KINDLY REPLY HOW YOU LIKE IT

Programming Tutorials on different platforms

Any general and specialized interesting programming language training and exploration . Fun with knowledge .

Search This Blog

Thursday, March 11, 2010

CCNP

What is CCNP Certification?
CCNP Certification is awarded by Cisco Systems® and signifies the competency achieved in installing, configuring, and operating LAN, WAN, and dial access services in medium to large networks (500+ nodes or more), including use of these protocols: IP, IGRP, EIGRP, IS-IS, BGP, OSPF, Serial, Frame Relay, IP RIP, VLANs, RIP, Ethernet, Access Lists. CCNA is a pre-requisite for CCNP certification. The CCNP certification is awarded after successful completion of the following 4 exams:
1. Building Scalable Cisco Internetworks 640-901
2. Building Cisco® Multilayer Switched Networks, Exam 640-604
3. Building Cisco® Remote Access Networks, Exam 640-605
4. Cisco® Internetwork Troubleshooting, Exam 640-606
The fee for each of these exams is about US$125 (Except Foundations exam). The tests contains identification and situational questions. Recently, Cisco has introduced Flash based simulation questions in CCNP stream also.
2. What are the test requirements?
CCNP Cisco Certified Network Associate (CCNA) certification is recommended for students to enroll in the Cisco Certified Network Professional (CCNP) curriculum. This advanced curriculum trains students to install, configure and operate local-and wide-area networks (LANs and WANs), and dial access services for organizations with networks from 100 to more than 500 nodes with protocols and technologies such as: TCP/IP, OSPF, EIGRP, BGP, ISDN, Frame Relay, STP, and VTP. The focus is on developing those skills that enable students to implement scalable networks, build campus networks using multilayer switching technologies, create and deploy a global intranet, and troubleshoot an environment using Cisco routers and switches for multiprotocol client hosts and services.

CCNP features:

CCNP1—Advanced Routing

CCNP2—Remote Access

CCNP3—Multilayer Switching

CCNP4—Network Troubleshooting

CCNP1 Advanced Routing Competencies:

Upon completion of CCNP1, students will be able to perform advanced routing tasks including:

electing and configuring scalable IP addresses.
Implementing technologies to redistribute and support multiple, advanced, IP routing protocols such as OSPF, EIGRP, and BGP.
Configuring access lists.
Designing and testing edge router connectivity into a BGP network. CCNP2 Remote Access Competencies:

Upon completion of CCNP2, students will be able to perform advanced remote access tasks including:

Configuring Asynchronous connections.
Point-to-Point Protocol (PPP) architecture, protocol, callback, and compression.
ISDN architecture, protocol layers, BRI and DDR.
Configuring X.25, Frame Relay, and AAA. CCNP3 Multilayer Switching Competencies:

Upon completion of CCNP3, students will be able to perform multilayer switching tasks including

Fast Ethernet, Gigabit Ethernet.
VLAN basics, types, identification, and trunking protocol.
Spanning Tree Protocol.
MLS processes, and configuration.
Multicasting protocols, routing, and tasks. CCNP4 Network Troubleshooting Competencies:

Upon completion of CCNP4, students will be able to perform network-troubleshooting tasks in areas such as:


OSI Layers 1, 2, and 3.
TCP/IP, LAN switching, VLANs, Frame Relay, ISDN, Appletalk, Novell, EIGRP, OSPF, BGP Industry-Recognized Certification Cisco Certified Network Professional (CCNP) coursework prepares students for CCNP certification. A CCNP certified individual can perform the following tasks:

Implement appropriate technologies to build a scalable routed network
Build campus networks using multilayer switching technologies
Improve traffic flow, reliability, redundancy, and performance for campus LANs, routed and switched WANs, and remote access networks
Create and deploy a global intranet
Troubleshoot an environment that uses Cisco routers and switches for multiprotocol client hosts and services Positions for a CCNP certified individual include: ~

Network administrator
Level 2 support engineer
Level 2 systems engineer
Network technician
Deployment engineer Advance Your Career CCNP Certification Expand Your Professional Options Gaining and Certifying Advanced Skills
The CCNP certification validates an individual’s networking skills at the midcareer level. Candidates who pass the required proctored exams will receive a CCNP certificate from Cisco and may use the CCNP designation on their business cards.
CCNP forms the professional level of the Cisco Career Certification program.
Who is the course for? Anyone with a good background in Computer Networks and the Internet and preferably CCNA qualified. What will the course give you?

Preparation for the CISCO Certified Network Professional Exams
Advanced networking skills to design, install and maintain large routed computer networks.
Increased professional credibility by gaining high standards of technical expertise.
Skills necessary to improve your opportunities within the workforce.
The knowledge and skills necessary to take the CCNP exams What material is covered ? ~


Extending IP Addresses Using VLSMs
Configuring OFPF, Enhanced IGRP and BGP
Assembling and Cabling WAN Components
Using ISDN and DDR to Enhance Remote Connectivity
Scaling IP Addresses with PAT and NAT
Introduction to Switching Concepts and Virtual LANs
Support Resources for Troubleshooting
Workgroup Discovery Lab and CCO
Documenting Symptoms, Actions and Results
Tracking Log-ins and Connections
Troubleshooting VLANs on Routers and Switches


Exam Recommended Training US $
642-901 BSCI Building Scalable Cisco Internetworks (BSCI) 150
642-812 BCMSN Building Cisco Multilayer Switched Networks (BCMSN) 150
642-825 ISCW Implementing Secure Converged Wide Area Networks (ISCW) 150
642-845 ONT Optimizing Converged Cisco Networks (ONT) 150




Building Scalable Cisco Internetworks Exam (BSCI)(642-901) The Building Scalable Cisco Internetworks (BSCI 642-901) is a qualifying exam for the Cisco Certified Network Professional CCNP, Cisco Certified Design Professional CCDP, and Cisco Certified Internetwork Professional CCIP certifications. The BSCI 642-901 exam will certify that the successful candidate has important knowledge and skills necessary to use advanced IP addressing and routing in implementing scalability for Cisco ISR routers connected to LANs and WANs. The exam covers topics on Advanced IP Addressing, Routing Principles, Multicast Routing, IPv6, Manipulating Routing Updates, Configuring basic BGP, Configuring EIGRP, OSPF, and IS-IS. Exam Topics The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes the guidelines below may change at any time without notice. Implement VLANs.

Explain the functions of VLANs in a hierarchical network.
Configure VLANs (e.g., Native, Default, Static and Access).
Explain and configure VLAN trunking (i.e., IEEE 802.1Q and ISL).
Explain and configure VTP.
Verify or troubleshoot VLAN configurations. Conduct the operation of Spanning Tree protocols in a hierarchical network.

