Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Linux tools for study and analysis of biological information

Linux

Linux tools for study and analysis of biological information

Post date: May 24, 2005, 18:05 Category: Software Views: 2344 Comments
Tutorial quote: This article wants to show some of the advantages of Perl programming on Unix, for extraction of the biological information of the DNA, RNA and proteine sequences Databases. They can be used in comparative processes or analysis. The Human Genome project and the DNA clonation techniques have accelerated the scientific progress in this area. Daily generated information in this field outgrows often the capability of processing this information from an evolutive viewpoint.

The fast proliferation of the biological information on different genomes (dowry of genes of an organism) is driving bioinformatics as one fundamental discipline for the handling and analysis of these data.
Ubuntu

Network Analysis With Wireshark On Ubuntu 9.10

Post date: February 21, 2010, 15:02 Category: Installing Views: 3804 Comments
Tutorial quote: Wireshark is a network protocol analyzer (or "packet sniffer") that can be used for network analysis, troubleshooting, software development, education, etc. This guide shows how to install and use it on an Ubuntu 9.10 desktop to analyze the traffic on the local network card.
Linux

Tools to delete files securely in GNU/Linux

Post date: January 5, 2009, 18:01 Category: Benchmarks Views: 7403 Comments
Tutorial quote: Deleting a file or reformatting a disk does not destroy your sensitive data. The data can easily be undeleted. That’s a good thing if you accidentally throw something away, but what if your trying to destroy financial data, bank account passwords, or classified company information. In this article you will learn number of tools(Shred,Wipe,srm,smem,sfill,sswap,DBAN) to delete files securely in GNU/ Linux

Linux

Benchmarking Filesystems

Post date: April 12, 2005, 07:04 Category: Benchmarks Views: 2958 Comments
Tutorial quote: I recently purchased a Western Digital 250GB/8M/7200RPM drive and wondered which journaling file system I should use. I currently use ext2 on my other, smaller hard drives. Upon reboot or unclean shutdown, e2fsck takes a while on drives only 40 and 60 gigabytes. Therefore I knew using a journaling file system would be my best bet. The question is: which is the best? In order to determine this I used common operations that Linux users may perform on a regular basis instead of using benchmark tools such as Bonnie or Iozone. I wanted a "real life" benchmark analysis. A quick analogy: Just because the Ethernet-Over-Power-Lines may advertise 10mbps (1.25MB/s), in real world tests, peak speed is only 5mbps (625KB/s). This is why I chose to run my own tests versus using hard drive benchmarking tools.
Ubuntu

Perfect Setup Of Snort + Base + PostgreSQL On Ubuntu 6.06 LTS

Post date: April 25, 2007, 21:04 Category: Installing Views: 3986 Comments
Tutorial quote: This tutorial describes how you can install and configure the Snort IDS (intrusion detection system) and BASE (Basic Analysis and Security Engine) on an Ubuntu 6.06 (Dapper Drake) system. With the help of Snort and BASE, you can monitor your system - with BASE you can perform analysis of intrusions that Snort has detected on your network. Snort will use a PostgreSQL database to store/log the data it gathers.
Linux

Filesystem Encryption Tools for Linux

Post date: May 28, 2007, 00:05 Category: System Views: 3427 Comments
Tutorial quote: Crypto filesystems keep your data safe – even if someone steals your computer.Linux offers a number of encrypted filesystem options – each with a different approach to the encryption problem.Encrypted filesystems may be overkill
for family photos or your résumé, but they make sense for network-accessible servers that hold sensitive business
documents, databases that contain credit-card information, offline backups, and laptops.
Debian

Securing Debian Manual

Post date: January 1, 2008, 13:01 Category: Security Views: 3676 Comments
Tutorial quote: This document describes security in the Debian project and in the Debian operating system. Starting with the process of securing and hardening the default Debian GNU/Linux distribution installation, it also covers some of the common tasks to set up a secure network environment using Debian GNU/Linux, gives additional information on the security tools available and talks about how security is enforced in Debian by the security and audit team.
Debian

Intrusion Detection With BASE And Snort

Post date: July 16, 2006, 16:07 Category: Security Views: 4514 Comments
Tutorial quote: This tutorial shows how to install and configure BASE (Basic Analysis and Security Engine) and the Snort intrusion detection system (IDS) on a Debian Sarge system. BASE provides a web front-end to query and analyze the alerts coming from a Snort IDS system. With BASE you can perform analysis of intrusions that Snort has detected on your network.

Scenario: A linux server running Debian Sarge 3.1 setup according to Falko's - The Perfect Setup - Debian Sarge (3.1).
Let's assume we have one working website (www.example.com) and that the document root is: /var/www/www.example.com/web
The IP of the server is 192.168.0.5 and it's using eth0 as network interface name.
Linux

How To Set Up VMware Tools On Various Linux Distributions

Post date: October 2, 2007, 07:10 Category: Miscellaneous Views: 7990 Comments
Tutorial quote: This document explains how to set up the VMware Tools in the following guest operating systems: Ubuntu 7.04, Fedora 7, PCLinuxOS 2007 and Debian Etch. Installing VMware Tools in your guest operating systems will help maximize performance, provide mouse synchronization and copy & paste functionality. This article also shows a way of making VMware Tools start automatically when you start a guest operating system.
Linux

Easy Linux Network Backup

Post date: April 12, 2005, 23:04 Category: Network Views: 2788 Comments
Tutorial quote: If you use Linux, you already have access to extremely powerful tools for creating custom backup solutions. The solutions in this article can help you perform simple to more advanced and secure network backups using open source tools that are part of nearly every Linux distribution.
Web-based applications and online marketing solutions - LumoLink