Find out how to authenticate your Linux servers and desktops against an MS NTLM proxy server. If you happen to work in a corporation that uses a Microsoft NTLM Proxy Server, and you also want to use ...
Configuration is the first step in building a kernel. There are many ways and various options to choose from. The kernel will generate a .config file at the end of the process and generate a series of ...
A Linux Terminal Server offers any business an elegant and cost-effective way to integrate the power of open source. In this article, I review some basics of network topology and offer suggestions ...
Managing authentication and authorization in a large-scale network is a challenge: the passwords need to be set and rotated every now and then, access to certain configuration settings needs to be ...
Most people assume Linux is secure, and that’s a false assumption. Imagine your laptop is stolen without first being hardened. A thief would probably assume your username is “root” and your password ...
How to use syslog-ng to collect logs from remote Linux machines Your email has been sent Jack Wallen walks you through the process of setting up a centralized Linux log server using syslog-ng. Let’s ...