This is a summarization for all PHP functions with small description and the syntax required for the function and example too.

The summerization categorized into the following:

-PHP Functions - File Manipulation:

>> Date Function
Print Date("j/n/y");          >> (22/3/2002)
print date("h:i:s A");        >> (05:11:19 AM)

>> Basename Function
ashraf.co/help/index.php
echo basname("ashraf.co/help/index.php");    // Print Base name
The Base Name Of the file will be >> index.php

>> Dirname Function
ashraf.co/help/index.php
echo dirname("ashraf.co/help/index.php");
The Dir Name OF the Link will be >> ashraf.co/help

>> CHMOD Function    ( Modify Licences & Permission Of Files )
Important Modes 755 for scripts & 777 for folders and files
Chmod("test",0755);    // give mode 755 for test Folder.

>> CHOWN Function     ( Multiple Users Own Multiple Files and Folders )
chown( User identify , File Or Folder );

>> Copy Function    ( Copy file or Folder )
copy("arab1.jpg","arab1.pak");    // Copy arab1.jpg file to arab1.pak

>> Unlink Function     ( Delete Specific File )
unlink("arab1.pak");    // notice we put name of the file or it's path.
if it's in another directory.

>> Diskfreespace Function    ( The Free Space of the disk )
echo diskfreespace("/");    // we can write a folder name instead /

>> File Function    ( Read & Manipulate Result of Files )
$myarry = file('http://www.ashraf.co/index.html');
// read the file index and put it in myarray

>> File_exists        ( Check if file exist (return 1) or not ( return Any )
if(file_exists("pic.jpg")
{ echo "File is found"; }
else
{ echo "File doesn't exist"; }

>> Filesize Function    ( Check the size of the file we want )
echo filesize ("pic.gif");

>> Fopen Function     ( Open the file to can deal with it )
$fp = fopen("File.txt", "r");
$fp = fopen("file.txt", "w");
$fp = fopen("http://www.ashraf.co/file.txt", "w");
$fp = fopen("http://www.ashraf.co/file.txt", "r");

>> Fclose Function     ( Close the file opened by fopen function )
$fp = fopen("file.txt","r");
fclose($fp);

>> Fread Function    ( After Open file Read some part of the file or whole file)
$fp = fopen("file.txt","r");
$contents = fread($fp,20);    // read 20 bytes only from the file.
$fclose($fp);

>> Feof    Function    ( End of file >> Check if we reach the end of file or not)
feof($fp)

>> Fwrite Function    ( Write to the file specific thing )
Fwrite($fp,"My Program");    // My Program is The text we want to write.

>> File Function    ( Read Complete file without need for open or close it )
file("http://www.gerainmo.net");

>> Is_dir Function    ( Check if Directory found ( return 1 ) or not ( 0 ) )
echo is_dir ("mydirectory");

>> mkdir Function    ( Make new directory by name and permission )
echo mkdir("Ashraf",0777); // create Ashraf directory with full access.

>> rmdir Function    ( Remove Specific directory )
echo rmdir("Ashraf");

>> rename Function    ( Rename specific file or folder )
echo rename ("Ashraf","Adel");     // rename Ashraf file to Adel.

>> realpath Function    ( Complete real path for specific file )
echo realpath("Ashraf.txt");

-PHP Functions - Arraies Functions:

>> Array Function    ( Create Two or Multi Dimentional Arrays )
$test = Array("A","S","H","R","A","F");

>> Array_count_values    ( count repeated values and non repeated
$count = array_count_values($test);

>> print_r Function    ( Print the array elments )
print_r($test);

>> array_keys        ( Get Keys or names of the elements of the array)
array_keys($test);

>> array_merge        ( merge 2 or more arrays in one array only )
$test1 = array ("a","b","c");
$test2 = array ("c","f","g");
$test = array_merge ($test1, $test2);

>> array_pop         ( delete laste elment in the array )
array_pop($test);

>> array_push        ( Add one or more elements in the end of the array )
array_push($test, "d", "y");

>> array_reverse    ( reverse the array from end to the start )
array_reverse($test);

>> array_shift        ( Del first element in the array )
array_shift($test);

>> array_unique        ( return the array's values distinct without any repeat )
array_unique($test);

>> array_values        ( return all the array values in new array )
array_Values($test);

>> asort        ( arrange array's elements from small to bigger )
asort($test);

>> arsort        ( arrange array's elements from high to low )
arsort($test);

>> Count        ( Return the No. of elements in the array )
count($test);

>> in_array        ( Check if the value if found in the array or not )
in_array("b",$test);    // b is the value.


