[mdlug] Linux Certification at CompTIA

Kirk Ellis kirk at thatcybersecurityguy.com
Sat Oct 18 14:58:11 EDT 2014


I would be happy to present a workshop on my book anywhere, anytime.  I 
have a PowerPoint presentation ready and waiting. However, I do not have 
a projector yet as they cost $800+ and I'm still trying to determine 
which one would be best to purchase.  As I look at projectors the 
question I'm asked is how big is the screen size.  I measured the screen 
size at Little River casino and it was 92" x 159" so I will purchase a 
projector capable of supporting screens up to and including that size.

Does anyone know of any small business group meetings in the area? Since 
I am trying to become a author-publisher small business, I would like to 
talk to other business owners and to market my book to them.  I visited 
the Dearborn Chamber of Commerce and they wanted $280 before they could 
or would help me in any fashion.  In summary their words were, "you have 
to be a Chamber of Commerce member before we can or will help you in any 
fashion".  Folks I'm flat broke and don't have $280, expenses such as my 
50 book PrePublication run in early November is going to run me $870.  I 
have to spend my disability money as wisely as possible and that book 
run is much more important than joining/becoming a member of the 
Dearborn Chamber of Commerce.

I'm in the process of putting together hour long detailed presentations 
on the individual chapters of my book.  For example, The SouthEastern 
Michigan Computer Organization (SEMCO) has requested I put together a 
Windows 7 seminar from my books Windows 7 chapter.  In that chapter I 
teach the reader how to load, configure and cleanup Windows 7 to keep it 
safe and secure.  I also teach the reader 101 steps to download all the 
latest and greatest open source software and how to set it up with 
useful tools and utilities.  For example, Window 7 has services running 
in the background that open up security holes and the average user needs 
to run the "services.msc" utility to turn them off.

I talked to both the Dearborn and Farmington libraries about my book and 
hanging up a flyer to advertise my upcoming *FREE* Cyber Security 
Seminar at American Legion Post 364, 3100 South Telegraph, Dearborn, MI 
48124.  Jan 14, 2015 6 to 8 PM.  Farmington outright rejected the flyer 
and the book because I am a for profit business. Dearborn took a flyer 
and said they would review it but felt it was unlikely they wanted to 
promote a FREE Cyber Security seminar to Dearborn citizens.

Being sarcastic, "/I guess no one in Dearborn or Farmington has ever had 
their identity stolen so why would they want to learn how to use the 
infected Internet!  Subjects such as securing a router, configuring 
Window 7, setting up and using a SSH server, preventing identity theft 
and so on will not benefit the general public!  My step-by-step guide is 
just too complex for small businesses or home computer users to 
grasp./"  On a serious note I wrote the book with those users in mind.

Most libraries will not purchase books from a publisher such as myself 
directly.  I will be sending a PrePublication book to:

Library Journal
Book Review Editor
Library Journal
360 Park Avenue South
New York, New Your 10010

LJ is a magazine directed to general public librarians.  They review 
4,500 books each year, from the 30,000 received, specifically to assess 
their value to the library market.  If I get a good review LJ will sell 
about 1000 of my books and then I might be able to convince the local 
libraries that my book is something they want to purchase.  Until then, 
I'm getting outright rejection from local libraries.  Ironically, one 
would think that libraries would want to support local authors and 
especially one who has written about a topic to keep their citizens safe 
but I'm finding that is not the case.

