This free ebook is a great handbook for UNIX users and administrators.UNIX end-users desperately need an up-to-date reference guide with real depth: one that teaches UNIX commands and doesn’t just list them! In UNIX User’s Handbook, Second Edition, best-selling UNIX author Marty Poniatowski covers every topic UNIX users need to master—with exceptional clarity and practical, real-world examples. Part I brings together thorough coverage of virtually every key aspect of day-to-day UNIX operation and end-user administration. Part II presents an in-depth programming reference. Part III covers every leading option for Windows interoperability.

You’ll find fast, easy answers for all this and more:

* Getting started: login, mail, Internet access, and key UNIX file management commands

* All basic UNIX commands and a complete UNIX file system overview (cd, cp, file, ls, mv, pwd, rm, rmdir, cut, paste, split, sort, diff, and more)

* Key UNIX tools—including in-depth coverage of find, vi, find, grep, sed, and awk

* Shells and shell programming: Bash, Korn, and C

* Full programming section—including a NEW user-centered introduction to C/C++ and Java

* End-user administration: processes, startup, shutdown, users/groups, backup, software management, printing, and more

* Networking and Internet protocols

* UNIX/Windows interoperability: Samba, X Window, NFS, Posix, Windows 2000 Services for UNIX, and other alternatives

* Performance and monitoring

This new edition has been updated throughout and redesigned for even faster, easier access to information. Whatever your experience, whatever UNIX version you use, you won’t find a more useful reference!

The in-depth UNIX guide for every end-user: completely updated and full of examples!

* For every key UNIX platform: practical examples, real depth!

* Covers all basic UNIX commands, plus sed, grep, awk, vi, and more

* Complete shell programming coverage—plus NEW programming section covering C/C++, Java(tm), and Internet development

* KornShell, Bash, C Shell, and Shell Programming

* Windows interoperability, in depth: Samba, NFS, Windows 2000 Services for UNIX, and much more

Download link

Non Camera SmartPhones

This free ebook details Redhat Securing & Optimizing Linux technology.If you want to take advantage of Linux’s versatility as a server operating system, and do it in the most secure and efficient manner, you can find no better book than this one. In addition to operating system configuration there are many chapters individually dedicated to installing and configuring specific Linux server applications such as Sendmail, SQL server, Apache, BIND, and many more.As an NT Administrator I have read many Linux books trying to bridge my NT knowledge to the Linux and Unix world, this book is by far the best.Most of the Linux books I have read before tell you what to do to administer a Linux server, but they assume that you know how to do it. Gerhard Mourani tells you in detail what to do, how to do it, and why to do it. I have learned a great deal not only about Linux server applications, but about the Linux operating system itself.

Ebook Contents :-

Part I Installation-Related Reference

Chapter 1 Introduction to Linux

Chapter 2 Installation of your Linux Server

Part II Security and Optimization-Related Reference

Chapter 3 General System Security

Chapter 4 General System Optimization

Chapter 5 Configuring and Building a secure, optimized Kernels

Part III Networking-Related Reference

Chapter 6 TCP/IP Network Management

Chapter 7 Networking Firewall

Chapter 8 Networking Firewall with Masquerading and Forwarding support

Part IV Software-Related Reference

Chapter 9 Compiler Functionality

Chapter 10 Securities Software (Monitoring Tools)

Chapter 11 Securities Software (Network Services)

Chapter 12 Securities Software (System Integrity)

Chapter 13 Securities Software (Management & Limitation)

Chapter 14 Server Software (BIND/DNS Network Services)

Chapter 15 Server Software (Mail Network Services)

Chapter 16 Server Software (Encrypting Network Services)

Chapter 17 Server Software (Database Network Services)

Chapter 18 Server Software (Proxy Network Services)

Chapter 19 Server Software (Web Network Services)

Chapter 20 Optional component to install with Apache

Chapter 21 Server Software (File Sharing Network Services)

Part VI Backup-Related reference

Chapter 22 Backup and restore procedures

Part VII Appendixes

Appendix A Tweaks, Tips and Administration Tasks

Appendix B Obtaining Requests for Comments (RFCs)

Download link

Non Camera SmartPhones

The Sun Solaris 10 Operating System Essentials training video tutorials provides students with the knowledge and skills to use UNIX commands and basic Solaris OS commands. This product is for new users of the Solaris OS. Students learn fundamental command-line features of the Solaris OS, including file system navigation, file permissions, the vi text editor, command shells, and basic network use.Students who can benefit from this course are those unfamiliar with the UNIX operating system, new users of the Solaris 10 OS, and system administrators who want to be certified in the Solaris 10 OS.

Skills Gained :-

Upon completion of this course, you should be able to:-

* Use the desktop and online documentation
* Use command-line features
* View and search files and directories
* Change the Solaris directory contents
* Use the vi editor
* Use basic file permissions
* Use commands within the Korn shell
* Perform basic process and job control
* Perform remote connections and file transfers
* Create archives
* Compress files, uncompress files, and view compressed files

Download link

Non Camera SmartPhones

The Intermediate System Administration for the Solaris 10 Operating System training video tutorials provides students with the knowledge and skills to perform essential system administration tasks in the Solaris OS, including stand-alone installation, file system management, backup procedures, process control, user administration, and device management.
Students who can benefit from this course bundle include system administrators who perform essential system administration procedures in the Solaris OS.

Skills Gained :-

Upon completion of this course, you should be able to:

* Describe the Solaris OS directory hierarchy
* Manage local disk devices
* Manage the Solaris OS file system
* Perform mounts and unmounts
* Install the Solaris 10 OS
* Perform package administration
* Manage patch administration on the Solaris 10 OS
* Identify boot PROM fundamentals
* Perform booting and shutdown procedures
* Manage system services
* Perform user administration
* Set file system security
* Configure printer services and use print commands
* Control system processes
* Perform file system backups and restores
* Back up a mounted file system by using a UFS snapshot

Download link

Non Camera SmartPhones

The Advanced System Administration for the Solaris 10 Operating System course expands your mastery of the most advanced operating system on the planet, Solaris 10. In this class, you gain hands-on experience working with more complex and integrated administration concepts, and build upon your experience from the Part 1 course. You will be instructed in essential system administration skills including: configuring network interfaces, managing swap configurations, crash dumps, and core files, configuring NFS and AutoFS. Other topics covered include managing storage volumes and ZFS file systems, configuring system messaging, setting up naming services, and managing Solaris Zones. This course helps you to prepare for Sun System Advanced Administration certification exam.

Skills Gained :-

Upon completion of this course, students should be able to :-

* Describe network basics and the client-server model
* Manage crash dump behavior and core file behavior
* Manage swap configuration
* Configure NFS and AutoFS
* Describe RAID and Solaris Volume Manager software concepts
* Configure Solaris Volume Manager software
* Configure RBAC
* Configure system messaging
* Configure naming service clients
* Configure NIS
* Configure a global zone
* Create and destroy basic ZFS file system structures

Download link

Non Camera SmartPhones

EMC Avamar Backup & Recovery Administration Video Tutorial.With Avamar, you can achieve new levels of data reduction and enable fast, secure backup for your VMware environments, remote offices, and data center LANs. In the process, you’ll reduce backup time, growth of secondary storage, and network utilization.EMC Avamar Backup and recovery with global,source-based data deduplication.EMC Avamar backup and recovery solutions utilize patented global data deduplication technology to identify redundant data at the source, minimizing backup data before it is sent over the LAN/WAN.Avamar deduplicated backups function like full backups and can be recovered in just one step, without your restoring full backups and subsequent incrementals. In addition, Avamar verifies backup data recoverability—so there are no surprises—and encrypts data for secure electronic backups.

EMC Avamar delivers:

1)Global source-based deduplication.
Reduce daily backup data up to 500x, backup times up to 10x, and total storage up to 50x.
Wide area network (WAN) backups Eliminate the need for local tape infrastructure and enable cost-effective online retention.

2)High availability and reliability.
Achieve fault tolerance across storage nodes and verify data recoverability on a daily basis.
Centralized management Manage multi-site backup-control operations from a single location through an intuitive, Web-based interface.

3)Fast, single-step recovery
Recover data (whole backups, files, or directories) immediately, without restoring your last full and incremental backups.