-PHP Functions - Mathematical Operations:


>> bcadd        ( add 2 numbers whatever thier datatype )
bcadd("1.59","9.87",1);        // 1 specify how many number after ,
Result: 11.3
bcadd("1.59","9.87654",0);    // 0  >> will be integer number.
Result: 10

>> bccomp        ( Compare between 2 Numbers )
bccomp("1","1.11111",1);    // right no. bigger and one fragment = -1
bccomp("1","1.11111");        // 2 numbers consider equal because no frag

>> bcsqrt        ( X power 2 >> El Gazer El Tarb3ie )
bcsqrt("17",3);        // result will be 4.123

>> abs            ( Return the Real Value of the No. )
print (abs(-13));    // will print the real value will be 13.

>> Max            ( Return the maximum value of the sent values )
print (max(2,5,6));    // Print No. 6

>> Min             ( the reverse operation of Max function )

>> Ceil            ( make the floating number become the next integer number )
print(ceil(13.21));    // result will be 14

>> Log            ( get the log of the number )
print(log(20));


-PHP Functions - Variables Manipulation:


>> doublelevel        ( convert any numerical datatype to double datatype )
doublelevel($var);

>> Empty        ( get sure if the variable empty or not by return t\f )
empty($var);

>> gettype        ( know the type of the variable )
gettype("hello");        // String

>> intval        ( convert the variable to intger datatype )
intval("13.15cm");        // will be 13

>> is_bool        ( check if the variable is Boolean or not )
is_bool($var);

>> is_{DataType}     ( Check according the datatype )

>> isset        ( Check if the variable has been decalred or not )
isset($var);

>> Settype        ( set information type to specific datatype )
settype($myvalue,integer);

>> unset        ( delete the variable from the memory )
unset($car);

>> var_dump        ( specify the datatype and type of information too )
$a=100;
var_dump($a);

 

-PHP Functions - Image Manipulation:


>> getimagesize        ( get type and dimentions of the image )

>> imagecreate        ( create new image and must return in variable )
$im = @imagecreate(50,100);

>> ImageColorAllocate    ( define the color used in paint the image )
$colorMagenta=ImageColorAllocate($im,0,0,0);    // need image variable.


-PHP Functions - Image Manipulation:


>> ftp_connect        ( Establish connection with ftp server and return var. )
$ftp = ftp_connect("ashraf.co")

>> Ftp_login         ( login to the server )
$log = ftp_login($ftp,"user","Password");

>> ftp_pwd        ( where exactly i am in the path or directories )
$dir = ftp_pwd($ftp);

>> ftp_chdir        ( go to specific directory and need variable of connect )
$chdir = ftp_chdir($ftp,"Ashraf")

>> ftp_mkdir        ( make directory in the current path )
$mkdir = ftp_mkdir($ftp,"adel")

>> ftp_rmdir        ( remove directory in the current path )
$rmdir = ftp_rmdir($ftp,"Ashraf")

>> ftp_nlist         ( return list with all files and folder in array shape )
$listf = ftp_nlist($ftp,".")

>> ftp_get        ( download file from the server and need connect variable
and transformation type < ASCII or Binary > )
ftp_get($ftp,"/tmp/data.bin","/pub/data.bin",FTP_BINARY);

>> ftp_put        ( upload file to the server and the same conditions )
ftp_put($ftp,"/tmp/data.bin","/pub/data.bin",FTP_BINARY);

>> ftp_size        ( return size of the file from the server )
$size = ftp_size($ftp."Ashraf.txt");

>> ftp_rename         ( rename specific file to another name )
$rename = ftp_rename($ftp,"file.txt","fileto.txt");

>> ftp_delete         ( delete specific file on the server )
$delete = ftp_delete($ftp,"file.txt");

>> ftp_site        ( send commands to the server )
$send = ftp_site($ftp,"cd");

>> ftp_quit        ( close the connection between the server and u )
$close = ftp_quit($ftp);


References:


>> Larry Ullman's "PHP for the World Wide Web" (Peachpit Press)
>> "Teach Yourself PHP4 in 24 Hours" by Matt Zandstra

RSA SecurID and Authentication Manager is the main player in the area of tokens and Two Factor Authentication for a long time, still even after the breach, RSA SecurID demonstrates outstanding growth and enjoys ~70% market share**, over 40 million authenticators world-wide and just won “The Best Authentication Product” by SearchSecurity for 2012.

