Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Ensuring network interfaces remain named consistently

Unix+clones

Streaming music with SlimServer

Post date: June 15, 2005, 16:06 Category: Network Views: 4242 Comments
Tutorial quote: Converting your CD collection into MP3 or another digital file format gives you the ability to enjoy the music on your computer and stream it all over the house and the Internet. To do the latter, however, you have to install and configure a streaming server on your computer. That might sound like a daunting task, but there is a streaming server application that makes the whole process pretty painless. SlimServer from Slim Devices is a cross-platform streaming server that runs on Windows, Linux, and Mac OS X and supports a wide range of formats, including AAC, AIFF, FLAC, Ogg Vorbis, MP3, WAV, and WMA. Although it was developed to stream music files to Slim Devices' Squeezebox2 hardware player, it works perfectly with any software MP3 player capable of working with network streams.
Debian

Striping Across Four Storage Nodes With GlusterFS On Debian Lenny

Post date: July 12, 2009, 10:07 Category: Installing Views: 4042 Comments
Tutorial quote: This tutorial shows how to do data striping (segmentation of logically sequential data, such as a single file, so that segments can be assigned to multiple physical devices in a round-robin fashion and thus written concurrently) across four single storage servers (running Debian Lenny) with GlusterFS. The client system (Debian Lenny as well) will be able to access the storage as if it was a local filesystem. GlusterFS is a clustered file-system capable of scaling to several peta-bytes. It aggregates various storage bricks over Infiniband RDMA or TCP/IP interconnect into one large parallel network file system. Storage bricks can be made of any commodity hardware such as x86-64 servers with SATA-II RAID and Infiniband HBA.
Linux

Change Ctrl + Alt + Delete Behavior To Open System Monitor, in Linux

Post date: September 24, 2009, 12:09 Category: Miscellaneous Views: 2973 Comments
Tutorial quote: Actually, I've written this post before (quite a few months ago) but then deleted it because it didn't work. In the mean time, I found out why, so I decided to post it again. I find pressing Control + Alt + Delete to open up System Monitor to be very useful, especially for Windows users who are used to it and may actually press this quite a few times before realizing it doesn't do anything or what it does in Windows. Using System Monitor, you can preview all running processes, end or kill them, see how much CPU a process is using, CPU + memory + network history, available disk space and even change how much CPU a process should use.

There are 2 ways of changing Ctrl + Alt + Delete behavior to open System Monitor: one if you are running Compiz, and one for Metacity, only to use if you are not running Compiz.
Linux

Connecting to a Wireless LAN with Linux, Part 2

Post date: April 13, 2005, 19:04 Category: Hardware Views: 4528 Comments
Tutorial quote: In Part 1 we reviewed hardware options, which wireless utilities should be present, how to use Windows drivers, and how to be open to connect to any available wireless access point. Today we'll cover configurations on Red Hat- and Debian-type systems, basic security, and hardware discovery.

Wireless connectivity can be rather overly friendly, allowing connections from anyone. This howto assumes you have a wireless access point on a LAN, which can be all wireless or mixed wired and wireless. You don't want it wide open to just any random person with a desire to snoop on your network or "borrow" your bandwidth, but you want some access controls and security. Your access point should have a unique SSID (service set identifier), WEP (wireless equivalent privacy) or WPA/WPA2 (Wi-fi protected access) set up and working, and either a DHCP server or a pool of assigned IP addresses for clients.
Debian

Setting Up A PXE Install Server For Multiple Linux Distributions On Debian Lenny

Post date: May 26, 2009, 10:05 Category: Miscellaneous Views: 8118 Comments
Tutorial quote: This tutorial shows how to set up a PXE (short for preboot execution environment) install server on Debian Lenny. A PXE install server allows your client computers to boot and install a Linux distribution over the network, without the need of burning Linux iso images onto a CD/DVD, boot floppy images, etc. This is handy if your client computers don't have CD or floppy drives, or if you want to set up multiple computers at the same time (e.g. in a large enterprise), or simply because you want to save the money for the CDs/DVDs. In this article I show how to configure a PXE server that allows you to boot multiple distributions (i386 and x86_64): Debian Lenny, Ubuntu 9.04, Fedora 10, CentOS 5.3, OpenSuSE 11.1, and Mandriva 2009.1.
Linux

Creating a safe directory with PAM and Encfs

Post date: June 7, 2006, 20:06 Category: Security Views: 4226 Comments
Tutorial quote: Now, in my network (and others) the credentials provided at login could (and should) be used by those programs. How can you retrieve these credentials, providing enough security?
With a the PAM modules pam_script it's possible to store the password in a file, which will be used by fusemb and mount.cifs to read the password from.

