Virus protection isn't just a Windows issue
Superior security is often cited as the primary reason for running a non-Windows platform such as UNIX/Linux or Mac.
Find the HOWTO or step-by-step guide that you need right here.
Superior security is often cited as the primary reason for running a non-Windows platform such as UNIX/Linux or Mac.
This document explains how to create encrypted file systems using the Cryptoloop functionality. Cryptoloop is part of the CryptoAPI in the 2.6 Linux kernel series.
This document describes the design and configuration of a Kerberos infrastructure for handling authentication with GNU/Linux. It details steps for a best practices method of setting up servers, Kerberos software, conversion of legacy systems, and ans
Information about installing, configuring, running and maintaining a LDAP (Lightweight Directory Access Protocol) Server on a Linux machine is presented on this document. The document also presents details about how to create LDAP databases, how to a
This document will help you set up a more secure CVS Pserver for anonymous CVS access.
Holistic Risk Management describes the impact of technology into the risk management world. More specifically it describes technologies effect on internal controls, process and policy in an organization when technology is introduced into areas such..