Intelligentedu
Free Computer and I.T. Books


April 13, 2010

Several Hundred Computer and Programming eBooks

Here is a ebook download repository site containing several hundred IT, computer and programming ebooks in the topics listed and sub-directories linked below. Most of these are in either pdf or chm formats.


Programming eBooks
 - C and C++ programming
 - Java programming
 - Python programming
 - Perl 
 - Shell Scripting
 - Assembly language

Unsorted Computer eBooks
   Linux programming, C++ programming,
   Java, Oracle, Unix, CISSP, Firewalls,
   Encryption, Perl, Java, JDBC, LPI Linux,
   SQL Server, MySQL, Networking

Linux eBooks
   Linux programming, Securing Linux,
   Linux Networking, Linux Tools,
   Linux Kernel, Linux Commands
   Linux Device Drivers. Linux Certification



SQL and Database eBooks
   SQL, SQL Server, Linux, MySQL,
   Oracle database, PostgreSQL,
   Berkeley DB

Security eBooks
   Security+ Certification, VPN, Snort
   Network Security, Firewalls, Wireless
   Security, XML Security

Networking eBooks

Coding and Software Methodology eBooks

Miscellaneous eBooks
   Algebra, Trigonometry, Biology, Calculus
   Chemistry, Economics, Electronics,
   Forensic Science, Geology, Physics,
   Algorithms



Tags for this post>> | | | | | | | | | | | |


Filed under: Free Computer and I.T. Books — computer_teacher @ 8:14 pm


March 19, 2010

102 Computer and Programming eBooks

Here are 102 computer and programming ebooks covering several areas, as linked and listed below, including C++ programming, Networking progamming, Ajax, Python, and computer security. Most of these freely available ebooks are in pdf and chm format.


C and C++ ebooks
 - 12 C++ programming ebooks
 - 4 C programming ebooks
 - 9 Network programming ebooks

Ajax ebooks
 - 4 Ajax programming ebooks

Python ebooks
 - 44 Python programming ebooks

Ruby ebooks
 - 3 Ruby programming ebooks

Jython
 - 4 Jython ebooks

Security ebooks
 - 19 computer security ebooks
 - Network security ebooks
 - Linux security ebooks
 - Windows security ebooks
 - Programming security
 - Database security

Database ebooks
 - PostgreSQL
 - Berkeley Database
 - SQLite



Tags for this post>> | | | | | | |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 4:26 pm


More Computer Learning and Support Docs

Here is the second of two posts of technical and computer learning and support documents, located at admi-lan. This posts cover Windows related content, along with some Windows Security and PC topics. The first post is here.


