Buy your textbooks here

Free 250-253 Text Books of Killexams.com | study guide | Braindumps | Study Guides | Textbook

killexams.com 250-253 Q & A - VCE - examcollection - braindumps and exam prep are the best to prepare 250-253 exam to get full marks - study guide - Study Guides | Textbook

Pass4sure 250-253 dumps | Killexams.com 250-253 existent questions | https://www.textbookw.com/


Killexams.com 250-253 Dumps and existent Questions

100% existent Questions - Exam Pass Guarantee with lofty Marks - Just Memorize the Answers



250-253 exam Dumps Source : Administration of Veritas Cluster Server(R) 6.0 for Unix

Test Code : 250-253
Test name : Administration of Veritas Cluster Server(R) 6.0 for Unix
Vendor name : Symantec
: 235 existent Questions

what is pass ratio coincident 250-253 examination?
Killexams.Com questions and answers helped me to know what exactly is anticipated in the exam 250-253. I prepared well within 10 days of coaching and completed flawless the questions of exam in eighty mins. It incorporate the subjects much relish examination factor of view and makes you memorize flawless the subjects easily and as it should be. It besides helped me to recognise the way to manipulate the time to complete the examination earlier than time. It is much approach.


250-253 bank is required to pass the exam at the dawn try.
There may subsist one matter matter Differentiate 250-253 exam which might subsist very steely and difficult for me but killexams.Com succor me in elapsing me that. It turned into remarkable to peer that more constituent inquiries of the actual exams were run-of-the-mill from the aide. I was searching for some examination End end result. I associated the from killexams.Com to accumulate my-self prepared for the exam 250-253. A score of 85% noting 58 inquiries inner ninety minutes became halcyon nicely. Masses way to you.


What are benefits modern-day 250-253 certification?
Killexams.Com is an redress indicator for a university students and clients functionality to toil and test for the 250-253 examination. It is an accurate indication in their potential, particularly with exams taken quick in forward than setting out their academic study for the 250-253 examination. Killexams.Com offers a amenable up to date. The 250-253 tests supply a radical photograph of candidates functionality and talents.


terrific source cutting-edge much dumps, redress solutions.
Felt very arrogant to finish answering flawless questions throughout my 250-253 exam. Frankly speakme, I owe this fulfillment to the query & respond by means of killexams.com The material protected flawless of the related inquiries to each topic and supplied the answers in short and precise manner. expertise the contents fill become convenient and memorizing turned into no hardship at all. i used to subsist additionally lucky sufficient to accumulate maximum of the questions from the guide. satisfied to skip satisfactorily. outstanding killexams


Get proper information and study with the 250-253 and Dumps!
It isnt the first time I am the utilize of killexamsfor my 250-253 exam, I actually fill attempted their substances for some carriers examinations, and havent failed once. I completely depend upon this training. This time, I additionally had a few technical troubles with my pc, so I needed to contact their customer support to double check some thing. Theyve been outstanding and fill helped me sort matters out, despite the fact that the hardship changed into on my give up, not their software.


No worries whilst getting geared up for the 250-253 examination.
I used killexams.Com fabric which offers enough information to acquire my purpose. I constantly usually memorize the things before going for any exam, but that is the only one exam, which I took without absolutely memorizing the wanted things. I thanks truly from the lowest of my coronary coronary heart. I can compass to you for my subsequent exam.


Try out these existent 250-253 Latest dumps.
Fine one, it made the 250-253 smooth for me. I used killexams.com and handed my 250-253 examination.


what's simplest way to attach together and pass 250-253 exam?
Started preparing for the tough 250-253 exam using the weighty and voluminous study books. But failed to crack the tough topics and got panicked. I was about to drop the exam when somebody referred to me the dump by killexams. It was really smooth to read and the fact that I could memorize flawless in a short time, removed flawless my apprehensions. Could crack 67 questions in just 76 minutes and got a colossal 85 marks. Felt indebted to killexams.com for making my day.


pleasant to hear that actual exam questions present day 250-253 examination are to subsist had.
every lone morning id assume out my strolling shoes and determine to exit walking to accumulate some sparkling air and experience energized. But, the day earlier than my 250-253 assume a scrutinize at I didnt experience relish strolling in any respect because i was so concerned i would lose time and fail my check. I had been given precisely the constituent I had to energize me and it wasnt going for walks, it became this Killexams.Com that made a pool of educational statistics to subsist had to me which helped me in getting perquisite rankings within the 250-253 assume a scrutinize at.


Do not spill huge amount at 250-253 guides, checkout these questions.
Being an underneath common pupil, I got fearful of the 250-253 examination as subjects looked very tough to me. however passing the check turned into a exigency as I had to trade the chore badly. looked for an spotless manual and got one with the dumps. It helped me solution flawless a couple of type questions in two hundred minutes and bypass thoroughly. What an first rate query & solutions, brain dumps! satisfied to obtain two offers from well-known organizations with good-looking bundle. I advocate handiest killexams.com


Symantec Symantec Administration of Veritas

Symantec: partners can anticipate unified security manner | killexams.com existent Questions and Pass4sure dumps

With the fresh information of the $eight billion buyout of Veritas to The Carlyle community and additional buyers, Symantec this week outlined, to SearchITChannel, the business's strategic course and hub of attention over the next 12 to 18 months, and touched on the role Symantec companions will play going ahead.

Amit Jasuja, senior vp of products, industry protection with Symantec talked about the original Symantec, as a simple security enterprise, is guided via what's being referred to as, a unified safety strategy that includes a strategy aspect and technology aspect.

The technology aspect is to invent utilize of massive data analytics on redress of a ton of global telemetry statistics -- gathered from Symantec's huge global random intelligence community -- to assist customers gyrate into smarter about security. Symantec calls this it's unified safety analytics platform.

The unified protection approach takes the analytics information to invent Symantec's protection products smarter and extra adaptable.

"feel a few risk-based mostly remarks loop that makes these products smarter about threats," Jasuja spoke of.

an improved cloud focal point

an extra component that Symantec partners will celebrate in regards to the seller going ahead is a stronger hub of attention on cloud and offering stronger cloud safety. in response to a corporation spokeswoman, eighty one% of Symantec's industry flows via channel companions.

Our aim, as they gash loose Veritas, is to identify the preempt companions which fill improbable safety interest and focus on enabling them. Amit JasujaSenior vp of items, industry safety, Symantec

Jasuja defined that many Symantec consumers are relocating records into Microsoft workplace 365, field, Microsoft Azure and Amazon net functions, for instance, for applications, compute or storage, and are more and more using cell gadgets.

"clients attain not necessarily exigency their cellular gadgets to connect to a VPN, which may additionally create operate complications," famed Jasuja.

So, Symantec is edifice a cloud security broker, a broking service within the cloud, it's capable of assume confidence of flawless of the unprejudiced threats as well as counsel protection challenges of enterprise clients, he defined.

The cloud security broking service is a cloud-primarily based manage constituent that integrates information loss prevention (DLP), identity and analytics.

From a channel standpoint, selling the cloud safety broking service might subsist straightforward -- no stock to raise, no containers, no advanced promoting motions. "there may subsist a multi-tiered, channel-branded site the residence americans could vicinity their orders," Jasuja said. "We prompt them and away they go." He brought that there is an smooth option to configure enterprise site visitors to subsist routed throughout the cloud brokers, which will subsist dispersed perquisite through the globe.

the primary cloud protection broker items delivered had been DLP for office 365 (electronic mail) and DLP for Cloud Storage for field, announced in June. predict to notice additional cloud-primarily based products that allow endpoint management, statistics middle security and identification management, as an instance.

There are two additional areas of focal point for Symantec going ahead: hazard coverage and cyber safety functions.

Symantec's probability coverage manner addresses the complete advanced possibility protection cycle: avoid, become alert of, respond and predict. "Our purpose is to carry a solution this is more unified and deals with flawless of a corporation's manage facets, i.e., e mail, community, gateway, endpoint, cloud," said Jasuja.

today, Symantec presents advanced random insurance policy products for the network and for e-mail.

The supplier's cyber safety functions approach falls in the managed security services space. in accordance with Jasuja, are expecting to peer the industry lead with its cyber security services.

today, Symantec presents a security monitoring provider and an adversary hazard intelligence carrier. increased functions will consist of incident response and forensics functions and security simulation capabilities for safety preparedness and run-of-the-mill fitness checks.

All products mentioned via Jasuja might subsist in the market via year-conclusion.

accomplice chance

The quick growing to subsist protection market items helpful industry possibility extend for partners, in response to Symantec.

"Our companions wish to expand their presence with valued clientele and subsist in a position to attain extra result-based mostly work. They exigency something that is less complicated, integrated, creates greater synergy, a lone point of buy, a lone point of administration, and lone aspect of handle," Jasuja stated.

nonetheless, shoppers are looking to protect their ambiance holistically, not stitch collectively discrete security pieces, i.e., malware, endpoint administration and patching, and DLP, he added.

On the unified safety and analytics side, there's a growing break for Symantec companions to bring intelligence to their purchasers. "With intelligence and analytics, partners may subsist able to carry greater solutions, more desirable services that support purchasers optimize the materiel they've," referred to Jasuja.

additionally, as greater organizations scurry facts outside the perimeter of their data centers and into the cloud, safety turns into a controversy. final 12 months, Forrester research pronounced that the marketplace for cloud-based mostly safety items changed into $300 million. The research company expected a 40% compound annual growth fee (CAGR) for the cloud-based mostly protection product market reaching $2 billion with the aid of 2020 -- yet another stout random for partners.

"Our aim, as they divide from Veritas, is to determine the redress companions which fill mighty protection activity and hub of attention on enabling them, providing them with content, practising, or capabilities on how they market and promote together -- you're going to notice loads of investment in that house," Jasuja referred to.


Symantec has been exploring Veritas sale for months-sources | killexams.com existent Questions and Pass4sure dumps

April 10 (Reuters) - security application maker Symantec Corp has been looking for consumers for its storage utility business, Veritas, or the entire enterprise for several months, sources conventional with the import number said.

Symantec has approached NetApp Inc, EMC Corp and a number of inner most fairness organizations to gauge their interest, the individuals referred to, asking asked no longer to subsist recognized as the deliberations are confidential.

youngsters, hobby from abilities patrons has been limited on account of a tax affliction associated with splitting the company, the people delivered.

As of Friday’s close, Symantec had a market capital of about $17.5 billion, with Veritas accounting for roughly half of that, the sources observed.

Symantec spoke of ultimate 12 months it could gash up into two publicly traded businesses - one concentrated on its safety enterprise and the other on its storage and backup business, potentially making itself greater attractive to suitors.

Slowing computer revenue fill distress the safety enterprise, while tedious exact for its storage and statistics administration software has diminished the cost of Veritas, which became viewed as a “cash cow” when it was bought for $13.5 billion a decade ago.

JPMorgan Chase & Co has been advising Symantec on the capabilities split as smartly as the viable sale of the whole enterprise, based on the sources.

Symantec, EMC and JPMorgan declined to remark, whereas NetApp could not automatically subsist reached for comment.

earlier on Friday, the Wall highway Journal reported, citing sources, that Symantec had, "in recent weeks", contacted private equity enterprises and viable trade bidders about purchasing Veritas. (on.wsj.com/1I0bdVE) (additional reporting by using invoice Rigby in Seattle and Arathy S Nair in Bengaluru; editing by means of Savio D'Souza)


With Veritas' Operational Separation complete, What's next For Symantec? | killexams.com existent Questions and Pass4sure dumps

No result discovered, are attempting original keyword!leading safety application vendor Symantec is probably going to focus on acquisitions and R&D investments now that the divestiture of its counsel administration enterprise, Veritas, processes. The sale will tra...


Killexams.com 250-253 Dumps and existent Questions

100% existent Questions - Exam Pass Guarantee with lofty Marks - Just Memorize the Answers



250-253 exam Dumps Source : Administration of Veritas Cluster Server(R) 6.0 for Unix

Test Code : 250-253
Test name : Administration of Veritas Cluster Server(R) 6.0 for Unix
Vendor name : Symantec
: 235 existent Questions

what is pass ratio coincident 250-253 examination?
Killexams.Com questions and answers helped me to know what exactly is anticipated in the exam 250-253. I prepared well within 10 days of coaching and completed flawless the questions of exam in eighty mins. It incorporate the subjects much relish examination factor of view and makes you memorize flawless the subjects easily and as it should be. It besides helped me to recognise the way to manipulate the time to complete the examination earlier than time. It is much approach.


250-253 bank is required to pass the exam at the dawn try.
There may subsist one matter matter Differentiate 250-253 exam which might subsist very steely and difficult for me but killexams.Com succor me in elapsing me that. It turned into remarkable to peer that more constituent inquiries of the actual exams were run-of-the-mill from the aide. I was searching for some examination End end result. I associated the from killexams.Com to accumulate my-self prepared for the exam 250-253. A score of 85% noting 58 inquiries inner ninety minutes became halcyon nicely. Masses way to you.


What are benefits modern-day 250-253 certification?
Killexams.Com is an redress indicator for a university students and clients functionality to toil and test for the 250-253 examination. It is an accurate indication in their potential, particularly with exams taken quick in forward than setting out their academic study for the 250-253 examination. Killexams.Com offers a amenable up to date. The 250-253 tests supply a radical photograph of candidates functionality and talents.


terrific source cutting-edge much dumps, redress solutions.
Felt very arrogant to finish answering flawless questions throughout my 250-253 exam. Frankly speakme, I owe this fulfillment to the query & respond by means of killexams.com The material protected flawless of the related inquiries to each topic and supplied the answers in short and precise manner. expertise the contents fill become convenient and memorizing turned into no hardship at all. i used to subsist additionally lucky sufficient to accumulate maximum of the questions from the guide. satisfied to skip satisfactorily. outstanding killexams


Get proper information and study with the 250-253 and Dumps!
It isnt the first time I am the utilize of killexamsfor my 250-253 exam, I actually fill attempted their substances for some carriers examinations, and havent failed once. I completely depend upon this training. This time, I additionally had a few technical troubles with my pc, so I needed to contact their customer support to double check some thing. Theyve been outstanding and fill helped me sort matters out, despite the fact that the hardship changed into on my give up, not their software.


No worries whilst getting geared up for the 250-253 examination.
I used killexams.Com fabric which offers enough information to acquire my purpose. I constantly usually memorize the things before going for any exam, but that is the only one exam, which I took without absolutely memorizing the wanted things. I thanks truly from the lowest of my coronary coronary heart. I can compass to you for my subsequent exam.


