Pick a Free OS

User login

Navigation

Links - Articles

Installing Red Hat 7

Being new to this whole Linux scene, you've determined to install what is known

as one of the easier distributions, Red Hat 7. This guide will take you through

several steps, which will ultimately leave you with a dual-boot system.

The effect of the recent crack on Microsoft's marketing efforts

Within the corporate market, Microsoft has based their marketing on the claim that their software is secure and easy to use. On the server side have been fighting a rather hard battle against entrenched Unix systems and cheap Linux boxes. The core message that Microsoft sends to this market is that the customer should trust Microsoft, their competency, their ability to supply secure and powerful products.

Installing Snort 1.6.3 on SuSE 6.x-7.x

Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes.

Journaling filesystems -- The future of storage under Linux

Ext2fs, a static filesystem, is a major stumbling block preventing widespread use of Linux as a database server, among other things. Journaling filesystems are superior to static filesystems when it comes to guaranteeing data integrity and even when it comes to flat-out filesystem performance.

An introduction to Webmin

When you think of using pretty GUI administrative utilities, Unix is usually not the first operating system that springs to mind. However, the operating systems that do provide nice-looking utilities usually don't let you configure the system any deeper than the vendor wants you to. Fortunately, with FreeBSD and the ports collection, you can have the best of both worlds.

Understanding file attribute bits and modes

This is the first of a three part series that explores Unix security. In this installment, basic file and directory permissions are explained.

Efforts afoot to keep Linux standard

With the exploding popularity of Linux, several efforts have taken root to keep Linux from blowing apart at the seams, with different manufacturers and distributors corrupting the open-source nature of its code.

Interview: Jon "maddog" Hall

Jon "maddog" Hall shares his thoughts on the increasing size of Linux distributions, the virtues of Linus' iron-hand rule over the kernel, the Linux Standard Base project, and what would happen if Microsoft went open source.

Building scalable ISPs with open-source softwares

This Article will take you through the setup of a scalable ISP service based on LDAP and Linux. It will touch many of the issues and questions asked. You will then use a tool called ISPMan to manage it.

Introduction to LDAP - Part II

Some of the biggest ISPs authenticate everything they can against their LDAP trees, starting with RADIUS (Remote Authentication DIalin User Service), going over to the complete employee index, up the authentication of the firewalls and SecureID cards. A service like RADIUS runs fast into a timeout, so think about this before you plan your LDAP tree.