Netzpolitik & Belletristik
Internet für Senioren für Dummies (3. Auflg.)
Sie wollen mit Ihren Enkeln per Videochat in Kontakt bleiben? Oder auch die Möglichkeit des Onlineversands nutzen? Dann zeigt Ihnen dieses Buch wie Sie in den Weiten des Internet navigieren und welche Dienste Sie nutzen können. Von der Suche nach Informationen über Nachrichtenvermittlung bis zu Onlinebanking. Das Internet kann das Leben erleichtern. Wenn man weiß wie es geht. Mit diesem Buch erhalten Sie leicht verständliche Schritt-für-Schritt-Anleitungen zur Nutzung des Internet. Sandra Weber ist Informatikerin und Computerlinguistik-Expertin. Mit zusätzlicher Qualifikation in Erwachsenenpädagogik bietet sie seit 1996 Computer- und Internetkurse für Erwachsene an.Über die Autorin 7EINFÜHRUNG 17Über dieses Buch 17Törichte Annahmen über den Leser 18Konventionen in diesem Buch 18Wie dieses Buch aufgebaut ist 19Symbole, die in diesem Buch verwendet werden 20Wie es weitergeht 20TEIL I: DER (TECHNISCHE) WEG INS NETZ 21KAPITEL 1 INTERNET FÜR ALLE23Und so funktioniert das Internet 24Was Sie im Internet finden und was nicht 25Sicherheit im Internet 27KAPITEL 2 VORAUSSETZUNGEN FÜR DEN INTERNETZUGANG29Geräte – mit diesen Computern kommen Sie ins Internet 30Ein neuer Computer 30Ein alter Computer 31Internet im Urlaub 31Internetanschluss 32Die Leitung herstellen: Router 33Anbieterauswahl und den Internetanschluss einrichten 34Den passenden Anbieter wählen 35Den Anschluss einrichten 35Über ein Netzwerk (WLAN) ins Internet 37Hotspots nutzen 39TEIL II: DIE GROẞE WELT DES INTERNETS 41KAPITEL 3 IM INTERNET SURFEN43Einen Browser bedienen 43Das kann der Browser 44Wie Internetadressen aufgebaut sind 44Internetadressen in den Browser eingeben 46Einen Link erkennen 48Befehle im Browser nutzen 49Suchmaschinen 50Google, Bing, DuckDuckGo, Startpage und Co 50Suchbegriff(e) verwenden 51Allgemeine Suche 54Die Suche mit Filtern eingrenzen 54Die Suche weiter verfeinern 56KAPITEL 4 TIPPS UND ZUSATZPROGRAMME61Tipps für den Browser 61Favoriten oder Lesezeichen setzen 62Die Startseite ändern 64Registerkarten oder Tabs verwenden 66Mit Pop-up-Fenstern umgehen 68Cookies 70Ein Zusatzprogramm für Ihren Browser 72KAPITEL 5 (FACH-)WISSEN IM NETZ SUCHEN75Lexika im Internet 75Wikipedia 76Weitere Nachschlagewerke 79Filme in der IMDb 79Telefonbuch 80Rezepte finden mit Chefkoch.de 81Gesundheit im Internet 83Das Siegel HONcode 83Das Siegel afgis 84Gesundheitsportale nutzen 85NetDoktor.de 85Apotheken-Notdienste finden 86Ärztinnen und Ärzte finden 87KAPITEL 6 IM INTERNET EINKAUFEN89Bestellungen bei Amazon 89Bei Amazon ein Benutzerkonto anlegen 93Verbraucherschutz 97Privatanbieter auf Marketplace 98Einkauf bei Fleurop 98KAPITEL 7 AUKTIONEN IM INTERNET107Das Internetauktionshaus eBay 107Ein Benutzerkonto bei eBay anlegen 108Sicherheit durch Bewertungen 110Sofort-Kauf oder Auktion 110Bei eBay ein Gebot abgeben 112Auktionen bei eBay beobachten 115Eine eigene Auktion bei eBay starten 116Die Bank PayPal 119Alternative Auktionshäuser 120Die Firma Hood 120KAPITEL 8 REISEPLANUNG IM INTERNET123Öffentliche Verkehrsmittel 123Bahnverbindungen finden 124Ein Bahnticket online kaufen 128Mit Bus, Straßenbahn und Fähre unterwegs 136Flüge online buchen 137Mit Hotelbewertungen das beste Hotel finden 142HolidayCheck 142Hotels online buchen 144Vorab den Urlaubsort virtuell besuchen 145Reiserouten mit Google Maps planen 146Google Earth 149Mit Google Street View die Straßen einer Stadt entdecken 152KAPITEL 9 ONLINEBANKING157Benutzername und PIN 157Was ist eine TAN? 160Viele Wege führen zur TAN 160pushTAN auf dem Smartphone, Tablet oder PC empfangen 161Der TAN-Generator chipTAN 162Transaktionen durchführen 164Eine Überweisung tätigen 165Empfängerdaten speichern 168Einen Dauerauftrag einrichten 169Sicherheit beim Onlinebanking 172KAPITEL 10 SICHER INS INTERNET175Gefahren im Internet 176Computerviren 177Computerwürmer 177Viren und Würmer per E-Mail 178Phishing 179Wie Sie sich schützen können 180Persönliche Daten richtig absichern 181Passwörter sicher wählen 181Schutzprogramme 182Kostenloser Virenschutz 183Avira AntiVir 183Firewall 188Aktuelle Sicherheitsinformationen 189Hoax-Info TU Berlin 189BSI für Bürger 191TEIL III: KOMMUNIKATION IM NETZ 193KAPITEL 11 E-MAIL NUTZEN195Was Sie über E-Mail wissen müssen 195Eine E-Mail-Adresse einrichten 196Einen kostenlosen E-Mail-Service nutzen 196Ein kostenloses E-Mail-Postfach bei GMX einrichten 198Abmeldung bei GMX 203E-Mails lesen und schreiben 204Ein E-Mail-Programm einrichten 211Mozilla Thunderbird einrichten und nutzen 212E-Mails mit Mozilla Thunderbird lesen 216E-Mails schreiben 218E-Mails markieren und löschen 220E-Mails weiterleiten oder drucken 221KAPITEL 12 DIE FEINHEITEN DES E-MAIL-VERSANDS223Eine Datei bei GMX per E-Mail verschicken 224Eine Datei mit Mozilla Thunderbird versenden 226Anhänge öffnen 230Anhänge öffnen mit GMX und Mozilla Thunderbird 230Die unterschiedlichen Dateitypen 233Ein E-Mail-Adressbuch einrichten und nutzen 234Filter setzen 239Filter bei GMX 240Filter in Mozilla Thunderbird 242Bestätigungen für den Versand und Empfang von E-Mails 244KAPITEL 13 ÜBER DAS INTERNET TELEFONIEREN247Mit Skype über das Internet telefonieren 248Skype herunterladen und installieren 248Skype einrichten 253Skype benutzen 258Kontakte suchen 259Kontakt bestätigen 261Kontakte speichern 261Skype-Profil mit Bild 262Ein Anruf mit Skype 263Videotelefonat mit Skype 264Textnachrichten per Skype 265Skype beenden 265TEIL IV: MULTIMEDIA 267KAPITEL 14 RADIO IM INTERNET269Verschiedene Arten von Radio 269Reguläre Radiosender 269Internetradiosender 270Radiosender im Internet finden 271Deutschlandfunk und Deutschlandradio Kultur 271Regionale Sender 272Radiosender finden 273Favoriten sammeln 275Software für Radiosender 277Was Sie tun können, wenn kein Ton zu hören ist 281KAPITEL 15 MUSIK UND VIDEO IM NETZ283Musik hören und Filme abspielen 284Groove Musik Player 284Filme & TV 286VLC media player 288Filme abspielen 292YouTube 292Videos auf YouTube hochladen 295Videos mit YouTube finden 299KAPITEL 16 FERNSEHEN IM INTERNET301Fernsehprogramm mit TV-Browser 301Öffentlich-rechtliches Fernsehen 308Aktuelle Nachrichten 308Eine Sammlung von Livestreams mit Zattoo 310Mediatheken 312TEIL V: BESONDERE ANGEBOTE 317KAPITEL 17 DATEIEN AUS DEM INTERNET HERUNTERLADEN319Programme und Dateien herunterladen 319Bilder herunterladen 320Programme sicher herunterladen 322Nutzungsrechte im Internet 325Private Nutzung von fremden Dateien 326KAPITEL 18 NETZWERKE: KONTAKTE FINDEN UND PFLEGEN327Soziale Netzwerke 327Facebook 328Privatsphäre in sozialen Netzwerken 333StayFriends 334Netzwerke speziell für Senioren 337Feierabend.de 337KAPITEL 19 MITTEILUNGEN AN DIE WELT341Im Internet eigene Texte veröffentlichen 341Kurznachrichten mit Twitter veröffentlichen 342Zitieren, Antworten und Favorisieren 345Direkte Nachrichten bei Twitter 346Eine Fehlermeldung bei Twitter 347Bloggen 348Eigene Fotos im Internet veröffentlichen 353flickr 353Bei flickr anmelden 354Mit PicPick Fotos bearbeiten 356KAPITEL 20 FAMILIENGESCHICHTE IM INTERNET ERFORSCHEN359Ahnenforschung leicht gemacht 360Den eigenen Stammbaum erstellen 360Im Internet nach Ahnen suchen 366Kostenpflichtige Plattformen zur Ahnenforschung 368Stichwortverzeichnis 373
Windows 10 All-in-One For Dummies
DIG INTO THE INS AND OUTS OF WINDOWS 10Computer users have been "doing Windows" since the 1980s. That long run doesn't mean everyone knows the best-kept secrets of the globally ubiquitous operating system. Windows 10 All-in-One For Dummies, 4th Edition offers a deep guide for navigating the basics of Windows 10 and diving into more advanced features.Authors and recognized Windows experts Ciprian Rusen and Woody Leonhard deliver a comprehensive and practical resource that provides the knowledge you need to operate Windows 10, along with a few shortcuts to make using a computer feel less like work.This book teaches you all about the most important parts of Windows 10, including:* Installing and starting a fresh Windows 10 installation * Personalizing Windows 10 * Using Universal Apps in Windows 10 * How to control your system through the Control Panel in Windows 10 * Securing Windows 10 against a universe of threats Windows 10 All-in-One For Dummies, 4th Edition is perfect for business users of Windows 10 who need to maximize their productivity and efficiency with the operating system. It also belongs on the bookshelf of anyone who hopes to improve their general Windows 10 literacy, from the complete novice to the power-user.WOODY LEONHARD was one of the first Microsoft Consulting Partners and Microsoft beta testers. His monthly Q&A columns in ZD Smart Business magazine have one million readers, and he has been honored with multiple Computer Press Awards.CIPRIAN RUSEN is co-founder and chief editor of Digital Citizen, a tech-focused blog at digitalcitizen.life. He is also the author of a number of technology books on Windows, Microsoft Office, and other topics.INTRODUCTION 1About This Book 3Foolish Assumptions 4Icons Used in This Book 5Beyond the Book 6Where to Go from Here 6BOOK 1: STARTING WINDOWS 10 7CHAPTER 1: WINDOWS 10 4 N00BS 9Hardware and Software 12Why Do PCs Have to Run Windows? 12A Terminology Survival Kit 17What, Exactly, is the Web? 21Getting inside the Internet 22What is the World Wide Web? 24Who pays for all this stuff? 25Buying a Windows 10 Computer 26Inside the big box 29Inside a touch-sensitive tablet 32Screening 36Managing disks and drives 36Making PC connections 40Futzing with video, sound, and multitudinous media 44Ultrabooks and convertibles 46What’s Wrong with Windows 10? 46CHAPTER 2: WINDOWS 10 FOR THE EXPERIENCED 49If You Just Upgraded from Windows 7 or 8.1 to Windows 10 50A Brief History of Windows 10 52Exploring the Versions of Windows 10 55The Different Kinds of Windows Programs, Er, Apps 56What’s New for the XP Crowd 60Improved performance 60Better video 62A genuinely better browser is emerging 63Cortana 63Other improvements 64What’s New for Windows 7 Users 65Getting the hang of the new Start menu 66Exploring new stuff in the old-fashioned desktop 68What’s New for Windows 8 and 8.1 Users 69What’s New for All of Windows 70The Start menu 70Microsoft Edge 71Search 73Cortana 74Virtual desktops and task view 75Security improvements 76Game mode and Xbox 77Other Windows 10 apps 78What you lose 79Do You Need Windows 10? 80CHAPTER 3: WHICH VERSION? 83Counting the Editions 84Buying the right version the first time 87Narrowing the choices 87Choosing 32 Bit versus 64 Bit 89Which Version of Windows Are You Running? 91BOOK 2: PERSONALIZING WINDOWS 95CHAPTER 1: GETTING AROUND IN WINDOWS 97Windows’ New Beginnings 98A tale of two homes 99Switching to tablet mode and back 102Navigating around the Desktop 103Keying Keyboard Shortcuts 109CHAPTER 2: CHANGING THE LOCK AND LOGIN SCREENS 113Working with the Lock Screen 114Using your own picture 115Adding and removing apps on the lock screen 118Logging On Uniquely 120Using a picture password 120Creating a PIN 124Windows Hello 125Bypassing passwords and login 126CHAPTER 3: WORKING WITH THE ACTION/NOTIFICATION CENTER 127What is the Action Center? 128What, Exactly, is a Notification? 129Working with Notifications 131Working with Settings Shortcuts 133CHAPTER 4: CONTROLLING USERS 137Why You Need Separate User Accounts 138Choosing Account Types 139What’s a standard account? 139What’s an administrator account? 141Choosing between standard and administrator accounts 141What’s Good and Bad about Microsoft Accounts 143Adding Users 145Changing Accounts 148Changing other users’ settings 148Changing your own settings 153Switching Users 154The Changing Environment 154CHAPTER 5: MICROSOFT ACCOUNT: TO SYNC OR NOT TO SYNC? 157What, Exactly, is a Microsoft Account? 158Deciding Whether You Want a Microsoft Account 159Setting Up a Microsoft Account 161Setting up a Hotmail/Outlook.com account 163Making any email address a Microsoft account 164Stop Using Your Microsoft Account 166Taking Care of Your Microsoft Account 167Controlling Sync 168CHAPTER 6: PRIVACY CONTROL 171Why You Should Be Concerned 172Privacy Manifesto 174The past: Watson to WER 175Customer Experience Improvement Program 175Feedback & Diagnostics tab and DiagTrack 176Denial ain’t nuthin’ but a river 178Knowing What Connections Windows Prefers 179Controlling Location Tracking 180Blocking all location tracking 183Blocking location tracking in an app 184Minimizing Privacy Intrusion 185BOOK 3: WORKING ON THE DESKTOP 187CHAPTER 1: RUNNING YOUR DESKTOP FROM START TO FINISH 189Tripping through Windows 10’s Three Personas 190Working with the Traditional Desktop 192Changing the background 193Cleaning up useless icons and programs 195Mousing with Your Mouse 196What’s up, dock? 197Changing the mouse 199Starting with the Start button 201Touching on the Taskbar 204Working with Files and Folders 205Using File Explorer 207Navigating 208Viewing 210Creating files and folders 211Modifying files and folders 212Showing filename extensions 212Sharing folders 215Using the \Public folder 216Recycling 218Creating Shortcuts 219Keying Keyboard Shortcuts 221Sleep: Perchance to Dream 222CHAPTER 2: PERSONALIZING THE START MENU 225Touring the Start Menu 226Modifying the Start Menu 228Changing your picture 229Manipulating the Most Used section 230Controlling the left-side lists 230Circumnavigating the Start apps list 233Resizing the Start Menu 235Changing Tiles on the Start Menu 236Organizing Your Start Menu Tiles 238Add, add, add your tiles 238Forming and naming your groups 239CHAPTER 3: PERSONALIZING THE DESKTOP AND TASKBAR 241Decking out the Desktop 242Resolving Desktop Resolution 247Setting the screen resolution 247Changing the size of text, apps, and other items 249Using magnification 250Putting Icons and Shortcuts on the Desktop 252Creating shortcuts 253Arranging icons on the desktop 255Tricking out the Taskbar 258Anatomy of the taskbar 259Jumping 259Changing the taskbar 261Working with the taskbar 263CHAPTER 4: INTERNET EXPLORER, CHROME, AND FIREFOX 265Which Browser is Best? 267Considering security 268Looking at privacy 269Picking a browser 270Setting a browser as your default 272Using Internet Explorer on the Desktop 274Navigating in IE 275Changing the home page 282Dealing with cookies 283Why you should stop using IE 285Customizing Firefox 286Installing Firefox 286Browsing privately in Firefox 288Bookmarking with the Fox 290Changing the default search engine 292Adding Firefox’s best add-ons 294Optimizing Google Chrome 295Installing Chrome 296Navigating in Chrome 297Searching on the Web 300Finding what you’re looking for 301Using Advanced Search 303Pulling out Google parlor tricks 305Referring to Internet Reference Tools 305Internet speed test 306DNSstuff 306Monitis Traceroute 307Down for everyone or just me? 308The Wayback Machine 308CHAPTER 5: HEY, CORTANA! 309The Cortana Backstory 311Make Cortana Respond to “Hey, Cortana” 312Setting up Cortana 316Using Cortana Settings 317Useful or Fun Commands for Cortana 320CHAPTER 6: MAINTAINING YOUR SYSTEM 323Rolling Back with the Three Rs 324Creating Password Reset Questions 326Establishing password security questions 327Using password recovery questions 329Making Windows Update Work 330Maintaining Drives 331What is formatting? 331Introducing hard-drive-maintenance tools 332Running an error check 332Defragmenting a drive 334Maintaining Solid-State Drives 335Zipping and Compressing 336Compressing with NTFS 338Zipping the easy way with compressed (zipped) folders 340BOOK 4: USING THE BUILT-IN WINDOWS 10 APPS 343CHAPTER 1: USING THE MAIL AND CALENDAR APPS 345Choosing a Mail/Calendar App 347Comparing email programs 348Comparing Calendar apps 352Choosing the right package 353Drilling Down on Windows 10 Mail 354Creating a new message 358Searching for email in the Mail app 361Mail Settings 361Adding a new email account 362Setting extra options 364Avoiding Calendar App Collisions 365Adding Calendar items 367Struggling with Calendar shortcomings 368Beyond Email 369CHAPTER 2: KEEPING TRACK OF PEOPLE 371The Contact List in Windows 10 372Putting Contacts in the People App 373Adding accounts to People 373Editing a contact 377Adding people in People 379Putting a Contact on the Taskbar 380Alternatives to the Win10 People App 382CHAPTER 3: ZOOMING THE PHOTOS APP AND BEYOND 385Discovering What the Windows 10 Photos App Can Do 386Touring Photos 386Editing Photos 389Setting Settings 392Adding Photos 394Importing Pictures from a Camera or an External Drive 394Working with Albums 395Storing and Managing Photos Online 395CHAPTER 4: NOTING ONENOTE 401Getting Started in OneNote with or without a Pen 402Setting Up Notebooks, Sections, Pages 403Embellishing on a OneNote Page 407Sending to OneNote 409Setting Settings 411CHAPTER 5: MAPS, MUSIC, MOVIES — AND TV 413Making Maps 414Basic map functions 414Navigating with the Maps app 417Taking a map offline 418Get Your Groove Music On 420Getting Your Music and Movies into the Apps 422Running around the Groove Music App 425Finding music and playlists 427Running around the Movies & TV App 428BOOK 5: CONNECTING WITH THE WINDOWS 10 APPS 431CHAPTER 1: INTRODUCING EDGE 433A Walk through Microsoft Edge 435Working with the Immersive Reader 439A Sampler of Edge Settings 440Adding Edge Extensions 445CHAPTER 2: USING SKYPE IN WINDOWS 10 449Signing Up with Skype 450Making First Contact 454Adding a Contact 455Settings 458Making Group Calls 459Recording Calls 460A Few Tips from Skype-ologists 461Exploring Skype Alternatives 463CHAPTER 3: NAVIGATING THE MICROSOFT STORE 467Checking out What a Universal Windows App Can Do 469Browsing the Microsoft Store 472Searching the Microsoft Store 475Updating Your Microsoft Store Apps 476CHAPTER 4: GAMES, GAMES, AND GAMES 479Searching the Store for Games 481Enabling Game Mode 483Using the Game Bar 484Testing Your Connection to Xbox Live Services 486Bringing Back the Classics 487BOOK 6: SOCIALIZING AND SHARING FROM WINDOWS 10 491CHAPTER 1: USING ONEDRIVE 493What is OneDrive? 