Linux Networking Cookbook. From Asterisk to Zebra with Easy-to-Use Recipes

- Autor:
- Carla Schroder
- Promocja Przejdź


- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 642
- Dostępne formaty:
-
ePubMobi
Opis książki: Linux Networking Cookbook. From Asterisk to Zebra with Easy-to-Use Recipes
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network.
Running a network doesn't mean you have all the answers. Networking is a complex subject with reams of reference material that's difficult to keep straight, much less remember. If you want a book that lays out the steps for specific tasks, that clearly explains the commands and configurations, and does not tax your patience with endless ramblings and meanderings into theory and obscure RFCs, this is the book for you.
You will find recipes for:
- Building a gateway, firewall, and wireless access point on a Linux network
- Building a VoIP server with Asterisk
- Secure remote administration with SSH
- Building secure VPNs with OpenVPN, and a Linux PPTP VPN server
- Single sign-on with Samba for mixed Linux/Windows LANs
- Centralized network directory with OpenLDAP
- Network monitoring with Nagios or MRTG
- Getting acquainted with IPv6
- Setting up hands-free networks installations of new systems
- Linux system administration via serial console
Wybrane bestsellery
-
Ta książka jest praktycznym i wyczerpującym przewodnikiem, dzięki któremu w pełni wykorzystasz możliwości Kali Linux. Opisano w niej wiele interesujących zagadnień związanych z przeprowadzaniem testów penetracyjnych. Dowiesz się, jak zbudować nowoczesne środowisko testowe z użyciem kontenerów Doc...(0,00 zł najniższa cena z 30 dni)
69.30 zł
99.00 zł(-30%) -
Tę książkę docenią administratorzy systemów, projektanci, inżynierowie aplikacji i entuzjaści Linuksa. Dzięki niej dowiesz się, jak tworzyć i uruchamiać złożone polecenia rozwiązujące rzeczywiste problemy, przetwarzające i pobierające informacje, a także automatyzujące zadania, które dotychczas t...
Wiersz poleceń Linuksa. Rozwijanie umiejętności efektywnej pracy Wiersz poleceń Linuksa. Rozwijanie umiejętności efektywnej pracy
(0,00 zł najniższa cena z 30 dni)41.30 zł
59.00 zł(-30%) -
To książka przeznaczona dla użytkowników komputerów pracujących pod kontrolą Linuksa. Znalazły się w niej tak ważne kwestie, jak omówienie komponentów o krytycznym znaczeniu i mechanizmów kontroli dostępu czy wyjaśnienie systemu plików w Linuksie. Umieszczono tu również liczne wskazówki i ćwiczen...
Nowoczesny Linux. Przewodnik dla użytkownika natywnej chmury Nowoczesny Linux. Przewodnik dla użytkownika natywnej chmury
(0,00 zł najniższa cena z 30 dni)48.30 zł
69.00 zł(-30%) -
Wykrywanie śladów niewłaściwego użycia dotyczy maszyn, które zarówno posłużyły do przeprowadzenia ataków, jak i były ich przedmiotem. Obecnie dostępnych jest wiele opracowań poświęconych sposobom działania na miejscu zdarzenia i analizie działających systemów Linux za pomocą poleceń dostępnych po...
Systemy Linux w kryminalistyce. Praktyczny przewodnik dla analityków śledczych Systemy Linux w kryminalistyce. Praktyczny przewodnik dla analityków śledczych
(0,00 zł najniższa cena z 30 dni)90.30 zł
129.00 zł(-30%) -
To trzecie wydanie bestsellerowego podręcznika dla administratorów systemów Linux. Zostało zaktualizowane i uzupełnione materiałem dotyczącym menedżera LVM, wirtualizacji i kontenerów. Znajdziesz tu informacje o sposobie pracy poszczególnych elementów systemu Linux i o sekwencji jego rozruchu. W ...
Jak działa Linux. Podręcznik administratora. Wydanie III Jak działa Linux. Podręcznik administratora. Wydanie III
(0,00 zł najniższa cena z 30 dni)69.30 zł
99.00 zł(-30%) -
Paweł Zaręba, autor Praktycznych projektów sieciowych, od wielu lat związany z branżą IT i ICT, za namową swoich wiernych czytelników napisał drugą książkę. Tę wcześniejszą można traktować jako kompendium wiedzy na temat sieci komputerowych - Projekty i rozwiązania sieciowe w praktyce są niejako ...(0,00 zł najniższa cena z 30 dni)
48.30 zł
69.00 zł(-30%) -
Autor znanych czytelnikom wydawnictwa Helion książek między innymi na temat otwartoźródłowego systemu operacyjnego przygotował szóstą już edycję przewodnika po komendach i poleceniach Linuksa. W kieszonkowym leksykonie omówił posługiwanie się komputerem z Linuksem na pokładzie za pomocą poleceń, ...(0,00 zł najniższa cena z 30 dni)
27.93 zł
39.90 zł(-30%) -
Jeśli myślisz o bliższym zaprzyjaźnieniu się z Linuksem, to teraz jest na to świetny czas – całkiem niedawno świat ujrzał jego nową, podobno najszybszą, najładniejszą i najbardziej stabilną edycję w historii! W niniejszym kursie przedstawimy Ci dystrybucję Ubuntu 22.04 „Jammy Jellyfis...
Ubuntu 22.04. Kurs video. Zostań administratorem Linux Ubuntu 22.04. Kurs video. Zostań administratorem Linux
(0,00 zł najniższa cena z 30 dni)109.45 zł
199.00 zł(-45%) -
Książka jest kolejnym wydaniem bestsellerowego podręcznika, dzięki któremu już za chwilę możesz zacząć wpisywać pierwsze polecenia w terminalu, aby niespostrzeżenie przejść do tworzenia złożonych skryptów w najnowszej wersji basha 4.x, najpopularniejszej powłoki Linuksa. Przedstawiono tu nowe ope...
