Unix

Implementing CIFS: The Common Internet File System by Christopher Hertel

By Christopher Hertel

The 1st developer's advisor to Microsoft's de facto Internet/intranet dossier sharing standard.For years, builders and directors have struggled to appreciate CIFS, Microsoft's poorly documented general for Internet/intranet dossier sharing. eventually, there's an authoritative, cross-platform advisor to CIFS services and behaviour. imposing CIFS condenses the difficult gained knowledge of the Samba Team-dedicated to investigating the interior workings of CIFS. It additionally identifies and describes the most important requirements and assisting.

Show description

Read or Download Implementing CIFS: The Common Internet File System PDF

Best unix books

Network and System Security

Network and procedure safety presents targeted insurance of community and method defense applied sciences. Explores sensible ideas to a variety of community and structures defense matters. Chapters are authored via prime specialists within the box and tackle the fast and long-term demanding situations within the authors' respective components of workmanship. assurance comprises development a safe association; cryptography; procedure intrusion; UNIX and Linux protection; net safety, intranet defense; LAN safeguard; instant community safeguard; mobile community safeguard, RFID defense, and extra.

* Chapters contributed via leaders within the box overlaying foundational and useful points of approach and community protection, delivering a brand new point of technical services now not came across elsewhere.

* complete and up to date insurance of the topic sector permits the reader to place present applied sciences to paintings

* provides equipment of study and challenge fixing suggestions, improving the reader's seize of the cloth and skill to enforce sensible strategies

Solaris Solutions for System Administrators: Time-Saving Tips, Techniques, and Workarounds

* Teaches how one can paintings clever and steer clear of the various pitfalls of dealing with Solaris platforms * Covers the most recent unlock of Solaris, Solaris nine, in addition to previous types * Written via specialists with years of Solaris adventure * filled with sensible, hands-on recommendations to difficult difficulties, exhibiting easy methods to stay away from high priced errors * Tackles handling approach functionality; the sunlight hearth line of Solaris company servers; fitting, configuring, and patching Solaris; and making sure defense"

SCJP Sun Certified Programmer for Java 5 Study Guide (Exam 310-055)

Get the e-book that indicates you not just what to check, yet how you can research. the single classroom-based built-in learn approach for pro certification provides whole insurance of all ambitions for the sunlight qualified Programmer for Java five examination, 1000s of perform examination questions, and hands-on routines.

Additional info for Implementing CIFS: The Common Internet File System

Sample text

That is, what actually happens on the wire? A little packet sniffing and a few simple tests will provide the answers we need. Here's the plan: Part I: NBT: NetBIOS over TCP/IP 33 34 Part I: NBT: NetBIOS over TCP/IP 1. Use lower-case or mixed-case names when configuring your test hosts. 2. Set up your sniffer to capture packets on UDP port 137. 3. Start or restart your test hosts. 4. After a few minutes, stop the capture. If your sniffer can decode the NetBIOS names (Ethereal and NetMon can) then you will see that the NetBIOS names are all in upper case.

This field is always 0x00 in request packets (those with an R value of zero). Each response packet type has its own set of possible RCODE values. QDCOUNT The number of names that follow in the query section. We will set this to 1 for our broadcast name query. ANCOUNT The number of answers in a POSITIVE NAME QUERY RESPONSE message. This field will be used in the replies we get in response to our broadcast query. NSCOUNT, ARCOUNT These are "Name Service Authority Count" and "Additional Record Count," respectively.

Obviously, a "real" implementation would need * to be much more flexible. * ---------------------------------------------------- ** */ { ushort *hdr = (ushort *)msg; uchar *rrec; ushort flags; int len; int rr_len; flags = OPCODE_REGISTER | NM_RD_BIT | NM_B_BIT; Put_NS_TID( hdr, 1964 ); Put_NS_Hdr_Flags( hdr, flags ); Put_NS_Hdr_Rec_Counts( hdr, (QUERYREC | ADDREC) ); 60 Part I: NBT: NetBIOS over TCP/IP Part I: NBT: NetBIOS over TCP/IP len = 12; 61 /* Fixed size of header. */ len += Put_Qrec( &msg[len], name, ' ', '\0', "", QTYPE_NB ); rrec = rr_len rr_len rr_len rr_len &msg[len]; = Put_RRec_LSP( += Put_RRec_TTL( += Put_RDLength( += Put_RD_Addr( rrec, rrec, rrec, rrec, /* /* /* /* /* /* Query Rec Pointer NetBIOS name Padding char Suffix Scope ID Qtype: Name */ */ */ */ */ */ RRTYPE_NB ); rr_len, 0 ); rr_len, 6 ); rr_len, ONT_B, addr ); return( len + rr_len ); } /* BuildRegMsg */ void ReadRegReply( int sock ) /* ---------------------------------------------------- ** * Read a reply packet, and verify that it contains the * expected RCODE value.

Download PDF sample

Rated 4.54 of 5 – based on 31 votes