Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Backing Up and Restoring Using the cpio Command in Linux and Unix


Removing A User

Post date: April 8, 2006, 00:04 Category: System Views: 3929 Comments
Tutorial quote: Employee turnover in most organizations runs high. So unless you run a small shop with a stable user base, you need to learn how to clean up after an employee leaves. Too many so-called system administrators do not understand the stakes involved when they manage users. Disgruntled former employees can often cause significant trouble for a company by gaining access to the network.

To remove a user, you need to learn to manage all of his or her files, mailboxes, mail aliases, print jobs, recurring –(automatic) personal processes such as the backing up of data or remote syncing of directories, and other references to the user. It is a good idea at first to disable the account in /etc/passwd, after which you can search for the user's files and other references. Once all traces of the user have been cleaned up, you can remove the user completely—but if you remove the entry from /etc/passwd while these other references exist, you have a harder time referring to them .

When you remove a user, it's a good idea to follow a pre-determined course of action so you don't forget any important steps; it may even be a good idea to make a checklist so that you have a routine. Following, you will find several items requiring attention.

Monitoring disk space and usage

Post date: June 17, 2006, 15:06 Category: Software Views: 4457 Comments
Tutorial quote: Monitoring disk space is a vital part of your job as a UNIX administrator. This article gives you the tools you need to be successful, including the use of df, du, find, and even the use of quotas. Let's get started by taking a look at how useful df can be.

Linux tools for study and analysis of biological information

Post date: May 24, 2005, 18:05 Category: Software Views: 2309 Comments
Tutorial quote: This article wants to show some of the advantages of Perl programming on Unix, for extraction of the biological information of the DNA, RNA and proteine sequences Databases. They can be used in comparative processes or analysis. The Human Genome project and the DNA clonation techniques have accelerated the scientific progress in this area. Daily generated information in this field outgrows often the capability of processing this information from an evolutive viewpoint.

The fast proliferation of the biological information on different genomes (dowry of genes of an organism) is driving bioinformatics as one fundamental discipline for the handling and analysis of these data.

Split and Reassemble Files

Post date: September 20, 2006, 20:09 Category: Software Views: 4146 Comments
Tutorial quote: There always comes a time, where you wish that file was only a few kilobytes/megabytes smaller. Wether it be so it can fit onto your floppy disk, CDR etc, or so you can meet the attachment limit on an e-mail server. This isn't really a command that you would use everyday, but it might come in handy.

Easy Automated Snapshot-Style Backups with Linux and Rsync

Post date: February 1, 2006, 00:02 Category: Software Views: 3004 Comments
Tutorial quote: This document describes a method for generating automatic rotating "snapshot"-style backups on a Unix-based system, with specific examples drawn from the author's GNU/Linux experience. Snapshot backups are a feature of some high-end industrial file servers; they create the illusion of multiple, full backups per day without the space or processing overhead. All of the snapshots are read-only, and are accessible directly by users as special system directories. It is often possible to store several hours, days, and even weeks' worth of snapshots with slightly more than 2x storage. This method, while not as space-efficient as some of the proprietary technologies (which, using special copy-on-write filesystems, can operate on slightly more than 1x storage), makes use of only standard file utilities and the common rsync program, which is installed by default on most Linux distributions. Properly configured, the method can also protect against hard disk failure, root compromises, or even back up a network of heterogeneous desktops automatically.

The PartImage Handbook

Post date: May 21, 2005, 15:05 Category: Software Views: 2505 Comments
Tutorial quote: - Partition Image is a Linux/UNIX partition imaging utility: it saves partitions formatted using the Ext2FS (the linux standard), ReiserFS (a new journaled and powerful file system), JFS IBM journaled file systems from AIX, NTFS (Windows NT File System), FAT16/32 (DOS & Windows file systems), or HPFS (OS/2 file system) file system formats to an image file. Only used blocks are copied. The image file can be compressed in the GZIP/BZIP2 formats to save disk space, and split into multiple files to be copied on removable media (ZIP for example), or burned on a CD-R ...

- This allows the user to save a full Linux/Windows system, with a single operation. When problems occur (viruses, crash, error, ...), you just have to restore, and after several minutes, all your system is restored (boot, files, ...), and fully working.

- This is very useful when installing the same software on many machines: just install one of them, create an image, and then restore the image on all other machines. After the first one, each subsequent installation can be made automaticaly, and only requires a few minutes.

Linux Web Filtering in 7 steps

Post date: April 12, 2005, 18:04 Category: Network Views: 4062 Comments
Tutorial quote: How to install a transparent Squid proxy server with real-time HTTP virus scanning on Mandrake 10.0 using DansGuardian and ClamAV?

People quickly and easily access volumes of research on the Internet and correspond with a mouse click. For more and more companies, content filtering is part of the large battle to combat all kinds of online threats, including hackers, worms and viruses. Linux content filtering allows administrators to configure and manage Internet access across the entire network and to block unwanted Web content like pornography, shopping Web sites, games and gambling.

This guide contains all the necessary information for installing and understanding the architectural layout of the implementation. It was written with the assumption that you understand how to install programs and have a basic understanding of Linux Mandrake. This includes installing Linux Mandrake and RPM packages, editing files, making directories, compiling software and understanding general UNIX commands. This guide doesn’t explain how to use or configure Squid, DansGuardian and ClamAV but information on where to obtain this information can be found in the “Additional information” section.

Firebird database Configuration

Post date: May 5, 2006, 17:05 Category: Installing Views: 2127 Comments
Tutorial quote: Firebird is a relational database offering many ANSI SQL-99 features that runs on Linux, Windows, and a variety of Unix platforms. Firebird offers excellent concurrency, high performance, and powerful language support for stored procedures and triggers. It has been used in production systems, under a variety of names since 1981.

Firebird is a commercially independent project of C and C++ programmers, technical advisors and supporters developing and enhancing a multi-platform relational database management system based on the source code released by Inprise Corp (now known as Borland Software Corp) under the InterBase Public License v.1.0 on 25 July, 2000.

How the One-Liner For-Loop in Bash Goes

Post date: January 6, 2007, 21:01 Category: System Views: 3360 Comments
Tutorial quote: A mini-guide to one of the coolest tricks at the Bash command line - performing the same operation on a whole group of files at once using the "for-do-done" loop syntax.

Unison - file synchronization tool

Post date: May 11, 2008, 14:05 Category: Software Views: 4161 Comments
Tutorial quote: Unison is a file-synchronization tool for Unix and Windows. It allows two replicas of a collection of files and directories to be stored on different hosts (or different disks on the same host), modified separately, and then brought up to date by propagating the changes in each replica to the other.

Web-based applications and online marketing solutions - LumoLink