![](images/graphics/blank.gif)
Securing your files
-
Ebook Managing Linux systems with webmin: Part 1 includes contents: Introduction to Webmin, installing Webmin, securing your Webmin server, users and groups, disk and network filesystems, NFS file sharing, disk quotas, bootup and shutdown, scheduled commands, process management, software packages, network information service,…
393p
longtimenosee05
31-03-2024
1
0
Download
-
Ebook Networking with Microsoft Windows Vista: Your guide to easy & secure Windows Vista networking - Part 1 includes content: Chapter 1 understanding ethernet networking, chapter 2 understanding wireless networking, chapter 3 configuring your router, chapter 4 putting your network together, chapter 5 working with vista’s basic network tools and tasks, chapter 6 managing network connections, chapter 7 managing wireless network connections, chapter 8 accessing and sharing network resources, chapter 9 setting up vista as a digital media hub, chapter 10 taking advantage of your network, chapte...
295p
longtimenosee03
22-02-2024
8
2
Download
-
Linux utilities cookbook includes contents: Chapter 1, Using the Terminal / Command Line, covers how to get the most out of the Linux command line. Chapter 2, The Desktop, introduces some of the desktop environments available for Linux. Chapter 3, Files and Directories, explains files, directories, and how to manage them. Chapter 4, Networking and the Internet, covers connectivity and how to fix it when it goes down. Chapter 5, Permissions, Access, and Security, gives a brief overview of Linux security features. Chapter 6, Processes, explains how to manage processes in Linux.
224p
haojiubujain010
14-12-2023
6
4
Download
-
Doing the actual math behind modern encryption is admittedly quite difficult, but using the tools that do the work for you isn’t difficult at all once you have a rudimentary understanding of when to use which sort of encryption. PGP & GPG: Email for the Practical Paranoid will take you step by step through the world of encryption and digital signatures and teach you how to use the tools that will allow you to protect your confidential information while sharing it as you desire.
216p
haojiubujain06
23-10-2023
4
3
Download
-
Ebook Practical oracle security: Your unauthorized guide to relational database security includes contents: Chapter 1: Oracle security: the big picture; Chapter 2: File system; Chapter 3: TNS listener security; Chapter 4: Managing default accounts; Chapter 5: PUBLIC privileges; Chapter 6: Software updates; Chapter 7: Passwords and password controls; Chapter 8: Database activity monitoring; Chapter 9: Implementation guide.
262p
haojiubujain06
23-10-2023
5
3
Download
-
Ebook "Data protection for photographers: A guide to storing and protecting your valuable digital assets" explains current data protection and storage technologies in everyday terms. It describes effective procedures for protecting data, from capture to backup and archiving. Descriptions of specific products applicable to Windows, MacOS, and Linux systems are provided.
177p
loivantrinh
29-10-2023
8
3
Download
-
Ebook "Node.js recipes" includes content: Understanding node.js; networking with node.js; using the file system; building a web server; using events and child processes; implementing security and cryptography; discovering other node.js modules; creating a websocket server; using web server frameworks; connecting to a data store; testing in node.js; debugging and deploying your application.
369p
haojiubujain07
20-09-2023
5
3
Download
-
Ebook Hack proofing sun solaris 8 Part 1 includes contents: Chapter 1 introducing solaris security: evaluating your risk, chapter 2 securing solaris with the bundled security tools, chapter 3 securing solaris with freeware security tools, chapter 4 securing your users, chapter 5 securing your files.
183p
haojiubujain06
05-09-2023
3
2
Download
-
Ebook Hardening Linux Part 1 includes contents: Chapter 1 hardening the basics, chapter 2 firewalling your hosts, chapter 3 securing connections and remote administration, chapter 4 securing files and file systems, chapter 5 understanding logging and log monitoring.
309p
haojiubujain06
05-09-2023
7
3
Download
-
Encryption is the process of protecting data by using an algorithm to scramble it. The data is unintelligible, undetectable, unreadable and irretrievable unless a key is used to reverse the encryption, or decrypt, the data. Encryption is used all the time, often without you even realising it. Whenever you buy something online and make a transaction, all your details are heavily encrypted until they reach the other end, making sure that no third party could be listening in.