494Setting Up a OneDrive Account 496The Four States of OneDrive Data 498Changing the States of OneDrive Data 505Sharing OneDrive Files and Folders 506CHAPTER 2: GETTING STARTED WITH FACEBOOK 509Choosing a Facebook App 511Signing Up for a Facebook Account 512Choosing basic Facebook privacy settings 516Interpreting the Facebook interface lingo 520Building a Great Timeline 521Using the Facebook Apps for Windows 10 525CHAPTER 3: GETTING STARTED WITH TWITTER 527Understanding Twitter 528Setting Up a Twitter Account 532Tweeting for Beginners 536Beware hacking 536Using the @ sign and Reply 537Retweeting for fun and profit 538Direct Messaging 538Hooking Twitter into Windows 539CHAPTER 4: GETTING STARTED WITH LINKEDIN 541Signing Up for LinkedIn 542Using LinkedIn for Fun and Profit 546BOOK 7: CONTROLLING YOUR SYSTEM 549CHAPTER 1: SETTINGS, SETTINGS, AND MORE SETTINGS 551Introducing the Settings App 553Spelunking through the Control Panel 556Putting Shortcuts to Settings on Your Desktop 558God Mode 562Installing New Languages 563CHAPTER 2: TROUBLESHOOTING AND GETTING HELP 565Troubleshooting the Easy Way 566Troubleshooting the Hard Way 567Tackling installation problems 567Problems with installing updates 571System Stability and Reliability Monitor 580Windows Sandbox 582Tricks to Using Windows Help 583The problem(s) with Windows Help 584Using different kinds of help 584How to Really Get Help 585Snapping and Recording Your Problems 588Taking snaps that snap 588Recording live 590Connecting to Remote Assistance 593Understanding the interaction 593Making the connection 594Limiting an invitation 598Troubleshooting Remote Assistance 599Getting Help Online 600CHAPTER 3: WORKING WITH LIBRARIES 603Understanding Libraries 604Making Your Libraries Visible 604Working with Your Default Libraries 608Customizing Libraries 610Adding a folder to a library 611Changing a library’s default save location 613Creating Your Own Library 614CHAPTER 4: STORING IN STORAGE SPACES 617Understanding the Virtualization of Storage 618Setting Up Storage Spaces 621Working with Storage Spaces 625Storage Space Strategies 626CHAPTER 5: TAKING CONTROL OF UPDATES AND UPGRADES 627The Case Against Windows Automatic Update 628Terminology 101 629The Great Divide: Home versus Pro 631Keeping Your Windows 10 Machine Protected From Updates 632Postponing Windows 10 Updates 636Keep Up on the Problems 637Stopping Windows 10 Updates from Rebooting Your PC 638CHAPTER 6: RUNNING THE BUILT-IN APPLICATIONS 641Setting Alarms & Clock 642Getting Free Word Processing 645Running Notepad 645Writing with WordPad 647Taming the Character Map 650Calculating — Free 651Painting 653CHAPTER 7: WORKING WITH PRINTERS 657Installing a Printer 658Attaching a local printer 659Connecting a network printer 661Using the Print Queue 663Displaying a print queue 663Pausing and resuming a print queue 664Pausing, restarting, and resuming a document 665Canceling a document 666Troubleshooting Printing 667Catching a Runaway Printer 669BOOK 8: MAINTAINING WINDOWS 10 671CHAPTER 1: FILE HISTORY, BACKUP, DATA RESTORE, AND SYNC 673What Happened to the Windows 7 Backup? 674The Future of Reliable Storage is in the Cloud 674Backing Up and Restoring Files with File History 676Setting up File History 676Restoring data from File History 680Changing File History settings 683Storing to and through the Cloud 686Considering cloud storage privacy concerns 687Reaping the benefits of backup and storage in the cloud 688Choosing an online backup and sharing service 689CHAPTER 2: A FRESH START: RESTORE AND RESET 693The Three R’s — and an SF and a GB 694Resetting Your PC 697Resetting Your PC to Factory Settings 701Starting Fresh 703Restoring to an Earlier Point 704Enabling System Protection 706Creating a restore point 706Rolling back to a restore point 708Entering the Windows Recovery Environment 710CHAPTER 3: MONITORING WINDOWS 713Viewing Events 714Using Event Viewer 714Events worthy — and not worthy — of viewing 716Gauging System Reliability 718CHAPTER 4: USING SYSTEM TOOLS 723Tasking Task Manager 724Task Manager Processes 726Task Manager Performance 727Task Manager App History 728Task Manager Startup and Autoruns 728Task Manager Details and Services 731Managing Startup Apps from Settings 732Installing a Second Hard Drive 733Running a Virtual Machine 736BOOK 9: SECURING WINDOWS 10 745CHAPTER 1: SPIES, SPAMS, AND SCAMS ARE OUT TO GET YOU 747Understanding the Hazards — and the Hoaxes 748The primary infection vectors 749Zombies and botnets 751Phishing 754419 scams 758I’m from Microsoft, and I’m here to help 7610day exploits 762Staying Informed 763Relying on reliable sources 764Ditching the hoaxes 764Is My Computer Infected? 766Evaluating telltale signs 767Where did that message come from? 767What to do next 769Shunning scareware 771Getting Protected 773Protecting against malware 773Disabling Java and Flash 774Using your credit card safely online 775Defending your privacy 777Reducing spam 779Dealing with Data Breaches 781CHAPTER 2: FIGHTING VIRI AND SCUM 785Basic Windows Security Do’s and Don’ts 786Making Sense of Malware 790Deciphering Browsers’ Inscrutable Warnings 793Chrome 793Firefox 795CHAPTER 3: RUNNING BUILT-IN SECURITY PROGRAMS 797Working with Windows Security 798Adjusting Windows Security 800Running Windows Security manually 802Controlling Folder Access 804Judging SmartScreen 806Booting Securely with UEFI 810A brief history of BIOS 810How UEFI is different from/better than BIOS 811How Windows 10 uses UEFI 813Controlling User Account Control 813Poking at Windows Defender Firewall 816Understanding Firewall basic features 817Speaking your firewall’s lingo 818Peeking into your firewall 819Making inbound exceptions 820CHAPTER 4: TOP SECURITY HELPERS 825Deciding about BitLocker 826Managing Your Passwords 829Using password managers 829Which is better: Online or in-hand? 830Rockin’ RoboForm 831Liking LastPass 832Keeping Your Other Programs Up to Date 834Blocking Java and Flash in Your Browser 835Fighting Back at Tough Scumware 838Securing Your Communication with PIA 839What’s a VPN? 840Setting up a VPN 841BOOK 10: ENHANCING WINDOWS 10 843CHAPTER 1: WORKING REMOTELY WITH WINDOWS 10 845Enabling Remote Desktop Connections 846Connecting with Remote Desktop Connection 847Connecting a Second Monitor 849Installing a Webcam 851Adding Clocks to the Taskbar 852CHAPTER 2: USING ANDROID, IPHONE, AND KINDLE WITH WINDOWS 10 855What, Exactly, is Android? 856Getting clear on Android 858Making Windows talk to your Android phone or tablet 858Linking an Android Smartphone to a PC 860Linking an iPhone to a PC 863Turning a Smartphone into a Webcam for Your PC 864Running iTunes on Windows — or Maybe Not 865Deciding whether to use iTunes for Windows 866Installing iTunes 868Setting up iTunes 869Moving files from Windows 10 to an iPhone 870Controlling Windows 10 from an iPhone or iPad 872Wrangling E-Book Files 873Introducing popular e-book formats 873Reading e-book files on your PC 874Organizing your e-book files with calibre 875Getting Media from Your PC to Your Kindle 878Emailing books from your PC to your Kindle 878Receiving emailed books from a friend 879Adding music to your Kindle 881CHAPTER 3: GETTING STARTED WITH GMAIL, GOOGLE APPS, AND DRIVE 883Finding Alternatives to Windows with Google 884Setting Up Gmail 888Moving an Existing Account to Gmail 892Using the Google Apps 894Moving Your Domain to Google 898CHAPTER 4: USING WEB-BASED OUTLOOK.COM (NEE HOTMAIL) 903Getting Started with Outlook.com 904Bringing Some Sanity to Outlook.com Organization 909Handling Outlook.com Failures 911Importing Outlook.com Messages into Gmail 913Weighing the Alternatives 915CHAPTER 5: BEST FREE WINDOWS ADD-ONS 917Windows Apps You Absolutely Must Have 918File History 918VLC Media Player 919LastPass 920Recuva 921The Best of the Rest — All Free 922Nextpad (Notepad replacement) 922Ninite 923Revo Uninstaller 924Paint.net 9257-Zip 925qBittorrent 926Dropbox, Google Drive, OneDrive, or 927Other interesting free software 927You may not need to buy Microsoft Office 928Don’t Pay for Software You Don’t Need! 929Windows 10 has all the antivirus software you need 930Windows 10 doesn’t need a disk defragger 930Windows 10 doesn’t need a disk partitioner 930Windows 10 doesn’t need a Registry cleaner 931Windows 10 doesn’t need a backup program 931Don’t turn off services or hack your Registry 932Index 933
UI Design for iOS App Development
Design is a challenge for most developers. Without a background or training in user interface skills, it’s hard to navigate what choices make the best sense for the end user. This book shows you how to migrate from Storyboards to SwiftUI to design dynamic and engaging UIs for iOS apps.SwiftUI is new in iOS 13 but you may want to support past versions as well. To satisfy this, you'll start by reviewing nib/xib files and Storyboards and then move into SwiftUI and explore how to design apps in both UI toolkits. Gaining a firm base in technologies old and new will allow you to future proof your UI during this period of transition.Developers generally want to stay in code, but UI development tends to be a visual effort. This book takes a very structured and code-like approach to UI design to take the fear away. You’ll grasp Storyboards and Auto-Layout/Constraints, while also learning to move past them with the easier options in SwiftUI. A clear understanding of both technologies is key to keeping your most functional coding and also making things look right.With UI Design for iOS App Development, you’ll learn SwiftUI easily and get back into your code quickly.WHAT YOU'LL LEARN* Build iOS app UIs both in current and new paradigms* Work with Storyboards and Auto-Layout/Constraints* Design UIs in a coder friendly wayWHO THIS BOOK IS FORiOS developers building a strong foundation in UI design to fill in the gaps from their training. For veteran developers, it’s vital to be able to match your coding skills with equal UI/UX abilities.BEAR CAHILL has been a developer since he was 12. Like many developers, he initially wanted to be a game developer, but that’s not as accessible as data-driven development roles. Much of the focus of education and job experience is low- level and based in binary data. UI design, while technical, is often neglected. Developers tend to struggle and “get by” at best. He has experience in teaching Auto-Layout/Constraints and other “difficult” UI topics to coders who are used to working in dry code.Chapter 1: Intro to SwiGUI* ContentView UI * SceneDelegate and State Changes * Real-Time UI Design Chapter 2: UI Basics* Text Display * Image * Modifiers for Text * State Variables and Binding * Compared to Storyboards Chapter 3: UI Elements* Stepper for Numeric Input * Picker for Single Item Selection * Segmented Control * Text Input * Animation & Property Animator * Gestures Chapter 4: UI Stacks* Horizontal Layout with HStack * VStack for Vertical Layout * ZStack Layering UI * Stack Modifiers Chapter 5: Displaying Groups of Items* List for Scrolling Tables User Interaction with Lists * Updating and State Chapter 6: Observable Objects and Environment Variables* Combine Framework * SwiGUI Data Flow * ObservableObject Protocol * @Published * @ObservedObject * Environment Variables Chapter 7: Navigation* NavigationView * Tab Bars with Tab View * Alert Sheet * Hos=ng Controller for Storyboards * Segues * Size Classes Chapter 8: UI Organization* View Creation * Including Views View Controllers * UIViewControllerRepresentable Protocol Chapter 9: Dynamic UI* SF Symbols * Systematic Colors * Dark Mode
Samsung Galaxy A21s
Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen TippsMit diesem smarten Praxisbuch gelingt Ihnen der schnelle und sichere Einstieg in Ihr Smartphone. Lernen Sie Ihr Handymodell von Grund auf kennen und beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen. Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt:- Alle Bedienelemente des Smartphones auf einen Blick- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen - Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen - Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten - Updates, Datenschutz und Sicherheit
Linux Command Line and Shell Scripting Bible
ADVANCE YOUR UNDERSTANDING OF THE LINUX COMMAND LINE WITH THIS INVALUABLE RESOURCELinux Command Line and Shell Scripting Bible, 4th Edition is the newest installment in the indispensable series known to Linux developers all over the world. Packed with concrete strategies and practical tips, the latest edition includes brand-new content covering:* Understanding the Shell * Writing Simple Script Utilities * Producing Database, Web & Email Scripts * Creating Fun Little Shell Scripts Written by accomplished Linux professionals Christine Bresnahan and Richard Blum, Linux Command Line and Shell Scripting Bible, 4th Edition teaches readers the fundamentals and advanced topics necessary for a comprehensive understanding of shell scripting in Linux. The book is filled with real-world examples and usable scripts, helping readers navigate the challenging Linux environment with ease and convenience.The book is perfect for anyone who uses Linux at home or in the office and will quickly find a place on every Linux enthusiast’s bookshelf.RICHARD BLUM has over three decades of experience working as a system and network administrator. He is the author of several Linux books and is an accomplished online Linux instructor.CHRISTINE BRESNAHAN is an Adjunct Professor at Ivy Tech Community College where she teaches Linux certification and Python classes. She is the author of several Linux books, including the CompTIA Linux+ Study Guide, Fourth Edition.Acknowledgments xiPART I: THE LINUX COMMAND LINE 1CHAPTER 1: STARTING WITH LINUX SHELLS 3Investigating Linux 3Looking into the Linux kernel 4System memory management 5Software program management 6Hardware management 8Filesystem management 8The GNU utilities 9The core GNU utilities 10The shell 10The Linux desktop environment 11The X Window software 12The KDE Plasma desktop 12The GNOME desktop 13Other desktops 15Examining Linux Distributions 17Core Linux distributions 18Specialized Linux distributions 19Summary 20CHAPTER 2: GETTING TO THE SHELL 21Reaching the Command Line 21Console terminals 22Graphical terminals 22Accessing CLI via a Linux Console Terminal 23Accessing CLI via Graphical Terminal Emulation 26Using the GNOME Terminal Emulator 27Accessing GNOME Terminal 27The menu bar 32Using the Konsole Terminal Emulator 36Accessing Konsole 36The menu bar 38Using the xterm Terminal Emulator 42Accessing xterm 43Command-line parameters 44Summary 45CHAPTER 3: BASIC BASH SHELL COMMANDS 47Starting the Shell 47Using the Shell Prompt 48Interacting with the Bash Manual 49Navigating the Filesystem 53Looking at the Linux filesystem 53Traversing directories 57Using absolute directory references 57Using relative directory references 59Listing Files and Directories 60Displaying a basic listing 61Displaying a long listing 63Filtering listing output 64Handling Files 66Creating files 66Copying files 66Using command-line completion 69Linking files 69Renaming files 71Deleting files 73Managing Directories 74Creating directories 74Deleting directories 75Viewing File Contents 77Viewing the file type 77Viewing the whole file 78Using the cat command 78Using the more command 78Using the less command 80Viewing parts of a file 80Using the tail command 80Using the head command 82Summary 82CHAPTER 4: MORE BASH SHELL COMMANDS 85Monitoring Programs 85Peeking at the processes 85Unix-style parameters 86BSD-style parameters 89The GNU long parameters 91Real-time process monitoring 93Stopping processes 95The kill command 95The pkill command 96Monitoring Disk Space 96Mounting media 97The mount command 97The umount command 99Using the df command 100Using the du command 101Working with Data Files 102Sorting data 102Searching for data 106Compressing data 108Archiving data 109Summary 111CHAPTER 5: UNDERSTANDING THE SHELL 113Investigating Shell Types 113Exploring Parent and Child Shell Relationships 117Looking at process lists 121Creatively using subshells 123Investigating background mode 123Putting process lists into the background 125Looking at co-processing 126Understanding External and Built-In Commands 127Looking at external commands 128Looking at built-in commands 129Using the history command 130Using command aliases 134Summary 135CHAPTER 6: USING LINUX ENVIRONMENT VARIABLES 137Exploring Environment Variables 137Looking at global environment variables 138Looking at local environment variables 140Setting User-Defined Variables 141Setting local user-defined variables 141Setting global environment variables 142Removing Environment Variables 144Uncovering Default Shell Environment Variables 145Setting the PATH Environment Variable 150Locating System Environment Variables 152Understanding the login shell process 152Viewing the /etc/profi le file 152Viewing the $HOME startup files 156Understanding the interactive shell process 157Understanding the noninteractive shell process 158Making environment variables persistent 159Learning about Variable Arrays 159Summary 161CHAPTER 7: UNDERSTANDING LINUX FILE PERMISSIONS 163Exploring Linux Security 163The /etc/passwd file 164The /etc/shadow file 165Adding a new user 166Removing a user 169Modifying a user 169usermod 170passwd and chpasswd 170chsh, chfn, and chage 171Using Linux Groups 173The /etc/group file 173Creating new groups 174Modifying groups 175Decoding File Permissions 176Using file permission symbols 176Default file permissions 178Changing Security Settings 179Changing permissions 180Changing ownership 181Sharing Files 182Access Control Lists 184Summary 186CHAPTER 8: MANAGING FILESYSTEMS 189Exploring Linux Filesystems 189Exploring the Linux filesystem evolution 190Looking at the ext filesystem 190Looking at the ext2 filesystem 190Digging into journaling filesystems 191Looking at the ext3 filesystem 191Looking at the ext4 filesystem 191Looking at the JFS filesystem 192Looking at ReiserFS 192Looking at XFS 192Understanding the volume-managing filesystems 192Looking at the ZFS filesystem 193Looking at the Btrfs filesystem 193Looking at the Stratis filesystem 193Working with Filesystems 194Creating partitions 194Looking at the fdisk utility 194Working with gdisk 197The GNU parted command 198Creating a filesystem 199Checking and repairing a filesystem 201Managing Logical Volumes 202Exploring LVM layout 203Physical volume 203Volume group 203Logical volume 203Understanding the LVM in Linux 203Create the PVs 204Create a VG 204Create an LV 205Using the Linux LVM 206Format and mount an LV 206Growing or shrinking your VGs and LVs 206Summary 207CHAPTER 9: INSTALLING SOFTWARE 209Exploring Package Management 209Inspecting the Debian-Based Systems 210Managing packages with apt 211Installing software packages with apt 213Upgrading software with apt 215Uninstalling software with apt 216The apt repositories 218The Red Hat–Based Systems 220Listing installed packages 220Installing software with dnf 221Upgrading software with dnf 223Uninstalling software with dnf 223Dealing with broken dependencies 223RPM repositories 224Managing Software Using Containers 225Using snap containers 225Using flatpak containers 227Installing from Source Code 229Summary 232CHAPTER 10: WORKING WITH EDITORS 235Visiting the vim Editor 235Checking your vim package 236Exploring vim basics 237Editing data 240Copying and pasting 240Searching and substituting 241Navigating the nano Editor 242Exploring the Emacs Editor 244Checking your Emacs package 245Using Emacs on the console 246Exploring the basics of Emacs 247Editing data 248Copying and pasting 249Searching and replacing 249Using buffers in Emacs 250Using windows in console mode Emacs 251Using Emacs in a GUI 252Exploring the KDE Family of Editors 253Looking at the KWrite editor 253Looking at the Kate editor 259Exploring the GNOME Editor 263Starting gedit 264Understanding basic gedit features 265Managing plugins 268Summary 271PART II: SHELL SCRIPTING BASICS 273CHAPTER 11: BASIC SCRIPT BUILDING 275Using Multiple Commands 275Creating a Script File 276Displaying Messages 278Using Variables 279Environment variables 280User variables 281Command substitution 283Redirecting Input and Output 284Output redirection 285Input redirection 285Employing Pipes 287Performing Math 289The expr command 290Using brackets 292A floating-point solution 293The basics of bc 293Using bc in scripts 295Exiting the Script 297Checking the exit status 297The exit command 298Working through a Practical Example 300Summary 301CHAPTER 12: USING STRUCTURED COMMANDS 303Working with the if-then Statement 