Windows - General
10 commands you should master when working with the Cisco IOS
10 customization tricks to save you time in Windows XP
10 handy Windows XP efficiency tricks
10 PowerToys that complete the Windows toolset and save you precious time
10 registry hacks for hardening Windows XP security
10 things you can do when Windows XP won't boot
10 things you should do before installing Windows Vista on a computer
10 things you should know about fighting spyware in Windows XP
10 things you should know about Windows Vista's service hardening
10 things you should know about Windows XP Backup
10 things you should know about Windows XP's System Restore tool
50+ keyboard shortcuts for moving faster in Windows XP
Activer le mode d'édition rapide de la console DOS
Add more destinations to Windows Send To command
Add UNC information to the command prompt in XP
anatomy_of_winxp_system_information
Augmenter la vitesse d'accès au partage réseau
bios_beep_codes_list1
Boot Windows XP from a USB flash drive
Changez la clé de produit de Windows XP Pro Corporate
Clean out Windows XP's Prefetch folder to speed up boot times
Comment configurer la protection de la mémoire dans Windows XP SP2
Comment fonctionne la clé d'activation de Windows XP
Configure Microsoft Windows XP Remote Desktop
Configure multiple hardware profiles for a laptop
Configuring Windows XP security after you install Service Pack 2
Configuring Windows XP to use a WSUS Server
Configuring Windows XP's Indexing Service the right way
Create a shortcut to search Active Directory shared folders in XP
Create a TCP-IP boot disk for installing Win2K-XP over the network
Creating your own Sleep button in Windows XP
Customizing the XP boot logo
Delete cached user profiles with a Windows registry tweak
Delete user profiles in Windows 2000 Pro with Delprof
Determining whether USB 2.0 is on your Windows XP machine
Disabling Windows Messenger on a Windows XP machine
Don't let Windows XP startup problems leave you dead in the water
Easily create date-based folder names in Windows XP
Eradicate Windows XP shutdown problems
Exploit enhanced networking functionality in Windows Vista
Extract troubleshooting info from Windows XP BSOD error messages
Fix for problematic parallel printer port in Windows XP
Get IT Done - Change the product key on Windows XP
Get IT Done - Setting up an FTP server with Windows 2000
Get system info from Windows XP's Help and Support Center
Help your users work effectively with Windows XP Pro
Implement and manage Windows XP Professional user and desktop settings
Installing Windows Vista - The good, the bad, and the ugly
Lock floppy drives on Windows 2000 Pro machines with Floplock
Make searching for image files easier in Windows XP by assigning keywords
Making the switch to Microsoft Update on Windows XP machines
Mapping drive letters to local folders in Windows XP
Master remote connections in Windows XP
Maximize the Performance of Windows XP
Monitor and optimize Windows XP Pro system performance and reliability
Pare down the Windows XP Start menu's most frequently used programs list
Power Checklist - Securing Windows XP
Provide remote assistance on computers behind a NAT device
Quickly gather MAC addresses in Windows XP with ARP
Quickly view information on multiple hard drives at the same time
Recover a damaged Windows XP user profile
Remove your name from the Start menu in Windows XP
Removing the Files Stored on This Computer group from My Computer in Windows XP
Removing unused device drivers from Windows XP machines
RPC service configuration causes serious problems following a Windows XP SP2 install
Safely remove the Windows XP Service Pack 2 Uninstall files
SafeMode
Save your sanity with these fixes for Windows XP multimedia annoyances
Schedule a restart operation with Windows XP's Shutdown utility
Scheduling Disk Defragmenter in Windows XP
Securing an auto logon in Windows XP
Setting up a VPN with Windows 2000
Speed up Windows XP's defrag operations
Startup Repair Tool will automatically diagnose and fix startup problems
Take advantage of the Windows XP Start menu's pinned items list
Take advantage of Windows XP's Alt-Tab Replacement tool
Troubleshoot Windows XP with the Driverquery command
Tune Windows XP to speed up boot and shutdown times
Uncover hardware that the Windows XP Device Manager hides
Understanding Windows XP's environment variables
Use these four Registry tweaks to accelerate Windows XP
Using the Files and Settings Transfer Wizard as a quick file backup tool in Windows XP
Using the Windows Installer CleanUp Utility in Windows XP
Windows Vista - User Account Control (UAC) levels cut down on pop ups
Windows Vista improves disk performance
Windows Vista's service hardening adds a valuable layer of protection
Windows XP services that can be disabled
Working with (and around) Windows Vista User Account Control


Servers OS
10 things you should know before deploying Microsoft Windows Small Business Server 2003
46 things to check when you're having server problems
Automate the software management and upgrade process
Consider these points when upgrading from WinNT to Win2K
Copy files on your server while preserving permissions
Deploy updates to Windows 2000 Server with Windows Server Update Services
Disable the Administrator account in Windows Server 2003
Effectively implement and manage Windows Server 2003 security policies
Hack 07 -- Rename Mapped Drives
Hack 12 -- Get Event Log Information
Hack 18 -- Automate Creation of OU Structure
Hack 28 -- Get User Account Information
Hack 45 -- Use netsh
Hack 55 -- Restore the Metabase
Hack 67 -- Unattended Install of Components
Hack 74 -- Grant Administrative Access to DC
Hack 77 -- Security FAQ
Hack 98 -- Recover with Automated System Recovery
Hacking Windows-Specific Services on Windows Server 2003
Manage disk quotas on Windows server operating systems
Rescuing a failed domain controller - Disaster recovery in action
Secure traffic between SMTP servers in Windows 2000
Setting up and Managing a DHCP server in Windows 2000
Track per-user disk usage on Windows 2000 Server with Diskuse.exe
W2K server performance monitors can alert you to downtime problems
Windows Server 2003 Services


