This document describes the design and configuration of a Kerberos infrastructure for handling authentication with GNU/Linux. It details steps for a best practices method of setting up servers, Kerberos software, conversion of legacy systems, and ans
Information about installing, configuring, running and maintaining a LDAP (Lightweight Directory Access Protocol) Server on a Linux machine is presented on this document. The document also presents details about how to create LDAP databases, how to a
Holistic Risk Management describes the impact of technology into the risk management world. More specifically it describes technologies effect on internal controls, process and policy in an organization when technology is introduced into areas such..
When this paper was first released, some readers confused this paper as a comparison between Windows and Linux. That is not the case. The purpose of this paper is to make you ask the question Why is no one hacking Linux anymore?