Linux
Ethernet FAQ
Sun sysadmin FAQ
Computer Security FAQ
How to find sources
comp.society.folklore FAQ
Network Info FAQs
Mail FAQs
USENET FAQs
How to become a USENET site
General UNIX FAQ
The Loginataka
Shell programming FAQ
UUCP Internals FAQ
Perl
Internet RFCs
Chuck Hedrick's introduction to Internet Protocols
Chuck Hedrick's introduction to administering Internet-based LANs
USENIX System Administrator's Guild
User DataBase software
Tcl
O'Rielly SysAdmin Books
Security info
Security docs
Uebercracker Security Info
UNIX System Administration Handbook, 2e
TCP/IP Network Administration
Computer Security Basics
DNS and BIND
Managing NFS and NIS
Practical UNIX Security
sendmail
System Performance Tuning
System and Network Administration books
Matrix Maps Quarterly
nteresting Devices Connected to the Net
CERT ftp server
Unix is a Four Letter Word
Unix Haters Handbook
The Worst Job in the World
InterNIC
The Tao Of Programming
Know your sysadmin!
The Hacker Test
The Worm Before Christmas
CLM Security page
Internet spoofing reference page
Top 100 things you don't want the sysadmin to say
Diskette care guide
9 types of users
Dilbert