Month: March 2016

VCP550 VMware Real Exam Questions,VCP550 Online Test

Posted on Updated on

VCP-550

Ubuntu Linux Bible
®

®

William von Hagen

Ubuntu® Linux® Bible Published by vcp550 exam Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256

Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN-13: 978-0-470-03899-4 ISBN-10: 0-470-03899-3 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 1B/RU/RS/QW/IN No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization vcp550 study guide through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ. For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002. Library of Congress Cataloging-in-Publication Data is available from the publisher. Trademarks: Wiley, the Wiley logo, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. Ubuntu is a trademark of Canonical Limited. Linux is a registered trademark of Linus Torvalds. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

To Dorothy, for more than words can say . . . Quidquid latine dictum sit, altum sonatur.

About the Author
William von Hagen (Bill) has been a Unix system administrator for over twenty years, and a Linux fanatic since the early 1990s. He has worked as a Linux product manager, systems programmer, system administrator, writer, application developer, drummer, and content manager. Bill has written or co-written books on such topics as Linux Server Hacks, Linux Filesystems, SUSE Linux, Red Hat Linux, GCC, SGML, Mac OS X, and Hacking the TiVo. He has also written numerous articles on Linux, embedded computing, Mac OS X, Unix, and various Open Source topics. An avid computer collector specializing in workstations, he owns more than 200 computer systems but is not compulsive at all. You can reach him at vonhagen@vonhagen.org.

Credits
Executive Editor Carol Long vcp550 exam questions Senior Development Editor Tom Dinse Copy Editor Mildred Sanchez Editorial Manager Mary Beth Wakefield Production Manager Tim Tate Vice President and Executive Group Publisher Richard Swadley Vice President and Executive Publisher Joseph B. Wikert Project Coordinator Erin Smith Graphics and Production Specialists Claudia Bell Carrie A. Foster Barbara Moore Rashell Smith Quality Control Technician David Faust Proofreading and Indexing Richard T. Evans, Techbooks Anniversary Logo Design Richard Pacifico

Acknowledgments ………………………………………………………………………………………………………………..xxi Introduction ……………………………………………………………………………………………………………………..xxiii

Part I: Getting Started with Ubuntu Linux
Chapter 1: The Ubuntu Linux Project…………………………………………………………………………………………3 Chapter 2: Installing Ubuntu ………………………………………………………………………………………………….21 Chapter 3: Installing Ubuntu on Special-Purpose Systems …………………………………………………………..47

Part II: Ubuntu for Desktop Users
Chapter 4: Basic Linux System Concepts ………………………………………………………………………………….89 Chapter 5: Using the GNOME Desktop ………………………………………………………………………………….107 Chapter 6: Using Command-Line Tools ………………………………………………………………………………….149 Chapter 7: Working with Text Files on Ubuntu ……………………………………………………………………….181 Chapter 8: Reading and Sending Mail with Evolution………………………………………………………………..211 Chapter 9: Surfing the Web with Firefox ………………………………………………………………………………..241 Chapter 10: Creating and Publishing Documents ……………………………………………………………………..265 Chapter 11: Other Office Software: Spreadsheets and Presentations …………………………………………….303 Chapter 12: Working with Graphics ……………………………………………………………………………………….343 Chapter 13: Working with flydumps Multimedia ……………………………………………………………………………………365 Chapter 14: Would You Like to Play a Game? …………………………………………………………………………..409 Chapter 15: Connecting to Other Systems ………………………………………………………………………………437 Chapter 16: File Transfer and Sharing on Ubuntu……………………………………………………………………..455 Chapter 17: Consumer Electronics and Ubuntu ……………………………………………………………………….477 Chapter 18: Software Development on Ubuntu ……………………………………………………………………….513

Part III: Ubuntu for System Administrators
Chapter 19: Understanding the Ubuntu Startup and Shutdown Processes ……………………………………551 Chapter 20: Adding, Removing, and Updating Software…………………………………………………………….567 Chapter 21: Managing Users, Groups, Authentication, and Advanced Permissions…………………………615 Chapter 22: Backing Up and Restoring Files…………………………………………………………………………….647 Chapter 23: Adding Hardware and Attaching Peripherals …………………………………………………………..677 Chapter 24: Network Configuration and Security……………………………………………………………………..711 Chapter 25: Going Wireless ………………………………………………………………………………………………….735

vi

Part IV: Configuring vmware vcp 550 Servers on Ubuntu
Chapter 26: Setting Up a Web Server ……………………………………………………………………………………..753 Chapter 27: Setting Up a Mail Server ……………………………………………………………………………………..767 Chapter 28: Setting Up a DHCP Server……………………………………………………………………………………791 Chapter 29: Setting Up a DNS Server ……………………………………………………………………………………..805 Chapter 30: Setting Up a Print Server ……………………………………………………………………………………..823 Chapter 31: Setting Up an NFS Server ……………………………………………………………………………………835 Chapter 32: Setting Up a Samba Server ………………………………………………………………………………….851 Index ………………………………………………………………………………………………………………………………..871