Linux. Wprowadzenie do wiersza poleceń. Wydanie II Linux. Wprowadzenie do wiersza poleceń. Wydanie II
(0,00 zł najniższa cena z 30 dni)69.30 zł
99.00 zł(-30%) -
Przedstawiamy dziesiąte wydanie kultowej książki o Linuksie. Jest napisana tak, aby każdy mógł jak najszybciej rozpocząć pracę z tym systemem, zabezpieczyć go i sprawnie nim administrować. Duży nacisk położono na korzystanie ze skryptów powłoki i naukę ręcznej edycji plików konfiguracyjnych. Opis...(0,00 zł najniższa cena z 30 dni)
104.30 zł
149.00 zł(-30%)
O autorze książki
1 Carla SchroderCarla Schroder od połowy lat 90. zeszłego stulecia pracowała jako administrator sieci. Napisała ponad 1000 dokumentów typu HOWTO przeznaczonych do różnych publikacji. Obecnie pisze podręczniki dla użytkowników oprogramowania korporacyjnego dla Linuksa. Słynie z umiejętności przystępnego wyjaśniania trudnych zagadnień.
Carla Schroder - pozostałe książki
-
Ta książka przyda się początkującym i średnio zaawansowanym użytkownikom tego systemu. Dzięki niej nauczysz się korzystać z narzędzi graficznych i tych działających w powłoce. Poznasz również podstawy administrowania systemami linuksowymi i przygotujesz się do tego, by sprawnie rozpocząć z nimi p...
Linux. Receptury. Najważniejsze umiejętności użytkownika i administratora. Wydanie II Linux. Receptury. Najważniejsze umiejętności użytkownika i administratora. Wydanie II
(65.40 zł najniższa cena z 30 dni)76.30 zł
109.00 zł(-30%) -
This handy cookbook teaches new-to-intermediate Linux users the essential skills necessary to manage a Linux system, using both graphical and command-line tools. Whether you run Linux in embedded, desktop, server, or cloud or virtual environments, the fundamental skills are the same. This book ai...(29.90 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
Dzięki podręcznikowi "Sieci Linux. Receptury" dowiesz się, w jaki sposób przygotować router, jak skonfigurować firewall przy użyciu pakietu iptables oraz jak stworzyć punkt dostępu do sieci bezprzewodowej i serwer VoIP, korzystający z popularnego rozwiązania Asterisk. Jeżeli jesteś administratore...(34.90 zł najniższa cena z 30 dni)
53.40 zł
89.00 zł(-40%) -
"Linux. Receptury" to książka, dzięki której Linux wyda się mniej przerażający. Zawiera rozwiązania większości problemów mogących pojawić się podczas pracy z Linuksem.
Kup polskie wydanie:
Sieci Linux. Receptury
- Autor:
- Carla Schroder
53,40 zł
89,00 zł
(34.90 zł najniższa cena z 30 dni)
Ebooka przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolonych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video zobaczysz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolonych urządzeniach i aplikacjach obsługujących format MP4 (pliki spakowane w ZIP)
Szczegóły książki
- ISBN Ebooka:
- 978-05-965-5369-2, 9780596553692
- Data wydania ebooka:
-
2007-11-26
Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@helion.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 4.7MB
- Rozmiar pliku Mobi:
- 10.7MB
- Kategorie:
Sieci komputerowe » Konfiguracja sieci
Systemy operacyjne » Linux
Spis treści książki
- Linux Networking Cookbook
- SPECIAL OFFER: Upgrade this ebook with OReilly
- A Note Regarding Supplemental Files
- Preface
- Audience
- Contents of This Book
- What Is Included
- Which Linux Distributions Are Used in the Book
- Downloads and Feedback
- Conventions
- Using Code Examples
- Comments and Questions
- Safari Books Online
- Acknowledgments
- 1. Introduction to Linux Networking
- 1.0. Introduction
- Connecting to the Internet
- Overview of Internet Service Options
- Cable, DSL, and Dial-Up
- Cable
- DSL
- Dial-up
- Cable, DSL, and dial-up gotchas
- Regulated Broadband Services
- Private Networks
- Latency, Bandwidth, and Throughput
- Hardware Options for Your Linux Firewall/Gateway
- High-End Enterprise Routers
- Not-So-High-End Commercial Routers
- Switches
- Management port
- Serial port
- MDI/MDI-X (Medium Dependent Interfaces)
- Lots of blinky lights
- Jumbo frames
- Port trunking
- VLANs
- QoS
- Per-port access controls
- Network Interface Cards (NICs)
- 1.0. Introduction
- Gigabit Ethernet Gotchas
- Cabling
- Wireless Networking
- 2. Building a Linux Gateway on a Single-Board Computer
- 2.0. Introduction
- Required Hardware
- Software
- What to Do with Old PCs?
- 2.0. Introduction
- 2.1. Getting Acquainted with the Soekris 4521
- Problem
- Solution
- Discussion
- See Also
- 2.2. Configuring Multiple Minicom Profiles
- Problem
- Solution
- Discussion
- See Also
- 2.3. Installing Pyramid Linux on a Compact Flash Card
- Problem
- Solution
- Discussion
- See Also
- 2.4. Network Installation of Pyramid on Debian
- Problem
- Solution
- Discussion
- See Also
- 2.5. Network Installation of Pyramid on Fedora
- Problem
- Solution
- Discussion
- See Also
- 2.6. Booting Pyramid Linux
- Problem
- Solution
- Discussion
- See Also
- 2.7. Finding and Editing Pyramid Files
- Problem
- Solution
- Discussion
- See Also
- 2.8. Hardening Pyramid
- Problem
- Solution
- Discussion
- See Also
- 2.9. Getting and Installing the Latest Pyramid Build
- Problem
- Solution
- Discussion
- See Also
- 2.10. Adding Additional Software to Pyramid Linux
- Problem
- Solution
- Discussion
- See Also
- 2.11. Adding New Hardware Drivers
- Problem
- Solution
- Discussion
- See Also
- 2.12. Customizing the Pyramid Kernel
- Problem
- Solution
- Discussion
- See Also
- 2.13. Updating the Soekris comBIOS
- Problem
- Solution
- Discussion
- See Also
- 3. Building a Linux Firewall
- 3.0. Introduction
- Separating Private and Public
- Windows Security
- Iptables and NAT, SNAT, and DNAT
- When Is a Firewall Needed?
