SELinux: Why it's time to stop turning it off

We hear it over and over again, how Linux is more secure—yada..yada..yada…. While that can be true its only true if the computer environment is configured properly. Security is done in layers, and often layers that seem troublesome are removed,...

Enhance Productivity through Core Values

Like many companies today, iuvo Technologies has a set of core values. Our core values are: Trust, Respect, Humility, Take Initiative, Embrace Change, Experience Matters, Collaboration, Open Communication, and Relationships Are Key.  Fortunately, a...

Moving a Microsoft SharePoint folder using Power Automate

Microsoft SharePoint Migration Tool

To set the stage, you may already be familiar with the Microsoft SharePoint Migration Tool.  This is a free and simple tool that can be used to migrate content from SharePoint server or from a local or network...

How To Calculate UNIX File Permissions

Introduction

Unix file permissions can seem a bit daunting to everyone. This guide will help to have a solid grasp on setting the correct permissions for all UNIX file system. Covering both Linux and Mac distributions.

AD Authentication with SSSD Without Joining Domain Without VPN

We have a few earlier blog posts on setting up Linux based Samba file shares with Active Directory authentication.Similarly, there are many documents on the Internet on configuring LDAP authentication to Active Directory.However, very little has...

Subscribe Here For Our Blogs:

Recent Posts