| | Date | Title | Author | Hits |
| | 07-08-08 | | Barzan "Tony" Antal | 28472 |
Installing, configuring, and administering an e-mail and groupware server can be quite a tough job. Scalix is a remarkable open source server of this kind; it is based on HP OpenMail. Scalix can be used by beginners, but in terms of administration, it requires solid know-how. This book targets Linux administrators that intend to work with Scalix e-mail servers. |
| | 06-10-08 | | Barzan "Tony" Antal | 32107 |
We have all heard that the vast majority of computer users still associate working with UNIX-like operating systems with some kind of black art. Others know the basics, but are afraid to endeavor into areas that look tremendously advanced. Today we are going to review the book Network Administration with FreeBSD 7. It’s all about building, securing, and maintaining networks with the FreeBSD operating system. |
| | 06-05-08 | | O'Reilly Media | 28780 |
In this conclusion to a two-part article on the anatomy of an information architecture, we take a close look at its typical components. It is excerpted from chapter four of Information Architecture for the World Wide Web, Third Edition, written by Peter Morville and Louis Rosenfeld (O'Reilly, ISBN: 0596527349). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media. |
| | 05-29-08 | | O'Reilly Media | 25972 |
If you've ever had trouble recognizing what an information architecture is, or building one for your web site, you've come to the right place. This article will set you on the right track. It is excerpted from chapter four of Information Architecture for the World Wide Web, Third Edition, written by Peter Morville and Louis Rosenfeld (O'Reilly, ISBN: 0596527349). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media. |
| | 05-08-08 | | O'Reilly Media | 23964 |
In this conclusion to a two-part series on load-balanced clusters, you'll learn how to configure the load balancer and test the system. This article is excerpted from chapter seven of Linux System Administration, written by Tom Adelstein and Bill Lubanovic (O'Reilly, 2007; ISBN: 0596009526). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media. |
| | 05-01-08 | | O'Reilly Media | 25568 |
If you want or need the power of a supercomputer but can't afford one, you might look into creating a computer cluster. If you're interested in this relatively inexpensive solution, this two-part article series gives you a good introduction. It is excerpted from chapter seven of Linux System Administration, written by Tom Adelstein and Bill Lubanovic (O'Reilly, 2007; ISBN: 0596009526). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media. |
| | 04-29-08 | | Barzan "Tony" Antal | 70292 |
UNIX format timestamps have an extensive range of use. You will find out the main reasons that back up this claim, but for now, let’s say that it is because working with dates and times in the UNIX time format is easier and more resource efficient. In this article, our goal is to demystify the concept, learn the theory that lies behind it, and ultimately write algorithms and implementations that convert dates back and forth from the traditional ISO standard to UNIX format. |
| | 04-24-08 | | O'Reilly Media | 22076 |
In this conclusion to a three-part series on the Concurrent Versions System (CVS), you'll learn how to commit changes and add and remove files. This article is excerpted from chapter two of Essential CVS, Second Edition, written by Jennifer Vesperman (O'Reilly; ISBN: 0596527039). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media. |
| | 04-17-08 | | O'Reilly Media | 60497 |
In the second part of this three-part series covering the Concurrent Versions System (CVS), you will learn how to build your first repository. This article is excerpted from chapter two of Essential CVS, Second Edition, written by Jennifer Vesperman (O'Reilly; ISBN: 0596527039). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media. |
| | 04-10-08 | | O'Reilly Media | 34894 |
The Concurrent Versions System (CVS) is an open source tool that lets you manage versions of anything stored in files. If you're a software developer trying to manage different versions of the same code, you'll want to check out this three-part series. It is excerpted from chapter two of Essential CVS, Second Edition, written by Jennifer Vesperman (O'Reilly; ISBN: 0596527039). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media. |
| | 02-28-08 | | O'Reilly Media | 65835 |
In this conclusion to a four-part series that covers authentication and authorization in Samba, you will learn about group mapping, user privilege management, and more. This article is excerpted from chapter five of Using Samba, Third Edition, written by Gerald Carter, Jay Ts and Robert Eckstein (O'Reilly, 2007; ISBN: 0596007698). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media. |
| | 02-21-08 | | O'Reilly Media | 206074 |
In this third part to a four-part series on handling authentication and authorization in Samba, you will learn about username maps, account utilities, and more. It is excerpted from chapter five of Using Samba, Third Edition, written by Gerald Carter, Jay Ts and Robert Eckstein (O'Reilly, 2007; ISBN: 0596007698). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media. |
| | 02-14-08 | | O'Reilly Media | 182975 |
In this second part of a four-part series on handling authentication and authorization in Samba, you will learn about pluggable authentication modules, a challenge/response authentication algorithm developed by Microsoft, and more. This article is excerpted from chapter five of Using Samba, Third Edition, written by Gerald Carter, Jay Ts and Robert Eckstein (O'Reilly, 2007; ISBN: 0596007698). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media. |
| | 02-07-08 | | O'Reilly Media | 42674 |
Authentication and authorization are two of the most vital functions on a network; if they aren't working properly, nobody will be able to get anything done. This article, the first part in a four-part series, explains how to handle authentication and authorization in Samba. It is excerpted from chapter five of Using Samba, Third Edition, written by Gerald Carter, Jay Ts and Robert Eckstein (O'Reilly, 2007; ISBN: 0596007698). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media. |
| | 01-04-07 | | O'Reilly Media | 36420 |
In this conclusion to a two-part article, we continue our discussion of BSD commands and filesystems. It is excerpted from chapter two of the book BSD Hacks, written by Dru Lavigne (O'Reilly, 2005; ISBN: 0596006799). Copyright © 2005 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media. |