- iptables Overview
- iptables Policies and Rules
- Tables Overview
- Specialized Linux Firewall and Routing Distributions
- Important Disclaimer
- 3.0. Introduction
- 3.1. Assembling a Linux Firewall Box Problem
- Solution
- Discussion
- Cabling
- Network interfaces
- See Also
- 3.2. Configuring Network Interface Cards on Debian
- Problem
- Solution
- Discussion
- Configuration definitions
- See Also
- 3.3. Configuring Network Interface Cards on Fedora
- Problem
- Solution
- Discussion
- See Also
- 3.4. Identifying Which NIC Is Which
- Problem
- Solution
- Discussion
- See Also
- 3.5. Building an Internet-Connection Sharing Firewall on a Dynamic WAN IP Address
- Problem
- Solution
- Discussion
- See Also
- 3.6. Building an Internet-Connection Sharing Firewall on a Static WAN IP Address
- Problem
- Solution
- Discussion
- See Also
- 3.7. Displaying the Status of Your Firewall
- Problem
- Solution
- Discussion
- See Also
- 3.8. Turning an iptables Firewall Off
- Problem
- Solution
- Discussion
- See Also
- 3.9. Starting iptables at Boot, and Manually Bringing Your Firewall Up and Down
- Problem
- Solution
- Discussion
- See Also
- 3.10. Testing Your Firewall
- Problem
- Solution
- Discussion
- Application-level security
- See Also
- 3.11. Configuring the Firewall for Remote SSH Administration
- Problem
- Solution
- Discussion
- See Also
- 3.12. Allowing Remote SSH Through a NAT Firewall
- Problem
- Solution
- Discussion
- See Also
- 3.13. Getting Multiple SSH Host Keys Past NAT
- Problem
- Solution
- Discussion
- See Also
- 3.14. Running Public Services on Private IP Addresses
- Problem
- Solution
- Discussion
- See Also
- 3.15. Setting Up a Single-Host Firewall
- Problem
- Solution
- Discussion
- See Also
- 3.16. Setting Up a Server Firewall
- Problem
- Solution
- Discussion
- See Also
- 3.17. Configuring iptables Logging
- Problem
- Solution
- See Also
- 3.18. Writing Egress Rules
- Problem
- Solution
- Discussion
- See Also
- 4. Building a Linux Wireless Access Point
- 4.0. Introduction
- Security
- See Also
- 4.0. Introduction
- 4.1. Building a Linux Wireless Access Point
- Problem
- Solution
- Discussion
- See Also
- 4.2. Bridging Wireless to Wired
- Problem
- Solution
- Discussion
- See Also
- 4.3. Setting Up Name Services
- Problem
- Solution
- Discussion
- See Also
- 4.4. Setting Static IP Addresses from the DHCP Server
- Problem
- Solution
- Discussion
- See Also
- 4.5. Configuring Linux and Windows Static DHCP Clients
- Problem
- Solution
- Discussion
- See Also
- 4.6. Adding Mail Servers to dnsmasq
- Problem
- Solution
- Discussion
- See Also
- 4.7. Making WPA2-Personal Almost As Good As WPA-Enterprise
- Problem
- Solution
- Discussion
- See Also
- 4.8. Enterprise Authentication with a RADIUS Server
- Problem
- Solution
- Discussion
- See Also
- 4.9. Configuring Your Wireless Access Point to Use FreeRADIUS
- Problem
- Solution
- Discussion
- See Also
- 4.10. Authenticating Clients to FreeRADIUS
- Problem
- Solution
- Discussion
- See Also
- 4.11. Connecting to the Internet and Firewalling
- Problem
- Solution
- Discussion
- See Also
- 4.12. Using Routing Instead of Bridging
- Problem
- Solution
- Discussion
- See Also
- 4.13. Probing Your Wireless Interface Card
- Problem
- Solution
- Discussion
- See Also
- 4.14. Changing the Pyramid Routers Hostname
- Problem
- Solution
- Discussion
- See Also
- 4.15. Turning Off Antenna Diversity
- Problem
- Solution
- Discussion
- See Also
- 4.16. Managing dnsmasq's DNS Cache
- Problem
- Solution
- Discussion
- See Also
- 4.17. Managing Windows' DNS Caches
- Problem
- Solution
- Discussion
- See Also
- 4.18. Updating the Time at Boot
- Problem
- Solution
- Discussion
- See Also
- 5. Building a VoIP Server with Asterisk
- 5.0. Introduction
- Test-lab Hardware and Software
- Production Hardware and Software
- Call Quality
- Digium, Asterisk, and the Zapata Telephony Project
- Asterisk Implementations
- Using Asterisk
- See Also
- 5.0. Introduction
- 5.1. Installing Asterisk from Source Code
- Problem
- Solution
- Discussion
- See Also
- 5.2. Installing Asterisk on Debian
- Problem
- Solution
- Discussion
- See Also
- 5.3. Starting and Stopping Asterisk
- Problem
- Solution
- Discussion
- See Also
- 5.4. Testing the Asterisk Server
- Problem
- Solution
- Discussion