Explain the functions and operations of the Spanning Tree protocols (i.e., RSTP, PVRST, MISTP).
Configure RSTP (PVRST) and MISTP.
Describe and configure STP security mechanisms (i.e., BPDU Guard, BPDU Filtering, Root Guard).
Configure and Verify UDLD and Loop Guard.
Verify or troubleshoot Spanning Tree protocol operations.
Configure and verify link aggregation using PAgP or LACP. Implement Inter-VLAN routing.

Explain and configure Inter-VLAN routing (i.e., SVI and routed ports).
Explain and enable CEF operation.
Verify or troubleshoot InterVLAN routing configurations. Implement gateway redundancy technologies
Explain the functions and operations of gateway redundancy protocols (i.e., HSRP, VRRP, and GLBP).
Configure HSRP, VRRP, and GLBP.
Verify High Availability configurations. Describe and configure wireless client access.

Describe the components and operations of WLAN topologies (i.e., AP and Bridge).
Describe the features of Client Devices, Network Unification, and Mobility Platforms (i.e., CCX, LWAPP).
Configure a wireless client (i.e., ADU). Describe and configure security features in a switched network.

Describe common Layer 2 network attacks (e.g., MAC Flooding, Rogue Devices, VLAN Hopping, DHCP Spoofing, etc.)
Explain and configure Port Security,802.1x, VACLs, Private VLANs, DHCP Snooping, and DAI.
Verify Catalyst switch (IOS-based) security configurations (i.e., Port Security, 802.1x, VACLs, Private VLANs, DHCP Snooping, and DAI). Configure support for voice.
Describe the characteristics of voice in the campus network.
Describe the functions of Voice VLANs and trust boundaries.
Configure and verify basic IP Phone support (i.e. Voice VLAN, Trust and CoS options, AutoQoS for voice) Implementing Secure Converged Wide Area Networks (ISCW) (642-825) In the Building Cisco Remote Access Networks course, students learn how to build, configure and troubleshoot a remote access network to interconnect central sites to branch offices and home offices. Students also learn how to control access to the central site, as well as to maximize bandwidth utilization over the remote links. Exam Topics The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes the guidelines below may change at any time without notice. Implement basic teleworker services.

Describe Cable (HFC) technologies.
Describe xDSL technologies.
Configure ADSL (i.e., PPPoE or PPPoA).
Verify basic teleworker configurations. Implement Frame-Mode MPLS.

Describe the components and operation of Frame-Mode MPLS (e.g., packet-based MPLS VPNs).
Configure and verify Frame-Mode MPLS. Implement a site-to-site IPSec VPN

Describe the components and operations of IPSec VPNs and GRE Tunnels.
Configure a site-to-site IPSec VPN/GRE Tunnel with SDM (i.e., preshared key).
Verify IPSec/GRE Tunnel configurations (i.e., IOS CLI configurations).
Describe, configure, and verify VPN backup interfaces.
Describe and configure Cisco Easy VPN solutions using SDM. Describe network security strategies.

Describe and mitigate common network attacks (i.e., Reconnaissance, Access, and Denial of Service).
Describe and mitigate Worm, Virus, and Trojan Horse attacks.
Describe and mitigate application-layer attacks (e.g., management protocols) Implement Cisco Device Hardening
Describe, Configure, and verify AutoSecure/One-Step Lockdown implementations (i.e., CLI and SDM).
Describe, configure, and verify AAA for Cisco Routers.
Describe and configure threat and attack mitigation using ACLs.
Describe and configure IOS secure management features (e.g., SSH, SNMP, SYSLOG, NTP, Role-Based CLI, etc.) Implement Cisco IOS firewall. ~


Describe the functions and operations of Cisco IOS Firewall (e.g., Stateful Firewall, CBAC, etc.).
Configure Cisco IOS Firewall with SDM.
Verify Cisco IOS Firewall configurations (i.e., IOS CLI configurations, SDM Monitor). Describe and configure Cisco IOS IPS.

Describe the functions and operations of IDS and IPS systems (e.g., IDS/IPS signatures, IPS Alarms, etc.)
Configure Cisco IOS IPS using SD Optimizing Converged Cisco Networks (ONT) (642-845) The Optimizing Converged Cisco Networks (642-845 ONT) is a qualifying exam for the Cisco Certified Network Professional CCNP. The ONT 642-845 exam will certify that the successful candidate has important knowledge and skills in optimizing and providing effective QOS techniques for converged networks. The exam topics include implementing a VOIP network, implementing QoS on converged networks, specific IP QoS mechanisms for implementing the DiffServ QoS model, AutoQoS, wireless security and basic wireless management. Exam Topics The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes the guidelines below may change at any time without notice. Describe Cisco VoIP implementations.

Describe the functions and operations of a VoIP network (e.g., packetization, bandwidth considerations, CAC, etc.).
Describe and identify basic voice components in an enterprise network (e.g. Gatekeepers, Gateways, etc.) Describe QoS considerations.
Explain the necessity of QoS in converged networks (e.g., bandwidth, delay, loss, etc.).
Describe strategies for QoS implementations (e.g. QoS Policy, QoS Models, etc.). Describe DiffServ QoS implementations.
Describe classification and marking (e.g., CoS, ToS, IP Precedence, DSCP, etc.).
Describe and configure NBAR for classification.
Explain congestion management and avoidance mechanisms (e.g., FIFO, PQ, WRR, WRED, etc.).
Describe traffic policing and traffic shaping (i.e., traffic conditioners).
Describe Control Plane Policing.
Describe WAN link efficiency mechanisms (e.g., Payload/Header Compression, MLP with interleaving, etc.).
Describe and configure QoS Pre-Classify. Implement AutoQoS

Explain the functions and operations of AutoQoS.
Describe the SDM QoS Wizard.
Configure, verify, and torubleshoot AutoQoS implementations (i.e., MQC). Implement WLAN security and management.
Describe and Configure wireless security on Cisco Clients and APs (e.g., SSID, WEP, LEAP, etc.).
Describe basic wireless management (e.g., WLSE and WCS). Configure and verify basic WCS configuration (i.e., login, add/review controller/AP status, security, and import/review maps).
Describe and configure WLAN QoS.


I would be glad to receive any feedback/comments/questions from anyone intending to pursue Cisco certification track. Please email me at techinfiniteonline@gmail.com .
Kindly allow 24-48 hours for a reply. Thank you for reading, and good luck!

The views expressed here are the guide's views and do not represent that of Cisco® or any other Company. He can be reached at techinfiniteonline@gmail.com
Note: It is recommended to check with the official website for accurate and up-to-date information.