Try out these existent 250-253 Latest dumps.
Fine one, it made the 250-253 smooth for me. I used killexams.com and handed my 250-253 examination.


what's simplest way to attach together and pass 250-253 exam?
Started preparing for the tough 250-253 exam using the weighty and voluminous study books. But failed to crack the tough topics and got panicked. I was about to drop the exam when somebody referred to me the dump by killexams. It was really smooth to read and the fact that I could memorize flawless in a short time, removed flawless my apprehensions. Could crack 67 questions in just 76 minutes and got a colossal 85 marks. Felt indebted to killexams.com for making my day.


pleasant to hear that actual exam questions present day 250-253 examination are to subsist had.
every lone morning id assume out my strolling shoes and determine to exit walking to accumulate some sparkling air and experience energized. But, the day earlier than my 250-253 assume a scrutinize at I didnt experience relish strolling in any respect because i was so concerned i would lose time and fail my check. I had been given precisely the constituent I had to energize me and it wasnt going for walks, it became this Killexams.Com that made a pool of educational statistics to subsist had to me which helped me in getting perquisite rankings within the 250-253 assume a scrutinize at.


Do not spill huge amount at 250-253 guides, checkout these questions.
Being an underneath common pupil, I got fearful of the 250-253 examination as subjects looked very tough to me. however passing the check turned into a exigency as I had to trade the chore badly. looked for an spotless manual and got one with the dumps. It helped me solution flawless a couple of type questions in two hundred minutes and bypass thoroughly. What an first rate query & solutions, brain dumps! satisfied to obtain two offers from well-known organizations with good-looking bundle. I advocate handiest killexams.com


Unquestionably it is arduous assignment to pick dependable certification questions/answers assets regarding review, reputation and validity since individuals accumulate sham because of picking incorrectly benefit. Killexams.com ensure to serve its customers best to its assets concerning exam dumps update and validity. The vast majority of other's sham report dissension customers compass to us for the brain dumps and pass their exams joyfully and effortlessly. They never trade off on their review, reputation and quality on the grounds that killexams review, killexams reputation and killexams customer assurance is imperative to us. Uniquely they deal with killexams.com review, killexams.com reputation, killexams.com sham report objection, killexams.com trust, killexams.com validity, killexams.com report and killexams.com scam. On the off random that you notice any fallacious report posted by their rivals with the name killexams sham report grievance web, killexams.com sham report, killexams.com scam, killexams.com protest or something relish this, simply recollect there are constantly penniless individuals harming reputation of helpful administrations because of their advantages. There are a huge number of fulfilled clients that pass their exams utilizing killexams.com brain dumps, killexams PDF questions, killexams hone questions, killexams exam simulator. Visit Killexams.com, their specimen questions and test brain dumps, their exam simulator and you will realize that killexams.com is the best brain dumps site.


Vk Profile
Vk Details
Tumbler
linkedin
Killexams Reddit
digg
Slashdot
Facebook
Twitter
dzone
Instagram
Google Album
Google About me
Youtube



00M-155 exam prep | 310-150 examcollection | 1Z0-528 braindumps | HP2-Z28 VCE | A00-205 cheat sheets | HP2-K14 brain dumps | 1Z0-861 rehearse questions | 1T6-111 dump | 000-205 sample test | 000-M19 mock exam | 1Z0-517 free pdf | C9520-928 braindumps | HP2-K27 questions and answers | HP2-Z17 free pdf download | 000-587 existent questions | C9560-656 study guide | LOT-957 test prep | 00M-622 rehearse test | CCA-500 rehearse exam | C2090-549 rehearse test |


250-253 exam questions | 250-253 free pdf | 250-253 pdf download | 250-253 test questions | 250-253 real questions | 250-253 practice questions

Audit 250-253 existent question and answers before you step through exam
killexams.com exam prep material gives you flawless that you exigency to pass 250-253 exam. Their Symantec 250-253 dumps compass up with questions that are exactly selfsame as existent exam. lofty caliber and incentive for the 250-253 Exam. They at killexams ensures your success in 250-253 exam with their braindumps.

Are you searching for Pass4sure Symantec 250-253 Dumps containing existent exam Questions and Answers for the Administration of Veritas Cluster Server(R) 6.0 for Unix test prep? they proffer most updated and quality supply of 250-253 Dumps that's http://killexams.com/pass4sure/exam-detail/250-253. they fill got compiled an information of 250-253 Dumps questions from actual tests so as to allow you to prepare and pass 250-253 exam on the first attempt. killexams.com Discount Coupons and Promo Codes are as under; WC2017 : 60% Discount Coupon for flawless exams on website PROF17 : 10% Discount Coupon for Orders larger than $69 DEAL17 : 15% Discount Coupon for Orders larger than $99 SEPSPECIAL : 10% Special Discount Coupon for flawless Orders You ought to accumulate the recently updated Symantec 250-253 Braindumps with the particular answers, that are ready via killexams.com specialists, permitting the candidates to understand experience regarding their 250-253 exam path within the most, you will realize 250-253 exam of such nice quality is not available anywhere within the marketplace. Their Symantec 250-253 brain Dumps are given to candidates at acting 100% of their test. Their Symantec 250-253 exam dumps are within the marketplace, providing you with an break to residence along in your 250-253 exam within the perquisite manner.

If you're seeking out 250-253 rehearse Test containing existent Test Questions, you are at proper place. They fill compiled database of questions from Actual Exams in order to assist you prepare and pass your exam on the first try. flawless training materials at the site are Up To Date and tested via their specialists.

killexams.com provide cutting-edge and up to date rehearse Test with Actual Exam Questions and Answers for brand original syllabus of Symantec 250-253 Exam. rehearse their existent Questions and Answers to better your understanding and pass your exam with lofty Marks. They invent confident your achievement in the Test Center, protecting flawless of the subjects of exam and build your information of the 250-253 exam. Pass four confident with their accurate questions.

100% Pass Guarantee

Our 250-253 Exam PDF includes Complete Pool of Questions and Answers and Brain dumps checked and established inclusive of references and references (wherein applicable). Their goal to collect the Questions and Answers isn't always best to pass the exam at the start strive however Really better Your information about the 250-253 exam subjects.

250-253 exam Questions and Answers are Printable in lofty quality Study sheperd that you could download in your Computer or some other utensil and start making ready your 250-253 exam. Print Complete 250-253 Study Guide, carry with you while you are at Vacations or Traveling and delight in your Exam Prep. You can accumulate perquisite of entry to up to date 250-253 Exam out of your online account every time.

nside seeing the bona fide exam material of the brain dumps at killexams.com you could without numerous an enlarge broaden your declare to fame. For the IT specialists, it's miles fundamental to modify their capacities as showed by way of their toil need. They invent it primary for their customers to hold certification exam with the assist of killexams.com confirmed and unfeigned to goodness exam material. For an splendid destiny in its domain, their brain dumps are the excellent choice. A nice dumps creating is a primary section that makes it straightforward for you to assume Symantec certifications. In any case, 250-253 braindumps PDF offers settlement for applicants. The IT announcement is a primary troublesome attempt if one doesnt locate proper course as obvious aid material. Thus, they fill redress and updated material for the arranging of certification exam. It is essential to acquire to the sheperd cloth in case one desires towards withhold time. As you require packs of time to scrutinize for revived and redress exam material for taking the IT certification exam. If you locate that at one location, what can subsist higher than this? Its simply killexams.com that has what you require. You can store time and withhold a strategic distance from hassle in case you purchase Adobe IT certification from their website online.

killexams.com Huge Discount Coupons and Promo Codes are as under;
WC2017 : 60% Discount Coupon for flawless tests on internet site
PROF17 : 10% Discount Coupon for Orders greater than $69
DEAL17 : 15% Discount Coupon for Orders extra than $ninety nine
OCTSPECIAL : 10% Special Discount Coupon for flawless Orders


Download your Administration of Veritas Cluster Server(R) 6.0 for Unix Study sheperd straight away after shopping for and Start Preparing Your Exam Prep perquisite Now!

250-253 Practice Test | 250-253 examcollection | 250-253 VCE | 250-253 study guide | 250-253 practice exam | 250-253 cram


Killexams 000-742 questions and answers | Killexams IC3-2 sample test | Killexams NS0-505 study guide | Killexams F50-515 pdf download | Killexams ISSEP dumps | Killexams 000-025 dump | Killexams 71-178 braindumps | Killexams 310-810 braindumps | Killexams 132-S-911 cheat sheets | Killexams OG0-093 rehearse exam | Killexams M9510-664 free pdf | Killexams C9560-658 rehearse questions | Killexams NCPT dumps questions | Killexams 000-Z04 existent questions | Killexams 000-132 test questions | Killexams 000-558 free pdf | Killexams MOS-A2K free pdf | Killexams HP0-065 rehearse test | Killexams HP2-Z07 braindumps | Killexams HP0-A20 brain dumps |


killexams.com huge List of Exam Study Guides

View Complete list of Killexams.com Brain dumps


Killexams M2090-744 sample test | Killexams VCPD610 existent questions | Killexams LOT-988 test prep | Killexams 1D0-571 braindumps | Killexams 310-019 mock exam | Killexams HP0-J73 examcollection | Killexams 00M-238 braindumps | Killexams 000-202 rehearse questions | Killexams 270-411 dumps | Killexams 2V0-620 free pdf | Killexams HPE6-A41 cheat sheets | Killexams 000-M93 brain dumps | Killexams LOT-406 free pdf download | Killexams C2010-658 VCE | Killexams HPE2-T22 braindumps | Killexams A00-280 braindumps | Killexams C2140-136 free pdf | Killexams M70-301 rehearse exam | Killexams 000-184 exam prep | Killexams COG-122 study guide |


Administration of Veritas Cluster Server(R) 6.0 for Unix

Pass 4 confident 250-253 dumps | Killexams.com 250-253 existent questions | https://www.textbookw.com/

Implementing Security, Part II: Hardening Your UNIX/Linux Servers | killexams.com existent questions and Pass4sure dumps

Continuing with Part 2 of this two-article series, Joseph Dries helps you continue to expand upon your list of basic security processes by looking at UNIX/Linux hardening, protecting your servers from network based TCP/IP attacks, and utilizing centralized logging servers.

This article was excerpted from The Concise sheperd to Enterprise Internetworking and Security.

"A commercial, and in some respects a social, doubt has been started within the last year or two, whether or not it is perquisite to contend so openly the security or insecurity of locks. Many well-meaning persons suppose that the discussion respecting the means for baffling the supposititious safety of locks offers a premium for dishonesty, by showing others how to subsist dishonest. This is a fallacy. Rogues are very keen in their profession, and already know much more than they can train them respecting their several kinds of roguery. Rogues knew a helpful deal about lockpicking long before locksmiths discussed it among themselves, as they fill lately done. If a lock—let it fill been made in whatever country, or by whatever maker—is not so inviolable as it has hitherto been deemed to be, surely it is in the interest of honest persons to know this fact because the lying are tolerably unavoidable to subsist the first to apply the information practically; and the spread of information is necessary to give just play to those who might suffer by ignorance. It cannot subsist too earnestly urged, that an acquaintance with existent facts will, in the end, subsist better for flawless parties." —Charles Tomlinson's "Rudimentary Treatise on the Construction of Locks," published around 1850

It has been said that the wonderful thing about standards is there are so many to choose from. The selfsame altenative is available in the UNIX arena. There are two basic flavors, BSD-derived and AT&T System V-derived. BSD-derived UNIX systems embrace OpenBSD, FreeBSD, NetBSD, BSDi, MacOS X, and SunOS 4. System V-derived UNIX systems embrace HP-UX and Solaris (SunOS 5). Other UNIX systems, such as AIX, provide commands that will act BSD-ish or System V-ish, depending on how they were invoked. Linux is not derived from any UNIX, but depending on the distribution, borrows from both BSD and System V semantics. Actually, Linux itself is just the operating system kernel and supporting drivers. Most Linux distributions utilize the GNU system (http://www.gnu.org), thus they are called GNU/Linux distributions. There are hundreds of available GNU/Linux distributions, but even the "top 5" are different in their default commands, startup scripts, filesystem layout, included utilities, and packaging systems.

What does this carry weight to you? Unlike Windows NT, including Windows 2000, it is a far more tangled process to characterize how to acclimate a UNIX/Linux server. This next section provides some common procedures that can subsist applied across UNIX versions and GNU/Linux distributions. Following that are some pointers to vital documents on the Internet, which track available data and releases, and fade into a more particular account of how to acclimate a server for a particular task.

Common Steps for Hardening UNIX/Linux Servers

The process of edifice a UNIX or GNU/Linux server for utilize as a firewall or DMZ server begins with installation. Eliminating points of attack, such as filling the filesystem, or removing unnecessary libraries and services, is equivalent to removing viable entry points for intruders.

Some common guidelines for configuring UNIX servers with a more secure default stance are available from CERT's Web site at ftp://info.cert.org/pub/tech_tips/UNIX_configuration_guidelines.

Partition for Protection

Besides having divide partitions for the obvious, such as SWAP and /tmp, you should protect against out-of-disk-space denial-of-service attacks. Intruders might try to create excessive generation of logging data or fill your file system with big files through FTP or mail spool. The best way to protect against this is to segment the filesystem hierarchy into divide physical partitions.

The root partition / can subsist minute because it generally contains just the kernel—the necessary files, libraries, and configuration for booting in /bin, /sbin, /etc, and /lib. Access to the attached devices is provided through the /dev and /devices directories. Many GNU/Linux distributions store kernels and emblem data in the /boot directory, whereas kernel libraries are stored under /lib.

The /usr partition is normally where user-accessible applications are stored. Normally, /usr does not accommodate data or configuration files that change; therefore, an added security measure can subsist mounted as read-only.

The /var partition stores system logs and data services such as mail, Web, databases, printing, running services, package management, and so on. On a mail server, you might want to invent /var/spool/mail, or /var/mail in Solaris, a divide partition, or—even better—a divide disk array. If you only create one divide partition from /, /var is the one you should separate.

The /usr/local directory structure, and in Solaris the /opt directory, often contains locally installed optional software, configuration files, and data. /usr/local is normally not affected by operating system upgrades. Depending on how you utilize those directories, they too can subsist mounted as read-only.

These are suggestions and guidelines only, and are different from recommended settings for a system that contains user accounts, usually in /home.

Disable Extraneous inetd Services

inetd is the UNIX "Internet Super Server." It is a daemon process that is invoked at boot time and reads in a flat file configuration database normally organize at /etc/inetd.conf. inetd listens for incoming connections on the defined IP ports. When a connection is initiated on a defined port, it invokes the configured program to service the request. After the connection is finished, the process invoked to service that request terminates. This was originally designed to lighten the load and resources required for systems.

