sensitive system clock rather then an edge-triggered clock. Level-sensitive and edge-triggered are terms used to describe hardware interrupt types.

/CMDCONS
Passed when booting with into the Recovery Console (described later in this chapter).

/CRASHDEBUG
Causes the kernel debugger to be loaded when the system boots, but to remain inactive unless a crash occurs. This allows the serial port that the kernel debugger would use to be available for use by the system until the system crashes (vs. /DEBUG, which causes the kernel debugger to use the serial port for the life of the system session).

/DEBUG
Enables kernel-mode debugging.

/DEBUGPORT=
Enables kernel-mode debugging and specifies an override for the default serial (usually COM2 on systems with at least two serial ports) to which a remote kernel-debugger host is connected. Windows XP and Windows Server 2003 also support debugging through accept IEEE 1394 ports. Examples: /DEBUGPORT=COM2, /DEBUGPORT=1394.

/EXECUTE
This option disables no-execute protection. See the /NOEXECUTE switch for more information.

/FASTDETECT
Default boot option for Windows. Replaces the Windows NT 4 switch /NOSERIALMICE. The reason the qualifier exists (vs. just having NTDETECT perform this operation by default) is so that NTDETECT can support booting Windows NT 4. Windows Plug and Play device drivers perform detection of parallel and serial devices, but Windows NT 4 expects NTDETECT to perform the detection. Thus, specifying /FASTDETECT causes NTDETECT to skip parallel and serial device enumeration (actions that are not required when booting Windows), whereas omitting the switch causes NTDETECT to perform this enumeration (which is required for booting Windows NT 4).

/INTAFFINITY
Directs the standard x86 multiprocessor HAL (Halmps.dll) to set interrupt affinities such that only the highest numbered processor will receive interrupts. Without the switch, the HAL defaults to its normal behavior of letting all processors receive interrupts.

/KERNEL=
/HAL=
Enable you to override Ntldr's default filename for the kernel image (Ntoskrnl.exe) and/or the HAL (Hal.dll). These options are useful for alternating between a checked kernel environment and a free (retail) kernel environment or even to manually select a different HAL. If you want to boot a checked environment that consists solely of the checked kernel and HAL, which is typically all that is needed to test drivers, follow these steps on a system installed with the free build:
Copy the checked versions of the kernel images from the checked build CD to your \Windows\System32 directory, giving the images different names than the default. For example, if you're on a uniprocessor, copy Ntoskrnl.exe to Ntoschk.exe and Ntkrnlpa.exe to Ntoschkpa.exe. If you're on a multiprocessor, copy Ntkrnlmp.exe to Ntoschk.exe and Ntkrpamp.exe to Ntoschkpa.exe. The kernel filename must be an 8.3-style short name.
Copy the checked version of the appropriate HAL needed for your system from \I386\Driver.cab on the checked build CD to your \Windows\System32 directory, naming it Halchk.dll. To determine which HAL to copy, open \Windows\Repair\Setup.log and search for Hal.dll; you'll find a line like \WINDOWS\system32\ hal.dll="halacpi.dll","1d8a1". The name immediately to the right of the equals sign is the name of the HAL you should copy. The HAL filename must be an 8.3-style short name.
Make a copy of the default line in the system's Boot.ini file.
In the string description of the boot selection, add something that indicates that the new selection will be for a checked build environment (for example, “Windows XP Professional Checked”.
Add the following to the end of the new selection's line: /KERNEL=NTOSCHK.EXE /HAL= HALCHK.DLL
Now when the selection menu appears during the boot process you can select the new entry to boot a checked environment or select the entry you were using to boot the free build.

/LASTKNOWNGOOD
Causes the system to boot as if the LastKnownGood boot option was selected.

/MAXMEM=
Limits Windows to ignore (not use) physical memory beyond the amount indicated. The number is interpreted in megabytes. Example: /MAXMEM=32 would limit the system to using the first 32 MB of physical memory even if more were present.

/MAXPROCSPERCLUSTER=
For the standard x86 multiprocessor HAL (Halmps.dll), forces cluster-mode Advanced Programmable Interrupt Controller (APIC) addressing (not supported on systems with an 82489DX external APIC interrupt controller).

/MININT
This option is used by Windows PE (Preinstallation Environment) and causes the Configuration Manager to load the Registry SYSTEM hive as a volatile hive such that changes made to it in memory are not saved back to the hive image.

/NODEBUG
Prevents kernel-mode debugging from being initialized. Overrides the specification of any of the three debug-related switches, /DEBUG, /DEBUGPORT, and /BAUDRATE.

/NOEXECUTE
This option is only available on 32-bit versions of Windows when running on processors supporting no-execute protection. It enables no-execute protection (also known as Data Execution Protection - DEP), which results in the Memory Manager marking pages containing data as no-execute so that they cannot be executed as code. This can be useful for preventing malicious code from exploiting buffer overflow bugs with unexpected program input in order to execute arbitrary code. No-execute protection is always enabled on 64-bit versions of Windows on processors that support no-execute protection. There are several options you can specify with this switch:
/NOEXECUTE=OPTIN Enables DEP for core system images and those specified in the DEP configuration dialog.
/NOEXECUTE=OPTOUT Enables DEP for all images except those specified in the DEP configuration dialog.
/NOEXECUTE=ALWAYSON Enables DEP on all images.
/NOEXECUTE=ALWAYSOFF Disables DEP.

/NOGUIBOOT
Instructs Windows not to initialize the VGA video driver responsible for presenting bitmapped graphics during the boot process. The driver is used to display boot progress information, so disabling it will disable the ability of Windows to show this information.

/NOLOWMEM
Requires that the /PAE switch be present and that the system have more than 4 GB of physical memory. If these conditions are met, the PAE-enabled version of the Windows kernel, Ntkrnlpa.exe, won't use the first 4 GB of physical memory. Instead, it will load all applications and device drivers, and allocate all memory pools, from above that boundary. This switch is useful only to test device driver compatibility with large memory systems.

/NOPAE
Forces Ntldr to load the non-Physical Address Extension (PAE) version of the Windows kernel, even if the system is detected as supporting x86 PAEs and has more than 4 GB of physical memory.

/NOSERIALMICE=[COMx | COMx,y,z...]
Obsolete Windows NT 4 qualifier—replaced by the absence of the /FASTDETECT switch. Disables serial mouse detection of the specified COM ports. This switch was used if you had a device other than a mouse attached to a serial port during the startup sequence. Using /NOSERIALMICE without specifying a COM port disables serial mouse detection on all COM ports. See Microsoft Knowledge Base article Q131976 for more information.