LINUX VIDEO TUTORIALS :



=======================================================================================

MD5SUM - Disc 1: 36265a537171e5d19331a10951b3d7ca
MD5SUM - Disc 2 : d8b741e57f2fe5a09eeb89b30584c0d4
MD5SUM - Disc 3 : 65065ac30215d0420b4188b20f01be13
Content Size: 5.3GB
Demos: here
Certificate of Completion: YES
LinuxCBT Security Edition encompasses 9 pivotal security modules:
1. Security Basics (fundamentals)
2. Proxy Security featuring Squid
3. Firewall Security featuring IPTables
4. SELinux Security - MAC-based Security Controls
5. Network Intrusion Detection System (NIDS) Security featuring Snort® NIDS
6. Packet | Capture | Analysis Security featuring Ethereal®
7. Pluggable Authentication Modules (PAM) Security
8. Open Secure Shell version 2 (OpenSSHv2) Security
9. OpenPGP with Gnu Privacy Guard (GPG) Security
LinuxCBT Security Edition is unparalleled in content, depth and expertise. It entails 89-hours, or ~ 2-weeks of classroom training. LinuxCBT Security Edition prepares you or your organization for successfully securing GNU/Linux & Open Source-based solutions. As a by-product, many of the covered concepts, utilities and tricks are applicable to heterogeneous computing environments, ensuring your coverage of the fundamentals of securing corporate infrastructures.
Recommended Prerequisites for:
* Any LinuxCBT Operating System Course (Classic/EL-4/SUSE/Debian Editions)
o Open mind & determination to master Linux and related open-source applications
o Basic understanding of networking concepts
o Access to a PC to follow the exercises
Basic Security - Module 1
* Boot Security
o Explore Dell PowerEdge BIOS Security-related features
o Discuss concepts & improve Dell PowerEdge BIOS security
o Explain run-time boot loader vulnerabilities
o Explore single-user mode (rootshell) and its inherent problems
o Modify default GRUB startup options & examine results
o Secure boot loader using MD5 hash
o Identify key startup-related configuration files & define boot security measures
o Identify key boot-related utilities
o Confirm expected hardware configuration
o Discuss INIT process, runlevel configuration & concepts
o Explore & tighten the security of the INIT configuration
*
* Shell Security
o Confirm expected applications
o Discuss Teletype Terminals (TTYs) and Pseudo Terminals (PTS)
o Identify common TTYs and PTSs
o Track current TTYs and PTSs - character devices
o Discuss concepts related to privileged and non-privileged use
o Restrict privileged login
o Use SSH and discuss TTYs
o Discuss the importance of consistent system-wide banners & messages
o Define and configure system banners for pre and post-system-access
o Identify user-logon history and correlate to TTYs
o Identify current user-connections - console-based and network-based
o Use lsof to identify open files and sockets
*
* Syslog Security
o Discuss Syslog concepts and applications
o Explain Syslog semantics - facilities & levels - message handling & routing
o Focus on security-related Syslog facilities
o Examine security logs managed by Syslog
o Configure Network Time Protocol (NTP) on interesting hosts
o Secure NTP configuration
o Ensure time consistency to preserve log-integrity
o Configure Syslog replication to preserve log-integrity
o Identify log discrepancies between Syslog hosts
*
* Reconnaissance & Vulnerability Assessment Tools
o Discuss Stage-1 host/network attack concepts
o Upgrade NMAP reconnaissance tool to increase effectiveness
o Identify NMAP files
o Discuss TCP handshake procedure
o Discuss half-open/SYN connections
o Perform connect and SYN-based host/network reconnaissance
o Identify potential vulnerabilities on interesting hosts derived from reconnaissance
o Examine NMAP logging capabilities
o Perform port sweeps to identify common vulnerabilities across exposed systems
o Secure exposed daemons/services
o Perform follow-up audit to ensure security policy compliance
o Discuss vulnerability scanner capabilities and applications
o Prepare system for Nessus vulnerability scanner installation - identify/install dependencies
o Generate self-signed SSL/TLS certificates for secure client/server communications
o Activate Nessus subscription, server and client components
o Explore vulnerability scanner interface and features
o Perform network-based reconnaissance attack to determine vulnerabilities
o Examine results of the reconnaissance attack and archive results
o Secure exposed vulnerabilities
*
* XINETD - TCPWrappers - Chattr - Lsattr - TCPDump - Clear Text Daemons
o Install Telnet Daemon
o Install Very Secure FTP Daemon (VSFTPD)
o Explore XINETD configuration and explain directives
o Configure XINETD to restrict communications at layer-3 and layer-4
o Restrict access to XINETD-protected daemons/services based on time range
* Secure Shell (SSH) & MD5SUM Applications
o Use Ethereal to examine SSH streams
o Generate RSA/DSA PKI usage keys
o Configure Public Key Infrastructure (PKI) based authentication
o Secure PKI authentication files
o Use SCP to transfer files securely in non-interactive mode
o Use SFTP to transfer files securely in interactive mode
o Configure SSH to support a pseudo-VPN using SSH-Tunnelling
o Discuss MD5SUM concepts and applications
o Compare & contrast modified files using MD5SUM
o Use MD5SUM to verify the integrity of downloaded files
*
* GNU Privacy Guard (GPG) - Pretty Good Privacy (PGP) Compatible - PKI
o Discuss GPG concepts & applications - symmetric/asymmetric encryption
o Generate asymmetric RSA/DSA GPG/PGP usage keys - for multiple users
o Create a local web of trust
o Perform encrypts/decrypts and test data-exchanges
o Sign encrypted content and verify signatures @ recipient
o Import & export public keys for usage
o Use GPG/PGP with Mutt Mail User Agent (MUA)
*
* AIDE File Integrity Implementation
o Discuss file-integrity checker concepts & applications
o Identify online repository & download AIDE
o Install AIDE on interesting hosts
o Configure AIDE to protect key files & directories
o Alter file system objects and confirm modifications using AIDE
o Audit the file system using AIDE
*
* Rootkits
o Discuss rootkits concepts & applications
o Describe privilege elevation techniques
o Obtain & install T0rnkit - rootkit
o Identify system changes due to the rootkit
o Implement T0rnkit with AIDE to identify compromised system objects
o Implement T0rnkit with chkrootkit to identify rootkits
o T0rnkit - rootkit - cleanup
o Implement N-DU rootkit
o Evaluate system changes
*
* Bastille Linux - OS-Hardening
o Discuss Bastille Linux system hardening capabilities
o Obtain Bastille Linux & perform a system assessment
o Install Bastille Linux
o Evaluate hardened system components
*
* top
Proxy Security - Module 2
* Squid Proxy Initialization
o Discuss Squid concepts & applications
o Discuss DNS application
o Configure DNS on primary SuSE Linux server for the Squid Proxy environment
o Confirm DNS environment
o Start Squid and evaluate default configuration
o Install Squid Proxy server
*
* General Proxy Usage
o Configure web browser to utilize proxy services
o Grant permissions to permit local hosts to utilize proxy services
clients
*
* Squid Proxy Logs
o Discuss Squid Proxy logging mechanism
o Identify key log files
o Discuss & explore the Access log to identify HITS and/or MISSES
o Discuss & explore the Store log to identify cached content
o Convert Squid logs to the Common Log Format (CLF) for easy processing
o Discuss key CLF fields
o Configure Webalizer to process Squid-CLF logs
o Revert to Squid Native logs
o Discuss key Native log fields
o Configure Webalizer to process Squid Native logs
*
* Squid Network Configuration & System Stats
o Discuss cachemgr.cgi Common Gateway Interface(CGI) script
o Explore the available metrics provided by cachemgr.cgi
o Change default Squid Proxy port
o Modify text/graphical clients and test communications
o Discuss Safe Ports - usage & applications
*
* Squid Access Control Lists (ACLs)
o Intro to Access Control Lists (ACLs) - syntax
o Define & test multiple HTTP-based ACLs
o Define & test ACL lists - to support multiple hosts/subnets
o Define & test time-based ACLs
o Nest ACLs to tighten security
o Implement destination domain based ACLs
o Exempt destination domains from being cached to ensure content freshness
o Define & test Anded ACLs
o Discuss the benefits of Regular Expressions (Regexes)
o Implement Regular Expressions ACLs to match URL patterns
o Exempt hosts/subnets from being cached or using the Squid cache
o Force cache usage
o Configure enterprise-class Cisco PIX firewall to deny outbound traffic
o Configure DNS round-robin with multiple Squid Proxy caches for load-balancing
o Discuss delay pool concepts & applications - bandwidth management
o Configure delay pools - to support rate-limiting
o Examine results of various delay pool classes
o Enforce maximum connections to deter Denial of Service (DoS) attacks
o Verify maximum connections comply with security policy
*
* Squid Proxy Hierarchies
o Discuss Squid cache hierarchy concepts & applications
o Ensure communications through a primary cache server - double-auditing
o
*
* top
Firewall Security - Module 3
* Intro IPTables
o Discuss key IPTables concepts
o OSI Model discussion
o Determine if IPTables support is available in the current kernel
o Identify key IPTables modules and supporting files
o Explore and examine the default tables
o Learn IPTables Access Control List (ACL) syntax
o Discuss ACL management
o Learn to Save & Restore IPTables ACLs
*
* IPTables - Chain Management
o Explore the various chains in the default tables
o Discuss the purpose of each chain
o Examine packet counts & bytes traversing the various chains
o Focus on appending and inserting new ACLs into pre-defined chains
o Write rules to permit common traffic flows
o Delete & Replace ACLs to alter security policy
o Flush ACLs - reset the security policy to defaults
o Zero packet counts & bytes - bandwidth usage monitoring
o Create user-defined chains to perform additional packet handling
o Rename chains to suit the security policy/nomenclature
o Discuss & explore chain policy
*
* IPTables - Packet Matching & Handling
o Explain the the basics of packet matching
o Identify key layer-3/4 match objects - (Source/Dest IPs, Source/Dest Ports, etc.)
o Explore the multi-homed configuration
o Discuss layer-3/4 IPTables default packet matching
o Discuss default layer-2 behavior
o Increase security by writing rules to match packets based on layer-2 addresses
*
* IPTables - State Maintenance - Stateful Firewall
o Discuss the capabilities of traditional packet-filtering firewalls
o Explain the advantages of stateful firewalls
o Examine the supported connection states
o Identify key kernel modules to support the stateful firewall
o Implement stateful ACLs & examine traffic flows
*
* IPTables - Targets - Match Handling
o Discuss the purpose of IPTables targets for packet handling
o Write rules with the ACCEPT target
o Write rules with the DROP target
o Write rules with the REJECT target
o Write rules with the REDIRECT target
o Confirm expected behavior for all targets
*
* IPTables - Logging
o Explore Syslog kernel logging configuration
o Define Access Control Entry (ACEs) to perform logging
o Explain the key fields captured by IPTables
o Log using user-defined chain for enhanced packet handling
o Log traffic based on security policy
o Define a catch-all ACE
o Use ACE negation to control logged packets
o Label log entries for enhanced parsing
*
* IPTables - Packet Routing
o Describe subnet layout
o Focus on the forward chain
o Write ACEs to permit routing
o Test connectivity
*
* IPTables - Network Address Translation (NAT)
o Discuss NAT features & concepts
o Discuss & implement IP masquerading
o Define Source NAT (SNAT) ACEs & test translations
o Create SNAT multiples
o Implement Destination NAT (DNAT) ACEs & test translations
o Define DNAT multiples
o Create NETMAP subnet mappings - one-to-one NATs
*
* IPTables - Demilitarized Zone (DMZ) Configuration
o Describe DMZ configuration
o Write Port Address Translation (PAT) rules to permit inbound traffic
o Test connectivity from connected subnets
o Configure DMZ forwarding (Routing)
o Implement Dual-DMZs - ideal for n-tiered web applications
*
* top
SELinux Security - Module 4
* Access Control Models
o Describe Access Control Model (ACM) theories (DAC/MAC/nDAC)
o Explain features & shortcomings of Discretionary Access Control (DAC) models
o Identify key DAC-based utilities
o Discuss the advantages & caveats of Mandatory Access Control (MAC)models
o Explore DAC-based programs
*
* SELinux - Basics
o Discuss subjects & objects
o Explain how SELinux is implemented in 2.6.x-based kernels
o Confirm SELinux support in the kernel
o Identify key SELinux packages
o Use sestatus to obtain the current SELinux mode
o Discuss subject & object labeling
o Describe the 3 SELinux operating modes
o Identify key utilities & files, which dictate the current SELinux operating mode
o Focus on the features of SELinux permissive mode
o Explore the boot process as it relates to SELinux
*
* SELinux - Object Labeling
o Discuss subject & object labeling
o Discuss the role of extended attributes (XATTRs)
o Expose the labels of specific objects
o Alter the lables of specific objects
o Configure SELinux to automatically label objects per security policy
o Reset the system and confirm labels on altered objects
