SlideShare a Scribd company logo
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Linux Essenciais and System Administration
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Key Knowledge Areas
Understand the correct way to troubleshoot the system and the network
Troubleshooting tools
Troubleshooting tools
Terms and Utilities
uptime
free
w
vmstat
top
df
ldd, ldconfig
ulimit
Iostat
/proc/*
debugfs
Strace
Logs – Syslog; syslog.conf; var/log
Network tools
2
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Troubleshooting overview
3
Troubleshooting: a mystical art :/ in details
It is a thorough methodology used to track down the cause of problem.
Keywords: thorough and methodology
•Without a thorough and exhaustive approach, the issue might be overlooked
•Without a strong and methodical approach, the issue may be misdiagnosed
Troubleshooting tools
• Most Important: Only change one thing at a time
• Check #1 most likely cause: You
• Check logs for error messages
• After that, check configuration and permissions
• If all else fails, slowly, piece by piece, start removing complexity from the system to
narrow down the problem area.
• DOCUMENT EVERYTHING
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
LOGS
4
Troubleshooting tools
One of the easiest places to find the cause of a problem is in the log files.
Log files store informational messages from software.
The types of messages include debug info, status info, warnings, errors and more.
•Some Apps use the system-wide logging package.
•Others manage their own log files
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
system-wide LOGS: syslog
5
Troubleshooting tools
syslog - The system logger.
A framework consisting of a library, a daemon, a configuration file and logs.
Any application can use the library and log messages through syslog with simple
function calls. Log messages consist of 3 parts:
•Facility
•Level
•Message
Facility Describes the part of operating system that generated the message,
and is selected by the software:
auth, authpriv, cron, daemon, ftp, kern, lpr, mail, news, security, syslog, user, uucp, local0-local7
Level Represents the importance of the message, and is also chosen by the software:
emergency, alert, critical, error, warning, notice, info, debug
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
system-wide LOGS: /etc/syslog.conf
6
Troubleshooting tools
Massage
/etc/syslog.conf defines where all of the log messages should go.
Destinations include files, screens of logged in users, console, other syslog servers.
Basic file format:
•facility.level destination
Ex:
*.err /dev/console
mail.* /var/log/maillog
*.info;mail.none;authpriv.none /var/log/messages
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
system-wide LOGS: /var/log
7
Troubleshooting tools
• maillog messages from the email subsystem
• secure authentication and security messages
• cron cron messages
• boot.log boot messages
• Messages catch-all
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
apps own LOGS
8
Troubleshooting tools
not all software uses the syslog framework to handle it’s logging.
Some software manages it’s own logs.
Can be difficult to track down all of the log locations on an unfamiliar system.
Best way to handle this is to start from the init scripts.
LOCATING APPLICATION LOGS:
1.To track log file local for an apps, find it’s configuration file and see where the logs are being written.
2.Finding the configuration file might be difficult, so it’s best to start at source.
3.init starts all of system services, so there is an init script that is starting up the apps in question.
4.The init script almost always references the configuration file
5.If the configuration file location is known, scan it and find out where the logs are being written.
6.The format of the log file its completely dependent on the application.
Some will be similar to syslog, others, like Apache or Qmail, will be completely foreign looking.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