303Exploring the if-then-else Statement 306Nesting ifs 307Trying the test Command 311Using numeric comparisons 313Using string comparisons 314Looking at string equality 315Looking at string order 316Looking at string size 318Using file comparisons 320Checking directories 320Checking whether an object exists 321Checking for a file 322Checking for read access 324Checking for empty files 325Checking whether you can write to a file 326Checking whether you can run a file 327Checking ownership 328Checking default group membership 329Checking file date 330Considering Compound Testing 331Working with Advanced if-then Features 332Using single parentheses 332Using double parentheses 333Using double brackets 335Considering the case Command 335Working through a Practical Example 337Summary 343CHAPTER 13: MORE STRUCTURED COMMANDS 345Looking at the for Command 345Reading values in a list 346Reading complex values in a list 347Reading a list from a variable 349Reading values from a command 350Changing the field separator 351Reading a directory using wildcards 352Trying the C-Style for Command 354The C language for command 355Using multiple variables 356Exploring the while Command 357Basic while format 357Using multiple test commands 358Using the until Command 359Nesting Loops 361Looping on File Data 364Controlling the Loop 365The break command 365Breaking out of a single loop 365Breaking out of an inner loop 366Breaking out of an outer loop 367The continue command 368Processing the Output of a Loop 371Working through a Few Practical Examples 372Finding executable files 373Creating multiple user accounts 374Summary 375CHAPTER 14: HANDLING USER INPUT 377Passing Parameters 377Reading parameters 377Reading the script name 380Testing parameters 381Using Special Parameter Variables 382Counting parameters 382Grabbing all the data 384Being Shifty 386Working with Options 388Finding your options 388Processing simple options 388Separating options from parameters 389Processing options with values 391Using the getopt command 392Looking at the command format 392Using getopt in your scripts 393Advancing to getopts 395Standardizing Options 398Getting User Input 399Reading basics 399Timing Out 401Reading with no display 402Reading from a file 403Working through a Practical Example 404Summary 408CHAPTER 15: PRESENTING DATA 411Understanding Input and Output 411Standard file descriptors 412STDIN 412STDOUT 413STDERR 414Redirecting errors 414Redirecting errors only 414Redirecting errors and data 415Redirecting Output in Scripts 416Temporary redirections 416Permanent redirections 417Redirecting Input in Scripts 418Creating Your Own Redirection 419Creating output file descriptors 419Redirecting file descriptors 420Creating input file descriptors 421Creating a read/write file descriptor 422Closing file descriptors 423Listing Open File Descriptors 424Suppressing Command Output 426Using Temporary Files 427Creating a local temporary file 427Creating a temporary file in /tmp 428Creating a temporary directory 429Logging Messages 430Working through a Practical Example 431Summary 433CHAPTER 16: SCRIPT CONTROL 435Handling Signals 435Signaling the Bash shell 435Generating signals 436Interrupting a process 436Pausing a process 437Trapping signals 438Trapping a script exit 440Modifying or removing a trap 441Running Scripts in Background Mode 443Running in the background 443Running multiple background jobs 445Running Scripts without a Hang-up 447Controlling the Job 448Viewing jobs 448Restarting stopped jobs 450Being Nice 451Using the nice command 452Using the renice command 453Running like Clockwork 454Scheduling a job using the at command 454Understanding the at command format 454Retrieving job output 455Listing pending jobs 457Removing jobs 457Scheduling regular scripts 458Looking at the cron table 458Building the cron table 459Viewing cron directories 460Looking at the anacron program 460Starting scripts with a new shell 462Working through a Practical Example 463Summary 469PART III: ADVANCED SHELL SCRIPTING 471CHAPTER 17: CREATING FUNCTIONS 473Exploring Basic Script Functions 473Creating a function 474Using functions 474Returning a Value from a Function 477The default exit status 477Using the return command 478Using function output 479Using Variables in Functions 480Passing parameters to a function 480Handling variables in a function 482Global variables 483Local variables 484Investigating Array Variables and Functions 485Passing arrays to functions 485Returning arrays from functions 487Considering Function Recursion 488Creating a Library 489Using Functions on the Command Line 491Creating functions on the command line 491Defining functions in the bashrc file 492Directly defining functions 492Sourcing function files 493Working Through a Practical Example 494Downloading and installing 494Building the library 495The shtool library functions 496Using the library 497Summary 497CHAPTER 18: WRITING SCRIPTS FOR GRAPHICAL DESKTOPS 499Creating Text Menus 499Create the menu layout 499Create the menu functions 501Add the menu logic 502Putting it all together 502Using the select command 504Doing Windows 505The dialog package 506The msgbox widget 507The yesno widget 508The inputbox widget 508The textbox widget 510The menu widget 511The fselect widget 512The dialog options 513Using the dialog command in a script 515Getting Graphic 516The KDE environment 517kdialog widgets 517Using kdialog 519The GNOME environment 521zenity Widgets 521Using zenity in scripts 523Working Through a Practical Example 525Summary 529CHAPTER 19: INTRODUCING SED AND GAWK 531Manipulating Text 531Getting to know the sed editor 532Defining an editor command in the command line 533Using multiple editor commands in the command line 534Reading editor commands from a file 534Getting to know the gawk program 535Visiting the gawk command format 536Reading the program script from the command line 536Using data field variables 537Using multiple commands in the program script 538Reading the program from a file 539Running scripts before processing data 539Running scripts after processing data 540Looking at the sed Editor Basic Commands 542Introducing more substitution options 542Substituting flags 542Replacing characters 543Using addresses 544Addressing the numeric line 544Using text pattern filters 545Grouping commands 546Deleting lines 547Inserting and appending text 549Changing lines 551Transforming characters 552Printing revisited 553Printing lines 554Printing line numbers 555Listing lines 555Using files with sed 556Writing to a file 556Reading data from a file 557Working Through a Practical Example 559Summary 564CHAPTER 20: REGULAR EXPRESSIONS 565Exploring Regular Expressions 565A definition 565Types of regular expressions 567Defining BRE Patterns 567Plain text 567Special characters 569Anchor characters 570Starting at the beginning 570Looking for the ending 571Combining anchors 572The dot character 572Character classes 573Negating character classes 575Using ranges 576Special character classes 577The asterisk 578Trying Out Extended Regular Expressions 579The question mark 579The plus sign 580Using braces 581The pipe symbol 582Grouping expressions 583Working Through Some Practical Examples 584Counting directory files 584Validating a phone number 585Parsing an email address 587Summary 589CHAPTER 21: ADVANCED SED 591Looking at Multiline Commands 591Navigating the next command 592Using the single-line next command 592Combining lines of text 593Navigating the multiline delete command 595Navigating the multiline print command 596Holding Space 598Negating a Command 599Changing the Flow 602Branching 603Testing 605Replacing via a Pattern 606Using the ampersand 606Replacing individual words 607Placing sed Commands in Scripts 608Using wrappers 608Redirecting sed output 609Creating sed Utilities 610Spacing with double lines 610Spacing files that may have blanks 611Numbering lines in a file 612Printing last lines 613Deleting lines 614Deleting consecutive blank lines 615Deleting leading blank lines 616Deleting trailing blank lines 616Removing HTML tags 617Working Through a Practical Example 619Summary 624CHAPTER 22: ADVANCED GAWK K 627Using Variables 627Built-in variables 628The field and record separator variables 628Data variables 631User-defined variables 634Assigning variables in scripts 634Assigning variables on the command line 635Working with Arrays 636Defining array variables 636Iterating through array variables 637Deleting array variables 638Considering Patterns 638Regular expressions 639The matching operator 639Mathematical expressions 640Structured Commands 641The if statement 641The while statement 643The do-while statement 644The for statement 645Printing with Formats 645Using Built-in Functions 648Mathematical functions 649String functions 650Time functions 652Trying Out User-Defined Functions 653Defining a function 653Using your functions 654Creating a function library 654Working Through a Practical Example 655Summary 657CHAPTER 23: WORKING WITH ALTERNATIVE SHELLS 659Considering the Dash Shell 659Looking at the Dash Shell Features 661The Dash command-line parameters 661The Dash environment variables 662Default environment variables 662Positional parameters 663User-defined environment variables 663The Dash built-in commands 664Scripting in Dash 665Creating Dash scripts 665Things that won’t work 665Using arithmetic 666The test command 666The function command 667Exploring the zsh Shell 668Viewing Parts of the zsh shell 668Shell options 669Built-in commands 670Core built-in commands 670Add-in modules 673Viewing, adding, and removing modules 673Scripting with zsh 674Mathematical operations 674Performing calculations 674Mathematical functions 675Structured commands 676Functions 677Working Through a Practical Example 677Summary 678PART IV: CREATING AND MANAGING PRACTICAL SCRIPTS 679CHAPTER 24: WRITING SIMPLE SCRIPT UTILITIES 681Performing Backups 681Backing up files daily 682Obtaining the required functions 682Creating a daily archive location 685Creating a daily backup script 686Running the daily archive script 688Creating an hourly archive script 689Running the hourly archive script 692Managing Account Deletion 693Obtaining the required functions 693Getting the correct account name 693Creating a function to get the correct account name 695Verifying the entered account name 696Determining whether the account exists 698Removing any account processes 699Finding account files 702Removing the account 702Creating the script 703Running the script 708Monitoring Your System 710Obtaining the default shell audit functions 710Obtaining the permission audit functions 714Creating the script 716Running the script 719Summary 721CHAPTER 25: GETTING ORGANIZED 723Understanding Version Control 723Working directory 724Staging area 725Looking at the local repository 725Exploring a remote repository 726Branching 726Cloning 726Using Git for VCS 727Setting Up Your Git Environment 727Committing with Git 732Summary 739Appendix A: Quick Guide to Bash Commands 741Appendix B: Quick Guide to sed and gawk 755Index 767
PowerShell 7 for IT Professionals
TAKE ADVANTAGE OF EVERYTHING MICROSOFT’S NEW POWERSHELL 7 HAS TO OFFERPowerShell 7 for IT Pros is your guide to using PowerShell 7, the open source, cross-platform version of Windows PowerShell. Windows IT professionals can begin setting up automation in PowerShell 7, which features many improvements over the early version of PowerShell Core and Windows PowerShell. PowerShell 7 users can enjoy the high level of compatibility with the Windows PowerShell modules they rely on today. This book shows IT professionals—especially Windows administrators and developers—how to use PowerShell7 to engage in their most important tasks, such as managing networking, using AD/DNS/DHCP, leveraging Azure, and more.To make it easy to learn everything PowerShell 7 has to offer, this book includes robust examples, each containing sample code so readers can follow along. Scripts are based on PowerShell 7 running on Windows 10 19H1 or later and Windows Server 2019.• Learn to navigate the PowerShell 7 administrative environment• Use PowerShell 7 to automate networking, Active Directory, Windows storage, shared data, and more• Run Windows Update, IIS, Hyper-V, and WMI and CIM cmdlets within PowerShell 7• Understand how to handle reporting in the new PowerShell 7 environmentPowerShell 7 for IT Pros provides exclusive coverage of using PowerShell with both cloud-based systems and virtualized environments (Hyper V and Azure). Written by PowerShell veteran Thomas Lee, this is the only book you’ll need to get started with PowerShell 7.THOMAS LEE is an IT consultant/trainer/writer who holds numerous Microsoft certifications. He has been awarded Microsoft's MVP award 17 times. He has written numerous books on TCP/IP and PowerShell. Thomas currently helps clients to deliver training and build training courses. He continues to give back to the community as Group Administrator for the PowerShell forum on Spiceworks, where he is also a Site Moderator. Foreword xiiiIntroduction xxxiiiCHAPTER 1 SETTING UP A POWERSHELL 7 ENVIRONMENT 1What is New in PowerShell 7 2Systems Used in This Book and Chapter 3Installing PowerShell 7 5Installing and Configuring VS Code 14Using the PowerShell Gallery 21Creating a Local PowerShellGet Repository 24Creating a Code-Signing Environment 30Summary 35CHAPTER 2 POWERSHELL 7 COMPATIBILITY WITH WINDOWS POWERSHELL 37Examining PowerShell Modules 38Introducing the Compatibility Solution 48Things That Do Not Work with PowerShell 7 51Summary 54CHAPTER 3 MANAGING ACTIVE DIRECTORY 55Systems Used in This Chapter 58Establishing a Forest Root Domain 60Installing a Replica DC 66Installing a Child Domain 70Configuring a Cross-Forest Trust 75Managing AD Users, Computers, and OUs 86Adding Users to AD via a CSV 96Configuring Just Enough Administration (JEA) 100Summary 109CHAPTER 4 MANAGING NETWORKING 111Systems Used in This Chapter 112Configuring IP Addressing 113Testing Network Connectivity 117Installing the DHCP Service 121Configuring DHCP Scopes 124Configuring DHCP Failover 128Configuring the DNS Service 133Configuring DNS Zones and Resource Records 138Summary 144CHAPTER 5 MANAGING STORAGE 145Systems Used in This Chapter 146Managing Disks and Volumes 147Managing NTFS Permissions 154Managing Storage Replica 163Managing Filestore Quotas 175Managing File Screening 183Summary 190CHAPTER 6 MANAGING SHARED DATA 191Systems Used in This Chapter 193Setting Up and Securing an SMB File Server 194Creating and Securing SMB Shares 198Creating and Using an iSCSI Target 207Setting Up a Clustered Scale-Out File Server 218Summary 229CHAPTER 7 MANAGING PRINTING 231Systems Used in This Chapter 232Installing and Sharing Printers 233Publishing a Printer in AD 238Changing the Spool Folder 240Printing a Test Page 245Creating a Printer Pool 248Summary 249CHAPTER 8 MANAGING HYPER-V 251Systems Used in This Chapter 253Installing and Configuring Hyper-V 254Creating a Hyper-V VM 257Using PowerShell Direct 262Configuring VM Networking 265Configuring VM Hardware 271Implementing Nested Virtualization 277Using VM Checkpoints 282Using VM Replication 291Managing VM Movement 305Measuring VM Resource Usage 311Summary 314CHAPTER 9 USING WMI WITH CIM CMDLETS 315Exploring WMI Namespaces 320Exploring WMI Classes 328Getting Local and Remote Objects 330Invoking WMI Methods 334Managing WMI Events 339Implementing Permanent WMI Event Handling 347Summary 355CHAPTER 10 REPORTING 357Systems Used in This Chapter 358Reporting on AD Users and Computers 359Managing Filesystem Reporting 365Collecting Performance Information Using PLA 374Reporting on PLA Performance Data 379Creating a Performance Monitoring Graph 382Creating a System Diagnostics Report 385Reporting on Printer Usage 387Creating a Hyper-V Status Report 390Reviewing Event Logs 395Summary 402Index 403
Wie KI unser Leben verändert
100 Fragen - 100 AntwortenSiri, Alexa oder Hey Google kennen die meisten von uns. Vom autonomen Fahren oder dass Sie Vögel mit Apps erkennen können – davon haben Sie sicher schon gehört. Aber inzwischen wird Künstliche Intelligenz in noch viel mehr Bereichen eingesetzt. Welche das sind, erfahren Sie in diesem Buch.Künstliche Intelligenz ist älter, als Sie vermuten! KI hat Vorteile, birgt aber auch Risiken – und sie ist nicht mehr wegzudenken. Deshalb sollte jeder von uns wissen, was KI für seinen Alltag, den Beruf und unser aller Zukunft bedeuten kann.Peter Seeberg hat aus unterschiedlichen Lebensbereichen die wichtigsten 100 Fragen zu KI gesammelt und beantwortet. Machen Sie sich schlau.Leseprobe (PDF-Link)
Eine kurze Geschichte vom Quantencomputer (2. Auflg.) - TELEPOLIS
Quantencomputer anschaulich erklärtDie Welt der Quanten ist total verrückt. Teilchen befinden sich gleichzeitig hier und dort. Sie verständigen sich über tausend Kilometer wie durch Telepathie. Forscher haben diese Phänomene inzwischen so gut im Griff, dass sie einen riesigen technologischen Schritt wagen: Den Bau des ersten Quantencomputers – eine ganz neue, überlegene Art von Rechner.Das Buch erklärt verständlich und unterhaltsam die magisch anmutenden Phänomene der Quantenphysik und wie sie für unbegreiflich schnell rechnende Computer genutzt werden können. Es zeigt, wie der Quantencomputer und andere Technologien, die auf der Quantenphysik basieren, den Alltag ähnlich umwälzen könnten wie einst die Dampfmaschine oder die Entdeckung der Elektronik. Werden Quantencomputer die gängigen Verschlüsselungsverfahren aushebeln? Werden sie eine blitzschnelle Entwicklung neuer Arzneien ermöglichen? Wird es einmal ein Quanteninternet geben und wenn ja, was bringt es? Werden es hyperempfindliche Quantensensoren erlauben, die Gedanken eines Menschen zu lesen? Neben Beispielen schon existierender Quantentechnologie (etwa Flash-Speicher oder Verschlüsselungsverfahren) gibt der Wissenschaftsjournalist Christian J. Meier einen Überblick über die wichtigsten Laborentwicklungen und zeigt auf, wohin sie führen könnten. Schließlich erfahren Sie, warum manche Physiker glauben, das Universum sei ein einziger Quantencomputer.Christian J. Meier (geb. 1968), promovierter Physiker und freier Journalist, beschäftigt sich seit mehreren Jahren mit den Themen Quantencomputer und Quantentechnologie und berichtet darüber für verschiedene Medien, unter anderem für die Neue Zürcher Zeitung, bild der wissenschaft, Berliner Zeitung, Frankfurter Rundschau, Spektrum.de und VDI nachrichten. Inhalt (PDF-Link)Leseprobe (PDF-Link)
WordPress For Dummies
