Access "Linux's Best Friend"
This article is part of the July 2005 issue of Why business managers are a breed of security professional
Bits & Bolts Thanks to YUM, Linux updates are as reliable as Old Yeller. The Right Tool YUM is more scalable and tolerant than other Linux updating programs, such as Red Hat-based up2date and Debian-based APT-RPM (now managed by Conectiva), which makes it more suitable for enterprise environments. YUM handles dependencies more gracefully than the others, supports multiple repositories, groups and failover, and simplifies the management of multiple centralized and decentralized machines. YUM, like up2date, is written in Python, while APT-RPM is written in C++; the difference is 33,000 lines of code, meaning YUM and up2date are faster and less complex. On the other hand, up2date and APT-RPM have native GUIs, while YUM is command-line only (third-party GUIs are available). Also, up2date has a rollback feature absent in YUM, which is important in case of incorrect or incomplete updates. YUM may be used in other popular distributions such as Novell's SuSE Linux or Mandrake, but there are less likely to be issues with Red Hat and Fedora. SuSE and Mandrake users ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Linux's Best Friend
Thanks to YUM, Linux updates are as reliable as Old Yeller.
-
Corrent's SR110 SSL VPN Web Security Gateway
Read about Corrent's SR110 SSL VPN Web Security Gateway with Check Point Connectra 2.0.
-
Intrusion Detection: Tripwire's Enterprise 5.0
by Scott Sidel, Contributor
June 2005 review of Tripwire's Enterprise 5.0
-
The Business Case for Network Security: Advocacy, Governance and ROI
Read a review of the book: The Business Case for Network Security: Advocacy, Governance and ROI.
-
Amazing Access
Finding a comprehensive identity and access management architecture requires leadership to navigate the technology and implementation labyrinth.
-
All Aboard!
To gain buy-in and support for your security policies, it's best to start at the top.
-
Linux's Best Friend
-
-
Hot Pick: NetContinuum's NC-1000 Application Security Gateway 4.3
NetContinuum's NC-1000 Application Security Gateway v4.3
-
nCircle's IP360 Vulnerability Management System product review
Product review of nCircle's IP360 Vulnerability Management System pricing, setup, configuration, assessment, and installation feature information.
-
Recent Releases: Security product briefs, July 2005
Read about the security products released in July 2005.
-
Meet the New Champions
CIGNA makes business managers responsible for security.
-
Mission Impossible
Seven ways to leverage your infrastructure against spyware.
-
Hot Pick: NetContinuum's NC-1000 Application Security Gateway 4.3
-
Columns
-
Layer 8: When security is a losing battle
Realistic Expectations
-
Publisher's Note: Security goals
How important is malware defense in the minds of security professionals? You may be surprised by our 2005 Security Priorities survey.
-
Ping: Karen Worstell
Karen Worstell
-
Perspectives: Lessons learned in BS 7799 certification
Bank of Montreal shares seven lessons learned as it achieved BS 7799 certification.
-
Layer 8: When security is a losing battle
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO