Redhat Documents
  • Linux Redhat Manuals
  • Linux Redhat Installation Guide
    Insider Threats
  • The CERT Top 10 List for winning the Battle Against Insider Threats
  • The Key to Successful Monitoring for Detection of Insider Attacks
    Mobile Security
  • 7 Things you should know about Mobile Security
  • Mobile Internet Device Security Guidelines
  • Trends for 2013 Astounding growth of mobile malware
  • System Administration Related Resources
  • Dead Linux Machines Do Tell Tales
  • Information Systems Security
  • Linux Administrator's Security Guide, Kurt Seifried
  • Linux Administrator's Security Guide (Book), Kurt Seifried
  • Linux Administrator's Security Guide (Book 2001), Kurt Seifried
  • Linux Home Networking
  • Linux System Admin Online Book
  • Linux Admin Quick Reference
  • Linux Quick Reference
  • RedHat Enterprise Linux Documentation
  • System Adminstration by Matthew West
  • Linux Fundamentals A Practical Guide to Learning Linux
  • Linux Redhat Manuals
  • Linux Redhat 9.0 Manual
  • A Great System Administration Resource/Book
  • A Complete System Administration Book
  • Linux Red Hat Page
  • DNS and BIND
  • Linuxconf - System Administration made Easy
  • Unix Tutorial

  • vi Tutorial


  • Shell Script Resource Page
  • sudo

    Security Related Resources
  • US CERT Security Publications
  • Department of Homeland Security Cybersecurity
  • Securing Your Web Browser
  • National Security Agnecy (NSA) Central Security Service, Papers, Technical Reports, and Reports.
  • Security Policies by NSA
  • Pretty Good Privacy - A free public key encryption tool.
  • GNU - Another free public key encryption tool.
  • Two online MIT and KeyServer Public key repositories on Internet
  • John the Ripper Password Cracker
  • John the Ripper RPM for RedHat 5 More Precicely at RPM File Itself
  • Windoxs XP Security
  • Tech Security Tips by CERT
  • IT Security Page
  • NSF Supported Security Workshops CLICS

  • The CERT Coordination Center
  • The Search Security
  • NMAP NMAP Main Page
  • CERT Articles and Publications
  • Linux Home Networking Linux
  • OReilly's Linux DEVCENTER
  • Unix System Administration - A Survival Course, The University of Washington, Seattle WA, USA
  • Securing Systems Systematically -
  • The Department of Energy Computer Incident Advisory Capability (AIAC)
  • Installation Guide and more for Linux 9.0 Documentations for Linux 9.0
  • Documents in PDF format Linux 9.0
  • A Linux Security Page Linux Security
  • Check list of Intrusion Detection A CERT Document
  • Configuring and using tcpwrappers . Additional installation guides at TCP-Wrappers
  • Linux Security Administrator's Guide Linux Security Guide
  • Most popular remote vulnerability testing tools for Linux:
    ----> WireShark and FAQ for WireShark
    ----> NMAP
    ----> SAINT (A New version of SAITEN)
    ----> SARA
    ----> NESSUS
    ----> Cybercop
  • The most popular security auditing tools for Linux:
    ----> Nikto
    ----> Shields UP
    ----> Secure Me
  • Guide to Samba (PDF)
  • Using Samba
  • The Coroner's Toolbox (invstigating after a break in) Guide to TCT
  • Ethereal Ethereal Web Page
  • 75 Top Security Tools Security Web Pages ls

  • Interesting Linux Software Packages
    XFig Web Page
    You Need Download page for Transfig Application
    You also need this: libpng file
    NFS SetupNFS Configuration Linux Read Hat
      Some RPMs for Linux

    Software Support There are several great resources for RPM packages, including the following:
    RPM FInd
    RedHat FTP
    Linux Applications
    RPM comes with Red Hat Linux
    How to install software on Linux
    A Place with many different software tools for download

    Excellent Tips
    20 Linux System Monitoring Tools Every SysAdmin Should Know
    20 Linux Server Hardening Security Tips