GET TO KNOW WORDPRESS WITH THIS SIMPLE AND APPROACHABLE REFERENCEWordPress For Dummies, 9th Edition helps readers discover the power of the WordPress web content building tool. Web builders have created 75 million websites using WordPress and this book will show you how to add your blogs and websites to that count.WordPress For Dummies, 9th Edition drops you right into the fast lane to publishing your first website or blog by teaching you to:· Customize a theme· Create your first post· Use WordPress as a content management system· Work with multimedia formats· Add plugins to your site· Establish a publishing routinePerfect for new bloggers, experienced bloggers converting to WordPress for the first time, and people accustomed to WordPress who want to learn more about the full potential of the technology, WordPress for Dummies, 9thEdition is an indispensable addition to the library of every blogger and webmaster.LISA SABIN-WILSON is cofounder of WebDevStudios, one of the largest WordPress design and development agencies in the world. She is a regular public speaker at national events on topics such as WordPress, development, design, CSS, and social media. Foreword xiiiINTRODUCTION 1About This Book 2Foolish Assumptions 2Icons Used in This Book 3Beyond the Book 4Where to Go from Here 4PART 1: INTRODUCING WORDPRESS 5CHAPTER 1: WHAT WORDPRESS CAN DO FOR YOU 7Discovering the Benefits of WordPress 8Getting set up the fast and easy way 9Extending WordPress’s capabilities 9Taking part in the community 11Choosing a WordPress Platform 12Choosing the hosted version from WordPress.com 13Self-hosting with WordPress.org 14CHAPTER 2: WORDPRESS BASICS 17Shining the Spotlight on WordPress 17Dipping Into WordPress Technologies 19Archiving your publishing history 19Interacting with your readers through comments 21Feeding your readers 22Tracking back 23Dealing with comment and trackback spam 24Using WordPress as a Content Management System 25Exploring the differences between a website and a blog 25Viewing examples of blogs and websites 26Moving On to the Business of Publishing 27PART 2: SETTING UP WORDPRESS 29CHAPTER 3: SETTING UP YOUR WORDPRESS BASE CAMP 31Establishing Your Domain 32Understanding domain name extensions 32Considering the cost of a domain name 33Registering your domain name 33Finding a Home for Your Website 34Getting help with hosting WordPress 35Dealing with disk space and bandwidth 36Understanding Secure File Transfer Concepts 38Setting up SFTP on your hosting account 39Connecting to the web server via SFTP 42Transferring files from point A to point B 46Editing files via SFTP 47Changing file permissions 48Installing WordPress 50Exploring Preinstalled WordPress 51Installing WordPress manually 53Setting up the MySQL database 53Uploading the WordPress files 55Last step: Running the installation script 57CHAPTER 4: UNDERSTANDING THE WORDPRESS.ORG DASHBOARD 65Logging In to the Dashboard 66Navigating the Dashboard 67Welcome to WordPress! 69Site Health 70At a Glance 71Activity 72Quick Draft 73WordPress Events and News 73Arranging the Dashboard to Your Tastes 74Finding Inline Documentation and Help 76Setting Options in the Dashboard 78Configuring the Settings 79General 79Writing 83Reading 85Discussion 86Media 93Permalinks 94Privacy 95Creating Your Personal Profile 97Setting Your Site’s Format 100Posts 100Media 101Pages 101Comments 102Appearance 102Plugins 104Users 104Tools 105CHAPTER 5: ESTABLISHING YOUR PUBLISHING ROUTINE 107Staying on Topic with Categories 107Changing the name of a category 108Creating new categories and deleting others 111Examining a Post’s Address: Permalinks 113Making your post links pretty 114Customizing your permalinks 115Making sure that your permalinks work with your server 117Discovering the Many WordPress RSS Options 119Writing Your First Entry 120Using the Block Editor 122Discovering available blocks 123Inserting new blocks 131Configuring block settings 134Refining Your Post Options 149Publishing Your Post 153Being Your Own Editor 154Look Who’s Talking on Your Site 155Managing comments and trackbacks 155Moderating comments and trackbacks 157Tackling spam with Akismet 158PART 3: FLEXING AND EXTENDING WORDPRESS 159CHAPTER 6: MEDIA MANAGEMENT: IMAGES, AUDIO, AND VIDEO 161Inserting Images into Your Content 162Uploading an image from your computer 163Inserting an image from the Media Library 165Using the Columns Block to Insert Multiple Images in a Row 166Inserting a Cover Image into a Post 169Inserting a Photo Gallery 174Inserting Video Files into Your Posts 179Adding a link to a video from the web 180Adding video from your computer 181Adding video using the Embed block 185Inserting Audio Files into Your Blog Posts 189Inserting Audio Using the Embed Block 191Podcasting with WordPress 192CHAPTER 7: MAKING THE MOST OF WORDPRESS PLUGINS 195Finding Out What Plugins Are 196Extending WordPress with plugins 197Distinguishing between plugins and themes 197Exploring the Plugins Page 199Identifying Core Plugins 202Incorporating Akismet 202Saying Hello Dolly 206Discovering the one-click plugin update 207Using Plugins: Just the Basics 210Installing Plugins Manually 211Finding and downloading the files 212Reading the instructions 214Uploading and Activating Plugins 215Uploading a new plugin 215Activating a plugin 216Setting Plugin Options 217Uninstalling Plugins 218Understanding the Open-Source Environment 219Finding Plugins Beyond WordPress.org 220Comparing Free and Commercial Plugins 222CHAPTER 8: FINDING AND INSTALLING WORDPRESS THEMES 225Getting Started with Free Themes 226Finding free themes 227Avoiding unsafe themes 227Previewing themes on the Themes page 230Installing a Theme 231Browsing the free themes 233Previewing and activating a theme 235Exploring Premium Theme Options 237Examining the Default Theme: Twenty Twenty 241Exploring the layout and structure 242Customizing the site identity 244Customizing colors 247Including custom navigation menus 248Enhancing Your Theme with Widgets 249Adding widgets to your website 250Using the Text widget 252Using the RSS widget 253PART 4: CUSTOMIZING WORDPRESS 257CHAPTER 9: UNDERSTANDING THEMES AND TEMPLATES 259Using WordPress Themes: The Basics 260Understanding theme structure 261Connecting templates 263Contemplating the Structure of a WordPress Website 263Examining the Anatomy of a Template Tag 265Getting Familiar with the Four Main Templates 266The Header template 266The Main Index template 271The Sidebar template 275The Footer template 276Other templates 276Putting a Theme Together 277Connecting the templates 277Using additional stylesheets 287Customizing Your Posts with Template Tags 287Using Tags with Parameters for Sidebars 287The calendar 289List pages 289Post archives 292Categories 293Getting widgetized 295CHAPTER 10: TWEAKING WORDPRESS THEMES 297Styling with CSS: The Basics 298CSS selectors 299Classes and IDs 299CSS properties and values 301Changing the Background Graphics with CSS 301Uploading an image for background use 304Positioning, repeating, and attaching images 304Using Your Own Header Image 306Customizing Colors in Twenty Twenty 308Creating Custom Navigation Menus 309Building custom navigation menus 309Displaying custom menus with widgets 314Changing Font Family, Color, and Size 315Changing font color 316Changing font size 317Adding borders 318Understanding Basic HTML Techniques 318Inserting images 320Inserting hyperlinks 320Inserting lists 321CHAPTER 11: UNDERSTANDING PARENT AND CHILD THEMES 325Customizing Theme Style with Child Themes 326Loading a parent theme’s style 328Customizing the parent theme’s styling 330Using images in child theme designs 330Modifying Theme Structure with Child Themes 334Overriding parent template files 335Adding new template files 336Removing template files 337Modifying the functions.php file 337Preparing a Parent Theme 339CHAPTER 12: WORDPRESS AS A CONTENT MANAGEMENT SYSTEM 341Creating Different Page Views Using WordPress Templates 342Uploading the template 343Assigning the template to a static page 345Creating a Template for Each Post Category 346Using Sidebar Templates 349Creating Custom Styles for Sticky, Category, and Tag Posts 350Working with Custom Post Types 353Adding Support for Taxonomies 360Adding Support for Post Thumbnails 361Adding the post thumbnails to a theme 362Adding custom image sizes for post thumbnails 364Optimizing Your WordPress Site 365Planting keywords on your website 366Optimizing your post titles for search engine success 366Writing content with readers in mind 367Creating categories that attract search engines 367Using the tag for images 368CHAPTER 13: HOSTING MULTIPLE SITES WITH WORDPRESS 371Deciding When to Use the Multisite Feature 372Understanding the Difference between Sites and Blogs 374Considering Web-Hosting Services 374Enabling the WordPress Network Feature 376DNS 377Apache mod_rewrite 378Virtual host 379PHP 381Installing the Network on Your Site 381Exploring the Network Admin Dashboard Menu 383Managing Your Network 386Settings 386Sites 392Users 395Themes 399Plugins 400Stopping Spam Signups and Splogs 401CHAPTER 14: UPGRADING, BACKING UP, AND MIGRATING 403Getting Notified of an Available Upgrade 404Backing Up Your Database 406Upgrading WordPress Automatically 407Upgrading WordPress Manually 408Migrating Your Existing Site to WordPress 411Movin’ on up 411Preparing for the big move 412Converting templates 413Moving your website to WordPress 414Importing from Blogger 415Importing from LiveJournal 417Importing from Movable Type and TypePad 418Importing from Tumblr 420Importing from WordPress 422Importing from an RSS feed 422Finding other import resources 423Moving Your Website to a Different Host 424Creating a backup and moving manually 425Using a plugin to back up and move to a new host 426PART 5: THE PART OF TENS 427CHAPTER 15: TEN POPULAR WORDPRESS PLUGINS 429Custom Post Type UI 429Jetpack 430Limit Login Attempts Reloaded 431Cookie Notice for GDPR & CCPA 432Yoast SEO 433BackupBuddy 433WP Super Cache 434WooCommerce 434Google XML Sitemaps 435Sucuri Security 436CHAPTER 16: TEN FREE WORDPRESS THEMES 437Hybrid Core 438Hestia 438Responsive 439Ashe 440Prefer Blog 440BlackBird 441Storefront 442Sinatra 443Nisarg 444Optics 444Index 447
Building Versatile Mobile Apps with Python and REST
Develop versatile iOS and Android apps using Python withRESTful web services. Dive into full-stack development with Django, a powerfulPython framework, and React Native, the most in-demand JavaScript library.Begin by building a mobile app using the RESTful APIs andReact Native. Starting from scratch, create a database and serialize the datawith Django REST to serve APIs. Then build the front-end with React and mobileapps for iOS and Android with React Native.By the end of the book, you’ll have developed three appspowered by Django—a desktop React app, an iOS app, and an Android app. Discoverthe whole process of developing apps from inception to distribution of an iOSapp in the Apple store and an Android app in the Google Play store.You will:* Develop using the Model-View-Controller pattern* Facilitate the communications between the back-end andfront-end of web apps with HTTP* Design a robust front-end for an app with React* Create one back-end solution for both iOS and Androiddevices with DjangoART YUDIN is a FinTech enthusiast who has a great passion for coding and teaching. He earned a Master of Science in Banking and Finance from Adelphi University, Garden City, New York. Mr. Yudin previously held asset management positions with international financial institutions such as Merrill Lynch and Allianz Investments. Currently, Art Yudin develops financial services software and leads classes and workshops in Python at Practical Programming in New York and Chicago.CHAPTER 1. STARTING WITH DJANGO- How modern websites work- Python and Virtual environment- Install Django and Django REST- Initial setup- Understanding the MVC pattern in Django- Starting new Django project and creating appsCHAPTER 2. LET’S BUILD OUR WEB API APP- Models- Admin- Views- URLsCHAPTER 3. CREATING RESTFUL API- Serializers- API Views- Browsable APICHAPTER 4. HOW IOS WORKS- Xcode interface- Intro to SwiftCHAPTER 5. DESIGNING OUR FRONT-END IOS APP- Setting up the structure of our App- Designing layoutChapter 6. CONNECTING BACK-END API WITH IOS APP- Creating an API Manager- Displaying data- List View- Detail View- Update ViewCHAPTER 7. ADDITIONAL FEATURES- User authentication- Adding reviews and displaying ratings- Adding places to favoritesChapter 8. LAUNCHING APP- Deploying back-end to a live server- Adding our App to App Store
Tweak Your Mac Terminal
Look beyond the basics of Mac programming and development to become a Mac power user. When most people think about the Mac, they think about the amazing graphical user interface macOS is known for. However, there is a whole world to explore beneath the hood. This book approaches working directly in the terminal with fun projects and ideas to help turn you into an advanced Mac user.You'll work with Brew (HomeBrew), which gives you the ability to install applications from Linux (and Unix) that can make the terminal more useful. This is important, because a lot of applications have been stripped out of macOS or deprecated. For example, Apple's built-in PHP is usually a major release behind. You'll also customize your terminal to change everything about it, making it your own. The whole world is about personalizing. Why put up with the Apple defaults?Once you have your terminal set up and ready to rock, you'll review the basics of programming on the Mac terminal. This will allow you to get a taste of power scripting. You'll discover the power of bash, PHP, and Python. And then you'll apply those tools to web development.Tweak Your Mac Terminal takes you on a journey into a world of the terminal and its hidden applications.WHAT YOU'LL LEARN* Customize the terminal to make it perfect for your needs* Develop web applications using basic coding skills in the terminal* Install HomeBrew and by extension Linux and Unix applicationsWHO THIS BOOK IS FORMac users who are already very familiar with the GUI and want to go further. This book will especially help starting IT professionals and beginning programmers.DANIEL PLATT is a software developer and system admin. Much of his time is spent writing code and setting up computers. He is a Senior Software Engineer at Comparison Technologies Ltd. and has spent a lifetime working with computers keeping on the bleeding edge of technology.Chapter 1: System Setup and Requirements· Introduction· Requirements· Installing XCode· ResourcesChapter 2: Basics of the Terminal· Where is the terminal· What is the terminal· Built-in manual· Text editor· What is a shell?· Moving around· The filesystemo Pwdo Cd· PermissionsChapter 3: Customizing Your Terminal· Customising the look (background/foreground colour)· Aliases· Paths· Ln – Aliases / shortcuts· PromptChapter 4: Built in Commands Provided by macOS· Lsof – Eject a drive with an open file· Which – where is your command?· Open· Say· Sysctl for system state· Compression – gz, zip· Finding content in files· Find a file name· Search and replace - Sed· Spot the difference in text files – Diff· Copy and paste· Built-in Psychotherapist (emacs)· Downloading files· Scheduling with launchd· Running processes· Sudo· Pretending website is somewhere else· Remote shellChapter 5: Brew· What brew is· Why use brew· Installing brew· Finding applications in brew· Installing applications from brew· Brew maintenance· When things go wrongChapter 6: Extra Applications· Tmux· Cowsay· Figlet· Lolcat· Archey· Linux utilities missing from macOS· head, tail· formatting xml, json files· grepChapter 7: Services· Using terminal to access content· Weather· Star WarsChapter 8: Oh My Zsh· What is oh My Zsh· Installation· Themes· PluginsChapter 9: Programming Languages· Bash· PHP· Python· Build a few simple terminal games in different languagesChapter 10: Web Development· Why· Nginx· MySQL· WordPress· Putting it liveChapter 11: Version Control· What is version control· Getting started· Using other repository· Publishing your repository· Using applicationChapter 12: Going Further· Replace terminal with iTerm2· Ideas for customising the terminal· Programming Languages
Designing Digital Products for Kids
Childhood learning is now more screen-based than ever before, and app developers are flocking in droves to this lucrative and exciting market. The younger generation deserves the best, and growing up in a digital world has made them discerning and demanding customers. Creating a valuable user experience for a child is as complex and involved as when designing a typical app for an adult, if not more, and Designing Digital Products for Kids is here to be your guide.Author and designer Rubens Cantuni recognizes the societal importance of a high-quality and ethical app experience for children. There is room for significant improvement in this space, and Cantuni helps you optimize it. Designing Digital Products for Kids walks hopeful developers through digital product design—including research, concept, design, release, marketing, testing, analyzing, and iterating—all while aiming to build specifically for children.Industry experts and their real-world advice are showcased in this book, along with careful advice for the ethics that go along with this unique market. These tips include complex needs regarding mental development, accessibility, conscious screen time limits, and content sensitivity. Children, parents, and teachers alike are hungry for more thoughtful players in the kids’ app space, and Designing Digital Products for Kids is your ticket to successfully developing and educating for the future.WHAT YOU WILL LEARN* Design platforms specifically for children, to entertain and educate them* Work with a complex audience of parents, teachers and kids* Understand how different monetization strategies work in this industry and why WHO THIS BOOK IS FORUser experience designers, UI designers, product owners, teachers and educators, startup founders. The range of topics is so wide that anyone interested or involved in digital products could find something interesting to learn.RUBENS CANTUNI is an Italian digital product designer with 15 years of experience across two continents. Winner of an EMMY AWARD in the “Outstanding Interactive” category, a WEBBY AWARD nomination, and several PARENTS' CHOICE AWARDS and TEACHERS’ CHOICE AWARDS with his work on digital products for children. His experience spans from agencies to startups to big corporations, covering multiple design roles for a wide variety of clients in different industries. He also writes about design on Medium and Builtin.com and has past experience as a character designer and illustrator, freelancing for many companies worldwide.1. Why Design Apps for Kids?2. Before You Start, Know the Industry3. Know Your Target Audience4. Concept5. Gamification6. Safety Measures.7. Interaction Design8. UI Design9. User Testing with Kids10. Market Your Product11. Beyond the Screen12. Conclusion
Evaluation of Some SMS Verification Services and Virtual Credit Cards Services for Online Accounts Verifications