Kirk A. Ellis, President and CEO, ThatCyberSecurityGuy LLC


On 10/18/2014 8:51 AM, gib at juno.com wrote:
> Kirk, you've been busy.
>
> I'd suggest we can set up some workshops in the Dearborn pubic library.  That would give you exposure.
>
> Do you want to see if they will buy a copy of your book?
>
> ---------- Original Message ----------
> From: Kirk Ellis <kirk at thatcybersecurityguy.com>
> To: Andrew Spencer <andrewspencer1986 at gmail.com>
> Cc: MDLUG's Main discussion list <mdlug at mdlug.org>
> Subject: Re: [mdlug] Linux Certification at CompTIA
> Date: Fri, 17 Oct 2014 18:53:11 -0400
>
> Hi Andrew,
>
> I was a UNIX administrator during much of my former 28 year IT career.
> After surviving cancer twice due to radiation exposure during the Iraq
> war I found the demand for UNIX administrators dismal at best.  So I
> pursued and obtained the CompTIA Linux+ certifications and you might
> want to also.  Getting these certifications taught me about the
> differences between Linux and UNIX which are MANY.  Visit
> http://certification.comptia.org/getCertified/certifications/linux.aspx
> to read about their latest certifications.  However, much like getting
> CISCO certified you may have to proceed past the LX0-101 and LX0-102
> certifications to get a better than entry level job.
>
> As for mentoring I am busy launching my new ThatCyberSecurityGuy.com
> business but I can offer want I can as my heart bleeds for anyone out of
> a job looking for work.  I will be printing what is called in the book
> publishing business a PrePublication run of my book "The Internet is
> Infected" in early November and I would be happy to provide you a copy
> of my book at printing cost to help you out.  All I would ask in return
> is for you to show the book around (notice I did not say lend) as I am
> in the book selling business!
>
> Below is the Table of Contents for my book.  Of interest to you as a
> Linux Administrator are Chapter 7 on the virtualization of four Linux
> Operating Systems and Chapter 9 on how to set up and use a SSH server.
> I'm sure some of the other material in the book would prove beneficial
> to you also.  The purpose of my 1000 page book is to help everyone using
> the infected Internet and if I can start by being a mentor to an out of
> work Linux Administrator then I feel I am fulfilling my new mission in life.
>
> Good luck and god bless,
>
> Kirk A. Ellis
>
> Open Source, Donationware, and Freeware Projects Coverered in this
> Book.. IV<#_Toc401335138>
>
> About the Author. XIV<#_Toc401335139>
>
> Acknowledgements. XV<#_Toc401335140>
>
> Preface – Background Information and Preparation.. XIX<#_Toc401335141>
>
> How and Why this Book came into Existence. XX<#_Toc401335142>
>
> There Comes a Time in History for Every Revolutionary Book.
> XXII<#_Toc401335143>
>
> Everyone is Spying on your Internet Activity and Storing it Permanently
> for your Lifetime. XXV<#_Toc401335144>
>
> The U.S. Digital Fourth Amendment!XXVII<#_Toc401335145>
>
> Warning—Disclaimer. XXIX<#_Toc401335146>
>
> Who Should Read This Book?. XXXI<#_Toc401335147>
>
> What You Will Need to Employ the Techniques Described in This Book.
> XXXIII<#_Toc401335148>
>
> Conventions Used in This Book. XXXV<#_Toc401335149>
>
> Introduction--Why You Need to Read This Book.. XXXVII<#_Toc401335150>
>
> Why I Wrote This Book about Using the Infected
> InternetXXXVIII<#_Toc401335151>
>
> A Quick Review of the Usual, Inadequate Methods for Securing Your
> Internet Activity That We Hear About DailyXL<#_Toc401335152>
>
> What This Book Aims to Do for the Reader. XLVIII<#_Toc401335153>
>
> Chapter 1 - Government and Corporate Efforts to Stifle Internet Freedom,
> Invade Your Privacy and Destroy Your Health... 1<#_Toc401335154>
>
>  From the Perspective of a Make Believe Post WWII German Reporter Who I
> Now Am!6<#_Toc401335155>
>
> Whistle-Blower Edward Snowden Reveals He Ratted on the NSA..
> 11<#_Toc401335156>
>
> How the American Stazi State Security* System is Costing Their Taxpayers
> Many Billions to Spy on the Whole World.. 18<#_Toc401335157>
>
> Your Digital Trail/Footprint--How You Are Being Tracked in Everything
> You Do Using the Infected Internet!27<#_Toc401335158>
>
> How the Consumer Financial Protection Bureau Has Become the Second Most
> Well-Funded U.S. Government Agency to Invade the U.S. Citizens' Privacy
> Funded by U.S. Citizens. 34<#_Toc401335159>
>
> Future and Past Efforts by the U.S Government to Further Circumvent the
> U.S. Constitution and Erode U.S. and Worldwide Citizens' Freedom..
> 34<#_Toc401335160>
>
> Examples of the Threats Corporations, SBO's and HCU's Face from the
> Internet. 39<#_Toc401335161>
>
> Don't Be a Sheep, Become a Shepherd, Stop Snail Mail and, Change your
> Diet!49<#_Toc401335162>
>
> The Elephant in the Room; Lets Crunch the Numbers on What Is Really
> Killing Western Civilizations' Citizens!56<#_Toc401335163>
>
> Chapter 2 -- Hardening your Network--Implementing Wireless Security
> Settings--Getting the Best Network and Internet Performance--Configuring
> Your Router to Support Your Mobile Devices.. 67<#_Toc401335164>
>
> Historical Examples of Advancing Technology Overwhelming Defenses.
> 69<#_Toc401335165>
>
> Your Router and Network Wi-Fi Equipment May Be More Vulnerable than you
> Thought. 75<#_Toc401335166>
>
> Setting Up a Router and Repeater. 80<#_Toc401335167>
>
> Hardening the Basic Network and Wireless Router Settings. 83<#_Toc401335168>
>
> Hardening Wireless Access by Setting up a Wireless Card Access List
> (Also Known as MAC Filtering)87<#_Toc401335169>
>
> Hardening Router Visibility by Turning off SSID Broadcast--Backing up
> the Basic Router Settings89<#_Toc401335170>
>
> Hardening Network Access by Disabling Router Ports. 90<#_Toc401335171>
>
> Block Services to Test SSH and VPN Tunnels. 92<#_Toc401335172>
>
> Hardening the Domain Name Service (DNS) Setup and Achieving Better DNS
> Performance. 92<#_Toc401335173>
>
> Setting up Dynamic DNS as a Permanent Domain to Use Your Home Network
> while Traveling with Your Mobile Devices. 93<#_Toc401335174>
>
> Setting up an Address Reservation for Your Home Printer and Assigning a
> Static (Unchanging) IP Address95<#_Toc401335175>
>
> Setting up Port Forwarding and Address Reservations for Your Home
> Servers to Use Them Remotely while Traveling.. 96<#_Toc401335176>
>
> Setting up Quality of Service in Your Router and Wireless Devices for
> Streaming Video and Gaming, Keeping the Family Happy. 98<#_Toc401335177>
>
> The Wireless Multimedia Checklist for Gaming and Streaming Video..
> 98<#_Toc401335178>
>
> Setup a Guest Network for Meetings, Relatives and Visitors.
> 102<#_Toc401335179>
>
> So You Have Purchased a Shiny New 802.11ac Router--Now What?.
> 104<#_Toc401335180>
>
> Dirty Electricity:Do You Need to Be Concerned?. 105<#_Toc401335181>
>
> Fixing Difficult Wi-Fi Problems. 106<#_Toc401335182>
>
> Summary - Physical Internet Communication Layer. 107<#_Toc401335183>
>
> Chapter 3 -- Understanding the Computer Hardware Needed for
> Virtualization and Gaming-Building Your Own Computer Server..
> 109<#_Toc401335184>
>
> Precautions & Hardware 101 Tips to Building the Ultimate New Computer
> Server. 117<#_Toc401335185>
>
> Case-Evaluating and Choosing.. 121<#_Toc401335186>
>
> Case Fans-Choosing and Installing.. 125<#_Toc401335187>
>
> CPU-Choosing and Installing. 125<#_Toc401335188>
>
> Hard Drive-Selection, Technical Information and Installation..
> 130<#_Toc401335189>
>
> Zeroing Your Hard Drive to Install a New OS--Recovering your Data.
> 133<#_Toc401335190>
>
> Running RAID in Your SB/HC and Recovering from Hard Drive Failure.
> 135<#_Toc401335191>
>
> Recovering Hard Drive Data from a Computer That Will No Longer
> Boot138<#_Toc401335192>
>
> Motherboard-Selection and Technical Information.. 139<#_Toc401335193>
>
> Thunderbolt and USB 3.0 Devices and Connectors. 140<#_Toc401335194>
>
> SATA Revision 3.0 (SATA 6 GB/s) and Intel Rapid Storage. 141<#_Toc401335195>
>
> What is Serial ATA Revision 3.0?. 141<#_Toc401335196>
>
> What are the benefits of SATA 6Gb/s?. 141<#_Toc401335197>
>
> What is Intel Rapid Storage?. 142<#_Toc401335198>
>
> Motherboard Selection How-To. 142<#_Toc401335199>
>
> Checking and Flashing the Computer BIOS. 147<#_Toc401335200>
>
> Power Supply Unit (PSU)--Choosing and Installing.. 149<#_Toc401335201>
>
> RAM Memory-Choosing and Installing.. 153<#_Toc401335202>
>
> RAM Memory-Installing. 156<#_Toc401335203>
>
> Video Card -- Choosing and Installing.. 157<#_Toc401335204>
>
> Monitor Choosing and Installing.. 159<#_Toc401335205>
>
> Blue Ray DVD Burner-Choosing and Installing.. 160<#_Toc401335206>
>
> Backup-Solution Selection and Technical Information.. 161<#_Toc401335207>
>
> Keyboard and Mouse-Choosing and Configuring.. 162<#_Toc401335208>
>
> Laser/InkJet Multifunction Printers-Choosing.. 163<#_Toc401335209>
>
> Troubleshooting Network Printers. 165<#_Toc401335210>
>
> Using Surge Protector Vampire Hunters to Lower Your Electric Bill &
> Protect Your Equipment166<#_Toc401335211>
>
> Laptops-Specifications--Changing the Hard Drive--Securing..
> 168<#_Toc401335212>
>
> How to Swap the Hard Drive in Your Laptop. 170<#_Toc401335213>
>
