How to create a linux network
Red Hat Knowledgebase
Free online tutorial
Source Control HOWTO
Our universities don't teach people how to do source control. Our employers don't teach people how to do source control. SCM tool vendors don't teach people how to do source control. We need some materials that explain how source control is done. My goal for this series of articles is to create a comprehensive guide to help meet this need.
kinds of operating systems
Operating systems can be grouped according to functionality: operating systems for supercomputing, render farms, mainframes, servers, workstations, desktops, handheld devices, real time systems, or embedded systems.
RedHat: Moderate: httpd security update
Updated Apache httpd packages that correct security issues and resolve bugs are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team.
RedHat: Important: perl security update
Updated Perl packages that fix security a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team.
RedHat: Low: kdebase security fix
Updated kdebase packages that resolve several bugs are now available. This update has been rated as having low security impact by the Red Hat Security Response Team.
Windows to Linux: A Beginner's Guide
If you have any experience with Windows, the switch to Linux will be relatively simple. Truly, the biggest challenge is to find the tools and applications you need in Linux. This beginner HOW-TO article will hopefully give you plenty of ideas how to access those key tools and how they relate to Windows.
Boost application performance using asynchronous I/O
Linux asynchronous I/O is a relatively recent addition to the Linux kernel. It's a standard feature of the 2.6 kernel, but you can find patches for 2.4. The basic idea behind AIO is to allow a process to initiate a number of I/O operations without having to block or wait for any to complete. At some later time, or after being notified of I/O completion, the process can retrieve the results of the I/O.
Linux Security Administrator's Guide
This document is a general overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system from intruders. Also included are pointers to security related material andprograms.
Pocket Linux Guide - Free eBook Pocket Linux Guide - Download ebook Pocket Linux Guide free