Unix
Installing &
Administering Unix
|
Unix Guru
Universe
(for administrators, by administrators)
Installing
the Operating System
ProFTPD - the UNIX ftp Daemon (Project
Documentation) |
wired geek
Essential SCO System
Administration
System Administration Forums |
GCC - the UNIX C
Compiler - necessary for preparing any downloaded application to run on
your UNIX computer. |
Log Analysis
|
Log Analysis Tools is
a link to expensive commercially available applications for log analysis.
Counterpane's
Log Analysis
Resources is the most complete, best annotated collection of links to
log analysis sites and services on the Web.
Syslog
notes
syslog spring-cleaning (fwd) |
syslog
Robust event logging with Syslog
Logging to an External Server:
Configuring the
syslog Daemon on a UNIX syslog Server
syslog: The UNIX System
Logger
Enabling the UNIX Syslog
Configuring Syslog For Data Center Use |
Books
FREE Online
|
Linux
Network Administrator's Guide
Linux System Administrator's Survival Guide
UNIX Unleashed, System Administrator's Edition
Programming in C: UNIX
System Calls and Subroutines using C
Red Hat Linux Unleashed
SCO Unix
Networking Guide |
Unix Unleashed
Using Samba
Unix System Administration
Security in
Open Systems
Slackware Linux
Unleashed
FreeBSD Handbook |
Administration
UNIX System Administration Handbook by Nemeth, Snyder, Seebass and
Hein
Security
|
Linux Firewalls |
Practical Unix and Internet Security |
Unix Security
Unix Security Web Sites
|
Firewalls
|
NIHs'
CIT developed the
ALWS. It has a
UNIX Security
page. |
Within this page is a General
Security
Document page. Here, in one section, you will find a collection
of UNIX security documents, including
An
Architectural Overview of UNIX Network Security. |
Other UNIX Security Articles
|
CIAC 2316 Securing X Windows
How to improve Security on SunOS 4.1.3
Security - A Multi-Tiered Approach, Part 2 |
Securing X Windows
Improving the Security of Your Site by Breaking Into it
UNIX Computer Security Checklist
from AUSCERT |
Hardening Solaris. This article presents a concise
step-by-step approach to securely installing Solaris for use in a firewall
DMZ. |
UNIX Security Software
UNIX Security
Software Utilities
Reported Vulnerabilities
|
resolver routines supplied with glibc
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases |
NAMED-PROBE-VERSION
NAMED-PROBE-IQUERY |
Other Unix Links
|
Dallas Ft. Worth UNIX
Userīs Group
introduction
to UNIX for web developers
UNIX
Bourne Shell Programming
Rosetta Stone for Unix
Stokely Consulting's:
Unix System Administrator's Resources
IT Toolbox for UNIX
Introduction to Unix
Introduction to UNIX
UNIX Help Pages
Documents &
Worksheets for UNIX & PCs
The Unix Homepage Project
Getting Help While on the
System
COPING WITH UNIX, A
SURVIVAL GUIDE
Intermediate Tutorials
Unix System
Administration Independent Learning
Unix Programming Resources
UNIX System |
Jeff's UNIX Vault
Unix Resources
Dan Stromberg's UNIX Refs
the UNIX Reference Desk
Online Computer Documents
Unix Documentation
Unix Sysadm Resources
Welcome to comp.unix.xenix.sco
[News] AIX Frequently
Asked Questions
ETS/EPS Reference Manual
- 30 June, 1997
Celeste's Tutorial on
Solaris 2.x Modems and Terminals
Unix Tools by Dave
Williss
is a group of PERL scripts to simplify Unix System
Administration
Unix-ish Tools
Davin's collection of
unix programming links
SCO Open Server Handbook
Unix World Online Magazine |
Back to Mike Beaver's Hypnotherapy Home Page |