Flylib.com
Linux Server Hacks, Volume Two: Tips & Tools for Connecting, Monitoring, and Troubleshooting
Linux Server Hacks, Volume Two: Tips & Tools for Connecting, Monitoring, and Troubleshooting
ISBN: 735615799
EAN: 2147483647
Year: 1998
Pages: 159
Authors:
William von Hagen
,
Brian K. Jones
BUY ON AMAZON
Cover
LOC
Dedication
Acknowledgments
Introduction
How to Use This Book
How to Use the Companion CD-ROM
Support
Part I: Legacy Networking APIs
Chapter 1 -- NetBIOS
Microsoft NetBIOS
NetBIOS Programming Basics
Common NetBIOS Routines
Datagram Operations
Miscellaneous NetBIOS Commands
Platform Considerations
Conclusion
Chapter 2 -- The Redirector
Universal Naming Convention
Multiple UNC Provider
Network Providers
Redirector
Server Message Block
Security
Network Security
A Practical Example
Conclusion
Chapter 3 -- Mailslots
Mailslot Implementation Details
Basic ClientServer
Additional Mailslot APIs
Platform and Performance Considerations
Conclusion
Chapter 4 -- Named Pipes
Named Pipe Implementation Details
Basic Server and Client
Other API Calls
Platform and Performance Considerations
Conclusion
Part II: The Winsock API
Chapter 5 -- Network Principles and Protocols
Protocol Characteristics
Supported Protocols
Winsock 2 Protocol Information
Windows Sockets
Platform-Specific Information
Selecting the Right Protocol
Conclusion
Chapter 6 -- Address Families and Name Resolution
IP
Infrared Sockets
IPXSPX
NetBIOS
AppleTalk
ATM
Additional Winsock 2 Support Functions
Conclusion
Chapter 7 -- Winsock Basics
Initializing Winsock
Error Checking and Handling
Connection-Oriented Protocols
Connectionless Protocols
Miscellaneous API Functions
Windows CE
Other Address Families
Conclusion
Chapter 8 -- Winsock IO Methods
Socket Modes
Socket IO Models
IO Model Consideration
Conclusion
Chapter 9 -- Socket Options and Ioctls
Socket Options
IOCTLSOCKET and WSAIOCTL
Conclusion
Chapter 10 -- Registration and Name Resolution
Background
Name Space Models
Registering a Service
Querying a Service
Conclusion
Chapter 11 -- Multicasting
Multicast Semantics
IP Multicasting
ATM Multicasting
Multicasting with Winsock
Conclusion
Chapter 12 -- Generic Quality of Service
Background
QOS and Winsock
Terminating QOS
Programming QOS
Examples
ATM and QOS
Conclusion
Chapter 13 -- Raw Sockets
Raw Socket Creation
Internet Control Message Protocol
Internet Group Management Protocol
Using IP_HDRINCL
Conclusion
Chapter 14 -- Winsock 2 Service Provider Interface
SPI Basics
Transport Service Providers
Name Space Service Providers
Debug Tracing Winsock 2 SPI Functions
Conclusion
Chapter 15 -- The Microsoft Visual Basic Winsock Control
Properties
Methods
Events
UDP Example
TCP Example
Limitations
Common Errors
The Windows CE Winsock Control
Conclusion
Part III: Remote Access Service (RAS)
Chapter 16 -- Remote Access Service Client
Compiling and Linking
Data Structures and Platform Compatibility Issues
DUN 1.3 Upgrade and Windows 95
RasDial
Phonebook
Connection Management
Conclusion
Appendix A -- NetBIOS Command Reference
NCBADDGRNAME
NCBADDNAME
NCBASTAT
NCBCALL
NCBCANCEL
NCBCHAINSEND
NCBCHAINSENDNA
NCBDELNAME
NCBDGRECV
NCBDGRECVBC
NCBDGSEND
NCBDGSENDBC
NCBENUM
NCBFINDNAME
NCBHANGUP
NCBLANSTALERT
NCBLISTEN
NCBRECV
NCBRECVANY
NCBRESET
NCBSEND
NCBSENDNA
NCBSSTAT
NCBUNLINK
Appendix B -- IP Helper Functions
Ipconfig
Netstat
Route
ARP
Appendix C -- Winsock Error Codes
About the Authors
Linux Server Hacks, Volume Two: Tips & Tools for Connecting, Monitoring, and Troubleshooting
ISBN: 735615799
EAN: 2147483647
Year: 1998
Pages: 159
Authors:
William von Hagen
,
Brian K. Jones
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to SQL Server Using Integrated Security from ASP.NET
Querying Data Asynchronously with Message Queuing
Getting a Sequence Value from Oracle
Deserializing Data
Avoiding Referential Integrity Problems When Updating the Data Source
Network Security Architectures
Security Technologies
Network Security Platform Options
Types of Identity
Site-to-Site Deployment Examples
Tool Capabilities
Twisted Network Programming Essentials
Installing Twisted
Installing from Source Files
Checking Whether a Page Has Changed
Using the REST Architecture for Web Services
Sending Mail Using SMTP
Ruby Cookbook (Cookbooks (OReilly))
Compressing and Archiving Files with Gzip and Tar
Searching for Books on Amazon
Who s Calling That Method? A Call Graph Analyzer
Running a Code Block on Many Objects Simultaneously
Killing All Processes for a Given User
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Indirect Privilege Escalation
Accessing the Network
MPLS Configuration on Cisco IOS Software
VPN Categories
Implementing BGP in MPLS VPNs
Option 3: Multi-Hop MP-eBGP Between RR and eBGP Between ASBRs
Configuring L2TPv3 Dynamic Tunnels
Implementing AToM for Like to Like Circuits
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies