About 63 results
-
Safely delete Linux files with libtrash
Deleting files in Linux usually pushes you to the point of no return, with no hope of retrieving any files you may have accidentally deleted. But there is a way to get deleted file...
-
Manage Linux log files with Logrotate
Learn how to use the Logrotate program to administer, back up, and monitor log files on Linux.
-
Linux file and directory permissions
To ensure system security, you must establish good file and directory standards. Jim McIntyre provides an introduction to the Linux file system, and he discusses how to limit or al...
-
Step-By-Step: Use BootVis to improve XP boot performance
Learn to use BootVis.exe, a free Microsoft utility, to help users boot their machines and access the operating system quickly
-
Using DNS Lookup with Windows
DNS information? We don't need no stinking DNS information! Well, actually you do. And two very simple tools that will help you get that information are explained right here and n...
-
Supernetting Class C networks
If you have more than one Class C network and you need more hosts, you might want to try to supernet your Class C networks to create one large network. In this Daily Feature, Jim M...
-
Installing and configuring a Linux gateway
Follow these steps to get the basics of how to configure a Linux gateway.
-
Using PAM to restrict access based on time
In this Daily Feature article, Jim McIntyre shows you ways to use Pluggable Authentication Modules to allow and deny access to system services, based on time.
-
Customizing the Linux bootup and shutdown processes
This Drill Down covers the init program, and the files and directories init uses to configure a Linux system for any run-level. It also covers adding and removing services from sys...
-
Example 2. A sample Tripwire policy file
Tripwire has become a standard in Linux security. In this Daily Drill Down, Jim McIntyre walks you through the critical process of setting up and configuring the Tripwire detection...