Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Network Card Bonding On CentOS

Unix+clones

Unattended, Encrypted, Incremental Network Backups

Post date: August 12, 2005, 18:08 Category: Network Views: 4141 Comments
Tutorial quote: This article describes a complete system for creating a centralised backup system, complete with strong encryption. Incremental backups are used to minimize the bandwidth, and time, used.
CentOS

How To Set Up MySQL Database Replication With SSL Encryption On CentOS 5.4

Post date: February 18, 2010, 13:02 Category: Miscellaneous Views: 5640 Comments
Tutorial quote: This tutorial describes how to set up database replication in MySQL using an SSL connection for encryption (to make it impossible for hackers to sniff out passwords and data transferred between the master and slave). MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync. This is not a backup policy because an accidentally issued DELETE command will also be carried out on the slave; but replication can help protect against hardware failures.
Linux

Monitor Network data transfer using Vnstat

Post date: October 28, 2008, 05:10 Category: Network Views: 5357 Comments
Tutorial quote: If you want to monitor and manage your Internet bandwidth, perhaps to make sure your ISP is not overbilling you, try vnStat, an open source, Linux-based application that gives you a clear picture of your bandwidth usage. This utility got the command-line options and also got the UI part which give the output in form of a graph and is simple to install and easy to use.
Linux

Traffic shaping and bandwidth management

Post date: April 17, 2005, 10:04 Category: Network Views: 5110 Comments
Tutorial quote: This article is from the perspective of a small network, possibly a couple of people sharing one connection. It will explain traffic shaping and bandwidth management in general and with linx. It (sort of) walks through building a traffic shaping router.
Debian

Centralized Syslog Server Using syslog-NG

Post date: April 28, 2006, 15:04 Category: System Views: 4680 Comments
Tutorial quote: syslog-ngĀ© is the world's most flexible and scalable audit trail processing tool for organizations of any size. It provides a centralised, securely stored log of all devices on your network, whatever platform they run on. And syslog-ng also incorporates a host of powerful features, including filtering based on message content, as well as customisable data mining and analysis capabilities.

Debian

SSH your Debian servers without password

Post date: December 29, 2006, 20:12 Category: System Views: 3914 Comments
Tutorial quote: Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over unsecure channels. It is intended as a replacement for telnet, rlogin, rsh, and rcp. For SSH2, there is a replacement for FTP: sftp.This might be useful if you are trying to connect everytime to your server remotely.
OpenSUSE

pngcrush - PNG optimizer utility in openSUSE

Post date: February 17, 2009, 07:02 Category: Optimizing Views: 6341 Comments
Tutorial quote: pngcrush is an optimizer tool for PNG (Portable Network graphic) files. pngcrush is an excellent batch-mode compression utility for PNG images. Depending on the application that created the original PNGs, it can improve the file size anywhere from a few percent to 40% or more (completely losslessly)
Unix+clones

File Transfer Protocol

Post date: April 12, 2005, 18:04 Category: Network Views: 3129 Comments
Tutorial quote: Wake up, you goodness-to-GUI slacksters! It's time to get up and get out of that hammock and put your feet on the ground and your hands on the CLI. This week we're going to talk about data in motion. Taking a file from one place on the network. Putting it someplace else. Most often today some form of FTP, the File Transfer Protocol, is used to do those things. It's been part of the Internet since there was an Internet.
CentOS

Virtual Users And Domains With Postfix, Courier And MySQL (CentOS 5.1)

Post date: December 11, 2007, 09:12 Category: Installing Views: 4905 Comments
Tutorial quote: This document describes how to install a Postfix mail server that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I will also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses. The resulting Postfix server is capable of SMTP-AUTH and TLS and quota (quota is not built into Postfix by default, I will show how to patch your Postfix appropriately). Passwords are stored in encrypted form in the database (most documents I found were dealing with plain text passwords which is a security risk). In addition to that, this tutorial covers the installation of Amavisd, SpamAssassin and ClamAV so that emails will be scanned for spam and viruses.
Fedora

Samba Domaincontroller For Small Workgroups With SWAT On Fedora 8

Post date: December 13, 2007, 12:12 Category: Installing Views: 4421 Comments
Tutorial quote: This document describes how to set up and configure a Samba Domaincontroller for small workgroups (up to 250 users) on Fedora 8 with the Samba Web Administration Tool. The resulting system provides an easy-to-manage domaincontroller for your Windows network.
Web-based applications and online marketing solutions - LumoLink