RSA just announced good news about RSA SecurID and Authentication Manager Products, RSA new version for Authentication Manager “v8” will be released within H1 – 2013 and it will include unique essential features to provide greater protection to IT infrastructures and environments and also minimizes TCO.

In total, the new version includes around 40 new features that lowers the cost of ownership TCO, adds the flexibility of RBA – Risk Based Authentication and special support for virtual environments, here’s a summarization for the first look on version 8 of RSA Authentication Manager:

Risk Based Authentication:

Risk based Authentication provides greater flexibility and protection through multi-factor authentication techniques that depends on measuring a series of risk indicators behind-the-scenes to assure user identities, the system will offer the choice of using RBA or SMS in a single authentication method.

Virtual Environments

The new version will include a VMware Virtual Appliance that will allow taking advantage of VMware ESX and ESXi virtualization in your organization. The virtual appliance is already certificated VMware Ready and will entitle the system to get benefit from all the Virtualized Environments’ benefits.

Enhanced Console

The console will includes new features such as:

  • New user dashboard that provides a convenient single-pane view for administrators.
  • Mobile Platform Profiles, which allows rapid deployment of RSA SecurID Software Authenticators.
  • Consolidated System Settings that reduces system management time
  • Scheduled backups and critical system notification

 

Tripwire is known as a leader in Change Auditing and FIM area helping organization to achieve compliance and enhanced security, in this article we will summarize the deployment options for Tripwire Enterprise, and in another article we will review the advanced features and capabilities of Tripwire Enterprise. 

Tripwire announced another product called Tripwire Log Center that capable to collect, store, index and correlate logs –Log and Event Management capabilities – Tripwire combined both products in our suite called Tripwire VIA and they say that the two products are integrated and they are able to integrate the change, log and event into one single view to identity threats! It will be really interesting to see this in action!

In this article, we will focus on Tripwire Enterprise and its capabilities for Change Auditng and File Integrity Monitoring and how it’s deployed.

Most organizations face a problem to maintain a complied status after achieving the first compliance, Tripwire Enterprise highly integrates its Change Auditing component with the Policy/Configuration Assessment components to ensure Continuous Compliance by completely automating the process of detecting changes and reflecting it on policies/reports without any interaction from the system administrator, which provides REAL TIME view for changes and current compliance status.

Tripwire can be deployed in three different scenarios on monitored machines:

Agentless (Network Devices, Linux and UNIX systems)

Agent  for Windows OSs

Agentless for Windows OSs by using another deployed agent on any other machine

Benefits of using Agent technique:

Avoid “Mega-scans” over the network and the systems which include complete assess, gather, analyze for the compliance information for the machines/systems in scope.

Provide a very detailed level of compliance information that can include “contents, authorized or not authorized and who did it”

Avoid providing system administrative credentials of your machines/systems to make the remote “Mega Scans”

Using agents, Tripwire keeps a cache of compliance information on each machine, so only new changes are monitored against the compliance policy and the machine baseline to ensure continuous compliance and minimal impact on network/systems performance

Provide REAL TIME monitoring/compliance information instead of performs mega-scans on big intervals like a month/2weeks.

This review includes detailed overview of ZENworks Desktop v7 (Desktop Management Product). the overview will include features, components, new competitive features, design guidelines and access methods.