4)VMware Infrastructure backups
Reduce resource utilization on highly consolidated host servers; support Guest, ESX Service Console, and VCB backups.

5)EMC NetWorker client integration
Blend deduplication capabilities with traditional backup and recovery using a common management interface and backup window.

6)Flexible deployment
Choose between integrated software/hardware, software on certified industry-standard servers, and VMware virtual appliance solutions.

Download link

Non Camera SmartPhones

Prepare for a wireless career with Cisco Wireless LAN Support Specialist video training program. This self-study Cisco training program was co-developed with the finest Cisco trainers in the industry and designed to fully prepare you for the Cisco Wireless LAN Support Specialist certification exam. Qualified professionals with the ability to design, install, support, and operate wireless LAN solutions are in high demand because more and more organizations are adopting wireless LAN technology for extending employee access to critical network resources. Your understanding of radio technologies associated with WLAN 802.11g standards, WLAN and bridge topologies, and applications, as well as your WLAN configuration abilities will be recognized with this credential.You will understand basic antenna theory and be able to perform site surveys covering WLAN topology and designs. You’ll also understand vertical market deployment, equipment utility challenges, and cable awareness.

Download link Part 1

Download link Part 2

Non Camera SmartPhones

Power ISO is a powerful CD/DVD image file processing tool, which allows you to open, extract, create, edit, compress, encrypt, split and convert ISO files, and mount these files with internal virtual drive. It can process almost all CD-ROM image files including ISO and BIN. Power ISO can be used easily, which support shell integration, context menu, drag and drop, clipboard copy paste. With Power ISO, you can: 1. Open and extract ISO File. 2. Create ISO file from hard disk files or CD/DVD-ROM. 3. Edit an existing ISO file directly. 4. Convert image files between ISO/BIN and other formats. PowerISO can convert almost all image file formats to a standard ISO format file. 5. Make bootable ISO file, get boot information from bootable ISO file. 6. Make floppy disk image file. 7. Optimize files to save disk space while saving ISO file. 8. Mount ISO file with internal virtual drive. You don't need install any other virtual drive software. 9. Compress, encrypt or split image file. DAA(Direct-Access-Archive) is an advanced format for image file, which supports some advanced features, such as compression, password protection, and splitting to multiple volumes. Keywords: CD image file, open ISO, extract ISO, edit ISO, create ISO, compress ISO, encrypt ISO, mount ISO, bootable CD, BIN ISO converter, DAA, virtual drive.

MagicISO is a powerful CD/DVD image file creating/editing/extracting tool. It can open, create, edit and extract CD/DVD image files, and it can convert BIN to ISO formats and back. You can use it to make ISO files from DVD/CD-ROM or hard disks, with bootable information included. MagicISO is a more powerful CD image file edit tool and CD backup tool. It can backup CD/DVD to your hard disk and directly create/edit/extract ISO files.It can make bootable CD image. It also can convert BIN or any other format file created by CD burning software or virtual CD-ROM driver software to standard ISO format. It embed with Window Explorer.It can directly create, edit, burn, and extract ISO files. It also can convert almost all CD/DVD image formats to ISO/BIN/CUE, Nero (.NRG), and CloneCD (.CCD/. IMG/. SUB). With MagicISO, you can handle DVD image up to 10GB; make CD image files from CD/DVD-ROM; also can burn ISO files and other CD/DVD image files (BIN, IMG, CIF, NRG, BWI, VCD) to CD-R/RW; support loading boot image file exported by WinISO and UltraISO; burn CD image files in ISO9660, Joliet, and UDF format; edit properties of CD/DVD image files; it has the ability to correct volume serial number after editing original CD/DVD image file; search files or directories with wildcard characters in CD/DVD image file; MagicISO can also convert any image file format including BIN to the standard ISO format. It can handle images created by CD burning software (Nero Burning ROM, Easy CD Create, and so on) or virtual DVD/CD-ROM driver software (Daemon-tools). MagicISO has the ability to create ISO image files as well. You can directly add, delete, and rename files or folders in CD image files. The program can handle images of up to 10G in size so that users can extract, edit, and open DVD image files with ease.

