Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Enterprise Volume Management System Mini How-To

OpenSUSE

TrueCrypt - Free opensource on the fly Disk Encryption tool

Post date: August 7, 2008, 22:08 Category: Security Views: 3371 Comments
Tutorial quote: TrueCrypt is a free opensource software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc).
Unix+clones

A Tutorial Introduction to The arch Revision Control System

Post date: November 27, 2005, 22:11 Category: Software Views: 2796 Comments
Tutorial quote: arch is a revision control, source code management, and configuration management tool.

This manual is an arch tutorial: its purpose is to help you get started using arch for the first time, and then learn some of the more advanced features of arch.
Debian

Protect Your Files With TrueCrypt 5.1a On Debian Etch (GNOME)

Post date: May 13, 2008, 10:05 Category: Desktop Views: 3207 Comments
Tutorial quote: This document describes how to set up TrueCrypt 5.1a on Debian Etch (GNOME). Taken from the TrueCrypt page: "TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc)."
RedHat

NIST Publically-Released Red Hat Enterprise Linux Benchmark

Post date: October 21, 2006, 04:10 Category: Benchmarks Views: 6635 Comments
Tutorial quote: The Benchmark is a compilation of security configuration actions and settings that "harden" Red Hat Linux operating systems. It is a CIS Level-I benchmark: the prudent level of minimum due care for operating system security. This benchmark was developed and tested on Red Hat Enterprise Linux (RHEL) including RHEL 2.1, RHEL 3.0, and Fedora Core 1, 2, & 3. It is likely to work for other Linux distributions - especially Red Hat and Fedora derivatives - as well.
Ubuntu

How to Create a Private Encrypted Folder On Ubuntu 8.10

Post date: March 5, 2009, 08:03 Category: System Views: 3940 Comments
Tutorial quote: eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem for Linux.It provides advanced key management and policy features. eCryptfs stores cryptographic metadata in the header of each file written, so that encrypted files can be copied between hosts; the
file will be decryptable with the proper key, and there is no need to keep track of any additional information aside from what is already in the encrypted file itself. Think of
eCryptfs as a sort of “gnupgfs”.eCryptfs is a native Linux filesystem. The kernel module component of eCryptfs is part of the Linux kernel since 2.6.19.
Ubuntu

How to Create a Private Encrypted Folder On Ubuntu 8.10 (Intrepid)

Post date: January 13, 2009, 13:01 Category: System Views: 4114 Comments
Tutorial quote: eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem for Linux.It provides advanced key management and policy features. eCryptfs stores cryptographic metadata in the header of each file written, so that encrypted files can be copied between hosts; the file will be decryptable with the proper key, and there is no need to keep track of any additional information aside from what is already in the encrypted file itself. Think of eCryptfs as a sort of “gnupgfs”.eCryptfs is a native Linux filesystem. The kernel module component of eCryptfs is part of the Linux kernel since 2.6.19.

Ubuntu

Network Management And Monitoring With Hyperic HQ On Ubuntu 7.04

Post date: August 26, 2007, 23:08 Category: Network Views: 3987 Comments
Tutorial quote: This document describes how to set up Hyperic HQ on Ubuntu 7.04. The resulting system provides an awesome, web-based "Systems-Management-Software". It is the next stage of classical monitoring and able to manage all kinds of operating systems, web servers, application servers and database servers.
SuSe

gDesklets - Desklets for your Desktop in openSUSE

Post date: August 3, 2008, 13:08 Category: Desktop Views: 5973 Comments
Tutorial quote: gDesklets is another great tool like Google Gadgets for bringing mini programs called desklets such as weather forecasts, news tickers, system information displays, or music player controls, onto your desktop, where they are sitting there in a symbiotic relationship of eye candy and usefulness. The possibilities are really endless and they are always there to serve you whenever you need them, just one key-press away. The system is not restricted to one desktop environment, but currently works on most of the modern Unix desktops (including GNOME, KDE, Xfce).
Debian

Xen Cluster Management With Ganeti On Debian Etch

Post date: September 16, 2007, 21:09 Category: Miscellaneous Views: 3167 Comments
Tutorial quote: Ganeti is a cluster virtualization management system based on Xen. In this tutorial I will explain how to create one virtual Xen machine (called an instance) on a cluster of two physical nodes, and how to manage and failover this instance between the two physical nodes.
Debian

Xen Cluster Management With Ganeti On Debian Lenny

Post date: March 3, 2009, 12:03 Category: Installing Views: 3885 Comments
Tutorial quote: Ganeti is a cluster virtualization management system based on Xen. In this tutorial I will explain how to create one virtual Xen machine (called an instance) on a cluster of two physical nodes, and how to manage and failover this instance between the two physical nodes.
Web-based applications and online marketing solutions - LumoLink