07-09-2002
Need your help and opinion
Hey all,
I'm brand new to Unix/Linux and have a couple of questions. I own a small education/consulting company that has a staff of approx. 50 employees. Most our work is geared towards the office-style environment (i.e. Word, Excel, Powerpoint, etc.). There are also some C and Java programmers that help support the office staff. I am seeking to establish a network environment that is very stable and reliable.
My company currently has Pentium machines (233) with 64 MB of memory. I know that they will most probably have to upgrade someday but am trying to avoid buying all new hardware. Some of the machines are running windows while others are Macintosh. As a side note, I would also one day like to have my own web server.
I would like to have opinions/suggestions regarding whether or not to use Windows NT or UNIX/LINUX as the server for the backbone of my organization. What are the advantages/disadvantages of one over the other? What are other companies using?
Like I said, you input is greatly appreciated before I spend so much money.
Thanks,
Dennie1
10 More Discussions You Might Find Interesting
1. Solaris
Ladies/Gentlemen,
I am looking for a web-based tool to keep track of my Sun inventory. The following list of fields are fields I would like to store: Root Passwd (needs to be secure) / Hostid / Console Port / IP Address / Platform / Application / Hostname . . . you get the point.
Do any of... (4 Replies)
Discussion started by: pc9456
4 Replies
2. Post Here to Contact Site Administrators and Moderators
Hi,
I am new at this site and at unix. I was reading some answers that the administrators and moderators have posted to others, and sometimes I feel like their a little sarcastic.
I am asking just to be patient to me, I know nothing about unix but I do want to learn, and I think that positive... (7 Replies)
Discussion started by: HN19
7 Replies
3. UNIX for Dummies Questions & Answers
i'm trying to figure out a script that uses sed, and i'm not totally sure if it does what I think it does.
The script...
- takes in 3 inputs, $1, $2 are names. $3 is a file.
- filename is a file.
Here is what I'm trying to figure out:
cat $3 | grep "id17" > var2
sed "s|@@.*||g" var2 >... (1 Reply)
Discussion started by: gammaman
1 Replies
4. UNIX for Dummies Questions & Answers
Hello,
I get the following in one of my error logs:
Device /dev/sda, SATA disks accessed
via libata are not currently supported by smartmontools. When libata is
given an ATA
pass-thru ioctl() then an additional '-d libata' device type will be
added to smartmontools.
---------------
I... (0 Replies)
Discussion started by: mojoman
0 Replies
5. UNIX and Linux Applications
Hello,
I get the following in one of my error logs:
Device /dev/sda, SATA disks accessed
via libata are not currently supported by smartmontools. When libata is
given an ATA
pass-thru ioctl() then an additional '-d libata' device type will be
added to smartmontools.
---------------
... (1 Reply)
Discussion started by: mojoman
1 Replies
6. UNIX for Advanced & Expert Users
This perhaps does not belong in ths category; apologies, however, we have a heated debate going and your input will decide the result.
Should UNIX (HP, AIX, etc) be rebooted following a monthly cycle (Every month, or a qtr, etc.). We have some UX admins (grumps) who say they have seen a UX... (6 Replies)
Discussion started by: rsheikh
6 Replies
7. UNIX for Advanced & Expert Users
Hello all,
I want to deny any torrents passing thru linux box that are NOT encrypted. My ISP is doing packet inspection and gives warnings.
I'd like to allow torrents when client sets encryption.
Any thoughts? (5 Replies)
Discussion started by: darkman_hr
5 Replies
8. What is on Your Mind?
Dear Forum staff / Advisors / members ,
I am having something in my mind, about Linux / Unix possible Interview questions collections, I guess if I post them here,which might be useful for our members and for students, and in meantime we can discuss also about those questions, what's your... (4 Replies)
Discussion started by: Akshay Hegde
4 Replies
9. Shell Programming and Scripting
:wall:I've this simple code:
STF=/opt/aaa
cat $STF | nice sort -u > $STF.new && mv $STF.new $STF
Which works until today. What happened is that this script has been corrupted the FS, so I've to use fschk to repair the filesystem.
I presume the move command executed just a little too early... (1 Reply)
Discussion started by: accolito
1 Replies
10. AIX
Why Do We Need Root on the HMC?
In this article in IBMSystems Magazine Rob McNelly asked the question
Why Don't We Have Root on the HMC?
and he goes on to justify why we indeed shouldn't have root - kinda. I think his arguments are not as valid as he perhaps thinks they are and what's more... (11 Replies)
Discussion started by: bakunin
11 Replies
LEARN ABOUT DEBIAN
approx
APPROX(8) System Manager's Manual APPROX(8)
NAME
approx - proxy server for Debian archive files
SYNOPSIS
approx [OPTION]...
DESCRIPTION
approx responds to HTTP requests made by apt-get(8). It maintains a cache of Debian archive files that have been previously downloaded, so
that it can respond with a local copy when possible. If a file not in the cache is requested, approx will download it from a remote Debian
repository and deliver the contents to the client, simultaneously caching it for future use.
Over time, the approx server cache will grow to contain multiple, unneeded versions of Debian packages. The approx-gc(8) program removes
these from the cache.
OPTIONS
-c file, --config file
Specify an additional configuration file. May be used multiple times.
USAGE
approx is invoked by inetd(8).
EXAMPLES
Suppose that a client machine's /etc/apt/sources.list file contains the following lines:
deb http://apt:9999/debian testing main
deb http://apt:9999/security testing/updates main
deb-src http://apt:9999/debian unstable main
In this example, apt is the hostname of the approx server machine on the local network. Each distribution, such as "debian" or "security",
is mapped to a remote repository in the approx server's configuration file.
For example, the approx.conf file on the approx server might contain the lines
debian http://ftp.debian.org/debian
security http://security.debian.org
The mapping scheme is very simple. If the approx.conf file contains the line
repository http://remote-host/initial/path
then any request to the approx server of the form
http://approx-server/repository/rest/of/URL
is rewritten to
http://remote-host/initial/path/rest/of/URL
when there is a "cache miss", and that file is cached as
/var/cache/approx/repository/rest/of/URL
(Note that the repository name on the left-hand side is not included in the rewritten URL unless it is explicitly mentioned in the right-
hand side's initial path.)
FILES
/etc/approx/approx.conf
Configuration file for approx and related programs.
/var/cache/approx
Default cache directory for archive files.
SEE ALSO
approx.conf(5), inetd(8), approx-import(8), approx-gc(8), apt-get(8), sources.list(5)
AUTHOR
Eric Cooper <ecc@cmu.edu>
May 2011 APPROX(8)