How To Install and Generate Audit Reports in CentOS 7 or RHEL 7VCP Muthukrishna
This document provides instructions on how to install and configure auditing on CentOS 7. It describes how to install the audit packages, add and manage audit rules to monitor specific files and directories, perform searches of the audit logs, and generate various audit reports. Commands are provided to list rules, add rules to watch files and their permissions, delete rules, search the logs by criteria like file, user, or group, and produce summary reports on authentication attempts and logins. System calls are also mapped to their numeric identifiers.
Percona Live 2012PPT: introduction-to-mysql-replicationmysqlops
This document provides an overview of MySQL replication including:
- Replication enables data from a master database to be replicated to one or more slave databases.
- Binary logs contain all writes and schema changes on the master which are used by slaves to replicate data.
- Setting up replication involves configuring the master to log binary logs, granting replication privileges, and configuring slaves to connect to the master and read binary logs from the specified position.
- Commands like START SLAVE are used to control replication and SHOW SLAVE STATUS displays replication status and lag.
The document discusses testing the limits of MySQL by creating an extremely long SQL query with over 4,000 "UNION ALL" selections of the value "b". This exceeded the maximum length of SQL queries that MySQL servers can execute, which is defined by the max_allowed_packet system variable and has a maximum value of 1GB. Creating such a long meaningless query demonstrated that MySQL has limitations on the maximum length of SQL statements.
This document discusses the increasing amount of code being written and the importance of code quality. It notes that the amount of code written has grown exponentially from 120 billion lines in 1990 to 250 billion lines in 2000 and a projected 500 billion lines in 2010. It states that if all the code was printed in 1mm font, it would stretch from the Earth to the Moon and beyond. It then discusses that code quality is subjective but involves clarity, consistency and lack of duplication. It advocates using automated metrics and analysis tools to evaluate code quality attributes like style, length of methods, duplication and complexity in order to provide objective guidance to developers.
The document discusses constraint satisfaction problems (CSPs). It defines a CSP as having variables with domains of possible values and constraints limiting the values variables can take. A solution assigns values to all variables while satisfying constraints. The document outlines backtracking search and constraint propagation techniques for solving CSPs, including variable and value ordering heuristics, forward checking, and arc consistency. Arc consistency is more effective than forward checking at detecting inconsistencies and pruning the search space. The document provides examples of CSP formulations for map coloring, Sudoku, and N-Queens problems.
The document discusses various CPU benchmarks used to evaluate performance, including their pros and cons. It notes that synthetic benchmarks like Dhrystone and Whetstone have limitations and are outdated. Better benchmarks measure real applications or standardized workloads like CoreMark, which aims to replace Dhrystone by testing common algorithms like linked lists and matrices. The document also cautions that benchmarks can be manipulated and advocates for transparency in benchmarking methodology and results.
This document summarizes an overview of symmetric encryption algorithms and modes, including one-time pads, stream ciphers, block ciphers like AES, and encryption modes like ECB, CBC, CTR, and XTS. It discusses the properties, advantages, and disadvantages of each. It also covers topics like AES-NI instructions, padding oracle attacks, parallelization of encryption/decryption, and attacks like plaintext recovery from ciphertext manipulation.
Dokumen ini memberikan panduan dasar untuk membuat aplikasi dengan .NET MAUI, meliputi instalasi Visual Studio dan .NET MAUI, membuat proyek baru, menginstal emulator Android, menulis "Hello World", dan memodifikasi tampilan antarmuka pengguna dengan mengubah properti XML pada berkas MainPage.xaml.
This document provides an overview and examples of using the Pytest testing framework. Some key points:
- Pytest allows writing tests in plain Python functions, with test discovery and running. It supports fixtures for dependency injection and parametrizing tests.
- Basic usage involves writing test functions prefixed with "test_" and running pytest to discover and execute them. Fixtures provide a way to inject dependencies into tests.
- Fixtures can be defined and applied at various scopes (function, class, module). They support dependency injection, parameterization, setup/teardown functionality.
- Pytest offers many options for running tests selectively, debugging failures, tracing execution, and extending functionality through plugins. It aims to make
I used these slides when delivering a meetup about Unit Testing in Python. You can find the video at https://youtu.be/5QHArdkUeYc
This document discusses the increasing amount of code being written and the importance of code quality. It notes that the amount of code written has grown exponentially from 120 billion lines in 1990 to 250 billion lines in 2000 and a projected 500 billion lines in 2010. It states that if all the code was printed in 1mm font, it would stretch from the Earth to the Moon and beyond. It then discusses that code quality is subjective but involves clarity, consistency and lack of duplication. It advocates using automated metrics and analysis tools to evaluate code quality attributes like style, length of methods, duplication and complexity in order to provide objective guidance to developers.
