Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Network-Attached Storage With FreeNAS

Ubuntu

Create a LAN for Virtual Servers with KVM and VDE

Post date: November 11, 2008, 19:11 Category: System Views: 3434 Comments
Tutorial quote: You have one host [ hoster ] running KVM on UBUNTU with 1 network interface accessing to internet.You want to have 2 debian etch virtual servers [ guest ] ( debian01 and debian02 ) running on your hoster with network access between them and hoster in a local LAN. In this case virtual servers will not be able to access to internet, but later I will explain how to do it.
FreeBSD

Build your own gateway firewall

Post date: April 11, 2006, 21:04 Category: Miscellaneous Views: 4955 Comments
Tutorial quote: Learn how to build your own gateway firewall using FreeBSD and old PC parts. The firewall will consist of the PF firewall, Snort IDS, various IPS applications, Squid proxy, and some intuitive web interfaces for auditing. The cost of this project should be between free and $200 depending on your resourcefulness. I built mine for free using spare parts that were stockpiled in personal storage and parts that the USMC was throwing away, but you can build one from used and/or new parts for dirt cheap.
Unix+clones

A web server in a shell script

Post date: March 14, 2006, 08:03 Category: Programming Views: 16516 Comments
Tutorial quote: Suppose you want to experiment a little with web pages and CGI's, but you don't want the hassle of installing the full Apache package. This quick and dirty shell script could just be what you need.

Put simply, a web server is an application that sends local text files over the network to the clients that request them. If you let another program (for example inetd) deal with the network part, the web server could be reduced to a mere cat "$filename" to stdout. Of course, the difficult part would be to extract that filename out of the HTTP request string: nothing that a Bash script cannot easily do!
Ubuntu

Enable WPA Wireless access point in Ubuntu

Post date: February 15, 2007, 01:02 Category: Network Views: 4511 Comments
Tutorial quote: I have a Thoshiba laptop at home, I was running “Edgy Eft” (Ubuntu Linux 6.10) But one of the important things about it was its inability to connect to WPA-encrypted Wifi access points.In my home i have a WPA Enabled Wireless router so i need to connect to my wireless network using WPA.I am giving the procedure that worked for me to enable wpa in my toshiba laptop.This will work most of ubuntu users who is trying to access WPA network.
Ubuntu

Setting up squid proxy server on Ubuntu (Quick Start Guide)

Post date: October 10, 2010, 05:10 Category: Software Views: 4184 Comments
Tutorial quote: Squid is an internet proxy server that can be used within a network to distribute an internet connection to all the computers within the network. One central computer is connected to the internet through any means such as dial-up, cable modem, ISDN, DSL, or T1, runs squid, and thus acts as the firewall to the internet. Because it is a proxy, it has the capabilities to log all user actions such as the URLs visited. There are many features that can be configured in squid. This guide is meant to be a quick start guide for those who are eager to get squid working and then configure it from there.
OpenSUSE

IPTraf - Console based IP Traffic Monitor in openSUSE

Post date: March 3, 2009, 05:03 Category: Network Views: 6267 Comments
Tutorial quote: IPTraf is a console-based network statistics utility for Linux. It gathers a variety of figures such as TCP connection packet and byte counts, interface statistics and activity indicators, TCP/UDP traffic breakdowns, and LAN station packet and byte counts. IPTraf is an IP traffic monitor that shows information on the IP traffic passing over your network.
BSD

Firewalling with OpenBSD's PF packet filter

Post date: April 19, 2005, 02:04 Category: Network Views: 6526 Comments
Tutorial quote: PF operates in a world which consists of packets, protocols, connections and ports.

Based on where a packet is coming from or where it's going, which protocol, connection of port it is designated for, PF is able to determine where to lead the packet, or decide if it is to be let through at all.

It's equally possible to direct network traffic based on packet contents, usually referred to as application level filtering, but this is not the kind of thing PF does. We will come back later to some cases where PF will hand off these kinds of tasks to other software, but first let us deal with some basics.

We've already mentioned the firewall concept. One important feature of PF and similar software, perhaps the most important feature, is that it is able to identify and block traffic which is you do not want to let into your local network or let out to the world outside. At some point the term 'firewall' was coined.
Debian

Xen Live Migration Of An LVM-Based Virtual Machine With iSCSI On Debian Lenny

Post date: April 30, 2009, 11:04 Category: Miscellaneous Views: 4027 Comments
Tutorial quote: This guide explains how you can do a live migration of an LVM-based virtual machine (domU) from one Xen host to the other. I will use iSCSI to provide shared storage for the virtual machines in this tutorial. Both Xen hosts and the iSCSI target are running on Debian Lenny in this article.
Debian

Using the 'snort' Intrusion Detection System

Post date: December 27, 2005, 15:12 Category: Security Views: 4734 Comments
Tutorial quote: Snort is the leading open source Network Intrusion Detection System and is a valuable addition to the security framework at any site. Even if you are employing lots of preventative measures, such as firewalling, patching, etc., a detection system can give you an assurance that your defences truly are effective, or if not, will give you valuable information about what you need to improve.

Fortunately, there is a good set of snort packages for Debian which takes a lot of the tedious work out of building a useful Network Intrusion Detection System. Before we start on installation, we should review a few details about the networking satack that you're going to need to make sense of the alerts snort will generate. Impatient readers and those who are familiar with the TCP/IP suite of protocols may do now skip to the bit that says Stand alone snort.
Fedora

Manage Your Mobile Phone With Wammu Via Bluetooth On Fedora 8

Post date: November 27, 2007, 10:11 Category: Hardware Views: 6443 Comments
Tutorial quote: This document describes how to manage your mobile phone with Wammu via bluetooth on Fedora 8. Depending on the manufacturer and model of your mobile phone, you will be able to retrieve your contacts (SIM & phone), calls, messages, todos, calendar and system information. You can also create contacts, events, todos and messages or manage data backups. In addition you can use the bluetooth manager to access your mobile phone like a standard storage media or use the Gnome phone manager for realtime messaging.
Web-based applications and online marketing solutions - LumoLink