finds you similar websites
auto-suggest    top sites

Jun 2nd, 2024

11 Popular Sites Like http://www.cyberciti.biz/...

We've researched the www and found tons of high-quality squid and linux sites like this one. Stop on by and discover other websites that are similar to this one.

Displaying 41 to 50 of 500 alternatives to http://www.cyberciti.biz/tips/howto.... (Updated: Jun 2nd, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  Install Squid Proxy Server on CentOS / Redhat...
No information avaiable
http://www.cyberciti.biz/tips/howto-rhel-centos-fedora-squid-installation-configuration.html
popularity:
squid
linux
proxy
centos
howto
security
install
sysadmin
configuration
installation
new search by a custom tag signature
  Linux System Administration Portal
Linux Admin Portal: Linux, BSD, admin, and programming news, articles, and opinions
similarity:
popularity:
linux
sysadmin
news
tutorials
unix
tutorial
admin
reference
howto
blog
  HowtoForge - Linux Howtos and Tutorials | The Open Source Howto Development Web Site.
HowtoForge provides user-friendly Linux tutorials about almost every topic. ... Do you like HowtoForge? Please consider to support us by becoming a subscriber. ...
similarity:
popularity:
linux
howto
tutorial
tutorials
reference
opensource
unix
software
ubuntu
tips
  BASTILLE-LINUX
Hardening system supporting the Red Hat, Debian, Mandrake, SuSE, and TurboLinux Linux distributions along with HP-UX and Mac OS X.
similarity:
popularity:
linux
security
sysadmin
software
hardening
tools
unix
firewall
opensource
osx
  Linux Config
... "linuxconfig" and use pam_mount to mount it under /home ... Retrieved from "http://www.linuxconfig.org/Main_Page" Views. Article. Discussion. History ...
similarity:
popularity:
linux
howto
reference
documentation
tutorials
opensource
security
tutorial
wiki
sysadmin
  Top 20 OpenSSH Server Best Security Practices
OpenSSH server best security practices - protect your server from brute force attack under UNIX / Linux / BSD / Mac OS X operating systems.
similarity:
popularity:
ssh
security
linux
sysadmin
tips
openssh
networking
unix
howto
server
  Linux Get list of installed software for reinstallation / restore software
Explains how to backup installed software name and restore them as required under RHEL / Fedora / CentOS / Debian and Ubuntu Linux.
similarity:
popularity:
linux
backup
ubuntu
debian
restore
howto
software
sysadmin
recovery
install
  CentOS Pub --- 꽾ⵎ蝥 CentOS 㭥敵
但是,这些方式也使得一方面服务器的可定制性变得很差,另一方面,使服务器在承载服务负担的同时,时时刻刻都有受到由于 Windows 操作系统本身在服务器方面的 ... 所以,在这里我们用Linux这个服务器专用操作系统来搭建一台安全、稳定、可定制性强的服务器,来满足我们发布网页、以及架设论坛等等多功能交互程序的需要。 ...
similarity:
popularity:
linux
centos
tutorial
howto
server
opensource
൧ꅒ桖
reference
os
奥୺
  Linux Kernel Configuration Archive
Linux kernel configuration archive. View and search past and current Linux kernel configurations
similarity:
popularity:
linux
kernel
tools
configuration
reference
development
config
sysadmin
howto
archive
  How to circumvent strict firewalls when using public wifi hostpots - verot.net
A tutorial explaining how to bypass firewalls, for instance at the office, in public places or wifi hotspots, using a SOCKS server or tsocks to tunnel everything ...
similarity:
popularity:
ssh
linux
security
proxy
firewall
howto
tunnel
internet
hacking
socks
  Unix Toolbox
A collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users, a compact and practical reference.
similarity:
popularity:
linux
unix
reference
cheatsheet
commands
shell
sysadmin
howto
bash
tools
< prev ... 1 2 3 4 5 6 7 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.