OS Security
10 things you should know about Automated System Recovery
Audit Win2K services and security with Subinacl
Chain Windows hot fixes for installation without multiple restarts
Check out Microsofts Baseline Security Analyzer
Critical flaws in Microsoft VM make Windows vulnerable
Design a desktop security policy with these five steps
Disable a Windows Context menu to prevent user tampering
Don't let your network management process create your biggest security flaws
Hacking Windows XP and Windows Server 2003
Streamline Windows administration by using command-line scripts to monitor system events, process
Top 10 valuable (but underused) Microsoft security technologies
View and manage permissions in Windows 2000 from a console
winxp_sp2


PCs - General
10 things you should do before letting users take their laptops out the door
10+ things you should know when deploying Windows desktops from images
10+ tools you should have in your support tech repair kit
10_things_troubleshooting_slow_pc
Disk usage monitoring
Get the basics on multilevel RAID sets
Learn how to make a USB drive bootable
Make the autorun.inf file for antomatic loading od CDs and DVDs
Make the autorun.inf file for your burned CD-ROMs
Protect data during power outages by adding a UPS to Windows 2000 Pro machines
Relive past glory with a few retro gaming hacks
The 10 most important things to teach your users
The 10 worst ways to communicate with end users



Tags for this post>> | |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 10:04 am


Computer Learning and Support Docs

Here is the first of two posts of technical and computer learning and reference documents, located at admi-lan. Many of these cover Microsoft and Windows related topics, but there are also other areas covered such as Linux, Networking, Cisco, Wireless, Security, and computer Harware. The second post is here.


Active Directory
10 things you should know about Active Directory domain trusts
Design your Active Directory tree with security in mind
Manage computers in Active Directory with these quick and easy recipes
Simplify Active Directory administration by mastering these essential tools

Antivirus
Consider these low-costs antivirus solutions
Guide installation de Symantec AntiVirus Corporate Edition 9x a usage des administrateurs
Symantec Antivirus 10.0 installation walk-through for administrators
Symantec Client Security 3.0 installation walk-through for administrators

Backups
Develop an effective data backup strategy
Disk-Based Backup & Recovery - Making Sense of Your Options
How to create a Backup-to-disk folder in Backup Exec for Windows Servers
Recover from almost any registry error in Windows Server 2003 and Windows XP by using these backu

BIOS
bios_beep_codes_list_v3
bypass_bios_password
Crack a BIOS password in a flash

Cisco
Recover lost passwords using Cisco configuration registers

DHCP
Create a superscope to solve the problem of dwindling IP addresses
IP subnetting made easy

DNS
10 things securing dns
Build a DNS server on Linux using BIND
Build a scalable DNS infrastructure
Configurations and registry edits to help you secure your DNS servers
Configure a Win2K DNS server to forward external requests
Create a superscope to solve the problem of dwindling IP addresses
IP subnetting made easy
Lock down DNS with these tips
Manage the DNS client cache in Windows 2000 Pro
Nslookup screenshots - Troubleshooting DNS problems

Exams
Prepare for CompTIA's Network+ exam with more than 100 practices questions on network media and t

Firewalls
An Introduction to Client Firewalls
Best practices for managing firewall logs
Build a floppy-based router - firewall with Freesco
Configure firewall security on a SonicWALL device
Configure SonicWALL VPN Connections
Design the best security topology for your firewall

