Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for NIST Publically-Released Fedora/Red Hat Core Security Guide

Solaris NIST Publically-Released Fedora/Red Hat Core Security Guide
Post date: October 20, 2006, 23:10 Category: Security Views: 1919 Comments: 0
Tutorial quote: The Benchmark is a compilation of security configuration actions and settings that "harden" Red Hat Linux operating systems. It is a CIS Level-I benchmark: the prudent level of minimum due care for operating system security. This benchmark was developed and tested on Red Hat Enterprise Linux (RHEL) including RHEL 2.1, RHEL 3.0, and Fedora Core 1, 2, & 3. It is likely to work for other Linux distributions - especially Red Hat and Fedora derivatives - as well.
RedHat NIST Publically-Released Red Hat Enterprise Linux Benchmark
Post date: October 20, 2006, 23:10 Category: Benchmarks Views: 2181 Comments: 0
Tutorial quote: The Benchmark is a compilation of security configuration actions and settings that "harden" Red Hat Linux operating systems. It is a CIS Level-I benchmark: the prudent level of minimum due care for operating system security. This benchmark was developed and tested on Red Hat Enterprise Linux (RHEL) including RHEL 2.1, RHEL 3.0, and Fedora Core 1, 2, & 3. It is likely to work for other Linux distributions - especially Red Hat and Fedora derivatives - as well.
RedHat Taking advantage of SELinux in Red Hat Enterprise Linux
Post date: April 15, 2005, 16:04 Category: Security Views: 1510 Comments: 0
Tutorial quote: The release of Red Hat Enterprise Linux 4 debuts the first commercially supported inclusion of Security-Enhanced Linux (SELinux). An installation of Red Hat's latest enterprise operating system has SELinux installed and enabled by default. In the past SELinux has been criticized for a lack of commercial support, many big sites were unable to use it due to the lack of support (Fedora Core 3 doesn't have the support that they require). Now in Red Hat Enterprise Linux 4, SELinux is a supported part of the OS, and such objections to the use of SELinux have gone away. SELinux is now widely regarded as being suitable for the largest sites.
RedHat Choosing an I/O Scheduler for Red Hat Enterprise Linux 4
Post date: July 18, 2005, 17:07 Category: Benchmarks Views: 3049 Comments: 0
Tutorial quote: The Linux kernel, the core of the operating system, is responsible for controlling disk access by using kernel I/O scheduling. Red Hat Enterprise Linux 3 with a 2.4 kernel base uses a single, robust, general purpose I/O elevator. The 2.4 I/O scheduler has a reasonable number of tuning options by controlling the amount of time a request remains in an I/O queue before being serviced using the elvtune command. While Red Hat Enterprise Linux 3 offers most workloads excellent performance, it does not always provide the best I/O characteristics for the wide range of applications in use by Linux users these days. The I/O schedulers provided in Red Hat Enterprise Linux 4, embedded in the 2.6 kernel, have advanced the I/O capabilities of Linux significantly. With Red Hat Enterprise Linux 4, applications can now optimize the kernel I/O at boot time, by selecting one of four different I/O schedulers.
Fedora Upgrade Fedora 9 with Fedora 10
Post date: December 5, 2008, 06:12 Category: Installing Views: 583 Comments: 0
Tutorial quote: Fedora 10 codenamed "Cambridge" has been released. This new version of the community oriented, Red Hat backed Linux distribution comes with new features which enhance the end user experience.
RedHat Tuning and Optimizing Red Hat Enterprise Linux for Oracle 9i and 10g Databases
Post date: December 19, 2007, 00:12 Category: Optimizing Views: 2815 Comments: 0
Tutorial quote: This article is a step by step guide for tuning and optimizing Red Hat Enterprise Linux on x86 and x86-64 platforms running Oracle 9i (32bit/64bit) and Oracle 10g (32bit/64bit) standalone and RAC databases. This guide covers Red Hat Enterprise Linux Advanced Server 3 and 4 and the older version 2.1.
Solaris NSA Publically-Released Solaris 9 Security Guide
Post date: October 20, 2006, 23:10 Category: Security Views: 2273 Comments: 0
Tutorial quote: Sun Solaris 9 Guides
NSA has developed and distributed configuration guidance for Sun Solaris 9 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.

Solaris NSA Publically-Released Solaris 8 Security Guide
Post date: October 20, 2006, 23:10 Category: Security Views: 1843 Comments: 0
Tutorial quote: Sun Solaris 8 Guides
NSA has developed and distributed configuration guidance for Sun Solaris 8 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.

RedHat Ruby on Rails on Red Hat
Post date: November 27, 2006, 01:11 Category: Network Views: 1984 Comments: 0
Tutorial quote: Ruby on Rails is an open source freely available web development framework. It's been quite popular--it won a Jolt "Web Development Tools" award last year, and some prominent Java developers have publically switched to Ruby on Rails. The buzz surrounding Rails is quite impressive--particularly when you consider that Rails had no Fortune 500 company to market it, unlike .NET or Java.

Rails is a Model View Controller (MVC) framework. As you can imagine from the name, applications written using Model View Controller frameworks have three main components: a model, which represents the data and associated logic; the view, which represents how a user interacts with the application; and the controller, which contains all of the business logic that drives the application. This is an artificial distinction, of course, but it is a powerful one.

You'll need Apache 2.0+ and MySQL installed on your Red Hat Linux computer to run these examples.
OSX NSA Publically-Released OS X Secuirty Configuration (reload) Guide
Post date: October 20, 2006, 23:10 Category: Security Views: 1654 Comments: 0
Tutorial quote: Apple Mac OS X
NSA has developed and distributed configuration guidance for Apple Operating Systems. This guidance can be used by US government and other entities as a security baseline.