Power ISO & Magic ISO – 2 in 1 ( Just 5 MB)

Download link

Non Camera SmartPhones

SUSE Linux: A Complete Guide to Novell's Community Distribution will get you up to speed quickly and easily on SUSE, one of the most friendly and usable Linux distributions around. From quick and easy installation to excellent hardware detection and support, it's no wonder SUSE is one of the most highly rated distributions on the planet. According to Novell, SUSE is installed more than 7,000 times every day, an average of one installation every 12 seconds.This book will take you deep into the essential operating system components by presenting them in easy-to-learn modules. From basic installation and configuration through advanced topics such as administration, security, and virtualization, this book captures the important details of how SUSE works--without the fluff that bogs down other books and web sites. Instead, readers get a concise task-based approach to using SUSE as both a desktop and server operating system.

In this book, you'll learn how to:-

Install SUSE and perform basic administrative tasks

Share files with other computers

Connect to your desktop remotely

Set up a web server

Set up networking, including Wi-Fi and Bluetooth

Tighten security on your SUSE system

Monitor for intrusions

Manage software and upgrades smoothly

Run multiple instances of SUSE on a single machine with Xen

Download link

Non Camera SmartPhones

Learn SAP in just 24 days at home.The perfect reference for end-users (accounting clerks, sales reps, shipping and receiving clerks, human resources employees, etc.) who merely use SAP as a tool to get their job done. Much of the coverage is aimed at "immediate" material so that end-users can get back to work on their job functions with the SAP software. Chapters on navigation, integration with Microsoft Office, reporting, business process, and performing common tasks will jump start you into getting work done, and accomplishing more immediately.
This is the only intro book available on SAP R/3. The book is on the way of getting outdated. The screen shots in the book and Real life screen shots (SAP 4.6 C or D) differ a lot. From this book, one does not learn much except navigation of SAP's various modules. It also gives some basic ideas abt using SAP system. This book is aimed at the end user and not for wannabe SAP Consultant.

Download link

Non Camera SmartPhones

Microsoft's Certified Systems Engineer (MCSE) track for Windows Server 2003 is the premier certification for computer industry professionals. Covering the core technologies around which Microsoft's present and future will be built, this program provides powerful credentials for career advancement.This book has been developed to give you the critical skills and knowledge you need to prepare for one of the core requirements of the Windows Server 2003 track: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure (Exam 70-294).The Windows Server 2003 certification programs are heavily weighted toward hands-on skills and experience. Microsoft has stated that "nearly half of the core required exams' content demands that the candidate have troubleshooting skills acquired through hands-on experience and working knowledge."

This book is part of a complete series of MCSA and MCSE Study Guides, published by Sybex Inc., an imprint of Wiley, that together cover the core MCSA and MCSE operating system requirements, as well as the design requirements needed to complete your MCSE track.


Chapter 1 Overview of Active Directory.

Chapter 2 Planning and Installing Active Directory.

Chapter 3 Installing and Managing Trees and Forests

Chapter 4 Configuring Sites and Managing Replication.

Chapter 5 Administering Active Directory.

Chapter 6 Planning Security For Active Directory.

Chapter 7 Active Directory Optimization and Reliability.

Chapter 8 Planning,Implementing and Managing Group Policy.

Chapter 9 Software Deployment through Group Policy.



Download link

Non Camera SmartPhones

A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the Broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same network switch.VLANs are created to provide the segmentation services traditionally provided by routers in LAN configurations. VLANs address issues such as scalability, security, and network management. Routers in VLAN topologies provide broadcast filtering, security, address summarization, and traffic flow management.

By definition, switches may not bridge IP traffic between VLANs as it would violate the integrity of the VLAN broadcast domain.By using VLAN, one can control traffic patterns and react quickly to relocations. VLANs provide the flexibility to adapt to changes in network requirements and allow for simplified administration.