o Explain security tuples
o Use fixfiles to restore object labels on running system per security policy
*
* SELinux - Type Contexts - Security Labels Applied to Objects
o Intro to object security tuples - security labels
o Attempt to serve HTML content using Apache in SELinux enforcing mode
o Identify problematic object security labels
o Serve HTML content in SELinux permissive mode
o Use chcon to alter object security labels
o Switch to enforcing mode & confirm the ability to serve HTML content
o Use restorecon to restore object security context (labels)
*
* SELinux - Basic Commands - Type & Domain Exposition
o ps - reveal subjects’ security context (security label) - Domains
o ls - reveal objects’ security label - Types
o cp - preserve/inherit security labels
o mv - preserve security labels
o id - expose subject security label
*
* SELinux - Targeted Policy - Binary
o Explain the Targeted Policy’s features
o Discuss policy transitions for domains
o Compare & contrast confined & unconfined states
o Exempt Apache daemon from the auspicies of the targeted policy’s confined state
o Evaluate results after exemption
o Explain the security contexts applied to subjects & objects
o Peruse key targeted binary policy files
o Identify the daemons protected by the targeted policy
o Discuss the unconfined_t domain - subject label
*
* SELinux - Targeted Policy - Source
o Install the targeted policy source files
o Identify & discuss TE and FC files
o Explore file_contexts - context definition for objects
o Discuss the file context syntax
o Explain the purpose of using run_init to initiate SELinux-protected daemons
o Switch between permissive & enforcing modes and evaluate behavior
o Peruse the key files in the targeted source policy
*
* SELinux - Miscellaneous Utilities - Logging
o Use tar to archive SELinux-protected objects
o Confirm security labels on tar-archived objects
o Use the tar substitute ’star’ to archive extended attributes(XATTRs)
o Confirm security labels on star-archived objects
o Discuss the role of the AVC
o Examine SELinux logs - /var/log/messages
o Alter Syslog configuration to route SELinux messages to an ideal location
o Use SETools, shell-based programs to output real-time statistics
o Install & use SEAudit graphical SELinux log-management tool
*
* top
Network Intrusion Detection System (NIDS) Security - Module 5
* Snort NIDS - Installation
o Peruse the LinuxCBT Security Edition classroom network topology
o Download Snort
o Import G/PGP public key and verify package integrity
o Identify & download key Snort dependencies
o Install current libpcap - Packet Capture Library
o Establish security configuration baseline
*
* Snort NIDS - Sniffer Mode
o Discuss sniffer mode concepts & applications
o Sniff IP packet headers - layer-3/4
o Sniff data-link headers - layer-2
o Sniff application payload - layer-7
o Sniff application/ip packet headers/data-link headers - all layers except physical
o Examine packets & packet loss
o Sniff traffic traversing interesting interfaces
o Sniff clear-text traffic
o Sniff encrypted streams
*
o Log to the active pseudo-terminal console and examine the packet flows
o Combine BPF qualifiers to increase packet-matching capabilities
o Use logical operators to define more flexible BPFs
o Read binary TCPDump files using Snort & BPFs
o Execute Snort NIDS in logging/daemon mode
*
* Snort NIDS - Cisco Switch Configuration
o Examine the current network configuration
o Identify Snort NIDS sensors and centralized DBMS Server
o Create multiple VLANs on the Cisco Switch
o Secure the Cisco Switch configuration
o Isolate internal and external hosts, sensors and DBMS systems
o Configure SPAN - Port Mirroring for internal and external Snort NIDS Sensors
o Examine internal and external packet flows
*
* Snort NIDS - Network Intrusion Detection System (NIDS) Mode
o Discuss NIDS concepts & applications
o Prepare /etc/snort - configuration directory for NIDS operation
o Explore the snort.conf NIDS configuration file
o Discuss all snort.conf sections
o Download & install community rules
o Execute Snort in NIDS mode with TCPDump compliant output plugin
o Download & install Snort Vulnerability Research Team (VRT) rules
o Compare & contrast community rules to VRT rules
*
* Snort NIDS - Output Plugin - Barnyard Configuration
o Discuss features & benefits
o Configure Syslog based logging and examine results
o Configure Snort to log sequentially to multiple output locations
o Implement unified binary output logging to enhance performance
o Discuss concepts & features associated with post-processing Snort logs
o Download and install current barnyard post-processor
o Use barnyard to post-process logs to multiple output destinations
*
* Snort NIDS - BASE - MySQL® Implementation
o Discuss benefits of centralized console reporting for 1 or more Snort sensors
*
* Snort® NIDS - Rules Configuration & Updates
o Discuss the concept of rules as related to Snort NIDS
o Examine Snort rule syntax
o Peruse pre-defined Snort rules
o Download & configure oinkmaster to automatically update Snort rules
o Confirm oinkmaster operation
*
* top
Packet Capture Analysis Security feat. Ethereal® - Module 6
*
*
* Ethereal® Graphical User Interface (GUI)
o Identify installation footprint
o Differentiate between promiscuous and non-promiscuous modes
o Configure X.org to permit non-privileged user to write output to screen
o Launch Ethereal GUI
o Identify the primary GUI components /Packet List | Packet Details | Packet Bytes/
o Discuss defaults
o Explore key menu items
*
* TCPDump | WinDump - Packet Capturing for /Linux|Unix|Windows/
o Discuss defaults, features and applications
o Use TCPDump on Linux to capture packets
o Log traffic using default PCAP/TCPDump format
o Discuss Berkeley Packet Filters (BPFs)
o Capture and log specific packets using BPFs for analysis with Ethereal
o Connect to Windows 2003 Server using Remote Desktop (RDesktop) utility
o Install WinDump and WinPCAP on Windows 2003 Server
o Identify available network interfaces using WinDump
o Capture and log packets using WinDump
o Capture and log specific packets using BPFs with WinDump for analysis with Ethereal
o Upload captures to Linux system for analysis in Ethereal
*
* Snort® NIDS Packet Capturing & Logging
o Discuss Snort NIDS’s features
o Confirm prerequisites - /PCRE|LibPCAP|GCC|Make/
o Download and Import Snort G/PGP key and MD5SUM for Snort NIDS
o Combine BPF qualifiers to increase packet-matching capabilities
o Use logical operators to define more flexible BPFs
o Create captures for further analysis with Ethereal
*
* Sun Snoop Packet Capturing & Logging
o Connect to Solaris 10 system and prepare to use Snoop
o Draw parallels to TCPDump
