Home Charlie Schluting Bio
Image of Charlie Schluting
Charlie Schluting

1

Storage Networking 101: Understanding SANs and Storage
Welcome! We begin out Storage Networking 101 series with an introduction to Storage Area Networks and storage technologies. In case you missed it, be sure to read the entire Networking 101 series before embarking on the Storage journey—a solid...
Learn Your Linux Clustering Options
“Cluster” is probably the most heavily abused term in the computing world. In this article we’ll talk about what a cluster really is, and give an overview of the Linux technologies that can help you implement various types of clusters. The...
Shell Game: Trading in csh for zsh (Part 2)
Last week we took the plunge and started learning about zsh. The remaining question was, "what does it take to convert an avid csh/tcsh user to zsh?" The answer was surprisingly, "not much." Zsh implements many options that will appeal to...
Shell Game: Trade in tcsh for zsh
We can make life easier if we simply learn some new tricks, so let’s try a little experiment: I’m going to switch shells, converting everything in my tcsh configuration into zsh equivalents, and hopefully learn some new tricks. This week...
NIS to LDAP: Making the Leap
Considering a conversion from NIS to LDAP? It may be more difficult than you plan. NIS, designed by Sun Microsystems and sometimes called a Yellow Pages directory, is a mechanism to centrally manage machine configuration data. For many reasons, LDAP is a...
Implement NFSv4: Domains and Authentication
Last week, we talked about some new features available in NFSv4. This week we’ll explain what’s required to get NFS servers and clients talking NFSv4, and briefly talk about the components for secure NFS. New in NFSv4 is the “domain”...
Using sudo to Keep Admins Honest? sudon’t!
The consensus among many Unix and Linux users seems to be that sudo is more secure than using the root account, because it requires you type your password to perform potentially harmful actions. While sudo is useful for what it was designed for, this thinking...
FIN-ACK: Wrapping Up Networking 101
All good things must come to an end, and so it is with Networking 101. This installment, we take a look back at everything we covered in our series. We designed the series with the belief that everyone in networking should understand all of these concepts, at...
Networking 101: Understanding NAT and PAT
Due in large part to alleged NAT support on consumer devices, many people are confused about what NAT really is. Network Address Translation is used for many purposes, including but certainly not limited to, saving IP addresses. In this installment of...
Go Hack Yourself: Tiger Teams for Fun and Training
Tiger teams, originally a military security-testing concept, are now used to test computer security as well. Forming an attack/defend security exercise is a useful way to test security, as well as train employees. Here’s how to organize such an...