Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Linux tools for study and analysis of biological information

Linux

Three tools to help you configure iptables

Post date: May 25, 2005, 14:05 Category: Network Views: 3805 Comments
Tutorial quote: Every user whose client connects to the Internet should configure his firewall immediately after installation. Some Linux distributions include firewall configuration as a part of installation, often offering a set of defaults configurations to choose from. However, to ensure that your machine presents the minimum "attack surface" (a measure of the number of vulnerable ports, user accounts, and sockets exposed to attack) to the predatory inhabitants of the Internet, you may need to do some manual configuration of your firewall. Here are three tools that can help.
The Linux kernel (version 2.4 onwards) contains a framework for packet filtering and firewalling using netfilter and iptables. Netfilter is a set of hooks inside the Linux kernel that allows kernel modules to register callback functions with the network stack. Iptables is a generic table structure for the definition of rulesets. Each rule within an IP table consists of a number of classifiers (iptables matches) and one connected action (iptables target). Iptables has extensive documentation that can be accessed online or by typing man iptables at the command line. Yet despite the depth of the documentation available for iptables, its complexity can be baffling.
Unix+clones

Using network transfer protocols

Post date: April 15, 2005, 18:04 Category: Network Views: 2855 Comments
Tutorial quote: Let's face it, most of us are in a rut when it comes to moving our files around. We learned how to use a simple FTP client years ago, and maybe even updated to a GUI FTP client when we were feeling particularly adventurous. There are actually a wealth of tools available for transferring files, and some of them perform automation functions that can easily assist your business in building site mirrors, synchronizing directory contents, and more.

Keep in mind that for many of the tools covered here, there's only really room to skim through their features. Some, such as wget and rsync, are full of useful capabilities for those brave enough to read their man pages and experiment.
Linux

How To Migrate Mailboxes Between IMAP Servers With IMAP TOOLS

Post date: October 27, 2011, 08:10 Category: Miscellaneous Views: 21138 Comments
Tutorial quote: This guide explains how you can migrate mailboxes between IMAP servers with IMAP TOOLS. IMAP TOOLS is a collection of Perl scripts that allow you to do various tasks with IMAP servers and also POP3 servers. In this article I will focus on the scripts imapcopy.pl (copies messages and mailboxes from one IMAP server to another) and pop3toimap.pl (copies POP3 messages to an IMAP server). Both scripts support SSL. If you specify port 993 (995 for POP3) then an SSL connection is initiated. If the port number is 143 (110 for POP3) then it will try a non-SSL connection. With any other value the port will be tested to see if it supports SSL. If so, SSL will be used to make the connection; otherwise a non-SSL connection will be made.
Linux

Passive Checks and NSCA using Nagios

Post date: December 8, 2008, 10:12 Category: Network Views: 5768 Comments
Tutorial quote: Nagios is a very powerful platform because it is easy to extend. A great feature that Nagios offers is the ability for third-party software or other Nagios instances to report information on the status of services or hosts. This way, Nagios does not need to schedule and run checks by itself, but other applications can report information as it is available to them. Nagios also offers a tool for sending passive check results for hosts and services over a network.

This chapter describes passive checks in detail. It gives practical examples of when and how they can be used. It also shows how to use NSCA (Nagios Service Check Acceptor)for sending notifications.
Linux

HOWTO backup your linux system using bash, tar and netcat

Post date: April 2, 2006, 22:04 Category: System Views: 3600 Comments
Tutorial quote: I recently ran into the problem of not having enough hard drive space on my slackware linux laptop, but was lucky enough to have a much bigger drive sitting around from before and wanted a way to perform a hassle free seamless upgrade. i had this idea and it worked pretty well so i thought i would share it since i think it's pretty cool and only requires the use of two tools that should be included with all distributions.
Debian

Using mixmaster to send anonymous email

Post date: January 26, 2007, 07:01 Category: Network Views: 32502 Comments
Tutorial quote: This is a document that explains how to install mixmaster and how to use it to send email, in an anonymous and secure fashion.

Mixmaster is described by the debian package system as:

Mixmaster is the reference implementation of the type II remailer protocol which is also called Mixmaster.

An anonymous remailer is a computer service that privatizes your email. A remailer allows you to send electronic mail to a Usenet news group or to a person without the recipient knowing your name or your email address. Anonymous remailers provide protection against traffic analysis.
Debian

Monitoring Proftpd Server Using phpftpwho

Post date: August 5, 2007, 02:08 Category: Software Views: 3729 Comments
Tutorial quote: phpftpwho is a program written in PHP that tells you the status of your local FTP server. It uses the unix/linux
command ftpwho and formats and displays the information. The program is licensed under the GPL license.
Unix+clones

How to Use GIMP for Photo and Image Editing

Post date: April 16, 2005, 00:04 Category: Software Views: 3256 Comments
Tutorial quote: In today's hands-on tutorial, you will learn how to apply The GIMP's powerful layer and pattern tools to put a frame or border around a digital photo or digital image by editing a photograph in our digital darkroom. It's a simple application of what you already have learned in our Gimp tutorial series about using the Gimp's layer and pattern tools.
Ubuntu

How to Create a Private Encrypted Folder On Ubuntu 8.10

Post date: March 5, 2009, 08:03 Category: System Views: 4722 Comments
Tutorial quote: eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem for Linux.It provides advanced key management and policy features. eCryptfs stores cryptographic metadata in the header of each file written, so that encrypted files can be copied between hosts; the
file will be decryptable with the proper key, and there is no need to keep track of any additional information aside from what is already in the encrypted file itself. Think of
eCryptfs as a sort of “gnupgfs”.eCryptfs is a native Linux filesystem. The kernel module component of eCryptfs is part of the Linux kernel since 2.6.19.
Ubuntu

Intrusion Detection: Snort, Base, MySQL, and Apache2 On Ubuntu 7.10 (Gutsy Gibbon)

Post date: November 21, 2007, 10:11 Category: Security Views: 5715 Comments
Tutorial quote: In this tutorial I will describe how to install and configure Snort (an intrusion detection system (IDS)) from source, BASE (Basic Analysis and Security Engine), MySQL, and Apache2 on Ubuntu 7.10 (Gutsy Gibbon). Snort will assist you in monitoring your network and alert you about possible threats. Snort will output its log files to a MySQL database which BASE will use to display a graphical interface in a web browser.
Web-based applications and online marketing solutions - LumoLink