Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Enhanced Logging With rsyslog On Debian Etch And phpLogcon For Viewing

Debian

Securing Debian Manual

Post date: January 1, 2008, 13:01 Category: Security Views: 4053 Comments
Tutorial quote: This document describes security in the Debian project and in the Debian operating system. Starting with the process of securing and hardening the default Debian GNU/Linux distribution installation, it also covers some of the common tasks to set up a secure network environment using Debian GNU/Linux, gives additional information on the security tools available and talks about how security is enforced in Debian by the security and audit team.
Debian

Intrusion Detection For PHP Applications With PHPIDS

Post date: June 24, 2008, 14:06 Category: Security Views: 5006 Comments
Tutorial quote: This tutorial explains how to set up PHPIDS on a web server with Apache2 and PHP5. PHPIDS (PHP-Intrusion Detection System) is a simple to use, well structured, fast and state-of-the-art security layer for your PHP based web application. The IDS neither strips, sanitizes nor filters any malicious input, it simply recognizes when an attacker tries to break your site and reacts in exactly the way you want it to. Based on a set of approved and heavily tested filter rules any attack is given a numerical impact rating which makes it easy to decide what kind of action should follow the hacking attempt. This could range from simple logging to sending out an emergency mail to the development team, displaying a warning message for the attacker or even ending the userís session.
Unix+clones

Installing and securing Squid

Post date: March 13, 2006, 15:03 Category: Software Views: 5266 Comments
Tutorial quote: Squid is a high-performance proxy caching server for web clients, supporting FTP, gopher, and HTTP data objects. Unlike traditional caching software, Squid handles all requests in a single, non-blocking, I/O-driven process. Squid keeps meta data and especially hot objects cached in RAM, caches DNS lookups, supports non-blocking DNS lookups, and implements negative caching of failed requests. Squid supports SSL, extensive access controls, and full request logging. By using the lightweight Internet Cache Protocol, Squid caches can be arranged in a hierarchy or mesh for additional bandwidth savings.

After the installation and base configuration of squid we will add another layer of security by chrooting it.
Linux

Setting up a serial console

Post date: February 19, 2007, 19:02 Category: Miscellaneous Views: 3917 Comments
Tutorial quote: This tutorial will show you how to set up a serial console on a Linux system, and connect to it via a null modem cable. This is quite useful if your Linux server is in a headless configuration (no keyboard or monitor), as it allows you to easily get a console on the system if there are any problems with it (especially network problems, when SSH is not available). In the end, the GRUB menu will appear over the serial link, as will the bootup messages (output when booting the system). I am using Debian Etch on the server and Ubuntu Edgy on my client, although this should work on any Linux distribution.
Linux

Sawing Linux Logs with Simple Tools

Post date: April 14, 2005, 12:04 Category: Security Views: 3091 Comments
Tutorial quote: So there you are with all of your Linux servers humming along happily. You have tested, tweaked, and configured until they are performing at their peak of perfection. Users are hardly whining at all. Life is good. You may relax and indulge in some nice, relaxing rounds of TuxKart. After all, you earned it.

Except for one little remaining chore: monitoring your log files. [insert horrible alarming music of your choice here.] You're conscientious, so you know you can't just ignore the logs until there's a problem, especially for public services like Web and mail. Somewhere up in the pointy-haired suites, they may even be plotting to require you to track and analyze all sorts of server statistics.

Not to worry, for there are many ways to implement data reduction, which is what log parsing is all about. You want to slice and dice your logs to present only the data you're interested in viewing. Unless you wish to devote your entire life to manually analyzing log files. Even if you only pay attention to logfiles when you're debugging a problem, having some tools to weed out the noise is helpful.
Debian

Rescuing systems using the Debian snapshot server

Post date: September 18, 2006, 14:09 Category: System Views: 5627 Comments
Tutorial quote: One of the unofficial Debian project resources which doesn't get the attention it deserves is the Debian Snapshot site. The site contains a mirror of old Debian packages, which can be very useful for system recovery.

In most normal cases you won't ever need to use it, unless you're wanting to compare two different package versions to see changes, or do other non-standard things. However when you do need to use it you'll learn what a big lifesaver it is!

The biggest use for the site, for me, has been for recovering from broken package updates. Whilst these are rare in the Debian Stable and Testing releases they can be an issue when running Debian unstable.
Linux

How To Set Up VMware Tools On Various Linux Distributions

Post date: October 2, 2007, 07:10 Category: Miscellaneous Views: 8509 Comments
Tutorial quote: This document explains how to set up the VMware Tools in the following guest operating systems: Ubuntu 7.04, Fedora 7, PCLinuxOS 2007 and Debian Etch. Installing VMware Tools in your guest operating systems will help maximize performance, provide mouse synchronization and copy & paste functionality. This article also shows a way of making VMware Tools start automatically when you start a guest operating system.
Ubuntu

Create a LAN for Virtual Servers with KVM and VDE

Post date: November 11, 2008, 19:11 Category: System Views: 4127 Comments
Tutorial quote: You have one host [ hoster ] running KVM on UBUNTU with 1 network interface accessing to internet.You want to have 2 debian etch virtual servers [ guest ] ( debian01 and debian02 ) running on your hoster with network access between them and hoster in a local LAN. In this case virtual servers will not be able to access to internet, but later I will explain how to do it.
Debian

Virtual Users And Domains With Postfix, Courier And MySQL (Debian Etch)

Post date: June 5, 2007, 23:06 Category: Installing Views: 3217 Comments
Tutorial quote: This document describes how to install a Postfix mail server that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I will also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses.
Debian

Setting Up Master-Master Replication With MySQL 5 On Debian Etch

Post date: October 25, 2007, 11:10 Category: Miscellaneous Views: 3500 Comments
Tutorial quote: Since version 5, MySQL comes with built-in support for master-master replication, solving the problem that can happen with self-generated keys. In former MySQL versions, the problem with master-master replication was that conflicts arose immediately if node A and node B both inserted an auto-incrementing key on the same table. The advantages of master-master replication over the traditional master-slave replication are that you do not have to modify your applications to make write accesses only to the master, and that it is easier to provide high-availability because if the master fails, you still have the other master.
Web-based applications and online marketing solutions - LumoLink