Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Creating secure wireless access points with OpenBSD and OpenVPN

Fedora

The Perfect Desktop - Fedora 13 i686 (GNOME)

Post date: June 6, 2010, 21:06 Category: Desktop Views: 4066 Comments
Tutorial quote: This tutorial shows how you can set up a Fedora 13 desktop (GNOME) that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.
Fedora

The Perfect Desktop - Fedora 15 i686 (GNOME)

Post date: June 26, 2011, 09:06 Category: Desktop Views: 5021 Comments
Tutorial quote: This tutorial shows how you can set up a Fedora 15 desktop (GNOME) that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.
Fedora

The Perfect Desktop - Fedora 14 i686 (GNOME)

Post date: November 10, 2010, 15:11 Category: Desktop Views: 2790 Comments
Tutorial quote: This tutorial shows how you can set up a Fedora 14 desktop (GNOME) that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.
Fedora

The Perfect Desktop - Fedora 16 i686 (GNOME)

Post date: November 13, 2011, 10:11 Category: Desktop Views: 29815 Comments
Tutorial quote: This tutorial shows how you can set up a Fedora 16 desktop (GNOME) that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.
SuSe

How To Set Up A USB-Over-IP Server And Client With OpenSUSE 11.2

Post date: January 31, 2010, 12:01 Category: Miscellaneous Views: 6224 Comments
Tutorial quote: This tutorial shows how to set up a USB-over-IP server with OpenSUSE 11.2 as well as a USB-over-IP client (also running OpenSUSE 11.2). The USB/IP Project aims to develop a general USB device sharing system over IP network. To share USB devices between computers with their full functionality, USB/IP encapsulates "USB I/O messages" into TCP/IP payloads and transmits them between computers. USB-over-IP can be useful for virtual machines, for example, that don't have access to the host system's hardware - USB-over-IP allows virtual machines to use remote USB devices.
Debian

Creating Simple Virtual Hosts With mod_mysql_vhost On Lighttpd (Debian Etch)

Post date: August 7, 2008, 09:08 Category: Installing Views: 3559 Comments
Tutorial quote: This guide explains how you can use mod_mysql_vhost to create simple virtual hosts on a lighttpd web server on Debian Etch. With mod_mysql_vhost, lighttpd can read the vhost configuration from a MySQL database. Currently, you can store the domain and the document root in the MySQL database which results in very simple virtual hosts. If you need more directives for your vhosts, you would have to configure them in the global section of lighttpd.conf, which means they would be valid for all vhosts. Therefore, mod_mysql_vhost is ideal if your vhosts differ only in the domain and document root.
Ubuntu

How To Make An Ubuntu 11.04 Classic Desktop Resemble A Mac

Post date: July 10, 2011, 11:07 Category: Desktop Views: 4211 Comments
Tutorial quote: This article shows how you can change the appearance of your Ubuntu 11.04 desktop (with the Ubuntu Classic interface, i.e., GNOME instead of Unity) so that it resembles a Mac. This can be achieved with the help of Elementary, Docky, and Gloobus-Preview. Elementary is a project that provides a popular icon set and GTK theme; Docky is an interactive dock (like the one you know from a Mac) that provides easy access to some of the files, folders, and applications on your computer, and more; and Gloobus-Preview is an extension for the Gnome Desktop Environment designed to enable a full screen preview of any kind of file or directory.
Linux

Enhancing kernel security with grsecurity

Post date: November 25, 2005, 21:11 Category: Security Views: 3713 Comments
Tutorial quote: Is your server as secure as it could be? Sure, you use a firewall, mandate strong passwords, and patch regularly. You even take a proactive approach by performing security audits with tools such as nmap and Nessus. Yet you may still be vulnerable to zero-day exploits and privilege escalation attacks. If these possibilities keep you awake at night, you're not alone. The sleepless folks with the grsecurity project have developed an easy-to-use set of security enhancements to help put your fears to rest.
Mepis

The Perfect Desktop - Mepis 11

Post date: September 18, 2011, 10:09 Category: Desktop Views: 4721 Comments
Tutorial quote: This tutorial shows how you can set up a Mepis 11 desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge. Mepis is a Linux distribution based on Debian Stable.
Unix+clones

How to restore a hacked Linux server

Post date: July 30, 2006, 18:07 Category: Security Views: 4536 Comments
Tutorial quote: Every sysadmin will try its best to secure the system/s he is managing. Hopefully you never had to restore your own system from a compromise and you will not have to do this in the future. Working on several projects to restore a compromised Linux system for various clients, I have developed a set of rules that others might find useful in similar situations. The type of hacks encountered can be very variate and you might see very different ones than the one I will present, or I have seen live, but even so, this rules might be used as a starting point to develop your own recovery plan.
Web-based applications and online marketing solutions - LumoLink