- See Also
- 5.5. Adding Phone Extensions to Asterisk and Making Calls
- Problem
- Solution
- Discussion
- sip.conf
- Dialplans
- See Also
- 5.6. Setting Up Softphones
- Problem
- Solution
- Discussion
- See Also
- 5.7. Getting Real VoIP with Free World Dialup
- Problem
- Solution
- Discussion
- See Also
- 5.8. Connecting Your Asterisk PBX to Analog Phone Lines
- Problem
- Solution
- Discussion
- See Also
- 5.9. Creating a Digital Receptionist
- Problem
- Solution
- Discussion
- See Also
- 5.10. Recording Custom Prompts
- Problem
- Solution
- Discussion
- See Also
- 5.11. Maintaining a Message of the Day
- Problem
- Solution
- Discussion
- See Also
- 5.12. Transferring Calls
- Problem
- Solution
- Discussion
- See Also
- 5.13. Routing Calls to Groups of Phones
- Problem
- Solution
- Discussion
- See Also
- 5.14. Parking Calls
- Problem
- Solution
- Discussion
- See Also
- 5.15. Customizing Hold Music
- Problem
- Solution
- Discussion
- See Also
- 5.16. Playing MP3 Sound Files on Asterisk
- Problem
- Solution
- See Also
- 5.17. Delivering Voicemail Broadcasts
- Problem
- Solution
- Discussion
- See Also
- 5.18. Conferencing with Asterisk
- Problem
- Solution
- Discussion
- See Also
- 5.19. Monitoring Conferences
- Problem
- Solution
- Discussion
- See Also
- 5.20. Getting SIP Traffic Through iptables NAT Firewalls
- Problem
- Solution
- Discussion
- See Also
- 5.21. Getting IAX Traffic Through iptables NAT Firewalls
- Problem
- Solution
- Discussion
- See Also
- 5.22. Using AsteriskNOW, "Asterisk in 30 Minutes"
- Problem
- Solution
- Discussion
- See Also
- 5.23. Installing and Removing Packages on AsteriskNOW
- Problem
- Solution
- Discussion
- See Also
- 5.24. Connecting Road Warriors and Remote Users
- Problem
- Solution
- Discussion
- See Also
- 6. Routing with Linux
- 6.0. Introduction
- Exterior Protocols
- Linux Routing and Networking Commands
- 6.0. Introduction
- 6.1. Calculating Subnets with ipcalc
- Problem
- Solution
- Discussion
- See Also
- 6.2. Setting a Default Gateway
- Problem
- Solution
- Discussion
- See Also
- 6.3. Setting Up a Simple Local Router
- Problem
- Solution
- Discussion
- See Also
- 6.4. Configuring Simplest Internet Connection Sharing
- Problem
- Solution
- Discussion
- See Also
- 6.5. Configuring Static Routing Across Subnets
- Problem
- Solution
- Discussion
- See Also
- 6.6. Making Static Routes Persistent
- Problem
- Solution
- Discussion
- See Also
- 6.7. Using RIP Dynamic Routing on Debian
- Problem
- Solution
- Discussion
- See Also
- 6.8. Using RIP Dynamic Routing on Fedora
- Problem
- Solution
- Discussion
- See Also
- 6.9. Using Quagga's Command Line
- Problem
- Solution
- Discussion
- See Also
- 6.10. Logging In to Quagga Daemons Remotely
- Problem
- Solution
- Discussion
- See Also
- 6.11. Running Quagga Daemons from the Command Line
- Problem
- Solution
- Discussion
- See Also
- 6.12. Monitoring RIPD
- Problem
- Solution
- Discussion
- See Also
- 6.13. Blackholing Routes with Zebra
- Problem
- Solution
- Discussion
- See Also
- 6.14. Using OSPF for Simple Dynamic Routing
- Problem
- Solution
- Discussion
- See Also
- 6.15. Adding a Bit of Security to RIP and OSPF
- Problem
- Solution
- Discussion
- See Also
- 6.16. Monitoring OSPFD
- Problem
- Solution
- Discussion
- See Also
- 7. Secure Remote Administration with SSH
- 7.0. Introduction
- OpenSSH
- SSH Tunneling
- OpenSSH Components
- Using OpenSSH
- Key types
- 7.0. Introduction
- 7.1. Starting and Stopping OpenSSH
- Problem
- Solution
- Discussion
- See Also
- 7.2. Creating Strong Passphrases
- Problem
- Solution
- Discussion
- 7.3. Setting Up Host Keys for Simplest Authentication
- Problem
- Solution
- Discussion
- See Also
- 7.4. Generating and Copying SSH Keys
- Problem
- Solution
- Discussion
- See Also
- 7.5. Using Public-Key Authentication to Protect System Passwords
- Problem
- Solution
- Discussion
- See Also
- 7.6. Managing Multiple Identity Keys
- Problem
- Solution
- Discussion
- See Also
- 7.7. Hardening OpenSSH
- Problem
- Solution
- Discussion
- See Also
- 7.8. Changing a Passphrase
- Problem
- Solution
- Discussion
- See Also
- 7.9. Retrieving a Key Fingerprint
- Problem
- Solution
- Discussion
- See Also
- 7.10. Checking Configuration Syntax
- Problem
- Solution
- Discussion
- See Also
