Showing headlines posted by tuxchick2
« Previous (
1
2
3
4
...
5
)
Next »
Novell is making life easier for IT security administrators. The enterprise software vendor has bundled the Sentinel security and event management software from e-Security, which it acquired in April, into its SUSE Linux Enterprise Server and identity management suite.
We're going to spend some time teaching you a number of incredibly wonderful things about IPv6, such as:
Why network admins need to get their duffs up and implement it
Nice bullet points for persuading PHBs
How to actually use it
An essential freedom is the freedom to tinker. We need tinkers: those incurably nosy natural-born lab rats who take things apart to figure out how they work, and how to repair them or morph them into other things. Anyone can be a tinkerer. Of course some people have more tinkering aptitude than others, but I think it's downright pitiful when a couple of button pushes or swiping a credit card exhausts a person's manual skills, and they don't understand the basic concepts behind devices they use every day. You'll never hear a tinker wail helplessly "but I want it to just work!" tinkers make things work, often better than they originally did.
It would be hard to ignore the zeitgeist growing around virtualization. In less than a decade, the playing field has gone from one company shouting into the wind to a market that had no idea what it was talking about to a packed arena - both in the stands and on the field.
Today, the virtualization vendors are selling not just software to transform one physical box into several (or many) independently operating units, but also applications optimized for virtualization and management tools positioned for virtual environment.
Tiger teams, originally a military security-testing concept, are now used to test computer security as well. Forming an attack/defend security exercise is a useful way to test security, as well as train employees. Here's how to organize such an exercise, and some necessary rules to make it successful.
Today we'll set up a more complex digital receptionist that answers incoming calls according to holiday and off-time schedules, and as a special bonus create a telemarketer tarpit that diverts unwanted calls into special contexts of their very own.
In the first two parts of this series we took a tour of the Soekris 4521 single-board computer and installed the Pyramid Linux operating system. Now it's time to build a good stout iptables firewall.
Your boss wants LDAP. You've heard LDAP is potentially a Good Thing. But what is it exactly, and how can you successfully implement it in your organization? Carla Schroder reveals the mysteries of LDAP and begins a multi-part series on how to implement it with Fedora Directory Server.
Last week we learned all about Soekris hardware and what you need to make it go. Today we'll hook it up and take it for a spin, and then install Pyramid Linux.
Pyramid Linux is Ubuntu-based. It's a free download from the good folks at Metrix, available either as a source tarball or image file. Installed, it occupies about 48 megabytes. Inside that scrawny little Linux are a large number of goodies:
I've mentioned Soekris single-board computers (SBC) many a time as great choices for routers, firewalls, and wireless access points. They're small, quiet, low-power, and sturdy. So here at long last is a howto that attempts to answer your hardware questions, and then we'll get into building a sturdy firewall using Pyramid Linux.
If you're wondering what has happened to Ethereal, one of the most popular packet sniffing tools on the planet, it's probably because you're visiting Ethereal.com. Though development on Ethereal may be dead, development on its forked successor Wireshark is alive, well and perhaps more focused than ever before.
Last week we set up a very simple digital receptionist and installed Zgsmplay for reviewing Asterisk's GSM-formatted soundfiles. Today we're going to build a better custom recorder for creating our own custom prompts and greetings.
Today we're going to learn how to play Asterisk .gsm files with a special audio player, and how to construct a sturdy, reliable digital receptionist to answer and route all incoming calls.
Rising salaries in India will stifle current outsourcing initiatives, but not by a significant amount. Let’s take a look at what can be outsourced, and what employees should focus on in order to remain competitive in the IT world.
Last week we were introduced to LDAP in general and Fedora Directory Server in particular. Today we'll walk through a simple Fedora Directory Server installation to learn your way around FDS.
The computing world has become dependent on various types of tunneling. All remote access VPN connections use tunnels, and you'll frequently hear the geeks talking about SSH tunnels. You can accomplish amazing things with tunnels, so sit back and relax while you enjoy a gentle introduction to tunneling and its uses.
In the previous installments of this series, we built a good, solid iptables firewall on Debian Linux. Last week we left off with testing and activating the firewall. At this point your firewall blocks all incoming connection attempts, and allows only connections initiated from inside your LAN, such as checking e-mail, IRC and Web surfing. If you are not running any public services you're all finished. If you want to run your own public Web or mail server you need to poke a hole or two in your firewall.
MEPIS LLC, the popular Ubuntu-based Linux distributor, has finally released its distribution source code under the GPL. Warren Woodford, the Morgantown, WV-based company's CEO, is not one bit pleased with being forced to do so.
[What's interesting to me is that Woodford calls a requirement to include all the sources a 'restriction'. Frankly, I find the "limited agency relationship" comment bizarre. People already can give copies of GPLed software to their friends without being accused of violating the GPL. The only thing needed is the written promise of source code somewhere on the media. - dcparris]
LXer Feature: 1 Aug 2006 What is the future of Linux and Free Software? A rigid little cult that accept only the Right People? Or a community that truly practices "Free as in Freedom"?
In our previous installments we did a lot of important preliminary configuration, and hardening our firewall box. Today we'll take a quick tour of Webmin, and set up an iptables Internet-connection sharing firewall. Don't connect your firewall box to the Internet just yet, as there are some important steps to take first.
This series is aimed at Linux noobs, and home/small business users. --Carla
« Previous ( 1
2
3
4
... 5
) Next »