Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for How to Perform System Boot and Shutdown Procedures for Solaris 10

Fedora

Installing The Open Source Ticket Request System (OTRS) On Fedora 8

Post date: March 18, 2008, 10:03 Category: Installing Views: 3246 Comments
Tutorial quote: This document describes how to set up the Open Ticket Request System (OTRS) on Fedora 8. Taken from the OTRS page: "OTRS is an Open source Ticket Request System (also well known as trouble ticket system) with many features to manage customer telephone calls and e-mails. The system is built to allow your support, sales, pre-sales, billing, internal IT, helpdesk, etc. department to react quickly to inbound inquiries."
CentOS

Installing OTRS 2.14 (Open source Ticket Request System) on CentOS 4.4

Post date: February 26, 2007, 17:02 Category: Installing Views: 7536 Comments
Tutorial quote: OTRS is a trouble ticket system with many features to manage customer telephone calls and e-mails. The system is built to allow your support, sales, pre-sales, billing, internal IT, helpdesk, etc. department to react quickly to inbound inquiries.
Linux

Lynis - Security and system auditing tool

Post date: March 4, 2008, 22:03 Category: Security Views: 3669 Comments
Tutorial quote: Lynis is an auditing tool which tests and gathers information from Unix based systems. The audience for this tool are security and system auditors, network specialists and system maintainers.
Unix+clones

How to restore a hacked Linux server

Post date: July 30, 2006, 18:07 Category: Security Views: 3692 Comments
Tutorial quote: Every sysadmin will try its best to secure the system/s he is managing. Hopefully you never had to restore your own system from a compromise and you will not have to do this in the future. Working on several projects to restore a compromised Linux system for various clients, I have developed a set of rules that others might find useful in similar situations. The type of hacks encountered can be very variate and you might see very different ones than the one I will present, or I have seen live, but even so, this rules might be used as a starting point to develop your own recovery plan.
Linux

Linux System Calls

Post date: April 12, 2005, 17:04 Category: Miscellaneous Views: 2317 Comments
Tutorial quote: Tutorial about Linux system call implementation and adding a new system call in Linux.
Unix+clones

How to scan your Linux-Distro for Root Kits

Post date: May 19, 2006, 18:05 Category: Security Views: 3176 Comments
Tutorial quote: Do you suspect that you have a compromised system ?
Check now for root kits that the intruder may have installed !!!

So... What in the hell is a root kit ???
A root kit is a collection of programs that intruders often install after they have compromised the root account of a system.
These programs will help the intruders clean up their tracks, as well as provide access back into the system.
Root kits will sometimes leave processes running so that the intruder can come back easily and without the system administrator's knowledge !

Solution....
Scripts like chkrootkit will do the job for you automatically.
Linux

Performance Tools for Optimizing Linux: Process-Specific CPU

Post date: June 1, 2005, 07:06 Category: Optimizing Views: 3132 Comments
Tutorial quote: The tools to analyze the performance of applications are varied and have existed in one form or another since the early days of UNIX. It is critical to understand how an application is interacting with the operating system, CPU, and memory system to understand its performance. This chapter will help you understand where the bottleneck in your system is occuring, and how to fix it.
CentOS

Mail Server Setup With Exim, MySQL, Cyrus-Imapd, Horde Webmail On Centos 5.1

Post date: February 21, 2008, 11:02 Category: Installing Views: 6697 Comments
Tutorial quote: This guide describes the installation and configuration of a mail system on Centos 5.1 with SELinux enabled for enhanced security. This system will be able to service HTTP, HTTPS, SMTP, TLS, SMTP-AUTH, IMAP, POP3 clients and is virtual enabled allowing more than one domain to be served from the system.
Mandriva

A Guide to Virtualization on Mandriva Linux 2007 Spring

Post date: May 14, 2007, 23:05 Category: System Views: 3408 Comments
Tutorial quote: Have you ever wished you had another computer handy? Maybe you want to try a new operating system out. Maybe you want to test something experimental without potentially breaking your own system. Maybe you need to run some software that only runs in a different operating system. Mandriva Linux 2007 Spring comes with a range of virtualization options that can help.
Linux

Step-By-Step Configuration of NAT with iptables

Post date: November 22, 2006, 18:11 Category: Network Views: 5615 Comments
Tutorial quote: This tutorial shows how to set up network-address-translation (NAT) on a Linux system with iptables rules so that the system can act as a gateway and provide internet access to multiple hosts on a local network using a single public IP address. This is achieved by rewriting the source and/or destination addresses of IP packets as they pass through the NAT system.
Web-based applications and online marketing solutions - LumoLink