Red Hat and SUSE Linux how-tos

Here are tips, tricks, expert advice and information for installation, administration and configuration of Red Hat Enterprise Linux and SUSE Linux distributions.

Here are some of's most-read Red Hat and SUSE Linux how-tos. Get handy tips on installing Linux distributions and utilities, securing and handling some tricky systems administration tasks. When you finish, let us know if you found everything you needed:

   Security administration
   Administration and management

  Installation  Return to Table of Contents
  • Chapter download: Comparing Windows to Linux in Chapter 1 of Linux Administration: A Beginner's Guide
    Linux Administration: A Beginner's Guide, Fourth Edition describes the ins and outs of working with the latest Linux kernel (2.6) and leading Linux platforms including Red Hat Linux Fedora 4, SuSe, Red Hat Enterprise Linux and others.
  • Tip: Kickstart Fedora workstations and servers
    Reduce the time and effort spent on server reconstruction with a Fedora kickstart. This bootable media will help you rebuild your system when your servers are damaged, destroyed or down for the count.
  • Tip: A tour of Red Hat Certificate System
    Red Hat Certificate System (RHCS) is not an open source product, but don't neglect it for that reason. It's a powerful tool, which builds on Red Hat Directory Server to provide an enterprise solution for managing user identities and ensuring privacy.
  • Tip: YaST: Setting up a local SuSE Linux update server
    Find out how Novell's SuSE Linux YaST utility can set up your client and server machines to collect updates as well as acting as the installation source for your desktops.
  • Chapter download: Chapter 28, LDAP of Red Hat Fedora 5 Unleashed
    Chapter 28, "LDAP," of Red Hat Fedora 5 Unleashed explains the installation of an LDAP server, including configuration of the server and clients and administrative tips.
  • Tip: Red Hat Network tour
    Ken Milberg provides a tour of RHN4, points out its best features and gives some configuration advice in this tip.
  • Tip: Installing Oracle10g on RHEL4
    Ken Milberg describes how to install an Oracle Database 10g Release 2 ( Enterprise/Standard Edition for x86 on a server running RHEL 4.0.
  • Tip: Installing Oracle9i on Red Hat Linux 8.0
    Follow the steps here to successfully install the Oracle9i (9.2.0) RDBMS software on Redhat Linux 8.0 and create a database using RAW devices.
  • Tip: Installing and running Linux on IBM p5 systems
    Mixing Linux with p5 architecture can help your IT shop reap rewards in support, gain the capacity to run on a 32-way system and more.
  • Tip: Using YUM in RHEL5 for RPM systems
    An expert discusses using YUM (Yellowdog Update Modifier) in Red Hat Enterprise Linux 5 for updating, installing, removing and maintaining RPM packages.

  Security administration  Return to Table of Contents
  • Tip: iSCSI Sealing Red Hat security gaps with open source security tools
    Find out how Red Hat Linux users can blow up hackers and intruders with TripWire, Nessus and Snort.
  • Tip: Red Hat tips: Beating Trojan horses and backup blues
    Protecting a company's data is a Red Hat Linux administrator's mission, a mission made tougher by Trojan horses and backup mistakes. In this tip, Mark Sobell explains how to corral Trojan horses and describes some handy tools for backups.
  • Tip: Installing, configuring firewalls and packet filtering in RHEL4
    Unix-Linux migration and integration expert Ken Milberg explains how to install and configure a firewall on Red Hat Enterprise Linux 4.
  • Tip: Think before deploying Security-Enhanced Linux in RHEL 4
    One of the most exciting new features in RHEL v.4 is the implementation of Security-Enhanced Linux (SELinux). In this tip, we'll look at how you can use it to beef up system security.
  • Tip: Securing GRUB on Red Hat Enterprise Linux
    Keep your Red Hat server safe from attackers by securing your GRUB boot loader with a password that will prevent unauthorized access to your hosts after a reboot.
  • Tip: Intrusion detection with Snort on Red Hat Enterprise Linux 5
    Snort is a popular open source intrusion detection system (IDS). Learn how to install this security tool and configure it with MySQL on Red Hat Enterprise Linux 5. This is also applicable to Red Hat Enterprise Linux 4, CentOS 4 and 5 and Fedora Core 5 and 6.
  • Expert advice: Running Nagios on RHEL 5 or Solaris 10
    A security expert recommends using a Linux-based operating system, like Red Hat, with open source network monitoring tool Nagios.
  • Expert advice: Monitoring open ports on RHEL 5
    A Linux security expert describes how to determine which ports are open in Red Hat Enterprise Linux 5 (RHEL 5) and how to figure out if your ports have been compromised by an attack.
  • Tip: Setting up SSH2 on Red Hat Enterprise Linux
    Find out how to set up SSH2 (Secure Shell) on Red Hat Enterprise Linux (RHEL), using encryption keys instead of passwords in this tutorial. You can use this with either RHEL 4 or RHEL 5.
  • Expert advice: Altering security attributes under SELinux
    Security expert James Turnbull explains where to find the policy files for Red Hat's SELinux if you want to alter the attribues of an object.
  • Tip: Account locking for Linux via PAM
    Discover how to configure account blocking on a Red Hat host with PAM and prevent a potential denial-of-service attack caused by repeated locking of user accounts.
  • Tip: SUSE security: Forgotten passwords, AppArmor
    A security expert describes how to harden your openSUSE 10.2 installation and talks about open source security tools.

  Administration and management  Return to Table of Contents

What do you think of this guide? Would you like to see more guides like this? Is anything missing from this page that you'd like to see added? E-mail us your thoughts and comments.

Dig Deeper on Linux servers

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.