> When Possible, Lock Your Laptop:170<#_Toc401335214>
>
> Sextortion, Put Tape over Your Laptop Webcam When You Are Not Using
> It171<#_Toc401335215>
>
> Label Your Mobile Devices and Keep the Fans Open. 172<#_Toc401335216>
>
> Track Your Laptop. 173<#_Toc401335217>
>
> Extending Laptop Battery Life and Purchasing Extra Battery Life.
> 173<#_Toc401335218>
>
> Caring for Your Computer, Laptop and Monitor. 174<#_Toc401335219>
>
> Cleaning a LCD Monitor, HDTV, Phone and Camera Display. 176<#_Toc401335220>
>
> Recycle Your Old or Failed Tech Devices, Computer Equipment, and
> Batteries to Save the Environment177<#_Toc401335221>
>
> Recycle Your Failed Hard Drives, Old or Unusable CDs and DVDs to Save
> the Environment. 180<#_Toc401335222>
>
> Smartphone Dropped in Water, Liquid Dumped on a Keyboard or Laptop--What
> Now?. 183<#_Toc401335223>
>
> Summary -- A Sample 2014 Computer Server Setup. 183<#_Toc401335224>
>
> Chapter 4 -- Getting and Keeping Your Business/Home Continuously
> Connected to the Internet through an ISP.. 185<#_Toc401335225>
>
> Working From Home – How to Talk to Your ISP.. 185<#_Toc401335226>
>
> Working From Home - Do You want to Use Your ISP's Provided Equipment and
> DNS?. 186<#_Toc401335227>
>
> Alternatives to Your ISP's DNS for Better Speed and Security.
> 188<#_Toc401335228>
>
> Can Your ISP Technician Use the Advanced Technical Equipment Provided by
> Their Company?189<#_Toc401335229>
>
> Dial-up vs. DSL vs. Cable vs. Fiber. 191<#_Toc401335230>
>
> Establish a Service Contract and Service Level Agreement with Your ISP..
> 192<#_Toc401335231>
>
> Intermittent Outages to Cable Internet and Cable TV, What Can You Do?.
> 193<#_Toc401335232>
>
> Intermittent Outages to DSL Internet, What Can You Do?. 197<#_Toc401335233>
>
> Your ISP Web Site May Be Separate from Your ISP Email & Account.
> 198<#_Toc401335234>
>
> Summary-ISP Infrastructure, Testing the Final Result. 198<#_Toc401335235>
>
> Chapter 5 -- Using Encryption Software and Tools to Protect Your USB
> Drives, Email, Files and Folders, and to Verify Your Downloads Is
> Mandatory for Data Exchange with SBO Partners201<#_Toc401335236>
>
> Cryptography, What Is It, How Does It Work and Why Do You Need It?.
> 209<#_Toc401335237>
>
> Windows 7-Adding Tools & Utilities to the System PATH... 211<#_Toc401335238>
>
> Windows 7 -- Verifying Downloads Before Installation.. 212<#_Toc401335239>
>
> Boxcryptor-To Encrypt Individual Files for Syncing with the Cloud..
> 213<#_Toc401335240>
>
> TrueCrypt-Encrypting USB Drives and Folders. 215<#_Toc401335241>
>
> BitLocker-Encrypt Folders, Hard Drives and USB Drives. 219<#_Toc401335242>
>
> Microsoft Office -- How-To Password Protect & Unprotect Your Documents.
> 220<#_Toc401335243>
>
> How Secure Is Microsoft Office Encryption?. 221<#_Toc401335244>
>
> Linux -- Using GnuPG with SSH for Encryption Automation..
> 222<#_Toc401335245>
>
> GnuPG -- Generating Key Pairs -- Verifying Pubic Keys for the Exchange
> of Encrypted Data and Email226<#_Toc401335246>
>
> GunPG -- Signing and Assigning Trust Levels to Public Keys.
> 230<#_Toc401335247>
>
> GnuPG--Digital Signatures and Why They Are Important238<#_Toc401335248>
>
> GnuPG -- Scripting Encryption and File Transfer with Your Partners.
> 240<#_Toc401335249>
>
> Encrypting Emails Before Sending Them over the Internet -- Don’t Expose
> Your Correspondence to Crackers Everywhere. 270<#_Toc401335250>
>
> Encrypting Email with Outlook and Encipher.it272<#_Toc401335251>
>
> Use Multiple Email Addresses for Your Correspondence. 273<#_Toc401335252>
>
> Windows 7 -- Using Gpg4win and Claws to Encrypt Emails & Files.
> 277<#_Toc401335253>
>
> Thunderbird -- Using Enigmail to Encrypt Emails. 283<#_Toc401335254>
>
> Windows 7 -- Using GnuPG to Encrypt Files for Your OneDrive or Mobile
> Devices. 287<#_Toc401335255>
>
> FreeOTFE-Explorer a Deprecated Project to Create Encrypted Folders.
> 290<#_Toc401335256>
>
> Androsa--A Deprecated Graphical Tool to Encrypt Files. 291<#_Toc401335257>
>
> Chapter 6 -- Windows 7 -- Loading, Configuring and Setting Up Free and
> Useful Applications, Tools and Utilities.. 293<#_Toc401335258>
>
> Windows 7 -- After Loading the OS. 297<#_Toc401335259>
>
> How to Configure and Load Up a Desktop or Laptop Computer with All the
> Tools and Utilities You Will Ever Need.. 303<#_Toc401335260>
>
> Window 7 -- 101 Steps to Configuring and Loading up the Desktop or
> Laptop Hard Drive with Useful Software306<#_Toc401335261>
>
> SpiderOak -- Encrypting and Syncing up Your Contacts, Finance, and
> Investment Data.. 324<#_Toc401335262>
>
