Here are some of SearchEnterpriseLinux.com's most-read Red Hat and SUSE Linux how-tos. Get handy tips on installing Linux distributions and utilities, securing and handling some tricky systems administration tasks. When you finish, let us know if you found everything you needed:
TABLE OF CONTENTS|
Administration and management
|Installation||Return to Table of Contents|
- Chapter download: Comparing Windows to Linux in Chapter 1 of Linux Administration: A Beginner's Guide
Linux Administration: A Beginner's Guide, Fourth Edition describes the ins and outs of working with the latest Linux kernel (2.6) and leading Linux platforms including Red Hat Linux Fedora 4, SuSe, Red Hat Enterprise Linux and others.
- Tip: Kickstart Fedora workstations and servers
Reduce the time and effort spent on server reconstruction with a Fedora kickstart. This bootable media will help you rebuild your system when your servers are damaged, destroyed or down for the count.
- Tip: A tour of Red Hat Certificate System
Red Hat Certificate System (RHCS) is not an open source product, but don't neglect it for that reason. It's a powerful tool, which builds on Red Hat Directory Server to provide an enterprise solution for managing user identities and ensuring privacy.
- Tip: YaST: Setting up a local SuSE Linux update server
Find out how Novell's SuSE Linux YaST utility can set up your client and server machines to collect updates as well as acting as the installation source for your desktops.
- Chapter download: Chapter 28, LDAP of Red Hat Fedora 5 Unleashed
Chapter 28, "LDAP," of Red Hat Fedora 5 Unleashed explains the installation of an LDAP server, including configuration of the server and clients and administrative tips.
- Tip: Red Hat Network tour
Ken Milberg provides a tour of RHN4, points out its best features and gives some configuration advice in this tip.
- Tip: Installing Oracle10g on RHEL4
Ken Milberg describes how to install an Oracle Database 10g Release 2 (10.2.0.1.0) Enterprise/Standard Edition for x86 on a server running RHEL 4.0.
- Tip: Installing Oracle9i on Red Hat Linux 8.0
Follow the steps here to successfully install the Oracle9i (9.2.0) RDBMS software on Redhat Linux 8.0 and create a database using RAW devices.
- Tip: Installing and running Linux on IBM p5 systems
Mixing Linux with p5 architecture can help your IT shop reap rewards in support, gain the capacity to run on a 32-way system and more.
- Tip: Using YUM in RHEL5 for RPM systems
An expert discusses using YUM (Yellowdog Update Modifier) in Red Hat Enterprise Linux 5 for updating, installing, removing and maintaining RPM packages.
|Security administration||Return to Table of Contents|
- Tip: iSCSI Sealing Red Hat security gaps with open source security tools
Find out how Red Hat Linux users can blow up hackers and intruders with TripWire, Nessus and Snort.
- Tip: Red Hat tips: Beating Trojan horses and backup blues
Protecting a company's data is a Red Hat Linux administrator's mission, a mission made tougher by Trojan horses and backup mistakes. In this tip, Mark Sobell explains how to corral Trojan horses and describes some handy tools for backups.
- Tip: Installing, configuring firewalls and packet filtering in RHEL4
Unix-Linux migration and integration expert Ken Milberg explains how to install and configure a firewall on Red Hat Enterprise Linux 4.
- Tip: Think before deploying Security-Enhanced Linux in RHEL 4
One of the most exciting new features in RHEL v.4 is the implementation of Security-Enhanced Linux (SELinux). In this tip, we'll look at how you can use it to beef up system security.
- Tip: Securing GRUB on Red Hat Enterprise Linux
Keep your Red Hat server safe from attackers by securing your GRUB boot loader with a password that will prevent unauthorized access to your hosts after a reboot.
- Tip: Intrusion detection with Snort on Red Hat Enterprise Linux 5
Snort is a popular open source intrusion detection system (IDS). Learn how to install this security tool and configure it with MySQL on Red Hat Enterprise Linux 5. This is also applicable to Red Hat Enterprise Linux 4, CentOS 4 and 5 and Fedora Core 5 and 6.
- Expert advice: Running Nagios on RHEL 5 or Solaris 10
A security expert recommends using a Linux-based operating system, like Red Hat, with open source network monitoring tool Nagios.
- Expert advice: Monitoring open ports on RHEL 5
A Linux security expert describes how to determine which ports are open in Red Hat Enterprise Linux 5 (RHEL 5) and how to figure out if your ports have been compromised by an attack.
- Tip: Setting up SSH2 on Red Hat Enterprise Linux
Find out how to set up SSH2 (Secure Shell) on Red Hat Enterprise Linux (RHEL), using encryption keys instead of passwords in this tutorial. You can use this with either RHEL 4 or RHEL 5.