Download link Part 1

Download link Part 2

Non Camera SmartPhones

Cisco PIX (Private Internet eXchange) is a popular IP firewall and network address translation (NAT) appliance. It was one of the first products in this market segment. In 2005, Cisco introduced the newer Adaptive Security Appliance (ASA), that inherited much of PIX features, and in 2008 announced PIX end-of-sale. The PIX technology is still sold in a blade, the FireWall Services Module (FWSM), for the Cisco Catalyst 6500 switch series and the 7600 Router series.
The PIX was the first commercially available firewall product to introduce protocol specific filtering with the introduction of the "fixup" command. The PIX "fixup" capability allows the Firewall to apply additional security policies to connections identified as using specific protocols. Two protocols for which specific fixup behaviors were developed are DNS and SMTP.

The DNS fixup originally implemented a very simple but effective security policy; it allowed just one DNS response from a DNS server on the Internet (known as outside interface) for each DNS request from a client on the protected (known as inside) interface. "Fixup" has been superseded by "Inspect" on later versions of PIX OS.

Download link

Non Camera SmartPhones

WinZip 12 is the most trusted way to work with compressed files. No other compression utility is as easy-to-use or offers the comprehensive and productivity-enhancing approach that has made WinZip the gold standard for file-compression tools.With the new WinZip 12, you can quickly and securely zip and unzip files to conserve storage space, speed up e-mail transmission, and reduce download times. State-of-the-art file compression, strong AES encryption, compatibility with more compression formats, and new intuitive photo compression, make WinZip 12 the complete compression and archiving solution.

Building on the favorite features of a worldwide base of several million users, WinZip 12 adds new features for image compression and management, support for new compression methods, improved compression performance, support for additional archive formats, and more. Users can work faster, smarter, and safer.

Download link

Non Camera SmartPhones

This course combines notes, hands-on procedures, multimedia presentations, and review questions to teach you systems management, design, and implementation methods using SMS 2.0. It is designed to be completed from beginning to end, but you can choose to complete only the sections that interest you.This book contains a self-paced training overview and introduces the components of this training. Read this section thoroughly to get the greatest educational value from this self-paced training and to plan which lessons you will complete. It is imperative that you complete the "Getting Started" section to properly prepare the computers for the exercises in the chapters.

The self-paced training book is divided into the following chapters:

Chapter 1, "Introduction to Microsoft Systems Management Server" introduces SMS 2.0. It provides an overview of the functional areas, hierarchy, and network configurations of SMS 2.0.

Chapter 2, "Installing a Primary Site" explains how to install SMS 2.0 to function as a primary site server. It lists the hardware and software requirements of the program, and it explains the specific information you have to supply and the decisions you have to make during the installation process. Following installation, the modifications made by SMS setup is described. Post installation procedures, making computer resources client computers, and upgrading SMS 1.2 to SMS 2.0 conclude this chapter.

Chapter 3, "Administering Inventory Collection" describes how to install, configure, and customize inventory collection. Explains the process of inventory collection and how to use Resource Explorer to view collected inventory.

Chapter 4, "Distributing Software" addresses how packages, programs, collections and advertisements work together to complete the software distribution process to client computers. The final lesson in this chapter explains how to use the SMS Installer.

Chapter 5, "SMS Software Metering" discusses SMS Software Metering. The roles played by software metering site systems and client computers are delineated. How to configure and manage software metering using the Software Metering application, concludes this chapter.

Chapter 6, "Using Remote Tools" provides information on supporting various client computer operating systems using remote support utilities accessed through the SMS Administrator console.

Chapter 7, "SMS Network Management Components" details the use of critical network management tools, including Network Monitor, the Network Monitor Control Tool, and the Event to Trap Translator.

Chapter 8, "Querying the Database and Producing Reports" describes the purpose and construction of queries and reports. Query Builder and Crystal Info are explored in this chapter.

Chapter 9, "Planning for SMS" explains how to successfully design and implement SMS 2.0.

Chapter 10, "Configuring Site Systems" describes the site system creation and configuration process. The last lesson in this chapter describes how to monitor site systems with Network Trace.

Chapter 11, "Site-to-Site Communications" describes how SMS communicates between sites. Details are provided that explain how to create an SMS hierarchy, and install a secondary site. The chapter concludes by explaining how to successfully remove SMS software from a computer acting as a primary or secondary site server.