> Privacyfix Add-On to Check Your Privacy Settings. 328<#_Toc401335263>
>
> Ghostery Add-On to Harden Browsing.. 329<#_Toc401335264>
>
> Disconnect.me Add-On to Harden Browsing.. 330<#_Toc401335265>
>
> Albine's "Do Not Track Me" to Block Cookies and Trackers.
> 330<#_Toc401335266>
>
> Internet Explorer -- Setup & Hardening your Browser Security.
> 331<#_Toc401335267>
>
> Internet Explorer-Add-ons to Harden Browsing. 335<#_Toc401335268>
>
> Internet Explorer -- Get Rid of the Bloatware*. 335<#_Toc401335269>
>
> Firefox -- Setup & Hardening your Browser Security. 336<#_Toc401335270>
>
> Firefox -- Add-Ons to Harden Browsing, Encrypt Web Activity and Protect
> You. 338<#_Toc401335271>
>
> Firefox -- Backing Up and Restoring Your Bookmarks. 345<#_Toc401335272>
>
> Browser Diagnostics if Add-Ons Conflict or Drag down Performance.
> 345<#_Toc401335273>
>
> Windows 7 Explorer Demystified -- How-To Open up the Directories, Files
> and Programs You Use the Most with only a Few Clicks of the
> Mouse!346<#_Toc401335274>
>
> Windows 7 Explorer--File Locations. 347<#_Toc401335275>
>
> Windows 7 Explorer -- Creating a Shortcut Home Directory & Adding
> Favorites. 347<#_Toc401335276>
>
> Windows 7 Explorer -- Desktop Shortcuts Setup and Use. 348<#_Toc401335277>
>
> Windows 7--Problem Steps Recorder (PSR) Tool. 352<#_Toc401335278>
>
> Windows 7 -- Using GodMode to Quickly Navigate to all Your
> Administrative Needs. 353<#_Toc401335279>
>
> Windows 7 -- Repair Device Drivers Using Safe Mode and Other Methods.
> 353<#_Toc401335280>
>
> Windows 7 -- FlashCookieView to View Your Flash Cookies. 354<#_Toc401335281>
>
> Windows 7--How to Find and Kill a Runaway Process in Windows That Keeps
> Reappearing.. 355<#_Toc401335282>
>
> Chapter 7 -- Using Virtualization in Windows or Linux to Host a Guest
> OSs to Harden and Layer Our Computer Defenses.. 357<#_Toc401335283>
>
> Virtualization Solutions You Can Use on Your Core Operating System..
> 360<#_Toc401335284>
>
> Advantages and Disadvantages of the Various Virtualization Solutions.
> 362<#_Toc401335285>
>
> Network Address Translation -- Using NAT.. 364<#_Toc401335286>
>
> Hacking -- A Simple Exercise Using NMap to Scan Home Networks and
> Computers. 365<#_Toc401335287>
>
> Hardening Your Financial, E-commerce, and General Internet Activity
> Using Virtualization369<#_Toc401335288>
>
> Linux Desktops, Applications, Software, Packages, Utilities and Tools.
> 369<#_Toc401335289>
>
> Virtual Machine Name Standardization.. 372<#_Toc401335290>
>
> Parallels -- Creating Virtual Guest Operating Systems. 375<#_Toc401335291>
>
> Parallels -- Manual Installation of Parallel Tools. 376<#_Toc401335292>
>
> VMware Player -- Creating Virtual Guest Operating Systems.
> 378<#_Toc401335293>
>
> VMware Player -- Manual Installation of VMware Tools. 382<#_Toc401335294>
>
> Navigating the Menu Structure to Install Tools Manually. 383<#_Toc401335295>
>
> Command Line Installation of VMware Tools. 385<#_Toc401335296>
>
> VirtualBox -- Creating Virtual Guest Operating Systems. 386<#_Toc401335297>
>
> VirtualBox -- Installing the VirtualBox Guest Additions. 392<#_Toc401335298>
>
> BackTrack/Kali/Mint/Ubuntu--VirtualBox Guest Additions. 393<#_Toc401335299>
>
> OpenSUSE -- VirtualBox Guest Additions. 396<#_Toc401335300>
>
> Fedora -- VirtualBox Guest Additions. 396<#_Toc401335301>
>
> Windows Vista/XP -- VirtualBox Guest Additions. 397<#_Toc401335302>
>
> Command Line -- Using It in Windows and Linux. 398<#_Toc401335303>
>
> Terminal Window -- Customizing the Linux Command Line to Make Life Easy.
> 401<#_Toc401335304>
>
> GParted -- Manually Creating Partitions. 416<#_Toc401335305>
>
> Kali/BackTrack -- General Description -- Install & Update in VMware
> Player &VirtualBox. 420<#_Toc401335306>
>
> Kali-Debian -- Install and Setup in VirtualBox & VMware Player.
> 423<#_Toc401335307>
>
> BackTrack -- GNOME/KDE -- Setup in VirtualBox & VMware Player.
> 424<#_Toc401335308>
>
> Mint -- General Description.. 425<#_Toc401335309>
>
> Mint 17 -- Cinnamon Install in VirtualBox & VMware Player.
> 426<#_Toc401335310>
>
> Mint 17 -- KDE/MATE/XFCE-Install in VirtualBox & VMware Player.
> 427<#_Toc401335311>
>
> Mint-Debian 201403 Mate or Cinnamon Install in VirtualBox & VMware
> Player. 428<#_Toc401335312>
>
> Mint-201403-mate-cinnamon-dvd Setup in VirtualBox & VMware Player.
> 430<#_Toc401335313>
>
> Ubuntu 14.04 LTS LTS -- General Description.. 431<#_Toc401335314>
>
> Ubuntu -- Continued Install into VirtualBox & VMware Player.
> 432<#_Toc401335315>
>
> Ubuntu 11.04-Where Art Thou?Oh How We Miss You!433<#_Toc401335316>
>
> Ubuntu -- Root Login Setup. 434<#_Toc401335317>
>
> Ubuntu -- Timezone and Distribution Upgrade. 435<#_Toc401335318>
>
> Ubuntu -- General Setup after Install in VirtualBox & VMware Player.
> 436<#_Toc401335319>
>
> Ubuntu -- 14.04/13.10/12.04 LTS-Setup libdvdcss Repository.
> 438<#_Toc401335320>
>
> Mint-Ubuntu -- Finance Virtual Machine Creation.. 440<#_Toc401335321>
>
> KMyMoney -- Installing, Configuring and Using in a KDE VM...
> 441<#_Toc401335322>
>
> GnuCash -- Installing, Configuring and Using in a GNOME VM...
> 443<#_Toc401335323>
>
> Keepass -- Installing and Using in a Linux VM... 445<#_Toc401335324>
>
> Backtrack/Kali/Mint/Ubuntu--VM Setup Steps after Install.
> 447<#_Toc401335325>
>
> BackTrack/Kali/Mint/Ubuntu--Applying Software Updates & Package
> Management. 448<#_Toc401335326>
>
> Mint/Ubuntu -- Flash Player Installation.. 449<#_Toc401335327>
>
> Mint/Ubuntu -- Installing Additional Drivers, Applications, Tools &
> Utilities in Debian-Based Linux451<#_Toc401335328>
>
> Fedora -- General Description.. 474<#_Toc401335329>
>
> Fedora -- Install in VirtualBox & VMware Player. 475<#_Toc401335330>
>
> Fedora--Continued Install after Reboot in VirtualBox & VMware Player.
> 478<#_Toc401335331>
>
> Fedora 17 -- Historical Reference About Continued Install after Reboot
> in Oracle VirtualBox. 479<#_Toc401335332>
>
> Fedora -- Enable 'root' Login. 482<#_Toc401335333>
>
> Fedora -- General VM Configuration, Repository Setup, Applying Updates.
> 483<#_Toc401335334>
>
> Fedora -- Using the Command Line to Add the RPM Fusion Repository.
> 485<#_Toc401335335>
>
> Fedora -- Guided Steps to Set Up Your OS. 487<#_Toc401335336>
>
> Fedora -- Flash Player Installation and Configuration. 488<#_Toc401335337>
>
> Fedora -- Installing Additional Applications, Tools & Utilities.
> 490<#_Toc401335338>
>
> Fedora -- A Lesson in Starting and Stopping Services Automatically.
> 506<#_Toc401335339>
>
> OpenSUSE -- General Description.. 507<#_Toc401335340>
>
> OpenSUSE -- Install in VirtualBox & VMware Player. 508<#_Toc401335341>
>
> OpenSUSE -- Continued Install after VM Reboot in VirtualBox.
> 508<#_Toc401335342>
>
> OpenSUSE -- Setup in VMware Player after VM Creation. 512<#_Toc401335343>
>
> OpenSUSE -- General VM Configuration, Applying Updates. 513<#_Toc401335344>
>
> OpenSUSE -- Repository Setup & Tools Update. 516<#_Toc401335345>
>
> OpenSUSE -- General Configuration for GNOME 3D and Fallback.
> 520<#_Toc401335346>
>
> OpenSUSE -- Install Additional Applications, Tools & Utilities.
> 520<#_Toc401335347>
>
> GNOME Desktop -- Fedora-Mint General Configuration & Setup.
> 535<#_Toc401335348>
>
> KDE Desktop -- Fedora-Mint-openSUSE General Configuration & Setup.
> 536<#_Toc401335349>
>
> Adding Fonts to Linux. 538<#_Toc401335350>
>
> Adding Less Privileged User IDs for Specific Purposes to Linux.
> 540<#_Toc401335351>
>
> Using the Lynx Text-Based Browser. 544<#_Toc401335352>
>
> Windows-Vista/XP -- Install and Setup in VirtualBox and VMware Player.
> 545<#_Toc401335353>
>
> Starting and Stopping Parallels & VMware Player and its Services to Keep
> Your Computer Finally Fast!547<#_Toc401335354>
>
> Chapter 8 -- Prevent Corporations from Stalking You--How To Use the Tor
> Network, a Proxy, or JonDonym to Cloak Your Browser Activity (Surf
> Anonymously) in a Virtual OS.. 554<#_Toc401335355>
>
> Develop a Split Personality While Using the Infected Internet.
> 559<#_Toc401335356>
>
> Why Do We Need Anonymization When Using the Internet?. 560<#_Toc401335357>
>
> What the Internet Search Engine Privacy Statements Tell You..
> 566<#_Toc401335358>
>
> Use a Web Proxy or Web Proxy Server to Be More Anonymous.
> 566<#_Toc401335359>
>
> How the US Government Can Probably Track You Even If You Are Using Tor.
> 567<#_Toc401335360>
>
> Tor -- How It Works, Tor Drawbacks, Everything Done Using Tor Is Not
> Safe. 569<#_Toc401335361>
>
> JonDonym as an Alternative to Tor. 572<#_Toc401335362>
>
> Tails -- Live DVD or USB Install for Anonymity. 573<#_Toc401335363>
>
> Whonix -- Anonymity OS Solution.. 574<#_Toc401335364>
>
> Tor Bundle -- Install & Set Up in Any Linux OS as a Non-Root User.
> 575<#_Toc401335365>
>
> Windows 7/Vista/XP -- How-to Install, Run and Set Up Tor.
> 579<#_Toc401335366>
>
> Firefox -- Hardening the Browser to Use with the Tor Daemon and Proxy.
> 579<#_Toc401335367>
>
> Mint/Ubuntu -- Installing Tor Daemon and Supporting Software.
> 580<#_Toc401335368>
>
> Vidalia -- Setting Up and Using It, Manage or Relay Tor TBB or Daemon..
> 591<#_Toc401335369>
>
> Fedora -- Installing Tor Daemon and Supporting Software. 592<#_Toc401335370>
>
> Tor/Polipo/Privoxy Proxies -- General Information.. 595<#_Toc401335371>
