Sysadmins

Secure Your Network with Firewall Builder

A firewall isolates a trusted, secure internal network from another network like the Internet, which is not regarded as either trusted or secure. Firewall Builder is an open source product that makes it…

Set Up a Certificate Authority in RHEL5

Security certificates are widely used for authentication. This article explores how to set up a Certificate Authority in RHEL5. Security certificates are basically used for authentication purposes and you must have encountered a…

Restore Partitions Over the Network Using Clonezilla

Clonezilla is back-up and restore software that is a powerful alternative to Symantec’s famous, yet expensive, commercial software Norton Ghost. Do you often format your partition and reinstall Windows along with other software…

Get Onto a Fast Track IT Career as a SysAdmin!

With enterprises adapting newer and quicker network technologies, the demand for proficient systems administrators has been growing steadily.  So, what does it take to fit the bill? OSFY gets in touch with industry…

A Look at the Top Three Network Monitoring Tools

This article talks about a few important aspects of network monitoring, and compares three leading tools that are of great importance to IT administrators. In a well managed IT infrastructure, network monitoring acts…

Graphing Network Performance with MRTG

This article guides readers on how to use MRTG in order to display the ADSL traffic of a Cisco 877W router with a little help from SNMP (Simple Network Management Protocol). MRTG (Multi…

A Peek Into Some Cloud Monitoring Tools

Cloud monitoring tools collect data and illustrate patterns that might be difficult to spot otherwise in a dynamic infrastructure environment, in which services are provided by Cloud Service Providers. Read on to know…

Easy and Secure File Transferring with WinSCP

Easy and Secure File Transferring with WinSCP Working in a multi-OS environment often requires transferring files between two machines running entirely different operating systems. Even home users who like a range of OSs…

Deploy a DNS Server in a Secure Way

BIND (Berkeley Internet Name Domain) is one of the more widely used DNS servers. This article guides readers on how to deploy a BIND DNS server in a secure way by implementing three…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.