Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Howto install the base Linux system onto a USB thumbdrive with the root partition encrypted

Debian

ACL(Access Control List) Configuration

Post date: April 4, 2006, 20:04 Category: Installing Views: 3068 Comments
Tutorial quote: Access Control Lists (ACLs) provide a much more flexible way of specifying permissions on a file or other object than the standard Unix user/group/owner system. Windows NT and above, when running on an NTFS partition, use ACLs to specify permissions on files and directories. This document attempts to show how you can enable ACL support on your Linux box and use Samba to provide an SMB file server for use by machines in a Windows 2000 domain.

ACLs are best stored in the actual file system itself. To that end, there are patches available for ext2 and ext3 that enable ACL support using Extended Attributes (EAs). SGI's XFS also has ACL support built in, but XFS is not currently covered in this document.
Linux

LVM Howto

Post date: January 13, 2008, 14:01 Category: System Views: 3266 Comments
Tutorial quote: This is an attempt to collect everything needed to know to get LVM up and running. The entire process of getting, compiling, installing, and setting up LVM will be covered. Pointers to LVM configurations that have been tested with will also be included. This version of the HowTo is for LVM 2 with device-mapper and LVM 1.0.8.
Unix+clones

OpenSSH/Keychain Howto

Post date: April 12, 2005, 17:04 Category: Network Views: 3510 Comments
Tutorial quote: This howto will show you the fundamental ways to use OpenSSH; how to generate public/private key pairs and strong passphrases, and how to use the wonderful Keychain utility to automate your SSH logins. This is exceptionally handy when you log in and out frequently, and don't want to keep entering your passphrase.
Linux

HowTo install software from Source Code

Post date: October 4, 2008, 17:10 Category: Software Views: 27818 Comments
Tutorial quote: We usually download linux programs through package handling tools such as yum and apt-get. Download programs through package handling tools is easy, but not all programs is available in your Linux distribution repository. Sometimes, we need to download the source code, compile and install manually.
Unix+clones

SpamAssassin, ClamAV and Procmail Howto

Post date: April 16, 2005, 00:04 Category: Network Views: 2919 Comments
Tutorial quote: This document describes how to install SpamAssassin (for filtering SPAM) and ClamAV (for filtering viruses, trojans, worms, etc.) and how to invoke them by using procmail recipes. It is suitable for scenarios where Sendmail or Postfix deliver emails to local users. It should work (maybe with slight changes concerning paths etc.) on all *nix operating systems. I tested it on Debian Woody so far.

In the end you will have a system where Sendmail or Postfix deliver emails to a local user; the emails are passed to procmail which invokes SpamAssassin and ClamAV in order to filter the emails before they arrive in the user's inbox. However, the installation of Sendmail and Postfix are not covered in this document.

This howto is meant as a practical guide.
FreeBSD

Using Software RAID-1 with FreeBSD

Post date: November 29, 2005, 03:11 Category: System Views: 3629 Comments
Tutorial quote: Have you ever needed a software RAID solution for a low-end server install? Perhaps you've wanted your workstation to take advantage of the redundancy provided by a disk mirror without investing in a hardware RAID controller. Has a prior painful configuration experience turned you off software RAID altogether on Unix systems?


Since 5.3-Release, FreeBSD comes with gmirror(8), which allows you to easily configure a software RAID 1 solution. While tutorials on gmirror exist, I found them to require either manual calculations of partition sizes with bsdlabel or the use of a fix-it floppy on an existing system.

It made more sense to me to configure RAID during the install of the operating system. I also wanted a procedure that was easy to follow and didn't introduce human error in the form of a math miscalculation. After cobbling together the available documentation and experimenting my way through various configurations, I came across a procedure that has worked well for me on several different systems. I also received valuable feedback from Pawel Jakub Dawidek, the author of gmirror, who gave some insight into some of the not yet documented features of gmirror.
Debian

Chrooted SSH HowTo

Post date: January 30, 2006, 07:01 Category: Security Views: 3219 Comments
Tutorial quote: This tutorial describes how to install and configure OpenSSH so that it will allow chrooted sessions for users. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of.
Unix+clones

Unattended, Encrypted, Incremental Network Backups

Post date: August 12, 2005, 18:08 Category: Network Views: 3181 Comments
Tutorial quote: This article describes a complete system for creating a centralised backup system, complete with strong encryption. Incremental backups are used to minimize the bandwidth, and time, used.
Unix+clones

Security Testing your Apache Configuration with Nikto

Post date: August 29, 2006, 16:08 Category: Security Views: 3526 Comments
Tutorial quote: By now you've got the perfect setup for your new Ubuntu 6.0.6 (Dapper Drake) box. You may have even followed the excellent Intrusion Detection and Prevention with BASE and Snort tutorial. And as an added precaution you installed DenyHosts to prevent hack attempts via ssh. But now that you've got your new LAMP server on the internet, how can you tell that your new web server is secure? You test it, of course!
Debian

How To Run Your Own DNS Servers With ISPConfig 3 (Debian Squeeze)

Post date: July 21, 2011, 10:07 Category: Miscellaneous Views: 2866 Comments
Tutorial quote: This tutorial shows how you can run your own DNS servers (primary and secondary) with ISPConfig 3. To do this, you need two servers with two different public IP addresses and with ISPConfig 3 installed. I will use Debian Squeeze for both DNS servers here to demonstrate the base system setup process and ISPConfig 3 installation, but once you have ISPConfig 3 installed on your servers, the configuration inside ISPConfig 3 is identical, no matter what distribution you use.
Web-based applications and online marketing solutions - LumoLink