Today a lot of sites require SMS verification code for registration account. If you do not want to use your personal phone number to verify or activate account, use virtual phone number. Thus, there is no need for a SIM card in your mobile phone, only need access to the Internet. You can receive text messages via WEB interface or API. There are a lot of websites that offer temporary free, as well as private numbers from around the world to receive activation codes and SMS confirmations online.Their private numbers are intended for two types of SMS reception: disposable virtual numbers and numbers for rent. You can receive SMS online and use the numbers to sign up or verify for any services like Telegram, Facebook, Google, Gmail, WhatsApp, Viber, Line, WeChat, KakaoTalk etc.In the first part of the book I will mention the best websites that offer virtual phone numbers from around the world to receive activation codes and SMS confirmations online..The VCC is a short form of Virtual Credit Card that can be used for online verification, PayPal, EBay, Amazon and Google Adwords account verification. The second part of the book will guide you to how to obtain virtual debit/credit cards for sake of online accounts verification. There are bulk numbers of banks and debit/credit cards issuers that offer virtual or physical debit/credit card. But I will not go through any of them as I covered them in a book I published previously. I will only concentrate on some quick methods to obtain debit/credit cards for sake of online account verification. I will briefly talk about generating virtual debit/credit cards namso gold CC BIN generator for verification of some online services. Then I will talk about paypalvccs.com website that offers Virtual Visa Card for sake of online accounts verification. At the end I will mention how to get USA shipment address through Viabox.com website, and I will list some of the free VPN Services I commonly useThe book consists from the following parts:1. Some free websites that can be used to receive SMS online using numbers from some countries.2. Some paid (not free) websites that can be used to receive SMS online using numbers from some countries.3. Getting free phone number in US or Canada and Other Countries:4. Best websites that offer SMS verification, sending SMS and renting number services.5. Generating some virtual debit/credit cards through BIN Codes for verification of some online services.6. Paypalvccs.com website that offer Virtual Visa Card for sake of account verifications.7. Getting USA shipment address through Viabox.com.8. Some of the free VPN Services I commonly use.I am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com
Erfolgreicher Online-Handel für Dummies
Erfolgreicher Online-Handel: ein Fachbuch aus der bekannten "... für Dummies"-Reihe. Als ePub im heise Shop erhältlich.Sie möchten Produkte über das Internet verkaufen? Dann sollten Sie Ihre Online-Strategie sorgfältig planen. Dieses Buch verschafft Ihnen einen guten Überblick über die gängigen Verkaufs- und Marketingkanäle. Vom eigenen Shop über Amazon und andere Marktplätze bis hin zu Social Media. Damit erleichtert Ihnen das Buch die Auswahl der richtigen Kanäle. Gleichzeitig verrät es Ihnen wichtige Tipps, Tricks und Tools, um auf den jeweiligen Kanälen erfolgreich zu sein. Profitieren Sie vom Praxiswissen zweier sehr erfahrener Autoren!►►► Für dieses ePub E-Book hat der herausgebende Verlag Wiley einen DRM-Schutz verfügt. Wie Sie E-Books mit DRM-Schutz öffnen können, erfahren Sie in unseren heise Shop-FAQ.Über die Autoren:GIL LANG ist ein gefragter Speaker und E-Commerce-Experte. Viel Herzblut steckt er in seine Direct-to-Consumer-Health-Marke InnoNature.STEFFEN OTTEN hat sich nach seiner Zeit als Unternehmensberater auf den Onlinehandel spezialisiert. Steffen ist Gründer der Sportmarke runamics.Zum Inhalt: Einführung: 27 Teil I E-Commerce – das Ökosystem verstehen: 33 Teil II Vertriebskanäle: 63 Teil III Marketing-Kanäle: 89 Teil IV Hybride Kanäle: 227 Teil V Strategie und Controlling: 263 Teil VI Operatives Geschäft – schlauer verkaufen: 291 Teil VII Die Zukunft des E-Commerce: 345 Teil VIII Der Top-Ten-Teil: 357 Leseprobe (PDF-Link)Inhaltsverzeichnis (PDF-Link)Index (PDF-Link)
Creating EPUB E-books Using EPUB Editors and Converters
Creating E-books in epub format is very important to sell E-books in electronic book stores. Most publishing and distribution E-book stores will not accept the epub format document for E-book if it includes any warnings or errors when validated and that is a very big challenge to all authors.I devoted this book to evaluate some tools that can be used for creating, validating and editing E-books to be in proper Epub format without errors.Personally, I suggest the following guidelines for preparing E-book in Epub format.• Write the document in Microsoft word as .docx file. Make sure to properly setup the h1headings and h2 headings and h3 headings on each section of the document as these data are the most important data used by the Epub management software to convert the document to epub format.• Convert the Microsoft document to Epub format using Calibre E-book management software. Add all required metadata and the cover and also create a table of contents when converting the file.• Using any Epub reader, check if the layout of epub document according to the headings you made on the word document is good and comfortable to any reader.• Validate the epub document to see if it has errors and warnings using the website http://validator.idpf.org.• Then try to troubleshoot and identify the exact location of the errors detected by the epub validator on the epub document by tracing the code view of the epub document using Sigil epub editor. Then, modify the word document to eliminate the errors. And reconvert the word document to epub format using Calibre E-book management software. Validate the updated epub document for any errors again.This book contains the following sections:1. Some online publishing and distribution stores2. Epub Validators3. Creation Epub file through online websites4. Common software's to convert a file to Epub format5. Converting document to Epub format using Calibre software6. Editing Epub documents using Sigil Epub Editor
Windows 10 Portable Genius
YOUR NO-FLUFF, FAST-PACED GUIDE TO EVERYTHING WINDOWS 10This handy, jargon-free guide is designed to help you quickly learn whatever you need to know about Windows 10. Perfect for novices and experienced users alike, you'll get tips, tricks, and savvy advice on how to install programs, set up user accounts, play music and other media files, download photos from your digital camera, go online, set up and secure an email account, and much, much more.* Shows how to perform more than 150 Windows tasks, including working with files, digital images, and media; customizing Windows; optimizing performance; and sharing a computer with multiple users* Covers installing and repairing applications, system maintenance, setting up password-protected accounts, downloading photos to your computer, and staying safe onlineWith concise, easy-to-follow instructions, and its small, portable size, this is the ideal, on-the-go guide for Windows 10 users everywhere.PAUL MCFEDRIES is the president of Logophilia Limited, a technical writing company. He has written more than four dozen books that have sold more than four million copies.Fun, hip, and straightforward, the Portable Genius series gives forward-thinking computer users useful information in handy, compact books that are easy to navigate and don't skimp on the essentials. Collect the whole series and make the most of your digital lifestyle.Acknowledgments iiiIntroduction xCHAPTER 1 HOW DO I CUSTOMIZE WINDOWS? 2Working with Settings 4Opening the Settings app 4Synchronizing settingsbetween PCs 6Accessing an app’s settings 6Customizing the Start Menu 7Pinning an app to the Start menu 7Arranging and sizing Start menu tiles 8Customizing Start menu settings 9Customizing the Taskbar 10Pinning an app to the taskbar 10Customizing taskbar settings 11Customizing the taskbar’s notification area 13Customizing the Lock Screen 15Changing the Lock screen background 16Adding an app to the Lock screen 17Extending Your Desktop with Multiple Monitors 18Setting Up Multiple Desktops 20Adding a new desktop 20Switching to another desktop 21Moving an app to a different desktop 22CHAPTER 2 HOW CAN I MAKE THE MOST OF SURFING THE WEB? 24Taking Advantage of Tabs 26Opening a link in a new tab 26Creating a new tab 26Customizing the new tab page 26Navigating tabs 28Duplicating a tab 28Pinning a tab 28Controlling which tabs appear at startup 28Closing tabs 30Saving Your Favorite Pages 30Adding a page to the Favorites list 30Working with the Favorites bar 31Opening a page from the Favorites list 33Maintaining favorites 33Customizing Edge 34Changing the Edge search engine 34Changing the theme 35Setting the default zoom level 36Customizing the toolbar 37Customizing the font 39CHAPTER 3 HOW DO I MAXIMIZE SENDING AND RECEIVING EMAIL? 42Managing Mail Accounts 44Adding an account 44Changing the account name 46Deleting an account 47Setting Options for Incoming Messages 47Customizing account sync settings 48Combining the Focused and Other tabs 49Grouping messages individually 49Controlling notifications 50Switching between accounts 51Setting Send Options 51Creating a signature 51Setting the default message font 52Changing your message priority 54Running the spell-checker to eliminate message errors 55CHAPTER 4 CAN I USE WINDOWS TO MANAGE CONTACTS AND APPOINTMENTS? 58Managing Your Contacts 60Adding contacts from an existing account 60Creating a contact 62Viewing contacts 64Editing a contact 65Assigning a photo to a contact 65Creating a new contact from an electronic business card 67Filtering your contacts 68Linking multiple profiles to a contact 69Deleting a contact 70Tracking Your Events 71Viewing your calendar 71Adding an event to your calendar 72Creating a recurring event 73Adding an event reminder 74Setting up an online meeting 74Customizing your calendar 76CHAPTER 5 WHAT OTHER DAY-TO-DAY TASKS CAN I PERFORM? 78Finding Stuff on Your PC 80Viewing your timeline 80Searching your PC 80Configuring the Cortana Voice Assistant 83Controlling your PC with Cortana 84Making Video Calls 85Configuring Skype 85Calling someone using Skype 86Dealing with an incoming Skype call 86Working with Maps 87Giving Maps access to your location 87Displaying a location on a map 88Getting directions to a location 90Checking the Weather 93Checking your weather forecast 93Checking another city’s weather forecast 95CHAPTER 6 HOW DO I MAX OUT THE WINDOWS IMAGE TOOLS? 96Getting Images into Your PC 98Importing images from a smartphone or digital camera 98Scanning an image 99Taking a picture or video with your PC camera 101Viewing Your Images 103Using File Explorer to view your images 103Using the Photos app to view your images 104Starting a slide show 106Enhancing Your Images 107Cropping an image 107Applying a filter 108Adding a vignette effect 110Repairing Your Images 111Rotating an image 111Straightening an image 111Adjusting the light 112Adjusting the colors 114Enhancing image clarity 115Getting rid of red eye 115Fixing small flaws 116CHAPTER 7 CAN I SHARE MY COMPUTER? 118Sharing Your PC via User Accounts 120Creating a user account 120Switching between accounts 122Changing your user account picture 125Changing the account type 126Deleting an account 127Sharing Your PC with a Child 127Adding a child to your PC 128Setting restrictions on a child’s account 128Sharing PC Resources 132Sharing a document or folder 132Switching to advanced sharing 134Sharing a folder with other users on the network 135Protect your shared folders with advanced file permissions 136CHAPTER 8 HOW CAN I GET MORE FROM A TABLET PC? 138Working in Tablet Mode 140Controlling Windows with Gestures 141Understanding gestures 142Using gestures to control Windows 142Inputting Text with the Touch Keyboard 143Displaying the touch keyboard 143Selecting a touch keyboard type 144Using the touch keyboard 145Entering text using the handwriting panel 147Configuring the touch keyboard 149Setting Power and Battery Options 149Monitoring battery life 150Setting the power mode 150Adjusting screen brightness 151Switching to Battery Saver mode 151Creating a custom power plan to improve battery life 152Checking out more ways to save energy 153CHAPTER 9 HOW DO I WORK WITH DOCUMENTS? 156Editing Documents 158Creating a new document 158Saving a document 158Opening a document 159Changing the text font 160Finding text 162Replacing text 164Inserting special symbols 165Saving a copy of a document 167Taking Notes with OneNote 168Creating a OneNote notebook 168Adding pages and sections to a notebook 168Adding and working with text notes 170Adding an image to a notebook page 172Working with notebook lists 173Working with Files 175Selecting a file 175Changing the file view 176Previewing a file 176Copying a file 178Moving a file 178Renaming a document 179Creating a new file 180Deleting a document 181Extracting files from a compressed folder 183Specifying a different app when opening a document 185CHAPTER 10 WHAT ARE SOME WAYS TO ENHANCE PC SECURITY? 188Enhancing Sign-In Security 190Creating a strong password 190Updating your account password 191Creating a picture password 192Signing in with a PIN 193Setting up a fingerprint sign-in 194Locking Your PC to Prevent Others from Using It 195Locking your computer 196Configuring your PC to lock automatically 196Enhancing Your Privacy 198Making the Start menu more private 198Controlling your private information 199Stopping an app’s notifications 201Clearing your activity history 201Resetting your computer to preserve privacy 202CHAPTER 11 HOW DO I INCREASE INTERNET PRIVACY AND SECURITY? 204Making the Web More Secure 206Avoiding viruses 206Opting to never save a site’s password 208Deleting a saved website password 208Making the Web More Private 209Deleting your browsing data to ensure privacy 209Turning on private browsing 211Preventing ad sites from tracking you online 211Enabling strict tracking prevention 212Preventing sites from requesting your location 213Enhancing Email Security and Privacy 215Avoiding viruses in email 215Preventing messages from opening automatically 216Thwarting web bugs by blocking images in messages 216Avoiding phishing scams 217CHAPTER 12 HOW DO I MAINTAIN WINDOWS? 220Performing a Few Maintenance Chores 222Scheduling automatic maintenance 222Checking hard drive free space 223Deleting unnecessary files 225Safeguarding Your Files 226Keeping a history of your files 226Restoring a file from your history 227Creating a system image backup 228Using the Windows Recovery Environment 229Understanding the Recovery Environment’s tools 229Accessing the Recovery Environment 230Working with a Recovery Drive 233Creating the recovery drive 233Booting your PC using the recovery drive 234Working with Restore Points 235Creating a system restore point 235Reverting to an earlier restore point 235Index 238
Die UNIX-Story
Ein Betriebssystem, das die IT-Welt am Laufen hält. Die faszinierende Geschichte, wie Unix begann und wie es die Computerwelt eroberte.Brian W. Kernighan war in der Entwicklung von UNIX beteiligt. In diesem kurzen Band erzählt er eine umfassende Geschichte des äußerst einflussreichen und weit verbreiteten Betriebssystems und erzählt aus einer persönlichen Perspektive von den Anfängen. Unix war in seinen frühen Tagen weitgehend das Produkt von Kernighans Kollegen Ken Thompson und Dennis Ritchie von den Bell Labs. Aber Kernighan leistete fast von Anfang an aktive Beiträge. Sein persönliches Wissen verleiht dem Buch einen großen Wert. Kernighan schafft eine gelungene Balance zwischen »offizieller Geschichte« und seinem eigenen Engagement während der Entwicklung von UNIX. Die Konzepte, die mit UNIX und seinem Ökosystem zusammenhängen, erklärt er klar und methodisch. »Die UNIX-History« ist ein kurzweiliges Buch für alle, die mehr über die Geschichte hinter der Geschichte von UNIX erfahren wollen. Mit Insider-Storys und technischen Erklärungen bekommt man einen ganz neuen Blick auf UNIX und auf die Entwicklung von Betriebssystemen.Leseprobe (PDF-Link)
Practical System Programming with C
This book teaches system programming with the latest versions of C through a set of practical examples and problems. It covers the development of a handful of programs, implementing efficient coding examples.Practical System Programming with C contains three main parts: getting your hands dirty with multithreaded C programming; practical system programming using concepts such as processes, signals, and inter-process communication; and advanced socket-based programming which consists of developing a network application for reliable communication.You will be introduced to a marvelous ecosystem of system programming with C, from handling basic system utility commands to communicating through socket programming. With the help of socket programming you will be able to build client-server applications in no time.The “secret sauce” of this book is its curated list of topics and solutions, which fit together through a set of different pragmatic examples; each topic is covered from scratch in an easy-to-learn way. On that journey, you’ll focus on practical implementations and an outline of best practices and potential pitfalls. The book also includes a bonus chapter with a list of advanced topics and directions to grow your skills.WHAT YOU WILL LEARN* Program with operating systems using the latest version of C * Work with Linux* Carry out multithreading with C Examine the POSIX standards* Work with files, directories, processes, and signals* Explore IPC and how to work with itWHO THIS BOOK IS FORProgrammers who have an exposure to C programming and want to learn system programming. This book will help them to learn about core concepts of operating systems with the help of C programming..Sri Manikanta Palakollu is a programmer and software developer with experience in C, C++, Java, and Python as well as Linux, POSIX, and other operating system-level programming. He is a tech reviewer for various tech book publishers. Sri also contributes to various open source projects.1. Introduction to Linux Environment• Getting familiar with Linux Kernel• Linux Kernel V/S Other OS Kernels.• File Handling Utilities• Process Utilities• Network Utilities• Backup Utilities.2. Implementation of Multithreading with C• Introduction to Threads• Threads V/S process• Introduction to Multithreading.• Importance of Multithreading.• Support of Multithreading in C• Creation of threads.• Practical Examples of Multithreading.• Use cases of Multithreading.3. Getting Started with System Programming• Understanding the POSIX Standard.• Introduction to API’s• Importance of API’s• Inbuilt API’s in C4. Files and Directories• Basic concepts in files• Files meta i-nodes• System Calls for Files• I/O Operations for Files• File Permissions.• Soft and Hard Links• System call for Directories.5. Processes and Signals• Introduction to process Environment• Environment Variables• Kernel Support for Processes• Process Creation• Concept of the Zombie process• Concept of Orphan Process• System Calls for Process management• Introduction to Signals• System calls for signals• Types of Signals6. Inter process Communication (IPC)• Introduction to IPC• Types of IPC• Creation of Named PIPES• Creation of UN-Named PIPES• Concept of Message Queues• Implementation of Message Queues• Concept of Semaphore• Implementation of Semaphore.• API for Named and unnamed PIPES• API for Message Queues• API for Semaphore.7. Shared Memory• Introduction to Shared Memory.• Kernel Support for Shared Memory.• Implementation of Shared Memory.• API for Shared Memory.8. Socket Programming• Introduction to Sockets• IPC Over Networks• API for Socket Programming• OSI Layer Protocol• TCP/IP Protocol• Client Server Architecture.• System calls for Socket Programming.• Implementation of Single Client Server Architecture.• Implementation of Multiple Client Server Architecture.9. Advanced Topics and Directions.