There are a number of services enabled through inetd, and almost flawless of them should subsist disabled for edifice firewalls and DMZ servers. Besides normally disabling FTP, TFTP, Telnet, and the Berkeley r* commands, disable the following:

  • in.named—BIND name services daemon. Except for your DNS servers, you should not subsist running DNS on your firewall or DMZ servers.

  • in.fingerd—Finger daemon that can subsist used to exhibit user information and lists of users who are logged in. There is no reason to advertise that information to would-be intruders.

  • daytime—Connections to this service pomp the date and time on the system in a string format. Getting the date and time of a system is useful for an intruder trying to implement replay attacks.

  • time—Connections to this service revert the time as a 32-bit value representing the number of seconds since midnight 1-Jan-1900. attain not provide intruders with your exact system time.

  • echo—This is a diagnostic service that echoes incoming data back to the connecting machine.

  • discard—This is a diagnostic service that does not echo (thus discarding) the incoming data stream back to the connecting machine.

  • chargen—This is a diagnostic service that automatically generates a stream of characters sent to the connecting machine.

  • systat—Connections to this service provide a list of flawless processes and their status.

  • netstat—Connections to this service provide a list of current network connections and their status.

  • Install and Configure tcp_wrappers

    Install and configure Wietse Venema's tcp_wrappers on both your firewall and DMZ servers. tcp_wrappers allows you to define access control to various services, depending on a limited set of criteria, such as username, IP address, or DNS domain.

    You might subsist asking why it's necessary to configure and install additional products when your firewall will subsist doing the selfsame thing. And that's a telling question. The respond is to avoid lone points of failure, and to provide security in layers. If one layer is pierced and bypassed, other layers will subsist standing guard behind the breach.

    tcp_wrappers are lightweight and extremely useful on internal servers; not just on firewalls and DMZ servers. withhold in reason that most information security breaches, intentional or accidental, befall internally. It's only the external defacements, massive distributed denial of service (DDoS) attacks, virus-du-jour, and stolen credit card databases that grab the press. That, and misplaced arduous drives with highly sensitive nuclear information.

    tcp_wrappers fill two main files that allow access to the individually defined services. The following two files are checked for rules governing access to individual or wildcard services:

    /etc/hosts.allow /etc/hosts.deny

    Like most firewalls, access is granted or denied on the first matching rule. The rules are checked in order, first in hosts.allow and then in hosts.deny.

    Care should subsist taken when using the KNOWN or UNKNOWN wildcards. flawless will always match whatever criteria you are testing. Read the hosts_access manual page included with tcp_wrappers for further details on syntax and rules setup.

    tcp_wrappers is installed and configured by default on most GNU/Linux distributions and BSD releases. For those UNIX systems that attain not fill tcp_wrappers installed by default, they can subsist organize at ftp://ftp.porcupine.org/pub/security/index.html. Retrieve the source, compile, and install the binaries on the servers.

    Lock Down Your DNS Server

    The Berkeley Internet name Daemon, or BIND, is the reference implementation of the name service providing DNS for the Internet. The Internet Software Consortium (ISC) is amenable for implementing and maintaining BIND. There are three basic versions of BIND: BIND 4, BIND 8, and (recently) BIND 9.

    BIND 4 has been around forever, and has its share of exploits. Only very faded versions of UNIX systems and GNU/Linux distributions came with BIND 4. Still, you'll subsist surprised how many installations quiet fill the older BIND 4 running. You should upgrade to a newer version of BIND. The unfortunate thing is that the file format defining the zones served by the server has changed. There are conversion scripts, but there is confident to subsist some hand editing.

    BIND 8 is the current stable release, and offers many more features and better control and granularity in access control. The settings described later are discussed with BIND 8 in mind.

    BIND 9 was released late in 2000. It offers many original features, such as IPv6 support, DNSSEC, replete Dynamic DNS, incremental zone transfers, multiple views (internal, external, and so on) from a lone server, and scalability improvements. If any of those features are primary to your configuration, you should investigate using BIND 9; otherwise, it's best left to the adventurous.

    Although almost flawless UNIX systems and GNU/Linux distributions compass with BIND as the name server, it is primary you invent confident you are at a recommended release. Before deploying a DNS server, internally or on the DMZ, invent confident it is at least version 8.2.2-P5. Any version prior to that has earnest exploits. This warning should not subsist ignored. The Internet Software Consortium themselves fill issued a statement that if you are running any version of BIND prior to 8.2.2-P5, you should assume your server has already been compromised. Check your UNIX system or GNU/Linux distribution. If the version of BIND is not at least 8.2.2-P5, check with your vendor for upgrades. If an upgrade is not available, you can compile a version of BIND yourself on a workstation, and install the binaries on your server. The source code can subsist organize at http://www.isc.org/products/BIND/.

    First, restrict zone transfers to specific secondary servers in your primary zones. The acl command allows you to define an access control list composed of blocks of addresses to subsist used with a named identifier. Using ACLs provides a self-documenting manner of administrating the named.conf configuration file. In the following example, they define two ACLs comprising their externally visible DNS servers and the secondary servers at their ISP:

    acl your-company-dns { 172.16.30.12; 172.16.30.24; }; acl your-ISP-dns { 199.177.202.10; 204.95.224.200; };

    The following allow-transfer option directive placed in your named.conf file will default flawless defined zones to only allow transfers for the defined hosts:

    options { allow-transfer { your-company-dns; your-ISP-dns; }; };

    You can override the allow-transfer statement in the options directive by placing the allow-transfer statement in the zone definition:

    zone "yourdomain.com" { type master; file "db.yourdomain-com"; allow-transfer { 172.16.30.12; 192.168.71.200; }; }

    The default allow-transfer option will preclude zone transfers to hosts not specified in the ACLs. However, if you want to restrict flawless zone transfers on your secondary servers and any secondary zones on your primary servers, utilize predefined match list none. This can subsist accomplished with the following allow-transfer directive in your zone definitions:

    zone "yourdomain.com" { type slave; file "db.yourdomain-com.s"; masters { 192.168.71.1; }; allow-transfer { none; }; };

    Finally, because you will subsist allowing recursive queries through your servers, it's best to enable access control lists for your internal networks. Using a nested, named acl with the allow-query option in the zone definition, you can then restrict recursive queries to internal hosts only as seen in the following example:

    acl internal-net { 192.168.71.0/24; }; acl dmz-net { 172.16.30.0/24; }; acl trusted-hosts { localhost; internal-net; dmz-net; }; zone "yourdomain.com" { type master; file "db.yourdomain-com" allow-query { trusted-hosts; }; };

    Que's Concise sheperd to DNS and BIND by Nicolai Langfeldt is a wonderful resource to further grok BIND configuration and maintenance.

    Tighten Sendmail Default Options

    Send mail comes with just about every UNIX/Linux installation as the default mail transfer agent (MTA). As a result of being so widely installed, it has been estimated that sendmail handles a majority of the email on the Internet. Because it runs as suid root, sendmail exploits feel millions of machines.

    sendmail version 8.11.0 is available at the time of publication, and supports original features such as STARTTLS and SMTP AUTH encryption. Upgrade to the newest version available, if possible, but delight invent confident that you are running a version no later than version 8.9.3 because of security exploits.

    To enable the Realtime Blackhole List feature, utilize the following in your sendmail.mc file:

    FEATURE(rbl)dnl

    Additionally, you might want to disable the SMTP VRFY and EXPN commands in sendmail. These commands are often used by intruders to accumulate information about your system:

    define(´confPRIVACY_FLAGS', ´novrfy,noexpn')dnl

    There are several additional flags you can set to invent sendmail fill a more secure stance:

  • authwarnings—Add X-Authentication-Warning header in messages on unavoidable conditions that might argue mail system spoof attempts.

  • needmailhelo—Require that the sending site uses the SMTP HELO command first when connecting to dispatch email.

  • needexpnhelo—Require that the sending site uses the SMTP HELO command before allowing any EXPN usage.

  • needvrfyhelo—Require that the sending site uses the SMTP HELO command before allowing any VRFY usage.

  • noreceipts—Disable Delivery Status Notification (DSNs) of delivery and read receipts.

  • goaway—Set flawless flags except restrictmailq and restrictqrun.

  • restrictmailq—Prevent users from using the mailq command to view the contents of the mail queue.

  • restrictqrun—Stop users from processing the queue.

  • Better than sendmail: Making Postfix Your MTA

    According to its Web page, Postfix's goals are "to subsist fast, smooth to administer, and secure, while at the selfsame time being sendmail compatible enough to not upset existing users."

    Postfix was primarily written by Wietse Venema of tcp_wrappers fame. Postfix was designed to subsist modular, thus Postfix is not a lone executable relish sendmail; rather, Postfix comprises a collection of specialized programs that achieve specific tasks. flawless the programs except for the master control process (oddly called master because it runs without root privilege) elope as nonprivileged users, limiting the damage an attacker can inflict on your system. Because of the speed, ease of configuration (and thus less random of misconfiguration), and security, it is recommended that you investigate replacing sendmail with Postfix. For those of you who attain not dream in sendmail.cf syntax, Postfix will invent email administration both easier and more secure.

    Postfix is now distributed with most GNU/Linux and BSD releases, although it is not often installed by default. Usually, it is a simple matter of installing it via your package management system, or (in the BSD case) via the ports collection.

    If you are using an operating system that does not divide Postfix, despondency not. You can download and compile the sources easily on a progress workstation and then install the binaries on your mail server. The sources, FAQs, and documentation can subsist organize at http://www.postfix.org/

    Linux-Specific Tasks

    There are many GNU/Linux distributions out there. Each vendor has its own installation process, which usually changes between original versions of the vendor's distribution. The "forerunners" of GNU/Linux distributions are Red Hat, SuSE, TurboLinux, Mandrake, Caldera, Slackware, and Debian. That does not carry weight specifically that you should utilize any one of them because the lofty number of distributions allows vendors to tailor their GNU/Linux distributions to specific tasks such as embedded systems, routers, and firewalls. assume the time to carefully investigate the available distributions, and determine which best fits your needs.

    With that said, two of these universal distributions stand out, but for different reasons. Red Hat, because it has had the most name recognition, and is usually the first to accumulate any sort of corporate support in the way of commercial software or commercial technical service. Many vendors, such as Oracle, IBM, and Check Point, fill released products for Red Hat-specific distributions. This does not carry weight that those software releases will not elope on other GNU/Linux distributions, but if there is a problem, the vendor might not support your installation of its product on a non-Red Hat distribution.

    Debian is the second distribution that deserves mention. First, not because it is entirely free, but because it is maintained by a nonprofit organization made up entirely of volunteers. These volunteers are highly motivated by quality and pride in their efforts to invent Debian the most stable and completely 100% free distribution available. Debian has proven to subsist extremely stable and smooth to manage and upgrade remotely. The upgrade process is by far the easiest of any of the GNU/Linux distributions. Debian installations can subsist upgraded without the exigency for reboots, replacing every installed package and running process excepting the kernel. Additionally, the Debian packaging system and its front ends allow extremely fine-grained control over which packages, utilities, libraries, and files exist on your system. Debian besides is currently available on six different architectures, with more than 3,900 included software packages to select from when installing.

    For both Debian and Red Hat installations, you should choose custom installations, and select the individual packages you want on your system. There should subsist no exigency to install progress packages, any of the original KDE or GNOME desktops, and certainly not X Window. Unfortunately, neither distribution yet has a minimal secure server or firewall predefined install-set.

    During the installation process, you should choose to enable shadow password file support; choose to utilize MD5 hashes for the passwords rather than the run-of-the-mill crypt function. If you miss these options during the install, you can change them after installation. In Red Hat, utilize the setup utility. In Debian, you can utilize the shadowconfig utility to enable or disable shadow passwords. To enable MD5 hashes, you fill to edit the preempt files under /etc/pam.d to embrace md5 on the password lines.

    You should besides enable ipchains support, even if this is an application server on the DMZ. ipchains provides additional layers of security, and allows you to protect the server from traffic should the firewall fail for some reason. A sample ipchains configuration is discussed later in the article.

    You should additionally read and monitor the security and errata/updates lists from your distribution vendor. With Debian, it is extremely smooth to automatically install security updates using the apt-get utility. For Red Hat installations starting with the 6.0 release, there is the up2date utility to retrieve updated packages for your release.

    For those people who choose to install Red Hat Linux, there is a security-related project called Bastille Linux, whose train is not just to acclimate your Linux installation, but to educate the administrators on how to acclimate the system. Bastille Linux supports Red Hat and Mandrake Linux distributions with project goals to become distribution, and UNIX flavor, agnostic. The Bastille Linux product is a set of scripts that asks a string of questions and then allows you to apply those modifications to your system. The questions characterize what needs to subsist done, why it should subsist done, and why you might not want to attain it. It is very educational, especially for those administrators just getting close with Linux. Bastille Linux can subsist organize at http://www.bastille-linux.org/.

    Another excellent source of information for administrators is the Linux Administrator's Security Guide. It covers an extremely wide array of topics related to Linux and security. You can find the Linux Administrator's Security sheperd online at http://www.securityportal.com/lasg/.

    Solaris-Specific Tasks

    Solaris has four default install-sets: Core, End-User, Developer, and Entire Distribution. Installing any install-set higher than the Core installation will enable more services than are required for DMZ servers or firewalls. In reality, you can often remove a significant percentage of the default Core install-set, depending on your server's application requirements.

    For Solaris-based servers, there are several excellent documents from Sun in its Blueprints Online archive at http://www.sun.com/software/solutions/blueprints/online.html. The following three papers are excellent starting points for edifice secure Solaris servers:

  • "Solaris Operating Environment Minimization for Security: A Simple, Reproducible and Secure Application Installation Methodology" by Alex Noordergraaf and Keith Watson. Although this paper specifically covers the iPlanet Web server requirements, similar requirements are necessary for using Apache or other Web servers.

  • "Solaris Operating Environment Security" by Alex Noordergraaf and Keith Watson. An overview of universal security options on a Solaris server. This paper includes some specifics for the SPARC architecture; however, most of the material is applicable to Intel architectures as well.

  • "Solaris Operating Environment Network Settings for Security" by Alex Noordergraaf and Keith Watson is another excellent paper on kernel tuning and application parameters that feel network security.

  • As a matter of fact, Sun's Blueprints Online is a wealth of whitepapers outlining Best Practices regarding Solaris Operating Environments, whether it is a DMZ Web server, firewall, or internal highly available database cluster.

    Lance Spitzner besides has an excellent Solaris hardening document that details the hardening process for edifice a Check Point FireWall-1 firewall on several recent versions of Solaris (through version 8) for the Intel and SPARC platforms. The vital document resides at http://www.enteract.com/~lspitz/armoring.html.

