If you’re considering adding Linux to your data center, or your company is looking at promoting you to become their first (or next) Linux admin, you probably understand there are lots of commands to ...
Managing authentication and authorization in a large-scale network is a challenge: the passwords need to be set and rotated every now and then, access to certain configuration settings needs to be ...
How to restrict server users to a specific directory in Linux Your email has been sent Need to lock down that Linux server so certain remote users can only access a ...
A centralized syslog server was one of the first true SysAdmin tasks that I was given as a Linux Administrator way back in 1997. My boss at the time wanted to pull in log files from various appliances ...
Last week in InfoWorld’s New Tech Forum, Dinesh Dutt outlined the thinking behind Cumulus Networks’ Linux-based networking solution. The whole piece is a great read, but to distill his point, he makes ...
Most people assume Linux is secure, and that’s a false assumption. Imagine your laptop is stolen without first being hardened. A thief would probably assume your username is “root” and your password ...