ZENworks v7 General Overview

  • ZENworks is a Resource Management Solution for automating the management of network resouces.
  • ZENworks uses eDirectory as a Backend for handling it's policies, applications, workstations through objects.
  • ZENworks access time depending on how eDirectory objects are placed, so good designing is required for better performance.
  • ZENworks has 3 tier architecture (Backend services, middle-tier services and Workstations agents)
    • Back-end Services (servers which run Core ZENworks services)
    • Middle-tier an intermediate between Backend-Services and Workstation Agents and serve their requests through http and https.
    • Workstation Agents: which installed on Client Workstations and Novell Client not required.
  • ZENworks Middle Tier Services can be on the same server of Backend Services or on a separate server.
  • ZENworks Objects
    • Application and application folder (User access to applications)
    • Group objects, Workstation objects
    • Policy package object (Rules and group of policies in one package)

ZENworks v7 Suite Components

  1. ZENworks Desktop Management:Manage Windows Laptops and Desktops to provide services such as Application Distribution, Imaging, Remote Management, Workstation Inventory, Policies.
  2. ZENworks Server Management:Manage Netware, Windows, Linux and Solaries Servers to provide services such as Application Deployment, Update Server Configuration, Server Inventory (SW and HW), Policies, Server Processes Management and Real Time Monitoring.
  3. ZENworks Handheld Management:Manage Palm, Windows CE, BlackBerry and Pocket PC handheld devices to provide Application distribution, HW and SW Inventory, Data Compression for Bandwidth, Remote Management, Access Points Management, Install, Delete and Uninstall SWs remotely.
  4. ZENworks Linux Management:Centralized Control for Linux Servers and Workstation to provide User and Group management, Software-Providers Integration, Roll Back Software Update and Automic Solve for Dependencies.
  5. ZENworks Asset Management:Centralized Management of HW and SW by Control how data organized, Schedule when to collect data, Roles assignment for users for access control and provide Inventory Analysis, Quiers and Reports.
  6. ZENworks Data Management (iFolder):Store and Access Users' Files from anywhere anytime, online or offline, through Web Access, Internet or Platform-specific clients.
  7. ZENworks Instant Messenger (GroupWise Instant Messenger v1): Provide Secure Communications for conversations, Policy Based Management through eDirectory for Users administration and more.
  8. ZENworks Software Packaging (InstallShield AdminStudio ZENworks Edition):MSI Packages Management through Creating MSI, Converting Legacy-based install to MSIs, Customizing MSIs and Automate creation and distribtion ob eDirectory objects.
  9. ZENworks Personality Migration (Unicenter Desktop DNA from Computer Associates): Migrate System settings, Desktop Settings, Application Settings, Folder and Files, Backup and Restore Desktop Env and Automate Migrations from computer to another.
  10. ZENworks Patch Management (PatchLink Update):Software Update and Patch Management for Windows and Netware by providing Vendors' Software Update such as Symantec, Schedule Updates, Review Patch Info and Generate Patches Reports.

ZENworks v7 Suite Management - Backend Services Components

  • Application Management (Performs every thing related to applications)
    • Distribute MSI windows applications and create dependiences
    • Determine access to the application
    • Determine how distributed applications presented to users
    • Distribute applications during the imaging process of workstation
    • Uninstll any distributed applications.
  • Automatic Workstation Import
    • handle the entire lifecycle of a workstation from Import through AWI to its removal using AWR
  • Imaging Service
    • Capturing Workstations images, store them locally or remotely on imaging server and restore images to multiple workstations.
    • Images handled through eDirectory using Workstation image object
    • Can be combined with server policy and scripting to define and perform imaging operations.
    • Compress images and restore the images individually or for group of workstations using a multicast session.
    • Create, delete, activate and view partitions.
    • using Preboot Services for PXE management.
  • Remote Management (eDirectory)
    • Complete Management for Workstation locally or remotly and remote Wake up for power off machines.
    • Enables Auditing and logging, Wake up and reboot Machines at scheduled time, execute files, transfer files between remote management console and managed workstation, Diagnose workstation problem, Lock keyboard and mouse .. etc
  • Workstation Inventory
    • Don't Install Workstation Inventory with Middle Tier on Win2000 same server.
    • Gather SW and HW information about workstation and store then in database that sys admin can query, view and report.
  • Inventory Database
    • Stores information gathered by other services in RDBMS (Sybase, Microsoft SQL2000 and Oracle dbs)
  • Workstation Management
    • Complete management for workstation such as change wallpaper, install software, workstation based policies and credentials.