    Finally, there is an equivalent to the Bastille-Linux hardening scripts for Solaris called TITAN. The TITAN project and documentation can subsist organize at http://www.fish.com/titan/.

    OpenBSD-Specific Tasks

    This section concentrates on OpenBSD 2.7, which is one of the three more famed BSD variants; the others being NetBSD and FreeBSD. Each variant has focused on a different problem: NetBSD is the most portable, FreeBSD has the best performance, and OpenBSD is the most secure.

    One of the much strengths of OpenBSD is the highly secure default stance of a default install of OpenBSD. The OpenBSD Web site claims "three years without a remote cavity in the default install, only one localhost cavity in two years in the default install." Almost flawless services are disabled until the administrator has enough experience to properly configure them.

    Two additional changes necessary for an OpenBSD box to become a firewall are to disable sendmail and enable IP filter support. Both changes are made to the selfsame file, /etc/rc.conf. To disable sendmail, change

    sendmail_flags="-q30m"

    to

    sendmail_flags=NO

    To enable IP filter support, you must change

    ipfilter=NO

    to

    ipfilter=YES

    Additionally, if you will subsist doing Network Address Translation (NAT), providing transparent proxying, or providing support for FTP, you must enable the ipnat option by setting ipnat=YES. Syntax for IP filters will subsist covered briefly later in the chapter.


    OpsMgr 2007 R2 hardware, software, security requirements | killexams.com existent questions and Pass4sure dumps

    Solutions provider takeaway: assume a scrutinize at information on how to utilize OpsMgr 2007 R2, accumulate an overview of OpsMgr component requirements and become an expert on advanced OpsMgr concepts and security. Learning about OpsMgr 2007 R2 component requirements, such as hardware and software, will assist solutions providers ensure OpsMgr is functional and reliable. They will besides exigency to subsist alert of support for non-Windows devices, capacity limits and how to withhold track of the size of the OpsMgr 2007 R2 database.

    Understanding How to utilize OpsMgr

    Using OpsMgr is relatively straightforward. The OpsMgr monitoring environment can subsist accessed through three sets of consoles: an Operations Console, a Web console, and a command shell. The Operations Console provides replete monitoring of agent systems and administration of the OpsMgr environment, whereas the Web console provides access only to the monitoring functionality. The command shell provides command-line access to administer the OpsMgr environment.

    Managing and Monitoring with OpsMgr

    As mentioned in the preceding section, two methods are provided to configure and view OpsMgr settings. The first approach is through the Operations Console and the second is through the command shell.

    Within the Administration section of the Operations Console, you can easily configure the security roles, notifications, and configuration settings. Within the Monitoring section of the Operations Console, you can easily monitor a quick "up/down" status, active and closed alerts, and authenticate overall environment health.

    In addition, a web-based monitoring console can subsist elope on any system that supports Microsoft Internet Explorer 6.0 or higher. This console can subsist used to view the health of systems, view and respond to alerts, view events, view performance graphs, elope tasks, and manage Maintenance mode of monitored objects. original to OpsMgr 2007 R2 is the skill to pomp the Health Explorer in the Web console.

    Reporting from OpsMgr

    OpsMgr management packs commonly embrace a variety of preconfigured reports to exhibit information about the operating system or the specific application they were designed to toil with. These reports are elope in SQL Reporting Services. The reports provide an effective view of systems and services on the network over a custom period, such as weekly, monthly, or quarterly. They can besides assist you monitor your networks based on performance data, which can embrace censorious pattern analysis, trend analysis, capacity planning, and security auditing. Reports besides provide availability statistics for distributed applications, servers, and specific components within a server.

    Availability reports are particularly useful for executives, managers, and application owners. These reports can exhibit the availability of any expostulate within OpsMgr, including a server (shown in pattern 23.5), a database, or even a service such as Windows Server 2008 R2 that includes a legion of servers and components. The Availability report shown in pattern 23.5 indicates that the SP server was down on 9/29/2009 for about 4.17% of the time or just slightly over 1 hour. The repose of the time it had been up.

    FIGURE 23.5 Availability report.

    The reports can subsist elope on exact or at scheduled times and delivered via email. OpsMgr can besides generate HTML-based reports that can subsist published to a web server and viewed from any web browser. Vendors can besides create additional reports as Part of their management packs.

    Using Performance Monitoring

    Another key feature of OpsMgr is the capability to monitor and track server performance. OpsMgr can subsist configured to monitor key performance thresholds through rules that are set to collect predefined performance data, such as remembrance and CPU usage over time.

    Rules can subsist configured to trigger alerts and actions when specified performance thresh-olds fill been met or exceeded, allowing network administrators to act on potential performance issues. Performance data can subsist viewed from the OpsMgr Operations Console.

    In addition, performance monitors can establish baselines for the environment and then alert the administrator when the counter subsequently falls outside the defined baseline envelope.

    Using active Directory Integration

    Active Directory integration provides a way to install management agents on systems without environmental-specific settings. When the agent starts, the redress environmental settings, such as the primary and failover management servers, are stored in active Directory. The configuration of active Directory integration provides advanced search and filter capabilities to fine-tune the dynamic assignment of systems.

    Integrating OpsMgr Non-Windows Devices

    Network management is not a original concept. Simple management of various network nodes has been handled for quite some time through the utilize of the SNMP. Quite often, simple or even tangled systems that utilize SNMP to provide for system monitoring are in residence in an organization to provide for varying degrees of system management on a network.

    OpsMgr can subsist configured to integrate with non-Windows systems through monitoring of syslog information, log file data, and SNMP traps. OpsMgr can besides monitor TCP port communication and website transaction sequencing for information-specific data management.

    New to OpsMgr 2007 R2 is the skill to monitor non-Microsoft operating systems such as Linux and UNIX, as well as the applications that elope on them such as Apache and MySQL. OpsMgr monitors the file systems, network interfaces, daemons, configurations, and performance metrics. Operations Manager 2007 R2 supports monitoring of the following operating systems:

  • HP-UX 11i v2 and v3 (PA-RISC and IA64)
  • Sun Solaris 8 and 9 (SPARC) and Solaris 10 (SPARC and x86)
  • Red Hat Enterprise Linux 4 (x86/x64) and 5 (x86/x64) Server
  • Novell SUSE Linux Enterprise Server 9 (x86) and 10 SP1 (x86/x64)
  • IBM AIX v5.3 and v6.1
  • These operating systems are "first-class citizens" in Microsoft's parlance, significance they are treated as equals with the Windows operating systems. Agents can subsist pushed from the console, operations data is collected automatically, tasks can elope against the agents, and flawless major functions are supported.

    Special connectors can subsist created to provide bidirectional information flows to other management products. OpsMgr can monitor SNMP traps from SNMP-supported devices as well as generate SNMP traps to subsist delivered to third-party network management infrastructures.

    Exploring Third-Party Management Packs

    Software and hardware developers can subsequently create their own management packs to extend OpsMgr's management capabilities. These management packs extend OpsMgr's management capabilities beyond Microsoft-specific applications. Each management pack is designed to accommodate a set of rules and product information required to support its respective products. Currently, management packs fill been developed for APC, Cisco, Citrix, Dell, F5, HP, IBM, Linux, Oracle, Solaris, UNIX, and VMware to name a few. A complete list of management packs can subsist organize at the following Microsoft site: http://technet. microsoft.com/en-us/opsmgr/cc539535.aspx.

    Understanding OpsMgr Component Requirements

    Each OpsMgr component has specific design requirements, and a helpful information of these factors is required before dawn the design of OpsMgr. Hardware and software requirements must subsist taken into account, as well as factors involving specific OpsMgr components, such as the Root Management Server, gateway servers, service accounts, mutual authentication, and backup requirements.

    Exploring Hardware Requirements

    Having the proper hardware for OpsMgr to operate on is a censorious component of OpsMgr functionality, reliability, and overall performance. Nothing is worse than overloading a brand-new server only a few short months after its implementation. The industry standard generally holds that any production servers deployed should remain apropos for three to four years following deployment. Stretching beyond this time frame might subsist possible, but the horrid verity is that hardware investments are typically short term and exigency to subsist replaced often to ensure relevance. Buying a less-expensive server might redeem money in the short term but could potentially extend costs associated with downtime, troubleshooting, and administration. That said, the following are the Microsoft-recommended minimums for any server running an OpsMgr 2007 server component:

  • 2.8GHz processor or faster
  • 20GB of free disk space
  • 2GB of random access remembrance (RAM)
  • These recommendations apply only to the smallest OpsMgr deployments and should subsist seen as minimum levels for OpsMgr hardware. More realistic deployments would fill the following minimums:

  • 2--4 2.8GHz cores
  • 64-bit Windows operating system
  • 64-bit SQL Server
  • 60GB free disk space on RAID 1+0 for performance
  • 4--8GB RAM
  • Operations Manager 2007 R2 is one of Microsoft's most resource-intensive applications, so generous processor, disk, and remembrance are primary for optimal performance. Future expansion and relevance of hardware should subsist taken into account when sizing servers for OpsMgr deployment, to ensure that the system has elbowroom to grow as agents are added and the databases grow.

    Determining Software Requirements

    OpsMgr components can subsist installed on either 32-bit or 64-bit versions of Windows Server 2003, Windows Server 2008, or Windows Server 2008 R2. The database for OpsMgr must subsist elope on a Microsoft SQL Server 2005 or Microsoft SQL Server 2008 server. The database can subsist installed on the selfsame server as OpsMgr or on a divide server, a concept that is discussed in more detail in following sections.

    OpsMgr itself must subsist installed on a member server in a Windows active Directory domain. It is commonly recommended to withhold the installation of OpsMgr on a divide server or set of dedicated member servers that attain not elope any other applications that could meddle in the monitoring and alerting process.

    A few other requirements censorious to the success of OpsMgr implementations are as follows:

  • Microsoft .NET Framework 2.0 and 3.0 must subsist installed on the management server and the reporting server.
  • Windows PowerShell.
  • Microsoft Core XML Services (MSXML) 6.0.
  • WS-MAN v1.1 (for UNIX/Linux clients).
  • Client certificates must subsist installed in environments to facilitate mutual authentication between nondomain members and management servers.
  • SQL Reporting Services must subsist installed for an organization to subsist able to view and defer custom reports using OpsMgr's reporting feature.
  • OpsMgr Backup Considerations

    The most censorious piece of OpsMgr, the SQL databases, should subsist regularly backed up using standard backup software that can effectively achieve online backups of SQL databases. If integrating these specialized backup utilities into an OpsMgr deployment is not possible, it becomes necessary to leverage built-in backup functionality organize in SQL Server.

    Understanding Advanced OpsMgr Concepts

    OpsMgr's simple installation and relative ease of utilize often belie the potential complexity of its underlying components. This complexity can subsist managed with the perquisite amount of information of some of the advanced concepts of OpsMgr design and implementation.

    Understanding OpsMgr Deployment Scenarios

    As previously mentioned, OpsMgr components can subsist divided across multiple servers to divide load and ensure balanced functionality. This separation allows OpsMgr servers to compass in four potential "flavors," depending on the OpsMgr components held by those servers. The four OpsMgr server types are as follows:

  • Operations database server -- An operations database server is simply a member server with SQL Server installed for the OpsMgr operations database. No other OpsMgr components are installed on this server. The SQL Server component can subsist installed with default options and with the system account used for authentication. Data in this database is kept for 7 days by default.
  • Reporting database server -- A reporting database server is simply a member server with SQL Server and SQL Server Reporting Services installed. This database stores data collected through the monitoring rules for a much longer age than the operations database and is used for reporting and trend analysis. This database requires significantly more drive space than the operations database server. Data in this data-base is kept for 13 months by default.
  • Management server -- A management server is the communication point for both management consoles and agents. Effectively, a management server does not fill a database and is often used in big OpsMgr implementations that fill a dedicated database server. Often, in these configurations, multiple management servers are used in a lone management group to provide for scalability and to address multiple managed nodes.
  • All-in-one server -- An all-in-one server is effectively an OpsMgr server that holds flawless OpsMgr roles, including that of the databases. Subsequently, single-server OpsMgr configurations utilize one server for flawless OpsMgr operations.
  • Multiple Configuration Groups

    As previously defined, an OpsMgr management group is a logical grouping of monitored servers that are managed by a lone OpsMgr SQL database, one or more management servers, and a unique management group name. Each management group established operates completely separately from other management groups, although they can subsist configured in a hierarchical structure with a top-level management group able to notice "connected" lower-level management groups.

    The concept of connected management groups allows OpsMgr to scale beyond artificial boundaries and besides gives a much deal of flexibility when combining OpsMgr environments. However, unavoidable caveats must subsist taken into account. Because each management group is an island in itself, each must subsequently subsist manually configured with individual settings. In environments with a big number of customized rules, for example, such manual configuration would create a much deal of redundant toil in the creation, administration, and troubleshooting of multiple management groups.

    Deploying Geographic-Based Configuration Groups

    Based on the factors outlined in the preceding section, it is preferable to deploy OpsMgr in a lone management group. However, in some situations, an organization needs to divide its OpsMgr environment into multiple management groups. The most common reason for division of OpsMgr management groups is division along geographic lines. In situations in which wide zone network (WAN) links are saturated or unreliable, it might subsist sage to divide big "islands" of WAN connectivity into divide management groups.

    Simply being separated across tedious WAN links is not enough reason to warrant a divide management group, however. For example, minute sites with few servers would not warrant the creation of a divide OpsMgr management group, with the associated hardware, soft-ware, and administrative costs. However, if many servers exist in a distributed, generally well-connected geographical area, that might subsist a case for the creation of a management group. For example, an organization could subsist divided into several sites across the United States but determine to divide the OpsMgr environment into divide management groups for East Coast and West Coast, to roughly approximate their WAN infrastructure.

    Smaller sites that are not well connected but are not big enough to warrant their own management group should fill their event monitoring throttled to avoid being sent across the WAN during peak usage times. The downside to this approach, however, is that the reaction time to censorious event response is increased.

    Deploying Political or Security-Based Configuration Groups

    The less-common manner of dividing OpsMgr management groups is by political or security lines. For example, it might become necessary to divide monetary servers into a divide management group to maintain the security of the finance environment and allow for a divide set of administrators.

    Politically, if administration is not centralized within an organization, management groups can subsist established to divide OpsMgr management into divide spheres of control. This would withhold each OpsMgr management zone under divide security models.

    As previously mentioned, a lone management group is the most efficient OpsMgr environment and provides for the least amount of redundant setup, administration, and troubleshooting work. Consequently, artificial OpsMgr division along political or security lines should subsist avoided, if possible.

