answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: How Can I Set Up A Linux Operating System To Pull Its User From A Server?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How do you pull up server desktop from workstation?

To do this you need to be running some type of remote desktop protocol (RDP) in Windows, or the equivalent in Unix/Linux. You can enable this in a server and use the client to connect to the server which will show the server's desktop on the workstation. Terminal services can also be used for this purpose. There are also several third-party packages which will accomplish this as well. When you log into the server using RDP or its equivalent you will see the desktop of the server.


How can you remove 1 operating system among 2?

ummm...why dont you just pull it out...LOL! 8===>


What is Pull server?

A 'Pull" server is one in which information is stored on it, waiting for a client to request the information, such as an upgrade. The information must be 'pulled' from the server by the client, so the client is the one initiating the request, not the server.


How can someone find their DNS server configuration?

Someone can find their Domain Name System, or DNS, server configuration just by using their computer. Just pull up your my computer file and search for DNS.


What is request information from a web server?

An application or browser


Why is Windows more prone to viruses than Linux?

It is widely believed that the reason Windows is so prone to viruses is due to its popularity on the desktop, as Windows powers approximately 87% of the world's desktop computers. While this is true, there is actually much more to it than that, and it really has to do with the basic architecture of the operating system itself. Windows, as well as DOS before it, was designed to be a single-user operating system. This means that the operating system is designed to let the user have free reign over the entire system. However, the system has no way to tell who's doing what on the system, and no means of enforcing who can do what. As such, virus-laden code can all too easily sneak in via the Internet without your knowledge or permission. Some versions of Windows, such as Windows NT, 2000, XP Professional, Server 2003, Server 2008, and Vista, have multiple user logins. However, Microsoft chose to preserve compatibility with programs designed for other versions of Windows, such as Windows 95, 98, or XP Home Edition, because those programs were used to having the whole computer all to themselves. As such, they had to do some fancy hacks to pull all that off, and in the process, they still left even Server 2003 and Server 2008 full of holes for hackers to exploit. Apple's Mac OSX and Linux do not suffer from this problem. This is because they are designed from the ground up with security in mind, whereas Microsoft Windows was created for convenience with security being little more than an afterthought. Mac OSX and Linux both use a filesystem that has a strictly-enforced set of permissions that are attached to every file and folder in the system, and they spell out specifically who is allowed to do what with each file or folder. In Windows, for a virus to infect your system, it first has to install itself onto your system. As previously stated, it's very common for viruses to do this without your knowledge or permission. But with Mac OSX or Linux, you have to have administrative privileges in order to install or uninstall a program. On Mac OSX or some Linux distributions, such as Ubuntu, all you do to install or uninstall a program is enter your password when prompted to do so before you will be allowed to proceed (quite a few other Linux distributions have you enter a root password instead, requiring you to remember two passwords, one for yourself, and the other for the all-powerful root account). If, in the case of Mac OSX or Ubuntu, you don't have administrative privileges, or in the case of other distros, you don't know the root password, you simply can't do it. And that's a good deal of why Mac OSX and Linux are way more secure than Windows -- because viruses simply don't have the authorization to do install themselves behind your back with Mac OSX or Linux.


Which act as firewalls in liunx?

Linux is one of the most widely used operating system or software that any one can use, modify and redistribute without any restriction. Linux firewall are software based on Linux operating system use to secure the network. It is very easy and secure enough to use on the internet and needs no external firewall. However, when one uses any windows machine, remote service or works on a personal server then external firewall becomes necessary. Again if you connect to the internet using a modem then there is no need to worry about the firewall as each time you are assign to a new IP address by your ISP. But if you connect to the internet by using a cable modem or DSL line then firewall becomes relevant as you are going to use the same IP address for a long period of time. Linux firewall is the best option as the help of Linux firewall system both act as a web or e-mail server. Again you can control or determine the level of use of Internet. Linux firewall also provides web interface to control security on Linux server or even can block an IP or network completely. In this way the strong security system of Linux firewall is more effective and flexible than other expensive firewall routers.Astaro Security Linux:Astaro Security Linux is a new firewall solution: It distasteful inspection packet filtering, content filtering, virus scanning, VPN with IPSec and much more. With the web-based management tool and the ability to pull updates over the Internet it it is pretty easy to manage.CensorNet CensorNet is Linux based Internet Management software designed to control and monitor individuals accessing Internet resources on a local area network. CensorNetT is the open source alternative to Web Sense, Surf Control, I-Gear, N2H2 and other commercial Internet management solutions.ClarkConnect Broadband Gateway ClarkConnect is a software package that transforms standard PC hardware into a dedicated broadband gateway and easy-to-use server. The software is a great solution for businesses, organizations, home offices, and networked homes.Devil-Linux Devil-Linux is a mini distribution especially designed for a firewall and promises easy customization. Devil-Linux Boots from CD so there is no need for a hard disk. It supports Intel 486 and higher processors and uses the latest Linux kernel.Mandrake Security MNF This integrated network security solution, Multi Network Firewall (MNF), combines firewall, Virtual Private Network (VPN), intrusion detection, and traffic management functions into an easy-to-use product.Securepoint Through the spreading of hacker tools in the Internet it is already possible for unexperienced users to intrude in companies. Securepoint Firewall Systems fend off attacks on the company's network and thus offer an important protection against unauthorized access.Sentry Firewall Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node.SmoothWall GPL The SmoothWall project was founded by Lawrence Manning, Richard Morrell, Jon Fautley and Tom Ellis in Summer 2000, with the first version - version 0.9 - released via the Sourceforge open source collaboration site in August of that year.Immunix Secure Server OSImmunix OS is a Linux distribution designed to be secure both now and in the future. The Immunix security tools (Stack Guard T, SubDomainT, and CryptoMarkT)provide security bug tolerance so that even if security vulnerability is found in one of the programs supplied with Immunix, the vulnerability will probably not be exploitable by attackers.Luinux Luinux is an Internet Gateway for your home network equipment (PC, VideoConsole, TV, oven, ...). Luinux comes preconfigured so, ideally, you just have to install it and play.


Differences between WINS push and pull replications?

To replicate database entries between a pair of WINS servers, you must configure each WINS server as a pull partner, a push partner, or both with the other WINS server. * A push partner is a WINS server that sends a message to its pull partners, notifying them that it has new WINS database entries. When a WINS server's pull partner responds to the message with a replication request, the WINS server sends (pushes) copies of its new WINS database entries (also known as replicas) to the requesting pull partner. * A pull partner is a WINS server that pulls WINS database entries from its push partners by requesting any new WINS database entries that the push partners have. The pull partner requests the new WINS database entries that have a higher version number than the last entry the pull partner received during the most recent replication. regards Neokan


What is the difference between push mail and pull mail?

push mail is pushed out from the exchange server. pull is pulled from your device


What is the first step you take when operating a fire extinquisher?

Pull the pin


What is the first step you take when operating fire extinguisher?

Pull the pin


What is technology pull?

Technology pull, pull coding, or client pull is a style of network communication where the initial request for data originates from the client, and then is responded to by the server. Examples are downloading web pages and getting email.