/NUMPROC=
Specifies the number of CPUs that can be used on a multiprocessor system. Example: /NUMPROC=2 on a four-way system will prevent Windows from using two of the four processors.

/ONECPU
Causes Windows to use only one CPU on a multiprocessor system.

/PAE
Causes Ntldr to load Ntkrnlpa.exe, which is the version of the x86 kernel that is able to take advantage of x86 PAEs. The PAE version of the kernel presents 64-bit physical addresses to device drivers, so this switch is helpful for testing device driver support for large memory systems.

/PCILOCK
Stops Windows from dynamically assigning IO/IRQ resources to PCI devices and leaves the devices configured by the BIOS. See Microsoft Knowledge Base article Q148501 for more information.

/RDPATH=
Specifies the path to a System Disk Image (SDI) file, which can be on the network, that the system will use to boot from. Often used in conjunction with the /RDIMAGEOFFSET= flag to indicate to NTLDR where in the file the system image starts.

/REDIRECT
Introduced with Windows XP. Used to cause Windows to enable Emergency Management Services (EMS) that reports boot information and accepts system management commands through a serial port. Specify serial port and baudrate used in conjunction with EMS with redirect= and redirectbaudrate= lines in the [boot loader] section of the Boot.ini file.

/SAFEBOOT:
Specifies options for a safe boot. You should never have to specify this option manually, since Ntldr specifies it for you when you use the F8 menu to perform a safe boot. (A safe boot is a boot in which Windows only loads drivers and services that are specified by name or group under the Minimal or Network registry keys under HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot.) Following the colon in the option you must specify one of three additional switches: MINIMAL, NETWORK, or DSREPAIR. The MINIMAL and NETWORK flags correspond to safe boot with no network and safe boot with network support, respectively. The DSREPAIR (Directory Services Repair) switch causes Windows to boot into a mode in which it restores the Active Directory directory service from a backup medium you present. An additional option you can append is (ALTERNATESHELL), which tells Windows to use the program specified by the HKLM\SYSTEM\CurrentControlSet\ SafeBoot\AlternateShell value as the graphical shell rather than to use the default, which is Windows Explorer.

/SCSIORDINAL:
Directs Windows to the SCSI ID of the controller. (Adding a new SCSI device to a system with an on-board SCSI controller can cause the controller's SCSI ID to change.) See Microsoft Knowledge Base article Q103625 for more information.

/SDIBOOT=
Used in Windows XP Embedded systems to have Windows boot from a RAM disk image stored in the specified System Disk Image (SDI) file.

/SOS
Causes Windows to list the device drivers marked to load at boot time and then to display the system version number (including the build number), amount of physical memory, and number of processors.

/TIMERES=
Sets the resolution of the system timer on the standard x86 multiprocessor HAL (Halmps.dll). The argument is a number interpreted in hundreds of nanoseconds, but the rate is set to the closest resolution the HAL supports that isn't larger than the one requested. The HAL supports the following resolutions:

Hundreds of nanoseconds Milliseconds (ms)
9766 0.98
19532 2.00
39063 3.90
78125 7.80

The default resolution is 7.8 ms. The system timer resolution affects the resolution of waitable timers. Example: /TIMERES=21000 would set the timer to a resolution of 2.0 ms.

/USERVA=
This switch is only supported on Windows XP and Windows Server 2003. Like the /3GB switch, this switch gives applications a larger address space. Specify the amount in MB between 2048 and 3072. This switch has the same application requirements as the /3GB switch and requires that the /3GB switch be present. Applies to 32-bit systems only.

/WIN95
Directs Ntldr to boot the Consumer Windows boot sector stored in Bootsect.w40. This switch is pertinent only on a triple-boot system that has MS-DOS, Consumer Windows, and Windows installed. See Microsoft Knowledge Base article Q157992 for more information.

/WIN95DOS
Directs Ntldr to boot the MS-DOS boot sector stored in Bootsect.dos. This switch is pertinent only on a triple-boot system that has MS-DOS, Consumer Windows, and Windows installed. See Microsoft Knowledge Base article Q157992 for more information.

/YEAR=
Instructs the Windows core time function to ignore the year that the computer's real-time clock reports and instead use the one indicated. Thus, the year used in the switch affects every piece of software on the system, including the Windows kernel. Example: /YEAR=2001. (This switch was created to assist in Y2K testing.)



Recreate The Boot.ini And HDD Master Boot Record For Windows XP

1. Boot to Recovery Console
2. Attrib -h -s -r C:\Boot.ini
3. Del C:\Boot.ini
4. Bootcfg /rebuild
(Press enter for ea option that Bootcfg prompts to create default boot options)
5.Fixboot
6.Reboot


that is the easy and best way.. to let your system detect OSs and write his own values

the advanced way

del the boot.ini from c:\ or don't and you will be prompted to replace it

then type

C:\>copy con C:\boot.ini
[boot loader]
timeout=3
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect
^Z
1 file(s) copied.

then ^Z .. after you finished typing.. press f6 and it will bring you the ^Z [end]

then
C:\>attribe +s +h C:\boot.ini

a bootcfg and fixboot commands is followed if you are not sure of what you write

Linux System Administration [ILLUSTRATED] (Paperback)

If you're an experienced system administrator looking to acquire Linux
skills, or a seasoned Linux user facing a new challenge, Linux System
Administration offers practical knowledge for managing a complete range
of Linux systems and servers. The book summarizes the steps you need to
build everything from standalone SOHO hubs, web servers, and LAN servers
to load-balanced clusters and servers consolidated through
virtualization. Along the way, you'll learn about all of the tools you
need to set up and maintain these working environments.

Linux is now a standard corporate platform with users numbering in the
hundreds of millions, and there is a definite shortage of talented
administrators. Linux System Administration is ideal as an introduction
to Linux for Unix veterans, MCSEs, and mainframe administrators, and as
an advanced (and refresher) guide for existing Linux administrators who
will want to jump into the middle of the book. Inside, you'll learn how
to:

- Set up a stand-alone Linux server
- Install, configure, maintain, and troubleshoot a DNS server using
BIND
- Build an Internet server to manage sites, perform email and file
transfers, and more
- Set up an email service for a small-to-medium-sized site, complete
with authentication
- Install and configure Apache, PHP, and MySQL on a web server built
from scratch
- Combine computers into a load-balanced Apache web server cluster
based on the free Linux Virtual Server
- Set up local network services from distributed file systems to DHCP
services, gateway services, print services, user management and more
- Use Linux virtualization with Xen or VMWare to run multiple kernels
on one piece of hardware; manage each kernel's access to processor time,
devices, and memory
- Create shell scripts and adapt them for your own needs
- Back up and restore data with rsync, tar, cdrecord, Amanda, and
MySQL tools