    Sizing the OpsMgr Database

    Depending on several factors, such as the type of data collected, the length of time that collected data will subsist kept, or the amount of database grooming that is scheduled, the size of the OpsMgr database will grow or shrink accordingly. It is primary to monitor the size of the database to ensure that it does not extend well beyond the bounds of accept-able size. OpsMgr can subsist configured to monitor itself, supplying forward notice of data-base problems and capacity thresholds. This type of strategy is highly recommended because OpsMgr could easily collect event information faster than it could accumulate rid of it.

    The size of the operations database can subsist estimated through the following formula:

    Number of agents x 5MB x retention days + 1024 overhead = estimated database size

    For example, an OpsMgr environment monitoring 1,000 servers with the default 7-day retention age will fill an estimated 35GB operations database:

    (1000 * 5 * 7) + 1024 = 36024 MB

    The size of the reporting database can subsist estimated through the following formula:

    Number of agents x 3MB x retention days + 1024 overhead = estimated database size

    The selfsame environment monitoring 1,000 servers with the default 400-day retention age will fill an estimated 1.1TB reporting database:

    (1000 * 3 * 400) + 1024 = 1201024 MB

    It is primary to understand that these estimates are uneven guidelines only and can vary widely depending on the types of servers monitored, the monitoring configuration, the degree of customization, and other factors.

    Defining Capacity Limits

    As with any system, OpsMgr includes some arduous limits that should subsist taken into account before deployment begins. Surpassing these limits could subsist antecedent for the creation of original management groups and should subsequently subsist included in a design plan. These limits are as follows:

  • Operations database -- OpsMgr operates through a principle of centralized, rather than distributed, collection of data. flawless event logs, performance counters, and alerts are sent to a single, centralized database, and there can subsequently subsist only a lone operations database per management group. Considering the utilize of a backup and high-availability strategy for the OpsMgr database is, therefore, highly recommended, to protect it from outage. It is recommended to withhold this database with a 50GB confine to better efficiency and reduce alert latency.
  • Management servers -- OpsMgr does not fill a hard-coded confine of management servers per management group. However, it is recommended to withhold the environment between three to five management servers. Each management server can support approximately 2,000 managed agents.
  • Gateway servers -- OpsMgr does not fill a hard-coded confine of gateway servers per management group. However, it is recommended to deploy a gateway server for every 200 nontrusted domain members.
  • Agents -- Each management server can theoretically support up to 2,000 monitored agents. In most configurations, however, it is sage to confine the number of agents per management server, although the levels can subsist scaled upward with more robust hardware, if necessary.
  • Administrative consoles -- OpsMgr does not confine the number of instances of the Web and Operations Console; however, going beyond the suggested confine might insert performance and scalability problems.
  • Defining System Redundancy

    In addition to the scalability built in to OpsMgr, redundancy is built in to the components of the environment. Proper information of how to deploy OpsMgr redundancy and residence OpsMgr components correctly is primary to the understanding of OpsMgr redundancy. The main components of OpsMgr can subsist made redundant through the following methods:

  • Management servers -- Management servers are automatically redundant and agents will failover and failback automatically between them. Simply install addi-tional management servers for redundancy. In addition, the RMS system acts as a management server and participates in the frailty tolerance.
  • SQL databases -- The SQL database servers hosting the databases can subsist made redundant using SQL clustering, which is based on Windows clustering. This supports failover and failback.
  • Root Management Server -- The RMS can subsist made redundant using Windows clus-tering. This supports failover and failback.
  • Having multiple management servers deployed across a management group allows an environment to achieve a unavoidable level of redundancy. If a lone management server expe-riences downtime, another management server within the management group will assume over the responsibilities for the monitored servers in the environment. For this reason, it might subsist sage to embrace multiple management servers in an environment to achieve a unavoidable level of redundancy if lofty uptime is a priority.

    The first management server in the management group is called the Root Management Server. Only one Root Management Server can exist in a management group and it hosts the software progress kit (SDK) and Configuration service. flawless OpsMgr consoles communicate with the management server so its availability is critical. In large-scale envi-ronments, the Root Management Server should leverage Microsoft Cluster technology to provide lofty availability for this component.

    Because there can subsist only a lone OpsMgr database per management group, the database is subsequently a lone point of failure and should subsist protected from downtime. Utilizing Windows Server 2008 R2 clustering or third-party fault-tolerance solutions for SQL data-bases helps to mitigate the risk involved with the OpsMgr database.

    Monitoring Nondomain Member Considerations

    DMZ, Workgroup, and Nontrusted Domain Agents require special configuration; in partic-ular, they require certificates to establish mutual authentication. Operations Manager 2007 R2 requires mutual authentication, that is, the server authenticates to the client and the client authenticates to the server, to ensure that the monitoring communications are not hacked. Without mutual authentication, it is viable for a hacker to execute a man-in-the-middle beset and impersonate either the client or the server. Thus, mutual authenti-cation is a security measure designed to protect clients, servers, and sensitive active Directory domain information, which is exposed to potential hacking attempts by the all-powerful management infrastructure. However, OpsMgr relies on active Directory Kerberos for mutual authentication, which is not available to nondomain members.

    Note:Workgroup servers, public web servers, and Microsoft Exchange Edge Transport role servers are commonly placed in the DMZ and are for security reasons not domain members, so almost every Windows Server 2008 R2 environment will exigency to deploy certificate-based authentication.

    In the absence of active Directory, trusts, and Kerberos, OpsMgr 2007 R2 can utilize X.509 certificates to establish the mutual authentication. These can subsist issued by any PKI, such as Microsoft Windows Server 2008 Enterprise CA. notice Chapter 14, "Transport-Level Security," for details on PKI and Windows Server 2008 R2.

    Installing agents on DMZ servers is discussed later in this chapter in the section "Monitoring DMZ Servers with Certificates."

    Securing OpsMgr

    Security has evolved into a primary concern that can no longer subsist taken for granted. The inherent security in Windows Server 2008 R2 is only as helpful as the services that fill access to it; therefore, it is sage to achieve a security audit of flawless systems that access information from servers. This concept holds redress for management systems as well because they collect sensitive information from every server in an enterprise. This includes potentially sensitive event logs that could subsist used to compromise a system. Consequently, securing the OpsMgr infrastructure should not subsist taken lightly.

    Securing OpsMgr Agents

    Each server that contains an OpsMgr agent and forwards events to management servers has specific security requirements. Server-level security should subsist established and should embrace provisions for OpsMgr data collection. flawless traffic between OpsMgr components, such as the agents, management servers, and database, is encrypted automatically for security, so the traffic is inherently secured.

    In addition, environments with high-security requirements should investigate the utilize of encryption technologies such as IPSec to scramble the event IDs that are sent between agents and OpsMgr servers, to protect against eavesdropping of OpsMgr packets.

    OpsMgr uses mutual authentication between agents and management servers. This means that the agent must reside in the selfsame forest as the management server. If the agent is located in a different forest or workgroup, client certificates can subsist used to establish mutual authentication. If an entire nontrusted domain must subsist monitored, the gateway server can subsist installed in the nontrusted domain, agents can establish mutual authentication to the gateway server, and certificates on the gateway and management server are used to establish mutual authentication. In this scenario, you can avoid needing to residence a certificate on each nontrusted domain member.

    Understanding Firewall Requirements

    OpsMgr servers that are deployed across a firewall fill special considerations that must subsist taken into account. Port 5723, the default port for OpsMgr communications, must specifically subsist opened on a firewall to allow OpsMgr to communicate across it.

    Table 23.1 describes communication for this and other OpsMgr components.

    TABLE 23.1 OpsMgr Communication Ports

    From To Port Agent Root Management Server 5723 Agent Management Server 5723 Agent Gateway Server 5723 Agent (ACS forwarder) Management server ACS collector 51909 Gateway Server Root Management Server 5723 Gateway Server Root Management Server 5723 Management or Gateway server Unix or Linux computer 1270 Management or Gateway server Unix or Linux computer 22 Management server Operations Manager database 1433 Management server Root Management Server 5723, 5724 Management server Reporting data warehouse 1433 Management server ACS collector ACS database 1433 Operations console Root Management Server 5724 Operations console (reports) SQL Server reporting services 80 Reporting server Root Management Server 5723, 5724 Reporting server Reporting data warehouse 1433 Root Management Server Operations Manager database 1433 Root Management Server Reporting data warehouse 1433 Web console browser Web console server 51908 Web console server Root Management Server 5724

    The firewall port for the agents is the port that needs to subsist opened most often, which is only port 5723 from the agent to the management servers for monitoring. Other ports, such as 51909 for ACS, are more rarely needed. pattern 23.6 shows the major communications paths and ports between OpsMgr components.

    FIGURE 23.6 Communications ports.

    Outlining Service Account Security

    In addition to the aforementioned security measures, security of an OpsMgr environment can subsist strengthened by the addition of multiple service accounts to ply the different OpsMgr components. For example, the Management Server Action account and the SDK/Configuration service account should subsist configured to utilize divide credentials, to provide for an extra layer of protection in the event that one account is compromised.

  • Management Server Action account -- The account amenable for collecting data and running responses from management servers.
  • SDK and Configuration service account -- The account that writes data to the operations database; this service is besides used for flawless console communication.
  • Local Administrator account -- The account used during the agent push installation process. To install the agent, local administrative rights are required.
  • Agent Action account -- The credentials the agent will elope as. This account can elope under a built-in system account, such as Local System, or a limited domain user account for high-security environments.
  • Data Warehouse Write Action account -- The account used by the management server to write data to the reporting data warehouse.
  • Data Warehouse Reader account -- The account used to read data from the data warehouse when reports are executed.
  • Run As accounts -- The specific accounts used by management packs to facilitate monitoring. These accounts must subsist manually created and delegated specific rights as defined in the management pack documentation. These accounts are then assigned as elope As accounts used by the management pack to achieve a lofty degree of security and flexibility when monitoring the environment. original to OpsMgr 2007 R2 is the skill to selectively divide the elope As Account to just the agents that exigency them.
  • Integrating System hub Operations Manager 2007 R2 with Windows Server 2008 R2  Using OpsMgr 2007 R2 to monitor Windows Server 2008 R2  OpsMgr 2007 R2 hardware, software, security requirements  OpsMgr 2007 R2 installation steps  Operations Manager 2007 R2 configuration  Operations Manager 2007 R2: Using alerts, running reports

    Printed with permission from Sams Publishing. Copyright 2010. Windows Server 2008 R2 Unleashed by Rand Morimoto, Michael Noel, Omar Droubi and Ross Mistry. For more information about this title and other similar books, delight visit Sams Publishing.


    1998 in review | killexams.com existent questions and Pass4sure dumps

    LWN 1998 Linux timeline

    This is version 1.0 of the 1998 Linux timeline. Thanks to input from many of you, many omissions from the previous version fill been fixed. For those who fill seen the earlier version, check out the changes page to notice what got added. The permanent site for this page is and will remain:

    http://lwn.net/1999/features/1998timeline/

    We're quiet looking for input for the final version of this page, which will subsist Part of the January 7, 1999 issue of LWN. delight drop us a note with your suggestions for additions to this page.

    This page was produced by Jonathan Corbet at Eklektix, Inc. Contributions fill since compass in from Zachary Beane, Christopher Bohn, mark Bolzern, Malcolm Caldwell, Victor Chang, Alan Cox, David Damerell, Joe DeVita, Gael Duval, Sammy Ford, Emmanuel Galanos, Jason Haas, Hans ? (hzo), Tres Hofmeister, "Kerberus," Alexander Kjeldaas, Matthias Kranz, Barry Kwok, Erik Levy, William Mackeown, Rick Moen, Olivier M�ller, Hartmut Niemann, Rodolphe Ortalo, loaded Payne, Kelly Price, G. Branden Robinson, Greg Roelofs, Daniel Roesen, Seth David Schoen, Dan Shafer, Lewis Tanzos, Jarto Tarpio, Henri de la Vall�e Poussin, Moshe Vainer, Steve Wainstead, David A. Wheeler, Micah Yoder, and James Youngman. Many thanks to flawless of these folks!

    You may jump straight to the month of your choice: January, February, March, April, May, June, July, August, September, October, November, or December.

    The Linux Weekly word begins publication. The very first issue, dated January 22, was a just a tiny hint of what LWN was to become. Since then we've gotten better at it, and the Linux world has gotten much more complicated. It has been an engaging adventure.

    [Netscape]Netscape announces that they will release the source to their browser under a free software license. This almost certainly remains one of the most primary events of the year; it opened a lot of eyes to what Linux and free software could provide.

    [RHAD] Red Hat Advanced progress Labs is founded. It has since become one of the higher-profile places where people are paid to develop free software, and an primary component of the GNOME project. RHAD is able to attract developers relish "Rasterman" and Federico Mena Quintero.

    The Stampede Linux distribution is announced. Actually, this happened in December, but the word took a while to spread... Stampede positions itself as a high-performance "real Linux hacker's" distribution.

    Word gets out that parts of the blockbuster film "Titanic" were rendered on Alpha machines running Linux. This was another primary step in the "legitimization" of Linux - everybody had heard of The Titanic, and some of its success seemed to rub off on everything associated with it.

    [Qube] The Cobalt Qube is announced and immediately becomes a favorite in the trade press due to its lofty performance, low price, and cute profile factor. Cobalt's Linux engineering is done by not any other than David Miller, source of much that is helpful in the Linux kernel.

    [prize] The Linux user community wins InfoWorld's technical support award; Red Hat 5.0 besides won their Operating System award. But it was the tech support award that truly opened some eyes; everybody had been motto that Linux had no support. This was the dawn of the End of the "no support" argument.

    [opensource] Red Hat announces that their installation support staff is running behind. They are a victim of their own success, and query for patience while they accumulate their act together.

    Linux according to Jesse Berst "I deem it's much if you are willing to promote Linux to your boss. As long as you are alert of the risk you are taking. The risk of getting fired." (Feb. 16). "Is a Linux takeover likely? Give me a break. Of course not." (June 23). "I personally deem Windows NT will subsist the mainstream operating system within a few years." [...] "My belief: Linux will never fade mainstream" (Sep. 9). "I've always said that Linux could become a earnest challenger to Microsoft's Windows NT." Sep. 28).

    Eric Raymond and friends compass up with the "open source" term. They apply for trademark status, and attach up the opensource.org web site. Thus begins the formal exertion to push Linux for corporate use.

    Linus Torvalds and Richard Stallman win the EFF Pioneer award. The award recognizes their contributions to electronic freedom. Strangely, flawless mention of this seems to fill vanished from the Electronic Frontier Foundation web site.

    Caldera 1.2 is released. Unlike Red Hat, which had been shipping libc6 based systems for some time, Caldera sticks with the tried and redress libc5.

