NDG Linux Essential - Chapter 3 Notes
NDG Linux Essential - Chapter 3 Notes
● POP/IMAP Server
-Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)
-two communication protocols that let an email client running on your computer talk
to a remote server to pick up the mail
Dovecot
-popular POP/IMAP server
-ease of use and low maintenance
Cyrus IMAP
Some POP/IMAP servers implement their own mail database format for performance and
include the MDA if custom database is desired
Standard file formats→ MDA
File Sharing
Samba- allows Linux machine to look and behave like a Windows machine
-implements the server components, such as making files available for sharing and
certain Windows Server roles
Lightweight Directory Access Protocol (LDAP)-one common directory system that also
powers Microsoft’s Active Directory.
-an object is stored in a tree, and the position of that object on the tree can be used to derive
information about the object and what it stores.
Internet Software Consortium- maintains ISC DHCP server→ most common open source DHCP
server.
Email
Thunderbird-from Mozilla foundation
-full feature desktop email client
-connect to POP/IMAP sever
-displays and sends email
Evolution and KMail- are GNOME and KDE projects’ email clients
Creative
Blender - handles 3D movie creation
GIMP (GNU Image Manipulation Program) - 2D image manipulation
Audacity- open-source audio editing tool
Productivity
Libre Office - fork of the OpenOffice
-offers full office suite
-can work with other file formats
-has features and file formats that are similar to MS office
Web Browsers
Google Chrome and Mozilla Firefox - known browsers that are used in Linux
Console Tools
Familiarity with programming is required for system administrators
Shells
- accepts commands from the user (e.g. file manipulation & starting applications) and pass
those commands to the Linux kernel for those commands to be executed.
Linux - provides a rich language for iterating over files and customizing the environment, all
without leaving the shell
Bourne Again Shell (Bash) & tsch (pronounced as tee-cee-shell) - modern versions
Bash- default shell on your most systems
Tsch - also available
Korn shell (ksh) and Z shell (zsh) - shells that were based from Bash and tcsh’s favorite
features
Text Editors
-used at the console to edit configuration files
Vi (or the more modern Vim) and Emacs - two main apps that are remarkably powerful to edit
text files
- differ in the format of commands and how plugins are written for them
-both complex and have a steep learning curve
Package Management
-are compressed files that bundle up an application and its dependencies (or required files)
-simplifying the installation
-takes care of keeping track of which files belong to which package and even downloading
updates frim repositories, typically a remote server sharing out appropriate updates for a
distribution
Debian and Red Hat - most popular package management systems
Note:
Front-end - programs that interact with people
Back-end - programs that interact with other programs
Yumex and Gnome PackageKit - other GUI-based front-end tools that also make RPM package
management easier.
ZYpp (or libzypp) package - implemented by some RPM-based distributions mostly for
openSUSE and SUSELinux Enterprise
MeeGo, Tizen, and Sailfish - mobile distributions
Note:
Package management commands require root privileges or administrative access
Development Languages
- a way for a programmer to enter instructions in a more human-readable format that is
translated, read , and understood by the computer
Compiled Languages
C-a compiled language where Linux was written
-maps closely the to the generated machine code so that a skilled programmer can write code
that is small and efficient
C++- adds object support to C
Object C-is in heavy use in Apple Products
Java- uses Java Virtual Machine (JVM) and then compiles all the code
JVM-simple and reliable that can run to any computer that has it
Library- bundles coom tasks into a distinct package that can be used by the developer
ImageMagick - a library that lets a programmer manipulate images in code
OpenSSL - cryptographic library that’s used in everything from web servers to the command line
C library - provides a basic set of functions for reading and writing to files and displays and is
used by applications and other languages alike.
Security
Cookies - a primary mechanism that websites use to track you
E.g. to keep track of what is in your shopping cart or to keep you logged in when you return to the site
-a small piece of text that a web sends back to a user as he or she browses the web
-browser stores this information and sends it back with every request to the same site
Browsers typically offer cookie-related settings; users can opt to have the browser tell the site not
to track. This voluntary tag is sent in the request, and some sites will honor it.
Browsers offer a private or incognito mode where cookies and tracking pixels are deleted upon
exiting the window
Password Issues
Good password management is essential to security in any computing environment
-can be managed by multiple users and given different login permission depending on what
groups they are assigned to
Two-factor authentication (2FA) - a technique where a password is supplemented by a second
“factor”, often a passcode sent to the user’s phone or other devices
Protecting Yourself
As one browses, he or she can leave a digital footprint→ some ignores, while others collect for advertising.
There are also some who used it for malicious purpose
A good password is needed, especially on a local device→ a password that is at least 10 characters long,
mixture numbers, letters (both upper and lowercase), and special symbols
Privacy Tools
-used both in server and user level that can help prevent system intrusions and unauthorized
access to data
Linux - by default one of the most secured operating systems ever created→ due to the underlying
architecture
However, there are still many known weaknesses that hackers can take advantage of→deployed privacy
tools
Encryption - best known and most widely-deployed privacy tool in use today
-comes with authentication keys on almost every system that communicates with the outside
world
E.g HyperText Transfer Protocol Secure (HTTPS) standard used on web servers to ensure that
data transmitted between users and online resources cannot be intercepted as it travels on the
open internet
Virtual private networks (VPN) - allows ordinary users to protect their privacy online
-works by creating an encrypted channel of communication between two systems
The Cloud
The migration of an organization's IT applications and processes to cloud services, known as
cloud adoption, is rapidly becoming a strategic business decision for many
a cloud can be described as computing resources from one or many off-site data centers which
can be accessed over the internet. The cloud builds on the benefits of a data center and provides
computing solutions to organizations who need to store and process data, and it allows them to
delegate management of IT infrastructure to a third-party
Cost-effective - cloud computing has the potential to reduce IT costs as it automatically scale IT
resource to meet demand in order to eliminate using underutilized resources
Linux is one of the most cost-effective solutions providers can deploy
- Linux is one of the most power efficient operating systems, and it is completely free, as are
many associated applications, utilities, and additional software components.
-Linux-based solutions are cheaper
Manageability - Linux as a niche OS became known to many IT industry and became necessary
for professionals in the field
-t is becoming increasingly easy for cloud vendors and consumers to acquire the necessary
talent, or reallocate existing team members.
-automation feature
Virtualization - is the process where one physical computer, called the host, runs multiple copies
of an operating system, each copy called a guest.
Hypervisor - software that host runs that switches resource between the various guests just like
Linux does for individual process.
-emulator that runs virtual machines
Bare metal hypervisors - directly on computer hardware rather than on top of an OS freeing up
more resources for guest images
-works because servers spend most of their time idling and don’t need physical resources such
as a monitor and keyboard
VMWare and Openbox - software companies → you can now take a powerful CPU and by using it to run
multiple virtual machines administrators can optimize usage of physical resources and dramatically reduce
costs over the previous one-machine, one-OS data center model
-main limitation is memory