The document discusses constraint satisfaction problems (CSPs). It defines a CSP as having variables with domains of possible values and constraints limiting the values variables can take. A solution assigns values to all variables while satisfying constraints. The document outlines backtracking search and constraint propagation techniques for solving CSPs, including variable and value ordering heuristics, forward checking, and arc consistency. Arc consistency is more effective than forward checking at detecting inconsistencies and pruning the search space. The document provides examples of CSP formulations for map coloring, Sudoku, and N-Queens problems.
The document discusses various CPU benchmarks used to evaluate performance, including their pros and cons. It notes that synthetic benchmarks like Dhrystone and Whetstone have limitations and are outdated. Better benchmarks measure real applications or standardized workloads like CoreMark, which aims to replace Dhrystone by testing common algorithms like linked lists and matrices. The document also cautions that benchmarks can be manipulated and advocates for transparency in benchmarking methodology and results.
This document summarizes an overview of symmetric encryption algorithms and modes, including one-time pads, stream ciphers, block ciphers like AES, and encryption modes like ECB, CBC, CTR, and XTS. It discusses the properties, advantages, and disadvantages of each. It also covers topics like AES-NI instructions, padding oracle attacks, parallelization of encryption/decryption, and attacks like plaintext recovery from ciphertext manipulation.
Dokumen ini memberikan panduan dasar untuk membuat aplikasi dengan .NET MAUI, meliputi instalasi Visual Studio dan .NET MAUI, membuat proyek baru, menginstal emulator Android, menulis "Hello World", dan memodifikasi tampilan antarmuka pengguna dengan mengubah properti XML pada berkas MainPage.xaml.
This document provides an overview and examples of using the Pytest testing framework. Some key points:
- Pytest allows writing tests in plain Python functions, with test discovery and running. It supports fixtures for dependency injection and parametrizing tests.
- Basic usage involves writing test functions prefixed with "test_" and running pytest to discover and execute them. Fixtures provide a way to inject dependencies into tests.
- Fixtures can be defined and applied at various scopes (function, class, module). They support dependency injection, parameterization, setup/teardown functionality.
- Pytest offers many options for running tests selectively, debugging failures, tracing execution, and extending functionality through plugins. It aims to make
I used these slides when delivering a meetup about Unit Testing in Python. You can find the video at https://youtu.be/5QHArdkUeYc
Developing Serverless application with Microsoft Azure and Cognitive ServicesJeff Chu
Introduction to Serverless computing, how to develop application with Microsoft Azure Functions and Logic Apps, plus Cognitive Service Text Semantic analysis.
The document discusses Microsoft's .NET conference and platform. It highlights that .NET Core 2.0 has been released and is available for download. It promotes .NET as being able to build any application for any platform and develop with any programming language. It also emphasizes that .NET sees large growth in active developers and popularity. Additionally, it provides statistics on customer success with .NET and shows how .NET powers a variety of applications and services.
Microsoft Azure IoT 手把手實作 @ K.NET by Maduka (2017-8-12)Jeff Chu
A hands-on lab exercise for Microsoft Azure IoT, help students to learn how to use IoT hub, SQL Database, Stream Analytics services to build their IoT solution.
Developing serverless applications with azure functionsJeff Chu
This document discusses developing serverless applications with Azure Functions. Azure Functions allow processing of events using small, isolated pieces of code called functions. Functions can be triggered by events from other Azure services and external sources. Functions are easy to develop, scale automatically, and only charge for the time spent processing events.
The document discusses new features in C# 7.0 including tuples, pattern matching, out variables, and more. It provides code examples demonstrating how to use tuples to return multiple values from functions, type patterns to match types in switch statements, and when conditions to add additional checks to case statements. The examples show enhanced control flow options in C# with these new features.
The document discusses containers and how they compare to virtual machines. It explains that containers provide operating system-level virtualization where the kernel is shared among containers, unlike virtual machines which virtualize hardware. This allows containers to have faster startup and be more resource efficient. The document then provides steps for setting up a container environment on Windows and details how to build, run, distribute, and update container images.
This document discusses Microsoft Azure's support for Linux and Java workloads. It provides an overview of pre-built Linux virtual machine images on Azure including popular distributions like Oracle Linux and Windows Server. It also outlines options for deploying Java applications on Azure infrastructure services, platform services, and using common Java APIs and tools across deployment models. Customer quotes are provided praising Azure's scalability and cost benefits compared to on-premise Linux servers.
#34: Git Deployment is Native, or through a Service hook from CodePlex, GitHub or BitBucket
#35: Slide Objectives:Explain that Windows Azure Web Sites supports Classic ASP, ASP.NET, PHP, and Node.js out of the box and that you can also host any custom FastCGI handler.Notes:
#36: Git Deployment is Native, or through a Service hook from CodePlex, GitHub or BitBucket