Search results for Connecting to a Wireless LAN with Linux, Part 2
 |
|
Post date: May 28, 2005, 22:05
Category: Software
Views: 2985
Comments
|
Tutorial quote: Did you know that your new WiFi-equipped iPAQ can be used as a VoIP communicator? How about your Linux notebook? The program that makes it possible is called Skype and it lets you call other Skype users over the Internet for free. You can also call regular phone numbers for very competitive per-minute rates. As it turns out, Skype is available for both platforms and Windows, too. Although it's not an Open Source solution, it is freely available and fits nicely into our WiFi-PDA-meets-Linux bag of tools.
Join me now to discover how you can use the program on the iPAQ and a Linux notebook. |
 |
|
Post date: September 26, 2006, 17:09
Category: Installing
Views: 4996
Comments
|
Tutorial quote: Kubuntu is a user friendly operating system based on KDE, the K Desktop Environment. With a predictable 6 month release cycle and part of the Ubuntu project, Kubuntu is the GNU/Linux distribution for everyone. |
 |
|
Post date: August 3, 2007, 22:08
Category: Security
Views: 4343
Comments
|
Tutorial quote: This tutorial shows how to harden PHP5 with Suhosin on a CentOS 5.0 server. From the Suhosin project page: "Suhosin is an advanced protection system for PHP installations that was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin comes in two independent parts, that can be used separately or in combination. The first part is a small patch against the PHP core, that implements a few low-level protections against bufferoverflows or format string vulnerabilities and the second part is a powerful PHP extension that implements all the other protections." |
 |
|
Post date: July 25, 2007, 23:07
Category: Security
Views: 3818
Comments
|
Tutorial quote: This tutorial shows how to harden PHP5 with Suhosin on a Fedora 7 server. From the Suhosin project page: "Suhosin is an advanced protection system for PHP installations that was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin comes in two independent parts, that can be used separately or in combination. The first part is a small patch against the PHP core, that implements a few low-level protections against bufferoverflows or format string vulnerabilities and the second part is a powerful PHP extension that implements all the other protections." |
 |
|
Post date: April 18, 2005, 03:04
Category: Network
Views: 2823
Comments
|
Tutorial quote: Linux clusters have escaped. As the general popularity of the Linux operating system increases, more complex solutions built with it are becoming increasingly common in the "traditional" (more conservative) IT world. Linux computer clusters, whose provenance was originally universities and research institutions such as the U.S. National Laboratories, are showing up in increasing numbers as high-performance computing solutions within such areas as oil and gas exploration, computer-aided engineering, visualization, and software development. Linux clusters providing highly-available web, mail, and other infrastructure services are also increasingly common. If past computing history is any indicator of future trends, widespread use of Linux clusters in the mainstream IT world cannot be far behind. |
 |
|
Post date: April 16, 2005, 10:04
Category: Network
Views: 3415
Comments
|
Tutorial quote: Firewall administrators are challenged to balance flexibility and security when designing a comprehensive rule set. A firewall should provide protection against malfeasants, while allowing trusted users to connect. Unfortunately, it is not always possible to filter out the bad guys, because filtering on the basis of IP addresses and ports does not distinguish connecting users. Bad guys can and do come from trusted IP addresses. Open ports remain a necessary vulnerability: they allow connections to applications but also may turn into open doors for attack. This article presents a new security system, termed port knocking, in which trusted users manipulate firewall rules by transmitting information across closed ports. |
 |
|
Post date: April 14, 2005, 22:04
Category: Miscellaneous
Views: 5016
Comments
|
Tutorial quote: Many small businesses are turning to Linux as way to swim against the tide of rising software costs. Are you thinking about diving into Linux for your small business? From the outside, Linux can appear to be a deep ocean of strange jargon in unchartered waters. Who has the time to wade through all that to save a few clams? With Linux, it's not a sink or swim proposition.
Linux is now a lot simpler than you may think. We can provide you with the easiest, simplest, no-problem process for installing Linux on a PC. After going through this simple installation process, you will have a basic machine that you can configure into any kind of server, workstation, or office desktop. Future articles in this My First Linux Server series will help you build productive, Linux-based servers and small office workstations.
The best choices for your first Linux machine are probably the popular Red Hat Linux or SUSE Linux, primarily because both are easy to install and configure. Additionally, these companies are sound choices for the home office or small business. Both vendors have specialized in Linux for many years and offer full corporate product lines supporting your expansion. |
 |
|
Post date: September 6, 2011, 07:09
Category: Miscellaneous
Views: 6237
Comments
|
Tutorial quote: This tutorial describes how to give users chrooted SSH and/or chrooted SFTP access on Debian Squeeze. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. I will also show how to restrict users to SFTP so that they cannot use SSH (this part is independent from the chroot part of this tutorial). |
 |
|
Post date: January 21, 2006, 06:01
Category: System
Views: 3430
Comments
|
Tutorial quote: We ended last time after configuring our first unprivileged Xen domain. In this article, we complete our cluster and then test it using an open-source parallel ray tracer. The first thing we need to do is create additional slave nodes to be used with the cluster. So, let's get down to business. |
 |
|
Post date: May 31, 2005, 14:05
Category: Optimizing
Views: 4827
Comments
|
Tutorial quote: For desktop and laptop users who want a fast-booting operating system, getting rid of services you do not need can appear to improve performance. Obviously, if you are new to Linux, though, you probably do not know which processes you can get rid of safely nor how to stop them and keep them from restarting at boot time. |
|
|