Home arrow Administration
 

ADMINISTRATION HELP, ADMINISTRATION TUTORIALS, ADMINISTRATION ARTICLES

RSS For Dev Shed
Systems administrators are ultimately responsible for making sure their companyís technology runs smoothly. Whether it involves getting the different parts of a network talking to each other, organizing your team, or throwing together a basic content management system, youíll find the help you need in this category.

  Date Title Author Hits
  07-08-08 

Scalix: Linux Administrator`s Guide

Barzan "Tony" Antal 29946

Installing, configuring, and administering an e-mail and groupware server can be quite a tough job. Scalix is a remarkable open source server of this kind; it is based on HP OpenMail. Scalix can be used by beginners, but in terms of administration, it requires solid know-how. This book targets Linux administrators that intend to work with Scalix e-mail servers.

  06-10-08 

Network Administration with FreeBSD 7

Barzan "Tony" Antal 33380

We have all heard that the vast majority of computer users still associate working with UNIX-like operating systems with some kind of black art. Others know the basics, but are afraid to endeavor into areas that look tremendously advanced. Today we are going to review the book Network Administration with FreeBSD 7. Itís all about building, securing, and maintaining networks with the FreeBSD operating system.

  06-05-08 

Components of an Information Architecture

O'Reilly Media 30426

In this conclusion to a two-part article on the anatomy of an information architecture, we take a close look at its typical components. It is excerpted from chapter four of Information Architecture for the World Wide Web, Third Edition, written by Peter Morville and Louis Rosenfeld (O'Reilly, ISBN: 0596527349). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media.

  05-29-08 

The Anatomy of an Information Architecture

O'Reilly Media 27361

If you've ever had trouble recognizing what an information architecture is, or building one for your web site, you've come to the right place. This article will set you on the right track. It is excerpted from chapter four of Information Architecture for the World Wide Web, Third Edition, written by Peter Morville and Louis Rosenfeld (O'Reilly, ISBN: 0596527349). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media.

  05-08-08 

Configuring Load-Balanced Clusters

O'Reilly Media 25305

In this conclusion to a two-part series on load-balanced clusters, you'll learn how to configure the load balancer and test the system. This article is excerpted from chapter seven of Linux System Administration, written by Tom Adelstein and Bill Lubanovic (O'Reilly, 2007; ISBN: 0596009526). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media.

  05-01-08 

Load-Balanced Clusters

O'Reilly Media 26796

If you want or need the power of a supercomputer but can't afford one, you might look into creating a computer cluster. If you're interested in this relatively inexpensive solution, this two-part article series gives you a good introduction. It is excerpted from chapter seven of Linux System Administration, written by Tom Adelstein and Bill Lubanovic (O'Reilly, 2007; ISBN: 0596009526). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media.

  04-29-08 

UNIX Time Format Demystified

Barzan "Tony" Antal 72195

UNIX format timestamps have an extensive range of use. You will find out the main reasons that back up this claim, but for now, letís say that it is because working with dates and times in the UNIX time format is easier and more resource efficient. In this article, our goal is to demystify the concept, learn the theory that lies behind it, and ultimately write algorithms and implementations that convert dates back and forth from the traditional ISO standard to UNIX format.

  04-24-08 

Making Changes in the CVS

O'Reilly Media 23485

In this conclusion to a three-part series on the Concurrent Versions System (CVS), you'll learn how to commit changes and add and remove files. This article is excerpted from chapter two of Essential CVS, Second Edition, written by Jennifer Vesperman (O'Reilly; ISBN: 0596527039). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media.

  04-17-08 

Building Your First CVS Repository

O'Reilly Media 62387

In the second part of this three-part series covering the Concurrent Versions System (CVS), you will learn how to build your first repository. This article is excerpted from chapter two of Essential CVS, Second Edition, written by Jennifer Vesperman (O'Reilly; ISBN: 0596527039). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media.

  04-10-08 

CVS Quickstart Guide

O'Reilly Media 36760

The Concurrent Versions System (CVS) is an open source tool that lets you manage versions of anything stored in files. If you're a software developer trying to manage different versions of the same code, you'll want to check out this three-part series. It is excerpted from chapter two of Essential CVS, Second Edition, written by Jennifer Vesperman (O'Reilly; ISBN: 0596527039). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media.

  02-28-08 

Authorizing Users in Samba

O'Reilly Media 68136

In this conclusion to a four-part series that covers authentication and authorization in Samba, you will learn about group mapping, user privilege management, and more. This article is excerpted from chapter five of Using Samba, Third Edition, written by Gerald Carter, Jay Ts and Robert Eckstein (O'Reilly, 2007; ISBN: 0596007698). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media.

  02-21-08 

Handling User Accounts in Samba

O'Reilly Media 211515

In this third part to a four-part series on handling authentication and authorization in Samba, you will learn about username maps, account utilities, and more. It is excerpted from chapter five of Using Samba, Third Edition, written by Gerald Carter, Jay Ts and Robert Eckstein (O'Reilly, 2007; ISBN: 0596007698). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media.

  02-14-08 

Authentication in Samba

O'Reilly Media 188592

In this second part of a four-part series on handling authentication and authorization in Samba, you will learn about pluggable authentication modules, a challenge/response authentication algorithm developed by Microsoft, and more. This article is excerpted from chapter five of Using Samba, Third Edition, written by Gerald Carter, Jay Ts and Robert Eckstein (O'Reilly, 2007; ISBN: 0596007698). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media.

  02-07-08 

Accounts, Authentication, and Authorization

O'Reilly Media 44837

Authentication and authorization are two of the most vital functions on a network; if they aren't working properly, nobody will be able to get anything done. This article, the first part in a four-part series, explains how to handle authentication and authorization in Samba. It is excerpted from chapter five of Using Samba, Third Edition, written by Gerald Carter, Jay Ts and Robert Eckstein (O'Reilly, 2007; ISBN: 0596007698). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media.

  01-04-07 

Advanced Concepts on Dealing with Files and Filesystems in BSD

O'Reilly Media 38465

In this conclusion to a two-part article, we continue our discussion of BSD commands and filesystems. It is excerpted from chapter two of the book BSD Hacks, written by Dru Lavigne (O'Reilly, 2005; ISBN: 0596006799). Copyright © 2005 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media.

 
More Site Administration Articles
Total Site Administration Articles = 121

Page 4 of 9
1 2 3 4 5 6 7 

Developer Shed Affiliates

 


Dev Shed Tutorial Topics: