This tip is all about installing Oracle Database 10g Release 2 (10.2.0.1.0) Enterprise/Standard Edition for Linux x86 on a server running Red Hat Enterprise Linux 4.0 (RHEL4).
The GRand Unified Boot loader, or GRUB, has all but replaced the default boot loader on many GNU/Linux distributions. It includes some conveniences over LILO, the LInux LOader. One advantage is not having to remember to run /sbin/lilo every time you make a configuration change.
You'll probably find that linux is probably the OS with the most native amd64 (x86_64) users. BSD variants and Windows mostly have poor to no amd64 support and/or a smaller user base any way. However, there are still a few drawbacks compared to linux on 32-bit x86. So why do people use it then? And how?
Do you ever send confidential/extremely personal information or documents via e-mail? Did you know that when you do this, you're trusting every single sysadmin that runs every single one of what might be dozens of servers between your computer and the intended recipients, plus anyone who has hacked any of these servers? Encryption technology works better than trust, says Alizard.
File integrity assessment tools are commonly deployed in organizations to help assist forensic investigation after a security incident. The canonical problem with FIA tools, however, is protecting the database generated by the FIA tool, as well as the binary for the FIA tool itself, from unauthorized tampering by attackers who gain root access to the system.
Synergy lets you easily share a single mouse and keyboard between multiple computers with different operating systems, each with its own display, without special hardware. It's intended for users with multiple computers on their desk since each system uses its own monitor(s).
Many of the higher end servers have an Intelligent Platform Management Interface, that lets you observe a whole host of hardware parameters. Usually these systems also support plug-in remote management cards (for example DELL RAC cards), that allow remote resets, and other remote diagnostics.
I am sure many of you will agree with me if I tell you that regular expressions are an integral part of all Posix operating systems. So what exactly are regular expressions ?
(This post is a follow-up to Quickly Sharing a Directory with Apache2.) You're having now a Web-accessible directory. What if it contains sub-directories? Say you want to enable basic authentication for a given directory, so that only your friends would access it.
This article will show you how to install Samba 3.X on Debian Linux 3.1 (Sarge) and make it authenticate against a Windows server running Active Directory. I will show two ways of installing Samba: using apt or directly from source in either case make sure apt's package index files are synchronized:
Today, with the availability of GUI-based CD creation programs such as K3B, the old command-line method write a CD-ROM is pretty much forgotten. Those GUIs are fine for building a CD from ordinary files stored on your hard disk--text, data, music and such--but sometimes you need to do the equivalent of copying a CD image onto a new CD.
A web server should be as secure as it can be. However, you may sometimes need to quickly share the contents of a directory for web access, so you make a folder under your httpd's document root, add a simple .htaccess... and you may see the access is forbidden!
Generally, file systems are not considered "sexy." When a young programmer wants to do something really cool, his or her first thought is generally not "Dude, two words...File System." However, I am what is politely termed "different." I find file systems very interesting and they have seldom been more so than they are right now.
I have read a TechNews article last week and figured that most of the tips listed are aimed towards Windows users. Let us examine how it fares for those who use other operating systems.
Niels Provos' Systrace is a utility that monitors and controls what an application can access on a system by creating and enforcing access policies for system calls. For the Linux crowd, it's something like the US National Security Agency's SE Linux, but it's more flexible and, if used properly, it can improve a system's overall security by "sandboxing" untrusted applications and users.
Other system administrators have fantastic toolboxes for their work. My tools consist of two everyday programs: OpenSSH and the GNU Bourne-Again Shell (bash). No other tool, whether console-based or GUI, has been so consistently useful to me as these two programs.
Mythtv is an amazing product for turning your xbox in to a home built PVR system, the downside is the Xbox is not powerful enough for having it do the recording or the streaming of your tv shows. This guide will help you through configuring the xbox as a front end "Viewer" to your already in place Myth TV System.