>
> Fedora -- Install and Chain the Polipo Proxy to the Tor Proxy.
> 598<#_Toc401335372>
>
> Fedora -- Other Polipo Proxy Configuration Settings to Consider.
> 600<#_Toc401335373>
>
> Ubuntu/Mint -- Install and Chain the Polipo Proxy to the Tor Proxy.
> 603<#_Toc401335374>
>
> Privoxy--Install and Chain the Privoxy Proxy to the Tor Proxy.
> 605<#_Toc401335375>
>
> Anonymity Testing and Final Commentary. 607<#_Toc401335376>
>
> Chapter 9 -- Hardening Security Using Your Mobil Devices by Setting Up
> and Using an SSH Server on Your Remote Secure Network.. 609<#_Toc401335377>
>
> Tunnels -- What Are They, and How Can We Use Paid VPN Services to Keep
> Ourselves Secure at Hotspots Everywhere. 616<#_Toc401335378>
>
> OpenSSH Server for Your SB/HC -- What Hardware Is Needed?.
> 619<#_Toc401335379>
>
> Zero the Hard Drives and Install the Ubuntu OS on Your Server.
> 621<#_Toc401335380>
>
> Backing up Important System Files. 621<#_Toc401335381>
>
> Unchanging/Static IP -- Setting It up in Ubuntu Desktop. 622<#_Toc401335382>
>
> OpenSSH Server -- Installation and Configuration.. 624<#_Toc401335383>
>
> SSH Client -- Obtaining, Installing and Setting Up Software on Our
> Mobile Devices to Access Our Secure SSH Server Remotely628<#_Toc401335384>
>
> Dynamic SSH Domain--Creating an Unchanging Domain to Connect to Your
> Private Network from Anywhere630<#_Toc401335385>
>
> Using Software Firewalls to Harden Security and Block Ports.
> 631<#_Toc401335386>
>
> Linux SSH Client -- Establishing the First Client Connection with Our
> Linux SSH Server & the Copy of Our Client Public Key to the SSH Server.
> 635<#_Toc401335387>
>
> Macintosh SSH Client--Establishing the First Client Connection with Our
> Linux SSH Server & the Copy of Our Client Public Key to Server.
> 639<#_Toc401335388>
>
> Windows PuTTY Client -- Establishing the First Client Connection to a
> Linux SSH Server & the Copy of Our Client Public Key to the Server.
> 640<#_Toc401335389>
>
> Windows PuTTY -- Using the Command Line to Establish the First SSH
> Connection. 642<#_Toc401335390>
>
> Dynamic Port Forwarding -- Establishing a Dynamic SSH Tunnel Using the
> Command Line to Secure Our Browser Activity at Hotspots. 645<#_Toc401335391>
>
> Dynamic Port Forwarding -- Establishing a Dynamic SSH Tunnel Using the
> Putty GUI to Secure Our Browser Activity at Hotspots. 648<#_Toc401335392>
>
> Firefox/Internet Explorer and Hotmail SOCKS5 Configuration for Our
> Dynamic Tunnel649<#_Toc401335393>
>
> Local Port Forwarding -- To Secure Internet Applications that Can't use
> SOCKS. 651<#_Toc401335394>
>
> Using X11 Forwarding from Your SSH Server to Your Client655<#_Toc401335395>
>
> GNOME Secure Shell Tunnel Manager -- Graphical Tool to Manage Tunnels in
> Linux. 659<#_Toc401335396>
>
> Securing Windows Live OneDrive and Other Internet Applications on Your
> Mobile Device while on the Road to Keep Them from Automatically
> Connecting to a Public Network.. 660<#_Toc401335397>
>
> Thunderbird -- Setting Up Gmail in a Linux VM... 664<#_Toc401335398>
>
> Thunderbird & Windows Live Mail -- Setting up Gmail to Use an SSH
> Tunnel. 665<#_Toc401335399>
>
> Using an SSH Tunnel to Forward Email Ports and Use Dynamic Port
> Forwarding for the Web Browser to Keep Your Laptop Secure while on the
> Road.. 668<#_Toc401335400>
>
> SSH Server -- Secure Connections & File Transfer Using SSH Public &
> Private Keys. 669<#_Toc401335401>
>
> SSH Public/Private Key Establishment Between an SSH Client & SSH Server.
> 677<#_Toc401335402>
>
> SSH Agent, Specific Purpose Keys, Using authorized_keys to Restrict
> Access. 683<#_Toc401335403>
>
> PuTTY-SSH File Transfer Using a Fully Empowered Windows
> Client690<#_Toc401335404>
>
> Linux/MAC -- SSH Client & Windows 7 PuTTY Cheat Sheets. 697<#_Toc401335405>
>
> SSH KeepAlive to Keep Your Session Active. 700<#_Toc401335406>
>
> Setting Up a Fixed CHROOT to Secure a Linux SSH SFTP Server for File
> Transfer Using Public/Private Keys701<#_Toc401335407>
>
> Setting up a Variable CHROOT to Secure a Linux SSH SFTP Server for File
> Transfer Using Public/Private Keys711<#_Toc401335408>
>
> Setting up CHROOT Secure Linux SSH Server for SSH Login Using
> Public/Private Keys. 715<#_Toc401335409>
>
> Automating the Consolidation of Data on Our SSH Server. 722<#_Toc401335410>
>
> Automating the Encryption and Exchange of Data between Our Partners and
> Our SSH Server735<#_Toc401335411>
>
> Enabling Anonymous SSH Connections Using TOR.. 736<#_Toc401335412>
>
> Chapter 10 -- Setting up a Multiboot USB Drive, HAK5 at YouTube Calls it
