Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Directory Directions...a Guide to the Linux File System

Unix+clones

How to Block Ads With Adzap

Post date: April 15, 2005, 21:04 Category: Network Views: 3967 Comments
Tutorial quote: For some time at my workplace we've been running an ad-zapping service on our web proxy. This page documents how it works, how to use it yourself, how to join the mailing list for updates of the pattern file, and the weirdnesses of our local setup (which you need not duplicate yourself).
Ubuntu

The Perfect Desktop - Ubuntu 7.04 Feisty Fawn

Post date: May 6, 2007, 22:05 Category: Desktop Views: 4639 Comments
Tutorial quote: With the release of Microsoft's new Windows operating system (Vista), more and more people are looking for alternatives to Windows for various reasons. This tutorial shows people who are willing to switch to Linux how they can set up a Linux desktop (Ubuntu 7.04 Feisty Fawn in this article) that fully replaces their Windows desktop, i.e. that has all software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that runs also on older hardware, and the best thing is: all software comes free of charge.
Ubuntu

Creating a Desktop Shortcut in Gnome

Post date: May 4, 2007, 03:05 Category: Desktop Views: 4799 Comments
Tutorial quote: How to install a desktop shortcut to a file, application or folder in Ubuntu
Debian

Install and Configure Auth Shadow on Debian/Ubuntu

Post date: February 23, 2007, 18:02 Category: Miscellaneous Views: 4509 Comments
Tutorial quote: Auth Shadow or mod-auth-shadow is a module for apache (and apache2, sort of) that enables authentication against /etc/shadow. The benefits being that any system user with a password can be authenticated for web_dav, subversion or simply an https server. The only other way to do this is with PAM. That method is dangerous because the apache user (www-data in my case) must be able to read /etc/shadow. Obviously, not a good idea. Auth Shadow accomplishes this safely by using a intermediate program called validate. This works because validate can be owned by root but executable by everyone. In the event that your server is compromised through apache, your password file will not be readable.
Debian

Running scripts after a reboot for non-root users

Post date: April 5, 2006, 01:04 Category: System Views: 3080 Comments
Tutorial quote: There is an alternative way of adding entries to your crontab file, using shortcuts. The shortcuts allow you to make entries that will match at particular times.
Unix+clones

Using MySQL to benchmark OS performance

Post date: April 12, 2005, 07:04 Category: Benchmarks Views: 4340 Comments
Tutorial quote: It seems to be an exciting time for *nix operating systems, with a number of them recently releasing new versions that bring the addition of expanded features and claims of improved performance. If you're using GNU/Linux, OpenBSD, NetBSD, FreeBSD, or Solaris as a database server, you've probably recently considered an upgrade or switch to another OS in that list due to marketing hype and hearsay. This article will show you how to benchmark operating system performance using MySQL on these OSes so you can find out for yourself if you're missing out. While this may not necessarily be indicative of overall system performance or overall database application performance, it will tell you specifically how well MySQL performs on your platform.

The following operating systems were used for the comparison testing:
- FreeBSD 4.11
- FreeBSD 5.3
- NetBSD 2.0
- Linux 2.6
- Linux 2.4
- Solaris 10 x86 (build 69)
- OpenBSD 3.6
Mandriva

The Perfect Desktop - Part 2: Mandriva Free 2007

Post date: February 27, 2007, 18:02 Category: Desktop Views: 4464 Comments
Tutorial quote: With the release of Microsoft's new Windows operating system (Vista), more and more people are looking for alternatives to Windows for various reasons. This tutorial is the second in a series of articles where I will show people who are willing to switch to Linux how they can set up a Linux desktop (Mandriva Free 2007 in this article) that fully replaces their Windows desktop, i.e. that has all software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions, and the best thing is: all software comes free of charge.
Debian

Debian RAID 1/5 system installer

Post date: May 28, 2005, 22:05 Category: Installing Views: 3787 Comments
Tutorial quote: Instructions for installing a very clean Debian GNU/Linux system that boots from RAID 1, and has RAID 1 or RAID 5 root and data filesystems.

The examples assume two identical harddrives, sda and sdb, on which after a small boot partition, 1 GB is used for swap, 25 GB is used for the root filesystem and everything else is for a big "data" partition that will hold non-system stuff.
Linux

Optimizing Desktop Performance, Part II

Post date: May 24, 2005, 18:05 Category: Optimizing Views: 4214 Comments
Tutorial quote: As we discussed in last week's article, for most of its existence, people have distributed Linux as a workstation or a server rather than as a desktop. The default workstation that evolved has existed mostly for use by developers. So, when you install a Linux distribution with a graphical interface, it generally looks like what a developer might want. In addition, it performs similar to how many UNIX workstations work, which can seem slow.

In this article, we continue to look at the Linux desktop in a different light. Here, we think of it as a computer system with a fast interface that we can optimize for the knowledge worker and consumer.
Linux

Step-By-Step Configuration of NAT with iptables

Post date: November 22, 2006, 18:11 Category: Network Views: 6730 Comments
Tutorial quote: This tutorial shows how to set up network-address-translation (NAT) on a Linux system with iptables rules so that the system can act as a gateway and provide internet access to multiple hosts on a local network using a single public IP address. This is achieved by rewriting the source and/or destination addresses of IP packets as they pass through the NAT system.
Web-based applications and online marketing solutions - LumoLink