Subscribe
Tutorial search

Naming standards for business continuity: Best practices - Linux tutorial


In today's partitioned and virtualized computing environments, the requirement for naming standards is more apparent than ever before. This article defines naming categories and provide standards for creating enterprise-wide unique names associated with each category.
Category: Linux > Administration - Difficulty:


More cool Linux tutorials:



how to find the linux operating system and kernel version
how to find the linux operating system and kernel version
how to find the linux operating system and kernel version
Difficulty:
SSL configuration for Tivoli Directory Server 6.0
SSL configuration for Tivoli Directory Server 6.0
Gain an overview of SSL configuration for IBM Tivoli Directory Server (ITDS) 6.0 on the AIX 5L operating system. Learn about command line configuration steps for SSL key database creation, certificate creation, certificate extraction, SSL authentication mechanisms, troubleshooting for SSL issues, and steps to perform LDAP client-server communication.
Difficulty:
Designing a Linux PAM login security application
Designing a Linux PAM login security application
The Pluggable Authentication Module (PAM) API exposes a set of functions that application programmers use for security-related functions like user authentication, data encryption, LDAP, and more. In this article, get a basic guide to the PAM model on Linux, see how to configure PAM, and learn how to design a sample PAM login application in 10 easy steps.
Difficulty:
Websphere Extended Deployment Compute Grid v6.1
Websphere Extended Deployment Compute Grid v6.1
Download a free trial version of WebSphere Extended Deployment Compute Grid, which lets you schedule, execute, and monitor batch jobs. Because online transaction processing and batch jobs execute simultaneously on the same server resources, you can avoid costly duplication of resources.
Difficulty:
Hide your folders in KDE
Hide your folders in KDE
Want to keep your MP3s away from your boss’ or big brother’s view? Of course, in Linux anything that starts with a period is “suppose” to be hidden; but all we have to do is type “ls -A” or turn on the viewing of hidden files in KDE…not too hard. Basically what we can do is set a transparent PNG as our folder icon, and rename our folder with a ” “(space). This will actually keep the previous name of the folder.Also we will keep anyone out of the folder that doesn’t know Linux commands, and doesn’t know exactly where we have placed the icon. This works GREAT for the desktop.
Difficulty: