Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for How to set up VoIP calls in your Cybercafé with Xorcom Rapid, Asterisk PBX and *starShop-OSS

CentOS

Zimbra Collaboration Suite Open Source Edition On CentOS

Post date: March 13, 2008, 11:03 Category: Installing Views: 6069 Comments
Tutorial quote: This tutorial shows how to set up Zimbra Collaboration Suite - Open Source Edition on CentOS. This tutorial covers installation of CentOS, dependencies for ZCS and setup of Split DNS when working behind a firewall. This tutorial is based on the way I set this server up and is only a suggestion. It carries no guarantees and it is highly suggested that you do this on a test server first to verify functionality. If you don't have a test server available you should download VMWare Server 1.0 and perform this tutorial on a test virtual server.
Debian

How To Set Up A USB-Over-IP Server And Client With Debian Lenny

Post date: January 24, 2010, 01:01 Category: Installing Views: 4245 Comments
Tutorial quote: This tutorial shows how to set up a USB-over-IP server with Debian Lenny as well as a USB-over-IP client (also running Debian Lenny). The USB/IP Project aims to develop a general USB device sharing system over IP network. To share USB devices between computers with their full functionality, USB/IP encapsulates "USB I/O messages" into TCP/IP payloads and transmits them between computers. USB-over-IP can be useful for virtual machines, for example, that don't have access to the host system's hardware - USB-over-IP allows virtual machines to use remote USB devices.
Mandriva

How To Set Up A USB-Over-IP Server And Client With Mandriva 2010.0

Post date: April 13, 2010, 11:04 Category: Installing Views: 4958 Comments
Tutorial quote: This tutorial shows how to set up a USB-over-IP server with Mandriva 2010.0 as well as a USB-over-IP client (also running Mandriva 2010.0). The USB/IP Project aims to develop a general USB device sharing system over IP network. To share USB devices between computers with their full functionality, USB/IP encapsulates "USB I/O messages" into TCP/IP payloads and transmits them between computers. USB-over-IP can be useful for virtual machines, for example, that don't have access to the host system's hardware - USB-over-IP allows virtual machines to use remote USB devices.
Ubuntu

How To Set Up MySQL Database Replication With SSL Encryption On Ubuntu 9.10

Post date: February 9, 2010, 01:02 Category: Installing Views: 3380 Comments
Tutorial quote: This tutorial describes how to set up database replication in MySQL using an SSL connection for encryption (to make it impossible for hackers to sniff out passwords and data transferred between the master and slave). MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync. This is not a backup policy because an accidentally issued DELETE command will also be carried out on the slave; but replication can help protect against hardware failures.
CentOS

How To Set Up MySQL Database Replication With SSL Encryption On CentOS 5.4

Post date: February 18, 2010, 13:02 Category: Miscellaneous Views: 5258 Comments
Tutorial quote: This tutorial describes how to set up database replication in MySQL using an SSL connection for encryption (to make it impossible for hackers to sniff out passwords and data transferred between the master and slave). MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync. This is not a backup policy because an accidentally issued DELETE command will also be carried out on the slave; but replication can help protect against hardware failures.
Debian

Running A File-, Print-, Proxy-, DHCP-, AND Time-Server For Small/Medium Enterprises

Post date: October 18, 2006, 18:10 Category: System Views: 4547 Comments
Tutorial quote: This article shows how to run a file-, print-, HTTP proxy- DHCP-, and time server for small and medium enterprises (SME) on one single Debian Sarge system. It is very easy to set up, and management is done with an easy-to-use web interface called eBox so once the system is set up, you can forget about the command line. eBox was developed to administrate advanced services for corporate networks, and it was created for Debian Sarge.
Unix+clones

How To Set Up Database Replication In MySQL

Post date: December 14, 2005, 19:12 Category: Software Views: 4544 Comments
Tutorial quote: This tutorial describes how to set up database replication in MySQL. MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync. This is not a backup policy because an accidentally issued DELETE command will also be carried out on the slave; but replication can help protect against hardware failures though.

In this tutorial I will show how to replicate the database exampledb from the master with the IP address 192.168.0.100 to a slave. Both systems (master and slave) are running Debian Sarge; however, the configuration should apply to almost all distributions with little or no modification.
Fedora

How To Run Fully-Virtualized Guests (HVM) With Xen 3.2 On Debian Lenny (x86_64)

Post date: March 8, 2009, 13:03 Category: Installing Views: 4517 Comments
Tutorial quote: This guide explains how you can set up fully-virtualized guests (HVM) with Xen 3.2 on a Debian Lenny x86_64 host system. HVM stands for HardwareVirtualMachine; to set up such guests, you need a CPU that supports hardware virtualization (Intel VT or AMD-V). Hardware virtualization allows you to install unmodified guest systems (in contrast to paravirtualization where the guest kernel needs to be modified); that way you cannot only virtualize OpenSource operating systems like Linux and BSD, but also closed-source operating systems like Windows where you cannot modify the kernel.
Debian

Intrusion Detection For PHP Applications With PHPIDS

Post date: June 24, 2008, 14:06 Category: Security Views: 5239 Comments
Tutorial quote: This tutorial explains how to set up PHPIDS on a web server with Apache2 and PHP5. PHPIDS (PHP-Intrusion Detection System) is a simple to use, well structured, fast and state-of-the-art security layer for your PHP based web application. The IDS neither strips, sanitizes nor filters any malicious input, it simply recognizes when an attacker tries to break your site and reacts in exactly the way you want it to. Based on a set of approved and heavily tested filter rules any attack is given a numerical impact rating which makes it easy to decide what kind of action should follow the hacking attempt. This could range from simple logging to sending out an emergency mail to the development team, displaying a warning message for the attacker or even ending the user’s session.
Debian

Creating A Fully Encrypted Para-Virtualised Xen Guest System Using Debian Lenny

Post date: May 3, 2009, 10:05 Category: Miscellaneous Views: 4015 Comments
Tutorial quote: This document explains how to set up a fully encrypted para-virtualized XEN instance. In this howto, the host system is running Debian Etch, while the guest system to be installed will be using Debian Lenny. If you are concerned about your privacy, you might want to consider using hard disk encryption to protect your valuable private data from spying eyes. Usually, the easiest way would be to use your distribution's installer to set up a fully encrypted system; I think most recent Linux distributions support this. However, when you are using XEN to provide virtualization, there are situations where you might not want to encrypt your whole computer with all guest instances, but instead only encrypt one OS instance. This howto will deal with exactly this situation. It assumes that the XEN host system is already up and running.
Web-based applications and online marketing solutions - LumoLink