URL: http://www.amazon.com/exec/obidos/tg/detail/-/0596009526/

Download:


Code: Select all
http://depositfiles.com/files/1659877

http://rapidshare.com/files/53026336/0596009526.zip

password if reqd : giftfromfatherxmassip

DNS on Windows Server 2003

Free Image Hosting at www.ImageShack.us

While computers and other devices identify each other on networks or the Internet by using unique addresses made up of numbers, humans rely on the Domain Name System (DNS), the distributed database that allows us to identify machines by name. DNS does the work of translating domain names into numerical IP addresses, routing mail to its proper destination, and many other services, so that users require little or no knowledge of the system. If you’re a network or system administrator, however, configuring, implementing, and maintaining DNS zones can be a formidable challenge. And now, with Windows Server 2003, an understanding of the workings of DNS is even more critical. DNS on Windows Server 20003 is a special Windows-oriented edition of the classic DNS and BIND, updated to document the many changes to DNS, large and small, found in Windows Server 2003. Veteran O’Reilly authors, Cricket Liu, Matt Larson, and Robbie Allen explain the whole system in terms of the new Windows Server 2003, from starting and stopping a DNS service to establishing an organization’s namespace in the global hierarchy. Besides covering general issues like installing, setting up, and maintaining the server, DNS on Windows Server 2003 tackles the many issues specific to the new Windows environment, including the use of the dnscmd program to manage the Microsoft DNS Server from the command line and development using the WMI DNS provider to manage the name
server programmatically.

The book also documents new features of the Microsoft DNS Server in Windows Server 2003, including conditional forwarding and zone storage in Active Directory (AD) application partitions. DNS on Windows Server 2003 provides grounding in:

* Security issues
* System tuning
* Caching
* Zone change notification
* Troubleshooting
* Planning for growth

If you’re a Windows administrator, DNS on Windows Server 2003 is the operations manual you need for working with DNS every day. If you’re a Windows user who simply wants to take the mystery out of the Internet, this book is a readable introduction to the Internet’s architecture and inner workings.

Download:
rapidshare.com/files/71696730/o_27reilly_-_dns_on_windows_server_2003.chm

Veritas Storage Foundation 4.0 For UNIX Training Course WE-1297-60-NSiD

[URL=http://imageshack.us][IMG]http://img412.imageshack.us/img412/4007/veritasgm1.jpg[/IMG][/URL]

Learn how to integrate, operate, and make the most of VERITAS Storage Foundation in a UNIX environment. This course provides instruction on operational management procedures for VERITAS Volume Manager (VxVM), VERITAS File System (VxFS), and options such as VERITAS FlashSnap.

Download:
rapidshare.com/files/63189514/nsid-vsf4.rar
rapidshare.com/files/61804085/nsid-vsf4.r00
rapidshare.com/files/61806158/nsid-vsf4.r01
rapidshare.com/files/61807287/nsid-vsf4.r02
rapidshare.com/files/62863689/nsid-vsf4.r03
rapidshare.com/files/62865594/nsid-vsf4.r04
rapidshare.com/files/62866190/nsid-vsf4.r05
rapidshare.com/files/62988161/nsid-vsf4.r06
rapidshare.com/files/62989341/nsid-vsf4.r07
rapidshare.com/files/62993175/nsid-vsf4.r08
rapidshare.com/files/62994635/nsid-vsf4.r09
rapidshare.com/files/63178588/nsid-vsf4.r10
rapidshare.com/files/63179893/nsid-vsf4.r11
rapidshare.com/files/63185481/nsid-vsf4.r12
Or
rapidshare.com/files/51124691/Veritas.Storage.Foundation.4.0.For.UNIX.Training.Course.WE-1297-60-NSiD.part3.rar
rapidshare.com/files/51279985/Veritas.Storage.Foundation.4.0.For.UNIX.Training.Course.WE-1297-60-NSiD.part1.rar
rapidshare.com/files/51290257/Veritas.Storage.Foundation.4.0.For.UNIX.Training.Course.WE-1297-60-NSiD.part2.rar

VoIP Training Courses, Vedio Training Options

Chapter 1 VoIP Systems, Components, Standards, Jargon and Buzzwords
1.03 The Big Picture
1.05 Terminals
1.07 Voice in IP Packets
1.09 Soft Switches / SIP Servers / Call Managers
1.11 Media Servers
1.13 Gateways
1.15 LANs and WANs
1.17 Key VoIP Standards
1.19 Where All of This is Headed: Broadband IP Dial Tone

Chapter 2 VoIP Architectures and Implementation Choices
2.03 Computer-Computer VoIP over the Internet
2.05 Skype and IM
2.07 Computer to Phone e.g. SkypeOut (DS0 Interconnect to LEC)
2.09 Phone to Phone over the Internet e.g. Vonage
2.11 Managed IP Telephone Service (MIPT)
2.13 IXCs and IP-based Backbones
2.15 VoIP for Businesses and Organizations
2.17 VoIP-Enabled PBX and Migration Options
2.19 PBX Replacement
2.21 Hosted PBXs
2.23 IP Centrex
2.25 Asterisk and Open-Source IP-PBX Software
2.27 SO/HO IP Phone Features and Uses

V9: Understanding Voice over IP 2
Voice Packetization · Voice Quality · Codecs, Jitter and Packet Loss · QoS with MPLS
V10: Understanding Voice over IP 3
SIP · IP Call Flow · Carrier Interconnect

Download:
CD1
www.filefactory.com/file/ac407b
www.filefactory.com/file/25e29e
www.filefactory.com/file/6b6318
www.filefactory.com/file/cdf1f8
www.filefactory.com/file/9338a9
www.filefactory.com/file/af0906

CD2
www.filefactory.com/file/c12b5e
www.filefactory.com/file/9a6df6
www.filefactory.com/file/5fe917
www.filefactory.com/file/e8a39a
www.filefactory.com/file/27c6ca
www.filefactory.com/file/f8bb6c
www.filefactory.com/file/e98db0

CD3
www.filefactory.com/file/7386a4
www.filefactory.com/file/3943ec
www.filefactory.com/file/03176e
www.filefactory.com/file/5aa0f9
www.filefactory.com/file/692848

LinuxCBT Mail Edition ( Sendmail, Postfix & qmail )

Free Image Hosting at www.ImageShack.us


LinuxCBT Mail Edition focuses on the 3 leading Mail Transfer Agents (MTAs) and ancillary components:

Sendmail - LinuxCBT Sendmail Edition
Postfix - LinuxCBT Postfix Edition
qmail - LinuxCBT qmail Edition.

