Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Configuring Samba 3.0 To Use The ADS Security Mode (CentOS)

Unix+clones

Security Testing your Apache Configuration with Nikto

Post date: August 29, 2006, 16:08 Category: Security Views: 4272 Comments
Tutorial quote: By now you've got the perfect setup for your new Ubuntu 6.0.6 (Dapper Drake) box. You may have even followed the excellent Intrusion Detection and Prevention with BASE and Snort tutorial. And as an added precaution you installed DenyHosts to prevent hack attempts via ssh. But now that you've got your new LAMP server on the internet, how can you tell that your new web server is secure? You test it, of course!
Linux

Kernel parameters for enhance security

Post date: October 28, 2008, 05:10 Category: Security Views: 3815 Comments
Tutorial quote: The following list shows tunable kernel parameters you can use to secure your Linux server against attacks.

For each tunable kernel parameters you need to be add it to the /etc/sysctl.conf configuration file to make the change permanent after reboots
Solaris

Enforcing a Two Man Rule Using Solaris 10 RBAC

Post date: April 28, 2005, 02:04 Category: Security Views: 5232 Comments
Tutorial quote: The "two man rule" (also sometimes called the "four eyes rule") has its origins in military protocol although for quite some time it has been welcomed into the stockpile of IT security controls used by organizations around the world. The "two man rule" specifies that there must be two individuals that must act in concert in order to perform some action.
Linux

How to Avoid Getting Blacklisted

Post date: July 7, 2007, 23:07 Category: Security Views: 4269 Comments
Tutorial quote: A blacklist usually refers to a list of email or IP addresses known to send spam emails or some other type of unsolicited messages. Such lists are currently used by mail servers for filtering incoming emails and blocking the ones listed, in order to improve mail security and integrity. The blacklist is also the opposite of what is called a whitelist.
Debian

Configuring Dynamic DNS & DHCP on Debian Stable

Post date: February 3, 2006, 01:02 Category: Network Views: 4175 Comments
Tutorial quote: For the average home computer user there is no need to install a complex package such as the Internet Software Consortium's BIND DNS or DHCP server, since there are far simpler lower resource tools to use, for example dnsmasq. For those who you wish to learn how to use ISC's BIND and DHCP, for example as a learning exercise, this is how I got it all to work in Debian Sarge, the current stable version of Debian GNU/Linux.

This short article was prompted by my question on the Debian-Administration forum site, where I was able to get some answers to the issues I faced and I did promise to post a solution if I got one.
Linux

Configure Multiple Network Profiles on Linux

Post date: April 13, 2005, 02:04 Category: Network Views: 3115 Comments
Tutorial quote: Mobile Linux users face some interesting (OK, vexing) challenges when they want to plug into different networks. Any Linux system will easily support all manner of networking profiles--dialup, ISDN, Ethernet, wireless--the tricky bit is configuration. Manually re-configuring a PC for every connection is low on most users' lists of "fun things to do." You can be an ace scripting guru and fiddle up something yourself, or you can find a nice ready-made utility to do the work for you. Unfortunately, I have not found a universal utility to do this. However, there are a lot of utilities specific to various distributions, and an assortment of other utilities.
Debian

ACL(Access Control List) Configuration

Post date: April 4, 2006, 20:04 Category: Installing Views: 3601 Comments
Tutorial quote: Access Control Lists (ACLs) provide a much more flexible way of specifying permissions on a file or other object than the standard Unix user/group/owner system. Windows NT and above, when running on an NTFS partition, use ACLs to specify permissions on files and directories. This document attempts to show how you can enable ACL support on your Linux box and use Samba to provide an SMB file server for use by machines in a Windows 2000 domain.

ACLs are best stored in the actual file system itself. To that end, there are patches available for ext2 and ext3 that enable ACL support using Extended Attributes (EAs). SGI's XFS also has ACL support built in, but XFS is not currently covered in this document.
Linux

Keep an Eye on Your Linux Systems with Netstat

Post date: April 12, 2005, 17:04 Category: Network Views: 2725 Comments
Tutorial quote: Two of the fundamental aspects of Linux system security and troubleshooting are knowing what services are running, and what connections and services are available. We're all familiar with ps for viewing active services. netstat goes a couple of steps further, and displays all available connections, services, and their status.
FreeBSD

Configuring virtual domains with Cyrus+Postfix in FreeBSD 5.4

Post date: December 1, 2005, 03:12 Category: Software Views: 5234 Comments
Tutorial quote: Cyrus IMAP is an efficient IMAP server capable of handling a large number of accounts. Its biggest drawback is getting it installed and configured. This tutorial is a step-by-step guide on how to use Cyrus with the Postfix mail transfer agent (MTA). I tested these instructions with FreeBSD 5.4.

Postfix is a replacement for sendmail, the stock MTA that comes in FreeBSD. It is easier to configure and manage than sendmail. If you depend on sendmail, you can still look at the article for the Cyrus part, but you'll need to look elsewhere for the MTA configuration.

Unless otherwise instructed, perform all operations in this tutorial as root. You will need to use the port system. If you are new to it, check Chapter 4 of the FreeBSD Handbook.
CentOS

Installing The PHP-MemCache Module On CentOS 5.0

Post date: July 16, 2007, 23:07 Category: Optimizing Views: 6929 Comments
Tutorial quote: MemCached is a high-performance, distributed memory object caching system, generic in nature, but intended for use in speeding up dynamic web applications by alleviating database load. In this article I explain how you can very easily install it and make it avaible in PHP.
Web-based applications and online marketing solutions - LumoLink