ZENworks v7 Desktop Management New Features

  • ZENworks v7 can be installed on all Novell Linux supported Servers (SUSE, OES and NLSBS).
  • Policies and Applications distribution on Tablet PCs.
  • New Products bundled with ZENworks (Included in License):
    • Asset Inventory Component, Instant Messenger, IDM v2.02 with AD Driver and iManager v2.5
  • Application Management: Ability to deploy Desktop Management Agent to Workstation in Windows Workgroup.
  • Workstation Imaging:Linux Kernel v2.6 add support for a varity of cards.
  • Workstation Inventory:Ability to set and use Oracle9i and 10gR1 on UNIX server and Windows and QuickReports Tool for fast reports.

eDirectory Design Guidelines for ZENworks

  • Tree Design Guidelines
    • Design Upperlevels according to WAN Links and Lowerlevels according to network resources.
    • Users and Workstations in the same WAN Link should be grouped together through group memebership.
  • Paritions Design Guidlines: Create paritions according to geographical locations and don't span paritions across WANs.
  • Replica Design Guidlines: Maintain 3 Replicas for Fault Torlerance and Store them locally if possible for performance.
  • Create ZENworks objects (Policies, Applications, Folder) in the same container of associated users with these objects.
  • Create ZENworks Workstation objects in the same location or container of physical workstations (Quick Login and Info Gathering).
  • ZENworks Installation in a separate TREE needed only if:
    • Prevent the need to update file, print and directory servers while upgrading ZENworks.
  • Multiple eDirectory Tree Support: During NAL and GINA Agents installation, both should be modified to support multiple trees.

ZENworks v7 Access Methods

  • Traditional Novell Client Access Method
    • Client and Agent running on the Workstation and access ZEN Server through NCP.
    • VPN Connection can be established to avoid security problems. (Not Firewall Friendly - NCP and SMB Ports open)
    • Client Benefits: Map drives and Access to NDS based printers.
  • Web Services Access Method (Outside the Firewall)
    • Using the Client with VPN has disadvantages:
  • Not Firewall friendly (Open Ports) and Delay Login time till establish the VPN Connection.
  • Companies were not comfortable using Novell Client and VPN (No Ease of Use).
    • The need for Web services raised to aviod Client disadvantages by:
  • Access ZENworks Server through http and https through Middle Tier Server (Firewall Friendly)
  • No need for Novell Client but will lose Map Drives and Access printers benefits.
  • Works by Workstation send request (XML Files ) to Middle Tier Server which pass it to ZEN Server and send back its replay to Workstation.
  • Web Services Access Method (Inside Firewall)
    • Using Outside the Firewall method, Internal Users faced High Traffic problems while remote users get benefit from it.
    • ZENworks7 uses (ZENMUP) ZENworks Multiple UNC Provider instead of UNC in previous versions.
    • Using ZENMUP enable users (Inside and Outside Firewall) to use web services access method with no depreciation in traffic.
    • ZENMUP provide automatically configured multiple UNC paths to Middle Tier Server and ZENworks server directly (Transparent to users.)

ZENworks v7 Desktop Management Agent

  • ZENworks DM Agent must be installed on all workstations regardless of Novell Client.
  • ZENworks Agent enable workstation to communicate with both MiddleTier and Backend Servers.
  • GINA responsible for Login Dialog on the Workstation and can be edited through /HKEY_LOCAL_MACHINE/Software/Novell/NWGINA/ Passive Mode to 0 or 1.
  • Desktop Management Agent Components
    • NAL (Novell Application launcher): responsible for Application distribution, Uninstall and Management.
    • Workstation Manager: Ability to apply user and workstation policies and any workstation based service.
    • Workstation Inventory: enables workstation inventory on the workstation.
    • Remote Management: enables Remote Management service of ZENworks7 DM.
    • Workstation Imaging: enable unique track for workstation information to be used by imaging service.
  • Agent Installation and Distribution Methods
    • Agent Distributor Utility through ConsoleOne: Require Active Directory or Windows Domain.
    • MSI NAL Application: Require previous version of ZENworks to distribute the application.
    • Login Script: Require Novell Client installed and all domain users are in administrators group.
      • msiexec /i \\oes-sp1.valuesys.com\sys\public\zenworks\zfdagent\english\zfdagent.msi
    • Website: Place the MSI file on a website accessable by all users.

ZENworks v7 Desktop - Services Management under Linux

  • Start Service: /opt/novell/zenworks/bin/ZDMstart
  • Stop Service:/opt/novell/zenworks/bin/ZDMstop

References

  • Novell Website
  • Novell Online Published Documentations
  • My technical demonstration
  • Some third party websites