Unix

Installing & Administering Unix

 

Unix Guru Universe (for administrators, by administrators)

Installing the Operating System

ProFTPD - the UNIX ftp Daemon (
Project Documentation)
wired geek

Essential SCO System Administration

System Administration Forums
GCC - the UNIX C Compiler - necessary for preparing any downloaded application to run on your UNIX computer.


Log Analysis


Log Analysis Tools is a link to expensive commercially available applications for log analysis.

Counterpane's
Log Analysis Resources is the most complete, best annotated collection of links to log analysis sites and services on the Web.

Syslog notes

syslog spring-cleaning (fwd)
syslog

Robust event logging with Syslog

Logging to an External Server:
Configuring the syslog Daemon on a UNIX syslog Server


syslog: The UNIX System Logger

Enabling the UNIX Syslog

Configuring Syslog For Data Center Use

Books

FREE Online


Linux Network Administrator's Guide

Linux System Administrator's Survival Guide

UNIX Unleashed, System Administrator's Edition

Programming in C: UNIX System Calls and Subroutines using C

Red Hat Linux Unleashed

SCO Unix Networking Guide
Unix Unleashed

Using Samba

Unix System Administration


Security in Open Systems

Slackware Linux Unleashed

FreeBSD Handbook

Administration

UNIX System Administration Handbook by Nemeth, Snyder, Seebass and Hein 

Security


Linux Firewalls Practical Unix and Internet Security


Unix Security


Unix Security Web Sites
Firewalls
NIHs' CIT developed the ALWS. It has a UNIX Security page.
Within this page is a General Security Document page. Here, in one section, you will find a  collection of UNIX security documents, including An Architectural Overview of UNIX Network Security.


Other UNIX Security Articles


CIAC 2316 Securing X Windows

How to improve Security on SunOS 4.1.3

Security - A Multi-Tiered Approach, Part 2
Securing X Windows

Improving the Security of Your Site by Breaking Into it

UNIX Computer Security Checklist from AUSCERT
Hardening Solaris. This article presents a concise step-by-step approach to securely installing Solaris for use in a firewall DMZ.

UNIX Security Software

UNIX Security Software Utilities

Reported Vulnerabilities


resolver routines supplied with glibc

Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases
NAMED-PROBE-VERSION

NAMED-PROBE-IQUERY


Other Unix Links


Dallas Ft. Worth UNIX Userīs Group

introduction to UNIX for web developers

UNIX Bourne Shell Programming

Rosetta Stone for Unix


Stokely Consulting's: Unix System Administrator's Resources


IT Toolbox for UNIX

Introduction to Unix

Introduction to UNIX

UNIX Help Pages

Documents & Worksheets for UNIX & PCs

The Unix Homepage Project

Getting Help While on the System

COPING WITH UNIX, A SURVIVAL GUIDE

Intermediate Tutorials

Unix System Administration Independent Learning

Unix Programming Resources

UNIX System
Jeff's UNIX Vault

Unix Resources

Dan Stromberg's UNIX Refs

the UNIX Reference Desk

Online Computer Documents

Unix Documentation

Unix Sysadm Resources

Welcome to comp.unix.xenix.sco

[News] AIX Frequently Asked Questions

ETS/EPS Reference Manual - 30 June, 1997

Celeste's Tutorial on Solaris 2.x Modems and Terminals

Unix Tools by Dave Williss is a group of PERL scripts to simplify Unix System Administration

Unix-ish Tools

Davin's collection of unix programming links

SCO Open Server Handbook

Unix World Online Magazine

Back to Mike Beaver's Hypnotherapy Home Page