Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Connecting to a Wireless LAN with Linux, Part 2

Linux

WiFi PDA Meets Linux--Part 3

Post date: May 28, 2005, 22:05 Category: Software Views: 2870 Comments
Tutorial quote: Did you know that your new WiFi-equipped iPAQ can be used as a VoIP communicator? How about your Linux notebook? The program that makes it possible is called Skype and it lets you call other Skype users over the Internet for free. You can also call regular phone numbers for very competitive per-minute rates. As it turns out, Skype is available for both platforms and Windows, too. Although it's not an Open Source solution, it is freely available and fits nicely into our WiFi-PDA-meets-Linux bag of tools.

Join me now to discover how you can use the program on the iPAQ and a Linux notebook.
Ubuntu

Kubuntu 6.06 LTS Installation Walkthrough with Screenshots

Post date: September 26, 2006, 17:09 Category: Installing Views: 4853 Comments
Tutorial quote: Kubuntu is a user friendly operating system based on KDE, the K Desktop Environment. With a predictable 6 month release cycle and part of the Ubuntu project, Kubuntu is the GNU/Linux distribution for everyone.
CentOS

How To Harden PHP5 With Suhosin On CentOS 5.0

Post date: August 3, 2007, 22:08 Category: Security Views: 4188 Comments
Tutorial quote: This tutorial shows how to harden PHP5 with Suhosin on a CentOS 5.0 server. From the Suhosin project page: "Suhosin is an advanced protection system for PHP installations that was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin comes in two independent parts, that can be used separately or in combination. The first part is a small patch against the PHP core, that implements a few low-level protections against bufferoverflows or format string vulnerabilities and the second part is a powerful PHP extension that implements all the other protections."
Fedora

How To Harden PHP5 With Suhosin On Fedora 7

Post date: July 25, 2007, 23:07 Category: Security Views: 3671 Comments
Tutorial quote: This tutorial shows how to harden PHP5 with Suhosin on a Fedora 7 server. From the Suhosin project page: "Suhosin is an advanced protection system for PHP installations that was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin comes in two independent parts, that can be used separately or in combination. The first part is a small patch against the PHP core, that implements a few low-level protections against bufferoverflows or format string vulnerabilities and the second part is a powerful PHP extension that implements all the other protections."
Linux

Building a Linux Cluster, Part 1

Post date: April 18, 2005, 03:04 Category: Network Views: 2692 Comments
Tutorial quote: Linux clusters have escaped. As the general popularity of the Linux operating system increases, more complex solutions built with it are becoming increasingly common in the "traditional" (more conservative) IT world. Linux computer clusters, whose provenance was originally universities and research institutions such as the U.S. National Laboratories, are showing up in increasing numbers as high-performance computing solutions within such areas as oil and gas exploration, computer-aided engineering, visualization, and software development. Linux clusters providing highly-available web, mail, and other infrastructure services are also increasingly common. If past computing history is any indicator of future trends, widespread use of Linux clusters in the mainstream IT world cannot be far behind.
Linux

Port Knocking

Post date: April 16, 2005, 10:04 Category: Network Views: 3295 Comments
Tutorial quote: Firewall administrators are challenged to balance flexibility and security when designing a comprehensive rule set. A firewall should provide protection against malfeasants, while allowing trusted users to connect. Unfortunately, it is not always possible to filter out the bad guys, because filtering on the basis of IP addresses and ports does not distinguish connecting users. Bad guys can and do come from trusted IP addresses. Open ports remain a necessary vulnerability: they allow connections to applications but also may turn into open doors for attack. This article presents a new security system, termed port knocking, in which trusted users manipulate firewall rules by transmitting information across closed ports.
RedHat

My First Linux Server, Part 1

Post date: April 14, 2005, 22:04 Category: Miscellaneous Views: 4856 Comments
Tutorial quote: Many small businesses are turning to Linux as way to swim against the tide of rising software costs. Are you thinking about diving into Linux for your small business? From the outside, Linux can appear to be a deep ocean of strange jargon in unchartered waters. Who has the time to wade through all that to save a few clams? With Linux, it's not a sink or swim proposition.

Linux is now a lot simpler than you may think. We can provide you with the easiest, simplest, no-problem process for installing Linux on a PC. After going through this simple installation process, you will have a basic machine that you can configure into any kind of server, workstation, or office desktop. Future articles in this My First Linux Server series will help you build productive, Linux-based servers and small office workstations.

The best choices for your first Linux machine are probably the popular Red Hat Linux or SUSE Linux, primarily because both are easy to install and configure. Additionally, these companies are sound choices for the home office or small business. Both vendors have specialized in Linux for many years and offer full corporate product lines supporting your expansion.
Debian

Restricting Users To SFTP Plus Setting Up Chrooted SSH/SFTP (Debian Squeeze)

Post date: September 6, 2011, 07:09 Category: Miscellaneous Views: 5978 Comments
Tutorial quote: This tutorial describes how to give users chrooted SSH and/or chrooted SFTP access on Debian Squeeze. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. I will also show how to restrict users to SFTP so that they cannot use SSH (this part is independent from the chroot part of this tutorial).
Linux

Xen Virtualization and Linux Clustering, Part 2

Post date: January 21, 2006, 06:01 Category: System Views: 3306 Comments
Tutorial quote: We ended last time after configuring our first unprivileged Xen domain. In this article, we complete our cluster and then test it using an open-source parallel ray tracer. The first thing we need to do is create additional slave nodes to be used with the cluster. So, let's get down to business.
Linux

Optimizing Desktop Performance, Part III

Post date: May 31, 2005, 14:05 Category: Optimizing Views: 4694 Comments
Tutorial quote: For desktop and laptop users who want a fast-booting operating system, getting rid of services you do not need can appear to improve performance. Obviously, if you are new to Linux, though, you probably do not know which processes you can get rid of safely nor how to stop them and keep them from restarting at boot time.
Web-based applications and online marketing solutions - LumoLink