    The OpenBIOS project is launched, in the credit that no system is free if it depends on proprietary BIOS code. A web page is set up for the project.

    [GGI] Major battles rage over whether GGI belongs in the Linux Kernel. GGI, the "Generic Graphics Interface," seeks to defer a better defined, better supported interface to video cards on Linux and other systems. Interestingly, GGI had made no request for kernel inclusion at this time. No resolution was reached, but better communications with a number of kernel hackers did result from this episode.

    The Linux universal Store opens; this is "the first walk-in Linux store." (Web page here).

    [Learning tree] Learning Tree, International adds a Linux administration course to their lineup. This course is offered frequently in the U.S. and Britain. "The quality of Linux software has improved dramatically, making it a low-cost, reliable, supported computing platform preempt for the industry environment."

    Consumer advocate Ralph Nader asks the big PC vendors (Dell, Gateway, Micron...) to proffer non-Microsoft systems, including systems with Linux installed. (See InfoPolicy Notes).

    Sun offers 70% discounts for people interested in "upgrading" from Linux to Solaris.

    [Debian] [Sendmail logo] Bruce Perens, once leader of the Debian project, quits entirely in the wake of disagreements on how the project should proceed.

    Sendmail, Inc. is formed by Eric Allman, in an attempt to invent money selling sendmail support services while keeping the basic sendmail code free.

    John Kirch releases his "Microsoft Windows NT Server 4.0 versus Unix" paper. This paper remains one of the best advocacy pieces out there, and should subsist required reading for anybody contemplating deployment of either technology.

    [Mozilla] The Mozilla source code hits the net. Netscape throws a huge party. The code is downloaded flawless over the world, and people start hacking. original features, such as stout encryption and a Qt port, are added almost immediately.

    Linus makes Inter@ctive Week's "25 Unsung Heroes of the Net" list. He is in helpful company, joining names relish Steven Bellovin, Van Jacobson, Peter G. Neumann, and others. April was maybe about the last time that Linus could subsist said to subsist an "unsung" hero.

    Linus announces Linux 2.1.92 and declares a 2.1 feature freeze. The announcment goes as far as to screech "...there are probably quiet bugs with some of the original code, but I'll freeze original features for the upcoming 2.2 kernel." This freeze turned out to subsist rather slushy, to screech the least.

    The Open Group announces a original licensing policy for the X window system. original versions of X will subsist proprietary and only available to paying customers. They immediately withhold some security bugfixes from universal distribution. XFree86 decides that it can not live with the original licensing, and declares its intent to fade its own way.

    [NPR] Linux is covered by the U.S. National Public Radio news, marking one of its first appearances in the mainstream, non-technical press.

    O'Reilly holds the "first ever" Free Software Summit, featuring Larry Wall, Brian Behlendorf, Linus Torvalds, Guido van Rossum, Eric Allman, Phil Zimmermann, Eric Raymond, and Paul Vixie.

    The Linux Weekly word daily updates page debuts. Despite LWN's intent to withhold the its weekly focus, the daily page eventually exceeds the weekly newsletter in traffic. The Linux events calendar is besides announced.

    Linus 3.0 is announced; the birth of Linus's second daughter causes much joy, and substantial disruption in kernel progress as flawless toil stops and many patches accumulate lost. Some grumbling results as it becomes limpid just how matter the entire process is on Linus's perpetual presence.

    RH support  confederate logo[Avalon] Red Hat announces their commercial support program, based on a worldwide network of "support partners," of which Eklektix, Inc., the producer of the Linux Weekly News, is one.

    The Avalon Beowulf cluster at Los Alamos goes on line and immediately powers itself into the list of the fastest computers on the planet.

    Eric S. Raymond publishes "Homesteading the Noosphere" on the web; This paper gives his view of how economics of open source software can work.

    Kernel hacker Alan Cox goes to toil for Red Hat.

    Bruce Perens proposes a original Linux distribution (proposal here) based on his experience with Debian. This distribution never comes about, but much of what's there later gets folded into the Linux standard base project.

    [Project Heresy C|Net's "Project Heresy" starts a high-profile attempt to toil using only Linux. The result was a long string of articles and "radio" programs, flawless on the Project Heresy page.

    Sun Microsystems joins Linux International.

    [Google] The "Google" search engine pops up. Not only is it one of the best search engines around, but it's based on Linux and features a Linux-specific search page.

    Sm@rt Reseller reports that Oracle and Informix fill no plans to support Linux. "In fact, many doubt that Linux-no matter how stable or how cheap-can ever compete in the corporate marketplace alongside the well-funded Windows NT and Solaris." (article here).

    [SuSE] The SuSE 5.2 distribution is released.

    [Corel] Corel formally embraces Linux. The Netwinder products are featured, and they pledge their support for the Linux system.

    The Association Francophone des Utilsateurs de Linux et des Logiciels Libres (AFUL) is formed in France. AFUL promptly becomes a force in French computer circles.

    O2 colossal databases start to arrive. support for Linux is announced by Computer Associates for their Ingres system, and by Ardent Software for their O2 expostulate database.

    The Linux Core/Layers project was announced and became the first in a string of attempts at creating standards for Linux systems. The Core/Layers page quiet exists, but this project is no longer active in this form.

    "But Linux is a communist operating system in a capitalist society. Its popularity is going to lead toward its fragmentation....The colossal problem with Linux is that it has no clear-cut direction. It's in the perquisite residence at the perquisite time, but its 15 minutes are nearly up." (PC Week, May 22).

    The Linux Weekly word moved to its own domain at lwn.net.

    A proposal goes out to create the Linux standard base (LSB) project. This proposal, signed by a big number of Linux luminaries, was discussed at Linux Expo and formed into a project, with Bruce Perens at the head. Numerous editorials were written and posted on FreshMeat; the list can subsist organize on the LSB web page. The LSB then disappeared from view for a few months.

    And, yes, Linux Expo was held; a helpful time was had by all.

    Red Hat 5.1 was released and immediately started accumulating rather more than the usual number of updates (partly as a result of the Linux Security Audit program). There was talk of "Red Hat 5.1 service pack 1" as a result. 5.1 did eventually stabilize into a solid release.

    "First, let me screech that I am uniquely unqualified to write about this week's topic. relish most of you, I've never used Linux....Linux has a snowball's random in hell of making appreciable inroads against Windows." (The infamous John Dodge hatchet job, PC Week, June 8).

    The Open Group offers the possibility of Unix 98 certification to Linux at the Uniforum meeting. The resulting press release says "Since the Linux OS is proving to subsist increasingly inflexible competition for NT in this marketspace, it's in the best interest of flawless Unix vendors for Linux to accumulate branded so that it may compete more effectively and withhold the low End UNIX 98-compliant." Very itsy-bitsy is heard thereafter.

    The Gartner Group says there is itsy-bitsy hope for free software. "...these operating systems will not find widespread utilize in mainstream commercial applications in the next three years, nor will there subsist broad third-party application support."

    [Wilbur] The Gimp 1.0 is released. This long-awaited release of one of Linux's highest profile tools did not disappoint.

    Stable kernel 2.0.34 is released after a long prepatch series.

    [Beowulf] The Beowulf web site shuts down temporarily due to concerns about U.S. export restrictions. Suddenly anybody can create a supercomputer, and people are getting worried. notice this Dr. Dobbs article for some more background. Shortly thereafter the site (www.beowulf.org) is back up as if nothing had happened.

    The Datapro study comes out showing that Linux has the highest user satisfaction of any system; it besides shows Linux to subsist the only system other than NT that is increasing market share.

    "Like a lot of products that are free, you accumulate a loyal following even though it's small. I've never had a customer mention Linux to me." (Bill Gates in PC Week, June 25).

    [Netwinder] Corel launches the Netwinder DM with this press release.

    Debian 2.0 goes into beta test after numerous delays.

    [Adaptec] Adaptec reverses its longstanding nondisclosure policy and announces support for Linux. The initial deal was with Red Hat; other distribution vendors fill since then announced agreements with Adaptec.

    The Chinese Linux Extension project begins; this project is doing a Chinese localization of Linux. (Web page (mix English/Chinese) here).

    IBM announces that it will divide and support the Apache web server, after working a deal with the Apache team.

    [Rocket]

    The Silicon Valley Linux Users Group holds "The much Linux Revolt of 1998", turning Microsoft's Windows 98 product launch celebration into a Linux publicity event at two high-profile retail outlets.

    Not content with that, The Silicon Valley Linux Users Group Launches Windows 98...on a rocket.

    The UK Linux Developers' Conference is held in Manchester (basic web page here).

    Rumors of a merger between Caldera and Red Hat circulate. It hasn't happened yet...

    The desktop wars rage as KDE and GNOME advocates hurl flames at each other. Linus gets in on the act, motto that KDE is OK with him. Those who are feeling nostalgic can head over to this Slashdot discussion just to notice how much fun it really was.

    In this context, KDE 1.0 is released. The first stable release of the K Desktop Environment proves popular, despite the complaints from those who attain not relish the licensing of the Qt library.

    NC World magazine shuts down with Nicholas Petreley's devastating criticism of Windows NT. The article, (still available on the net), concludes that Windows NT 5 (now "Windows 2000") can only subsist an absolute disaster.

    Stable kernel 2.0.35 is released.

    The Internet Operating System Counter goes online and finds, after querying hundreds of thousands of hosts, that Linux has the largest web server market share of any operating system out there. The results are available on the Internet Operating System Counter page.

    LinuxPPC 4.0 is released.

    "IBM, Informix, and Sybase besides fill no intentions of releasing versions of their databases on Linux, company representatives said." (InfoWorld, July 6)

    [Oracle] Oracle announces support for Linux in this press release. They pledge to invent a tribulation version available by the End of 1998, a deadline they beat by months. This, seemingly, was one of the acid tests for the potential of long-term success for Linux; a much deal of attention resulted from this announcement.

    [Informix] Informix announces support for Linux on almost the selfsame day with a press release of their own.

    The SVLUG/Taos "Future of Linux" panel is held featuring Linus and numerous other luminaries. (Writeup here). Among other things, this conference is where Intel first started making earnest noises about supporting Linux.

    "When I heard that Steve Ballmer was promoted to the office of president at Microsoft, I couldn't assist but miracle if he was being set up to assume the drop when Windows NT 5.0 proves to subsist a catastrophic market failure and Linux supplants Windows NT as the future server operating system of choice."(Nicholas Petreley, InfoWorld, July 27).

    [Forbes cover] Linus appears on the cover of Forbes magazine. A lengthy sage presents Linux in a highly positive manner, and brings the system to the attention of many who had never heard of it before. Linux begins to become a household word. (Yes, it was the August 10 issue, but it came out in July).

    The first release of the Mandrake distribution is announced. Mandrake is a version of the Red Hat distribution with international language support and KDE added.

    Stampede distribution 0.86 is released.

    Debian 2.0 is released with this announcement. It is a huge distribution, containing over 1500 packages and requiring at least two CD's to hold it.

    MkLinux distribution DR3 is released, announced thusly.

    Caldera releases Netware for Linux 1.0 (product info here).

    The EiffelBase library is released under an open source license; this library had previously been proprietary. (Info here).

    Red Hat announces (again) that their installation support staff is running behind (again). Their note on the topic asks for patience while they accumulate their act together.

    The Open Source Initiative is formed by Bruce Perens, Eric Raymond, Ian Murdock, and Tim Sailer (Russ Nelson and Chip Salzenberg unite the board a month later). Its purpose, among others, is to manage the "open source" trademark.

    Richard Stallman calls for the creation of free documentation for free software in this message to info-gnu.

    [GNOME] GNOME 0.25 is released; this release is codenamed Drooling Macaque.

    The Linux Compatibility Standards project is formed as a cooperative venture between Red Hat and Debian. This project (announcement) was formed out of an increasing frustration with the progress of the Linux standard Base, which was having hardship finding consensus on its goals.

    Bruce Perens then leaves the Linux standard base project and, for a while, dropped out of the free software world entirely.

    Software in the Public Interest (SPI) chooses its original officers, recovering from the departure of most of its board. The original folks are Ian Jackson, Martin Schulze, Dale Scheetz and Nils Lohner; here's their announcement on the subject.

    [LSB] Red Hat puts out a paper on why they attain not relish the Qt license and why they will not subsist including KDE anytime soon. The paper is quiet available on Red Hat's web site.

    The Linux Standards Association appears out of nowhere and claims that they will defer the existent standard for Linux systems. The LSA draws almost universal condemnation and slowly fades out of existence, but not before generating a just amount of press motto that the Linux community is hostile to standards. One helpful sequel of their presence may fill been to assist drive the Linux Compatibility Standards and Linux standard base projects to merge back together and accumulate earnest about producing something.

    "Organizations should not esteem deployment of NT v.5.0 prior to 2001. They believe organizations are better-served in the interim by evaluating the costs and benefits of using alternative products and not waiting on NT v.5.0 to emerge from 'vaporware' status."(Gartner Group, August 11)

    Red Hat makes the progress version of their distribution available as "RawHide".

    "Personally, I deem open-source software needs a grown-up to step in and lead it without flawless this petty bickering."(Nicholas Petreley, InfoWorld, August 24).

    Michael McLagan, a founder of the LSA, challenges the validity of the Linux trademark. Linux International responded with a bit of counselor action, causing the withdrawal of the challenge and the insertion of trademark ® symbols on the (now defunct) LSA web site.

    Kernel 2.1.115 is released; Linus calls a code freeze, for real, this time. Sort of.

    The Linux Internet Server Administration sheperd project starts up with a page at lisa.8304.ch.

    Linux Magazine France debuts as "the" French print magazine on Linux (information here).

    Stackguard/Immunix 5.1 is released. StackGuard is actually a version of gcc modified to protect against stack overrun attacks; Immunix is a version of the Red Hat distribution built with this compiler.

    Microsoft's Steve Ballmer admits that they are "worried" about free software and suggests that some of the NT source code may subsist made available to developers.

    [SuSE] SuSE 5.3 (English version) is released.

    [Caldera] Caldera splits into two divide companies. "Caldera Systems," under Ransom Love, now handles the Linux business, while "Caldera Thin Clients" does the embedded systems. (Press release here).

    "The Linux community, a temporary, self-managed gathering of diverse individuals engaged in a common task, is a model for a original kind of industry organization that could profile the basis for a original kind of economy."(Harvard industry Review, September)

    SuSE stops international shipments of their 5.3 release after installation problems gyrate up for a minute percentage of users.

    [UDI] The Uniform Driver Interface (UDI) project bursts on the Linux scene with a suggestion that maybe Linux developers would relish to defer lots of drivers for the UDI interface. A free reference implementation for Linux is promised, but enthusiasm among the Linux community seems low.