- 7.11. Using OpenSSH Client Configuration Files for Easier Logins
- Problem
- Solution
- Discussion
- See Also
- 7.12. Tunneling X Windows Securely over SSH
- Problem
- Solution
- Discussion
- See Also
- 7.13. Executing Commands Without Opening a Remote Shell
- Problem
- Solution
- Discussion
- See Also
- 7.14. Using Comments to Label Keys
- Problem
- Solution
- Discussion
- See Also
- 7.15. Using DenyHosts to Foil SSH Attacks
- Problem
- Solution
- Discussion
- See Also
- 7.16. Creating a DenyHosts Startup File
- Problem
- Solution
- Discussion
- See Also
- 7.17. Mounting Entire Remote Filesystems with sshfs
- Problem
- Solution
- Discussion
- See Also
- 8. Using Cross-Platform Remote Graphical Desktops
- 8.0. Introduction
- rdesktop
- FreeNX
- VNC
- Built-in Remote Desktop Sharing in KDE and Gnome
- 8.0. Introduction
- 8.1. Connecting Linux to Windows via rdesktop
- Problem
- Solution
- Discussion
- See Also
- 8.2. Generating and Managing FreeNX SSH Keys
- Problem
- Solution
- Discussion
- See Also
- 8.3. Using FreeNX to Run Linux from Windows
- Problem
- Solution
- Set up the server
- Get the client
- Set up the connection
- Discussion
- See Also
- 8.4. Using FreeNX to Run Linux from Solaris, Mac OS X, or Linux
- Problem
- Solution
- Discussion
- See Also
- 8.5. Managing FreeNX Users
- Problem
- Solution
- Discussion
- See Also
- 8.6. Watching Nxclient Users from the FreeNX Server
- Problem
- Solution
- Discussion
- See Also
- 8.7. Starting and Stopping the FreeNX Serve
- Problem
- Solution
- Discussion
- See Also
- 8.8. Configuring a Custom Desktop
- Problem
- Solution
- Discussion
- See Also
- 8.9. Creating Additional Nxclient Sessions
- Problem
- Solution
- Discussion
- See Also
- Problem
- Solution
- Discussion
- See Also
- 8.10. Enabling File and Printer Sharing, and Multimedia in Nxclient
- Problem
- Solution
- Discussion
- See Also
- 8.11. Preventing Password-Saving in Nxclient
- Problem
- Solution
- Discussion
- See Also
- 8.12. Troubleshooting FreeNX
- Problem
- Solution
- See Also
- 8.13. Using VNC to Control Windows from Linux
- Problem
- Solution
- Discussion
- See Also
- 8.14. Using VNC to Control Windows and Linux at the Same Time
- Problem
- Solution
- Discussion
- See Also
- 8.15. Using VNC for Remote Linux -to-Linux Administration
- Problem
- Solution
- Discussion
- See Also
- 8.16. Displaying the Same Windows Desktop to Multiple Remote Users
- Problem
- Solution
- Discussion
- See Also
- 8.17. Changing the Linux VNC Server Password
- Problem
- Solution
- Discussion
- See Also
- 8.18. Customizing the Remote VNC Desktop
- Problem
- Solution
- Discussion
- See Also
- 8.19. Setting the Remote VNC Desktop Size
- Problem
- Solution
- Discussion
- See Also
- 8.20. Connecting VNC to an Existing X Session
- Problem
- Solution
- Discussion
- See Also
- 8.21. Securely Tunneling x11vnc over SSH
- Problem
- Solution
- Discussion
- See Also
- 8.22. Tunneling TightVNC Between Linux and Windows
- Problem
- Solution
- Discussion
- See Also
- 9. Building Secure Cross-Platform Virtual Private Networks with OpenVPN
- 9.0. Introduction
- What About IPSec?
- OpenVPN
- 9.0. Introduction
- 9.1. Setting Up a Safe OpenVPN Test Lab
- Problem
- Solution
- Discussion
- See Also
- 9.2. Starting and Testing OpenVPN
- Problem
- Solution
- Discussion
- See Also
- 9.3. Testing Encryption with Static Keys
- Problem
- Solution
- Discussion
- See Also
- 9.4. Connecting a Remote Linux Client Using Static Keys
- Problem
- Solution
- Discussion
- See Also
- 9.5. Creating Your Own PKI for OpenVPN
- Problem
- Solution
- Discussion
- See Also
- 9.6. Configuring the OpenVPN Server for Multiple Clients
- Problem
- Solution
- Discussion
- See Also
- 9.7. Configuring OpenVPN to Start at Boot
- Problem
- Solution
- Discussion
- See Also
- 9.8. Revoking Certificates
- Problem
- Solution
- Discussion
- See Also
- 9.9. Setting Up the OpenVPN Server in Bridge Mode
- Problem
- Solution
- Discussion
- See Also
- 9.10. Running OpenVPN As a Nonprivileged User
- Problem
- Solution
- Discussion
- See Also
- 9.11. Connecting Windows Clients
- Problem
- Solution
- Discussion
- See Also
- 10. Building a Linux PPTP VPN Server
- 10.0. Introduction
- Windows Client Necessary Updates
- PPTP Security
- IPSec VPN
- Linux Requirements
- Is PPTP Really Easier?
