Home Search

unix - search results

If you're not happy with the results, please do another search

It’s all about numbers …

Always failed to remember it using numbers :( Check this out: Ive found this in some howto website too and I hope you too can...

Who has better virtualization, HP-UX, Solaris, or AIX?

Why is virtualization so important? The short answer is that virtualization enables businesses to lower their technology Total Cost of Ownership (TCO), while increasing...

Linux in healthcare

Linux in healthcare is a tale of things seen and unseen. Linux/Open Source have enjoyed tremendous popularity in embedded systems and networks for major...

Tether Linux box to Internet via your 3G cell.

Tether your Linux box to your ATT phone's Internet connection via BlueTooth. You basically connect your palmtop or laptop to your ATT cell phone using...

Centralized authentication with OpenLDAP

Setting up a Certificate AuthorityOn a separate server, preferably isolated from the network and physically secured, create the Certificate Authority that will generate all...

Centralized logging with syslong-ng over stunnel

Installing syslog-ng and stunnelLogin to the client and the server, download syslog-ng and stunnel and install them:# yum install -y openssl-devel glibc gcc glib2#...

NOOB’s adventures in Linux From Scratch

I've played around with Linux a bit in the past, edited files and even compiled a few kernels with step by step...

NOOB’s adventures in Linux From Scratch

Hello, This being my second installment I'm starting to read my first prerequisite ...

SSH Tunnel between two machines

Here's another nice and short post about SSH and tunnelsHere's something I did in the past for working through DMZ machines, let me explain...

Brian Masinick on desktop Linux systems

I have been a follower of free software since the eighties.  I started using commercial UNIX software in 1982, and not long after, I...