- Expert advice: Altering security attributes under SELinux
Security expert James Turnbull explains where to find the policy files for Red Hat's SELinux if you want to alter the attribues of an object.
- Tip: Account locking for Linux via PAM
Discover how to configure account blocking on a Red Hat host with PAM and prevent a potential denial-of-service attack caused by repeated locking of user accounts.
- Tip: SUSE security: Forgotten passwords, AppArmor
A security expert describes how to harden your openSUSE 10.2 installation and talks about open source security tools.
|Administration and management||Return to Table of Contents|
- Tip: Getting started with RHEL4's built-in LVM tools
You can impress your Unix admin friends while making your life easier using RHEL4's built-in Logical Volume Management tools.
- Tip: RHEL4 and Windows integration using Samba-3
Follow Ken Milberg as he sets up Samba-3 on RHEL4 server, so that clients can access file and print services like Wintel servers
- Tip: Updating SuSE Linux clients from a local update server
Find out how to gain greater IT security and manageability by connecting your SuSE clients to an enterprise SuSE YaST local update server.
- Tip: How to configure your RHEL4 network
Learn how to use Red Hat Enterprise Linux 4 commands and utilities to configure your network from a GUI or the command line.
- Tip: Learning the SuSE Linux shortcuts
The author of The Developer Shortcut Guide to SuSE Linux offers tips on SuSE administration and development, choosing between KDE and GNOME, and deploying JBoss.
- Expert advice: Using MySQL 5.0 with Red Hat 8.0
A MySQL expert offers documentation for using MySQL 5.0 with Red Hat 8.0.
- Tip: Virtual host management: How to use Puppet on Red Hat Enterprise Linux 5
Make administration of your virtual hosts easier with Puppet, a centralized configuration management tool, on Red Hat Enterprise Linux 5 (RHEL 5). Learn how to install and configure this Ruby-based application, as well as mastering nodes.
- Tip: Red Hat Enterprise Linux 5 performance tuning: Monitoring and maximizing your system
Contributor Ken Milberg explains how to optimize Red Hat Enterprise Linux 5 to yield great results without jeopardizing your system.
- Expert advice: Finding downloads for Red Hat Linux and Fedora
Our expert tells you about compatibility between Red Hat offerings and where you can get downloads for them.
- Tip: Migrating Microsoft Internet Information Server to Apache on Red Hat Linux
If you're moving to Apache server from Microsoft Internet Information Server, be aware that this migration involves more than just copying files. In this tip, users will learn how to move a site from IIS to Apache on Red Hat, although this is applicable to other Linux distributions.
- Expert advice: Connecting from Red Hat Enterprise Linux 4 to a printer on a Windows system
An expert shows you how to configure Red Hat Enterprise Linux 4 to use a printer over a network with Samba.
- Expert advice: Setting up Fedora Directory Services on Red Hat Enterprise Linux 4.0
A user wants to migrate databases from Unix to a Red Hat Enterprise Linux system with Fedora Directory Services. Find out what scripts are necessary for a smooth transition.
- Tip: Setting up a network with Red Hat Enterprise Linux 4.0
Learn the basics of Linux networking tasks, like backing up configuration files, and progress to spoofing MAC addresses and subinterfacing using Red Hat Enterprise Linux 4.0.
- Expert advice: Unbreakable Linux vs. Red Hat
An expert describes the difference between Oracle's Unbreakable Linux and Red Hat Enterprise Linux and how they relate to smaller IT shop trends.
- Expert advice: RHEL 5 or Vista?
An expert talks about the pros and cons of Red Hat Enterprise Linux 5 for a user torn between using Linux and upgrading to Vista.
- Expert advice: Using AppArmor on Red Hat
Using AppArmor on Red Hat
- Tip: Easing SUSE Server administration from the command line
Sander van Vugt, author of "The Definitive Guide to SUSE Linux Enterprise Server" expands upon the uses of SUID and SGID, how to make device sharing easier and ways to manage files that live in more than one place.
- Tip: Configuring hardware in 'Beginning SUSE Linux'
Chapter 8 -- Getting hardware up and running -- of 'Beginning SUSE Linux: From Novice to Professional' tackles the age-old problem of driver support on Linux.
- Tip: Migrating to Novell's SUSE Linux: Lessons learned in a successful project
In this case study on the Metropolitan Bank Group's migration to Novell's SUSE Linux, an expert offers conclusions as to what makes a migration successful.
What do you think of this guide? Would you like to see more guides like this? Is anything missing from this page that you'd like to see added? E-mail us your thoughts and comments.
This was first published in October 2007