General Security
10 dumb things IT pros do that can mess up their networks
10 security problems unique to IT
10 ways to monitor what your users are doing with company computers
10+ e-mail best practices to share with your users
Configuring Windows Security
Debunking two myths about the Windows administrator account
file folder print rights
Investigate what hackers do, how they do it, and how you can protect yourself
Is encryption really crackable
securityresource2
See why even a simple firewall is better than nothing
The importance of an e-mail usage policy
Windows 101- Know the basics about NTFS permissions

Hardware
10 things you should know about deploying a UPS
10+ tools you should have in your support tech repair kit
A dead laptop battery doesnt have to be a disaster
Boost server disk I-O performance with a battery-backed write cache
Closely check those auto-detected BIOS settings
computer_hardware_inventory_list
CPU installation requires a delicate touch
Detect hard disk failures before they happen
Don't dismiss mechanical problems when troubleshooting CD-ROM drives
Duplicate a hard drive with a floppy disk
Extend the life of your printers with these tips
File systems 101 - FAT
Get the nitty gritty about SCSI
Get the pros and cons of Parallel ATA and SATA 1
Get the pros and cons of SATA II
Hard drive failure troubleshooting checklist
Learn about 'specialty' RAID levels
Monitor a UPS with the NUT package
Put your modem to work with Windows XP
Setup and troubleshoot Windows XP hardware components and device drivers
Understand 'single digit' RAID levels

IIS
Administer and customize FrontPage Server Extensions in IIS
Basic strategies for securing Internet Information Server
Configure and maintain the SMTP service in IIS 5.0
Lock it down - Windows 2000 IIS

Internet Security
10 reasons to use ISA Server 2004 as your remote access VPN server and VPN gateway
Another Microsoft security flaw threatens Internet users trust
Avoid getting blacklisted - stop relaying spam
Learn to surf the Web anonymously
Securing Your Online Data Transfer with SSL
Use DHCP Class to deny Internet access to unauthorized machines

Linux
Configure Linux to read your PC floppy disks
Create a Linux boot CD to recover a failed server
Decentralize Linux security with Sudo
Five steps to deploying Linux in the enterprise
Linux 101- Use ifconfig in Linux to configure your network
Set up a Linux VPN server by following these 10 steps

Network
10 commands you should master when working with the Cisco IOS
10 things you should know about AD domain trusts
100 things you should know about handling net admin tasks more effectively
10_things_netsh
Adaptec 1200a
Add Macs To A Windows Workgroup
Afficher les erreurs reseaux
An efficient and affordable network monitoring solution for SMEs
Automate networking tasks with Jarevas OpForce
cat_5_patch_cable_guide
Cisco administration 101- Routing redistribution
Common causes of network slowdowns
Configure network load balancing in Windows 2000
Configure TCP-IP graphically with Wntipcfg
Create an IP addressing plan that will grow
Enterprise Performance Management - A Framework for Optimizing Network and Application Performanc
IP subnetting made easy
Network_Documentation_Checklist
Router Configuration 101 - Setting up the router
Save time using batch files to perform repetitive tasks in a Windows environment
Speed up the switch port initialization process
Synchronize time throughout your entire Windows network
TCPIP_fundamentals
Unearthing the Openfiles command-line tool in Windows XP

Network Security
10 ways to monitor what your users are doing with company computers
10_things_wsus
AppSec can help restrict application access in Win2K
At last real wireless LAN security
Automate your network monitoring process
Cacls_exe_quikref
Centralize authentication with a Win2K RADIUS server
Centrally manage desktop security with Zone Labs Integrity
Disable NetBIOS and SMB to protect public Web servers
DoS protection
Essential steps to a secure network
Hacking the hacker - How a consultant shut down a malicious user
Help users create complex passwords that are easy to remember
Lock down SNMP traffic using IPSec
Monitor traffic on a network for free with Ethereal
NAP offers a network access control solution for SMBs
Resetting Windows XP Group Policy Refresh Interval
Secure your network for success with these resiliency best practices
security_policy_checklist

