Reproduction of the original. The publishing house Megali specialises in reproducing historical works in large print to make reading easier for people with impaired vision.
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response. In fact, this "roll up your sleeves and get busy" security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective.
Supplementary reading book used in Saskatchewan schools. Young Jack March, a poor orphan from the workhouse, wants nothing more than to be a choirboy and have a home at Daddy Darwin's dovecot where he will tend the pigeons.
*Pro Open Source Mail: Building An Enterprise Mail Solution is the first book to cover development and deployment of an enterprise mail server environment *Authored by Curtis Smith, a system administrator with more than five years of experience managing mail environments *Shows readers how to filter spam using the popular SpamAssassin open source project and how to stop viruses using the MailScanner, Amavis, and ClamAV projects
This book is a collection of notes and sample codes written by the author while he was learning email systems. Topics include email message transmission protocols: SMTP, IMAP, POP3; secure connections with SSL/TLS protocols; managing Postfix server as MSA, MTA and MDA agents; managing Dovecot server for email retrieval with IMAP and POP3 protocols; Thunderbird and other email client tools. Updated in 2024 (Version v1.03) with minor updates. For latest updates and free sample chapters, visit https://www.herongyang.com/Email.
This book is a collection of notes and sample codes written by the author while he was learning Linux systems. Topics include using Cockpit Web portal for admin tasks; managing users and groups; managing files and directories; managing NTFS, CIFS, EXT4, LBA, LVM file systems; using network tools and security firewall; installing CentOS systems; using SELinux (Security-Enhanced Linux) system; DNF/YUM software package manager; SSH Server configuration and client tools; managing vsftpd - Very Secure FTP daemon; managing directory service with OpenLDAP; Updated in 2024 (Version v5.44) with email topics moved to 'Email Tutorials' book. For latest updates and free sample chapters, visit https://www.herongyang.com/Linux.
The official "Ubuntu 11.04 Server Guide" contains information on how to install and configure various server applications on your Ubuntu system to fit your needs.
"Mastering Red Hat Linux 8.1" is aimed at beginning to advanced users who want to install, configure, and network Linux. It teaches non-Unix Windows users how to get Red Hat Linux up and running.
The official "Fedora 15 Deployment Guide" covers deployment, configuration, and administration of Fedora 15. It is oriented towards system administrators with a basic understanding of the system.