Linux/UNIX systems are responsible for moving the overwhelming majority of electronic mail across private and public networks. Consequently, savvy Systems Admins. are expected to have a solid foundation in MTAs and ancillary components for general and automated mail-based applications.

Let LinuxCBT Mail Edition help to solidify your understanding of key MTAs and ancillary components.

Recommended Prerequisites:

Familiarity with electronic mail concepts (MUA/MTA/etc.)
Access to a GNU/Linux-based PC to install the MTAs and ancillary components used

LinuxCBT Sendmail v8 Edition - Disc 1

Sendmail - Installation
Network & systems architecture review
Download current Sendmail v8.x.x source files
Import PGP-compatbile public keys
Verify source archive against imported public keys
Discuss required applications
Install GNU C Compiler (GCC) and ancillary applications
Backup existing Postfix implementation and prepare for Sendmail installation
Explore Sendmail source tree - identify key components
Configure & compile Sendmail
Discuss M4 & CF configuration files (sendmail.{mc,cf}, submit.{mc,cf})
Discuss default Sendmail operating modes - MSP & MTA
Prepare default Mail Submission Program (MSP) configuration based on MC
Prepare default Mail Transfer Agent (MTA) configuration based on MC
Install Berkeley DB libraries for hashed lookups
Complete installation
Explore post-installation Sendmail environment

Sendmail - Mail Submission Program (MSP) mode
Discuss local injection of messages
Explain required Sendmail MSP shell arguments for queue-runner mode
Start Sendmail in MSP mode
Verify Operating System (OS) results using BASH exit status
Verify monitored queue in MSP mode
Examine resultant Sendmail MSP Process Identification (PID) file creation
Kill running instance of Sendmail in MSP mode
Invoke Sendmail queue-runner mode
Inject test messages into the local queue
Examine the queue files generated by Sendmail MSP
Examine Syslog configuration using GREP
Discuss Sendmail logging
Identify Sendmail log files
Examine specific Sendmail log entries using GREP

Sendmail - Mail Transfer Agent (MTA) mode
Discuss Sendmail’s separation of duties; MSP/MTA
Explain required shell arguments for Sendmail MTA mode
Invoke Sendmail in MTA mode running as a daemon
Confirm Sendmail running in MTA mode
Force delivery of locally-injected messages
Confirm delivery of queued messages

Sendmail - Local Mail
Discuss Sendmail’s local delivery mechanism
Explore & discuss legacy /var/spool/mail directory
Identify user mbox files
Discuss mbox permissions
Illustrate local mail injection flow
Use mutt MUA to retrieve locally delivered mail
Use mutt to reply to envelope sender by local injection using MSP
Identify local mailer (procmail) used by Sendmail MTA
Invoke Sendmail in verbose mode
Attempt delivery to valid and invalid users & examine output
Explain Sendmail verbose-mode transcript (local vs. remote)

Sendmail - Logs
Discuss Syslog semantics (facilities & levels)
Discuss log rotation
Examine logs & discuss entries
Parse logs for interesting entries
Identify sourced messages
Discuss record types (receipt vs. delivery attempt(s))
Follow the message trail based on queue ID
Explain Sendmail fields
Identify PID related to various delivery attempts
Identify total delivery time and transfer time

Sendmail - Aliases
Discuss aliases applications
Identify aliases database
Explain Sendmail’s aliases expansion logic
Discuss the default aliases - (mailer-daemon, postmaster, etc.)
Test delivery to defined aliases
Define additional aliases
Rebuild aliases database using newaliases to route messages accordingly
Verify deliverablility of aliases database entries
Test delivery of messages to newly-defined aliases
Examine Sendmail logs to view transcript of delivery to aliased user
Explain the different types of supported Sendmail aliases
Define lists using aliases - one-to-many mappings
Test delivery to lists
Define alias to deliver messages to mbox-compliant file
Debug I/O errors related to Sendmail’s attempt to write to mbox-compliant file
Implement lists using file system includes
Define piped aliases to redirect messages to the input stream of other applications
Implement Sendmail’s per-user .forward file for user-based message routing
Setup aliases using pipes to the vacation program to enable auto-response

Sendmail - Simple Mail Transfer Protocol (SMTP) Mail
Discuss SMTP prerequisites
Examine local name resolution configuration
Confirm resolution of remote Sendmail server
Identify available remote recipients
Compose and deliver message to remote recipient
Confirm receipt
Reveal returned message headers using mutt MUA
Disable message forwarding on remote host
Confirm receipt of smtp-based messages
Explain Sendmail’s name resolution logic during delivery attempt
Emulate Sendmail’s name resolution logic to illustrate logic
Demonstrate Sendmail delivering messages based on static HOSTS resolution
Disable static name resolution for remote host
Debug message delivery errors related to invalid name resolution
Create DNS entry for remote server on primary DNS server
Confirm DNS resolution using system tools
Confirm mail delivery based on DNS resolution

Sendmail - Mail Exchange (MX) based messaging
Explain Sendmail’s name resolution logic
Use system tools to determine MX handler
Attempt delivery to undefined MX handler
Update DNS configuration to include MX & A records for second-level domain
Attempt delivery to defined MX handler
Confirm delivery based on MX resolution via logs and MUA
Explain MX distances (priority) field
Define additional MX host for second-level domain in DNS zone
Test delivery to backup MX host for failover

Sendmail - m4 Configuration Technique
Discuss Sendmail.cf
Explain advantages of using m4
Identify m4 templates in Sendmail source tree
Explain m4 templates hierarchy
Describe the structure of standard Sendmail m4-compliant files
Use m4 to generate new Sendmail.cf file
Increase logging verbosity
Reload current instance of Sendmail and examine output
Restrict the number of recipients
Restrict the size of each message
Use m4 to generate and test new configuration features
Sendmail - Masquerading
Discuss masquerading features and applications
Explore default Sendmail masquerading configuration using MUA
Alter Fully Qualified Domain Name (FQDN) of outbound messages using masquerading
Regenerate Sendmail.cf using m4 technique
Configure system to receive messages for new FQDN defined using masquerading
Alter message envelope using masquerading feature
Add Windows 2003 Host to DNS configuration & confirm resolution
Masquerade outbound domain to reflect second-level domain

