Subscribe
Tutorial search

Linux Administration Tutorials


Sort by:
LPI exam 101 prep, Topic 103: GNU and UNIX commands
LPI exam 101 prep, Topic 103: GNU and UNIX commands
Welcome to the next step in studying for the Linux certification exams. This tutorial series serves as a comprehensive study guide so you can take the exams with confidence. And even if you're not preparing for Linux certification at this time, this series helps you build fundamental skills on Linux systems administration.
Difficulty:
Resources on the IBM AIX Network Authentication Service
Resources on the IBM AIX Network Authentication Service
This article provides developers and administrators with a listing of the developerWorks articles that cover configuration, administration, interoperability, Kerberized filesystems (NFS V4), and different Kerberized login modules based on the IBM AIX Network Authentication Service (NAS).
Difficulty:
Securely administer client access in a central location with NIS+
Securely administer client access in a central location with NIS+
NIS+ is a network-wide naming and administration service that works on a client-server model. Get step-by-step instructions on how to install, configure, and administer NIS+ here.
Difficulty:
In this tutorial I will teach you how to keep Linux administration simple
In this tutorial I will teach you how to keep Linux administration simple
In this tutorial I will teach you how to keep Linux administration simple
Difficulty:
Get the most out of Z Shell
Get the most out of Z Shell
Examine key parts of the Z shell (zsh) and how to use it's features to ease your UNIX system administration tasks. zsh is a popular alternative to the original Bourne and Korn shells. It provides an impressive range of additional functionality, including improvements for completing different commands, files, and paths automatically, and for binding keys to functions and operations.
Difficulty:
Remote Administration of Linux Systems
Remote Administration of Linux Systems
One of the best advantages of using Linux is the ability to quickly and (if done correctly) safely logon to and administer another machine from across the room or across the planet. All you need are the right tools, a little paranoia, and just a little time, as Alexander Prohorenko details in this tutorial.
Difficulty:
AIX 6.1 Workload Partition file systems lab
AIX 6.1 Workload Partition file systems lab
The objective of this session is to provide a simulated hands-on experience in workload partition (WPAR) administration on the IBM AIX platform. This covers the administration operation of making WPAR types with different file systems.
Difficulty:
IBM AIX workload partion (WPAR) basic lab
IBM AIX workload partion (WPAR) basic lab
The objective of this session is to provide a simulated hands-on experience in workload partition (WPAR) administration on the IBM AIX platform. This covers the creating, starting and shutting down a simple WPAR, as well as its removal or deletion.
Difficulty:
LPI Exam 301: Concept, Architecture, and Design
LPI Exam 301: Concept, Architecture, and Design
Prepare for the Linux certification exam or simply build fundamental skills on Linux systems administration in this six-part tutorial series on exam 301 topics. In this tutorial Sean Walberg introduces you to Lightweight Directory Access Protocol (LDAP) concepts, architecture, directory design, and schemas.
Difficulty:
Install and configure Network Information Service (+)
Install and configure Network Information Service (+)
NIS+ is a network-wide naming and administration service that works on a client-server model. The server maintains all the details of the users and clients in a central database. In this article, get step-by-step instructions on how to install, configure, and administer NIS+.
Difficulty:
Distributed administration using SSH
Distributed administration using SSH
Use Secure Shell (SSH) to run commands on remote UNIX systems and, with some simple scripts, put together a system that enables you to manage many systems simultaneously from one machine without having to log in directly to the machines themselves.
Difficulty:
Executing Signed Binaries in Linux Kernel
Executing Signed Binaries in Linux Kernel
This tutorial is the second in a two-part series on locking your Linux machines down to streamline the associated support and administration processes. In Part 2 learn how to configure the Linux kernel to execute only signed binaries. In Part 1 you learned how to remove the interpreters from the installation base system to prevent spurious user changes.
Difficulty:
LPI Exam Training: Administrative Tasks
LPI Exam Training: Administrative Tasks
Prepare for your Linux certification or build fundamental skills on Linux systems administration. In this sixth installment from a series of nine tutorials on exam 102 topics, you will know how to manage users and groups set user profiles and environments, use log files, schedule jobs, back up your data, and maintain the system time.
Difficulty:
Building a cheap secure wireless (WLAN) infrastructure with OpenVPN and Linux (an advanced tutorial
Building a cheap secure wireless (WLAN) infrastructure with OpenVPN and Linux (an advanced tutorial
Having "wireless LAN" access (WLAN) in your office is nowadays almost a given. The challenge comes though on how to secure your WLAN and how to deploy it correctly. You probably want the least overhead for administration and a very flexible, yet secure deployment. Since WLAN access points (AP's) have a semi limited range depending on your building, you might want to deploy more then one AP per floor, or even one AP per meeting room. But creating different networks for each meeting room is pretty much out of the question.
Difficulty:
Search Term(s) (1): administration