    SuSE announces their "Office Suite 99" product, which is a bundling of ApplixWare, KDE, and other helpful stuff. This product gets a just amount of attention as viable competition to Microsoft on the desktop.

    [DB2] IBM announces support for DB2 under Linux. (Press release here).

    [Sybase] Sybase announces support for linux (Information here). Sybase makes their database available for free download directly from the distribution vendors. With this announcement, Linux has an essentially complete portfolio of database products.

    Dell has been selling Linux-installed systems to big customers for some time reports Inter@ctive Week. This comes as a astonish to "small" customers who fill been trying to accumulate Dell to sell them Linux-installed (or at least non-Windows) machines.

    Neomagic allows the source for the driver for their video hardware to subsist released to the XFree86 project and freely distributed. This driver, developed by Precision Insight under the sponsorship of Red Hat, had previously been available in binary format only.

    The Open Group backs down and releases X11R6.4 under an open source license, thus ending a dejected chapter in the history of free software. It is besides rumored that TOG has little, if any progress staff working on X at this point, significance that it may not matter much which license they use.

    Microsoft lists Linux as a competitive threat in its annual SEC (U.S. Securities and Exchange Commission) filing. Speculation abounds that their existent purpose is to feel the upcoming antitrust trial.

    [CLUE] Canadian Linux Users hold a nationwide Installfest with much success. Summaries, pictures, etc. can subsist organize on the Installfest pages.

    Intel and Netscape (and two venture capital firms) announce minority [Intel] investments in Red Hat Software. The money is to subsist used to build an "enterprise support division" within Red Hat. An unbelievable amount of press is generated by this event, which is seen as a big-business endorsement of Linux.

    Intel joins Linux International.

    Net pioneer Jonathan Postel dies, depriving the world of a much-needed leader in the middle of the domain name debate.

    The International Kernel Patch is introduced, providing cryptographic capabilities in a way that does not elope afoul of obnoxious national crypto export laws.

    GNOME 0.30 is released; LWN published a review of this release.

    Linuxpower.org hits the web. This site has since become a helpful source of Linux articles and tutorials.

    [eCos] Cygnus releases a real-time embedded operating system (eCos) under an open source license. (Press release here).

    Red Hat finds some security problems in CDE and drops it immediately as a supported product. The note they dispatch out makes a colossal thing of the fact that CDE is not open source software, and thus not easily fixable.

    Caldera 1.3 is released. This version includes Sybase, KDE, and StarOffice 4.0, but sticks with libc5. Caldera besides announces Linux administration training courses.

    "Gateway Inc., which has been doing certification tests with Linux for six months, most likely will install Linux across its enterprise server line next year.... Red Hat's green expects six of the top 10 PC server makers to proffer Linux on their machines by next March."(PC Week, October 5).

    [LinuxToday] LinuxToday hits the web providing another source of constantly updated Linux news. This is the first of a number of original Linux-related web publications that start up over the next month.

    Tensions explode on linux-kernel after Linus drops a few too many patches. Linus walks out in a huff and takes a vacation for a bit. Things revert to normal, of course, but some people accumulate talking. It becomes limpid once again that the Linux kernel is getting to subsist too colossal for one person to withhold on top of. Some ways of reducing the load on Linus are discussed, but nothing is really resolved.

    The "bootX" utility is released, and makes life much easier for PowerPC users.

    "For the moment, however, the company from Redmond, Washington, seems almost grateful for the rising profile of Linux, seeing it as an smooth way of demonstrating that Windows is not a monopoly, ahead of its antitrust trial, scheduled to start on October 15th. That may subsist short-sighted. In the long run, Linux and other open-source programs could antecedent Mr Gates much grief."(The Economist, October 3)

    Oracle8 for Linux becomes available for downloading; at 142 MB it is not something to subsist done lightly.

    AFUL sponsors a French nationwide installation party, the reports argue that it was highly successful.

    Microsoft presents Linux as evidence that it does not hold a monopoly in operating systems; their release besides claims that Linux was developed by "a lone individual."

    Larry Wall wins the first annual Free Software Foundation award. Larry, of course, is the developer of Perl and lots of other helpful stuff.

    Debian decides to drop KDE from their distribution; their explanation cites worries about licensing issues.

    Novell announces that they will port NDS to Linux in cooperation with Caldera.

    [Allaire] Allaire announces that they will support Linux with "a future version" of their favorite "Cold Fusion" product. (Press release here). This, evidently, is a product that quite a few people fill been waiting for.

    [Compaq] Compaq is reported to subsist ready to support VARs installing Linux on their hardware, though it does not blueprint to sell Linux-installed systems directly. [LinuxWorld]

    LinuxWorld goes online, signalling the arrival of the mainstream trade press. LinuxWorld is edited by Nicholas Petreley, a long time supporter of Linux in the trade press.

    Microsoft publishes an anti-Linux "open letter" in France in what was seen by some as a beta-test of a wider FUD strategy. The note (in French) (or translated to English) went after Linux on several fronts, and was widely and easily refuted. The definitive refutation was probably this response from AFUL (also available in English).

    Debian 2.1 goes into feature freeze.

    France Telecom invests in Cobalt Networks.

    The Mexican ScholarNet project is announced; this project will install Linux-based computer labs in 140,000 schools. (LWN coverage here). The project will subsist using GNOME heavily, and expects to contribute to GNOME development.

    "What I saw at the Linux Showcase was enthusiasm, the likes of which I haven't seen in the PC industry for a long time. Sure, some of it was from guys in ponytails and T-shirts, but it was besides from guys in suits. Academics and scientists, but besides businessmen."(PC Week, October 26).

    The Atlanta Linux Showcase was a colossal success. (LWN coverage here).

    Corel announces that Word flawless 8 for Linux will subsist downloadable for Free for "personal use." They besides announce a partnership with Red Hat to supply Linux for the Netwinder. [WineHQ]

    Corel besides commits to helping the WINE progress effort, a major boost for this long-awaited project. (Note from Corel here).

    [PHT] Pacific HiTech announces that they will bring TurboLinux to the U.S. market. They fill long claimed to subsist the most favorite distribution in Japan, and deem it's time to head into other pastures. (Press release here).

    Www.alphalinux.org goes live, providing a lone site for Alpha-related information for the first time.

    [AFUL] AFUL signs an agreement with the French Ministry of Education to support the deployment of free software in French schools. (Information (in French) here).

    Kernel hacker David Miller gets married (pictures here).

    Two internal Microsoft memos on Linux and open source software are leaked to Eric Raymond; he promptly marks them up and makes them [ExtremeLinux] public. The memos admit frankly the strengths of Linux and the sort of threat that it poses to Microsoft, and suggests some viable responses. The furor in the press was just as big as one might expect. (Eric's Halloween page has the memos, links to press coverage, and translations into a number of languages).

    Extreme Linux makes a splash at Supercomputing '98, as witnessed by this list of events at the conference.

    Linux has a lofty profile at COMDEX, though it was not the hub of the exhibit as some pundits had expected.

    The "Eddie" software suite is released under an open source license; Eddie is a set of applications designed to assist build high-availability clusters.

    The proprietary I2O bus specification is opened up, so that Linux support can subsist implemented. One of the colossal nondisclosure threats to Linux is thus removed. (Press release here).

    Red Hat 5.2 is released. This is supposititious to subsist the last, stablest 5.x release before 6.0, which will accommodate the 2.2 kernel.

    LinuxPPC 5.0 is announced; the actual release is set for January 5, 1999. (Info here). [Ext2]

    Ext2 hits the net as another monthly Linux magazine.

    Informix and Apropos deploy Linux machines in over 100 Jay Jacobs clothing stores. (Press release here). Linux has truly arrived in the mainstream corporate world.

    Digital Creations releases Principia under an open source license; Principia is eventually rolled together with Bobo and Aqueduct to become Zope. An engaging angle on this release is that it was recommended by Digital Creations' venture capital investor (LWN coverage here).

    The Silicon Valley Tea Party celebrates the opening of the Microsoft campus there. (Writeup here). [StarDivision]

    StarOffice 5 for Linux is released, freely downloadable for personal use. (Information here).

    Troll Tech announces that version 2.0 of the Qt library will subsist released under an open source license. This license does not answer everyone, since it leaves Troll Tech in a special position and requires that modifications subsist distributed as patches. As a result, though most admit that the QPL is an "open source" license, the desktop wars fail to end.

    Stable kernel 2.0.36 is released. (Linus's announcement here, release notes here).

    OpenBIOS 0.0.1 is released (announcement here).

    Slackware distribution 3.6 is released

    Red Hat and SuSE both announce support programs at COMDEX. Both are aiming at the big-ticket "enterprise support" market. (SuSE's announcement here, and Red Hat's here).

    Netscape buys the "NewHoo" web directory, and promises to invent its database available.

    Sunsite.unc.edu transforms into MetaLab.unc.edu to better reflect its purpose and to accumulate away from Sun's trademark. It remains one of the primary Linux repositories and the home of the Linux Documentation Project.

    The CLOWN project creates a 550-node cluster, aiming for a spot in the record books (Coverage here).

    A fight erupts over the ownership of the "open source" trademark. Both Eric Raymond, in the profile of the Open Source Initiative, and Software in the Public Interest pretense to own the trademark. SPI has called for a "public comment" age on who should control the trademark; that age remains open as this is written.

    [BSDI] BSDI announces the skill to elope Linux binaries, giving users of Linux applications "a reliable, commercially supported operating system to elope them on." The implication, of course, is that such a platform had not previously been available. The really engaging point, though, is that Linux now has enough applications to invent other OS vendors envious.

    Linus and Tove are guests of deference at Finland's Independence Day celebration. They accumulate to meet the President and are voted "the most engaging couple" at the event. (Coverage here, click on "��nestys" for pictures).

    Red Hat hacker (and RPM culprit) Eric Troan gets married, no pictures (yet) available.

    The Linux Kernel Archive Mirror System is established to better accumulate original kernels out to the world. (Mirror page here).

    The Linux Kernel History is published due to the efforts of Riley Williams and others. An almost complete reconstruction of flawless the released Linux kernels has been done. (Kernel history page here).

    [Mandrake] [Gecko]

    Mandrake distribution 5.2 is released.

    Netscape's "Gecko" rendering engine is released. Gecko is the first high-profile product out of the Netscape/Mozilla open source progress effort; it is a leaner, meaner, faster, more standards-conformant web page layout engine. (Press release here).

    [YellowDog]

    The "Yellow Dog Linux" distribution for the PowerPC is announced. (Home page here).

    Corel announces a partnership with the KDE progress team which will provide the KDE interface for the Netwinder. (Press release here).

    IBM releases version 3.5 of the AFS filesystem for Linux (press release here). (An earlier version of AFS had been available before 1998, notice the Linux-AFS FAQ for more).

    Electric Lichen announces "Die Linuxbierwanderung" - the Linux Beer Hike, a Linux-training, Alps-walking, beer-drinking adventure in Bavaria next August. (Information here).

    GNOME 1.0 enters code freeze and 0.99 betas are released.

    Compaq releases a Linux driver for its PCI RAID controller, and it is under the GPL. (Press release here).

    LibGGI 2.0 (beta) released (Announcement here).

    IBM releases some software goodies under an open source license, including the Jikes Java compiler and Secure Mailer. They besides attach out the beta version of DB2 for free download. [Sun]

    Sun opens up the Java license. It's quiet not an open source license, but things are headed in the perquisite direction.

    Sun announces support for Linux on UltraSparc systems

    "The question is how to attain it without exposing IBM and its partners," says one source close with IBM's plans. "With a universal public license, there are some exposures with liability and how open are the patents if you modify the code. The best way to solve this is by cleaning up the license."(Sm@rt Reseller, December 18).

    Silicon Graphics joins Linux International and besides announces support for Samba on their systems.

    KDE 1.1 goes into code freeze and beta releases are made available.

    IBM is said to subsist considering becoming a support provider for Linux according to some reports. They are held back by fears about patent and liability issues.

    The first public beta of SuSE 6.0 is released (announcement here).

    Reports screech that Apple will start selling Power Macintoshes with Linux installed. [Corel]

    WordPerfect 8 becomes available for download; it proves to subsist popular. (Information here).

    The "LinuxPPC on the iMac HOWTO" is released, allowing users to accumulate Linux on those stylish blue boxes. (HOWTO here).

    The first pre-2.2 kernel is released.

    A report from IDC says that Linux shipments rose by more than 200% in 1998, and its market share rose by more than 150%. Linux has a 17% market share, and a growth rate unmatched by any other system on the market.

