Solaris tutorials
 |
|
Post date: March 16, 2010, 12:03 Category: System Views: 11258 Comments |
Tutorial quote: Under the Solaris 10 system � or the open Solaris as well, the service management have been upgraded, and there are great new tools to handle the sysadmin work on the services. |
 |
|
Post date: August 17, 2009, 23:08 Category: Installing Views: 5838 Comments |
Tutorial quote: Replace sendmail with this easy to install and configure system. Postfix and Dovecot provide a powerful and easy to manage mail system enabling SMTP, IMAP, and POP3. Also included is integration of the powerful spam killer Spamassassin. |
 |
|
Post date: May 13, 2009, 22:05 Category: Network Views: 8756 Comments |
Tutorial quote: PCP is a very useful security and adminitration script that can help you quickly find Processes (PIDs) having particular TCP Port(s) open, TCP ports open by specific PIDs or even list all the TCP Ports open by all PIDs running on your system. |
 |
|
Post date: April 20, 2007, 18:04 Category: Network Views: 10116 Comments |
Tutorial quote: When defining packet filtering rules in the /etc/ipf/ipf.conf file, it is necessary to understand how the Solaris IP Filter firewall reads this file and compares any packet against the rules in the file. |
 |
|
Post date: January 26, 2007, 07:01 Category: Miscellaneous Views: 10108 Comments |
Tutorial quote: This HOWTO explains how to set up a multipurpose Solaris web server. |
 |
|
Post date: January 26, 2007, 06:01 Category: Software Views: 9776 Comments |
Tutorial quote: The strategy is to utilize as much of the Open Source and other free software bundled with Solaris 10 as possible and integrate Apache2, MySQL, PHP and SSL in a environment that can take full advantage of Solaris 10 zones, resource management and highly scaleable, secure System Administration. |
 |
|
Post date: October 21, 2006, 04:10 Category: Security Views: 7067 Comments |
Tutorial quote: The Benchmark is a compilation of security configuration actions and settings that "harden" Red Hat Linux operating systems. It is a CIS Level-I benchmark: the prudent level of minimum due care for operating system security. This benchmark was developed and tested on Red Hat Enterprise Linux (RHEL) including RHEL 2.1, RHEL 3.0, and Fedora Core 1, 2, & 3. It is likely to work for other Linux distributions - especially Red Hat and Fedora derivatives - as well. |
 |
|
Post date: October 21, 2006, 04:10 Category: Security Views: 7425 Comments |
Tutorial quote: Sun Solaris 9 Guides
NSA has developed and distributed configuration guidance for Sun Solaris 9 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.
|
 |
|
Post date: October 21, 2006, 04:10 Category: Security Views: 6897 Comments |
Tutorial quote: Sun Solaris 8 Guides
NSA has developed and distributed configuration guidance for Sun Solaris 8 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.
|
 |
|
Post date: February 6, 2006, 07:02 Category: System Views: 11883 Comments |
Tutorial quote: System startup requires an understanding of the hardware and the operating system functions that are required to bring the system to a running state. This chapter discusses the operations that the system must perform from the time you power on the system until you receive a system logon prompt. In addition, it covers the steps required to properly shut down a system. After reading this chapter, you’ll understand how to boot the system from the OpenBoot programmable read-only memory (PROM) and what operations must take place to start up the kernel and Unix system processes. |
|
|