Enterprise Linux Tips | Page 29


  • MySQL, your SQL

    Mike Hillyer answers users' questions about MySQL 5 and upgrading to MySQL from Oracle and Microsoft.

  • Integrating, securing Linux

    There is no silver bullet for dealing with dynamic Linux issues. In this tip, Peter Harrison offers sage advice for Linux security and integration.

  • Fixing the lack of documentation

    In this quick-fix tip, Harrison offers advice that can help IT managers fill the Linux information gap.

  • RHEL4's built-in LVM tools

    You can impress your Unix admin friends while making your life easier using RHEL4's built-in Logical Volume Management tools.

  • Bastille Linux: Hardening your machine

    Bastille Linux is an indispensable tool for hardening your company's machines.

  • Installing Emic m/cluster

    This is an overview of the installation process for Emic m/cluster, a single-image MySQL cluster for high availability, linear scalability and load balancing between cluster nodes.

  • Clearing IE barriers to Firefox

    In this tip, Nigel McFarlane helps IT pros navigate around IE and, in one case, ponders the fate of Netscape 8.0

  • Keep running with cfengine

    Cfengine is a tool that can provide your organization with a centralized, consistent infrastructure configuration.

  • Think before deploying SELinux in RHEL

    One of the most exciting new features in RHEL v.4 is the implementation of Security-Enhanced Linux. In this tip, Ken Milberg looks at how you can use it to beef up system security.

  • Reducing e-mail risks with Linux

    Simplicity is the key to Linux's e-mail security superiority. Paul Murphy offers tips on "write before filtering" policies and spam-blocking.

  • Samba-3: Windows file, directory ACLs

    Discover the parallels between files and directories in Windows and Unix and challenges to transparent interoperability. This tip proposes solutions to common problems using Samba.

  • Where's the Firefox security button?

    Now that Firefox is knocking on the door of enterprise environments, it's natural to ask: Where are the Firefox security settings equivalent to those in Internet Explorer?

  • Capacity planning no guessing game

    Today's tools will become moot within the next five years, experts say, as capacity-on-demand and other new technologies take over the data center.

  • Network monitoring with Nagios, part 1

    Bernard Golden discusses the usefulness and architecture of open source network monitoring tool Nagios.

  • Network monitoring with Nagios, part 2

    Bernard Golden looks at example Nagios configuration in this tip.

  • Which distros will come out on top?

    In this column, Milberg addresses the distro selection dilemma and makes his own predictions for which will triumph in 2005.

  • How to use CHADDB

    How to use CHADDB -- The Church Administration Database

  • Choosing the right e-mail server

    This two-part tip collects some of her recent advice. In part one, Julie gives advice for choosing the right e-mail server in different circumstances.

  • Notes or not, secure e-mail

    In this tip, Julie Farris helps a user decide whether or not Lotus Notes can be useful in a Linux environment.

  • A mantra for migration success

    There are four words you should keep in mind while migrating from Windows to Linux: Linux is not Windows. Paul Murphy points out some of the biggest differences in this tip.