27p
namde04
08-05-2013
46
4
Download
-
One of the great things about PHP is its vibrant and active community. Developers enjoy many online meeting points, including the SitePoint Forums, 1 where de velopers get together to help each other out with problems they face on a daily basis, from the basics of how PHP works, to solving design problems like “How do I val idate a form?”As a way to get help, these communities are excellent—they’re replete with all sorts of vital fragments you’ll need to make your projects successful.
207p
namde04
04-05-2013
58
11
Download
-
You must apply for a new driver’s license by visiting a Driver Services facility within 30 days of legally changing your name. You must provide documentation that links your new name to the name on your current driver’s license card and on file with the Secretary of State’s office. The name displayed on your driver’s license will be your full given name and surname as recorded at birth, recorded at marriage, recorded with the Social Security Administration or otherwise established through legal action. The appropriate fee must be paid to receive a new license and/or ID card. ...
64p
nhacsihuytuan
13-04-2013
45
3
Download
-
Developing Secure Applications with Visual Basic first provides you with an understanding of encryption, and then guides you through adding security features to your own applications using the Microsoft CryptoAPI, and the new security features of Windows 2000. Developers who have been confused by the high-end, academic style of other encryption books and cryptography theory will delight with Chapman's understandable style and hands-on methods.
606p
trac2_123
11-04-2013
70
17
Download
-
As one of the most popular open source content management systems available today, WordPress boasts a framework that allows you to easily customize and extend it through plugins. This comprehensive book shows you how plugins work, reviews the tools and APIs available in WordPress, and demonstrates how to extend the functionality of WordPress with plugins.
554p
titatu_123
09-03-2013
109
31
Download
-
You can earn a maximum of four credits each year. In 2010, the amount earned to accrue one credit was $1,120. This amount changes annually. Therefore, to earn four credits in 2010 you would need to earn a minimum of $4, 480. If you operate a home-based business while living overseas, you will need to file and pay your self-employment tax which will include a Social Security and Medicare payment. All credits earned will remain in your Social Security Account, even through years when you are not working or contributing. You can only earn...
27p
bi_ve_sau
05-02-2013
43
2
Download
-
One reason many family members decide to work inside one of our U.S. missions is to accrue retirement benefits. This is a valuable benefit if you are in a Family Member Appointment, but you can create your own retirement benefits with a home-based business by contributing credits to your Social Security plan. When you are posted in the United States, contributing to your Social Security is done through the self-employment tax.
47p
bi_ve_sau
05-02-2013
49
4
Download
-
cacls /T /E /G administrator:F d:\users\*.* Cacls will add Full Control for the adminsitrator account all files and subfolders in the Users folder of the D:\ drive. cacls /T /E /R Everyone d:\users Cacls will remove all permissions for the 'Everyone' group in all files and subfolders in the Users folder of the D:\ drive. Be sure to use the /E switch when you are just making modifications to a specific account or group. Without the /E switch, your settings will replace the current security with only what is specified. ...
19p
muathu_102
28-01-2013
27
2
Download
-
Part of an overall Firewall strategy Sits between the local network and the external network Originally used primarily as a caching strategy to minimize outgoing URL requests and increase perceived browser performance Primary mission is now to insure anonymity of internal users Still used for caching of frequently requested files Also used for content filtering Acts as a go-between, submitting your requests to the external network Requests are translated from your IP address to the Proxy’s IP address E-mail addresses of internal users are removed from request headers Cause an actual brea...
15p
muathu_102
28-01-2013
76
3
Download
-
If your household harbors more than one computer, you’ve probably wondered about home networking. Maybe you’ve gone so far as to start setting up a network and given up in frustration. Well, now you can relax. Home Networking All-In-One Desk Reference For Dummies has come to the rescue! A network will make your life easier, and Home Networking All-In-One Desk Reference For Dummies makes it easier to create one.
723p
stingdau_123
21-01-2013
84
24
Download
-
If a violation does occur, enforcement action may be taken by law enforcement or through the civil court system. Law enforcement officers may be able to assist you by treating your order as if it were issued in their jurisdiction. Depending on the laws and policies of that jurisdiction, officers may be allowed to pick up children, or even arrest for violation of the custody provision in your protection order. An advocate will be able to give you information regarding the law enforcement response in the jurisdiction.
6p
enter1cai
12-01-2013
44
3
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)