Sysadmins

Graphing Network Performance with MRTG

This article guides readers on how to use MRTG in order to display the ADSL traffic of a Cisco 877W router with a little help from SNMP (Simple Network Management Protocol). MRTG (Multi…

A Peek Into Some Cloud Monitoring Tools

Cloud monitoring tools collect data and illustrate patterns that might be difficult to spot otherwise in a dynamic infrastructure environment, in which services are provided by Cloud Service Providers. Read on to know…

Easy and Secure File Transferring with WinSCP

Easy and Secure File Transferring with WinSCP Working in a multi-OS environment often requires transferring files between two machines running entirely different operating systems. Even home users who like a range of OSs…

Deploy a DNS Server in a Secure Way

BIND (Berkeley Internet Name Domain) is one of the more widely used DNS servers. This article guides readers on how to deploy a BIND DNS server in a secure way by implementing three…

Going Virtual With OpenVZ

This article is an introduction to OpenVZ, an open source container-based virtualisation solution for Linux. In computing, virtualisation is the creation of a virtual version of a hardware platform, operating system, storage or…

Open Source Access to MS Exchange Server Using DavMail

This article introduces DavMail and demonstrates its importance in corporate scenarios for accessing mail from MS Exchange Server. Many enterprises use Microsoft Exchange for corporate e-mail; usually, there’s no avoiding it. While Exchange…

A Look at the Basics of LVM

This article deals with Logical Volume Management (LVM) and looks at how to set it up. Many years ago, when 2 GB of storage was considered a lot, I beamed with pride after…

Deploying a Ticket Request System with OTRS

In the current business scenario, customer management plays a major role in the success or failure of a company. Tracking issues and giving clients the necessary support and assistance in real time is…

Switching to IPv6? Here are Some Must-Try Options!

It is practically impossible and not particularly desirable to replace all your existing computing and networking equipment with IPv6 equipment at once. But what is expected from IT managers today is that when…

Combat Virtual Threats with IPCop Firewall

This article is an introduction to the special firewall distribution, IPCop. In today’s world, dependence on the Internet has reached such a level that without it, the day-to-day work of many organisations will…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.