Topics
Content Types
About 13 results
-
SolutionBase: Securing RedHat Enterprise Linux
In this day and age, security is Job 1 for most network administrators. In this article, Brien Posey shows you how to configure Red Hat Enterprise Linux for maximum security.
-
SolutionBase: Optimizing RedHat's Enterprise Linux
One of an administrator's goals is to make sure that a system is running at peak efficiency. If you're new to Linux, you may not know where to begin. In this article, Brien Posey s...
-
SolutionBase: Troubleshooting Red Hat Enterprise Linux
In a perfect world, you'd install software and it would work with no problems. Unfortunately, nothing's perfect--not even Linux. Here's what to do when things go wrong.
-
SolutionBase: Configuring Red Hat Enterprise Linux
Installing Linux is only half the battle. Once you get it installed, you've got to configure it to play nice in a Windows environment. Brien Posey shows you what you need to do.
-
SolutionBase: Installing Red Hat Enterprise Linux
If you're a Windows administrator, you've probably installed Windows dozens of times and can do so in your sleep. Installing Linux can present a few new challenges, however. In thi...
-
SolutionBase: Planning a Red Hat Enterprise Linux deployment
If you're planning to deploy Linux in your Windows environment, there are a lot of things you have to think about and plan for. You just can't leap directly into it. In this articl...
-
SolutionBase: Converting Microsoft Office documents to OpenOffice documents
If you're considering making the switch from Microsoft Office to OpenOffice, you need to figure out what to do with all of those Office documents. Here are a few suggestions to hel...
-
Convert Microsoft Office files to OpenOffice with the Star Office Migration Partner
If you're switching to OpenOffice, here's how to leverage the Star Office Migration Partner for mass migrations.
-
Be aware of these pitfalls when migrating from Microsoft Office to OpenOffice
OpenOffice boasts many advantages, but migrating can be tricky. Here are elements to consider before switching.
-
SolutionBase: See what hackers see with the HPING utility
Use the HPING utility on Linux/UNIX to see how hackers can spoof their destination when scanning your systems.