enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Red Hat Certification Program - Wikipedia

    en.wikipedia.org/wiki/Red_Hat_Certification_Program

    Red Hat Certified System Administrator (RHCSA) RHCSA is an entry-level certification that focuses on competencies at system administration, including installation and configuration of a Red Hat Enterprise Linux system and attach it to a live network running network services. To achieve the RHCSA certification the student must pass EX200, a 3 ...

  3. System administrator - Wikipedia

    en.wikipedia.org/wiki/System_administrator

    An IT administrator, system administrator, sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers. The system administrator seeks to ensure that the uptime, performance, resources, and security of the computers they manage meet ...

  4. Linux - Wikipedia

    en.wikipedia.org/wiki/Linux

    A Linux-based system is a modular Unix-like operating system, deriving much of its basic design from principles established in Unix during the 1970s and 1980s. Such a system uses a monolithic kernel, the Linux kernel, which handles process control, networking, access to the peripherals, and file systems.

  5. Slackware - Wikipedia

    en.wikipedia.org/wiki/Slackware

    Slackware is a Linux distribution created by Patrick Volkerding in 1993. Originally based on Softlanding Linux System (SLS), [5] Slackware has been the basis for many other Linux distributions, most notably the first versions of SUSE Linux distributions, and is the oldest distribution that is still maintained.

  6. Bastard Operator From Hell - Wikipedia

    en.wikipedia.org/wiki/Bastard_Operator_From_Hell

    The Bastard Operator From Hell (BOFH) is a fictional rogue computer operator created by Simon Travaglia, who takes out his anger on users (who are "lusers" to him) and others who pester him with their computer problems, uses his expertise against his enemies and manipulates his employer. [1][2] Several people have written stories about BOFHs ...

  7. Linux PAM - Wikipedia

    en.wikipedia.org/wiki/Linux_PAM

    Linux Pluggable Authentication Modules (PAM) is a suite of libraries that allow a Linux system administrator to configure methods to authenticate users. It provides a flexible and centralized way to switch authentication methods for secured applications by using configuration files instead of changing application code. [1]

  8. Evi Nemeth - Wikipedia

    en.wikipedia.org/wiki/Evi_Nemeth

    Occupation (s) Author, retired professor. Known for. Lead author of "bibles" of system administration. Evi Nemeth (born June 7, 1940 – missing-at-sea June or July 2013) was an engineer, author, and teacher known for her expertise in computer system administration and networks. She was the lead author of the "bibles" of system administration ...

  9. iptables - Wikipedia

    en.wikipedia.org/wiki/Iptables

    iptables is a user-space utility program that allows a system administrator to configure the IP packet filter rules of the Linux kernel firewall, implemented as different Netfilter modules. The filters are organized in a set of tables, which contain chains of rules for how to treat network traffic packets. Different kernel modules and programs ...