Pluggable Authentication Modules: Threat or Menace? PAM is one of the most misunderstood parts of systems administration. Many sysadmins live with authenticatio
Sudo: You’re Doing It Wrong Unix-like operating systems use a rudimentary access control system: the root account can do anything, while other users are peasa
The best-selling text on SSH, newly revised and updated! Secure Shell (SSH) lets sysadmins securely manage remote systems. It’s powerful, complicated, and con
"Many users assume that their advanced filesystem is better than UFS because they have so many features—snapshots, checksums, compression, sophisticated cachi