Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for A couple of tricks with the secure shell

Fedora

The Perfect Desktop - Fedora 13 i686 (GNOME)

Post date: June 6, 2010, 21:06 Category: Desktop Views: 3584 Comments
Tutorial quote: This tutorial shows how you can set up a Fedora 13 desktop (GNOME) that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.
Fedora

The Perfect Desktop - Fedora 15 i686 (GNOME)

Post date: June 26, 2011, 09:06 Category: Desktop Views: 4347 Comments
Tutorial quote: This tutorial shows how you can set up a Fedora 15 desktop (GNOME) that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.
Fedora

The Perfect Desktop - Fedora 12 i686 (GNOME)

Post date: November 30, 2009, 00:11 Category: Desktop Views: 3108 Comments
Tutorial quote: This tutorial shows how you can set up a Fedora 12 desktop (GNOME) that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.
Fedora

The Perfect Desktop - Fedora 16 i686 (GNOME)

Post date: November 13, 2011, 10:11 Category: Desktop Views: 28217 Comments
Tutorial quote: This tutorial shows how you can set up a Fedora 16 desktop (GNOME) that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.
Linux

Enhancing kernel security with grsecurity

Post date: November 25, 2005, 21:11 Category: Security Views: 3173 Comments
Tutorial quote: Is your server as secure as it could be? Sure, you use a firewall, mandate strong passwords, and patch regularly. You even take a proactive approach by performing security audits with tools such as nmap and Nessus. Yet you may still be vulnerable to zero-day exploits and privilege escalation attacks. If these possibilities keep you awake at night, you're not alone. The sleepless folks with the grsecurity project have developed an easy-to-use set of security enhancements to help put your fears to rest.
Mepis

The Perfect Desktop - Mepis 11

Post date: September 18, 2011, 10:09 Category: Desktop Views: 4095 Comments
Tutorial quote: This tutorial shows how you can set up a Mepis 11 desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge. Mepis is a Linux distribution based on Debian Stable.
Unix+clones

How to restore a hacked Linux server

Post date: July 30, 2006, 18:07 Category: Security Views: 4058 Comments
Tutorial quote: Every sysadmin will try its best to secure the system/s he is managing. Hopefully you never had to restore your own system from a compromise and you will not have to do this in the future. Working on several projects to restore a compromised Linux system for various clients, I have developed a set of rules that others might find useful in similar situations. The type of hacks encountered can be very variate and you might see very different ones than the one I will present, or I have seen live, but even so, this rules might be used as a starting point to develop your own recovery plan.
Debian

How To Set Up SSH With Public-Key Authentication On Debian Etch

Post date: March 30, 2008, 13:03 Category: Security Views: 3780 Comments
Tutorial quote: This guide explains how to set up an SSH server on Debian Etch with public-key authorization (and optionally with disabled password logins). SSH is a great tool to control Linux-based computers remotely. It is safe and secure.
Ubuntu

The Perfect Desktop - Kubuntu 9.04

Post date: August 16, 2009, 12:08 Category: Desktop Views: 2672 Comments
Tutorial quote: This tutorial shows how you can set up a Kubuntu 9.04 desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge. Kubuntu 9.04 is derived from Ubuntu 9.04 and uses the KDE desktop instead of the GNOME desktop.
Kubuntu

The Perfect Desktop - Kubuntu 9.10

Post date: November 19, 2009, 13:11 Category: Desktop Views: 6070 Comments
Tutorial quote: This tutorial shows how you can set up a Kubuntu 9.10 desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge. Kubuntu 9.10 is derived from Ubuntu 9.10 and uses the KDE desktop instead of the GNOME desktop.
Web-based applications and online marketing solutions - LumoLink