Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Directory Directions...a Guide to the Linux File System

Linux

Replacing A Failed Hard Drive In A Software RAID1 Array

Post date: January 30, 2007, 17:01 Category: System Views: 4436 Comments
Tutorial quote: This guide shows how to remove a failed hard drive from a Linux RAID1 array (software RAID), and how to add a new hard disk to the RAID1 array without losing data.
OpenSUSE

Measuring the performance/latency of OpenSuse system - LatencyTOP

Post date: February 17, 2009, 08:02 Category: Optimizing Views: 5784 Comments
Tutorial quote: Skipping audio, slower servers, everyone knows the symptoms of latency. But to know what's going on in the system, what's causing the latency, how to fix it... that's a hard question without good answers right now.

LatencyTOP is a Linux* tool for software developers (both kernel and userspace), aimed at identifying where in the system latency is happening, and what kind of operation/action is causing the latency to happen so that the code can be changed to avoid the worst latency hiccups.
Gentoo

Bandwidth limiting howto

Post date: June 13, 2005, 02:06 Category: Network Views: 5076 Comments
Tutorial quote: Linux has a very powerful mechanism for controlling network bandwidth usage. As being powerful inevitably implies being complex, this feature is documented in lengthy and exhaustive documents in great details. These documents however can prove to be excessive in their length and language to users who are looking for simple solutions for simple questions. This guide aims to give a short and practical introduction on how to solve some common issues that users tend to experience on an everyday basis.
Unix+clones

Apple's G5 versus x86, Mac OS X versus Linux

Post date: June 4, 2005, 03:06 Category: Benchmarks Views: 3913 Comments
Tutorial quote: This article is written solely from the frustration that I could not get a clear picture on what the G5 and Mac OS X are capable of. So, be warned; this is not an all-round review. It is definitely the worst buyer’s guide that you can imagine. This article cares about speed, performance, and nothing else! No comments on how well designed the internals are, no elaborate discussions about user friendliness, out-of-the-box experience and other subjective subjects. But we think that you should have a decent insight to where the G5/Mac OS X combination positions itself when compared to the Intel & AMD world at the end of this article.
Unix+clones

How to scan your Linux-Distro for Root Kits

Post date: May 19, 2006, 18:05 Category: Security Views: 3882 Comments
Tutorial quote: Do you suspect that you have a compromised system ?
Check now for root kits that the intruder may have installed !!!

So... What in the hell is a root kit ???
A root kit is a collection of programs that intruders often install after they have compromised the root account of a system.
These programs will help the intruders clean up their tracks, as well as provide access back into the system.
Root kits will sometimes leave processes running so that the intruder can come back easily and without the system administrator's knowledge !

Solution....
Scripts like chkrootkit will do the job for you automatically.
Debian

Installing And Working With eyeOS Under Debian 4.0

Post date: June 11, 2007, 20:06 Category: Software Views: 4074 Comments
Tutorial quote: This tutorial shows how you can install eyeOS on a standard Linux system. EyeOS is a kind of operating system which works online, i.e. it manages files on the server and enables the user to upload, download and edit files.
RedHat

NIST Publically-Released Red Hat Enterprise Linux Benchmark

Post date: October 21, 2006, 04:10 Category: Benchmarks Views: 7627 Comments
Tutorial quote: The Benchmark is a compilation of security configuration actions and settings that "harden" Red Hat Linux operating systems. It is a CIS Level-I benchmark: the prudent level of minimum due care for operating system security. This benchmark was developed and tested on Red Hat Enterprise Linux (RHEL) including RHEL 2.1, RHEL 3.0, and Fedora Core 1, 2, & 3. It is likely to work for other Linux distributions - especially Red Hat and Fedora derivatives - as well.
Linux

Reducing MySQL Memory Footprint

Post date: September 19, 2008, 22:09 Category: Software Views: 3891 Comments
Tutorial quote: By default MySQL installs a configuration file with big caches and uses up more memory than is needed on most server setups. If like me you are struggling for free ram you may wish to use MySQL’s my-small.cnf and optimize it a little, here is how to do it.
Ubuntu

How to install Google Chrome browser in Ubuntu and Debian

Post date: June 8, 2009, 21:06 Category: Software Views: 5617 Comments
Tutorial quote: Guide on how to install Google Chrome natively browser in Ubuntu 8.04, 8.10, 9.04 and Debian 5 Linux.
Ubuntu

Optical Character Recognition With Tesseract OCR On Ubuntu 7.04

Post date: August 28, 2007, 20:08 Category: Desktop Views: 3798 Comments
Tutorial quote: This guide describes how to set up Tesseract OCR on Ubuntu 7.04. OCR means "Optical Character Recognition". The resulting system will be able to convert images with embedded text to text files. Tesseract is licensed under the Apache License v2.0.
Web-based applications and online marketing solutions - LumoLink