Chapter 12, "Configuring SMS Security" discusses how the file system, users, groups, and the WBEM/SMS Provider interface protect SMS from unauthorized access.

Chapter 13, "Administering SMS Databases" discusses SQL Server features important to the operation of SMS 2.0, and how to maintain SMS in case a recovery procedure is required in the future. The last lesson in this chapter explains how to restore an SMS site.

Chapter 14, "Monitoring and Troubleshooting SMS" addresses the major categories where problems occur in SMS 2.0 and the tools included with SMS 2.0 for analysis of various problems.

The Appendix, "Questions and Answers" lists all of the practice and review questions from the book, showing suggested answers.

The "Glossary" provides definitions of commonly used terms relating to SMS.

Download link

Non Camera SmartPhones

Linux Timesaving Technique For Dummies provides experienced and first-time Linux users with concise, step-by-step, timesaving,powerful techniques to help them perform tasks efficiently. The techniques, broken down into task-oriented topic areas, are delivered without technical jargon and in the For Dummies friendly, easy-to-understand style. The book corresponds with the latest releases of the Fedora Core, SUSE, and Mandrake distributions. This book is organized into parts groups of techniques about a common subject that will save you time and help you get your system running better. Each technique is written to be independent of the others, so you only need to implement those techniques that are important to you and your users. From time to time, we may send you to another technique to implement a feature that we’ll be using in our current technique we just don’t want to waste valuable space repeating ourselves. Each of the partsis about a different facet of a Linux system so you can scan the part title easily, looking for problemsolving techniques that will help you, quick.

It has over 60 techniques that help users perform end-user, system administration, and development tasks in many areas, including the following:

Desktop File system, RPM, Databases, Internet Server, Email Server, Networking, System monitoring, Security, Data Back-up and recovery, Programming (e.g., C and PHP), and Linux Kernel.

Over 60 techniques that help you save time by…

* Controlling time-consuming tasks

* Improving your system security

* Getting the most from your file system

* Automating repetitive tasks

* Tweaking the kernel on your Linux system

* Networking like a professional

The Dummies Way

* Tricks and tips for working smarter

* Explanations in plain English

* "Get in, get out" information

* Contents arranged by technique

* Advice that goes beyond the basics

* A dash of humor and fun

Download link

Non Camera SmartPhones

This free ebook details about 100 linux tips and tricks used in our day to day life.This book was written for anyone using Linux, from new users to experts who want to explore this wonderful operating system. The tips and tricks in this book were discovered by myself over years of experience using Linux, and learning about it. Some are very basic tips to make your computing life easier, others are advanced tricks that can save you days of work.Installation is a very important part of any operating system. This is why I cover this topic first. The next most important thing is installation of programs and software to get your system to do useful tasks. This chapters covers both of these aspects.Linux is open-source software at it’s finest. Open-source software is all about taking control of your desktop away from the big corporations and putting it into the hands of the developers working with your best interests at heart. The software is freely available on the Internet for you to download you can even help develop the projects if you want to get involved. Decisions about what’s on your desktop aren’t being made based on the profit margins yielded by the software. Instead,the best interests of the user are of primary concern to the developers.

Book Contents:-

Chapter 1 Introduction

Thus chapter covers the introduction part.

Chapter 2 Installation

These are tips and tricks useful when installing Linux itself or any new program. Some tips will cover new means of installing Linux on non-typical hardware, others will explain how to take Linux distribution from an FTP server and make your own CD-ROM with them.

Chapter 3 Hardware

You will learn tips there on how to get your non-PostScript compatible printer to work, or how to get a sound card detected.

Chapter 4 Software

You will find tips there about all kinds of Linux software,including where to find and how to install the Java Development Kit port, and everything about the Pine mail and news program.

Chapter 5 Networking

There you will see how to setup a PPP connection quickly, without editing all of the configuration files yourself, as well as some nice programs that were made to ease dialup procedures. You will also see tricks on how to make your local LAN network without unexpected problems.

Chapter 6 Development

Here you will find a lot of tips on how to write powerful scripts to make your system easier to handle, and a full overview of what to do and what you don't want to do in C to avoid problems like memory leaks and how to allow easy scalability.

Download link

Non Camera SmartPhones