Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Firebird database Configuration

Debian

Ethernet Bonding Configuration in Debian

Post date: April 24, 2006, 19:04 Category: Network Views: 4519 Comments
Tutorial quote: Ethernet bonding refers to aggregating multiple ethernet channels together to form a single channel. This is primarily used for redundancy in ethernet paths or for load balancing. This page refers in particular to performing ethernet bonding under linux, and so does not limit itself to discussion of 802.3ad Trunk Aggregation.
Debian

eBox Installation and Configuration

Post date: June 12, 2006, 22:06 Category: Software Views: 4070 Comments
Tutorial quote: eBox management tool will effectively and easily help you managing the advanced services for your corporate network. eBox is a framework for the development and deployment of network services in small and medium-sized networks, offering a simplified graphical interface to non expert users. It can be set up as a gateway, having some extra features over a usual router.

Debian

Mailman with Postfix Configuration

Post date: April 10, 2006, 18:04 Category: Software Views: 3062 Comments
Tutorial quote: Mailman is free software for managing electronic mail discussion and e-newsletter lists. Mailman is integrated with the web, making it easy for users to manage their accounts and for list owners to administer their lists. Mailman supports built-in archiving, automatic bounce processing, content filtering, digest delivery, spam filters, and more.
Linux

How To Utilize Your New Multimedia Keyboard Under Linux

Post date: April 28, 2007, 22:04 Category: Desktop Views: 3645 Comments
Tutorial quote: Xbindkeys is a program that allows you to launch shell commands with your keyboard or your mouse under X Window. It links commands to keys or mouse buttons, using its configuration file. It does not depend on the window manager and can capture all keyboard keys.
Solaris

NSA Publically-Released Solaris 9 Security Guide

Post date: October 21, 2006, 04:10 Category: Security Views: 7595 Comments
Tutorial quote: Sun Solaris 9 Guides
NSA has developed and distributed configuration guidance for Sun Solaris 9 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.

Solaris

NSA Publically-Released Solaris 8 Security Guide

Post date: October 21, 2006, 04:10 Category: Security Views: 7056 Comments
Tutorial quote: Sun Solaris 8 Guides
NSA has developed and distributed configuration guidance for Sun Solaris 8 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.

Debian

Installing Debian onto USB flash media with everything encrypted

Post date: September 28, 2005, 16:09 Category: Security Views: 8095 Comments
Tutorial quote: This is a simple procedure for installing Debian GNU/Linux onto a USB key flash media. It includes several configuration changes but tries to stay as close to a default debian install as possible.

This is useful for administrators that need to carry sensitive information or people concerned about their privacy.
Debian

Easy SNMP Server and Client Configuration Steps

Post date: August 2, 2006, 18:08 Category: Network Views: 4309 Comments
Tutorial quote: Simple Network Management Protocol (SNMP) is a widely used protocol for monitoring the health and welfare of network equipment (eg. routers), computer equipment and even devices like UPSs. Net-SNMP is a suite of applications used to implement SNMP v1, SNMP v2c and SNMP v3 using both IPv4 and IPv6.
Linux

Step-by-Step IPP based Print Server using CUPS

Post date: November 29, 2006, 18:11 Category: Miscellaneous Views: 6438 Comments
Tutorial quote: This tutorial describes how to install a Linux print server with CUPS. It also covers the installation and configuration of printer drivers on the print server as well as the printer setup on a Windows 2000 client.
Gentoo

Using extended attributes to better protect files

Post date: August 18, 2005, 18:08 Category: System Views: 12791 Comments
Tutorial quote: How many times have you accidentally overwritten a configuration file during an etc-update that you had customized? I had been aware of extended attributes for a long while now, but I had never taken the time to actually use them. The extended attribute that I am mostly interested with is the immutable attribute. This attribute, which can only be set by root, prevents a file from be changed or deleted, even by root.
Web-based applications and online marketing solutions - LumoLink