Exposed
DISCOVER WHY PRIVACY IS A COUNTERPRODUCTIVE, IF NOT OBSOLETE, CONCEPT IN THIS STARTLING NEW BOOKIt's only a matter of time-- the modern notion of privacy is quickly evaporating because of technological advancement and social engagement. Whether we like it or not, all our actions and communications are going to be revealed for everyone to see. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity takes a controversial and insightful look at the concept of privacy and persuasively argues that preparing for a post-private future is better than exacerbating the painful transition by attempting to delay the inevitable. Security expert and author Ben Malisow systematically dismantles common notions of privacy and explains how:* Most arguments in favor of increased privacy are wrong* Privacy in our personal lives leaves us more susceptible to being bullied or blackmailed* Governmental and military privacy leads to an imbalance of power between citizen and state* Military supremacy based on privacy is an obsolete conceptPerfect for anyone interested in the currently raging debates about governmental, institutional, corporate, and personal privacy, and the proper balance between the public and the private, Exposed also belongs on the shelves of security practitioners and policymakers everywhere.BEN MALISOW has been involved in information security and education for over two decades. He designed and delivered the Carnegie Mellon University CISSP prep course, served as a US Air Force officer, and was Information Security System Manager for the Federal Bureau of Investigation's most highly classified counterterror intelligence-sharing network. Introduction xvii1 PRIVACY CASES: BEING SUBORNED 1Security Through Trust 1The Historic Trust Model Creates Oppression 2Privately Trustful 2Disarmed Forces 4Missed Application 5Harmfully Ever After 7Open Air 8Artifice Exemplar 92 PRIVACY CASES: GOVERNMENT/NATIONAL INTELLIGENCE/MILITARY CONFIDENTIALITY 11National Security vs Governmental Security 12A Government is Not a Nation 14Rationales 15Rationale: Direct Advantage 15Rationale: Overcome Other Secrecy 19Rationale: Military Advantage 25Rationale: Hidden Diplomacy 30Rationale: Protecting Personal Privacy 31Rationale: Emergency Powers 31No Net Benefit; Possible Net Negative 33Citizenry at Risk 33Bad Public Policy 35The Secret Police State 363 PRIVACY AND PERSONAL PROTECTION 39Your Exposure 40Check Yourself 42Take Your Medicine 44The Scene of the Crime 46You’re a Celebrity 494 A CASE AGAINST PRIVACY: AN END TO SHAME 51Cultural Shame 54Location, Location, Location 55Beneficial Shame, Which Might Be Harmful 57Hypocrisy for Thee 595 A CASE AGAINST PRIVACY: BETTER POLICY/PRACTICES 61Policy Based on Bad Data: US Police and Dogs 61Policy Based on Bad Data: The DSM 64Bad Data Derived from Concern for Privacy: Suicide 68Counting Suicides 69Motivation and Reaction 72Famous Suicide 74Jumping on Guns and Bandwagons 766 A (BAD) SOLUTION: REGULATION 81Regulation = Destruction 83Legitimate Fear of the Private Sector 88Exceptions to the Rules 90Chill Out 92Power Outage 98Top Cover 104Now You See It 110The Government Would Never Lie to Its Overseers, Right? 112Stressing It 1127 A GOOD SOLUTION: UBIQUITY OF ACCESS 115If Everybody Knows Everything, Nobody Has an Advantage 116Atomicity, Again 118An End to Crime? 119First Fatal Flaw 121Other Fatal Flaws 122Final Fatal Flaw 123An End to the Need for Crime? 124De-Corrupting Dis-Corrupting? Anti-Corruption? Something Like That 127An End to Sabotage? 129Power Imbalance 130An End to Laws? 132Lower Costs 133An End to Hypocrisy 134An End to Bad Policy 135Speaking of Accurate Portrayals of Humanity 140Vestigial Shame 142Vestiges in Action 1448 THE UPSHOT 149Science Fiction 150Public Perception 153Other Visions 155Molecular Level 160Busting My Hump 162Style Over Substance 162The Added Value of the Long Reach 163Unchill 164Troll Toll? 165The Threat of Erasure 169Get Out 170On the Genetic Level 171Still Scared 173Index 175
Ubuntu Linux Bible
QUICKLY LEARN HOW TO USE UBUNTU, THE FASTEST GROWING LINUX DISTRIBUTION, IN A PERSONAL OR ENTERPRISE ENVIRONMENTWhether you're a newcomer to Linux or an experienced system administrator, the Ubuntu Linux Bible provides what you need to get the most out of one the world's top Linux distributions. Clear, step-by-step instructions cover everything from installing Ubuntu and creating your desktop, to writing shell scripts and setting up file sharing on your network. This up-to-date guide covers the latest Ubuntu release with long-term support (version 20.04) as well as the previous version. Throughout the book, numerous examples, figures, and review questions with answers ensure that you will fully understand each key topic.Organized into four parts, the book offers you the flexibility to master the basics in the "Getting Started with Ubuntu Linux" section, or to skip directly to more advanced tasks. "Ubuntu for Desktop Users" shows you how to setup email, surf the web, play games, and create and publish documents, spreadsheets, and presentations. "Ubuntu for System Administrators" covers user administration, system backup, device management, network configuration, and other fundamentals of Linux administration. The book's final section, "Configuring Servers on Ubuntu," teaches you to use Ubuntu to support network servers for the web, e-mail, print services, networked file sharing, DHCP (network address management), and DNS (network name/address resolution). This comprehensive, easy-to-use guide will help you:* Install Ubuntu and create the perfect Linux desktop* Use the wide variety of software included with Ubuntu Linux* Stay up to date on recent changes and new versions of Ubuntu* Create and edit graphics, and work with consumer IoT electronic devices* Add printers, disks, and other devices to your system* Configure core network services and administer Ubuntu systemsUbuntu Linux Bible is a must-have for anyone looking for an accessible, step-by-step tutorial on this hugely popular Linux operating system.DAVID CLINTON is a Linux server administrator who has worked with IT infrastructure in academic and enterprise environments. He has taught video courses for Amazon Web Services, as well as other technologies. He is a co-author of AWS Certified Solutions Architect Study Guide: Associate (SAA-C01) Exam and AWS Certified Cloud Practitioner Study Guide: Foundational (CLF-C01) Exam. CHRISTOPHER NEGUS is a senior open source technical writer at Amazon Web Services. He has written dozens of books on Linux, including Red Hat Linux Bible, Linux Troubleshooting Bible and Linux Toys. Acknowledgments ixIntroduction xxixPART I: GETTING STARTED 1CHAPTER 1: STARTING WITH LINUX 3Understanding What Linux is 4Understanding How Linux Differs from Other Operating Systems 6Exploring Linux History 7Free-flowing UNIX culture at Bell Labs 7Commercial UNIX 9Berkeley Software Distribution arrives 9UNIX Laboratory and commercialization 10GNU transitions UNIX to freedom 11BSD loses some steam 13Linus builds the missing piece 13OSI open source definition 14Understanding How Linux Distributions Emerged 16Understanding Red Hat 17Understanding Ubuntu and other Debian distributions 17Finding Professional Opportunities with Linux Today 18Understanding how companies make money with Linux 19Summary 20CHAPTER 2: CREATING THE PERFECT LINUX DESKTOP 21Understanding Linux Desktop Technology 22Starting with the GNOME 3 Desktop Live Image 24Using the GNOME 3 Desktop 25After the computer boots up 25Navigating with the mouse 25Navigating with the keyboard 30Setting up the GNOME 3 desktop 31Extending the GNOME 3 desktop 31Using GNOME shell extensions 32Using the GNOME Tweak Tool 33Starting with desktop applications 33Managing files and folders with Nautilus 33Installing and managing additional software 35Playing music with Rhythmbox 37Stopping the GNOME 3 desktop 37Using the Unity Graphical Shell with the GNOME Desktop 37Using the Metacity window manager 38Changing GNOME’s appearance 40Using the panels 40Adding a drawer 41Changing panel properties 41Summary 42Exercises 42PART II: BECOMING A LINUX POWER USER 43CHAPTER 3: USING THE SHELL 45About Shells and Terminal Windows 46Using the shell prompt 47Using a Terminal window 48Using virtual consoles 49Choosing Your Shell 49Running Commands 50Understanding command syntax 51Locating commands 53Recalling Commands Using Command History 56Command-line editing 56Command-line completion 58Command-line recall 59Connecting and Expanding Commands 61Piping between commands 62Sequential commands 62Background commands 63Expanding commands 63Expanding arithmetic expressions 63Expanding variables 64Using Shell Variables 64Creating and using aliases 66Exiting the shell 67Creating Your Shell Environment 67Configuring your shell 67Setting your prompt 68Adding environment variables 70Getting Information about Commands 71Summary 74Exercises 74CHAPTER 4: MOVING AROUND THE FILESYSTEM 77Using Basic Filesystem Commands 80Using Metacharacters and Operators 82Using fi le-matching metacharacters 82Using fi le-redirection metacharacters 84Using brace expansion characters 85Listing Files and Directories 86Understanding File Permissions and Ownership 90Changing permissions with chmod (numbers) 91Changing permissions with chmod (letters) 92Setting default file permission with umask 93Changing file ownership 93Moving, Copying, and Removing Files 94Summary 95Exercises 96CHAPTER 5: WORKING WITH TEXT FILES 97Editing Files with vim and vi 97Starting with vi 99Adding text 99Moving around in the text 100Deleting, copying, and changing text 101Pasting (putting) text 102Repeating commands 102Exiting vi 102Skipping around in the file 103Searching for text 103Using ex mode 104Learning more about vi and vim 104Finding Files 105Using locate to find files by name 105Searching for files with find 107Finding files by name 108Finding files by size 108Finding files by user 109Finding files by permission 109Finding files by date and time 110Using “not” and “or” when finding files 111Finding files and executing commands 112Searching in files with grep 113Summary 115Exercises 115CHAPTER 6: MANAGING RUNNING PROCESSES 117Understanding Processes 117Listing Processes 118Listing processes with ps 118Listing and changing processes with top 120Listing processes with System Monitor 122Managing Background and Foreground Processes 124Starting background processes 124Using foreground and background commands 125Killing and Renicing Processes 126Killing processes with kill and killall 126Using kill to signal processes by PID 127Using killall to signal processes by name 128Setting processor priority with nice and renice 128Limiting Processes with cgroups 129Summary 131Exercises 131CHAPTER 7: WRITING SIMPLE SHELL SCRIPTS 133Understanding Shell Scripts 133Executing and debugging shell scripts 134Understanding shell variables 135Special shell positional parameters 136Reading in parameters 137Parameter expansion in bash 137Performing arithmetic in shell scripts 138Using programming constructs in shell scripts 139The “if then” statements 139The case command 142The “for do” loop 143The “while do” and “until do” loops 144Trying some useful text manipulation programs 145The global regular expression print 145Remove sections of lines of text (cut) 145Translate or delete characters (tr) 146The stream editor (sed) 146Using simple shell scripts 147Telephone list 147Backup script 148Summary 149Exercises 149PART III: BECOMING A LINUX SYSTEM ADMINISTRATOR 151CHAPTER 8: LEARNING SYSTEM ADMINISTRATION 153Understanding System Administration 153Using Graphical Administration Tools 155Using Cockpit browser-based administration 155Using other browser-based admin tools 157Invoking Administration Privileges 158Becoming root from the shell 158Gaining temporary admin access with sudo 159Exploring Administrative Commands, Configuration Files, and Log Files 161Administrative commands 161Administrative configuration files 162Administrative log files and systemd journal 165Using journalctl to view the systemd journal 165Managing log messages with rsyslogd 166Using Other Administrative Accounts 167Checking and Configuring Hardware 167Checking your hardware 168Managing removable hardware 171Working with loadable modules 172Listing loaded modules 172Loading modules 173Removing modules 174Summary 174Exercises 175CHAPTER 9: INSTALLING LINUX 177Choosing a Computer 178Installing Ubuntu Desktop 180Installing Ubuntu Server 185Understanding Cloud-Based Installations 188Installing Linux in the Enterprise 189Exploring Common Installation Topics 189Upgrading or installing from scratch 189Dual booting 190Installing Linux to run virtually 191Using installation boot options 192Boot options for disabling features 192Boot options for video problems 193Boot options for special installation types 193Using specialized storage 194Partitioning hard drives 195Understanding different partition types 196Tips for creating partitions 196Using the GRUB 2 boot loader 198Summary 199Exercises 199CHAPTER 10: GETTING AND MANAGING SOFTWARE 201Managing Software on the Desktop 201Going Beyond the Software Window 203Understanding Linux Software Packaging 204Working with Debian Packaging 205APT basics 205Working with APT repositories 209Working with dpkg 211Summary 214Exercises 214CHAPTER 11: MANAGING USER ACCOUNTS 215Creating User Accounts 215Adding users with adduser 218Setting user defaults 220Modifying users with usermod 222Deleting users with deluser 223Understanding Group Accounts 223Using group accounts 224Creating group accounts 225Managing Users in the Enterprise 225Setting permissions with Access Control Lists 226Setting ACLs with setfacl 227Setting default ACLs 228Enabling ACLs 229Adding directories for users to collaborate 231Creating group collaboration directories (set GID bit) 231Creating restricted deletion directories (sticky bit) 233Centralizing User Accounts 233Summary 234Exercises 234CHAPTER 12: MANAGING DISKS AND FILESYSTEMS 237Understanding Disk Storage 237Partitioning Hard Disks 239Understanding partition tables 239Viewing disk partitions 240Creating a single-partition disk 241Creating a multiple-partition disk 245Using Logical Volume Manager Partitions 249Checking an existing LVM 249Creating LVM logical volumes 252Growing LVM logical volumes 254Mounting Filesystems 254Supported filesystems 255Enabling swap areas 257Disabling swap area 258Using the fstab file to define mountable filesystems 258Using the mount command to mount filesystems 261Mounting a disk image in loopback 262Using the umount command 262Using the mkfs Command to Create a Filesystem 263Managing Storage with Cockpit 264Summary 265Exercises 266PART IV: BECOMING A LINUX SERVER ADMINISTRATOR 267CHAPTER 13: UNDERSTANDING SERVER ADMINISTRATION 269Getting Started with Server Administration 270Step 1: Install the server 270Step 2: Configure the server 272Using configuration files 272Checking the default configuration 272Step 3: Start the server 272Step 4: Secure the server 274Password protection 274Firewalls 274TCP Wrappers 274AppArmor 275Security settings in configuration files 275Step 5: Monitor the server 275Configure logging 275Run system activity reports 276Watch activity live with Cockpit 276Keep system software up to date 277Check the filesystem for signs of crackers 277Checking and Setting Servers 277Managing Remote Access with the Secure Shell Service 277Starting the openssh-server service 278Using SSH client tools 278Using ssh for remote login 279Using SSH for remote execution 280Copying files between systems with scp and rsync 281Interactive copying with sftp 284Using key-based (passwordless) authentication 285Configuring System Logging 286Enabling system logging with rsyslog 287Understanding the rsyslog.conf file 287Understanding log messages 289Setting up and using a loghost with rsyslogd 289Watching logs with logwatch 290Checking System Resources with sar 291Checking System Space 293Displaying system space with df 293Checking disk usage with du 294Finding disk consumption with find 294Managing Servers in the Enterprise 295Summary 296Exercises 296CHAPTER 14: ADMINISTERING NETWORKING 299Configuring Networking for Desktops 300Checking your network interfaces 302Checking your network from NetworkManager 302Checking your network from Cockpit 303Checking your network from the command line 304Configuring network interfaces 308Setting IP addresses manually 308Setting IP address aliases 309Setting routes 310Configuring a network proxy connection 311Configuring Networking from the Command Line 312Configure networking with nmtui 312Editing a NetworkManager TUI connection 313Understanding networking configuration files 314Other networking files 315Setting alias network interfaces 318Setting up Ethernet channel bonding 319Setting custom routes 320Configuring Networking in the Enterprise 321Configuring Linux as a router 321Configuring Linux as a DHCP server 322Configuring Linux as a DNS server 322Configuring Linux as a proxy server 323Summary 323Exercises 324CHAPTER 15: STARTING AND STOPPING SERVICES 327Understanding the Initialization Daemon (init or systemd) 328Understanding the classic init daemons 329Understanding systemd initialization 335Learning systemd basics 335Learning systemd’s backward compatibility to SysVinit 341Checking the Status of Services 343Checking services for SysVinit systems 343Stopping and Starting Services 346Stopping and starting SysVinit services 346Stopping a service with systemd 347Starting a service with systemd 348Restarting a service with systemd 348Reloading a service with systemd 349Enabling Persistent Services 350Configuring persistent services for SysVinit 350Enabling a service with systemd 351Disabling a service with systemd 352Configuring a Default Runlevel or Target Unit 353Configuring the SysVinit default runlevel 353Adding New or Customized Services 354Adding new services to SysVinit 355Step 1: Create a new or customized service script file 355Step 2: Add the service script to /etc/rc.d/init.d 356Step 3: Set appropriate permission on the script 357Step 4: Add the service to runlevel directories 357Adding new services to systemd 357Step 1: Create a new or customized service configuration unit file 358Step 2: Move the service configuration unit file 358Step 3: Add the service to the Wants directory 359Summary 360Exercises 360CHAPTER 16: CONFIGURING A PRINT SERVER 363Common UNIX Printing System 363Setting Up Printers 365Adding a printer automatically 365Using web-based CUPS administration 366Allow remote printing administration 367Add a printer not automatically detected 367Using the Print Settings window 368Configuring local printers with the Print Settings window 369Configuring remote printers 372Adding a remote CUPS printer 373Adding a remote UNIX (LDP/LPR) printer 373Adding a Windows (SMB) printer 374Working with CUPS Printing 375Configuring the CUPS server (cupsd.conf) 375Starting the CUPS server 376Configuring CUPS printer options manually 377Using Printing Commands 378Printing with lp 378Listing status with lpstat -t 379Removing print jobs with cancel 379Configuring Print Servers 380Configuring a shared CUPS printer 380Configuring a shared Samba printer 381Understanding smb.conf for printing 382Setting up SMB clients 382Summary 383Exercises 383CHAPTER 17: CONFIGURING A WEB SERVER R 385Understanding the Apache Web Server 385Getting and Installing Your Apache Web Server 386Controlling Apache 389Securing Apache 389Apache file permissions and ownership 389Apache and firewalls 390Apache and AppArmor 390Understanding the Apache configuration files 393Using directives 393Understanding default settings 395Adding a virtual host to Apache 398Allowing users to publish their own web content 400Securing your web traffic with TLS 401Understanding how SSL is configured 402Generating an SSL key and self-signed certificate 403Generating a certificate signing request 405Troubleshooting Your Web Server 406Checking for configuration errors 406Access forbidden and server internal errors 408Summary 410Exercises 410CHAPTER 18: CONFIGURING AN FTP SERVER 413Understanding FTP 413Installing the vsftpd FTP Server 415Controlling the vsftpd Service 416Securing your FTP server 417Integrating Linux file permissions with vsftpd 418Configuring Your FTP Server 418Setting up user access 418Allowing uploading 419Setting up vsftpd for the Internet 420Using FTP Clients to Connect to Your Server 422Accessing an FTP server from a browser 422Accessing an FTP server with the lftp command 423Using the gFTP client 425Summary 426Exercises 426CHAPTER 19: CONFIGURING A WINDOWS FILE SHARING (SAMBA) SERVER R 429Understanding Samba 429Installing Samba 430Controlling Samba 431Viewing Samba processes 431Configuring Samba 435Configuring the [global] section 435Configuring the [homes] section 437Configuring the [printers] section 437Creating a Samba shared folder 438Checking the Samba share 438Accessing Samba Shares 441Accessing Samba shares in Linux 442Accessing Samba shares from a Linux file manager 442Mounting a Samba share from a Linux command line 442Accessing Samba shares in Windows 444Using Samba in the Enterprise 444Summary 444Exercises 445CHAPTER 20: CONFIGURING AN NFS FILE SERVER 447Installing an NFS Server 448Starting the NFS Service 449Sharing NFS Filesystems 450Configuring the /etc/exports file 450Hostnames in /etc/exports 451Access options in /etc/exports 452User mapping options in /etc/exports 453Exporting the shared filesystems 454Securing Your NFS Server 454Using NFS Filesystems 455Viewing NFS shares 456Manually mounting an NFS filesystem 456Mounting an NFS filesystem at boot time 457Mounting noauto filesystems 458Using mount options 458Using autofs to mount NFS filesystems on demand 460Automounting to the /net directory 460Automounting home directories 461Unmounting NFS Filesystems 463Summary 464Exercises 464CHAPTER 21: TROUBLESHOOTING LINUX 467Boot-Up Troubleshooting 467Understanding startup 468Starting from the firmware (BIOS or UEFI) 469Troubleshooting BIOS setup 470Troubleshooting boot order 471GRUB 2 boot loader 471Starting the kernel 472Troubleshooting the initialization system 474Troubleshooting Software Packages 476Troubleshooting Networking 479Troubleshooting outgoing connections 479View network interfaces 480Check physical connections 480Check routes 481Check hostname resolution 482Troubleshooting incoming connections 483Check if the client can reach your system at all 483Check if the service is available to the client 484Check the service on the server 485Troubleshooting Memory 485Uncovering memory issues 486Checking for memory problems 488Dealing with memory problems 489Summary 490Exercises 490PART V: LEARNING LINUX SECURITY TECHNIQUES 493CHAPTER 22: UNDERSTANDING BASIC LINUX SECURITY Y 495Implementing Physical Security 495Implementing disaster recovery 496Securing user accounts 496One user per user account 497Limiting access to the root user account 497Setting expiration dates on temporary accounts 497Removing unused user accounts 498Securing passwords 500Choosing good passwords 500Setting and changing passwords 501Enforcing best password practices 502Understanding the password files and password hashes 504Securing the filesystem 506Managing dangerous filesystem permissions 506Securing the password files 507Locking down the filesystem 508Managing software and services 509Updating software packages 509Keeping up with security advisories 509Advanced implementation 510Monitoring Your Systems 510Monitoring log files 510Monitoring user accounts 512Detecting counterfeit accounts and privileges 512Detecting bad account passwords 514Monitoring the filesystem 516Verifying software packages 516Scanning the filesystem 516Detecting viruses and rootkits 518Auditing and Reviewing Linux 521Conducting compliance reviews 521Conducting security reviews 522Summary 522Exercises 523CHAPTER 23: UNDERSTANDING ADVANCED LINUX SECURITY Y 525Implementing Linux Security with Cryptography 525Understanding hashing 526Understanding encryption/decryption 527Understanding cryptographic ciphers 527Understanding cryptographic cipher keys 527Understanding digital signatures 533Implementing Linux cryptography 535Ensuring file integrity 535Encrypting a Linux filesystem at installation 536Encrypting a Linux directory 537Encrypting a Linux file 540Encrypting Linux with miscellaneous tools 540Using Encryption from the Desktop 541Implementing Linux Security with PAM 541Understanding the PAM authentication process 542Understanding PAM contexts 543Understanding PAM control flags 544Understanding PAM modules 545Understanding PAM system event configuration files 545Administering PAM on your Linux system 546Managing PAM-aware application configuration files 546Implementing resources limits with PAM 547Implementing time restrictions with PAM 549Enforcing good passwords with PAM 550Encouraging sudo use with PAM 551Obtaining more information on PAM 551Summary 552Exercises 552CHAPTER 24: ENHANCING LINUX SECURITY WITH APPARMOR 553Understanding AppArmor 553Working with AppArmor 556Summary 559Exercises 560CHAPTER 25: SECURING LINUX ON A NETWORK 561Auditing Network Services 561Evaluating access to network services with nmap 563Using nmap to audit your network services’ advertisements 566Working with Firewalls 570Understanding firewalls 571Implementing firewalls 572Starting with UFW 572Understanding the iptables utility 574Using the iptables utility 576Summary 583Exercises 583PART VI: ENGAGING WITH CLOUD COMPUTING 585CHAPTER 26: SHIFTING TO CLOUDS AND CONTAINERS 587Understanding Linux Containers 588Namespaces 589Container registries 589Base images and layers 590Working with Linux Containers 590Deploying LXD containers 590Deploying Docker containers 593Using containers in the enterprise 600Summary 600Exercises 600CHAPTER 27: DEPLOYING LINUX TO THE PUBLIC CLOUD 601Running Linux in the Cloud Using cloud-init 601Creating LXD Linux Images for Cloud Deployments 604Working with LXD profiles 604Working with LXD images 607Using OpenStack to deploy cloud images 608Using Amazon EC2 to Deploy Cloud Images 610Installing the AWS CLI 611Provisioning and launching an EC2 instance 613Summary 618Exercises 618CHAPTER 28: AUTOMATING APPS AND INFRASTRUCTURE WITH ANSIBLE 619Understanding Ansible 620Exploring Ansible Components 621Inventories 621Playbooks 622Plays 622Tasks 622Modules 622Roles, imports, and includes 623Stepping Through an Ansible Deployment 623Prerequisites 624Setting up SSH keys to each node 624Installing Ansible 626Creating an inventory 626Authenticating to the hosts 626Creating a playbook 627Run the playbook 628Running Ad-Hoc Ansible Commands 629Trying ad-hoc commands 629Summary 631Exercises 631CHAPTER 29 DEPLOYING APPLICATIONS AS CONTAINERS WITH KUBERNETES 633Understanding Kubernetes 634Kubernetes masters 634Kubernetes workers 635Kubernetes applications 635Kubernetes interfaces 636Trying Kubernetes 636Getting Kubernetes up and running 637Deploying a Kubernetes application 638Getting information on the deployment’s pods 639Exposing applications with services 643Scaling up an application 644Checking the load balancer 645Scaling down an application 646Deleting a service 646Summary 647Exercises 647Appendix: Exercise Answers 649Index 701
Pro iOS Testing
Discover what tools there are for unit testing in iOS, and how to work in a test-driven environment. This book reveals how testing is a crucial capability in any iOS developer’s toolset, and a minimum requirement in iOS interviews.A few years ago, tests on mobile platforms were not very popular. It wasn’t a technical constraint, more a cultural one. But these days it’s a crucial skill set, especially when projects become big and hard to maintain. This book shows you how to set up a testing target in XCode unit tests. You'll learn how to write unit tests properly and incorporate concepts like spies and mocks and code coverage. You'll also learn the philosophy behind the architecture of UI tests, and how to mock network and DB layers in testing. Write unbreakable UI tests performance tests, as well. And learn the difference between integration tests and snapshot testing.This book will show you how to maintain code that's not only bug-free but will also remain high quality over time and maintainable while you make changes and refactors during an app's life. Testing in all its aspects is the best way of maintaining iOS projects to run fast and reliably long after you've released them.Many iOS developers working today lack an understanding of the advantages of testing, and might be unfamiliar with tools that make the job easier, such as XCTest framework. With Pro iOS Testing you'll see how to develop and test apps that work and stay working for a long time.WHAT YOU'LL LEARN* Set up a stable testing system* Extend an app's lifetime with testing before release* Incorporate testing into your everyday development routine* Write unbreakable UI tests performance tests* Understand the difference between integration tests and snapshot testingWHO THIS BOOK IS FORProfessional iOS developers with extensive experience in the basics of building apps.AVI TSADOK is an accomplished iOS Developer with almost a decade of experience. He currently heads mobile developemnt at Any.do, a leading productivity app. He's also a regular contributor to "Better Programming" and has an active presence on Medium. Having written many iOS articles, he's decided to combine his passion for writing and developing by writing his first book.* CHAPTER 1 - INTRODUCTION TO TESTING1. Testing - Doing the same thing over and over again expecting the same results 2. Where Testing meets us and why it’s important3. Different Types of Testing Methods4. Say hello to XCTest Framework * CHAPTER 2 - SETUP A TESTING INFRASTRUCTURE 1. All About testing targets2. Testing Code Organization * CHAPTER 3 - PREPARE YOUR CODE FOR TESTING 1. Using interactors and entities2. Mark private methods3. Mocks and Spies * CHAPTER 4 - UNIT TESTS1. What are unit tests?2. What functions should be covered?3. Write our first unit test4. Code Coverage5. Write several tests for the same function 6. Testing A-Sync functions7. Best Practices * CHAPTER 5 - PERFORMANCE TESTS 1. IMPORTANCE OF PERFORMANCE TESTS 2. WHAT METRICS CAN WE MEASURE? 3. MEET XCTMETRIC PROTOCOL4. WRITE OUR FIRST PERFORMANCE TEST 5. SET BASELINE6. BEST PRACTICES* CHAPTER 6 - INTEGRATION TESTS 1. WHAT ARE THE DIFFERENCES BETWEEN UNIT TESTS AND INTEGRATION TESTS 2. HOW TO SET THE GROUND FOR INTEGRATION TESTS3. WE STILL HAVE MOCKS4. WHAT INTEGRATIONS ARE COMMON TO TEST?* CHAPTER 7 - UI TESTS 1. WHAT ARE UI TESTS2. IT ALL STARTS WITH ACCESSIBILITY 3. UI TESTING CHALLENGES4. Simulate your backend 5. Meet Page Object Model 6. UI Testing Best Practices* CHAPTER 8 - SNAPSHOT TESTING 1. SNAPSHOT TESTING - CLOSEST TO REAL QA MANUAL REGRESSION 2. IOS-SNAPSHOT-TEST-CASE - FACEBOOK AND UBER SOLUTION3. HOW TO USE IT?4. PROS AND CONS* CHAPTER 9 - SHARE TESTS BETWEEN IOS AND ANDROID 1. SHARED CODE - OUT, SHARED TESTS - IN. 2. IT ALL STARTS WITH CONSISTENT API3. PREPARE YOUR UNIT TESTS FOR THAT4. SETUP A DEDICATED REPOSITORY5. BEST PRACTICES10. CHAPTER 10 - TEST-DRIVEN DEVELOPMENT (TDD)1. In short - what is TDD?2. TDD Advantages3. TDD is not a type of test, it’s a development method 4. TDD Process
Einstieg in Kali Linux
Von der Installation über die Konfiguration bis hin zum Einsatz der wichtigsten ToolsDetaillierter Ablauf von Security Assessments und Durchführung von Penetrationstests mit praktischer ChecklisteSchwachstellenanalyse mit OpenVAS, Angriffe mit WebScarab und Metasploit, IT-Forensik mit Autopsy, Reporting mit Faraday und viele weitere Tools Die Distribution Kali Linux ist auf Sicherheits- und Penetrationstests spezialisiert. Sie enthält mehrere Hundert Pakete zur Informationssammlung und Schwachstellenanalyse und jede Menge Tools für Angriffe und Exploitation sowie Forensik und Reporting, sodass Penetration Tester aus einem beinahe endlosen Fundus kostenloser Tools schöpfen können. Dieses Buch ermöglicht IT-Sicherheitsexperten und allen, die es werden wollen, einen einfachen Einstieg in Kali Linux. Erfahrung im Umgang mit anderen Linux-Distributionen setzt der Autor dabei nicht voraus. Im ersten Teil des Buches erfahren Sie, wie Sie Kali Linux installieren und an Ihre Bedürfnisse anpassen. Darüber hinaus gibt Ihnen der Autor grundlegende Linux-Kenntnisse an die Hand, die Sie für das Penetration Testing mit Kali Linux brauchen. Der zweite Teil erläutert verschiedene Security Assessments sowie die grundlegende Vorgehensweise bei der Durchführung von Penetrationstests. So vorbereitet können Sie im nächsten Schritt gezielt die für Ihren Einsatzzweck passenden Tools für das Penetration Testing auswählen. Aus der Fülle der bei Kali Linux mitgelieferten Tools stellt der Autor im dritten Teil des Buches die wichtigsten vor und zeigt Schritt für Schritt, wie und wofür sie eingesetzt werden, darunter bekannte Tools wie Nmap, OpenVAS, Metasploit und John the Ripper. Nach der Lektüre sind Sie bereit, Kali Linux sowie die wichtigsten mitgelieferten Tools für Penetrationstests einzusetzen und IT-Systeme auf Schwachstellen zu prüfen. Aus dem Inhalt: Hauptfeatures und Richtlinien von Kali LinuxInstallation und KonfigurationLinux-Dateisystem, Kommandozeile und nützliche Linux-BefehleSicherheitsrichtlinienEinführung in Security AssessmentsDurchführung von PentestsInformationssammlung mit Nmap, TheHarvester, HTTrack u.v.m.Schwachstellenanalyse mit OpenVAS, Nikto und SiegeSniffing und Spoofing mit Dsniff, Ettercap und WiresharkTools für Attacken: Wireless-Attacken (aircrack-ng, Ghost Phisher, Kismet)Pentesting von Webseiten (WebScarab, Skipfish, ZAP)Exploitation (Metasploit, Armitage u.v.m.)Passwort-Angriffe (Medusa, JtR u.v.m.)IT-Forensik mit Autopsy, Binwalk und mehrReporting mit Cutycapt, Faraday und mehrCheckliste für PenetrationstestsPraktisches Glossar Jürgen Ebner ist u.a. IT-Techniker und zertifizierter Datenschutz- und IT-Security-Experte. Bei der IT-Betreuung setzt er auf proaktive Services, um für mehr Sicherheit in den Unternehmen zu sorgen. Mit seinem IT-Unternehmen ICTE bietet er neben Managed Services vor allem Security Assessments und die Erarbeitung von Datenschutzkonzepten an.