Palm
Connect your Palm or Pocket PC to a WLAN with these 802

SQL
10 common SQL Server problems and solutions
BLDR-QS-SQLServer
Configure Access and SQL ODBC connections for user databasà
Five tips to secure SQL Server 2000
Query more useful information by deploying SQL Server 2005 Reporting Services

Terminal Services
Check out these hidden extras for Win2K Terminal Services

VPN
10 things you should know about troubleshooting VPN connections
Configure Windows XP Professional to be a VPN server
Configuring certificates for an L2TP-IPSec VPN
Don't let VPN users be the weak link in network security
Join a domain during Windows logon using a VPN client

Wireless
10 things you should do to protect your network against wireless devices
ultimate guide to enterprise wireless LAN security



Tags for this post>> | | | | | |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 4:58 am


May 4, 2009

Security+ Essentials Online Book

Here is an excellent online book at techotopia, Security+ Essentials Online Book, that provides essential computer and networking security information. This computer security book gives you the knowledge needed to pass the CompTIA Security+ certification exam. It provides a clear understanding of both the threats faced by I.T. and with implementing a comprehensive security infrastructure. The 15 sections cover a variety of computer security topics and will assist anyone who needs to understand these when deploying and administering a secure I.T. environment.


Table of Contents  of Security+ Essentials:

About Security+ Essentials

Mandatory, Discretionary, Role and Rule Based Access Control
 - An Overview of Access Control
 - Mandatory Access Control
 - Discretionary Access Control
 - Role Based Access Control
 - Rule Based Access Control

Authentication and Identity Verification
 - What is Authentication?
 - Username and Password
 - Challenge Handshake Authentication Protocol (CHAP)
 - Kerberos Authentication
 - Mutual Authentication
 - Certificates
 - Authentication using Tokens
 - Biometrics

An Overview of IT Security Threats and Attacks
 - TCP and UDP Based Denial of Service (DoS) Attacks
 - Distributed Denial of Service (DDoS) Attacks
 - Back Door Attacks
 - IP and DNS Spoofing Attacks
 - Man in the Middle Attacks
 - Replay Attacks
 - TCP/IP Hijacking
 - Mathematical Attacks
 - Password Guessing
 - Brute Force Password Attacks
 - Dictionary Password Attacks
 - Password Cracking

Software Exploitation, Malicious Code and Social Engineering
 - Software Exploitation
 - Malicious Code
 - Viruses
 - Trojan Horses
 - Logic Bombs
 - Worms
 - Social Engineering

Identifying Common and Nonessential TCP/IP Ports and Services
 - Understanding Ports and Services
 - Securing Ports and Services
 - Port Scanning
 - Primary TCP/IP Ports and Assignments

Understanding Communications Security
 - Remote Access
 - Virtual Private Network (VPN) Communications
 - Point-to-Point-Tunneling Protocol (PPTP)
 - Layer 2 Tunneling Protocol (L2TP)
 - Internet Protocol Security (IPSec)
 - 802.11x Wireless Connections
 - Dial-Up Access
 - Terminal Access Controller Access Control System (TACACS)
 - Remote Authentication Dial-In User Service (RADIUS)
 - Terminal Access Controller Access Control System Plus(TACACS+)
 - Secure Shell (SSH)

The Basics of Email and Web Security
 - Email Security
 - Pretty Good Privacy (PGP)
 - Secure Multipurpose Internet Mail Extension (S/MIME)
 - Dealing with Spam Email
 - Web Based Security (SSL and TLS)