o Enumerate key features
o Sniff and log generic traffic
o Sniff and log specific traffic using filters
o Sniff using Snoop, HTTP and FTP traffic
o Save filters for analysis by Ethereal
o Snoop various Solaris interfaces for interesting traffic
*
* Layer-2 & Internet Control Messaging Protocol (ICMP) Captures
o Launch Ethereal
o Identify sniffing interfaces
o Capture Address Resolution Protocol (ARP) Packets using Capture Filters
o Discuss and Identify Protocol Data Units (PDUs)
o Identify default Ethereal capture file
o Peruse packet capture statistics
o Identify Cisco VOIP router generating ARP requests
o Peruse time precision features - deci - nano-seconds
o Discuss time manipulations - relative to first packet - actual time
o Reveal protocol information from layer-1 through 7
o Identify network broadcasts in the packet stream
o Generate Layer-2 ARP traffic using PING and capture and analyze results
o Sniff traffic based on MAC addresses using Ethereal and Capture FIlters
*
* User Datagram Protocol (UDP) Captures & Analyses
o Discuss UDP Characteristics
o Focus on Network Time Protocol (NTP)
o Setup NTP strata for testing between multiple systems
o Analyze NTP - UDP traffic using Ethereal
o Focus on Domain Name Service (DNS)
o Install a BIND DNS Caching-Only Server
o Analyze DIG queries
o Analyze ‘nslookup’ queries
*
* Transmission Control Protocol (TCP) Captures & Analyses
o Discuss TCP Characteristics - Connection-Oriented Services
o Explain TCP connection rules - Socket creation
o Sniff TCP traffic using Capture Filters in Ethereal
o Use Display Filters to parse TCP traffic
o Sniff FTP traffic
o Reconstruct FTP flows using TCP Stream Reassembly
o Differentiate between client and server flows
o Quantify client and server flows
o Discuss embedded Protocol Data Units (PDUs)
o Sniff Internet Protocol Version 6 (IPv6) traffic
o Peruse and discuss the IPv6:TCP:FTP traffic dump
o Analyze TCP Sockets
*
* Ethereal Display Filters - Post Processing Filters
o Identify previously captured - TCPDump - Ethereal - Snort - Snoop - Dumps
o Discuss features
o Explain Display Filter syntax
o Post-process previously captured traffic dumps
o Identify the various methods to exact display filters
o Filter data using the expression builder
o Filter traffic based on interesting properties
o Filter traffic using logical operators
*
* Ethereal Statistics
o Discuss features
o Explore the summary (metadata) of captured packets
o Peruse the protocol hierarchy - Layer’s 1 - 7 of OSI
o Examine network conversations of captured packets
o Identify Destinations in packet dumps
o Examine ICMP statistics
*
* Text-based Captures with Tethereal
o Discuss features and applications
o Identify ‘tethereal’ and invoke
o Enumerate network interfaces
o Sniff generic network traffic
o Suppress capture output
o Apply Capture Filters
o Capture UDP Traffic
o Capture TCP Traffic
*
* Intranet-based Captures & Analysis
o Discuss Intranet monitoring objectives
o Analyze the network topology drawing
o Discuss Unicast, Broadcast and Multicast traffic
o Discuss Switch Port Mirroring - SPAN
o Configure Port Mirroring - SPAN on Cisco Switch for interesting ports
o Dedicate a network interface for sniffing traffic
o Configure Snort NIDS to sniff traffic on dedicated network interface
o Analyze Snort NIDS captures in Ethereal
o Sniff traffic between various Intranet hosts
*
* Internet-based Captures & Analysis
o Discuss Internet monitoring objectives
o Identify key external interfaces to monitor
o Update the Port Mirroring configuration to capture Internet traffic
o Capture external traffic
o Analyze using Ethereal
*
* Wireless-based Captures & Analysis
o Discuss Wireless monitoring objectives
o Connect to remote system with wireless interface
o Enable wireless interface
o Sniff traffic on wireless network
o Analyze using Ethereal
*
* Windows-based Captures & Analysis on Windows
o Download and Install Ethereal for Windows
o Explore interface
o Load previously captured data
o Analyze data
o Compare and contrast with Ethereal for Linux|Unix systems
*
* top
Pluggable Authentication Modules (PAM) Security - Module 7
* Introduction - Topology - Features
o Discuss course outline
o Explore system configuration
o Explore network topology
o Identify primary PAM systems
o Enumerate and discuss key PAM features
*
* PAM Rules Files & Syntax
o Identify key PAM configuration files
o Explain the purpose of the /etc/pam.d/other PAM rules file
o Discuss PAM’s 4 management tasks
o Identify the 4 tokens supported within PAM rules files
o Explain possible values for the 4 supported rules file tokens
o Discuss PAM’s stacking of rules for the 4 management tasks
o Examine the /etc/pam.d/sshd PAM rules file for the SSHD service/daemon
o Explore the contents of included PAM rules files
*
* Common PAMs - Identify & Discuss Commonly Implemented PAMs
o Explain the purpose and implementation of pam_echo
o Test pam_echo using SSH
o Explain the purpose and implementation of pam_warn
o Explain the purpose and implementation of pam_deny
o Identify instances of pam_warn and pam_deny modules
o Explain the purpose and implementation of pam_unix2
o Identify instances of pam_unix2 module
o Explain the purpose and implementation of pam_env
o Explain the purpose and implementation of pam_ftp
o Peruse /etc/pam.d/vsftpd and discuss the implemenation of pam_ftp
o Explain the purpose and implementation of pam_lastlog
o Explain the purpose and implementation of pam_limits
o Explain the purpose and implementation of pam_listfile
o Explain the purpose and implementation of pam_nologin
*
* Account Policies with PAM
o Explain authentication flow when using PAM
o Discuss account policies features
o Identify and peruse the default account policies file: /etc/login.defs
o Discus PAM’s usage of /etc/login.defs as it pertains to system security
o Discuss pam_pwcheck is maintaining system policy
o Configure pam_pwcheck to support minimum password length
o Correlate pam_pwcheck system policy to user accounts database
o Configure pam_pwcheck to support password history
o Use chage to enumerate and change user accounts’ attributes associated with system policy
*
* PAM Tally
o Explain applications of pam_tally
o Identify failed logins log file: /var/log/faillog
o Identify PAM authentication messages in /var/log/messages
o Compare and contrast pam_tally with faillog
o Use pam_tally to display user’s tally
o Enable pam_tally system-wide with desired policy
o Fail to login multiple times, exceeding the system policy and evaluate results
o Reset user’s login count using pam_tally and faillog
o Redirect PAM log messages using Syslog-NG
*
* PAM Password Quality Check (pam_passwdqc)
