Archive for November, 2010

h1

Ubuntu 10.10 Maverick Meerkat Desktop Review….

November 27, 2010

It seems like just yesterday that Ubuntu Linux 10.04 was released, but here we are and Ubuntu 10.10 has just been released. Wow! How time flies!

There has been some controversy over this release, with some folks saying that Canonical’s six-month release cycle is too often and that there aren’t enough things in this release to warrant an upgrade.

The Ubuntu 10.10 Live CD desktop.The Ubuntu 10.10 Live CD desktop.

I politely disagree with that assessment, and I’ll show you why in this review. Ubuntu 10.10 is a worthwhile though not overwhelmingly impressive release; it’s worth considering as an upgrade if you are already running an earlier version of Ubuntu. It’s also certainly worth looking at if you are new to Ubuntu and are thinking about using it as your desktop operating system.

What’s New In This Release

Here’s a sample of the new features in this release:

The GNOME base platform has been updated to the current 2.32 versions. This particularly includes the new dconf and gsettings API.

Evolution was updated to the 2.30 version, which operates much faster compared to the version in Ubuntu 10.04 LTS.

The Sound Indicator has been enhanced to include music player controls.

The boot process is cleaner and faster.

New themes, new icons, and new wallpaper bring a dramatically updated look and feel to Ubuntu.

Shotwell has replaced F-Spot as the default photo manager.

Gwibber has been updated to support the recent change in Twitter’s authentication system, as well as changing the back end storage to improve performance.

The Sound Indicator has been enhanced to include music player controls.

The Ubuntu Software Center has an updated look and feel, including the new “Featured” and “What’s New” views for showcasing applications, an improved package description view, and a “For Purchase” software category has been added. You can also now easily access your package installation history too.

Ubuntu One: Polished desktop integration with new sign up and sign in process. Tighter integration with Ubuntu SSO. Nautilus enhancements for managing folder sync preferences. Faster file sync speed. Share links to music within the Ubuntu One Music Store.

The Ubuntu font has been officially released.

I’m happy to see the update to GNOME 2.32. It goes beyond the scope of this review to delve into changes to GNOME in 2.32.

I’m glad that Gwibber has been changed to match Twitter’s new authentication system. If you use Gwibber you shouldn’t have a problem tweeting in this release.

The speed increase to Evolution is certainly a welcome development in this release of Ubuntu. These days I generally prefer webmail to local email, but I know a lot of people who still use Evolution. So it’s good to see a significant performance increase available for Evolution users.

Hardware Requirements & Installation

Hardware Requirements
Here’s a list of what you’ll need to run Ubuntu 10.10:

700 MHz x86 processor
256 MB RAM
3 GB disk space
Graphics card capable of 1024 x 768 resolution
Sound card
Network or Internet connection

Installation
The install routine has been tweaked in this release, and it’s very slick! You’ll notice it right from the beginning. This is really about as easy as it gets in terms of installing Linux.

After you choose your language, you’ll see a new menu that suggests that you have enough disk space, an internet connection and a power source. This menu also gives you the option of downloading updates during the install and also installing third party software. I loved being able to download updates during the install, it has the potential to speed things up considerably. Partitioning the disk is also quite easy in this release, and should help even total Linux newbies glide right through an install.

You can view a slideshow while the install completes. Moving through the slides can be done manually, so you can take your time and view each slide for as long as the install continues. I hope other distros steal this idea from Canonical; it’s a great way of doing it. The slideshows in other distros that just run automatically, with no way to navigate back or forward to a particular slide, might cheat a user out of learning about a neat feature in a distro.

Booting & Login
Here’s what the booting & login screens look like.

The first screen you see lets you decide if you want to do an install or boot into the Live CD desktop. This is a very, very slick way of handling it rather than the typical bootsplash menu. I’d like to see other distros do something similar.

The boot process is supposed to be faster but, frankly, I did not notice much of a difference. I’m somewhat jaded on this though, since I look at so many different distros. Unless a distro’s boot process is really slow, I don’t tend to even notice how long it takes to boot. Your mileage may vary considerably though, depending on your hardware.

Well folks , here I attach the video preview of Ubuntu 10.10 …Hope you guys enjoy it….

h1

Sendmail version 8 ….

