Nagios installation and configuration in SUSE Linux
As we know Nagios is extremely popular open source network monitoring system. It watches hosts across the local area network (LAN) and/or across the Internet, services that you can specify, alerting...
View ArticleOpenBSD: Secure Mail Server with Postfix, MySQL, ClamAV, SpamAssassin,...
Few days ago I started configuring corporate mail server that should be deployed on OpenBSD and comprise the following features: Easy to configure and powerful MTA (Postfix) Virtual domains and user...
View ArticleWhy and how to migrate to ext4
Ext4 is the latest in a long line of Linux file systems, and it’s likely to be as important and popular as its predecessors. As a Linux system administrator, you should be aware of the advantages,...
View ArticleQuick copy/paste MySQL Replication Manual
This quick manual tells how to set up database replication in MySQL. Basically it was written for 5.* MySQL versions but is also applicable for 3.23/4.0 ones (btw they are still in use, believe me). As...
View ArticleOpen .docx documents in Linux (OpenOffice)
Well, as for now it is not a problem anymore to open Microsoft Office 2007 .docx documents in any Linux distribution coming with OpenOffice suit. It may be Ubuntu (Feisty, Gutsy, Interpid whatever),...
View ArticleMount remote filesystem via ssh protocol using sshfs and fuse...
Imagine the following situation: you have to compile some Linux/Unix application or kernel module that requires kernel source present at your hard drive, say, in /usr/src/kernels/kernel-2.6.21-i386/...
View ArticleWatching HD Media on Linux made easy
This article is presented to you by LaptopLogic.com. Go there to read the latest info on the top rated laptops and the best laptop accessories. The High Definition (HD) content is everywhere these...
View ArticleSort CLI output by line length
Want to sort file contents by each line’s lenght? No problems: artemn@artemn-laptop:~$ cat /etc/passwd | awk '{print length, $0}' | sort -n | awk '{$1=""; print $0 }' bin:x:2:2:bin:/bin:/bin/sh...
View Article16 GB encrypted candy file
Update: as far as cryptoloop is vulnerable and is not maintained I don’t recommend using below approach for creating encrypted for for those of you who require strong security. Use truecrypt to create...
View ArticleThe Implementing Cisco IP Routing (CCNP Route 642-902). Materials for...
A few days ago I have successfully passed 642-902 exam (CCNP ROUTE v6) and would like to share the list of materials I have been using to prepare to that exam. To get prepared I was using official...
View Article
More Pages to Explore .....