Contact
Offices

Debian

Irenie White
The vast majority of Debian installations are simplified with the use of Preseeding and Netboot. Friedrich Weber, a school student on a work experience placement with us at our German office has observed the process and captured it in a Howto here: Imagine the following situation: you find yourself...
Roland Wolters
Following our earlier introduction to RHCS we now present a real world example: the installation of RHCS with Debian to provide certain virtual machines as services. Our RHCS overview already explained the basics of RHCS. This time we will take two hosts with shared storage and provide KVM guests...
Roland Wolters
This week, credativ launches its Open Source Support Card. With this card Open Source Support can be bought at a fixed price - without a binding contract. After a long preparation phase we are now offering our trusted services in a new, simple format; with the Open Source Support Card you get a...
Roland Wolters
Many digital cameras today do not just save an image, but also save various meta data in the Exif standard. This data includes information about the position of the camera when the image was taken (such as vertical or horizontal). However, some image programs use this data to rotate the image when...
Roland Wolters
The Red Hat Cluster Suite is a framework to bind two or more machines together to jointly handle one task. The following article gives an introduction to RHCS in terms of service failover. Linux is used daily in mission-critical environments all over the world. It follows that Linux can be required...
Roland Wolters
The administration of a large number of servers can be quite tiresome without a central configuration management. This article gives a first introduction into the configuration management tool, Puppet . Introduction In our daily work at the Open Source Support Center we maintain a large number of...
Roland Wolters
credativ employee, Alexander Wirt, is due to give a presentation at the German Chemnitz Linux Days about Single Sign On with Kerberos. Besides an introduction into configuration of Kerberos, the talk will also focus on the configuration of its various services. Kerberos is an authentication...
Bernd Helmle
The series "PostgreSQL Optimiser Bits" will introduce the strategies and highlights of the PostgreSQL optimiser. We start today with a new feature of PostgreSQL 8.4: Semi and Anti Joins. Since version 8.4, PostgreSQL has been offering a new optimisation strategy for the optimisation of certain...
Roland Wolters
The Debian project has announced that its internal DNS infrastructure is gradually moving over to DNSSEC. Thus from now on, all DNS answers for debian.com, amongst others, will be digitally signed to verify their authenticity. The Domain Name System (DNS) is one of the core components of the...
Roland Wolters
One of the fastest ways to restrict the access to a web server path is to use .htaccess files. These are placed in the to-be-restricted path and contain the information how to restrict the access. A simple example is given below: AuthType Digest AuthName "SecretDir" AuthUserFile /etc/...