Home | Link 1 Link 1 | Link 2 | Link 3

Header Image


My Shorthands
- My Experiences: My Services
- My Portfolio: Creative Juice ----------------------------------
My Contrib
- MySQL: Webinars Proxy
- SysAdmin: Tools/Scripts
System Administration
- OpenBSD/Linux
- Shell/Perl/PHP
- MySQL Database
- MySQL Cluster
- MySQL Replication
- MySQL Proxy
- Apache Software Foundation
- Apache HTTPD Web Server
- Tomcat HTTPD Web Server
- Perl v4,5
- PHP v3,4,5
- ActionScript v1,2,3
- JavaScript v1.x
- HTML 2, 3, 4
- Shell (Bash/Korn/C)
- C/C++ v6.0
- Visual Basic v6.0
- Lua
Resources & Related Links
- Internet Engineering Task Force
- RFC Database
- Internet Society
- Internet Archetecture Board
- Internet Assigned Numbers Authority
- Internet Research Task Force
- Institute of Electrical and Electronics Engineers
- Word Wide Web Consortium
- History of the Internet
- Lorem Ipsum
View my profile on LinkedIn


page description/overview...


BACKUP & RESTORATION   |   organize backup and restoration for different system areas
introduction text
Linux System Essentials
Backing up the essential files needed for a proper restoration of your custom Linux installation. This script is based off of the RHEL5 operating system but it is designed to cover all core Linux-based distributions.
Link 2
Link 2 description.
Link 3
Link 3 description.
Link 4
Link 4 description.
Table footer.



INTRUSION DETECTION   |   generic startup scripts and guidelines for securing systems

Security is designed based on the system and network for which it applies to. There are many ways to monitor, alert, track, trace, lock and jail each system or network. I do not intend to cover them all here. But, I do intend to give a clear guideline, road-map and a starting point for whatever system and network you may administrate.

Customization is the first key. Being original prevents an intruder from coming up with work-arounds since to do this requires knowledge of the environment. Original (or custom) environments do not lend this kind of flexibility. When it comes to monitoring, the best policy is to "roll-your-own" tools. Commercial products are great for productivity and support and offer cost-effective solutions. However, they are known systems that intruders have access to as well, and the would-be intruder can find an exploitable configuration testing safely within their own network before touching yours.

Autonomy is the second key. Again, we are faced with cost-effective, ease-of-use; ease-of-administration, versus true security. Integrated systems are just that -- integrated. When designing any integration method (hardware or software), attention should be made to how one will affect the other if there is any type of accident or compromise. With autonomous designs, there are many more keystrokes to perform a task. We have been trying to pull away from manual labor and onto a world of automation and simplification so much that we are willing to sacrifice a simple but under-acknowledged concept for it. Humans are intelligent and applications are not. We can program an application to appear intelligent, but if you look at the source code it is all logical program. There is no emotion applicable to binary logic operation. Emotion is true randomness which is why we are having trouble creating a real random number and why security is not 100%.

Link 1
Link 1 description.
Link 2
Link 2 description.
Link 3
Link 3 description.
Link 4
Link 4 description.
Table footer.


TABLE TITLE   |   table title description
introduction text
Link 1
Link 1 description.
Link 2
Link 2 description.
Link 3
Link 3 description.
Link 4
Link 4 description.
Table footer.


Frequent News Links
- Google News
- Reuters
- Fox News
SCI/TECH Headlines
* This RSS feed URL is deprecated
* Inside Amazon's surveillance-powered no-checkout convenience store - TechCrunch
* Michigan Meteor: Auction Consultant Offers $20000 Reward For First 1-Kg Fragment Found - The Inquisitr
* Let's talk about the big scary asteroid that's NOT going to hit Earth - Washington Post
* Google CEO Sundar Pichai says he does not regret firing James Damore - The Verge
* Brother of CNY native astronaut bumped from NASA mission creates petition to reinstate her - CNYcentral.com
* Joy-Con Grips Are A Lot More Useful With Smartphones In Them - Kotaku
* 'Overwatch' pro player suspended for homophobic slur - Engadget
* Apple CEO Tim Cook: I don't want my nephew on a social network - Business Insider
* I had an Apple store experience from hell — and it's clear there are larger problems with Apple's retail presence - Business Insider
* Samsung's Galaxy S9 Android Flagships Certified In China - Android Headlines
Copyright Clint D. Alexander ©2009-2012 Link 1 | Link 2 | Link 3