IT Infrastructure Security
 - Understanding Firewalls
 - Packet-Filtering Firewalls
 - Proxy Service Firewalls
 - Stateful Inspection Firewalls
 - Routers
 - Switches
 - Wireless
 - DSL and Cable Modems
 - Remote Access Service (RAS)
 - Telecom/PBX
 - Virtual Private Networks (VPN)
 - Intrusion Detection Systems (IDSs)
 - Network Monitoring and Diagnostics
 - Simple Network Management Protocol (SNMP)

IT Media Security Basics
 - Cable Media
 - Coax Cable
 - Shielded and Unshielded Twisted Pair Cable (UTP/STP)
 - Fiber Optic Cable
 - Removable Storage Media
 - Hard Drives
 - Diskettes
 - Tape Storage
 - CD-R/DVD
 - Electronic Media

Network Security Topologies
 - DMZ
 - Internet
 - Intranet
 - Extranet
 - Virtual Local Area Network (VLAN)
 - Network Address Translation (NAT)
 - Tunneling

Intrusion Detection Systems
 - An Overview of Intrusion Detection Systems
 - IDS Architecture
 - Host-based Intrusion Detections Systems (HIDS)
 - Strengths of Host-based Intrusion Detection Systems
 - Weaknesses of Host-based Intrusion Detection Systems
 - Network-based Intrusion Detection Systems (NIDS)
 - Strengths of Network-based Intrusion Detection Systems
 - Weaknesses of Network-based Intrusion Detection Systems
 - Responding to Incidents

Security Baselines and Operating System, Network and Application Hardening
 - Security Baselines
 - Operating System Hardening
 - Network Hardening
 - Application Hardening
 - Web Servers
 - Email Servers
 - FTP Servers
 - DNS Servers

Cryptography Basics
 - What is Cryptography?
 - Algorithms
 - Hashing Algorithms
 - Symmetric Encryption Algorithms
 - Data Encryption Standard (DES)
 - Triple DES (3DES)
 - Advanced Encryption Standard (AES)
 - Blowfish
 - International Data Encryption Algorithm (IDEA)
 - CAST
 - Rivest Cipher (RC2, RC3, RC4, RC5, RC6)
 - Asymmetric Algorithms
 - RSA
 - Diffie-Hellman
 - ElGamal
 - Elliptic Curve Cryptography (ECC)
 - Cryptography Usage
 - Confidentiality
 - Integrity
 - Nonrepudiation
 - Authentication
 - Digital Signatures

An Overview of Public Key Infrastructures (PKI)
 - What is a Public Key Infrastructure?
 - Certificate Authorities (CA)
 - Registration Authorities (RA)
 - Certificate Repositories
 - Digital Certificate Structure
 - Certificate Lifecycles and Key Management
 - Centralized and Decentralized Infrastructures



Tags for this post>> |




February 16, 2009

Computing and Networking Classes and Tutorials

Here are HP's Free Computing and Networking Classes and Lessons. These will teach you Networking basics, Server technology, backup strategies,, security, troubleshooting, and wireless networking. These courses and tutorials are available 24/7 and you can enroll in them or take them at any time.


Networking 101 Class
Learn all the basics of networking so you can set up, secure and maintain your own network.

Servers 101 Class
Learn to select, install, configure, secure, support and upgrade a small business server network.

Six steps to computer security (quick lesson)
In this quick lesson, you'll learn how to protect your notebook and desktop computers from hackers, crackers, viruses, spam and other threats.

Laptop PCs: Basic Troubleshooting and Repair (quick lesson)
Learn how to fix or avoid the "gotchas" that are unique or common to laptop computers.

Laptop PCs: Troubleshooting Wireless Problems (quick lesson)
An important part of laptop PC troubleshooting involves wireless connections and security issues.

Simple backup strategies with HP Backup and Recovery Manager (quick lesson with podcast)
Learn how to back up and restore vital business data, applications and entire systems using HP Backup and Recovery Manager software.

HP Backup and Recovery Manager: Restore Files  (8:13)
Learn how to use HP Backup and Recovery Manager to restore files in this demonstration.

