Novell Home

Novell Communities

Welcome to the Novell Communities. Consider this an exclusive invitation to get sideways social with Novell users, experts and commentators and discover best practices, innovative ideas, or ask a question. Come share your voice, read the latest news, help someone solve a challenge. Join the conversation on social media.


Filr MV Log Aggregator for Mac

This tool intends to provide all the relevant information to the Mac Developers of Filr, in a single archive and with click of a mouse. The tool aggregates the following …

Generating a Self-Signed Certificate for HTTPS Keystore and API Keystore in Keyshield SSO Server

This article presents simple steps how to generate a self-signed certificate from Keyshield SSO server. In the KeyShield SSO server configuration page you have to provide the HTTPS keystore and API keystore file in PKCS #12 format in order to use the Https port for the keyshield Server. The following steps will tell you how …

The One-Step Plan to Stronger Digital Workspace Security in Your Enterprise

The digital business landscape has changed dramatically during the past few years, and this has led to more challenges facing IT departments than ever before. New threats like malware, ransomware and hacks are increasing by the day. Furthermore, next-generation technologies like the Internet of Things are weaving their way into the digital fabric of your …

Novell Service Desk 7.1 Beta availability announcement

We are pleased to announce and invite you to participate in Novell Service Desk 7.1-Beta. Novell Service Desk is a complete service management solution that allows you to easily monitor and solve service issue. It provides an online support system to meet the service requirements of all your customers, administrators, supervisors, and technicians.

Configuring an Additional NIC Card to a Filr Appliance

The network settings for a Filr Appliance are actually recommended to be configured through 9443 VA administration page. Currently, since there is no way to configure an additional NIC card completely through the VA-administration page, the following solution is proposed.

KeyShield SSO Integration With Filr-1.2.0

This article presents how to integrate KeyShield SSO with Filr-1.2.0. KeyShield SSO is a single sign-on solution that allows users to access their applications without having to authenticate to each one of them. Once users authenticate against a recognized user source – eDirectory, Active Directory, LDAP – they can simply launch their applications and KeyShield will provide the identity to the application.

From Gold to Fool’s Gold: Transform Your Data Through Encryption to Make It Useless to Hackers

Your business harbors a trove of sensitive data in its back-end servers that hackers would love to exploit for monetary value. These files can range drastically in value, depending on factors such as the type of information they contain and the industry. In healthcare, for instance, stolen patient records can sell for as much as …

ZCM 11 SP3 Agent registration with non-persistent VMware View 5.3 VDI Desktops

We want to use ZENworks Configuration Management to manage our Windows 7 FAT desktops and VDI desktops. In our environment we were struggling to get our non-persistent VMware Windows 7 desktops registered in the ZCM Zone. After the Quickprep process (VMware KB) some desktops did not register or registered with an extra guid in the …

Your Business’s Network Is Bigger Than You Think

You head the IT department of a small to midsized business (SMB) with 1,000 employees or less. But is this the true size of your network? It could actually be much larger than the total number of employees in your organization due to the amount of devices that your workers use to access your business’s …

Elephants, Cats, Coffee and Computers

As part of my job at Novell I get to travel around various places. This has given me the chance to try numerous types of coffee across many countries and cultures. Coffee itself has an interesting history, starting with the legend of Kaldi. Kaldi was a goat herder who noticed his goats become somewhat animated …

Annihilate Novell Backup Windows: The True Speed of SEP sesam

How long is your typical Novell backup window? 2 days? 4 days? 6 days? SEP recognizes the pain points in the industry when backing up Novell environments which include GroupWise, OES Clusters, eDirectories, and NSS Volumes …

Forrester Names Novell ZENworks a ‘Strong Performer’ in Endpoint Encryption

There are two ways that you can store sensitive corporate information in your database: in a regular format using plain text or in a protected format using advanced ciphering. In information technology (IT), the act of ciphering digital information is called encryption, and it’s one of the safest and strongest methods of devaluing private data …

Filr 1.2 Technical Preview

Hi Everyone. For those not familiar with a Technical Preview, it allows people, beyond the closed beta group, to access the pre-released software and provide feedback to Novell. We are now ready to accept people into the Technical Preview of Filr 1.2.

Novell Messenger Survey

I hope everyone is just as excited as I am with the upcoming release of Messenger 3.0. I have talked about some of the great new features in previous posts so if you haven’t read about the release please check it out (Novell Messenger 3.0). With the release nearly here, I wanted to take …

The Best Thing You Can Buy for Your IT Department This Year Is …

Your business has a lot of unsecure digital endpoints that need to be addressed. There’s Steve in finance, for instance, who just got a new tablet that he uses for work purposes in addition to his smartphone (unbeknownst to IT). There’s April, who now works remotely and regularly accesses sensitive corporate files over unprotected Wi-Fi …

© Micro Focus