Filtered by: Command Line
In computing there are two terms which are often confused: encoding and enciphering. One of them, with 'cipher' in its name, usually best refers to something that is cryptographically enciphered which means it was mathematically mangled in a fashion that the result, regardless of the input, is fairly random, patternless nonsense to the un-key-assisted eye. The other term refers to simply changing data from one form to another at is basic level. One type of encoding is 'base64' encoding, which is used through many areas of computing and can be explained much more-simply than most cryptographic cipher functions (in my opinion). This article is to show how, on many levels, Linux Just Does That.
Submitted by: aburgemeister on Mon. 09.28.2009
Filed Under: SUSE Linux Enterprise Cool Solutions, Collaboration Cool Solutions, Cool Solutions, Identity and Security, Data Center
Topic: Administration, BASH, Certificates, Command Line, Concepts, Importing-Exporting / ICE/ LDIF, Linux, Microsoft, UNIX
Product: eDirectory, Linux, Open Enterprise Server, openSUSE, SUSE Linux Enterprise Desktop, SUSE Linux Enterprise Server
My company needed a way that users at the different branches could still function and perform their duties, even when the local branch server was down. The following should at least let you begin thinking about how this could be handled.
Submitted by: mbruner1 on Thu. 09.24.2009
Filed Under: Collaboration Cool Solutions, Cool Solutions
Topic: Authentication, Best Practices, Command Line, Configuration, eDirectory, Linux, Maintenance, Remote Access, Tips for Administrators, Windows XP
Product: eDirectory, Linux, Open Enterprise Server, SUSE Linux, SUSE Linux Enterprise, SUSE Linux Enterprise 10
Sometimes I find myself wondering how big an installed RPM's files really are. Use a simple script to do all of the calculating of file sizes, plus see how to recreate the RPM from the system where the package is installed in the latest addition to Linux Just Does That.
Submitted by: aburgemeister on Fri. 08.21.2009
Filed Under: SUSE Linux Enterprise Cool Solutions, Collaboration Cool Solutions, Cool Solutions
Topic: Alternatives to Windows, BASH, Command Line, File Management, Linux, Linux Usage, Scripting, Tips for Administrators, UNIX
Product: Linux, Open Enterprise Server, openSUSE, SUSE Linux, SUSE Linux Enterprise Desktop, SUSE Linux Enterprise Server
In the process of getting iFolder 3.7 to run on an OES 2 Linux server I had a bout of power outages that resulted in a corruption of the root partition and guess which part caught the corrupted blocks. Yep, iFolder's data store. I toyed with it for a while and then decided to just re-install it, especially since no one was using it yet. Here is what I did to get it all back up and running.
Once in a while an issue comes up where application A gives some odd errors in eDirectory but those errors seem to be cosmetic as application A is still fine and works (unless you count the messages in ndstrace). What does this mean when you see a -714 from eDirectory while tracing LDAP that is talking about some "iterator"? What does an LDAP error 51 mean when everything still seems to return properly? Today I am going to try to share some information on Virtual List Views (VLV) by explaining what they are, how you can use them, and a few cases where they do not work with eDirectory.
Do you have Macintosh users authenticating to their OS X workstations through eDirectory? Use this loginHook script to grant them access to the local machine by group and to populate GroupWise with their PO login settings.
Submitted by: jlodom on Tue. 07.07.2009
Filed Under: GroupWise Cool Solutions, Identity & Security Management Cool Solutions, Collaboration Cool Solutions, Cool Solutions
Topic: Alternatives to Windows, Automation, Command Line, Configuration, Customizing, Especially for School Administrators, Groups, Integration, LDAP, Macintosh, Rights, Scripting, Single Sign-on, Tools and Utilities, User Management
Product: eDirectory, GroupWise, NetWare, Open Enterprise Server