o Identify pam_passwdqc using RPM
o Discuss features
o Enumerate the supported password character classes - Complex passwords
o Replace pam_pwcheck with pam_passwdqc using at least 2 character classes
o Test password policy in non-enforcing mode
o Evaluate the effects
o Enable password policy in enforcing mode and evaluate
o Alter character class and length (complexity) requirements and evaluate
*
* PAM Time - Time-based Access Control
o Discuss features
o Explain configuration file syntax
o Impose restrictions on common services
o Evaluate results
*
* PAM Nologin
o Discuss features
o Explain configuration file syntax
o Implement nologin module via /etc/nologin
o Evaluate results
*
* PAM Limits - System Resource Limits Controlled by PAM
o Discuss features
o Explain configuration file syntax
o Impose restrictions on system resources
o Evaluate results
*
* PAM Authentication with Apache
o Discuss features and desired result
o Install Apache and development modules providing apxs support
o Download PAM Apache module
o Compile and install PAM Apache module
o Configure Apache web site to support PAM
o Evaluate results
*
* top
Open Secure Shell version 2 (OpenSSHv2) Security - Module 8
* Introduction - Topology - Features
o Discuss course outline
o Explore system configuration
o Identify key systems to be used
o Explore network topology
o Enumerate and discuss key OpenSSHv2 features
*
* Identify Key OpenSSHv2 Components
o Identify installed OpenSSHv2 related packages
o Peruse related startup and run-control script files
o Locate ’sshd’ on the file system
o Discuss related client | server configuration files
*
* OpenSSHv2 Client - /ssh/
o Discuss features and benefits
o Obtain shell access on a remote system
o Configure /etc/hosts to provide local name resolution for OpenSSHv2
o Identify and discuss pseudo-terminals - pty
o Redirect X11/X.org traffic to localhost via SSH
o Bind ’ssh’ to specific source IP address and test connectivity
o Execute commands on remote system without allocating a pseudo-terminal
o Debug ’ssh’ connectivity
o Explore the system-wide client configuration file
o Explore user configuration file
*
* Secure Copy Program (SCP) - /scp/
o Discuss features and benefits
o Locate ’scp’ on the file system
o Discuss usage
o Copy, non-interactively, previously generated data to remote systems
o Test ’scp’ with global and user configuration directives
o Debug ’scp’ connectivity
o Limit transfer rate to conserve bandwidth
*
* Secure File Transfer Program (SFTP) - /sftp/
o Discuss features and benefits
o Locate ’sftp’ on the file system
o Discuss usage
o Connect to remote system using ’sftp’ interactive shell
o Issue puts and gets and evaluate results
o Identify the sftp-server subsystem
o Peruse process list while connected to OpenSSHv2 server
o Illustrate batch file usage
*
* SSH Key Scan Utility - /ssh-keyscan/
o Discuss features and benefits
o Locate ’ssh-keyscan’ on the file system
o Discuss usage
o Scan the network from STDIN for OpenSSHv2 public keys - RSA (SSHv1 & SSHv2) | DSA
o Scan the network based on a file with a list of hosts for OpenSSHv2 public keys
o Populate ~/.ssh/known_hosts file using ’ssh-keyscan’ with BASH for loop
o Compare and contrast STDOUT with the output file
*
* SSH Key Generation Utility - /ssh-******/
o Discuss features and benefits
o Locate ’ssh-******’ on the file system
o Discuss usage
o Generate RSA-2 usage keys
o Identify RSA-2 public and private key pair
o Generate DSA usage keys
o Identify DSA public and private key pair
o Expose usage keys’ fingerprint using ’ssh-******’
o Generate RSA-2 | DSA usage keys for all hosts
*
* Public Key Infrastructure (PKI) - Password-less Logins
o Discuss features and benefits
o Identify key files for client and server implemenation of password-less (PKI-based) logins
o Copy manually, RSA-2 | DSA public keys to remote system’s ~/.ssh/authorized_keys file
o Test password-less logins
o Use ’ssh-copy-id’ to seamlessly populate remote system with RSA-2 | DSA usage keys
o Test password-less connectivity after using ’ssh-copy-id’
o Confirm password-less connectivity using SSH clients /ssh|scp|sftp/ in debug mode
o Connect to privileged account from non-privileged account using PKI
o Configure RSA-1 connectivity using PKI
*
* System-wide OpenSSHv2 Configuration Directives
o Identify key directory and files associated with client | server configuration
o Explore primary server configuration file
o Discuss applicability of directives
o Alter and test several SSHD directives
o Explore OpenSSHv2 configuration on RedHat Linux
o Explore OpenSSHv2 configuration on Solaris 10
*
* Port Forwarding - Pseudo-VPN Support - /Local|Remote|Gateway/
o Discuss features and benefits
o Implement local port forwarding using ’ssh’
o Configure remote port forwarding using ’ssh’
o Test circumvention of local firewall using remote port forwarding
o Implement gateway ports to share forwarded /local|remote/ with connected users
o Test connectivity
*
* Windows Integration - /PuTTY|WinSCP/
o Discuss features and applications
o Download and install PuTTY
o Explore PuTTY’s features
o Configure PKI logins
o Download and install WinSCP
o Explore WinSCP’s features
o Move data between Windows, Linux and Solaris
*
* Syslog | Syslog-NG Configuration
o Discuss features and benefits
o Identify default configuration
o Redirect OpenSSHv2 data using Syslog and Syslog-NG
o Examine results
o Enable debugging
*
* Host-based Authentication
o Discuss applicability and caveats
o Identify key configuration files and directives
o Implement host-based authentication
o Test results
*
* OpenSSHv2 Source Installation
o Discuss features and benefits
o Download current OpenSSHv2 source code
o Compile and install
o Restart services|daemons
o Test new version of OpenSSHv2
*
* Secure OpenSSHv2 Implementation
o Discuss features and benefits
o Identify key configuration file
o Enumerate and implement key directives
o Test configuration
*
* top
OpenSSHv2 Security - Module 9
* Introduction - Topology - Features
o Discuss course outline
o Explore system configuration
o Identify key systems to be used
o Explore network topology
o Enumerate and discuss key OpenPGP features
*
* Explore GPG Configuration
o Identify installed GPG packages in various Linux distros
o Discuss the key contents of those packages
o Explore configuration hierarchy
o Discuss security as it pertains to private key management
o Explain the purpose of public and private keys
o Discuss symmetric and asymmetric encryption provided by OpenPGP-compliant Apps
*
* Generate | Import | Export OpenPGP Usage Keys
o Discuss features and benefits
o Obtain shell access on remote systems
o Generate usage (private|public) keys