vii

Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii

Part I: Getting Started with Ubuntu Linux
Chapter 1: The Ubuntu Linux Project . . . . . . . . . . . . . . . . . . . . . . 3
Background ………………………………………………………………………………………………………………….4 Why Use Linux?……………………………………………………………………………………………………4 What Is a Linux Distribution? ………………………………………………………………………………..5 Introducing Ubuntu Linux ………………………………………………………………………………………………6 The Ubuntu Manifesto …………………………………………………………………………………………..7 Ubuntu Linux Release Schedule ………………………………………………………………………………8 Ubuntu Update and Maintenance Commitments ……………………………………………………….9 Ubuntu and the Debian Project ………………………………………………………………………………9 Why Choose Ubuntu? ………………………………………………………………………………………………….10 Installation Requirements ………………………………………………………………………………………………11 Supported System Types ……………………………………………………………………………………..12 Hardware Requirements……………………………………………………………………………………….12 Time Requirements …………………………………………………………………………………………….12 Ubuntu CDs………………………………………………………………………………………………………………..13 Support for Ubuntu Linux …………………………………………………………………………………………….14 Community Support and Information ……………………………………………………………………14 Documentation ………………………………………………………………………………………………….17 Commercial Support for Ubuntu Linux ………………………………………………………………….18 Getting More Information About Ubuntu …………………………………………………………………………19 Summary ……………………………………………………………………………………………………………………20

Chapter 2: Installing Ubuntu . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Getting a 64-bit or PPC Desktop CD ………………………………………………………………………………22 Booting the Desktop CD………………………………………………………………………………………………..22 Installing Ubuntu Linux from the Desktop CD………………………………………………………………….24 Booting Ubuntu Linux …………………………………………………………………………………………33 Booting Ubuntu Linux on Dual-Boot vcp550 vce Systems …………………………………………………………33 The First Time You Boot Ubuntu Linux ………………………………………………………………….34 Test-Driving Ubuntu Linux …………………………………………………………………………………………..34 Exploring the Desktop CD’s Examples Folder …………………………………………………………34 Accessing Your Hard Drive from the Desktop CD……………………………………………………..36 Using Desktop CD Persistence ………………………………………………………………………………41 Copying Files to Other Machines Over a Network ……………………………………………………43 Installing Windows Programs from the Desktop CD…………………………………………………………..43 Summary ……………………………………………………………………………………………………………………45

Microsoft Corporation (MSFT) Thinks Business Security is a Good Gamble

Posted on Updated on

VCP-550

This criticism appeared to be partly fuelled by the common notion that the competing Apple Inc.’s (NASDAQ:AAPL) iOS™ software was more robust and nearly invulnerable to malware attacks, though it has been VCP-550 quashed over time.

However, Microsoft appears to have addressed most of the, if not all, security flaws that were associated with its past versions of the Windows operating system software.

Microsoft Wants to Offer Cyber Security Offerings

Microsoft now wants to  A00-240 assist large businesses that use its Windows 10 operating system to detect or prevent hackers from accessing their servers, or discover any unusual patterns and security threats on their networks. Should this service turn out perfect, it will give rival firms such as Symantec Corporation (NASDAQ:SYMC) and FireEye Inc. (NASDAQ:FEYE) a run for their money.

The new service, which is dubbed 070-480 Windows Defender Advanced Threat Protection, is at beta stage, with a select group of customers and Microsoft both testing it. Once ready, bits of the software code will be distributed to newer Windows 10 versions.

However, the final  70-466 release data and pricing is yet to be determined at this time.

The market for securing business and government networks and systems has grown exponentially as hackers become more sophisticated and the costs associated with hacks rise.

Last October, Sony Corp. reached a $8 million  70-417 settlement with its past and current employees after hackers thought to be from North Korea breached its computers and stole sensitive company and personal employee data. Out of the $8 million settlement, about $3.5 million was paid to lawyers who took up the case, with employees getting the remainder  C2090-303 (Source: “Sony to Pay as Much as $8 Million to Settle Data-Breach Case”, Bloomberg, October 20, 2015).

Recently, Microsoft has proved itself agile and more responsive. It recently rolled out security updates covering issues such as blocking outsiders from accessing company servers through facial and fingerprint 070-417 recognition in Windows.

Microsoft’s efforts didn’t go unnoticed, with the U.S. Defense Department announcing plans on Feb. 17  to install newer software on all its Windows machines due to its watertight security features.

The new security features MB6-869 have been developed by in-house security engineers using algorithms created using Microsoft’s troves of security data. Microsoft benefits from its anonymous access to over 1 billion devices, besides 2.5 trillion indexed web pages which provide it with insight into suspicious sites (Source: “Microsoft to Sell Windows Security Service to Business Customers”, Bloomberg, March 01, 2016).

BlackBerry Shouldn’t Be Counted Out

BlackBerry Inc. (NASDAQ:BBRY) is also 400-051 not too far behind, after it established a cyber security consulting division last month. The Canadian firm wants to help its clients identify fresh threats and threat mitigation responses and in preventing  future threats. It is also targeting security solutions applicable to the fast-growing Internet of Things technology, which is widely regarded as the next growth area for technology industry (Source: “BlackBerry Moves 810-420 Deeper Into Security Services”, CXOToday, February 24, 2016).

To bolster its cyber security capabilities, BlackBerry acquired Encription, a small UK cyber security consultancy. The company helps its clients to evaluate the vulnerability of their systems and networks to hackers and offers solutions to address such flaws (Source: “BlackBerry Buys U.K. Cyber Security vcp550 study guide Consulting Business”, Wall Street Journal, February 24, 2016).