To achieve security, one could make the user logging in owner and deny read/write for anybody else. Remove this file when the user ends his/her session.
This is enough, for runtime. But I was wondering, but what if the system crashes, and the file with the credentials remains on the harddrive? Anybody who is able to mount this harddrive with for example a lifecd, can read this file!

That's why I was looking for a way to encrypt this file.

With encfs this is very possible! At run time it gives an interface to encrypted files and directories, which does only exist at runtime! When the system is not running, there are only encrypted files, useless when you do not know the key to it. And this key is exactly the (encrypted) password! That's why I've chosen for a combination of PAM and Encfs.
Unix+clones

Making Web Browsing Easy For The Tiny Screen

Post date: August 9, 2005, 19:08 Category: Network Views: 3643 Comments
Tutorial quote: An avalanche of content will soon appear in the palm of your hand.

Tiny screens are showing up everywhere in PDAs and cell phones. Many are equipped with some form of network device and a browser, so it's not hard to see what's coming down the pike.

Late model PDAs, like my HP iPAQ 3715 no longer suffer from insufficient computing power, lack of memory or having to rely on pricey external 802.11b cards. The little machine is quick to boot up and can handle many daily business functions.

Even though it runs a version of Internet Explorer, jumping onto an access point and browsing web pages is fast and useful.

In this edition, I'll share my observations on things you might consider when converting LAMP (Linux, Apache, MySQL, PHP) applications or web pages, for use on the tiny screen. I'll approach the issues from an iPAQ user perspective and focus on convenience and making the user's life easy.
Ubuntu

Setting Up A PXE Install Server For Multiple Linux Distributions With Ubuntu Edgy Eft

Post date: December 20, 2006, 01:12 Category: Installing Views: 4854 Comments
Tutorial quote: This tutorial shows how to set up a PXE (short for preboot execution environment) install server with Ubuntu 6.10 (Edgy Eft). A PXE install server allows your client computers to boot and install a Linux distribution over the network, without the need of burning Linux iso images onto a CD/DVD, boot floppy images, etc. This is handy if your client computers don't have CD or floppy drives, or if you want to set up multiple computers at the same time (e.g. in a large enterprise), or simply because you want to save the money for the CDs/DVDs. In this article I show how to configure a PXE server that allows you to boot multiple distributions: Ubuntu Edgy/Dapper, Debian Etch/Sarge, Fedora Core 6, CentOS 4.4, OpenSuSE 10.2, and Mandriva 2007.
Linux

Upstream Provider Woes? Point the Ping of Blame

Post date: April 14, 2005, 12:04 Category: Network Views: 3145 Comments
Tutorial quote: Your users are complaining that "the Internet is, like, all slow." Users are always complaining, but you're seeing a lot of timeouts when you check mail, surf the Web, or try to log in for remote administration. Or even worse, latency is so bad that you keep getting killed all to heck in your favorite gory violent online multi-player game, so you know there is a problem. But there a lot of potential bottlenecks between your PC and the outside world, like your Internet gateway, proxy server, firewall, Internet service provider, and so forth, so where do you begin?

One of the best and most versatile network tools you can have is a notebook PC running Linux. This lets you plug in anywhere to run tests and find out what is going on. Make it a nothing-to-lose box--don't keep data on it so you can wipe and reinstall the operating system as necessary, because you want to be able to run tests outside of firewalls. Don't run any services. You can put a minimal iptables firewall on it, as there is no point in being totally exposed, but keep it simple. (Use MondoRescue to make a system snapshot for fast restores.)
SuSe

User-Mode Linux

Post date: December 8, 2005, 13:12 Category: Software Views: 4652 Comments
Tutorial quote: One of the largest efforts involved with software engineering is testing the software to make sure that it works as designed. Testing can require several different types of system configurations and could require multiple instances of Linux. One way to create this type of environment is to use a virtual machine.

User-Mode Linux (UML) is a fully functional Linux kernel. It runs its own scheduler and virtual memory (VM) system, relying on the host kernel for hardware support. It includes virtual block, network, and serial devices to provide an environment that is almost as full-featured as a hardware-based machine. UML cannot destroy the host machine. Furthermore, the UML block devices, also called disks, can be files on the native Linux file system, so you cannot affect the native block devices. This is very useful when you're testing and debugging block operations.
Web-based applications and online marketing solutions - LumoLink