Browse Definitions:
Reference

Linux Learning Guides

 

We've gathered a collection of our learning guides and tutorials on Linux topics. You'll find learning guides for desktop Linux, Linux and virtualization, Linux distributions and more. Then see, below, our quizzes and our larger collection of learning resources.

Need more information before you get started? See our definitions for Linux, Ubuntu and Fedora.

  • Linux on the Desktop -- On enterprise desktops, many people are shutting their Windows and opening their doors to a penguin -- Tux. Find out how to invite the penguin to your desk in this handy learning guide.

  • Linux and Open Source Security -- This guide covers the basics of Linux security administration, offering information on host access files, binding services and specific interfaces, as well as more advanced subject matter, such as creating your own public key infrastructure (PKI) infrastructure and VPN with Layer Two 2 Tunneling Protocol (L2TP) over IPSec.

  • Information Kit: Linux, Unix, and All the Little ixes -- Whether you have Unix or Linux and are thinking of switching -- or are coming from another system or to a new product and have the option of one or the other, there is a lot to think about, according to our own experts and some of our readers.

  • Linux and Virtualization -- Whether you are interested in running 10 servers on one, conserving physical resources or running several different operating systems on your network, virtual environments can multiply the power of Linux in the enterprise.

  • Oracle on Linux -- Oracle is the most popular database on Linux. This guide includes news, tips and resources on Oracle on Linux, including choosing between Linux and other platforms, installing and upgrading on Linux, and performing backup and recovery of an Oracle database on Linux.

  • Top Linux Distributions -- Trying to decide what flavor of Linux you want on the desktop or server side? This fast guide provides a whirlwind tour of the top Linux distributions. For each distribution, there are links to related definitions, project sites, articles, how-tos and expert advice.

  • 77 Useful Linux Commands and Utilities -- We've compiled the most essential Linux commands into this convenient guide. It's designed specifically for Linux managers and system administrators as a reference library of the most useful utilities. Get the most out of Linux by executing kernel and shell commands.

  • Databases on Linux -- This guide introduces you to databases, explains best practices and pitfalls to avoid and provides troubleshooting help and advice. You'll find database articles, tutorials, tips, tools, white papers, expert advice and more to pump up your database know-how quickly.

  • How to install Lotus Domino Server on SUSE Linux -- This tutorial explains how to install Domino 7.0.2 on SUSE Linux Enterprise Server 10.

  • Linux Administration Tips -- This collection of tutorials will help you to master security, interoperability with Unix and Windows, networking, Samba, Red Hat Enterprise Linux, SUSE Linux and more.

  • Linux Clusters: High Performance Computing -- This guide explains the many uses of Linux clusters in the enterprise. Topics include handling storage, applications, high-volume transactions and more.

  • Red Hat Enterprise Linux Administration Guide -- This guide for Unix or Windows administrators provides essential information on Red Hat networking, administration, Red Hat tools and more.

  • Unix-to-Linux Migration -- Unix and Linux are similar but they also have some important differences. Whether you're migrating from one to the other, or just trying to get them to play nicely together, you'll find help in our guide.

  • VMware on Linux -- This guide will show you how to do everything from preparing Linux for VMware virtualization to installing a guest OS.

  • VMware Server on Linux -- This guide explains installation and configuration. The emphasis is on security and maintaining a successful production instance of VMware Server on Linux.

 

Want more information about Linux? See our dedicated sister site, SearchEnterpriseLinux.com, or browse through our full collection of definitions of Linux terms. Then, if you'd like to test your knowledge, see our Linux quiz collection.

We've got lots more information for you! Check out the full collection of Learning Guides and Tutorials to learn essential information on a wide range of subjects. You'll find guides and tutorials about data centers, storage and storage management, backup and recovery, and a wide range of other topics, including databases, business intelligence, programming and much more.

This was last updated in April 2010

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close