November 20, 2010


On the Internet, sendmail is the most popular UNIX based implementation of the Simple Mail Transfer Protocol (SMTP) for transmitting e-mail. When a sendmail server receives e-mail, it attempts to deliver the mail to the intended recipient immediately and, if the recipient is not present, it queues messages for later delivery. However, because it does not provide a mailbox facility and for other reasons, other software such as a POP3 or Internet Message Access Protocol server are also needed. Most Internet service providers (ISPs) provide both an SMTP server (such as sendmail) and a POP or IMAP server.A commercial version of sendmail, called Sendmail, includes a POP3 server and other enhancements to the basic open source sendmail. It also comes in a version that can be installed on a Windows NT operating systems platform.

sendmail (8) is the default Mail Transfer Agent (MTA) in FreeBSD and UNIX. sendmail‘s job is to accept mail from Mail User Agents (MUA) and deliver it to the appropriate mailer as defined by its configuration file. sendmail can also accept network connections and deliver mail to local mailboxes or deliver it to another program.

sendmail uses the following configuration files:

Filename Function
/etc/mail/access sendmail access database file
/etc/mail/aliases Mailbox aliases
/etc/mail/local-host-names Lists of hosts sendmail accepts mail for
/etc/mail/mailer.conf Mailer program configuration
/etc/mail/mailertable Mailer delivery table
/etc/mail/sendmail.cf sendmail master configuration file
/etc/mail/virtusertable Virtual users and domain tables

28.3.1 /etc/mail/access

The access database defines what host(s) or IP addresses have access to the local mail server and what kind of access they have. Hosts can be listed as OK, REJECT, RELAY or simply passed to sendmail‘s error handling routine with a given mailer error. Hosts that are listed as OK, which is the default, are allowed to send mail to this host as long as the mail’s final destination is the local machine. Hosts that are listed as REJECT are rejected for all mail connections. Hosts that have the RELAY option for their hostname are allowed to send mail for any destination through this mail server.

Example 28-1. Configuring the sendmail Access Database

cyberspammer.com                550 We do not accept mail from spammers
FREE.STEALTH.MAILER@            550 We do not accept mail from spammers
another.source.of.spam          REJECT
okay.cyberspammer.com           OK
128.32                          RELAY

In this example we have five entries. Mail senders that match the left hand side of the table are affected by the action on the right side of the table. The first two examples give an error code to sendmail‘s error handling routine. The message is printed to the remote host when a mail matches the left hand side of the table. The next entry rejects mail from a specific host on the Internet, another.source.of.spam. The next entry accepts mail connections from a host okay.cyberspammer.com, which is more exact than the cyberspammer.com line above. More specific matches override less exact matches. The last entry allows relaying of electronic mail from hosts with an IP address that begins with 128.32. These hosts would be able to send mail through this mail server that are destined for other mail servers.

When this file is updated, you need to run make in /etc/mail/ to update the database.

28.3.2 /etc/mail/aliases

The aliases database contains a list of virtual mailboxes that are expanded to other user(s), files, programs or other aliases. Here are a few examples that can be used in /etc/mail/aliases:

Example 28-2. Mail Aliases

root: localuser
ftp-bugs: joe,eric,paul
bit.bucket:  /dev/null
procmail: "|/usr/local/bin/procmail"

The file format is simple; the mailbox name on the left side of the colon is expanded to the target(s) on the right. The first example simply expands the mailbox root to the mailbox localuser, which is then looked up again in the aliases database. If no match is found, then the message is delivered to the local user localuser. The next example shows a mail list. Mail to the mailbox ftp-bugs is expanded to the three local mailboxes joe, eric, and paul. Note that a remote mailbox could be specified as <user@example.com>. The next example shows writing mail to a file, in this case /dev/null. The last example shows sending mail to a program, in this case the mail message is written to the standard input of /usr/local/bin/procmail through a UNIX® pipe.

When this file is updated, you need to run make in /etc/mail/ to update the database.

28.3.3 /etc/mail/local-host-names

This is a list of hostnames sendmail (8) is to accept as the local host name. Place any domains or hosts that sendmail is to be receiving mail for. For example, if this mail server was to accept mail for the domain example.com and the host mail.example.com, its local-host-names might look something like this:

example.com
mail.example.com

When this file is updated, sendmail (8) needs to be restarted to read the changes.

28.3.4 /etc/mail/sendmail.cf

sendmail‘s master configuration file, sendmail.cf controls the overall behavior of sendmail, including everything from rewriting e-mail addresses to printing rejection messages to remote mail servers. Naturally, with such a diverse role, this configuration file is quite complex and its details are a bit out of the scope of this section. Fortunately, this file rarely needs to be changed for standard mail servers.

The master sendmail configuration file can be built from m4(1) macros that define the features and behavior of sendmail. Please see /usr/src/contrib/sendmail/cf/README for some of the details.

When changes to this file are made, sendmail needs to be restarted for the changes to take effect.

28.3.5 /etc/mail/virtusertable

The virtusertable maps mail addresses for virtual domains and mailboxes to real mailboxes. These mailboxes can be local, remote, aliases defined in /etc/mail/aliases or files.

Example 28-3. Example Virtual Domain Mail Map

root@example.com                root
postmaster@example.com          postmaster@noc.example.net
@example.com                    joe

In the above example, we have a mapping for a domain example.com. This file is processed in a first match order down the file. The first item maps <root@example.com> to the local mailbox root. The next entry maps <postmaster@example.com> to the mailbox postmaster on the host noc.example.net. Finally, if nothing from example.com has matched so far, it will match the last mapping, which matches every other mail message addressed to someone at example.com. This will be mapped to the local mailbox joe.

The current version of sendmail is 8.14.4 version. You can download the source and compile it in UNIX by using the make command and alter some of the makefile in the branch tree. The main source of information is the configuration file in sendmail , where it states all the configuration of the sendmail. Here is the sendmail open source website:-

http://www.sendmail.com/

h1

Computer Network Security Profession…Certified Ethical Hacker (CEH)….

November 13, 2010

The International Council of E-Commerce Consultants (EC- Council) administers this certification. It validates the ability of a candidate to perform what is known as ethical hacking.

This certification requires the candidates to take a CEH course at an authorized facility and provide proof of attendance as part of the process. The stated reason for this requirement is that it protects the value of the certification.This class will immerse the student into an interactive environment where they will be shown how to scan , test , hack , and secure their own systems. The lab intensive environment  gives each students in depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks; no real network is harmed. Students learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection , Policy Creation , Social Engineering , DDos Attacks , Buffer Overflow and Virus Creation. When a student leaves this intensive five day class , they will have hands on understanding and experience in Ethical Hacking.

The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

In future , maybe in the next 5 years , I’m considering to wanna take this certification , if my financial is good. I encourage whoever wants to involved in computer security field , to take this course. I have a friend in Unites States , Mubix , says that he take CEH and then become a penetration tester in US…with a good income….The course is only take about 5 days , and here in Malaysia , we can take it at EC Council in Phileo Damansara.The fees i think is about RM5,500.00.

For more info , here is EC-Council Malaysia website:- (CEH):-

http://www.eccouncilacademy.org/ECA/index.php?option=com_content&view=article&id=36&Itemid=105

p/s: some of the info is taken from the article from the book Computer Network Security – As your new profession – KAPLAN.

 

h1

Informix 11.70 Panther…..

November 5, 2010

Highlights of Informix 11.70

Informix 11.70 is:

The Informix 11.70 release (code name “Panther”) asserts its dominance in these key areas and extends support for data warehousing , application development , and security. Informix 11.70 is expected to be generally available in October 2010.

The new release simplifies setup and maintenance for complex replications grids. With Informix 11.70 , it’s easy to define servers in a replication grid  , add or remove servers as necessary , perform DDL operations , and manage tables. The improved Connection Manager streamlines workload management and transparent application failover across the grid . Informix 11.70 also supports backing up to and restoring from cloud storage.

 

Easier to use

  • You can upgrade a high-availability cluster without any down-time and you can easily generate schema information about your database for migration.
  • You can configure the database server during installation. You can automatically optimize storage by compressing and defragmenting. You can also configure automatic storage provisioning to add chunks when you need them.
  • You can quickly and easily set up clusters and Enterprise Replication domains and administer them all through a grid. You can replicate tables without primary keys and prevent log wrapping on replication servers. You can run DDL statement on secondary servers. Transactions that you start on secondary servers run to completion even if the primary server goes down.
  • If you are embedding Informix in your application, you can script responses to automatically address run-time server problems with more granular event alarms and server startup return codes. You can quickly take a snapshot of an Informix instance, compress it, and deploy it to other computers.
  • You can use many of the new features to administer and monitor Informix with the OpenAdmin Tool for Informix.
  • You can use built-in extensions, including the newly built-in Spatial and TimeSeries extensions, with fewer setup tasks.
  • You can fragment your tables based on a list of values or time intervals.

Faster

  • The optimizer can now use a star-join to speed up warehouse queries for star and snowflake schemas.
  • You can maintain table statistics by fragment; statistics are refreshed on frequently updated fragments to calculate table statistics.
  • You can audit at a more granular level to save time and disk space.
  • You can use a forest of trees index to speed up queries if you have many concurrent users.
  • You can integrate with remote Websphere® MQ servers.
  • Light scans are used to bypass the buffer pool for improved mixed-workload performance
  • You can use a multi-index scan to query with more than one index for faster results.
  • You can pre-load the shared libraries of user-defined routines written in C to make them run faster.

More compatible

  • You can perform a backup to the Amazon Simple Storage Service (S3) and restore from it.
  • You can use many popular open source tools with Informix, as listed on the IIUG site at www.iiug.org/opensource.
  • You can use more of the SQL syntax written for other database servers.

More secure

  • You can establish trusted connections between an application server and Informix.
  • You can configure Informix so that users who are authenticated by an external authentication service can connect to Informix.

p/s: You can find more information in:-

http://ibm.com/informix