Linux Networking Bibliography - Links to Articles and Published Papers - CLICK HERE
Top Linux Web Sites
Linux on Laptops
Linux Documentation Project
Linux Kernel Archives
Linux Source Code
Linux Mailing Lists
Linux Software Archive Search
USQ Linux Users Group
Linux Memory Saver
Linux Network Administrator's Guide
Woven Goods for Linux
Linux How Tos
Moving from Windows to Linux
Read the latest LINUX Postings via Deja Vu
Service Port Numbers & Log Info
Compromise Detection & Recovery
Security Information Sites
Security Related Software
RedHat Linux 6.1
General Linux Links
A Guide To Linux Printing
Printer giving your newly acquired Linux OS trouble? No problem! Let Stephen guide you through the printing process.
Analyse Your Web Server in 10 Minutes
Spend 10 minutes finding out how to set up and use Linux to analyse web server files with a powerful free program, Analog.
Appleshare IP on Linux
Using your Linux machine as a powerful file server for Apple Mac machines. Installation and configuration are fully explained
Controlling Linux Remotely With X11
X isn't only about graphics: James gives an overview of the powerful features in the X window system for running programs remotely.
Getting Access to Documentation Under Linux
Wondering how to get access to documentation for your favorite features and tools in Linux? Step right this way, as James divulges the Linux documentation secrets!
How Do I Partition My Drive For Linux Use?
So you've decided to install Linux! Be aware, you'll need to partition your drive; check out this article for all the information you need before you jump in the deep end.
How I Caught the Spam and What I Did With it When I Caught it
Longtime Perl programmer Mark-Jason Dominus tells us about an unhappy incident involving food and some lawyers. He also finds time tell us how to deal with annoying Email.
How to Compile the Linux Kernel
Why compile a new kernel? A variety of reasons spring to mind; adding new custom features, upgrading to a newer version, or installing brand new hardware. Either way, you'll need to recompile your kernel at some stage; this article will take you through the steps quickly and easily!
How to Run an Email List Under Linux
Most Internet users will be on or will have tried out an 'email list'. Here's your chance to set up your own with majordomo!
Linux and DHCP
We look at how to configure your Linux machine to act as a DHCP client or server and what benefits this can give
Linux Device Drivers Demystified
We give you inside information on how Linux device drivers work and what devices are supported. Use our search facility to check if your soundcard, joystick, ethernet card or any one of dozens of devices is supported by Linux.
Linux Network Security
The internet has become more dangerous over the last few years. The amount of traffic is increasing and more important transactions are taking place. With this the risk from people trying to damage, intercept or alter your data grows.
Rolling Out Linux
In this article directed at IT professionals, James Andrews discusses methods for installing Linux quickly onto many machines, by standard methodology and by cloning the hard disk.
Setting Up a MySQL Based Website - Part I
Setting up a database backend is one of the important and sometimes difficult things to do with your web site. Lucky for you, we have this series of tutorials that will guide you through the basics of building a database backend using MySQL. In part one of this series on MySQL and its use as a web backend, we look at basic installation and coding a Perl / MySQL guestbook.
Setting Up Your Own Web Server
Setting up your own Web server isn't as hard as some may think -- and we'll even show you how to tweak it for maximum preformance!
Stopping Spam With Linux
If you have used email at all, you have seen spam: unsolicited and unwanted email. The way that email works means that it is very easy to send out bulk mailings at a very low cost. This article will help you to prevent unwanted email from infiltrating your Inbox!
Ten Neat Tricks With Perl
Automate redundant repetitive tasks with Perl, using these ten neat tricks!
The Unix Shell - Part II
At first glance many people think the Unix Shell is a more cryptic version of the MS-Windows/DOS command prompt. However, the Unix shell can do much more than launch programs and copy files. Sequences of commands can be strung together in "Shell Scripts" to automate tedious or repetitive tasks.
The Unix Shell - Part One
The word Unix has traditionally brought to mind images of a mystical operating system for high-end workstations and servers that can only be accessed through a cryptic command line interface known as the Unix Shell. Although Linux offers graphical front ends, the Unix Shell is still a powerful tool that can make life easier for anyone who is willing to invest a bit of time learning the basic syntax.
Tuesday, June 22, 1999 12:12:27 PM EST
Time For Linux
One of the reasons we all use computers are that they are supposed to save us time. Most desktop setups have a place for a clock and most of us like to keep an eye on the time as we work. Below you will not be exploring how computers do not seem to save you time but how Linux keeps the time and date.
Saturday, May 29, 1999 01:36:47 PM EST
Using Linux as Network Glue
Matt Clements explains how, as a Linux newbie, he set up an old machine to handle routing and firewalling on his NT-based network.
Tuesday, July 20, 1999 04:48:29 PM EST
Window Managers Explained
What is a window manager and how does it affect the look and feel of Linux? This article explains what a window manager does and discusses a few of the more popular packages available.
Thursday, September 16, 1999 06:44:21 PM EST
More sites of interest to Linux / Unix folks
Caldera Security Advisories
a list of security breaches in Linux software together with details of fixes / patches
Chris Vidler's Cryptography Page
a comprehensive list to cryptographic sites
a system for simple, yet reasonably secure IP encryption
Debian Security Information
a complete and free replacement for PGP. Because it does not use IDEA or RSA it can be used without any restrictions. GNUPG is in most aspects compatible with the OpenPGP draft
Linux Administrators Security Guide
by Kurt Seifried
Linux Firewall and Security Site
Linux Firewall and Security Site
Linux Security Home Page
(ftp only) Low Water-Mark Mandatory Access Control - a security enhancement for Linux that uses Low Water-Mark Mandatory Access Control to protect the integrity of processes and data
Pacific HiTech TurboLinux Errata Guide
PGP - Pretty Good Privacy
a high-security cryptographic software application that allows people to exchange messages with both privacy and authentication
Red Hat Security Pages
includes Linux Security FAQ Section and Linux Security Alerts.
SecurityPortal.com Linux Research Center
Links to advisories, tools and FAQs for Linux security
a site dedicated to security on the Internet
a guide to installing TCPWrappers
The International PGP Home Page
a public key encryption program
Great List of Linux Related Sites
Faq's and How to's
Applications and utilities
Applications and utilities
The Linux WHQ
Linux Org - Tons of Stuff !
The RPM Repository
The Linux Kernel Archives
Linux Web Watcher
Linux FTP Watcher
Woven Goods for Linux
Linux v2 Information Headquarters
Swedish University Network's FTP Archive
The Wizard's Linux Page
Linux Resources at Yahoo
Plasma Linux Web Server
WebWanderer's List of Resources
Choice of a GNU Generation
The Linux Forum
Harry's Linux Page
Harry's Home Page
Install Oracle for SCO on Linux
Linux User Support Team
Chris Freyer's Linux Page
Index of Lugnuts
The Linux Problem Solving Page
Linux Advertizing Campaign
Alaskan Linux Page
Linux Internet Support Cooperative
The Linux New Users Message Board
Linux Modules Home Page
Brief How-To for Linux Modules
OSF Microkernel and Linux
The Linux Machine
Linux Resources By Topic
The Linux Configuration Page
More General Security Related Links
Computer Security FAQs
Internet Firewalls FAQ
RSA Cryptography FAQ
covers the technical mathematics of cryptography as well as export law and basic fundamentals of information security
World Wide Web Security FAQ
attempts to answer some of the most frequently asked questions relating to the security implications of running a Web server and using Web browsers