- See Also
- 10.0. Introduction
- 10.1. Installing Poptop on Debian Linux
- Problem
- Solution
- Discussion
- See Also
- 10.2. Patching the Debian Kernel for MPPE Support
- Problem
- Solution
- Discussion
- See Also
- 10.3. Installing Poptop on Fedora Linux
- Problem
- Solution
- Discussion
- See Also
- 10.4. Patching the Fedora Kernel for MPPE Support
- Problem
- Solution
- Discussion
- See Also
- 10.5. Setting Up a Standalone PPTP VPN Server
- Problem
- Solution
- Discussion
- See Also
- 10.6. Adding Your Poptop Server to Active Directory
- Problem
- Solution
- Discussion
- See Also
- 10.7. Connecting Linux Clients to a PPTP Server
- Problem
- Solution
- Discussion
- See Also
- 10.8. Getting PPTP Through an iptables Firewall
- Problem
- Solution
- Discussion
- See Also
- 10.9. Monitoring Your PPTP Server
- Problem
- Solution
- Discussion
- See Also
- 10.10. Troubleshooting PPTP
- Problem
- Solution
- Discussion
- See Also
- 11. Single Sign-on with Samba for Mixed Linux/Windows LANs
- 11.0. Introduction
- Replacing an NT4 Domain Controller
- Hardware Requirements
- 11.0. Introduction
- 11.1. Verifying That All the Pieces Are in Place
- Problem
- Solution
- Discussion
- See Also
- 11.2. Compiling Samba from Source Code
- Problem
- Solution
- Discussion
- See Also
- 11.3. Starting and Stopping Samba
- Problem
- Solution
- Discussion
- See Also
- 11.4. Using Samba As a Primary Domain Controller
- Problem
- Solution
- Discussion
- See Also
- 11.5. Migrating to a Samba Primary Domain Controller from an NT4 PDC
- Problem
- Solution
- Discussion
- See Also
- 11.6. Joining Linux to an Active Directory Domain
- Problem
- Solution
- Discussion
- See Also
- 11.7. Connecting Windows 95/98/ME to a Samba Domain
- Problem
- Solution
- Discussion
- See Also
- 11.8. Connecting Windows NT4 to a Samba Domain
- Problem
- Solution
- Discussion
- See Also
- 11.9. Connecting Windows NT/2000 to a Samba Domain
- Problem
- Solution
- Discussion
- See Also
- 11.10. Connecting Windows XP to a Samba Domain
- Problem
- Solution
- Discussion
- See Also
- 11.11. Connecting Linux Clients to a Samba Domain with Command-Line Programs
- Problem
- Solution
- Discussion
- See Also
- 11.12. Connecting Linux Clients to a Samba Domain with Graphical Programs
- Problem
- Solution
- Discussion
- Konqueror
- Nautilus
- Smb4k
- LinNeighborhood
- See Also
- 12. Centralized Network Directory with OpenLDAP
- 12.0. Introduction
- LDAP Directory Structure
- Schemas, objectClasses, and Attributes
- The "Secret" RootDSE
- Deciding How Deep Your Directory Is
- 12.0. Introduction
- 12.1. Installing OpenLDAP on Debian
- Problem
- Solution
- Discussion
- See Also
- 12.2. Installing OpenLDAP on Fedora
- Problem
- Solution
- Discussion
- See Also
- 12.3. Configuring and Testing the OpenLDAP Server
- Problem
- Solution
- Discussion
- See Also
- 12.4. Creating a New Database on Fedora
- Problem
- Solution
- Discussion
- ObjectClasses and attributes
- See Also
- 12.5. Adding More Users to Your Directory
- Problem
- Solution
- Discussion
- See Also
- 12.6. Correcting Directory Entries
- Problem
- Solution
- Discussion
- See Also
- 12.7. Connecting to a Remote OpenLDAP Server
- Problem
- Solution
- Discussion
- See Also
- 12.8. Finding Things in Your OpenLDAP Directory
- Problem
- Solution
- Discussion
- See Also
- 12.9. Indexing Your Database
- Problem
- Solution
- Discussion
- See Also
- 12.10. Managing Your Directory with Graphical Interfaces
- Problem
- Solution
- Discussion
- See Also
- 12.11. Configuring the Berkeley DB
- Problem
- Solution
- Discussion
- See Also
- 12.12. Configuring OpenLDAP Logging
- Problem
- Solution
- Discussion
- See Also
- 12.13. Backing Up and Restoring Your Directory
- Problem
- Solution
- Discussion
- See Also
- 12.14. Refining Access Controls
- Problem
- Solution
- Discussion
- See Also
- 12.15. Changing Passwords
- Problem
- Solution
- Discussion
- See Also
- 13. Network Monitoring with Nagios
- 13.0. Introduction
- See Also
- 13.0. Introduction
- 13.1. Installing Nagios from Sources
- Problem
- Solution
- Discussion
- See Also
- 13.2. Configuring Apache for Nagios
- Problem
- Solution
- Discussion
- See Also
- 13.3. Organizing Nagios' Configuration Files Sanely
- Problem
- Solution
- Discussion
- See Also
- 13.4. Configuring Nagios to Monitor Localhost
- Problem
- Solution
- Discussion
- See Also
- 13.5. Configuring CGI Permissions for Full Nagios Web Access
- Problem
- Solution
- Discussion
- See Also
- 13.6. Starting Nagios at Boot
- Problem
- Solution
- Discussion
- See Also
- 13.7. Adding More Nagios Users
- Problem
- Solution
- Discussion
- See Also
- 13.8. Speed Up Nagios with check_icmp
- Problem
- Solution
- Discussion
- See Also
- 13.9. Monitoring SSHD
- Problem
- Solution
- Discussion
- Command definitions
- Host definitions
- Service definitions
- See Also
- 13.10. Monitoring a Web Server
- Problem
- Solution
- Discussion
- See Also
- 13.11. Monitoring a Mail Server
- Problem
- Solution
- Discussion
- See Also
- 13.12. Using Servicegroups to Group Related Services
- Problem
- Solution
- Discussion
- See Also
- 13.13. Monitoring Name Services
- Problem
- Solution
- Discussion
- See Also
- 13.14. Setting Up Secure Remote Nagios Administration with OpenSSH
- Problem
- Solution
- Discussion
- See Also
- 13.15. Setting Up Secure Remote Nagios Administration with OpenSSL
- Problem
- Solution
- Discussion
- See Also
- 14. Network Monitoring with MRTG
- 14.0. Introduction
- 14.1. Installing MRTG
- Problem
- Solution
- Discussion
- See Also
- 14.2. Configuring SNMP on Debian
- Problem
- Solution
- Discussion
- See Also
- 14.3. Configuring SNMP on Fedora
- Problem
- Solution
- Discussion
- See Also
- 14.4. Configuring Your HTTP Service for MRTG
- Problem
- Solution
- Discussion
- See Also
- 14.5. Configuring and Starting MRTG on Debian