HP Backup and Recovery Manager: Schedule Backups  (13:34)
All HP business desktop and notebook computers have HP Backup and Recovery Manager. This demonstration shows you how to use this application to back up files.

IT infrastructure and its challenges: outsource or hire? (quick lesson)
As a business grows, its IT support needs become challenging. Learn how to decide if it makes sense to hire or contract for IT help.



Tags for this post>> | |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 11:18 pm


February 10, 2009

16 Free Classes for IT Professionals from HP

Here are HP's 16 Free Classes for IT Professionals, covering topics such as data protection, security, storage networks, Windows Server 2008, virtualization, firewalls, backup and recovery, IT infrastructure, and wireless networking.
Learning center - free online classes


Servers and Storage Solutions

Disaster preparedness through virtualization (quick lesson)
Learn what virtualization is, how it works and the practical application of including virtualization in your disaster recovery plan.

ERP: resource planning solutions
Enterprise resource planning (ERP) is a major undertaking for any business. Learn how ERP can streamline your business.

How to build a midsize IT core infrastructure  
Understand how IT managers at midsize companies can build and deploy a core IT infrastructure simply and effectively.

Introduction to storage networks
Improve your storage area network by assessing your current infrastructure, addressing evolving needs and getting the best return on storage network investments.

Protect your data: back up to tape, disk and the network
Learn the importance of backup to small and mid-sized businesses and how to design the right data protection solution for your organization.

Understanding Microsoft Windows Server 2008
This course is designed to give IT professionals an overview of the features offered in Microsoft Windows Server 2008.

Virtualize your infrastructure: deployment
Find out how to use virtualization to help you save money, expand your network resources and maximize your IT budget.


PC Solutions

Combating spam and spyware (with podcast)
This class will give you a thorough understanding of what spam and spyware is, how it works, and how to manage it.

Evaluating desktop virtualization solutions
This class provides a background in desktop virtualization to help you make decisions about implementing a desktop virtualization plan.

Exploring and implementing Gobi and 3G technology
Learn about the speed and flexibility of new Gobi chip technology and how to use it as a company-wide mobile and wireless networking tool.

Firewall basics (with podcast)
Learn what a firewall is, explore firewall hardware and software and get a TCP/IP tutorial for help in setting up your firewall.

HP Backup and Recovery Manager: schedule backups  (13:34)
All HP business desktop and notebook computers have HP Backup and Recovery Manager. This demonstration shows you how to use this application to back up files.

HP ProtectTools: security at your fingertips (quick lesson with podcast)
Learn how to enable the computer systems security components of HP ProtectTools, found pre-installed on most HP PCs.

Simple backup strategies with HP Backup and Recovery Manager (quick lesson with podcast)
Learn how to back up and restore vital business data, applications and entire systems using HP Backup and Recovery Manager software.

Simplify your IT infrastructure: reduce total cost of ownership
This blade tutorial teaches you how easy it is to deploy server and storage blades to streamline management, save space and reduce costs.

Wireless networking with Bluetooth (quick lesson)
This brief will explain what Bluetooth is and how to use it, as well as give a detailed comparison of Bluetooth with other wireless technologies.



Tags for this post>> | | |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 12:39 am


January 6, 2009

Programming and I.T. eBooks from ebook3000

Here is ebook3000.com, providing links to hundreds of techinical ebook downloads from many storage sites. These cover the categories listed and linked below. Also, here are some google "site:" searches on this website for several programming and I.T topics (to find more just replace the keyword with the one you need): Linux ebooksAjax ebooksJavascript ebooksPHP ebooksC++ ebooksC# ebooksJava ebooks, Networking, Security, Cisco, MySQL ebooks, SQL and SQL Server, Oracle, and Windows.