Sendmail - Relay Control
Discuss Sendmail’s default relay rules
Configure promiscuous relay & test consequences
Relay mail to Internet-based host and confirm delivery using SSH
Restrict relaying by defining relay domains
Define & test file-based relay domains to permit hosts & subnets to relay
Recompile Sendmail.mc using m4 technique
Examine relaying with unresolvable domains
Confirm relay to Internet-based host using relay domains and Windows 2003 Host
Discuss benefits of using access db
Define mc directives for access db invocation
Create access db file using makemap
Explore access db directives
Discuss mailertable feature
Define mailertable with forced SMTP routes
Simulate DMZ-based MTA-front-end relaying messages to corporate back-end MTA
Test results
Confirm SMTP Auth pre-requisites
Configure SMTP Auth support
Recompile Sendmail to support SMTP Auth
Test relaying from Outlook Express on Windows 2003 Host

Sendmail - Smart Host Configuration
Discuss Smart Host applications
Configure Sendmail to use remote server as a Smart Host
Rebuild configuration files
Test local mail routing
Test smart host routing

Sendmail - Null Client Configuration
Discuss Null Client applications
Undefine Smart Host configuration
Configure Sendmail as a null client
Test mail routing as a null client
Confirm forced SMTP route

Sendmail - Virtual Domains
Explain applications
Define basic-global virtual domains applied to all mailboxes
Update DNS configuration to route messages to appropriate Virtual Domain server
Confirm delivery of messages to users at virtual domain
Add new DNS zone for additional domain to route traffic accordingly
Discuss virtual user tables applications
Updated Sendmail.cf to include virtual user tables support
Define virtual user domains hash
Define virtual user maps
Test delivery to various users at various domains
Define and test a catchall address for a virtual domain
Rebuild virtual user maps using makemap
Relay virtual domains to remote recipients

Sendmail - Malware Framework
Discuss Malware Framework (MailScanner/ClamAV/SpamAssAssin)
Dowload MailScanner
Download Clam Anti-Virus (ClamAV)
Download SpamAssAssin

Clam Anti-Virus (ClamAV)
Install requisite ClamAV components
Compile & install ClamAV
Identify key ClamAV binaries
Update ClamAV configuration files for basic operation
Update ClamAV definitions
Invoke ClamAV as a daemon

SpamAssAssin Installation
Identify requisite SpamAssAssin components
Compile & install SpamAssAssin
Invoke SpamAssAssin as a daemon

MailScanner Implementation
Compile & install MailScanner
Identify MailScanner-related directories
Explore MailScanner’s primary configuration
Enable ClamAV & SpamAssAssin support
Alter Sendmail queue configuration to support MailScanner
Restart Sendmail
Start MailScanner
Test message delivery through malware framework
Test sample Spam through malware framework
Test sample Virus-laden file through malware framework

top
LinuxCBT Postfix Edition - Disc 2

Postfix - Installation
Identify a geographically close Postfix mirror location
Discuss Postfix nomenclature
Download Postfix
Import PGP-compatible key to verify downloaded source archive
Verify Postfix source archive against imported signature
Extract Postfix source archive
Identify existing system MTA configuration
Explore Postfix source tree
Discuss pre-requisites
Identify Sendmail-compatible binaries to backup
Add required Postfix user and groups
Compile & install Postfix
Identify key directories and binaries
Alter key Postfix configuration files for basic operation

Postfix - Local Mail & Queueing
Define local domains in main configuration file
Define Fully Qualified Domain Name (FQDN) of Postfix Host
Confirm running Postfix TCP (super server) Manager
Explore current running directives with postconf
Alter configuration to enable local aliases
Use sendmail-compatible binary to inject messages into the local queue
Confirm delivery via default Syslog location
Identify default mbox-based mailstore
Use MUA mutt to verify delivery of local mail
Discuss & explore various Postfix queues
Explain how Postfix implements local injection
Explain how Postfix handles SMTP-based mail

Postfix - Aliases
Discuss concepts and applications for aliases
Identify required aliases
Describe Sendmail-compatible alias types
Define 1-to-1 aliases
Define list-based aliases
Test aliases delivery
Discuss per-user aliases (.forward) file
Define per-user .forward file with redirection to vacation program
Test delivery and auto-response
Discuss how mail is routed into the file system (maildrop) while Postfix is up/down
Identify binaries responsible for local mail injection (pickup/cleanup)

Postfix - Simple Mail Transfer Protocol (SMTP)
Confirm the existence of remote recipients
Inject mail for delivery to remote Linux Host
Review Postfix delivery report generated upon invocation of verbose mode
Confirm delivery of remote mail to remote Linux Host
Use MUA mutt to reveal and explore the headers of SMTP-based mail
Explore name resolution order file & discuss logic
Configure Postfix to receive mail to second-level domain plus FQDN
Simulate Postfix name resolution process at delivery-time
Expose current Mail Exchanger (MX) Host for the second-level domain

Postfix - Rewriting Features - Canonical Maps - BCC Maps
Discuss default configuration
Examine envelope headers
Configure Postfix to masquerade outbound messages
Test masqueraded envelope by generating new mail
Discuss canonical maps concepts & applications
Explain corresponding rewrite binaries
Define canonical maps in Ascii format
Use Postmap to generate DB-formatted canonical maps
Instruct main.cf to employ canonical maps database
Test address rewriting using canonical maps
Confirm message delivery via Syslog-generated logs
Examine the headers of delivered message altered using canonical maps & myorigin
Define & test sender canonical maps
Define & test recipient canonical maps
Configure Postfix to BCC all messages to specified recipients
Test messages between various users to ensure BCC functionality
Configure Postfix to BCC messages based on specific senders
Define Sender BCC maps using editor and Postmap to generate Hashed DB

Postfix - Relay Control
Explore & discuss default relay behavior
Identify key relay-related directives
Connect to remote Windows 2003 Host and attempt to relay
Confirm DNS resolution of Postfix relay host
Attempt relay to recipient on relay host & confirm path via logs
Attempt relay to recipient on foreign host & confirm delivery
Tighten default Postfix relay policy to restrict relaying to local subnet
Attempt local subnet and Internet-based relays & confirm results
Use SMTP commands to expose features supported by Postfix MTA
Discuss SMTP Auth pre-requisites
Recompile Postfix to support SMTP Auth
Configure Postfix with SMTP Auth to restrict relaying by users vs. IP or hostname
Confirm support of SMTP Auth using standard STMP commands
Configure Outlook Express client to support SMTP Auth
Attempt to relay based on SMTP Auth support
Permit relaying of non-local domains based on relay domains
Define additional second-level domain for relaying
Configure relaying of non-local domains using hashed Berkeley DB maps
Discuss Postfix transport maps concepts and applications
Define transport maps for domains to bypass DNS MX lookups
Update receiving Postfix host to support transport maps
Confirm delivery of messages to additional domains defined in transport maps
Configure Postfix as a Backup Mail Exchanger (MX) host and confirm delivery during failure

Postfix - Smart Host & Null Client configuration
Discuss Smart Host concepts and applications
Define the Postfix Smart Host
Define the Postfix Smart Host client
Test local delivery and confirm delivery
Test delivery of Internet-based message which requires Smart Host
Confirm delivery via logs and remote SSH session
Discuss Null client concepts and applications
Internet -> DMZ -> Corporate Backbone Mail Repository
Disable local mail delivery on Postfix host
Configure Postfix to function as a null client
Test results of null client delivery

Postfix - Virtual Domains
Discuss default domains handled by Postfix
Attempt IP-address based delivery
Explore the mydestination parameter
Alter BIND configuration to route messages for basic virtual domain
Configure Postfix to map individual users to domains
Define individual virtual domains hash
Define virtual domains user hash
Generate hashed virtual domains and virtual user databases
Confirm routing of messages to appropriate users
Define catchall addresses for non-matching users and/or aliases
Use Postmap to query virtual users and determine delivery path

Postfix - Mailbox Formats
Explore default mbox configuration location and permissions
Describe mbox format
Explore environment configuration variables related to mail delivery
Test delivery of mbox-bound messages using mutt & Postfix
Discuss Maildir message storage format
Configure Postfix to deliver messages using Maildir message format
Examine Postfix-created Maildir structure after mail delivery
Alter shell environment to support Maildir format with desired MUA

Postfix - Network-based Mail Retrieval
Discuss Courier IMAP framework
Identify and install pre-requisites
Download, compile, and install Courier Authentication Library Daemon
Identify Courier Authentication key directories, binaries and configuration file
Download and install Courier IMAP Daemon
Explore Courier IMAP binary directory tree
Discuss Courier framework
Configure Courier for POP3 mail retrieval
Confirm retrieval using Windows 2003 - Outlook Express client
Identify POP3 Secure configuration files
Generate self-signed certificate for use with POP3 Secure communications
Confirm retrieval of messages using Outlook Expres and POP3 Secure
Establish run-level symbolic links for POP3 & POP3S services
Configure Courier for IMAP mail retrieval
Confirm retrieval using Windows 2003 - Outlook Express client
Generate self-signed certificate for use with IMAP Secure communications
Establish run-level symbolic links for IMAP & IMAPS services

Postfix - Web-based Mail Retrieval
Discuss Web-based SquirrelMail pre-requisites
Enable Apache web server
Download and Install SquirrelMail into web-accessible location
Secure data and attachments directories
Configure SquirrelMail for initial use with Courier IMAP
Address PHP session-related issues
Explore SquirrelMail from the browser as various Linux users
Confirm deliver using multiple clients - (mutt/Outlook Express/SquirrelMail/Local Injection)

Postfix - Malware Framework
Dowload MailScanner
Download Clam Anti-Virus (ClamAV)
Download SpamAssAssin
Download, compile & install zlib

Clam Anti-Virus (ClamAV) Implementation

Create required user and group

Compile & install ClamAV

Identify key ClamAV binaries

Update ClamAV configuration files for basic operation

Update ClamAV definitions

Configure system Crontab to update virus definitions every hour
Confirm scheduled virus definition updates 24 hours later

SpamAssAssin Implementation
Illustrate message flow from remote SMTP system through our Malware Framework
Download SpamAssAssin from Apache Foundation
Extract & discuss SpamAssAssin source tree
Compile and install Perl-based SpamAssAssin

MailScanner Implementation
Download, compile and install the current MailScanner malware engine
Explore MailScanner source and binary trees
Explore MailScanner.conf configuration file - discuss important directives
Update MailScanner to support Postfix MTA
Configure Postfix MTA to route inbound messages into temporary queue for processing
Invoke MailScanner malware engine and confirm
Debug incidentals related to invalid configuration directives and missing components
Malware Framework - MUA -> MTA -> MailScanner -> ClamAV -> SpamAassAssin -> MTA -> Maildir/Mailbox
Send sample malware through the malware framework & confirm detection
Send sample spam through the malware framework & confirm detection
Configure MailScanner to affix outbound Corporate Signatures - Legalise - to all messages based trusted configuration

Postfix - Log Analysis
Download AWStats log analysis application
Configure AWStats to function in current Apache Web Server environment
Discuss AWStats features and applications
Configure AWStats to process Postfix MTA Logs
Explore AWStats’ web-based interface

top
LinuxCBT qmail Edition - Disc 3

qmail - Installation
Identify current Mail Transfer Agent (MTA) environment on Red Hat Enterprise box
Discuss system initialization environment
Disable current MTA in applicable run-levels
Identify qmail pre-requisites
Setup qmail source-tree hierarchy for build process
Discuss qmail’s modular, component architecture - relevant binaries
Navigate to a close qmail mirror
Download qmail components
Extract primary qmail packaged and dicuss contents
Patch original qmail sources
Install ucspi-tcp - INETD/XINETD substitute
Install dameontools - daemon management for qmail daemons
Create requisite users and groups
Compile and install qmail
Define default qmail environment
Explore and discuss the important qmail directories, symlinks and binaries
Illustrate internal qmail communications required for local and remote deliveries
Identify initial qmail startup process
Define genersal startup scripts for qmail
Define supervise scripts for qmail delivery
Define supervise scripts for qmail logging
Backup default local queue-injection process (Sendmail)
Create Sendmail symlink to qmail-compatible binary for local queue-injection
Start qmail & confirm processes and network bindings

qmail - Local Mail
Define required system aliases using qmail files
Configure qmail rules to permit local relaying
Identify default mbox mail storage format
Use MUA mutt to deliver mail via qmail
Examine delivery via qmail logs
Identify mbox destination
Discuss local queue-injection logic - qmail-inject/Sendmail
Explain permissions used by qmail when delivering local mail
Update local user’s environment variables and confirm message delivery
Identify variables used for local queue-injection
Explore and discuss the mbox mail storage format
Update global environment configuration to reflect new mbox storage location
Examine running qmail statistics
Inject messages into the queue of a downed MTA
Examine results
Explore a message’s path throught the local queue
Resume message delivery

qmail - Mail Storage Formats
Switch qmail global configuration from mbox to Maildir storage format
Use maildirmake to create Maildir-compliant directory structure for users
Explore standard Maildir directory tree
Restart qmail and attempt delivery to Maildir mailbox
Confirm deliver of message to Maildir recipient
Discuss Maildir file nomenclature
Update environment variables to reflect Maildir mail storage format
Explore headers of delivered messages and discuss key components

