Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for How To Monitor A System With Sysstat On Centos 4.3

CentOS

Virtual Users And Domains With Postfix, Courier And MySQL (CentOS 5.1)

Post date: December 11, 2007, 09:12 Category: Installing Views: 4789 Comments
Tutorial quote: This document describes how to install a Postfix mail server that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I will also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses. The resulting Postfix server is capable of SMTP-AUTH and TLS and quota (quota is not built into Postfix by default, I will show how to patch your Postfix appropriately). Passwords are stored in encrypted form in the database (most documents I found were dealing with plain text passwords which is a security risk). In addition to that, this tutorial covers the installation of Amavisd, SpamAssassin and ClamAV so that emails will be scanned for spam and viruses.
Debian

Setting Up A PXE Install Server For Multiple Linux Distributions On Debian Lenny

Post date: May 26, 2009, 10:05 Category: Miscellaneous Views: 8118 Comments
Tutorial quote: This tutorial shows how to set up a PXE (short for preboot execution environment) install server on Debian Lenny. A PXE install server allows your client computers to boot and install a Linux distribution over the network, without the need of burning Linux iso images onto a CD/DVD, boot floppy images, etc. This is handy if your client computers don't have CD or floppy drives, or if you want to set up multiple computers at the same time (e.g. in a large enterprise), or simply because you want to save the money for the CDs/DVDs. In this article I show how to configure a PXE server that allows you to boot multiple distributions (i386 and x86_64): Debian Lenny, Ubuntu 9.04, Fedora 10, CentOS 5.3, OpenSuSE 11.1, and Mandriva 2009.1.
Ubuntu

Setting Up A PXE Install Server For Multiple Linux Distributions With Ubuntu Edgy Eft

Post date: December 20, 2006, 01:12 Category: Installing Views: 4854 Comments
Tutorial quote: This tutorial shows how to set up a PXE (short for preboot execution environment) install server with Ubuntu 6.10 (Edgy Eft). A PXE install server allows your client computers to boot and install a Linux distribution over the network, without the need of burning Linux iso images onto a CD/DVD, boot floppy images, etc. This is handy if your client computers don't have CD or floppy drives, or if you want to set up multiple computers at the same time (e.g. in a large enterprise), or simply because you want to save the money for the CDs/DVDs. In this article I show how to configure a PXE server that allows you to boot multiple distributions: Ubuntu Edgy/Dapper, Debian Etch/Sarge, Fedora Core 6, CentOS 4.4, OpenSuSE 10.2, and Mandriva 2007.
FreeBSD

Building a FreeBSD Build System

Post date: April 15, 2006, 00:04 Category: System Views: 4461 Comments
Tutorial quote: When you finish this article, you will have an unbeatable update system. Even mergemaster will work faster. You will have an update system in which a machine update/upgrade will take less than 10 minutes.
Fedora

Installing The Open Source Ticket Request System (OTRS) On Fedora 8

Post date: March 18, 2008, 10:03 Category: Installing Views: 4281 Comments
Tutorial quote: This document describes how to set up the Open Ticket Request System (OTRS) on Fedora 8. Taken from the OTRS page: "OTRS is an Open source Ticket Request System (also well known as trouble ticket system) with many features to manage customer telephone calls and e-mails. The system is built to allow your support, sales, pre-sales, billing, internal IT, helpdesk, etc. department to react quickly to inbound inquiries."
Linux

Lynis - Security and system auditing tool

Post date: March 4, 2008, 22:03 Category: Security Views: 4588 Comments
Tutorial quote: Lynis is an auditing tool which tests and gathers information from Unix based systems. The audience for this tool are security and system auditors, network specialists and system maintainers.
Unix+clones

How to restore a hacked Linux server

Post date: July 30, 2006, 18:07 Category: Security Views: 4595 Comments
Tutorial quote: Every sysadmin will try its best to secure the system/s he is managing. Hopefully you never had to restore your own system from a compromise and you will not have to do this in the future. Working on several projects to restore a compromised Linux system for various clients, I have developed a set of rules that others might find useful in similar situations. The type of hacks encountered can be very variate and you might see very different ones than the one I will present, or I have seen live, but even so, this rules might be used as a starting point to develop your own recovery plan.
Ubuntu

How To Set Up Software RAID1 On A Running System (Ubuntu 10.04)

Post date: July 6, 2010, 11:07 Category: Installing Views: 3433 Comments
Tutorial quote: This guide explains how to set up software RAID1 on an already running Ubuntu 10.04 system. The GRUB2 bootloader will be configured in such a way that the system will still be able to boot if one of the hard drives fails (no matter which one).
Linux

Linux System Calls

Post date: April 12, 2005, 17:04 Category: Miscellaneous Views: 3087 Comments
Tutorial quote: Tutorial about Linux system call implementation and adding a new system call in Linux.
Unix+clones

How to scan your Linux-Distro for Root Kits

Post date: May 19, 2006, 18:05 Category: Security Views: 3993 Comments
Tutorial quote: Do you suspect that you have a compromised system ?
Check now for root kits that the intruder may have installed !!!

So... What in the hell is a root kit ???
A root kit is a collection of programs that intruders often install after they have compromised the root account of a system.
These programs will help the intruders clean up their tracks, as well as provide access back into the system.
Root kits will sometimes leave processes running so that the intruder can come back easily and without the system administrator's knowledge !

Solution....
Scripts like chkrootkit will do the job for you automatically.
Web-based applications and online marketing solutions - LumoLink