Linux Tutorials on the topic “centos”
Author: thim •
Tags: postfix, anti-spam/virus, centos •
Virtual Users With Postfix, PostfixAdmin, Courier, Mailscanner, ClamAV On CentOS In this how to I will explain how to setup a Postfix virtual mailserver with Courier-IMAP, Maildrop and Postfix Admin GUI. We will secure our mailserver with Mailscanner and Clamav as anti-virus and Spamassassin as anti-spam.
Author: m.ayad •
Tags: centos, monitoring, networking •
Network Monitoring With ntop ntop is a network traffic tools that shows network usage in a real time. One of the good things about this tool is that you can use a web browser to manage and navigate through ntop traffic information to better understand network status.
Author: ryandelany •
Tags: other, centos •
Installing OTRS 2.14 (Open source Ticket Request System) on CentOS 4.4 OTRS is a trouble ticket system with many features to manage customer telephone calls and e-mails. The system is built to allow your support, sales, pre-sales, billing, internal IT, helpdesk, etc. department to react quickly to inbound inquiries. This How-To is specifically intended to help install and run OTRS (http://www.otrs.org). It is not intended to go over using, configuring, or administering OTRS. For those types of questions, please refer to the OTRS website.
Author: Falko Timme •
Tags: kernel, centos •
How To Compile A Kernel - The CentOS Way Each distribution has some specific tools to build a custom kernel from the sources. This article is about compiling a kernel on CentOS systems. It describes how to build a custom kernel using the latest unmodified kernel sources from www.kernel.org (vanilla kernel) so that you are independent from the kernels supplied by your distribution. It also shows how to patch the kernel sources if you need features that are not in there.
Author: treed •
Tags: centos, security •
Securing the CentOS Perfect Setup with Bastille. This article shows how to secure a CentOS server using psad, Bastille, and some other tweaks. psad is a tool that helps detect port scans and other suspicious traffic, and the Bastille hardening program locks down an operating system, proactively configuring the system for increased security and decreasing its susceptibility to compromise.