﻿<?xml version="1.0" encoding="utf-8"?><!--RSS Genrated: Tue, 14 Apr 2026 07:28:44 GMT--><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:ev="http://purl.org/rss/1.0/modules/event/"><channel><title>Taur Productions - Linux</title><link>https://www.taurproductions.com:443/blog/rss/category/1443/linux-1</link><atom:link href="https://www.taurproductions.com:443/blog/rss/category/1443/linux-1" rel="self" type="application/rss+xml" /><description>RSS document</description><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[SCCM Technotes - Client Installation on a Linux server]]></title><link>https://www.taurproductions.com/blog/sccm-technotes-client-installation-on-a-linux-server</link><description><![CDATA[ Overview 

 This little article covers the installation of the SCCM client on a Linux server (SCCM 1610 and Ubuntu 14.04 to be precise). Unlike Windows domain joined computers where the whole ...]]></description><pubDate>Wed, 01 Mar 2017 20:53:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/sccm-technotes-client-installation-on-a-linux-server</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2915]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[SCCM Technotes - Ubuntu and your AD certificate authority]]></title><link>https://www.taurproductions.com/blog/sccm-technotes-ubuntu-and-your-ad-certificate-authority</link><description><![CDATA[ If, like me, you are a born and bred Windows guy, then the land of Linux is a country full of mystery and arcane incantations (aka the shell). However, SCCM can manage just about anything these days ...]]></description><pubDate>Tue, 28 Feb 2017 20:53:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/sccm-technotes-ubuntu-and-your-ad-certificate-authority</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2916]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Fault finding guide for the HTTP transparent proxy solution]]></title><link>https://www.taurproductions.com/blog/fault-finding-guide-for-the-http-transparent-proxy-solution</link><description><![CDATA[ Basic Fault Finding Guide for the Transparent Proxy Solution 

 1. Squid Services 

 The Squid service itself is configured by a text file in /etc/squid3/squid.conf. This is read at service ...]]></description><pubDate>Sat, 17 Jan 2015 20:55:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/fault-finding-guide-for-the-http-transparent-proxy-solution</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2918]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[HTTP Transparent Proxy using a Cisco ASA firewall and a Squid proxy server Part Two]]></title><link>https://www.taurproductions.com/blog/http-transparent-proxy-using-a-cisco-asa-firewall-and-a-squid-proxy-server-part-two</link><description><![CDATA[  Part 2 - Squid Configuration  

 On your Ubuntu Linux servers, add the WCCP configuration. The ASA firewall sends the redirected traffic in an encapsulated GRE tunnel but sends the return traffic ...]]></description><pubDate>Fri, 16 Jan 2015 20:56:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/http-transparent-proxy-using-a-cisco-asa-firewall-and-a-squid-proxy-server-part-two</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2919]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[Linux: Using CNTLM to authenticate to a proxy server]]></title><link>https://www.taurproductions.com/blog/linux-using-cntlm-to-authenticate-to-a-proxy-server</link><description><![CDATA[  Background  

 In the datacentre environment, direct web access to the Internet is sometimes blocked for security reasons. CNTLM enables transparent use of a proxy server that requires NTLM ...]]></description><pubDate>Thu, 15 Jan 2015 21:03:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/linux-using-cntlm-to-authenticate-to-a-proxy-server</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2927]]></dc:identifier></item><item><dc:creator><![CDATA[SuperUser Account]]></dc:creator><title><![CDATA[HTTP Transparent Proxy using a Cisco ASA firewall and a Squid proxy server Part One]]></title><link>https://www.taurproductions.com/blog/http-transparent-proxy-using-a-cisco-asa-firewall-and-a-squid-proxy-server-part-one</link><description><![CDATA[ Scenario 

 Here’s the story, and the picture for that matter. You have an imaginary University that wants to ensure that all Internet traffic is filtered. To do so, they use group policies – God ...]]></description><pubDate>Wed, 14 Jan 2015 20:57:00 GMT</pubDate><guid>https://www.taurproductions.com/blog/http-transparent-proxy-using-a-cisco-asa-firewall-and-a-squid-proxy-server-part-one</guid><dc:identifier><![CDATA[d9c51d8f-e279-4d5e-90c3-11132ab784e8-2920]]></dc:identifier></item></channel></rss>