Search results for Installing Zabbix (Server And Agent) On Debian Etch
 |
|
Post date: October 29, 2007, 09:10
Category: Network
Views: 5205
Comments
|
Tutorial quote: This article explains how to set up a two-node load balancer in an active/passive configuration with HAProxy and keepalived on Debian Etch. The load balancer sits between the user and two (or more) backend Apache web servers that hold the same content. Not only does the load balancer distribute the requests to the two backend Apache servers, it also checks the health of the backend servers. If one of them is down, all requests will automatically be redirected to the remaining backend server. In addition to that, the two load balancer nodes monitor each other using keepalived, and if the master fails, the slave becomes the master, which means the users will not notice any disruption of the service. HAProxy is session-aware, which means you can use it with any web application that makes use of sessions (such as forums, shopping carts, etc.). |
 |
|
Post date: November 7, 2007, 11:11
Category: Network
Views: 5055
Comments
|
Tutorial quote: This article explains how to set up a two-node load balancer in an active/passive configuration with HAProxy and heartbeat on Debian Etch. The load balancer sits between the user and two (or more) backend Apache web servers that hold the same content. Not only does the load balancer distribute the requests to the two backend Apache servers, it also checks the health of the backend servers. If one of them is down, all requests will automatically be redirected to the remaining backend server. In addition to that, the two load balancer nodes monitor each other using heartbeat, and if the master fails, the slave becomes the master, which means the users will not notice any disruption of the service. HAProxy is session-aware, which means you can use it with any web application that makes use of sessions (such as forums, shopping carts, etc.). |
 |
|
Post date: May 13, 2008, 10:05
Category: Desktop
Views: 3650
Comments
|
Tutorial quote: This document describes how to set up TrueCrypt 5.1a on Debian Etch (GNOME). Taken from the TrueCrypt page: "TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc)." |
 |
|
Post date: October 3, 2008, 03:10
Category: System
Views: 3379
Comments
|
Tutorial quote: Lenny is updated everyday with the most recent software available, however the software may not be stable which is what Debian is really all about. However if like me you can’t stand the thought of having outdated software, heres how to upgrade. |
 |
|
Post date: December 29, 2005, 07:12
Category: System
Views: 3953
Comments
|
Tutorial quote: Recently we demonstrated the process of installing a binary release of Xen 3.0 on Sarge, since the packages on Debian Unstable are not yet available for Xen 3.0 we're now going to look at installing it via the packages provided by Ralph Passgang. This also includes building a custom Xen kernel from source.
The advantage to building the Xen kernel from source is that you can add, or remove, drivers - so the kernel is utterly customised for your system. |
 |
|
Post date: November 19, 2007, 11:11
Category: Software
Views: 4143
Comments
|
Tutorial quote: This guide is Debian specific but could be ported to other distributions since the concept is the same. In order to use TLS Extensions we have to patch and recompile Apache2 and recompile OpenSSL with the enable-tlsext directive. Since TLS extensions are relatively new, some Internet browsers will not work so the Apache2 server will deliver just the default site as http 1.0 does on an http 1.1 server. |
 |
|
Post date: October 2, 2007, 07:10
Category: Miscellaneous
Views: 8649
Comments
|
Tutorial quote: This document explains how to set up the VMware Tools in the following guest operating systems: Ubuntu 7.04, Fedora 7, PCLinuxOS 2007 and Debian Etch. Installing VMware Tools in your guest operating systems will help maximize performance, provide mouse synchronization and copy & paste functionality. This article also shows a way of making VMware Tools start automatically when you start a guest operating system. |
 |
|
Post date: December 17, 2005, 22:12
Category: Software
Views: 3178
Comments
|
Tutorial quote: Wikis are simple interactive websites which are extremely easy to use for storing easily updated text content. Using a Wiki you can easily create a lot of content with hyperlinks between them. Debian has packaged several different Wiki systems and here we'll look at installing just one of them: KWiki.
Wikis have become familiar to many people thanks to the popularity of large sites such as Wikipedia and can be very useful for creating collaborative websites.
Whilst there are many Wiki packages included in the Debian GNU/Linux distribution I've always had a soft spot for KWiki due to its simplicity, Perl nature, and low requirements.
Installing the software under Debian is very simple and we will show how to setup a new installation using the Debian Apache2 webserver package. |
 |
|
Post date: June 20, 2007, 23:06
Category: Installing
Views: 8980
Comments
|
Tutorial quote: This document describes how to install a Fedora 7 mail server based on Qmail using Qmail Toaster. Qmail is an Internet Mail Transfer Agent (MTA) for UNIX-like operating systems. It is a drop-in replacement for the Sendmail system provided with UNIX operating systems. Qmail uses the Simple Mail Transfer Protocol (SMTP) to exchange messages with MTAs on other systems. |
 |
|
Post date: January 12, 2007, 18:01
Category: Software
Views: 3220
Comments
|
Tutorial quote: qmail is a mail transfer agent that runs on Unix. It was more secure replacement for the popular Sendmail program. The author offered a $500 prize for the first person to publish a verifiable security hole in the latest version of the software.
This is a useful thing to do in a number of situations. For instance, if you are hit with a spamming attack, you can temporarily instate a second Qmail installation (once the spam run is finished), allow it to take over mail receipt,and then use this tool to clean the offending mails out of the queue before switching over to the main Qmail installation once again. |
|
|