Home | Link 1 Link 1 | Link 2 | Link 3

Header Image

MY RESOURCES

My Shorthands
- My Experiences: My Services
- My Portfolio: Creative Juice ----------------------------------
My Contrib
- OSSEC: WebUI
- MySQL: Webinars Proxy
- SysAdmin: Tools/Scripts
----------------------------------
System Administration
- OpenBSD/Linux
- Shell/Perl/PHP
- SNMP, SMTP, POP, DNS, NFS, HTTP, SQL, FTP, SSH
----------------------------------
- MySQL Database
- MySQL Cluster
- MySQL Replication
- MySQL Proxy
----------------------------------
- Apache Software Foundation
- Apache HTTPD Web Server
- Tomcat HTTPD Web Server
----------------------------------
Programming
- Perl v4,5
- PHP v3,4,5
- ActionScript v1,2,3
- JavaScript v1.x
- HTML 2, 3, 4
- Shell (Bash/Korn/C)
- C/C++ v6.0
- Visual Basic v6.0
- Lua
Resources & Related Links
- Internet Engineering Task Force
- RFC Database
- Internet Society
- Internet Archetecture Board
- Internet Assigned Numbers Authority
- Internet Research Task Force
- Institute of Electrical and Electronics Engineers
----------------------------------
- Word Wide Web Consortium
- History of the Internet
- Lorem Ipsum
View my profile on LinkedIn

SYSTEMS ADMINISTRATION - MY CONTRIB

page description/overview...

DATA INTEGRITY

BACKUP & RESTORATION   |   organize backup and restoration for different system areas
introduction text
Linux System Essentials
Backing up the essential files needed for a proper restoration of your custom Linux installation. This script is based off of the RHEL5 operating system but it is designed to cover all core Linux-based distributions.
Link 2
Link 2 description.
Link 3
Link 3 description.
Link 4
Link 4 description.
Table footer.

 

DATA SECURITY

INTRUSION DETECTION   |   generic startup scripts and guidelines for securing systems

Security is designed based on the system and network for which it applies to. There are many ways to monitor, alert, track, trace, lock and jail each system or network. I do not intend to cover them all here. But, I do intend to give a clear guideline, road-map and a starting point for whatever system and network you may administrate.

Customization is the first key. Being original prevents an intruder from coming up with work-arounds since to do this requires knowledge of the environment. Original (or custom) environments do not lend this kind of flexibility. When it comes to monitoring, the best policy is to "roll-your-own" tools. Commercial products are great for productivity and support and offer cost-effective solutions. However, they are known systems that intruders have access to as well, and the would-be intruder can find an exploitable configuration testing safely within their own network before touching yours.

Autonomy is the second key. Again, we are faced with cost-effective, ease-of-use; ease-of-administration, versus true security. Integrated systems are just that -- integrated. When designing any integration method (hardware or software), attention should be made to how one will affect the other if there is any type of accident or compromise. With autonomous designs, there are many more keystrokes to perform a task. We have been trying to pull away from manual labor and onto a world of automation and simplification so much that we are willing to sacrifice a simple but under-acknowledged concept for it. Humans are intelligent and applications are not. We can program an application to appear intelligent, but if you look at the source code it is all logical program. There is no emotion applicable to binary logic operation. Emotion is true randomness which is why we are having trouble creating a real random number and why security is not 100%.

Link 1
Link 1 description.
Link 2
Link 2 description.
Link 3
Link 3 description.
Link 4
Link 4 description.
Table footer.

 

TABLE TITLE   |   table title description
introduction text
Link 1
Link 1 description.
Link 2
Link 2 description.
Link 3
Link 3 description.
Link 4
Link 4 description.
Table footer.
«←→»

OTHER "MY" LINKS

Frequent News Links
- Google News
- MSNBC
- Reuters
- Fox News
SCI/TECH Headlines
* This RSS feed URL is deprecated
* Amazon Go Android App Claims Checkout-Free Shopping Is Here - Android Headlines
* Why parents should worry about Office 365's Immersive Reader dictation feature for students - PCWorld
* Rupert Murdoch wants Facebook to pay publishers for their news content - NBCNews.com
* Intel halts some chip patches as the fixes cause problems - CNET
* Facebook Says It May Not Be Good For Democracy - U.S. News & World Report
* SpaceX's Big Rocket, the Falcon Heavy, Finally Reaches the Launchpad - New York Times
* Apple reportedly plans to discontinue the first-gen iPhone X later this year - BGR
* NASA pulled this astronaut from a space station crew. Her brother blames racism. - Washington Post
* If we start deliberately cooling the Earth, we may not be able to stop - The Verge
Copyright Clint D. Alexander ©2009-2012 Link 1 | Link 2 | Link 3