macOS Big Sur For Dummies
YOUR "GET-STARTED" GUIDE TO THE WORLD OF MACOS BIG SURWherever you like to Mac—at home in front of your trusty iMac or over a coffee with your portable MacBook Air—macOS provides you with the seamless, efficient, and reliable user experience that makes these devices so famously a pleasure to use. macOS Big Sur For Dummies is here to heighten the experience for new users and upgraders alike by providing the very latest on the ways macOS Big Sur can enhance how you work and play.Written in a no-jargon style by Bob LeVitus—the Houston Chronicle’s much-loved "Dr. Mac" since 1996—this guide starts with the basics, like getting set up, and explains more advanced uses, like making music and movies, exploring the expanding universe of apps and giving tips on how to save time and enhance productivity along the way. With this book, you'll learn to* Set up and connect your Mac* Get friendly with Siri* Enhance your world with apps* Work better and fasterUse the comprehensive capabilities of macOS Big Sur to do anything and everything you would like to do—and do it even better. For beginners and experts alike, macOS Big Sur For Dummies is the best way to step into the magical world of getting things done with Mac.BOB “DR. MAC” LEVITUS has written the “Dr. Mac” column for the Houston Chronicle since 1996. A devoted Mac enthusiast, he has written or cowritten a long list of how-to books about macOS, iPhone, iPad, Office for the Mac, and GarageBand. He’s also a regular contributor to various tech publications.INTRODUCTION 1About This Book 1Foolish Assumptions 3Icons Used in This Book 3Beyond the Book 4Where to Go from Here 4PART 1: MACOS BASICS 5CHAPTER 1: MACOS BIG SUR 101 (PREREQUISITES: NONE) 7Gnawing to the Core of macOS 8A Safety Net for the Absolute Beginner (or Any User) 10Turning the dang thing on 10What you should see on startup 11Shutting down properly 15A few things you should definitely not do with your Mac 16Point-and-click 101 17Not Just a Beatles Movie: Help and the Help Menu 19CHAPTER 2: DESKTOP AND WINDOWS AND MENUS (OH MY!) 23Touring Finder and Its Desktop 24Anatomy of a Window 25Top o’ the window to ya! 27A scroll new world 29(Hyper)active windows 30Dialog Dealie-Boppers 32Working with Windows 34Opening and closing windows 34Resizing windows and window panes 35Moving windows 35Shuffling windows 36Menu Basics 38The ever-changing menu bar 38Contextual (shortcut) menus: They’re sooo contextual! 39Recognizing disabled options 41Navigating submenus 41Under the Apple menu tree 42Using keyboard shortcut commands 44CHAPTER 3: WHAT’S UP, DOCK? 45A Quick Introduction to Your Dock 46The default icons of the dock 47Trash talkin’ 48Opening application menus on the dock 51Reading dock icon body language 53Opening files from the dock 54Customizing Your Dock 54Adding dock icons 54Removing an icon from the dock 57Resizing the dock 58What should you put on your dock? 58Setting your dock preferences 60CHAPTER 4: GETTING TO KNOW FINDER AND ITS DESKTOP 65Introducing Finder and Its Minions: The Desktop and Icons 66Introducing the desktop 66Bellying up to the toolbar 68Figuring out what an icon is 71Identifying your Finder icons in the wild 72Aliases Are Awesome! 73Creating aliases 74Deleting aliases 75Hunting down an alias’s parent 75The View(s) from a Window 76Moving through folders fast in Column view 76Perusing in Icon view 78Listless? Try touring folders in List view 78Hangin’ in the Gallery (view) 80What’s next on the (View) menu? 81Finder on the Menu 83The actual Finder menu 83Like a road map: The current folder’s pop-up menu 86Going places with the Go menu 86Customizing Finder Windows 89Adding folders to the sidebar 89Setting Finder preferences 90Digging for Icon Data in the Info Window 93CHAPTER 5: DELVING EVEN DEEPER INTO BIG SUR’S DESKTOP AND FINDER 97Cleaning Up Your Desktop Automatically with Stacks 97Managing your Stacks 100Quick Actions: Now Playing All Over Big Sur 101Getting the most out of Markup 101Trimming video without launching an app 104Do It Quicker with Finder Quick Actions 105Creating PDFs without launching an app 105Creating custom Finder Quick Actions 106Four More Cool Big Sur Tricks 107Shooting screens 107Dynamic desktop images 109Recently used apps in the dock 109Mentions of Gallery view 110PART 2: HOW STUFF WORKS 111CHAPTER 6: HAVING IT YOUR WAY 113Introducing System Preferences 113The Desktop & Screen Saver System Preferences Pane 116The Desktop tab 117The Screen Saver tab 118The General System Preferences Pane 119Adjusting the Keyboard, Mouse, Trackpad, and Other Hardware 122The Keyboard System Preferences pane 122The Mouse System Preferences pane 128The Bluetooth System Preferences pane 129The Trackpad System Preferences pane 129The Sound System Preferences Pane 131Changing sound effects 132Choosing output and input options 132CHAPTER 7: OPENING AND SAVING FILES 133A Quick Primer on Finding Files 134Understanding the macOS Folder Structure 134Understanding nested folders 136From the top: The Computer folder 137Peeking into the Applications folder 138Visiting the Library folders 138Let it be: The System folder 139There’s no place like Home 140Your personal library card 141Saving Your Document Before It’s Too Late 143Stepping through a basic save 145Save As versus Duplicate: Different names for the same result 151Open, Sez Me 153With drag-and-drop 154With a Quick Look 155When your Mac can’t open a file 155With the application of your choice 156CHAPTER 8: FILE AND FOLDER MANAGEMENT MADE EASY 159Organizing Your Stuff in Folders 159Files versus folders 160Organizing your stuff with subfolders 160Creating new folders 163Navigating with spring-loaded folders 163Smart folders 164Shuffling Files and Folders 167Moving files and folders 167Selecting multiple icons 169Playing the icon name game: Renaming icons 170Renaming multiple icons at once 171Compressing files 171Getting rid of icons 172The Incredible iCloud Drive 172CHAPTER 9: COMPREHENDING THE MACOS CLIPBOARD 175Introducing the Clipboard 175Copying Files and Folders 177Pasting from the Clipboard 179Big Sur’s Universal Clipboard 179PART 3: GETTING THINGS DONE 181CHAPTER 10: FIVE TERRIFIC TIME-SAVING TOOLS 183With a Quick Look 184Share and share alike with the Share menu 185Slide into Slideshow (full-screen) mode 186Spotlight on Finding Files and Folders Faster 187Using the Find command 187Using the Spotlight menu and its keyboard shortcut 190Blast Off with Mission Control 191The Mission Control pane: It’s painless 191Hot corners are hot stuff! 194Mission Control’s Spaces from 30,000 feet (an overview) 194Getting around in space(s) 197Taking Control of Essential Settings 198Launchpad: The Place for Applications 200CHAPTER 11: ORGANIZING YOUR LIFE 203Keeping Track with Calendar 204Navigating Calendar views 204Creating calendars 205Deleting a calendar 206Creating and managing events 207Reminders: Protection Against Forgetting 210Getting started with Reminders 210To do or not to do: Setting reminders 211Sharing lists and assigning reminders 213Everything You Need to Know about Notification Center 213Tweaking Notification settings 214Widget management 101 216Using Notification Center 217Use Notes for Making Notes 218Tracking Productivity with Screen Time 221CHAPTER 12: ARE YOU SIRI-OUS? 223What Siri Can Do for You 224Working with Siri 226Making Siri Your Own 226CHAPTER 13: MAPS ARE WHERE IT’S AT 229Finding Your Current Location with Maps 229Finding a Person, Place, or Thing 230Views, Zooms, and Pans 231Maps and Contacts 233Time-saving Map Tools: Favorites, Guides, and Recents 234Favorites 234Guides 235Recents 235Smart Map Tricks 236Get route maps and driving directions 236Get walking directions 237Get directions for public transportation 237Get traffic info in real time 238Flyovers and look arounds 238Do more on the Info sheet 240CHAPTER 14: APPS BORN IN IOS 241Taking Stock of the Market with Stocks 241Adding and deleting stocks, funds, and indexes 243Details, details, details 244Charting a course 244Read All about It in News 245What are your interests? 246How News works 247Managing your news 247Recording Memos with Voice Memos 248Recording a voice memo 248Listening to a voice memo 249Naming a voice memo 249Trimming a voice memo 250Controlling Lights, Locks, and More with Home 251PART 4: GETTING ALONG WITH OTHERS 253CHAPTER 15: (INTER)NETWORKING 255Getting Connected to the Internet 256Your Internet service provider and you 257Plugging in your Internet-connection settings 258Browsing the Web with Safari 259Owning your toolbar 261Using the Safari sidebar 263Searching with Google 267Protect yourself from malice (and ads) 269Checking out Help Center 270Audio and Video Calls with FaceTime 270CHAPTER 16: DEALING WITH PEOPLE 273Collecting Your Contacts 273Adding contacts 274Importing contacts from other programs 276Creating a basic group 276Setting up a smart group (based on contact criteria) 277Deleting a group or smart group 279Sync + Contacts = your contacts everywhere 279CHAPTER 17: COMMUNICATING WITH MAIL AND MESSAGES 281Sending and Receiving Email with Mail 281Setting up Mail 282A quick overview of the toolbar 283Composing a new message 284Sending email from the Contacts app 286Checking your mail 288Dealing with spam 289Mailboxes smart and plain 289Changing your preferences 292Sign here, please 293Mail rules rule 294Take a (Quick) look and (Slide) show me some photos 296Markup and Mail Drop 297Communicating with Messages 299Chit-chatting with Messages 300CHAPTER 18: SHARING YOUR MAC AND LIKING IT 303Introducing Networks and File Sharing 304Portrait of home office networking 305Three ways to build a network 307Setting Up File Sharing 309Access and Permissions: Who Can Do What 311Users and groups and guests 311Creating users 312macOS knows best: Folders shared by default 317Sharing a folder or disk by setting permissions 318Useful settings for permissions 322Unsharing a folder 324Connecting to a Shared Disk or Folder on a Remote Mac 325Changing Your Password 328Changing your account password on your Mac 329Changing the password of any account but your own on your Mac 329More Types of Sharing 330Sharing a screen 330Sharing the Internet 331And yet more ways to share 332PART 5: GETTING CREATIVE 333CHAPTER 19: THE MUSICAL MAC 335Apple Music and iTunes Match Rock! 336Introducing Music (the App Formerly Known as iTunes) 337Working with Media 340Adding songs 341Listening to Radio 343All about Playlists 344Creating a regular playlist 344Filtering your library 346Working with smart playlists 347Burning a playlist to CD 348Looking at the Genius playlist 348CHAPTER 20: THE MULTIMEDIA MAC 351Playing Movies and Music in QuickTime Player 351Watching TV 353Using the Books App 354Buying an e-book or audiobook 355Shopping for e-books without Apple 357Reading an e-book 358Finding and Listening to Podcasts with the Podcasts App 360You’re the Star with Photo Booth 361Viewing and Converting Images and PDFs in Preview 363Importing Media from a Camera or Camcorder 365CHAPTER 21: WORDS AND LETTERS 369Processing Words with TextEdit 370Creating and composing a document 370Working with text 371Adding graphics to documents 374Font Mania 375Types of fonts 376Managing your fonts with Font Book 376CHAPTER 22: PUBLISH OR PERISH: THE FAIL-SAFE GUIDE TO PRINTING 379Before Diving In 380Ready: Connecting and Adding Your Printer 380Connecting your printer 381Setting up a printer for the first time 381One last thing: Printer sharing 383Set: Setting Up Your Document with Page Setup 384Print: Printing with the Print Sheet 386Printing a document 386Choosing among different printers 387Choosing custom settings 387Saving custom settings 390Preview and PDF Options 390PART 6: CARE AND FEEDING 393CHAPTER 23: FEATURES FOR THE WAY YOU WORK 395Finally, a Dark Mode 396App Shopping, Improved 397Using Your iPhone as Your Mac’s Camera or Scanner 399Talking and Listening to Your Mac 402Keyboard System Preferences pane: You talk and your Mac types 402Commanding your Mac by voice 404Listening to your Mac read for you 406Automatic Automation 409Script Editor app: Write and edit AppleScripts 409Automator app: Automate almost anything 410A Few More Useful Goodies 413Accessibility System Preferences pane: Make your Mac more accessible 413Battery and Energy Saver System Preferences panes: For energy conservation and sleep 415Bluetooth System Preferences pane: Where Bluetooth lives 416Ink System Preferences pane: Visible to pen-input tablet users only 417Automatic Login in the Users & Groups System Preferences pane: Don’t bother with the login screen 417Allow your Apple Watch to unlock your Mac 418Boot Camp Assistant app: Run Windows on your Mac really 418AirPlay Mirroring 419Handoff 420CHAPTER 24: SAFETY FIRST: BACKUPS AND OTHER SECURITY ISSUES 421Backing Up is (Not) Hard to Do 422Backing up with Big Sur’s excellent Time Machine 422Backing up by using the manual, brute-force method 426Backing up by using commercial backup software 427Why You Need Two Sets of Backups 428Non-Backup Security Concerns 429About viruses and other malware 429Firewall: Yea or nay? 431Install recommended software updates 433Protecting Your Data from Prying Eyes 434Blocking or limiting connections 434Locking down files with FileVault 434Setting other options for security 435CHAPTER 25: UTILITY CHEST 439In the Applications and Utilities Folders 439Calculator 439Activity Monitor 441Disk Utility 442Grapher 447Keychain Access 447Migration Assistant 449System Information 450Terminal 450Capturing Your Screen 451Big Sur screen-shooting 101 452Big Sur screen-shooting options 453Big Sur screen recording 454CHAPTER 26: TROUBLESHOOTING MACOS 457About Startup Disks and Booting 457Finding or creating a startup disk 458They call it a prohibitory sign for a reason 458Recovering with Recovery HD 460Step 1: Run First Aid 460Step 2: Safe boot into Safe mode 461Step 3: Zapping the PRAM/NVRAM 462Step 4: Reinstalling macOS 463Step 5: Things to try before taking your Mac in for repair 463If Your Mac Crashes at Startup 464Optimizing Storage 465PART 7: THE PART OF TENS 467CHAPTER 27: TEN WAYS TO SPEED UP YOUR MAC EXPERIENCE 469Use Those Keyboard Shortcuts 470Improve Your Typing Skills 471Change Your Resolution 471Purchase a Faster Mac 473Add RAM 473Add a Second Display 474Use Your iPad as a Second Display 474Upgrade to a Solid-State Drive (SSD) 475Get More Storage 476Subscribe to My Free Newsletter 477CHAPTER 28: TEN GREAT WEBSITES FOR MAC FREAKS 479The Mac Observer 480Macworld 480TidBITS 480iMore 481AppleWorld.Today 481The Wirecutter 481Apple Support 482Other World Computing 482dealmac/dealnews 483Working Smarter for Mac Users 483Index 485
Linux Security Fundamentals
Linux Security Fundamentals provides basic foundational concepts of securing a Linux environment. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.This book is useful for anyone considering a career as a Linux administrator or for those administrators who need to learn more about Linux security issues. Topics include:* Security Concepts* Encryption* Node, Device and Storage Security* Network and Service Security* Identity and PrivacyReaders will also have access to Sybex's superior online interactive learning environment and test bank, including chapter tests, a practice exam, electronic flashcards, a glossary of key terms.DAVID CLINTON is a Linux server admin and Amazon Web Services solutions architect who has worked with IT infrastructure in both academic and enterprise environments. He has created video courses teaching AWS and Linux administration, server virtualization, and IT security for Pluralsight. He has also written or cowritten a dozen technology books, including AWS Certified Solutions Architect Study Guide: Associate (SAA-C01) Exam, Second Edition, and AWS Certified Cloud Practitioner Study Guide: Foundational (CLF-C01) Exam.Introduction xiiiCHAPTER 1 USING DIGITAL RESOURCES RESPONSIBLY 1Protecting Personal Rights 2Protecting Digital Privacy 4What is Personal Data? 4Where Might My Personal Data Be Hanging Out? 4What Are My Responsibilities as a Site Administrator? 6Can Escaped Genies Be Forced Back into Their Bottles? 6What Can I Do as a User? 7Establishing Authenticity 7Think About the Source 8Be Aware of Common Threat Categories 8Summary 9Back to the Basics 10Review Questions 11CHAPTER 2 WHAT ARE VULNERABILITIES AND THREATS? 15The Basics: What Are We Trying to Accomplish Here? 16What Are Vulnerabilities and Threats? 17What Can Be Exploited? 17Who’s Doing the Exploiting? 18Why Do They Attack? 19Common Vulnerabilities 20Software Vulnerabilities 20Hardware Vulnerabilities 21Bioware Vulnerabilities 21Digital Espionage 21USB Devices 21Backdoors 22Wireless Entry Points 22Stolen Credentials 23Data Breaches 23Identity Theft (Besides Breaches) 24Malware 24Network-Based Attacks 25Man-in-the-Middle Attacks 25Denial-of-Service and Distributed Denial-of-Service Attacks 26Network Routing Attacks 26Summary 26Back to the Basics 27Review Questions 28CHAPTER 3 CONTROLLING ACCESS TO YOUR ASSETS 33Controlling Physical Access 34Understanding Your Devices 34Protecting Your Devices 36Managing Authentication Through Effective Password Use 38Managing Authorization Through Permissions 44Controlling Network Access 45Firewalls 45Virus and Malware Protection 48Educating Your Users 49Controlling Software Sources 50PC Software Repositories 51Mobile Package Management 51Summary 52Back to the Basics 52Review Questions 54CHAPTER 4 CONTROLLING NETWORK CONNECTIONS 59Understanding Network Architecture 60The Transmission Control Protocol 60The Internet Protocol 61Understanding the Domain Name System 64Auditing Networks 65Network Auditing Tools 66Automating Audits 70Securing Networks 71Patch Your Software 71Physically Secure Your Infrastructure 73Secure Your Network Behavior 73Other Stuff 74Summary 74Back to the Basics 75Review Questions 76CHAPTER 5 ENCRYPTING YOUR DATA AT REST 81What is Encryption? 82Encryption Usage Patterns 85What Should You Encrypt? 85Understanding Hashing vs. Encryption 86What Are Blockchains? 86Encryption Technologies 87Summary 89Back to the Basics 89Review Questions 90CHAPTER 6 ENCRYPTING YOUR MOVING DATA 93Website Encryption 94Why You Should Use Encryption 95How Website Encryption Works 96Generating Certificates 98Email Encryption 99GNU Privacy Guard 100Does Gmail Encrypt Your Emails? 100Working with VPN Connections and Software Repositories 100Securing Your Actions Using VPNs 101Securing Transfers from Software Repositories 104Summary 105Back to the Basics 105Review Questions 106CHAPTER 7 RISK ASSESSMENT 109Conducting Open Source Intelligence Gathering 111Accessing Public Vulnerability Databases 112Vulnerability Data Frameworks 112Vulnerability Data Formats 113Vulnerability Data Metrics 114Vulnerability Data Management Tools 114Conducting Vulnerability Scans 115Conducting Penetration Tests 117Attack Vectors 118Tooling Frameworks 118Follow-Up 119Summary 119Back to the Basics 120Review Questions 121CHAPTER 8 CONFIGURING SYSTEM BACKUPS AND MONITORING 125Why You Need to Get Backups Right the First Time 127Appreciating the Risks 128Spreading Your Backups Across Multiple Sites 129Testing Your Backups 130Meeting Regulatory Compliance 131Backup Types 132Incremental Backups 132Differential Backups 133Backup Life Cycles 133Multitier Backups 133Multisite Storage Solutions 134Disaster Recovery Planning 134Configuring Monitoring and Alerts 135Working with System Logs 135Intrusion Detection 136Summary 137Back to the Basics 138Review Questions 139CHAPTER 9 RESOURCE ISOLATION DESIGN PATTERNS 143Configuring Network Firewalling 145Balancing Public and Private Networks 145Building Isolated Development Environments 147Working with Sandbox Environments 148Use Cases for Sandboxes 148Sandbox Designs 149Controlling Local System Access 150Configuring Mandatory Access Controls 150Setting Usage Quotas 151Summary 152Back to the Basics 152Review Questions 153APPENDIX ANSWERS TO REVIEW QUESTIONS 155Chapter 1: Using Digital Resources Responsibly 156Chapter 2: What are Vulnerabilities and Threats? 157Chapter 3: Controlling Access to Your Assets 158Chapter 4: Controlling Network Connections 160Chapter 5: Encrypting Your Data at Rest 161Chapter 6: Encrypting Your Moving Data 162Chapter 7: Risk Assessment 163Chapter 8: Configuring System Backups and Monitoring 165Chapter 9: Resource Isolation Design Patterns 166Index 167