Linux Ethernet FAQ Sun sysadmin FAQ Computer Security FAQ How to find sources comp.society.folklore FAQ Network Info FAQs Mail FAQs USENET FAQs How to become a USENET site General UNIX FAQ The Loginataka Shell programming FAQ UUCP Internals FAQ Perl Internet RFCs Chuck Hedrick's introduction to Internet Protocols Chuck Hedrick's introduction to administering Internet-based LANs USENIX System Administrator's Guild User DataBase software Tcl O'Rielly SysAdmin Books Security info Security docs Uebercracker Security Info UNIX System Administration Handbook, 2e TCP/IP Network Administration Computer Security Basics DNS and BIND Managing NFS and NIS Practical UNIX Security sendmail System Performance Tuning System and Network Administration books Matrix Maps Quarterly nteresting Devices Connected to the Net CERT ftp server Unix is a Four Letter Word Unix Haters Handbook The Worst Job in the World InterNIC The Tao Of Programming Know your sysadmin! The Hacker Test The Worm Before Christmas CLM Security page Internet spoofing reference page Top 100 things you don't want the sysadmin to say Diskette care guide 9 types of users Dilbert