> Your Multipass, One USB Key to Rule Them All.How-to Encrypt and Use a
> USB Data Drive from a Multiboot USB Drive!741<#_Toc401335413>
>
> OSs, Tools and Utilities to Install on Your Multipass. 742<#_Toc401335414>
>
> Portable Applications You May Want to Add to Your USB Data Drive.
> 747<#_Toc401335415>
>
> Setting up a Secure USB Drive and a Bootable USB Drive for Travel.
> 749<#_Toc401335416>
>
> Chapter 11 -- Before You Are Cracked!There Are Many Preventive Measures
> You Can Take to Thwart Identity Theft!754<#_Toc401335417>
>
> Simple Prevention Measures to Save You the Cost of Paid Services.
> 757<#_Toc401335418>
>
> How bad is Identity Theft?. 759<#_Toc401335419>
>
> Identity Thieves -- Who Are They and How Do They Do It?Could Be Anyone
> You Know!760<#_Toc401335420>
>
> Visit Your Local Spy Store, Hidden Cameras, Bug Detection and More.
> 762<#_Toc401335421>
>
> Detecting Hidden Cameras and Finding Surveillance Bugs. 764<#_Toc401335422>
>
> Invisible Ink--Using and Creating. 767<#_Toc401335423>
>
> Password -- The Weak Link in Securing Information, and Remains as the
> Default Method of Authentication769<#_Toc401335424>
>
> Password -- Examples of Corporations Hacked for Their Password Databases
> and Your Personal Information771<#_Toc401335425>
>
> Password Management Tools, Rules and Websites. 772<#_Toc401335426>
>
> Password -- Keepass and Password Safe Encrypted Password Databases.
> 774<#_Toc401335427>
>
> Don't Let Your Tax Return Result in Identity Theft, Cause an Audit
> Disaster or Defraud You775<#_Toc401335428>
>
> What to Look for in a U.S. Tax Preparer. 782<#_Toc401335429>
>
> 72 Steps You Need to Perform to Protect Your Identity. 783<#_Toc401335430>
>
> Child Identity Theft Information and Prevention.. 802<#_Toc401335431>
>
> Social Security Number Advice. 804<#_Toc401335432>
>
> What to Do if Your Identity Is Stolen.. 804<#_Toc401335433>
>
> Chapter 12 -- All About Smartphones and Why You Should Be Concerned...
> 808<#_Toc401335434>
>
> The Movies Are Real-Everyone Is Tracking Your Smartphone.
> 813<#_Toc401335435>
>
> Ex-Partner's Pictures and Data Posted Online, Cellphone Users
> Beware!817<#_Toc401335436>
>
> Getting Started with Your Smartphone. 819<#_Toc401335437>
>
> Secure and Protect Your Smartphone. 821<#_Toc401335438>
>
> Extend Your Smartphone's Battery Life. 824<#_Toc401335439>
>
> Turn off Geotagging in Your Smartphone Digital Camera; Don’t Let Them
> Track You!824<#_Toc401335440>
>
> What You Need to Know about Cellphone Tracking & Encryption..
> 825<#_Toc401335441>
>
> You Can Use an SSH Tunnel on Your Android Phone. 827<#_Toc401335442>
>
> About the Author Continued -- This Author's Survival Story in War, from
> Cancer, and Life.Never Give Up!Never Surrender!829<#_Toc401335443>
>
> Glossary.. 837<#_Toc401335444>
>
> Appendix 1, Citations.. 843<#_Toc401335445>
>
> Appendix 2:A brief Linux VIM Editor Cheat Sheet.. 844<#_Toc401335446>
>
> On 10/16/2014 3:18 PM, Andrew Spencer wrote:
>> Hi,
>>
>> I have been working as a system administrator for 3 years, but was turned
>> into an armadillo. I am now out of a job and I will be moving to New York
>> on October 28th in pursuit of becoming a Linux Administrator. I would like
>> to find a mentor and or guidance on where to get affordable training. Any
>> help or guidance is greatly appreciated from my end.
>>
>> Warmest Regards,
>> Andrew Spencer
>> _______________________________________________
>> mdlug mailing list
>> mdlug at mdlug.org
>> http://mdlug.org/mailman/listinfo/mdlug

-- 

*Kirk Ellis, President and CEO | ThatCyberSecurityGuy LLC*

*kirk at thatcybersecurityguy.com*

*Home/Work/Text/Cell: 734-239-2259*

My 1000 page how-to book is coming January 2015, Our World Needs:"*The 
Internet is Infected!The Ultimate Cyber Security Guide for Small 
Business & Home Computing*"

Visit my book website at http://thatcybersecurityguy.com.

Visit my blog at http://thatcybersecurityguy.blogspot.com.

Follow me on Twitter http://twitter.com/thatcybersecguy or 
@thatcybersecguy <http://twitter.com/thatcybersecguy>.

View all my *unprofessional*, work in progress, bookmark favorites at 
http://thatcybersecurityguy.com/favorites.

/Write the first draft with your heart.Re-write with your head.///

 From the movie Finding Forrester:As I finish the book this is one of 
the most profound statements I have ever heard!

/Demonstrate to the world there is "No Better Friend, No Worse Enemy 
than a U.S. Marine."/

General James N. Mattis

/Success is the sum of small efforts, repeated day in and day out./

Robert Collie//



More information about the mdlug mailing list