o Identify the generated keys
o Discuss how usage keys are used
o Generate usage keys on remote systems
o Export OpenPGP public key chain on various systems
o Import OpenPGP public keys on various systems
o Evaluate the results of exchanging public keys
*
* Digital Signatures
o Discuss features and benefits as they pertain to data integrity
o Identify default digital signatures on multiple hosts
o Explain the differences between signing and encrypting correspondence
o Sign and export data to remote systems - Inline
o Create detached OpenPGP signatures for data
o Confirm the signed data on the remote systems
o Recap non-repudiation benefits provided by digitally signing correspondence
*
* Encryption | Decryption | Sign & Encrypt Content
o Discuss features and benefits
o Generate files for usage
o Encrypt content using symmetric (shared-key) algorithm
o Decrypt content using the shared-key, based on the symmetric algorithm
o Evaluate results on multiple machines
o Explain caveats associated with symmetric encryption
o Encrypt content to a given recipient, using their public key - asymmetric encryption
o Decrypt content on various hosts
o Attempt to decrypt content without the corresponding private key
o Evaluate results
o Encrypt using ASCII-armoured and binary (OpenPGP-compliant) formats
o Decrypt both ASCII-armoured and binary formats
o Recap encryption decryption processes
o Discuss the requirements of signing and encrypting content
o Sign and encrypt content to various recipients
o Confirm signed and encrypted content
o Attempt to confirm and decrypt content as the unintended recipient
o Evaluate results
*
* OpenPGP Key Management | Web of Trust | Internet Key Distribution
o Discuss features and benefits
o Explore GPG key management facility
o Update properties of public/private key pairs
o Add sub-keys to public/private key pairs
o Sign remote users’ public keys
o Evaluate results
o Discuss the web of trust functionality
o Create a web of trust with various hosts
o Evaluate trust confirmation
o Discuss the features of OpenPGP Internet key distribution servers
o Generate and upload public keys to an Internet key server
o Download the uploaded public keys to the public keyrings of various hosts
o Evaluate results
*
* Perl Scripting with GPG
o Discuss features and benefits
o Create a Perl script to backup key directories and files
o Ensure that the script GPG-protects the content post-backup
o Include error-handling to ensure that each step of the script is routed appropriately
o Configure the script to transfer the encrypted content to a remote host ust ’scp’
o Evaluate results
*
* OpenPGP (GPG | PGP Desktop) on Win32
o Discuss features and benefits
o Download and install GPG for Win32
o Generate usage keys
o Exchange public keys with a user on a Linux system
o Sign and encrypt content to and from the Win32 user
o Confirm results
o Download and install GPG4WIN (GUI-based GPG for Win32)
o Explore features
o Sign and encrypt content to and from the Win32 user
o Confirm results
o Integrate GPG4WIN with MS Outlook
o Sign and encrypt e-mail messages
o Confirm and decrypt e-mail messages
o Install PGP Desktop for Win32
o Explore features and interface
o Generate usage keys
o Exchange public keys with Linux user
o Sign and encrypt content to and from the Win32 user using PGP Desktop
o Evaluate results
o Draw parallels between Win32 based OpenPGP tools and GPG for Linux | Unix
o Recap OpenPGP functionality included in /GPG|GPG4WIN|PGP Desktop/
Download
http://uploading.com/files/ZI1RPXDO/…art01.rar.html
http://uploading.com/files/RISZRO27/…art02.rar.html
http://uploading.com/files/7MN27YPL/…art03.rar.html
http://uploading.com/files/H784WXKX/…art04.rar.html
http://uploading.com/files/PKMJGMAN/…art05.rar.html
http://uploading.com/files/RYA5GZ3P/…art06.rar.html
http://uploading.com/files/IRVXV3LS/…art07.rar.html
http://uploading.com/files/AUAVCR8N/…art08.rar.html
http://uploading.com/files/EY4B1Q81/…art09.rar.html
http://uploading.com/files/BWPHZCNA/…art10.rar.html
http://uploading.com/files/N935IF72/…art11.rar.html
http://uploading.com/files/021P6VTW/…art12.rar.html
http://uploading.com/files/CRB74UDJ/…art13.rar.html
http://uploading.com/files/QB3MBREA/…art14.rar.html
http://uploading.com/files/WE5VSROH/…art15.rar.html
http://uploading.com/files/PQPBHIXD/…art16.rar.html
http://uploading.com/files/0B04IVE5/…art17.rar.html
http://uploading.com/files/198OPP09/…art18.rar.html
http://uploading.com/files/1MIS7IOY/…art19.rar.html
http://uploading.com/files/D8E4W7KK/…art20.rar.html
http://uploading.com/files/WE5MAZB0/…art21.rar.html
http://uploading.com/files/ZY07MDZU/…art22.rar.html
http://uploading.com/files/GJU4BCJ7/…art23.rar.html
http://uploading.com/files/XS5DC9K2/…art24.rar.html
http://uploading.com/files/36NNRF6I/…art25.rar.html
http://uploading.com/files/YSR5KZPB/…art26.rar.html
http://uploading.com/files/FE4I5XY2/…art27.rar.html
http://uploading.com/files/MG3EYHTT/…art28.rar.html
http://uploading.com/files/HZWY11QS/…art29.rar.html
http://uploading.com/files/969FVRIZ/…art30.rar.html
http://uploading.com/files/WNDEPI3Z/…art31.rar.html
http://uploading.com/files/36R30KU5/…art32.rar.html
http://uploading.com/files/CSZOH3OX/…art33.rar.html
http://uploading.com/files/BBINDEFA/…art34.rar.html
http://uploading.com/files/XFBRK8DP/…art35.rar.html
http://uploading.com/files/GCFD0GFI/…art36.rar.html
http://uploading.com/files/NX966NLJ/…art37.rar.html
http://uploading.com/files/C6NS2EUO/…art38.rar.html
http://uploading.com/files/9Q08ZB5D/…art39.rar.html
http://uploading.com/files/L865PWJJ/…art40.rar.html
http://uploading.com/files/E8VV6MQZ/…art41.rar.html
http://uploading.com/files/9RPDLQPY/…art42.rar.html
http://uploading.com/files/8ZJRVBMA/…art43.rar.html
http://uploading.com/files/H6TQVF8Y/…art44.rar.html
http://uploading.com/files/GUU78NSO/…art45.rar.html
http://uploading.com/files/HQGFOZTR/…art46.rar.html
http://uploading.com/files/8YNGRU80/…art47.rar.html
http://uploading.com/files/6XMZ9G3P/…art48.rar.html
http://uploading.com/files/PXQKBKIW/…art49.rar.html

Password unrar: Bytes_4U

keep visiting for more .

Saurav Banerjee

LINUX DOWNLOADS :

http://www.downloadsquad.com/

https://addons.mozilla.org/en-US/firefox/addon/6665

http://isohunt.com/torrent_details/144729165/chrome+cherry?tab=summary

http://download.webconverger.com/

http://puppylinux.org/main/index.php?file=How%20to%20download%20Puppy.htm

http://puppylinux.org/main/index.php?file=How%20to%20download%20Puppy.htm

http://www.slax.org/get_slax.php

http://chromeos.hexxeh.net/index.html

http://moblin.org/downloads

http://distro.ibiblio.org/pub/linux/distributions/puppylinux/

http://www.4shared.com/file/29903675/885b2007/Damn_Small_Linux-31.html?s=1