- Problem
- Solution
- Discussion
- See Also
- 14.6. Configuring and Starting MRTG on Fedora
- Problem
- Solution
- Discussion
- See Also
- 14.7. Monitoring Active CPU Load
- Problem
- Solution
- Discussion
- See Also
- 14.8. Monitoring CPU User and Idle Times
- Problem
- Solution
- Discussion
- See Also
- 14.9. Monitoring Physical Memory
- Problem
- Solution
- Discussion
- See Also
- 14.10. Monitoring Swap Space and Memory
- Problem
- Solution
- Discussion
- See Also
- 14.11. Monitoring Disk Usage
- Problem
- Solution
- Discussion
- See Also
- 14.12. Monitoring TCP Connections
- Problem
- Solution
- Discussion
- See Also
- 14.13. Finding and Testing MIBs and OIDs
- Problem
- Solution
- Discussion
- See Also
- 14.14. Testing Remote SNMP Queries
- Problem
- Solution
- Discussion
- See Also
- 14.15. Monitoring Remote Hosts
- Problem
- Solution
- Discussion
- See Also
- 14.16. Creating Multiple MRTG Index Pages
- Problem
- Solution
- Discussion
- See Also
- 14.17. Running MRTG As a Daemon
- Problem
- Solution
- Discussion
- See Also
- 15. Getting Acquainted with IPv6
- 15.0. Introduction
- Barriers to Adoption
- Anatomy of IPv6 Addresses
- IPv6 address types and ranges
- Counting in Hexadecimal
- Mac and Windows IPv6 Support
- 15.0. Introduction
- 15.1. Testing Your Linux System for IPv6 Support
- Problem
- Solution
- Discussion
- See Also
- 15.2. Pinging Link Local IPv6 Hosts
- Problem
- Solution
- Discussion
- See Also
- 15.3. Setting Unique Local Unicast Addresses on Interfaces
- Problem
- Solution
- Discussion
- See Also
- 15.4. Using SSH with IPv6
- Problem
- Solution
- Discussion
- See Also
- 15.5. Copying Files over IPv6 with scp
- Problem
- Solution
- Discussion
- See Also
- 15.6. Autoconfiguration with IPv6
- Problem
- Solution
- Discussion
- See Also
- 15.7. Calculating IPv6 Addresses
- Problem
- Solution
- Discussion
- See Also
- 15.8. Using IPv6 over the Internet
- Problem
- Solution
- Discussion
- See Also
- 16. Setting Up Hands-Free Network Installations of New Systems
- 16.0. Introduction
- PXE Boot
- USB Boot
- Installation
- 16.0. Introduction
- 16.1. Creating Network Installation Boot Media for Fedora Linux
- Problem
- Solution
- Discussion
- See Also
- 16.2. Network Installation of Fedora Using Network Boot Media
- Problem
- Solution
- Discussion
- See Also
- 16.3. Setting Up an HTTP-Based Fedora Installation Server
- Problem
- Solution
- Discussion
- See Also
- 16.4. Setting Up an FTP-Based Fedora Installation Server
- Problem
- Solution
- Discussion
- See Also
- 16.5. Creating a Customized Fedora Linux Installation
- Problem
- Solution
- Discussion
- See Also
- 16.6. Using a Kickstart File for a Hands-off Fedora Linux Installation
- Problem
- Solution
- Discussion
- See Also
- 16.7. Fedora Network Installation via PXE Netboot
- Problem
- Solution
- Discussion
- See Also
- 16.8. Network Installation of a Debian System
- Solution
- Discussion
- See Also
- 16.9. Building a Complete Debian Mirror with apt-mirror
- Problem
- Solution
- Discussion
- See Also
- 16.10. Building a Partial Debian Mirror with apt-proxy
- Problem
- Solution
- Discussion
- See Also
- 16.11. Configuring Client PCs to Use Your Local Debian Mirror
- Problem
- Solution
- Discussion
- See Also
- 16.12. Setting Up a Debian PXE Netboot Server
- Problem
- Solution
- Discussion
- See Also
- 16.13. Installing New Systems from Your Local Debian Mirror
- Problem
- Solution
- Discussion
- See Also
- 16.14. Automating Debian Installations with Preseed Files
- Problem
- Solution
- Discussion
- See Also
- 17. Linux Server Administration via Serial Console
- 17.0. Introduction
- 17.1. Preparing a Server for Serial Console Administration
- Problem
- Solution
- Discussion
- Modems
- See Also
- 17.2. Configuring a Headless Server with LILO
- Problem
- Solution
- Discussion
- See Also
- 17.3. Configuring a Headless Server with GRUB
- Problem
- Solution
- Discussion
- See Also
- 17.4. Booting to Text Mode on Debian
- Problem
- Solution
- Discussion
- See Also
- 17.5. Setting Up the Serial Console
- Problem
- Solution
- Discussion
- File permissions
- See Also
- 17.6. Configuring Your Server for Dial-in Administration
- Problem
- Solution
- Discussion
- See Also
- 17.7. Dialing In to the Server
- Problem
- Solution
- Discussion
- See Also
- 17.8. Adding Security
- Problem
- Solution
- Discussion
- See Also
- 17.9. Configuring Logging
- Problem
- Solution
- Discussion
- See Also
- 17.10. Uploading Files to the Server
- Problem
- Solution
- Discussion
- See Also
- 18. Running a Linux Dial-Up Server
- 18.0. Introduction
- 18.1. Configuring a Single Dial-Up Account with WvDial
- Problem
- Solution
- Discussion
- See Also
- 18.2. Configuring Multiple Accounts in WvDial
- Problem
- Solution
- Discussion
- See Also
- 18.3. Configuring Dial-Up Permissions for Nonroot Users
- Problem
- Solution
- Discussion
- See Also
- 18.4. Creating WvDial Accounts for Nonroot Users
- Problem
- Solution
- Discussion
- See Also
- 18.5. Sharing a Dial-Up Internet Account
- Problem
- Solution
- Discussion
- See Also
- 18.6. Setting Up Dial-on-Demand
- Problem
- Solution
- Discussion
- See Also
- 18.7. Scheduling Dial-Up Availability with cron
- Problem
- Solution
- Discussion
- See Also
- 18.8. Dialing over Voicemail Stutter Tones
- Problem
- Solution
- Discussion
- See Also
- 18.9. Overriding Call Waiting
- Problem
- Solution
- Discussion
- See Also
- 18.10. Leaving the Password Out of the Configuration File
- Problem
- Solution
- Discussion
- See Also
- 18.11. Creating a Separate pppd Logfile
- Problem
- Solution
- Discussion
- 19. Troubleshooting Networks
- 19.0. Introduction
- Testing and Tracing Cabling
- Spares for Testing
- 19.0. Introduction
- 19.1. Building a Network Diagnostic and Repair Laptop
- Problem
- Solution
- Discussion
- See Also
