Some organizations use Microsoft Proxy to protect their network edge. To pass through the proxy, Microsoft's NTLM authentication/authorization sequence is typicially required. For regular domain users, this is typically not a problem, as Microsoft's Internet Explorer will automatically supply credentials to the Microsoft ISA Proxy Server. Continue reading "Linux Through Microsoft Proxy" »
Thursday, November 16. 2006
Linux Through Microsoft Proxy
Monday, November 13. 2006
Debian Etch 2 Base Build
This build process creates a basic VMWare session with Debian Etch 2 Network Boot CD. Familiarity with VMWare is assumed. A similar configuration can be used when installing on physical hardware.
Continue reading "Debian Etch 2 Base Build" »
(Page 1 of 1, totaling 2 entries)