Linux is working its way into datacenters and has great penetration as a Web server. The allure of the open-source OS is clear: Administrators can take a very inexpensive distribution, add assorted ...
Find out how to authenticate your Linux servers and desktops against an MS NTLM proxy server. If you happen to work in a corporation that uses a Microsoft NTLM Proxy Server, and you also want to use ...
A gateway computer provides a local network with access to another network or the Internet. Linux is easily configured for use as a low-cost, dependable gateway. This Daily Drill Down details a ...
Managing authentication and authorization in a large-scale network is a challenge: the passwords need to be set and rotated every now and then, access to certain configuration settings needs to be ...
Configuration is the first step in building a kernel. There are many ways and various options to choose from. The kernel will generate a .config file at the end of the process and generate a series of ...
I am starting to move my company to Linux as the server platform of choice. With the seemingly continual stream of alerts about the different hacks possible, I know that I should put some type of ...
Rapid growth in the market for x86 servers over the past year brought good news for both Linux and Windows, as research firm IDC reported last week. What’s not always appreciated, however, is just how ...
Setting up, Configuring and Installing a 2.4 kernel Currently, there are two main series of 2.4 kernels. The Linus kernel series are the kernels released by Linus Torvalds, and they have version ...
I am an advocate of centralized identity management and I think Active Directory makes a great repository for user account information. Interoperability can be a challenge, though. For example, you ...