Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Directory Directions...a Guide to the Linux File System

Solaris

Configuring Apache

Post date: April 13, 2005, 05:04 Category: Network Views: 4580 Comments
Tutorial quote: Apache can respond to browser requests from machines on your local network (i.e. an "Intranet" Web server) or from the Internet. The installation of the Solaris OS installed and set up most of the necessary Apache files. As a result, if you want to use your system as a Web server you only need to modify one file.
Linux

/etc/grub.conf explained

Post date: September 28, 2008, 09:09 Category: Software Views: 4063 Comments
Tutorial quote: The following example shows the structure of a GRUB menu file. The example installation has a Linux boot partition under /dev/sda5, a root partition under /dev/sda7, and a Windows installation under /dev/sda1.
Unix+clones

How to restore a hacked Linux server

Post date: July 30, 2006, 18:07 Category: Security Views: 4202 Comments
Tutorial quote: Every sysadmin will try its best to secure the system/s he is managing. Hopefully you never had to restore your own system from a compromise and you will not have to do this in the future. Working on several projects to restore a compromised Linux system for various clients, I have developed a set of rules that others might find useful in similar situations. The type of hacks encountered can be very variate and you might see very different ones than the one I will present, or I have seen live, but even so, this rules might be used as a starting point to develop your own recovery plan.
Debian

How to Install Latest Wine in debian Etch

Post date: December 22, 2008, 07:12 Category: Software Views: 3414 Comments
Tutorial quote: Wine makes it possible to run Windows programs alongside any Unix-like operating system,particularly Linux. At its heart, Wine is an implementation of the Windows Application
Programing Interface (API) library, acting as a bridge between the Windows program and Linux.Think of Wine as a compatibility layer, when a Windows program tries to perform a function that Linux doesn’t normally understand, Wine will translate that program’s instruction into one supported by the system. For example, if a program asks the system to create a Windows pushbutton or text-edit field, Wine will convert that instruction into its Linux equivalent in the form of a command to the window manager using the standard X11 protocol.
Ubuntu

Insights for a quick and easy Ubuntu printer installation

Post date: June 4, 2006, 18:06 Category: Hardware Views: 7641 Comments
Tutorial quote: Ubuntu makes printing reasonably easy and straightforward. This brief article is for those who need a specific and encouraging step-by-step guide. I hope that this article will not only ensure that you print with ease, but that you have every reason to enjoy a productive GNU/Linux desktop.

Before you begin the installation steps below, connect your printer/s. You need to do this prior to turning your system on. This helps to ensure Ubuntu recognizes how the printer is connected to the system, and it allows Ubuntu to identify the specific printer port.

Please don’t be dismayed if you plug in your printer and it’s not immediately recognized. I assure you that Ubuntu recognizes the printer. However, you will first need to configure the printer as an available device so other programs can use it.

The Ubuntu Printing Configuration Tool is used to accomplish this. For my example I will use an HP Deskjet printer connected to the Ubuntu system via a USB cable. However, these steps will also apply to printers that connect via a direct or Parallel cable.
Arch

X11 Cursors

Post date: April 14, 2005, 01:04 Category: Desktop Views: 7878 Comments
Tutorial quote: There are many cursor themes available for the X11 Windowing System besides the default black pointer.
This guide will instruct you on where to get them, installing them, and configuring them.
Fedora+Core

Tripwire on your Fedora Box

Post date: April 16, 2005, 00:04 Category: Security Views: 5320 Comments
Tutorial quote: Tripwire is an Intrusion Detection System. This can be used to alert users whenever their system is compromised. Tripwire detects and reports changes in system files. It will alert you through email whenever a change is detected. If the change is due to normal system activity, you can instruct Tripwire not to report the change to that file in future. If the change is not due to normal system activity, then it is a clear indication that something is wrong and you need to act immediately and fix the issue. Thus tripwire comes very handy to maintain the integrity of the system.

There is lot of information on the web about Tripwire. Some people might argue that AIDE (Advanced Intrusion Detection Environment) is better than tripwire and so on. This comparison is beyond the scope of this article. This is an introductory article for novice users who are interested in installing Tripwire on their Fedora Box. Advanced users can refer to the web for relevant information or they can contact appropriate mailing lists like fedora users mailing list.
Debian

How To Set Up Software RAID1 On A Running LVM System (Incl. GRUB Configuration) (Debian Etch)

Post date: March 25, 2008, 10:03 Category: System Views: 3648 Comments
Tutorial quote: This guide explains how to set up software RAID1 on an already running LVM system (Debian Etch). The GRUB bootloader will be configured in such a way that the system will still be able to boot if one of the hard drives fails (no matter which one).
Ubuntu

Automatix2 Overview Guide in Ubuntu Feisty Fawn With lots of Screenshots

Post date: April 14, 2007, 04:04 Category: Desktop Views: 3169 Comments
Tutorial quote: Automatix is a graphical interface for automating the installation of the most commonly requested applications in Debian based Linux operating systems.
Ubuntu

Setting up squid proxy server on Ubuntu (Quick Start Guide)

Post date: October 10, 2010, 05:10 Category: Software Views: 4827 Comments
Tutorial quote: Squid is an internet proxy server that can be used within a network to distribute an internet connection to all the computers within the network. One central computer is connected to the internet through any means such as dial-up, cable modem, ISDN, DSL, or T1, runs squid, and thus acts as the firewall to the internet. Because it is a proxy, it has the capabilities to log all user actions such as the URLs visited. There are many features that can be configured in squid. This guide is meant to be a quick start guide for those who are eager to get squid working and then configure it from there.
Web-based applications and online marketing solutions - LumoLink