troubleshooting
9
Troubleshooting tools
several tools to help the process of troubleshooting:
uptime; free; w; vmstat; top; df; ldd; ldconfig; ulimit; iostat
“CSI” troubleshooting:
/proc/*
debugfs
Strace
Looking through logs is fine, but really that’s a best case scenario.
The software and hardware rarely come out and announce problems and solutions in log
files.
No, it’s not easy! 
More often, users will encounter symptoms of a problem, and there are some tools that
COULD FIND and FIX the issue.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
tools
10
uptime Reports system uptime along with load averages.
•Load Average: Average number of processes in run queue that are blocked.
•uptime reports three values: the load averaged over the last 1 minute, 5 minutes and 15
minutes. This is useful to get an idea of the load trend on the system.
Troubleshooting tools
free reports on memory and swap usage
•buffers: I/O buffers, directory cache
•cached: filesystem cache (data)
[root@dev1 ~]# uptime
16:09:55 up 682 days, 10:11, 1 user, load average: 0.00, 0.01, 0.00
[root@dev1 ~]#
Ex:
[[root@dev1 ~]# free
total used free shared buffers cached
Mem: 262316 214228 48088 0 1168
41728
-/+ buffers/cache: 171332 90984
Swap: 524280 74564 449716
[root@dev1 ~]#
Ex:
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
tools
11
Troubleshooting tools
w uptime report, with breakdown of logged-in users and process they are running
•JCPU: Combined CPU time of all processes attached to terminal (foreground and background)
•PCPU: CPU time of foreground process, listed in “what” column
vmstat Snapshot report covering several primary statistics.
•procs: number of running and blocked processes
•swap: swapped in and swapped out blocks of memory, per second
•io: blocks in and blocks out read/written per second
•system: interrupts and context switches per second
•cpu: user, system, idle, wait and time-stolen from a VM
[root@dev1 ~]# w
16:26:42 up 682 days, 10:28, 2 users, load average: 0.02, 0.05, 0.02
USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT
root pts/0 216-110-93-126.s 16:00 3:57 0.01s 0.01s -bash
root pts/9 216-110-93-126.s 16:22 0.00s 0.01s 0.00s w
Ex:
[root@dev1 ~]# vmstat
procs ----------memory---------- ---swap-- -----io---- --system-- -----cpu------
r b swpd free buff cache si so bi bo in cs us sy id wa st
0 0 74564 3608 4456 70156 0 0 0 2 0 0 0 0 100 0 0
Ex:
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
tools
12
top Self-updating tool displays combination summary at top, followed by ordered
list of processes. Fully customizable.
• The summary includes uptime information, memory
• breakdowns, CPU utilization and process state summaries
Troubleshooting tools
top - 16:39:32 up 682 days, 10:41, 2 users, load average: 0.01, 0.00, 0.00
Tasks: 118 total, 1 running, 116 sleeping, 1 stopped, 0 zombie
Cpu(s): 0.1%us, 0.0%sy, 0.0%ni, 99.8%id, 0.0%wa, 0.0%hi, 0.0%si, 0.1%st
Mem: 262316k total, 258024k used, 4292k free, 7380k buffers
Swap: 524280k total, 74564k used, 449716k free, 67808k cached
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
1 root 15 0 10316 648 592 S 0 0.2 0:06.24 init
2 root RT 0 0 0 0 S 0 0.0 0:04.88 migration/0
3 root 34 19 0 0 0 S 0 0.0 0:00.19 ksoftirqd/0
Ex:
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
tools
13
Troubleshooting tools
df lists filesystem utilization
•Breaks down size and use information for each mounted filesystem
•-h is useful option to display in “human-friendly” format
[root@dev1 ~]# df -h
Filesystem Size Used Avail Use% Mounted on
/dev/sda1 9.4G 7.2G 1.8G 81% /
none 129M 0 129M 0% /dev/shm
Ex:
ldd List library dependencies
Ldconfig Update library location database
•/etc/ld.so.conf and /etc/ld.so.conf.d/*.conf for list of pathnames to search
for libraries, creates database for dynamic linker
[root@dev1 ~]# ldd /bin/bash
! libtermcap.so.2 => /lib64/libtermcap.so.2 (0x00002ac044572000)
! libdl.so.2 => /lib64/libdl.so.2 (0x00002ac044775000)
! libc.so.6 => /lib64/libc.so.6 (0x00002ac044979000)
