Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for HOWTO create keyboard macros in Emacs

Ubuntu

How to Create a Private Encrypted Folder On Ubuntu 8.10

Post date: March 5, 2009, 08:03 Category: System Views: 4584 Comments
Tutorial quote: eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem for Linux.It provides advanced key management and policy features. eCryptfs stores cryptographic metadata in the header of each file written, so that encrypted files can be copied between hosts; the
file will be decryptable with the proper key, and there is no need to keep track of any additional information aside from what is already in the encrypted file itself. Think of
eCryptfs as a sort of “gnupgfs”.eCryptfs is a native Linux filesystem. The kernel module component of eCryptfs is part of the Linux kernel since 2.6.19.
Ubuntu

How to Create a Private Encrypted Folder On Ubuntu 8.10 (Intrepid)

Post date: January 13, 2009, 13:01 Category: System Views: 4847 Comments
Tutorial quote: eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem for Linux.It provides advanced key management and policy features. eCryptfs stores cryptographic metadata in the header of each file written, so that encrypted files can be copied between hosts; the file will be decryptable with the proper key, and there is no need to keep track of any additional information aside from what is already in the encrypted file itself. Think of eCryptfs as a sort of “gnupgfs”.eCryptfs is a native Linux filesystem. The kernel module component of eCryptfs is part of the Linux kernel since 2.6.19.

Debian

How To Install VMware Server On Debian Sarge

Post date: November 1, 2006, 18:11 Category: Installing Views: 3585 Comments
Tutorial quote: This tutorial provides step-by-step instructions on how to install the free VMware Server (version 1.0.1) on a Debian Sarge system. With VMware Server you can create and run guest operating systems (virtual machines) such as Linux, Windows, FreeBSD, etc. under a host operating system. In this article we use Debian Sarge (3.1) as the host operating system.
Ubuntu

Installing Xen On An Ubuntu Feisty Fawn Server From The Ubuntu Repositories

Post date: June 30, 2007, 00:06 Category: Installing Views: 3717 Comments
Tutorial quote: This tutorial provides step-by-step instructions on how to install Xen on an Ubuntu Feisty Fawn (Ubuntu 7.04) server system (i386). You can find all the software used here in the Ubuntu repositories, so no external files or compilation are needed. Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called virtual machines or domUs, under a host operating system (dom0).
Debian

dmcrypt

Post date: January 25, 2006, 22:01 Category: Security Views: 4998 Comments
Tutorial quote: Device-mapper is a new infrastructure in the Linux 2.6 kernel that provides a generic way to create virtual layers of block devices that can do different things on top of real block devices like striping, concatenation, mirroring, snapshotting, etc... The device-mapper is used by the LVM2 and EVMS 2.x tools. dm-crypt is such a device-mapper target that provides transparent encryption of block devices using the new Linux 2.6 cryptoapi. Writes to this device will be encrypted and reads decrypted. You can mount your filesystem on it as usual. But without the key you can't access your data. It does basically the same as cryptoloop only that it's a much cleaner code and better suits the need of a block device and has a more flexible configuration interface. The on-disk format is also compatible.
Linux

How to secure VNC remote access with two-factor authentication

Post date: May 21, 2007, 22:05 Category: Security Views: 4008 Comments
Tutorial quote: VNC is the most popular remote access solution today. However, it was developed to provide remote access, not to provide secure remote access. Administrators have to add security to VNC by tunneling it through an encrpyted channel such as SSH and adding a layer of authentication. In this article, we will show you how to combine the NoMachine NX server to encrpyt VNC and remote X session combined with two-factor authentication from WiKID Systems to create a secure, fast remote access solution.
Debian

Creating Encrypted FTP Backups With duplicity And ftplicity On Debian Etch

Post date: December 18, 2007, 12:12 Category: Miscellaneous Views: 3994 Comments
Tutorial quote: When you rent a dedicated server nowadays, almost all providers give you FTP backup space for your server on one of the provider's backup systems. This tutorial shows how you can use duplicity and ftplicity to create encrypted (so that nobody with access to the backup server can read sensitive data in your backups) backups on the provider's remote backup server over FTP. ftplicity is a duplicity wrapper script (provided by the German computer magazine c't) that allows us to use duplicity without interaction (i.e., you do not have to type in any passwords).
Debian

Generating Web Site Statistics With AWStats & JAWStats On Debian Lenny

Post date: June 27, 2010, 20:06 Category: Miscellaneous Views: 5588 Comments
Tutorial quote: This tutorial explains how you can generate statistics for your web site with AWStats and JAWStats on a Debian Lenny web server. AWStats is a free powerful and featureful tool that generates advanced web server statistics. JAWStats runs in conjunction with AWStats and produces clear and informative charts, graphs and tables about your website visitors. AWStats is able to create graphical web pages for the statistics, but JAWStats presents this data in a much nicer way - it's much better organized and makes use of Ajax and Flash.
Unix+clones

Automating Perl Database Applications

Post date: May 1, 2005, 17:05 Category: Programming Views: 3904 Comments
Tutorial quote: This article describes how Perl is used to generate Perl CGI code using the multi-platform CGIScripter application. The resulting output code automates SQL table creation commands (in this example, for a MySQL database), HTML pages and Perl code. Web security issues, data validation and image handling functionality are incorporated into the resulting Perl code. By automating the development of Perl CGI scripts, even entry-level developers can create CGI scripts that contain most of the commonly requested features in a short period of time--without manually writing any code.
Debian

Creating Advanced MySQL-Based Virtual Hosts On Lighttpd (Debian Etch)

Post date: August 19, 2008, 10:08 Category: Software Views: 3841 Comments
Tutorial quote: This guide explains how you can create advanced virtual hosts on a lighttpd web server on Debian Etch that are stored in a MySQL database. The method described here does not use the lighttpd mod_mysql_vhost module, and unlike mod_mysql_vhost (which allows you to store only the hostname and document root of a vhost in a database), this method allows to store individual configuration directives for each vhost in the MySQL database.
Web-based applications and online marketing solutions - LumoLink