DispersedNet DispersedNet



DispersedNet Resources   «Prev  Next»

DispersedNet Resources

Welcome to the DispersedNet Resources Page.
The following page is intended to give you all the resources that you need for this course.
Return to DispersedNet for more information on
  1. Active Directory Administration
  2. Advanced Unix Concepts
  3. Unix Shell Programming
  4. Basic Unix Shell Scripts
  5. Installing/Confinguring Windows Networking
  6. Linux Network Administration
  7. Linux Unix System Administration
  8. Network Security and Firewalls
  9. Admin/Network Engineer Interview Questions

Best Practices-for-IP Address Management

Creating a central repository of all the information on networks, IP addresses and hosts alike, has become mission critical to maintaining control of the network. The challenge with the tools traditionally available is that there is a different tool or system for each category of devices: one system to track virtual machines, one system to track wireless users, one system to track Windows servers, one system to track Linux machines, etc. Today’s enterprise needs a single repository where all the data relevant to networks, hosts, servers, dynamic clients, and virtual environments can be tracked and synchronized. The ability to search across all this information enables network teams to quickly allocate and track ever-growing network landscapes and enable better and faster troubleshooting of issues as they arise. In addition, real business data related to a network resource helps bind together the logical network construct and the reality of enterprise IT resources.

Finding Distribution Specific Security Resources

Most major Linux distributions have resources devoted to helping you secure Linux and keep up with security information that is specifi c to that version of Linux. Here are a few online resources that focus on security for several Linux distributions:
Red Hat Enterprise . Linux and Fedora security: Check the Red Hat Security site (www.redhat.com/security) for RHEL security issues (that typically relate to Fedora systems as well). From here you can look for and read about available updates. You can also get information on security training and consulting from Red Hat, Inc. For Fedora security issues, see the Fedora Wiki (http://fedoraproject.org/wiki/ Security/Features).
Refer to the Red Hat Enterprise Linux 4 Security Guide for an in-depth look at Linux security for Red Hat systems.

Which version of Linux was the successor to Red Hat Enterprise Linux 4?

Red Hat Enterprise Linux 5 was the successor to Red Hat Enterprise Linux 4. Red Hat Enterprise Linux (RHEL) is a popular commercial Linux distribution used in enterprise environments. RHEL 5 was released on March 14, 2007, and it introduced several new features and enhancements over RHEL 4, including support for the Xen virtualization system, improved performance and scalability, and enhanced security features. RHEL 5 also marked a shift in Red Hat's enterprise Linux strategy by introducing a new development cycle that provided a longer support life cycle for each major release.