Internet security is a major concern now-a-days. Internet Protocol Security (IPSec) is a security protocol suite which works on the L3 layer of network and provides a strong security with the help of different types of authentication and encryption mechanisms. This article discusses about the usage of the Elliptic Curve Digital Signature Algorithm (ECDSA) certificate based authentication mechanism for Internet Key Exchange Version 2 (IKEv2).
This article discusses the tasks to be performed for IBM® AIX® when updating or migrating IBM System Storage® SAN Volume Controller (SVC) to a new release. It includes a script that makes it easier to prepare many AIX servers for update or migration.
You are about to reboot your system for some planned maintenance, perhaps through some upgrade or migration. For this process to complete, you issue a : bosboot - a command. It may be the case that the bosbootcommand fails, the output informing you "it is not safe to reboot your system". This article summarizes the tasks that can be performed to verify if it is save to reboot.
Controlling user limits should not only cover the resources being used, it should also encompass environmental limitations on the account in general. This article describes what user limits should cover and also demonstrates the concepts of limits with examples.
This article provides a lot of information including the Virtual I/O Server (VIOS) that is providing the Shared Ethernet Adapter (SEA), the virtual Small Computer System Interface (VSCSI), and the command to re-create the virtual target device as well.
In plain Live Partition Mobility (LPM), transfer of memory contents of the source logical partition (LPAR) goes unprotected over the network.
Nmap is an open source port scanner for Linux® and many other platforms that can boost your system's security. This article discusses the basics of Nmap for system administrators.