Linux Tutorials on the topic “centos”
-
Network Monitoring With ntop
Author: m.ayad • Tags: centos, monitoring, networking • Comments: 5Network Monitoring With ntop ntop is a network traffic tools that shows network usage in a real time. One of the good things about this tool is that you can use a web browser to manage and navigate through ntop traffic information to better understand network status.
-
Installing OTRS 2.14 (Open source Ticket Request System) on CentOS 4.4
Author: ryandelany • Tags: centos, other • Comments: 9Installing OTRS 2.14 (Open source Ticket Request System) on CentOS 4.4 OTRS is a trouble ticket system with many features to manage customer telephone calls and e-mails. The system is built to allow your support, sales, pre-sales, billing, internal IT, helpdesk, etc. department to react quickly to inbound inquiries. This How-To is specifically intended to help install and run OTRS (http://www.otrs.org). It is not intended to go over using, configuring, or administering OTRS. For those types of questions, please refer to the OTRS website.
-
How To Compile A Kernel - The CentOS Way
Author: Falko Timme • Tags: kernel, centos • Comments: 11How To Compile A Kernel - The CentOS Way Each distribution has some specific tools to build a custom kernel from the sources. This article is about compiling a kernel on CentOS systems. It describes how to build a custom kernel using the latest unmodified kernel sources from www.kernel.org (vanilla kernel) so that you are independent from the kernels supplied by your distribution. It also shows how to patch the kernel sources if you need features that are not in there.
-
-
Securing the CentOS Server with Bastille and PSAD
Author: treed • Tags: centos, security • Comments: 1
Securing the CentOS Perfect Setup with Bastille. This article shows how to secure a CentOS server using psad, Bastille, and some other tweaks. psad is a tool that helps detect port scans and other suspicious traffic, and the Bastille hardening program locks down an operating system, proactively configuring the system for increased security and decreasing its susceptibility to compromise.