Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for How To Search For Missing Packages With apt-file On Debian and Ubuntu

Debian

Managing Xen With Xen-Tools, Xen-Shell, And Argo

Post date: November 5, 2006, 21:11 Category: System Views: 4281 Comments
Tutorial quote: This guide describes how to install and use xen-tools, xen-shell, and Argo on a Debian system. All three packages provide useful tools for the administration of virtual Xen machines. Xen-tools is a collection of Perl scripts that allow you to easily create, update, and delete Xen guest domains. The xen-shell provides a command-line interface to owners of Xen domains so that they can manage their Xen domains without the help of the server administrator. And with Argo, you can control Xen domains through a web interface or through a menu on the command line.
OpenSUSE

PyTube - Download,Edit,Convert videos from video sharing websites

Post date: August 17, 2008, 14:08 Category: Multimedia Views: 4362 Comments
Tutorial quote: PyTube is a GUI tool to download videos online from Video-sharing websites like Youtube, Google videos. Not only can it download files, PyTube can search for videos and help you to convert the videos to your format of choice. Also, can manipulate videos like Apply Audio into Video, Merge videos, resize videos, create ringtones to your mobilephone, rotate videos etc.
Fedora+Core

Enhancing Apache with mod_security

Post date: April 12, 2005, 18:04 Category: Security Views: 2779 Comments
Tutorial quote: Like probably quite a few of you, I run and admin some websites (some for fun, some for work), and as many of you surely do, some of these websites are mounted on a CMS. CMS are not the 8th wonder of the world, however some of them are pretty good, and they save you a lot of time by automating tons of tasks... however, as in every piece of code there exists, all of them are insecure and buggy (in fact, every piece of software is insecure and buggy to a degree)

So, searching for tools and ways to prevent people from breaking into my site without authorization, I began my search and found a great piece of software: mod_security for Apache.
Linux

NFS over CIPE-VPN tunnels

Post date: May 23, 2005, 16:05 Category: Network Views: 2867 Comments
Tutorial quote: The Network File System (NFS) is a standard protocol for sharing file services with Linux and Unix computers. It is a distributed file system that enables local access to remote disks and file systems and is based on the client\server architecture. Although easy to configure, it is typically used only to transfer data over an intranet or LAN because of its transparency and security potholes when exposed to the risks of the Internet. However, it still can be employed -- without compromising security -- to share files over the Internet by configuring it to run on a Virtual Private Network (VPN) connection. This article will show you how to set up NFS to run over a CIPE-VPN connection between two Linux systems.
Linux+Mint

The Perfect Desktop - Linux Mint Debian 201009

Post date: November 4, 2010, 12:11 Category: Desktop Views: 3405 Comments
Tutorial quote: This tutorial shows how you can set up a Linux Mint Debian 201009 desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge. While the "normal" Linux Mint editions are based on Ubuntu, Linux Mint Debian 201009 is a Linux distribution based on Debian Squeeze (testing); its aim is to look identical to the main edition and to provide the same functionality while using Debian as a base.
PC-BSD

Creating PC-BSD Packages (.pbi's)

Post date: September 1, 2005, 02:09 Category: Software Views: 5902 Comments
Tutorial quote: I've found a neat, clean and fast way of creating PBI's that works 100%. and im writing this HOW-TO to explain it.
Debian

Recovering from file system corruption using TestDisk

Post date: August 12, 2006, 18:08 Category: System Views: 2837 Comments
Tutorial quote: We've all been there. We press the wrong key, we do some silly mistake, and suddenly, one or more of our file systems refuse to work. Whenever this happens, the first thing we hear is "You should have made a backup", the dreaded sentence that we'll never listen to. Let's face it, we're stupid, and we don't backup.
Debian

Cruising with the snavigator

Post date: May 24, 2005, 18:05 Category: Programming Views: 2889 Comments
Tutorial quote: This article presents the snavigator, a powerful code analysis, cross-referencing and re-engineering tool which is indispensable for tackling the complexity of maintaining larger pieces of software and packages in an effective manner.
SuSe

How to set up smart package manager on SUSE LINUX 10.0

Post date: October 30, 2005, 00:10 Category: System Views: 3623 Comments
Tutorial quote: Quote from the tutorial: The advantage of smartpm is, that, besides the ability to use mirrors it is able to use different repository structures. So I was able to use the apt-repository structure which provides more channels then the actual yum structure [...], and so I was able to build up a package management with update channels which is capable of using and choosing mirrors in a similar way as yum is.
Debian

Using the 'snort' Intrusion Detection System

Post date: December 27, 2005, 15:12 Category: Security Views: 4728 Comments
Tutorial quote: Snort is the leading open source Network Intrusion Detection System and is a valuable addition to the security framework at any site. Even if you are employing lots of preventative measures, such as firewalling, patching, etc., a detection system can give you an assurance that your defences truly are effective, or if not, will give you valuable information about what you need to improve.

Fortunately, there is a good set of snort packages for Debian which takes a lot of the tedious work out of building a useful Network Intrusion Detection System. Before we start on installation, we should review a few details about the networking satack that you're going to need to make sense of the alerts snort will generate. Impatient readers and those who are familiar with the TCP/IP suite of protocols may do now skip to the bit that says Stand alone snort.
Web-based applications and online marketing solutions - LumoLink