! /lib64/ld-linux-x86-64.so.2 (0x00002ac044357000)
[root@dev1 ~]# cat /etc/ld.so.conf.d/mysql-x86_64.conf
/usr/lib64/mysql
[root@dev1 ~]# ldconfig
Ex:
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
tools
14
Troubleshooting tools
ulimit Sets resource limits
•Can limit open files, memory use, cpu time, subprocesses and more.
[root@dev1 ~]# ulimit -a
core file size (blocks, -c) 0
data seg size (kbytes, -d) unlimited
max nice (-e) 0
file size (blocks, -f) unlimited
pending signals (-i) 2112
max locked memory (kbytes, -l) 32
max memory size (kbytes, -m) unlimited
open files (-n) 1024
pipe size (512 bytes, -p) 8
POSIX message queues (bytes, -q) 819200
max rt priority (-r) 0
stack size (kbytes, -s) 8192
cpu time (seconds, -t) unlimited
max user processes (-u) 2112
virtual memory (kbytes, -v) unlimited
file locks (-x) unlimited
Ex:
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
tools
15
Troubleshooting tools
iostat IO statistics report
•Part of the sysstat package; not always installed
•Allows drilldown into IO system to view real time metrics on IO operations per filesystem
[root@dev1 ~]# iostat -x
Linux 2.6.18-xen (dev1) ! 12/10/09
avg-cpu: %user %nice %system %iowait %steal %idle
0.05 0.00 0.00 0.03 0.07 99.84
Device: rrqm/s wrqm/s r/s w/s rsec/s wsec/s avgrq-sz avgqu-sz await svctm %util
sda1 0.00 1.68 0.01 0.55 0.14 17.83 32.12 0.03 54.01 2.89 0.16
sda2 0.00 0.00 0.00 0.00 0.01 0.01 35.26 0.00 80.51 4.95 0.00
Ex:
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
/proc/*
16
Troubleshooting tools
/proc folder contains amounts of information useful for troubleshooting.
•/proc/meminfo: Memory utilization breakdown
•/proc/devices: Mapping major numbers to drivers
•/proc/dma: dma channel assignments
•/proc/ioports: io port assignments
/proc folder has detailed information on every process on the system.
Details on process status, environment, commandline, and more – man /proc
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Debugfs and strace
17
Troubleshooting tools
debugfs: Very powerful filesystem debugging tool.
•Allows direct visualization and manipulation of the filesystem internals
•Extremely powerful, extremely  dangerous.
strace: Traces each library call a process makes.
•Extremely useful to see what a process is doing
•Can find errors, bugs, permission issues and more
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Networking responsibilities
18
Troubleshooting NETWORK tools
Networking systems together is often a difficult task, further complicated by large
networks and special requirements.
For this reason, networking is it’s own area of expertise.
The network engineer is responsible for everything up to and including the cable
and plug connecting to the server.
The systems engineer is responsible for everything within the server, up to and
including the network card interfacing to the cable.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Basic network troubleshooting
19
Troubleshooting NETWORK tools
Basic network troubleshooting is verifying three aspects of network performance:
•LAN access
•Inter-LAN access
•DNS service
ping: “Packet Internet Groper”
Using IP/ICMP echo requests and echo replies, times response time between two machines.
ping 192.168.0.1
Times reported are Round Trip Times (RTT) and represent the time between sending a
request and receiving a response.
traceroute
Traces the route a message takes to get from source machine to the destination.
netstat
Network statistics - details on open and recently closed network connections
iptraf
network statistics tool
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Basic Network troubleshooting
20
Troubleshooting NETWORK tools
nmap
Network mapper - for seeing what services are showing on a particular machine
tcpdump
A tool to dump raw network traffic for analysis
wireshark
GUI interface to a tcpdump-like tool
ntop
Top-like command for network connections
ngrep
grep for network connections
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Fim de sessão
21