qmail - Aliases
Explain the benefits of aliases
Explore traditional Sendmail-style aliases in /etc/aliases
Compare and contrast Sendmail-style aliases to qmail-style (.qmail) aliases
Discuss key qmail alias user
Explore system-wide qmail aliases
Test delivery to system-wide qmail aliases
Define an abuse qmail-style alias and confirm delivery
Deine one-to-many qmail-style abuse alias and confirm delivery
Attempt delivery to non-existing local user or alias using Sendmail and confirm results
Define a catch-all system-wide alias to handle non-existing local users or accounts
Test catch-all system-wide alias by injecting messages bound to non-existing mailboxes
Discuss sub-addresses/address extensions using qmail aliases
Define sub-address for non-privileged user and confirm delivery using MUA mutt
Forward defined non-privileged sub-address to other local user and examine results
Redirect the abuse alias to a Mailbox-style repository for evidence-collection
Confirm appended alias-redirection of messages destined to catch-all accounts

qmail - Remote Mail
Identify key qmail daemons and binaries responsible for remote delivery
Explain remote delivery logic using DNS
Connect (SSH) to remote Linux system to be used for initial remote delivery & explore
Attempt remote delivery using qmail and FQDN of remote box and examine the qmail queue
Alter remote Postfix environment to find Maildir mailbox and confirm delivery using mutt
Update remote Postfix configuration to handle messages destined to second-level domain
Alter remote Postfix transport (smtproutes) file to disable static delivery
Confirm DNS second-level Mail Exchanger (MX) configuration for linuxcbt.internal domain
Attempt MX-based delivery and confirm delivery on remote host
Discuss employed qmail logic
Switch primary Mail Exchanger (MX) from Postfix box to qmail box - adjusting distances
Confirm MX distances using Domain Information Groper (dig)
Attempt delivery to second-level domain from the qmail box & confirm delivery
Explore qmail log files for message-delivery information
Debug qmail-smtpd delivery issues and adjust to ensure delivery
Discuss a Backup MX configuration for a given domain
Update DNS configuration to reflect the ideal MX distances
Confirm DNS configuration from a tertiary Linux server
Purposely fail the primary Postfix server for the linuxcbt.external domain
Configure qmail to be a Backup MX server for a business partner’s domain
Attempt delivery to the linuxcbt.external domain from the tertiary Linux server
Examine queued messages for the linuxcbt.external backup domain on the qmail box
Re-enable the primary domain’s Postfix box
Flush the qmail queue and examine delivery to the primary MX host

qmail - Relay Control
Discuss Smart Host applications
Explore pre-Smart Host SMTP delivery of messages to Internet-based host
Configure qmail to use a remote Postfix SMTP Smart Host system
Disable Smart Host configuration
Discuss qmail’s default relay policy
Identify key qmail configuration files related to relaying
Attempt to relay from a remote Windows 2003 Host through the open qmail MTA
Confirm delivery of message via qmail in open-relay mode to local and remote recipients
Secure open relay and confirm inability to relay messages to untrusted domains
Configure selective relaying based on individual host and subnet
Discuss the benefits of SMTP Auth
Explain qmail’s SMTP Auth implementation
Identify SMTP Auth pre-requisites
Download, compile and install CheckPassword authentication application
Debug compilation-related errors
Download SMTP Auth patch
Patch qmail sources and recompile to produce modified qmail-smtpd binary
Install new qmail-smtpd binary and prepare run scripts for usage
Attempt to relay with tightened relay permissions and confirm failure
Confirm SMTP Auth from Windows 2003 Host using Outlook Express
Relay outbound messages using SMTP Auth from Outlook Express client

qmail - Network-based Mail Retrieval
Discuss Mail retrieval authentication framework using Courier
Identify pre-requisites
Download, compile and install Courier Authentication Daemon

Identify Courier Authentication key directories, binaries and configuration file
Download and install Courier IMAP Daemon
Explore Courier IMAP binary directory tree
Discuss Courier framework
Configure Courier for POP3 mail retrieval
Confirm retrieval using Windows 2003 - Outlook Express client
Identify POP3 Secure configuration files
Generate self-signed certificate for use with POP3 Secure communications
Confirm retrieval of messages using Outlook Expres and POP3 Secure
Establish run-level symbolic links for POP3 & POP3S services
Configure Courier for IMAP mail retrieval
Confirm retrieval using Windows 2003 - Outlook Express client
Generate self-signed certificate for use with IMAP Secure communications
Establish run-level symbolic links for IMAP & IMAPS services

qmail - Web-based Mail Retrieval
Discuss Web-based SquirrelMail pre-requisites
Enable Apache web server
Download and Install SquirrelMail into web-accessible location
Secure data and attachments directories
Configure SquirrelMail for initial use with Courier IMAP
Address PHP session-related issues
Explore SquirrelMail from the browser as various Linux users
Confirm deliver using multiple clients - (mutt/Outlook Express/SquirrelMail/Local Injection)

qmail - Virtual Domains
Discuss qmail virtual domains support via system-wide aliases
Configure basic/global virtual domains using .qmail files
Confirm delivery to users @ virtual domains
Configure individual virtual domains
Confirm delivery to individuals @ virtual domains
Ensure non-global delivery to virtual domains
Define non-privileged user-managed virtual domains
Confirm deliver to user-managed virtual domains

qmail - Malware Framework - OpenProtect, Bad Senders, TLS
Discus the OpenProtect Malware Framework
Identify pre-requisites
Download OpenProtect
Install Open Protect
Explore OpenProtect Configuration (MailScanner/ClamAV/SpamAssAssin)
Configure outbound signatures
Configure qmail to reject users based header information
Confirm rejection from Windows 2003 Host - Outlook Express
Discuss Transport Layer Security framework and requirements
Implement Transport Layer Security (TLS)
Configure Outlook Express client to use TLS & test outbound relaying

Download CD1:
www.megaupload.com/?d=HEP16S5C
www.megaupload.com/?d=JC2UH34Z
www.megaupload.com/?d=TSYB5COD
www.megaupload.com/?d=534Q3PKX
www.megaupload.com/?d=2BA6EZX9
www.megaupload.com/?d=WAS9HR46
www.megaupload.com/?d=0SCLBRM9
www.megaupload.com/?d=2T3ACQSS
www.megaupload.com/?d=0FNJZA5N
www.megaupload.com/?d=G1KUYR4W

Download CD2:
www.megaupload.com/?d=2ZITVGZY
www.megaupload.com/?d=FZTG462B
www.megaupload.com/?d=O5E30DDE
www.megaupload.com/?d=AONHI282
www.megaupload.com/?d=MX5T4AWO
www.megaupload.com/?d=RI4IX0UA
www.megaupload.com/?d=KQSKFP98
www.megaupload.com/?d=F01HSS08
www.megaupload.com/?d=0WUIOZA2
www.megaupload.com/?d=EB81EUO6
www.megaupload.com/?d=199GB93R

ISA Server 2006 Lab Manuals

Free Image Hosting at www.ImageShack.us

The main ISA Server 2006 lab manual consists of nine lab modules:

- A. Introduction to ISA Server
- B. Configuring Outbound Internet Access
- C. Publishing Web Servers and Other Servers
- D. Publishing an Exchange Server
- E. Enabling VPN Connections
- F. ISA Server 2006 as Branch Office Gateway
- G. Enterprise Management of ISA Servers
- H. Configuring Load Balancing
- I. Using Monitoring, Alerting and Loging

Each lab module is independent of the other lab modules.