Categories of eBooks at ebook3000.com:

 - Business
 - Database
 - Graphic Design
 - Hardware
 - Internet
 - Microsoft
 - Web Development
 - Programming
 - Software
 - Engineering Technology
 - Magazine
 - Audiobooks
 - Study
 - Security related
 - Science
 - Games related



Tags for this post>> | | | | | | |


Filed under: Free Computer and I.T. Books — computer_teacher @ 10:52 pm


July 17, 2008

50 Computer and Networking Security Videos

Here are 50 Computer Security Tutorial Videos hosted by security-freak.net. This site's author says that it is an attempt to lower the entry barrier for starting computer and network security research. Its objective is to present free videos to explain difficult security topics, such as raw sockets, packet injection, etc. This site will teach you many computer security topics, but it is left to the visitor to further pursue what is taught and to experiment and learn further.


Basic Socket Programming
4 Videos - 65 mins

Presentation on Socket Programming basics  (25 mins)
"Type with Me" exercise - a simple TCP server  (19 mins)
Coding a TCP Echo server  (13 mins)
Coding a TCP Echo client  (9 mins)


Packet Sniffing using Raw Sockets
7 Videos - 86 mins

Presentation on raw socket basics  (14 mins)
Sniffer coding basics  (15 mins)
Sniffer - Ethernet header parsing  (10 mins)
Sniffer - IP header parsing  (14 mins)
Sniffer - TCP header parsing  (10 mins)
Sniffer - Data parsing  (9 mins)
A look at Tcpdump and Ethereal  ( 14 mins)
 

Packet Injection using Raw Sockets

6 Videos - 75 mins

Packet injection basics presentation  (10 mins)
Your first packet injection program  (9 mins)
Ethernet header contruction & injection  (10 mins)
IP header construction & injection  (14 mins)
TCP header and data contruction & injection  (17 mins)
ARP Request query injector  ( 15 mins)

 
Architecture of A Proactive Security Tool
4 Videos - 43 mins

The "Sniff - Think - Inject" logic - a presentation  (10 mins)
Programming the Framework  (7 mins)
Communication via the Framework  ( 8 mins)
ARP DoS tool using the Framework  ( 18 mins)


Encryption Basics using RC4
3 Videos - 38 mins

RC4 basics presentation  (13 mins)
Understanding RC4 via simulations  (13 mins)
File encryption and decryption using RC4  ( 12 mins)
 

How do Worms work?
2 Videos - 46 mins

Understand the basics of worms - a presentation  (20 mins)
Scanning techniques used by worms - lets code  (26 mins)


Madwifi-NG Wireless Driver Compilation Basics

4 Videos - 36 mins

Madwifi-NG Basics Presentation  ( 8 mins)
Madwifi-NG Driver Compilation - Part 1  (10 mins)
Madwifi-NG Driver Compilation - Part 2  (10 mins)
Madwifi-NG Driver Compilation - Part 3  ( 8 mins)
Wireshark for Wireless LAN  (802.11)  (17 mins)


History of Hacking

5 Videos - 50 mins

Part 1  ( 10 mins)
Part 2  (9 mins)
Part 3  ( 10 mins)
Part 4  (10 mins)
Part 5  (10 mins)


Misc. Fun Videos on Security
1 Videos - 5 mins

Why do we need WPA? - a real world hacking example  ( 5 mins)
Q&A with Bruice Schneier at Defcon 15  (40 mins)
Hacking VMware  ( 50 mins)


Tutorials on commonly used Security Tools
11 Videos - 115 mins

Nmap  (13 mins)
Dig  (11 mins)
Netcat  (14 mins)
Airdecap-ng  (5 mins)
Ngrep  (8 mins)
Wireshark  (16 mins)
Nbtscan  (11 mins)
Airodump-NG  (12 mins)
Pcap2Air  ( 11 mins)
Prism-Strip  (5 mins)
Simple-Replay  (5 mins))



Tags for this post>> |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 7:15 pm


Powered by WordPress