More Related Content

What's hot (19)

PPT
101 apend. kernel
Acácio Oliveira
 
PPT
101 1.2 boot the system
Acácio Oliveira
 
PPTX
Understanding DPDK
Denys Haryachyy
 
PDF
HKG18-TR14 - Postmortem Debugging with Coresight
Linaro
 
PDF
Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s...
Anne Nicolas
 
PPT
2.5 use rpm and yum package management
Acácio Oliveira
 
PPT
101 3.5 create, monitor and kill processes v2
Acácio Oliveira
 
PPT
101 2.5 use rpm and yum package management
Acácio Oliveira
 
PPT
3.5 create, monitor and kill processes v2
Acácio Oliveira
 
DOCX
Linux or unix interview questions
Teja Bheemanapally
 
PPT
4.2 maintain the integrity of filesystems
Acácio Oliveira
 
PDF
Redhat 6 & 7
r9social
 
PDF
Kernel Recipes 2014 - The Linux Kernel, how fast it is developed and how we s...
Anne Nicolas
 
PPT
101 4.1 create partitions and filesystems
Acácio Oliveira
 
PDF
IRQs: the Hard, the Soft, the Threaded and the Preemptible
Alison Chaiken
 
PDF
Kernel Recipes 2015: Kernel packet capture technologies
Anne Nicolas
 
PPT
2.Operating System Structures
Senthil Kanth
 
PDF
Linux Internals Part - 1
SysPlay eLearning Academy for You
 
PDF
Baidu cloudfoundry english
James Watters
 
101 apend. kernel
Acácio Oliveira
 
101 1.2 boot the system
Acácio Oliveira
 
Understanding DPDK
Denys Haryachyy
 
HKG18-TR14 - Postmortem Debugging with Coresight
Linaro
 
Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s...
Anne Nicolas
 
2.5 use rpm and yum package management
Acácio Oliveira
 
101 3.5 create, monitor and kill processes v2
Acácio Oliveira
 
101 2.5 use rpm and yum package management
Acácio Oliveira
 
3.5 create, monitor and kill processes v2
Acácio Oliveira
 
Linux or unix interview questions
Teja Bheemanapally
 
4.2 maintain the integrity of filesystems
Acácio Oliveira
 
Redhat 6 & 7
r9social
 
Kernel Recipes 2014 - The Linux Kernel, how fast it is developed and how we s...
Anne Nicolas
 
101 4.1 create partitions and filesystems
Acácio Oliveira
 
IRQs: the Hard, the Soft, the Threaded and the Preemptible
Alison Chaiken
 
Kernel Recipes 2015: Kernel packet capture technologies
Anne Nicolas
 
2.Operating System Structures
Senthil Kanth
 
Linux Internals Part - 1
SysPlay eLearning Academy for You
 
Baidu cloudfoundry english
James Watters
 

Viewers also liked (13)

PDF
Log files - Approcci al Troubleshooting
Fulvio Corno
 
PPT
Gace Basic Computer Operation And Troubleshooting
Nisa Peek
 
PDF
Oscon2008 network-troubleshooting-v1
sabry khalil
 
PDF
Managing troubleshooting cluster_360dgrees
Syed Hussain
 
PDF
The Gurubox Project: Open Source Troubleshooting Tools
Wes Morgan
 
PDF
14 presentasi install_linux_dan_troubleshooting
Rusmanto Maryanto
 
PDF
Advanced performance troubleshooting using esxtop
Alan Renouf
 
PDF
TroubleShooting as a Service
Sagi Brody
 
PPT
Linux Troubleshooting
Keith Wright
 
PDF
Advanced troubleshooting linux performance
Forthscale
 
PDF
Linux system administration
orionsconsulting
 
PPT
Red Hart Linux
Venkateswarlu Malleboina
 
PDF
Fabric, Cuisine and Watchdog for server administration in Python
FFunction inc
 
