Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Getting started with RHEL4's built-in LVM tools

Debian

Virtualization With KVM On A Debian Squeeze Server

Post date: March 13, 2011, 18:03 Category: Installing Views: 3151 Comments
Tutorial quote: This guide explains how you can install and use KVM for creating and running virtual machines on a Debian Squeeze server. I will show how to create image-based virtual machines and also virtual machines that use a logical volume (LVM). KVM is short for Kernel-based Virtual Machine and makes use of hardware virtualization, i.e., you need a CPU that supports hardware virtualization, e.g. Intel VT or AMD-V.
Linux

Building a Linux Cluster, Part 1

Post date: April 18, 2005, 03:04 Category: Network Views: 2405 Comments
Tutorial quote: Linux clusters have escaped. As the general popularity of the Linux operating system increases, more complex solutions built with it are becoming increasingly common in the "traditional" (more conservative) IT world. Linux computer clusters, whose provenance was originally universities and research institutions such as the U.S. National Laboratories, are showing up in increasing numbers as high-performance computing solutions within such areas as oil and gas exploration, computer-aided engineering, visualization, and software development. Linux clusters providing highly-available web, mail, and other infrastructure services are also increasingly common. If past computing history is any indicator of future trends, widespread use of Linux clusters in the mainstream IT world cannot be far behind.
Linux

Hardening Linux: a 10 step approach to a secure server

Post date: June 22, 2005, 10:06 Category: Security Views: 3527 Comments
Tutorial quote: The Internet has become a far more dangerous place than it was 20 years ago. Nowadays, Operating System and application security is an integral part of a server configuration and, while firewalls are very important, they are not the panacea.

This list of steps is intended as a guideline with a practical approach. We’ll try to provide a complete picture without getting into unnecesary details. This list won’t replace a good book on secure systems administration, but it will be useful as a quick guide.

Before we get started it’s worth to mention that security is not a status: it’s just a process. The correct initial setup of the server only provides a good start and helps you get half the way through. But you actually need to walk the other half of the road, by providing proper security vigilance, monitoring and updating.
Solaris

Solaris 10 Service Management

Post date: March 16, 2010, 12:03 Category: System Views: 9485 Comments
Tutorial quote: Under the Solaris 10 system or the open Solaris as well, the service management have been upgraded, and there are great new tools to handle the sysadmin work on the services.
Debian

ACL(Access Control List) Configuration

Post date: April 4, 2006, 20:04 Category: Installing Views: 3101 Comments
Tutorial quote: Access Control Lists (ACLs) provide a much more flexible way of specifying permissions on a file or other object than the standard Unix user/group/owner system. Windows NT and above, when running on an NTFS partition, use ACLs to specify permissions on files and directories. This document attempts to show how you can enable ACL support on your Linux box and use Samba to provide an SMB file server for use by machines in a Windows 2000 domain.

ACLs are best stored in the actual file system itself. To that end, there are patches available for ext2 and ext3 that enable ACL support using Extended Attributes (EAs). SGI's XFS also has ACL support built in, but XFS is not currently covered in this document.
Ubuntu

Virtual Users And Domains With Postfix, Courier And MySQL (Ubuntu 7.10)

Post date: November 25, 2007, 10:11 Category: Installing Views: 3037 Comments
Tutorial quote: This document describes how to install a Postfix mail server that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I will also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses. The resulting Postfix server is capable of SMTP-AUTH and TLS and quota (quota is not built into Postfix by default, I will show how to patch your Postfix appropriately). Passwords are stored in encrypted form in the database (most documents I found were dealing with plain text passwords which is a security risk). In addition to that, this tutorial covers the installation of Amavisd, SpamAssassin and ClamAV so that emails will be scanned for spam and viruses.
Fedora

Virtual Users And Domains With Postfix, Courier And MySQL (Fedora 8)

Post date: November 20, 2007, 10:11 Category: Installing Views: 3344 Comments
Tutorial quote: This document describes how to install a Postfix mail server that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I will also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses. The resulting Postfix server is capable of SMTP-AUTH and TLS and quota (quota is not built into Postfix by default, I will show how to patch your Postfix appropriately). Passwords are stored in encrypted form in the database (most documents I found were dealing with plain text passwords which is a security risk). In addition to that, this tutorial covers the installation of Amavisd, SpamAssassin and ClamAV so that emails will be scanned for spam and viruses.
CentOS

Virtual Users And Domains With Postfix, Courier And MySQL (CentOS 5.1)

Post date: December 11, 2007, 09:12 Category: Installing Views: 3968 Comments
Tutorial quote: This document describes how to install a Postfix mail server that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I will also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses. The resulting Postfix server is capable of SMTP-AUTH and TLS and quota (quota is not built into Postfix by default, I will show how to patch your Postfix appropriately). Passwords are stored in encrypted form in the database (most documents I found were dealing with plain text passwords which is a security risk). In addition to that, this tutorial covers the installation of Amavisd, SpamAssassin and ClamAV so that emails will be scanned for spam and viruses.
Mandriva

Virtual Users And Domains With Postfix, Courier And MySQL (Mandriva 2008.0)

Post date: January 15, 2008, 10:01 Category: Installing Views: 3099 Comments
Tutorial quote: This document describes how to install a Postfix mail server that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I will also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses. The resulting Postfix server is capable of SMTP-AUTH and TLS and quota (quota is not built into Postfix by default, I will show how to patch your Postfix appropriately). Passwords are stored in encrypted form in the database (most documents I found were dealing with plain text passwords which is a security risk). In addition to that, this tutorial covers the installation of Amavisd, SpamAssassin and ClamAV so that emails will be scanned for spam and viruses.
Debian

Installation Of PlaySMS And SMS Server Tools 3 On Debian Server

Post date: February 24, 2011, 12:02 Category: Installing Views: 3651 Comments
Tutorial quote: This tutorial will show you how you can set up an SMS server on Debian with playsms and smstools. In my example I have used an old Nokia 5140i with a USB datacable.
Web-based applications and online marketing solutions - LumoLink