- 19.2. Testing Connectivity with ping Problem
- Problem
- Solution
- Discussion
- See Also
- 19.3. Profiling Your Network with FPing and Nmap
- Problem
- Solution
- Discussion
- See Also
- 19.4. Finding Duplicate IP Addresses with arping
- Problem
- Solution
- Discussion
- See Also
- 19.5. Testing HTTP Throughput and Latency with httping
- Problem
- Solution
- Discussion
- See Also
- 19.6. Using traceroute, tcptraceroute, and mtr to Pinpoint Network Problems
- Problem
- Solution
- Discussion
- See Also
- 19.7. Using tcpdump to Capture and Analyze Traffic
- Problem
- Solution
- Discussion
- See Also
- 19.8. Capturing TCP Flags with tcpdump
- Problem
- Solution
- Discussion
- See Also
- 19.9. Measuring Throughput, Jitter, and Packet Loss with iperf
- Problem
- Solution
- Discussion
- See Also
- 19.10. Using ngrep for Advanced Packet Sniffing
- Problem
- Solution
- Discussion
- See Also
- 19.11. Using ntop for Colorful and Quick Network Monitoring
- Problem
- Solution
- Discussion
- See Also
- 19.12. Troubleshooting DNS Servers
- Problem
- Solution
- Discussion
- See Also
- 19.13. Troubleshooting DNS Clients
- Problem
- Solution
- Discussion
- See Also
- 19.14. Troubleshooting SMTP Servers
- Problem
- Solution
- Discussion
- See Also
- 19.15. Troubleshooting a POP3, POP3s, or IMAP Server
- Problem
- Solution
- Discussion
- See Also
- 19.16. Creating SSL Keys for Your Syslog-ng Server on Debian
- Problem
- Solution
- Discussion
- See Also
- 19.17. Creating SSL Keys for Your Syslog-ng Server on Fedora
- Problem
- Solution
- Discussion
- See Also
- 19.18. Setting Up stunnel for Syslog-ng
- Problem
- Solution
- Discussion
- See Also
- 19.19. Building a Syslog Server
- Problem
- Solution
- Discussion
- See Also
- A. Essential References
- B. Glossary of Networking Terms
- C. Linux Kernel Building Reference
- C.1. Building a Custom Kernel
- Prerequisites
- Building a Vanilla Kernel
- Configuration Options
- Adding New Loadable Kernel Modules
- Patching a Kernel
- Customizing Fedora Kernels
- Customizing Debian Kernels
- See Also
- C.1. Building a Custom Kernel
- About the Author
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
FinOps brings financial accountability to the variable spend model of cloud. Used by the majority of global enterprises, this management practice has grown from a fringe activity to the de facto discipline managing cloud spend. In this book, authors J.R. Storment and Mike Fuller outline the proce...(0,00 zł najniższa cena z 30 dni)
262.65 zł
309.00 zł(-15%) -
Edge AI is transforming the way computers interact with the real world, allowing IoT devices to make decisions using the 99% of sensor data that was previously discarded due to cost, bandwidth, or power limitations. With techniques like embedded machine learning, developers can capture human intu...(0,00 zł najniższa cena z 30 dni)
262.65 zł
309.00 zł(-15%) -
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all ...(0,00 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Python was recently ranked as today's most popular programming language on the TIOBE index, thanks to its broad applicability to design and prototyping to testing, deployment, and maintenance. With this updated fourth edition, you'll learn how to get the most out of Python, whether you're a profe...(0,00 zł najniższa cena z 30 dni)
296.65 zł
349.00 zł(-15%) -
With the accelerating speed of business and the increasing dependence on technology, companies today are significantly changing the way they build in-house business solutions. Many now use low-code and no code technologies to help them deal with specific issues, but that's just the beginning. Wit...
Building Solutions with the Microsoft Power Platform Building Solutions with the Microsoft Power Platform
(0,00 zł najniższa cena z 30 dni)262.65 zł
309.00 zł(-15%) -
Companies are scrambling to integrate AI into their systems and operations. But to build truly successful solutions, you need a firm grasp of the underlying mathematics. This accessible guide walks you through the math necessary to thrive in the AI field such as focusing on real-world application...(0,00 zł najniższa cena z 30 dni)
262.65 zł
309.00 zł(-15%) -
DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code.In this book, authors BK Sarthak Das and Virginia Chu d...(0,00 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
With the increasing use of AI in high-stakes domains such as medicine, law, and defense, organizations spend a lot of time and money to make ML models trustworthy. Many books on the subject offer deep dives into theories and concepts. This guide provides a practical starting point to help develop...(0,00 zł najniższa cena z 30 dni)
262.65 zł
309.00 zł(-15%) -
Why are so many companies adopting GitOps for their DevOps and cloud native strategy? This reliable framework is quickly becoming the standard method for deploying apps to Kubernetes. With this practical, developer-oriented book, DevOps engineers, developers, IT architects, and SREs will learn th...(0,00 zł najniższa cena z 30 dni)
262.65 zł
309.00 zł(-15%) -
Learn the essentials of working with Flutter and Dart to build full stack applications that meet the needs of a cloud-driven world. Together, the Flutter open source UI software development kit and the Dart programming language for client development provide a unified solution to building applica...(0,00 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
W przypadku usługi "Druk na żądanie" termin dostarczenia przesyłki może obejmować także czas potrzebny na dodruk (do 10 dni roboczych)
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.


Oceny i opinie klientów: Linux Networking Cookbook. From Asterisk to Zebra with Easy-to-Use Recipes Carla Schroder (0)
Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.