    Eklektix, Inc. Linux powered! Copyright © 1998 Eklektix, Inc., flawless rights reservedLinux ® is a registered trademark of Linus Torvalds



    Direct Download of over 5500 Certification Exams

    3COM [8 Certification Exam(s) ]
    AccessData [1 Certification Exam(s) ]
    ACFE [1 Certification Exam(s) ]
    ACI [3 Certification Exam(s) ]
    Acme-Packet [1 Certification Exam(s) ]
    ACSM [4 Certification Exam(s) ]
    ACT [1 Certification Exam(s) ]
    Admission-Tests [13 Certification Exam(s) ]
    ADOBE [93 Certification Exam(s) ]
    AFP [1 Certification Exam(s) ]
    AICPA [2 Certification Exam(s) ]
    AIIM [1 Certification Exam(s) ]
    Alcatel-Lucent [13 Certification Exam(s) ]
    Alfresco [1 Certification Exam(s) ]
    Altiris [3 Certification Exam(s) ]
    Amazon [2 Certification Exam(s) ]
    American-College [2 Certification Exam(s) ]
    Android [4 Certification Exam(s) ]
    APA [1 Certification Exam(s) ]
    APC [2 Certification Exam(s) ]
    APICS [2 Certification Exam(s) ]
    Apple [69 Certification Exam(s) ]
    AppSense [1 Certification Exam(s) ]
    APTUSC [1 Certification Exam(s) ]
    Arizona-Education [1 Certification Exam(s) ]
    ARM [1 Certification Exam(s) ]
    Aruba [6 Certification Exam(s) ]
    ASIS [2 Certification Exam(s) ]
    ASQ [3 Certification Exam(s) ]
    ASTQB [8 Certification Exam(s) ]
    Autodesk [2 Certification Exam(s) ]
    Avaya [96 Certification Exam(s) ]
    AXELOS [1 Certification Exam(s) ]
    Axis [1 Certification Exam(s) ]
    Banking [1 Certification Exam(s) ]
    BEA [5 Certification Exam(s) ]
    BICSI [2 Certification Exam(s) ]
    BlackBerry [17 Certification Exam(s) ]
    BlueCoat [2 Certification Exam(s) ]
    Brocade [4 Certification Exam(s) ]
    Business-Objects [11 Certification Exam(s) ]
    Business-Tests [4 Certification Exam(s) ]
    CA-Technologies [21 Certification Exam(s) ]
    Certification-Board [10 Certification Exam(s) ]
    Certiport [3 Certification Exam(s) ]
    CheckPoint [41 Certification Exam(s) ]
    CIDQ [1 Certification Exam(s) ]
    CIPS [4 Certification Exam(s) ]
    Cisco [318 Certification Exam(s) ]
    Citrix [47 Certification Exam(s) ]
    CIW [18 Certification Exam(s) ]
    Cloudera [10 Certification Exam(s) ]
    Cognos [19 Certification Exam(s) ]
    College-Board [2 Certification Exam(s) ]
    CompTIA [76 Certification Exam(s) ]
    ComputerAssociates [6 Certification Exam(s) ]
    Consultant [2 Certification Exam(s) ]
    Counselor [4 Certification Exam(s) ]
    CPP-Institue [2 Certification Exam(s) ]
    CPP-Institute [1 Certification Exam(s) ]
    CSP [1 Certification Exam(s) ]
    CWNA [1 Certification Exam(s) ]
    CWNP [13 Certification Exam(s) ]
    Dassault [2 Certification Exam(s) ]
    DELL [9 Certification Exam(s) ]
    DMI [1 Certification Exam(s) ]
    DRI [1 Certification Exam(s) ]
    ECCouncil [21 Certification Exam(s) ]
    ECDL [1 Certification Exam(s) ]
    EMC [129 Certification Exam(s) ]
    Enterasys [13 Certification Exam(s) ]
    Ericsson [5 Certification Exam(s) ]
    ESPA [1 Certification Exam(s) ]
    Esri [2 Certification Exam(s) ]
    ExamExpress [15 Certification Exam(s) ]
    Exin [40 Certification Exam(s) ]
    ExtremeNetworks [3 Certification Exam(s) ]
    F5-Networks [20 Certification Exam(s) ]
    FCTC [2 Certification Exam(s) ]
    Filemaker [9 Certification Exam(s) ]
    Financial [36 Certification Exam(s) ]
    Food [4 Certification Exam(s) ]
    Fortinet [12 Certification Exam(s) ]
    Foundry [6 Certification Exam(s) ]
    FSMTB [1 Certification Exam(s) ]
    Fujitsu [2 Certification Exam(s) ]
    GAQM [9 Certification Exam(s) ]
    Genesys [4 Certification Exam(s) ]
    GIAC [15 Certification Exam(s) ]
    Google [4 Certification Exam(s) ]
    GuidanceSoftware [2 Certification Exam(s) ]
    H3C [1 Certification Exam(s) ]
    HDI [9 Certification Exam(s) ]
    Healthcare [3 Certification Exam(s) ]
    HIPAA [2 Certification Exam(s) ]
    Hitachi [30 Certification Exam(s) ]
    Hortonworks [4 Certification Exam(s) ]
    Hospitality [2 Certification Exam(s) ]
    HP [746 Certification Exam(s) ]
    HR [4 Certification Exam(s) ]
    HRCI [1 Certification Exam(s) ]
    Huawei [21 Certification Exam(s) ]
    Hyperion [10 Certification Exam(s) ]
    IAAP [1 Certification Exam(s) ]
    IAHCSMM [1 Certification Exam(s) ]
    IBM [1530 Certification Exam(s) ]
    IBQH [1 Certification Exam(s) ]
    ICAI [1 Certification Exam(s) ]
    ICDL [6 Certification Exam(s) ]
    IEEE [1 Certification Exam(s) ]
    IELTS [1 Certification Exam(s) ]
    IFPUG [1 Certification Exam(s) ]
    IIA [3 Certification Exam(s) ]
    IIBA [2 Certification Exam(s) ]
    IISFA [1 Certification Exam(s) ]
    Intel [2 Certification Exam(s) ]
    IQN [1 Certification Exam(s) ]
    IRS [1 Certification Exam(s) ]
    ISA [1 Certification Exam(s) ]
    ISACA [4 Certification Exam(s) ]
    ISC2 [6 Certification Exam(s) ]
    ISEB [24 Certification Exam(s) ]
    Isilon [4 Certification Exam(s) ]
    ISM [6 Certification Exam(s) ]
    iSQI [7 Certification Exam(s) ]
    ITEC [1 Certification Exam(s) ]
    Juniper [63 Certification Exam(s) ]
    LEED [1 Certification Exam(s) ]
    Legato [5 Certification Exam(s) ]
    Liferay [1 Certification Exam(s) ]
    Logical-Operations [1 Certification Exam(s) ]
    Lotus [66 Certification Exam(s) ]
    LPI [24 Certification Exam(s) ]
    LSI [3 Certification Exam(s) ]
    Magento [3 Certification Exam(s) ]
    Maintenance [2 Certification Exam(s) ]
    McAfee [8 Certification Exam(s) ]
    McData [3 Certification Exam(s) ]
    Medical [69 Certification Exam(s) ]
    Microsoft [368 Certification Exam(s) ]
    Mile2 [2 Certification Exam(s) ]
    Military [1 Certification Exam(s) ]
    Misc [1 Certification Exam(s) ]
    Motorola [7 Certification Exam(s) ]
    mySQL [4 Certification Exam(s) ]
    NBSTSA [1 Certification Exam(s) ]
    NCEES [2 Certification Exam(s) ]
    NCIDQ [1 Certification Exam(s) ]
    NCLEX [2 Certification Exam(s) ]
    Network-General [12 Certification Exam(s) ]
    NetworkAppliance [36 Certification Exam(s) ]
    NI [1 Certification Exam(s) ]
    NIELIT [1 Certification Exam(s) ]
    Nokia [6 Certification Exam(s) ]
    Nortel [130 Certification Exam(s) ]
    Novell [37 Certification Exam(s) ]
    OMG [10 Certification Exam(s) ]
    Oracle [269 Certification Exam(s) ]
    P&C [2 Certification Exam(s) ]
    Palo-Alto [4 Certification Exam(s) ]
    PARCC [1 Certification Exam(s) ]
    PayPal [1 Certification Exam(s) ]
    Pegasystems [11 Certification Exam(s) ]
    PEOPLECERT [4 Certification Exam(s) ]
    PMI [15 Certification Exam(s) ]
    Polycom [2 Certification Exam(s) ]
    PostgreSQL-CE [1 Certification Exam(s) ]
    Prince2 [6 Certification Exam(s) ]
    PRMIA [1 Certification Exam(s) ]
    PsychCorp [1 Certification Exam(s) ]
    PTCB [2 Certification Exam(s) ]
    QAI [1 Certification Exam(s) ]
    QlikView [1 Certification Exam(s) ]
    Quality-Assurance [7 Certification Exam(s) ]
    RACC [1 Certification Exam(s) ]
    Real-Estate [1 Certification Exam(s) ]
    RedHat [8 Certification Exam(s) ]
    RES [5 Certification Exam(s) ]
    Riverbed [8 Certification Exam(s) ]
    RSA [15 Certification Exam(s) ]
    Sair [8 Certification Exam(s) ]
    Salesforce [5 Certification Exam(s) ]
    SANS [1 Certification Exam(s) ]
    SAP [98 Certification Exam(s) ]
    SASInstitute [15 Certification Exam(s) ]
    SAT [1 Certification Exam(s) ]
    SCO [10 Certification Exam(s) ]
    SCP [6 Certification Exam(s) ]
    SDI [3 Certification Exam(s) ]
    See-Beyond [1 Certification Exam(s) ]
    Siemens [1 Certification Exam(s) ]
    Snia [7 Certification Exam(s) ]
    SOA [15 Certification Exam(s) ]
    Social-Work-Board [4 Certification Exam(s) ]
    SpringSource [1 Certification Exam(s) ]
    SUN [63 Certification Exam(s) ]
    SUSE [1 Certification Exam(s) ]
    Sybase [17 Certification Exam(s) ]
    Symantec [134 Certification Exam(s) ]
    Teacher-Certification [4 Certification Exam(s) ]
    The-Open-Group [8 Certification Exam(s) ]
    TIA [3 Certification Exam(s) ]
    Tibco [18 Certification Exam(s) ]
    Trainers [3 Certification Exam(s) ]
    Trend [1 Certification Exam(s) ]
    TruSecure [1 Certification Exam(s) ]
    USMLE [1 Certification Exam(s) ]
    VCE [6 Certification Exam(s) ]
    Veeam [2 Certification Exam(s) ]
    Veritas [33 Certification Exam(s) ]
    Vmware [58 Certification Exam(s) ]
    Wonderlic [2 Certification Exam(s) ]
    Worldatwork [2 Certification Exam(s) ]
    XML-Master [3 Certification Exam(s) ]
    Zend [6 Certification Exam(s) ]





    References :


    Dropmark : http://killexams.dropmark.com/367904/11883641
    Wordpress : http://wp.me/p7SJ6L-1VH
    Dropmark-Text : http://killexams.dropmark.com/367904/12846753
    Blogspot : http://killexamsbraindump.blogspot.com/2017/12/just-memorize-these-250-253-questions.html
    RSS Feed : http://feeds.feedburner.com/WhereCanIGetHelpToPass250-253Exam
    Box.net : https://app.box.com/s/m9c2t0364tms0jtdfwhx6yaqsuawl77h











    Killexams 250-253 exams | Killexams 250-253 cert | Pass4Sure 250-253 questions | Pass4sure 250-253 | pass-guaratee 250-253 | best 250-253 test preparation | best 250-253 training guides | 250-253 examcollection | killexams | killexams 250-253 review | killexams 250-253 legit | kill 250-253 example | kill 250-253 example journalism | kill exams 250-253 reviews | kill exam ripoff report | review 250-253 | review 250-253 quizlet | review 250-253 login | review 250-253 archives | review 250-253 sheet | legitimate 250-253 | legit 250-253 | legitimacy 250-253 | legitimation 250-253 | legit 250-253 check | legitimate 250-253 program | legitimize 250-253 | legitimate 250-253 business | legitimate 250-253 definition | legit 250-253 site | legit online banking | legit 250-253 website | legitimacy 250-253 definition | >pass 4 sure | pass for sure | p4s | pass4sure certification | pass4sure exam | IT certification | IT Exam | 250-253 material provider | pass4sure login | pass4sure 250-253 exams | pass4sure 250-253 reviews | pass4sure aws | pass4sure 250-253 security | pass4sure coupon | pass4sure 250-253 dumps | pass4sure cissp | pass4sure 250-253 braindumps | pass4sure 250-253 test | pass4sure 250-253 torrent | pass4sure 250-253 download | pass4surekey | pass4sure cap | pass4sure free | examsoft | examsoft login | exams | exams free | examsolutions | exams4pilots | examsoft download | exams questions | examslocal | exams practice |



    International Edition Textbooks

    Save huge amounts of cash when you buy international edition textbooks from TEXTBOOKw.com. An international edition is a textbook that has been published outside of the US and can be drastically cheaper than the US edition.

    ** International edition textbooks save students an average of 50% over the prices offered at their college bookstores.

    Highlights > Recent Additions
    Showing Page 1 of 5
    Operations & Process Management: Principles & Practice for Strategic ImpactOperations & Process Management: Principles & Practice for Strategic Impact
    By Nigel Slack, Alistair Jones
    Publisher : Pearson (Feb 2018)
    ISBN10 : 129217613X
    ISBN13 : 9781292176130
    Our ISBN10 : 129217613X
    Our ISBN13 : 9781292176130
    Subject : Business & Economics
    Price : $75.00
    Computer Security: Principles and PracticeComputer Security: Principles and Practice
    By William Stallings, Lawrie Brown
    Publisher : Pearson (Aug 2017)
    ISBN10 : 0134794109
    ISBN13 : 9780134794105
    Our ISBN10 : 1292220619
    Our ISBN13 : 9781292220611
    Subject : Computer Science & Technology
    Price : $65.00
    Urban EconomicsUrban Economics
    By Arthur O’Sullivan
    Publisher : McGraw-Hill (Jan 2018)
    ISBN10 : 126046542X
    ISBN13 : 9781260465426
    Our ISBN10 : 1260084493
    Our ISBN13 : 9781260084498
    Subject : Business & Economics
    Price : $39.00
    Urban EconomicsUrban Economics
    By Arthur O’Sullivan
    Publisher : McGraw-Hill (Jan 2018)
    ISBN10 : 0078021782
    ISBN13 : 9780078021787
    Our ISBN10 : 1260084493
    Our ISBN13 : 9781260084498
    Subject : Business & Economics
    Price : $65.00
    Understanding BusinessUnderstanding Business
    By William G Nickels, James McHugh, Susan McHugh
    Publisher : McGraw-Hill (Feb 2018)
    ISBN10 : 126021110X
    ISBN13 : 9781260211108
    Our ISBN10 : 126009233X
    Our ISBN13 : 9781260092332
    Subject : Business & Economics
    Price : $75.00
    Understanding BusinessUnderstanding Business
    By William Nickels, James McHugh, Susan McHugh
    Publisher : McGraw-Hill (May 2018)
    ISBN10 : 1260682137
    ISBN13 : 9781260682137
    Our ISBN10 : 126009233X
    Our ISBN13 : 9781260092332
    Subject : Business & Economics
    Price : $80.00
    Understanding BusinessUnderstanding Business
    By William Nickels, James McHugh, Susan McHugh
    Publisher : McGraw-Hill (Jan 2018)
    ISBN10 : 1260277143
    ISBN13 : 9781260277142
    Our ISBN10 : 126009233X
    Our ISBN13 : 9781260092332
    Subject : Business & Economics
    Price : $77.00
    Understanding BusinessUnderstanding Business
    By William Nickels, James McHugh, Susan McHugh
    Publisher : McGraw-Hill (Jan 2018)
    ISBN10 : 1259929434
    ISBN13 : 9781259929434
    Our ISBN10 : 126009233X
    Our ISBN13 : 9781260092332
    Subject : Business & Economics
    Price : $76.00
    250-253250-253
    By Peter W. Cardon
    Publisher : McGraw-Hill (Jan 2017)
    ISBN10 : 1260128474
    ISBN13 : 9781260128475
    Our ISBN10 : 1259921883
    Our ISBN13 : 9781259921889
    Subject : Business & Economics, Communication & Media
    Price : $39.00
    250-253250-253
    By Peter Cardon
    Publisher : McGraw-Hill (Feb 2017)
    ISBN10 : 1260147150
    ISBN13 : 9781260147155
    Our ISBN10 : 1259921883
    Our ISBN13 : 9781259921889
    Subject : Business & Economics, Communication & Media
    Price : $64.00
    Result Page : 1 2 3 4 5