All nine lab modules are in a single lab manual, named ISA 2006 Lab Manual.doc.

The modules contain exercises about new or changed functionality in ISA Server 2006,
and contain exercises about functionality that is the same in ISA Server 2004.

In the “subset” lab manual, only the exercises about new or changed functionality
in ISA Server 2006 are put together in a single lab manual. All these exercises
are also in the main lab manual.

Each lab manual has a version formatted for A4 paper size, and a version formatted
for Letter paper size.

Download:
rapidshare.com/files/50240925/2oo6-I-S-a.part01.rar
rapidshare.com/files/50241018/2oo6-I-S-a.part02.rar
rapidshare.com/files/50241092/2oo6-I-S-a.part03.rar
rapidshare.com/files/50241166/2oo6-I-S-a.part04.rar
rapidshare.com/files/50241237/2oo6-I-S-a.part05.rar
rapidshare.com/files/50241301/2oo6-I-S-a.part06.rar
rapidshare.com/files/50241390/2oo6-I-S-a.part07.rar
rapidshare.com/files/50241478/2oo6-I-S-a.part08.rar
rapidshare.com/files/50241558/2oo6-I-S-a.part09.rar
rapidshare.com/files/50241627/2oo6-I-S-a.part10.rar
rapidshare.com/files/50241709/2oo6-I-S-a.part11.rar
rapidshare.com/files/50241779/2oo6-I-S-a.part12.rar
rapidshare.com/files/50241856/2oo6-I-S-a.part13.rar
rapidshare.com/files/50241923/2oo6-I-S-a.part14.rar
rapidshare.com/files/50241969/2oo6-I-S-a.part15.rar
rapidshare.com/files/50242042/2oo6-I-S-a.part16.rar
rapidshare.com/files/50242104/2oo6-I-S-a.part17.rar
rapidshare.com/files/50242169/2oo6-I-S-a.part18.rar
rapidshare.com/files/50242235/2oo6-I-S-a.part19.rar
rapidshare.com/files/50242314/2oo6-I-S-a.part20.rar
rapidshare.com/files/50242331/2oo6-I-S-a.part21.rar

200 Ways to Revive a Hard Drive

Free Image Hosting at www.ImageShack.us

Fantastic Guide–> 200 Practical tips to recover your damaged Hard Drive.. Hard drive failures may be responsible for the biggest headaches IT professionals experience. Recovering lost or corrupted data from failed disks is a nightmare. Fortunately, you have help. TechRepublic asked its members what recovery methods worked best for them

Hard drive failures may be responsible for the biggest headaches IT professionals experience. Recovering lost or corrupted data from failed disks is a nightmare. Fortunately, you have help. TechRepublic asked its members what recovery methods worked best for them. Solutions poured in from IT professionals who’ve tried everything, revealing that, in many cases, hopeless situations aren’t hopeless. In fact, data can often be retrieved from failed disks, if you know how. 200 Ways to Revive a Hard Drive collects more than 200 creative, resourceful, and crafty tips from TechRepublic members. In their own words, here are the solutions they’ve turned to when trying to rescue data following a hard disk crash or failure.

Download:
rapidshare.com/files/76805524/200_Ways_To_Recover_Revive_Your_Hard-Drive.pdf

Hacking Gmail 2007***

Free Image Hosting at www.ImageShack.us

Free Image Hosting at www.ImageShack.us

Info
by Ben Hammersley
Paperback: 284 pages
Language: English

Download

http://rapidshare.com/files/75395250/hacking_gmail_2007_Tera_21_Balkan-Media.zip

Bypass ur internet provider monthly bandwith.

========================
Cable_Modem_Modification_Kit_V8.1
========================
Cable Modem Hacking Guide With Pictures
------------------------------------------------
Bypass ur internet provider monthly bandwith.
Only for cable users.

Pass: rapidworld.i67.org

http://rapidshare.com/files/77009386/Cable_Modem_Modification_Kit_V8.1.part01.rar
http://rapidshare.com/files/77010494/Cable_Modem_Modification_Kit_V8.1.part02.rar
http://rapidshare.com/files/77011638/Cable_Modem_Modification_Kit_V8.1.part03.rar
http://rapidshare.com/files/77012426/Cable_Modem_Modification_Kit_V8.1.part04.rar
http://rapidshare.com/files/77013167/Cable_Modem_Modification_Kit_V8.1.part05.rar
http://rapidshare.com/files/77013871/Cable_Modem_Modification_Kit_V8.1.part06.rar
http://rapidshare.com/files/77014532/Cable_Modem_Modification_Kit_V8.1.part07.rar
http://rapidshare.com/files/77015206/Cable_Modem_Modification_Kit_V8.1.part08.rar
http://rapidshare.com/files/77016084/Cable_Modem_Modification_Kit_V8.1.part09.rar
http://rapidshare.com/files/77016746/Cable_Modem_Modification_Kit_V8.1.part10.rar
http://rapidshare.com/files/77017376/Cable_Modem_Modification_Kit_V8.1.part11.rar
http://rapidshare.com/files/77018055/Cable_Modem_Modification_Kit_V8.1.part12.rar
http://rapidshare.com/files/77018757/Cable_Modem_Modification_Kit_V8.1.part13.rar
http://rapidshare.com/files/77019426/Cable_Modem_Modification_Kit_V8.1.part14.rar
http://rapidshare.com/files/77020114/Cable_Modem_Modification_Kit_V8.1.part15.rar
http://rapidshare.com/files/77020797/Cable_Modem_Modification_Kit_V8.1.part16.rar
http://rapidshare.com/files/77023453/Cable_Modem_Modification_Kit_V8.1.part17.rar
http://rapidshare.com/files/77023941/Cable_Modem_Modification_Kit_V8.1.part18.rar

About Me

My photo
bangalore, karnataka, India
View sudhesh pnair's profile on LinkedInIn .com