Happy CIST Certificate
1. Linux Studying.1
The name "Linux" comes from the Linux kernel, originally written in 1991 by Linus Torvalds. The main supporting user space system tools and libraries from the GNU Project (announced in 1993 by Richanrd Stallman) are the basis for the Free Software Foundation's preferred name.. L
2 Configure Joomla:
Joomla! is used all over the world to power everything from simple, personal homepages to complex corporate web applications. Here are just some of the ways Joomla! is used:
It is simple for even non-technical users to add or edit content, update images, and to manage the critical data that makes your company or organization go. Anybody with basic word processing skills can easily learn to manage a Joomla! site. We have found CMS to be the best tool for building your own online community.
- Corporate websites or portals
- Online commerce
- Small business websites
- Non-profit and organizational websites
- Government applications
- Corporate intranets and extranets
- School and church websites
- Personal or family homepages
- Community-based portals
- Magazines and newspapers
- the possibilities are limitless…
Via a simple, browser-based interface you will be able to easily add new press releases or news items, manage staff pages, job listings, product images, and create an unlimited amount of sections or content pages on your site.
3 Configure Wordpress
Most of the WordPress community comes from a web development background, rather than a writing background. That can make it tough to interpret many of the keywords that some WordPress users write as a matter of course. These definitions can help you interpret the jargon:
4 Configure Cacti
A cactus (plural: cacti, cactuses or cactus) is a member of the plant family Cactaceae. Their distinctive appearance is a result of adaptions to conserve water in dry and/or hot environments. In most species, the stem has evolved to become photosynthetic andsucculent, while the leaves have evolved into spines. Many species are used for ornamental plants, and some are also grown for fodder, forage, fruits, cochineal, and other uses.
Cacti come in a wide range of shapes and sizes. The tallest is Pachycereus pringlei, with a maximum recorded height of 19.2 m, and the smallest is Blossfeldia liliputiana, only about 1 cm in diameter at maturity. Cactus flowers are large, and like the spines arise from distinctive features called areoles.
5 Configure Nagios
Nagios is a popular host and service monitoring tool used by many administrators to keep an eye on their systems.
Since I wrote a basic installation guide in Jan 2006 on Cool Solutions many new versions were published and many Nagios plugins are now available. Because of that I think it's time to write a series of articles here that show you some very interesting solutions. I hope that you find them helpful and that you can use them in your environment. If you are not yet and nagios user I hope that I can inspire you and you give it a try.
I don't want to write here a full documentation about Nagios, I prefer to give you a basic installation guide so you can set it up very easy and play with it yourself. The installation guide will show you how to install Nagios as well as some interesting extensions and how they integrate into each other. During this installation you will make many modifications to the installation that will help to understand how it works, how you can integrate systems and different services. I will also provide some articles about monitoring special services where I describe what they do and what configuration changes are needed. All together should give you a very good overview and documentation on how you can enhance the Nagios installation yourself.
6 Configure Mail Server
How Mail Access Monitor works?
It's hard to imagine an office without access to e-mail. Just as hard as finding a large company that does not have irresponsible employees who prefer exchanging e-mail messages with their friends rather than doing their job. If you are a manager, business owner or IT specialist, you have to know that there is a simple, quick and inexpensive way to take control of corporate e-mail system. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office. The program works with all popular e-mail servers (MDaemon, Kerio MailServer, Merak Mail Server, MS Exchange Server, VisNetic MailServer, CommuniGate Pro, SendMail, PostFix and QMail) and builds charts that are easy to comprehend.
7 Configure Horde Mail
You can use either the webmail interface or an email client. If you need help configuring email clients, please visit the step-by-step guides for configuring MS outlook and Mozilla Thunderbird.
You can easily access your WebMail interface by just visiting: http://www.yourdomain.com/webmail, where 'yourdomain.com' is your actual domain name. If this is not working for you, it might be possible that your ISP is blocking the access to non-standard ports accessed through SSL connection. In this case, please use:http://webmail.servername.com, where 'servername.com' should be the name of your server (e.g.http://webmail.siteground121.com).