Log files - Approcci al Troubleshooting
Fulvio Corno
 
Gace Basic Computer Operation And Troubleshooting
Nisa Peek
 
Oscon2008 network-troubleshooting-v1
sabry khalil
 
Managing troubleshooting cluster_360dgrees
Syed Hussain
 
The Gurubox Project: Open Source Troubleshooting Tools
Wes Morgan
 
14 presentasi install_linux_dan_troubleshooting
Rusmanto Maryanto
 
Advanced performance troubleshooting using esxtop
Alan Renouf
 
TroubleShooting as a Service
Sagi Brody
 
Linux Troubleshooting
Keith Wright
 
Advanced troubleshooting linux performance
Forthscale
 
Linux system administration
orionsconsulting
 
Red Hart Linux
Venkateswarlu Malleboina
 
Fabric, Cuisine and Watchdog for server administration in Python
FFunction inc
 
Ad

Similar to 101 apend. troubleshooting tools v2 (20)

PPT
101 4.4 manage disk quotas
Acácio Oliveira
 
PPT
101 4.4 manage disk quotas
Acácio Oliveira
 
PPT
4.4 manage disk quotas
Acácio Oliveira
 
PPT
101 apend. tuning and performance
Acácio Oliveira
 
PPT
101 4.2 maintain the integrity of filesystems
Acácio Oliveira
 
PPT
101 4.2 maintain the integrity of filesystems
Acácio Oliveira
 
PPT
4.9.a apend tuning and performance
Acácio Oliveira
 
PDF
CertsOut Checkpoint-156-587 exam dumps pdf
Dumpcollection
 
PPT
1.1 hardware settings v2
Acácio Oliveira
 
PPTX
Spug pt session2 - debuggingl
Comunidade Portuguesa de SharePoiint
 
PPT
Os rtos.ppt
rahul km
 
PDF
Lec 3
mohamed ali
 
PPTX
Process control daemon
haish
 
PPTX
Techno-Fest-15nov16
Satish Navkar
 
PPT
101 1.1 hardware settings v2
Acácio Oliveira
 
PPTX
Reformat PPT.pptx
LINDYLGERAL
 
DOC
Bishwambar Linux Admin
bishwambar sahoo
 
PPT
1.2 boot the system v2
Acácio Oliveira
 
PDF
Prujisjkkbshshshshususueu7sis hshsyysususuus
projectisapk
 
PDF
Android memory analysis Debug slides.pdf
VishalKumarJha10
 
101 4.4 manage disk quotas
Acácio Oliveira
 
101 4.4 manage disk quotas
Acácio Oliveira
 
4.4 manage disk quotas
Acácio Oliveira
 
101 apend. tuning and performance
Acácio Oliveira
 
101 4.2 maintain the integrity of filesystems
Acácio Oliveira
 
101 4.2 maintain the integrity of filesystems
Acácio Oliveira
 
4.9.a apend tuning and performance
Acácio Oliveira
 
CertsOut Checkpoint-156-587 exam dumps pdf
Dumpcollection
 
1.1 hardware settings v2
Acácio Oliveira
 
Spug pt session2 - debuggingl
Comunidade Portuguesa de SharePoiint
 
Os rtos.ppt
rahul km
 
Lec 3
mohamed ali
 
Process control daemon
haish
 
Techno-Fest-15nov16
Satish Navkar
 
101 1.1 hardware settings v2
Acácio Oliveira
 
Reformat PPT.pptx
LINDYLGERAL
 
Bishwambar Linux Admin
bishwambar sahoo
 
1.2 boot the system v2
Acácio Oliveira
 
Prujisjkkbshshshshususueu7sis hshsyysususuus
projectisapk
 
Android memory analysis Debug slides.pdf
VishalKumarJha10
 
Ad

More from Acácio Oliveira (20)

PPTX
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 17 - Types of Malware.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
Acácio Oliveira
 
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
Acácio Oliveira
 
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 17 - Types of Malware.pptx
Acácio Oliveira
 

Recently uploaded (20)

PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
Complete Network Protection with Real-Time Security
L4RGINDIA
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
PPTX
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
Complete Network Protection with Real-Time Security
L4RGINDIA
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 

101 apend. troubleshooting tools v2