Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Preventing Brute Force Attacks With BlockHosts On Debian Etch

Gentoo

GCC extension for protecting from stack-smashing attacks

Post date: April 20, 2005, 10:04 Category: Security Views: 3033 Comments
Tutorial quote: The Stack-Smashing Protector (SSP, formerly ProPolice) is perhaps one of the most sophisticated yet simplistic protective compiler technologies to date which makes use of canary values by rearranging local variables and function pointers. When (ssp) is enabled it can prevent many forms of the common return-to-libc attack. It is implemented as a patch to GCC which will automatically insert protection code into your programs at compile time. It is developed by Hiroaki Etoh at IBM.
Debian

Creating A Fully Encrypted Para-Virtualised Xen Guest System Using Debian Lenny

Post date: May 3, 2009, 10:05 Category: Miscellaneous Views: 3359 Comments
Tutorial quote: This document explains how to set up a fully encrypted para-virtualized XEN instance. In this howto, the host system is running Debian Etch, while the guest system to be installed will be using Debian Lenny. If you are concerned about your privacy, you might want to consider using hard disk encryption to protect your valuable private data from spying eyes. Usually, the easiest way would be to use your distribution's installer to set up a fully encrypted system; I think most recent Linux distributions support this. However, when you are using XEN to provide virtualization, there are situations where you might not want to encrypt your whole computer with all guest instances, but instead only encrypt one OS instance. This howto will deal with exactly this situation. It assumes that the XEN host system is already up and running.
Debian

Triggering Commands On File/Directory Changes With Incron

Post date: September 2, 2008, 09:09 Category: Miscellaneous Views: 3437 Comments
Tutorial quote: This guide shows how you can install and use incron on a Debian Etch system. Incron is similar to cron, but instead of running commands based on time, it can trigger commands when file or directory events occur (e.g. a file modification, changes of permissions, etc.).
Debian

Filesystems (ext3, reiser, xfs, jfs) comparison on Debian Etch

Post date: April 23, 2006, 08:04 Category: Benchmarks Views: 5748 Comments
Tutorial quote: There are a lot of Linux filesystems comparisons available but most of them are anecdotal, based on artificial tasks or completed under older kernels. This benchmark essay is based on 11 real-world tasks appropriate for a file server with older generation hardware (Pentium II/III, EIDE hard-drive).
Ubuntu

Build Your Own Video Community With Lighttpd And FlowPlayer (Ubuntu 9.10)

Post date: March 16, 2010, 12:03 Category: Installing Views: 3108 Comments
Tutorial quote: This article shows how you can build your own video community using lighttpd with its mod_flv_streaming module (for streaming .flv videos, the format used by most major video communities such as YouTube) and its mod_secdownload module (for preventing hotlinking of the videos) on Ubuntu 9.10. I will use FlowPlayer as the video player, a free Flash video player with support for lighttpd's mod_flv_streaming module. I will also show how you can encode videos (.mp4 .mov .mpg .3gp .mpeg .wmv .avi) to the FLV format supported by Adobe Flash.
Debian

Virtual Hosting With Proftpd And MySQL (Incl. Quota) On Debian Etch

Post date: April 27, 2007, 23:04 Category: Installing Views: 2779 Comments
Tutorial quote: This document describes how to install a Proftpd server that uses virtual users from a MySQL database instead of real system users. This is much more performant and allows to have thousands of ftp users on a single machine. In addition to that I will show the use of quota with this setup.
Unix+clones

OpenOffice 2.0: Creating database forms

Post date: December 13, 2005, 12:12 Category: Software Views: 2853 Comments
Tutorial quote: ather than having a shallow affair with OpenOffice 2.0, we can use it to get a little more intimate with the data. We can even badger it into forming relations. Why force your database tables into a marriage with OpenOffice? Because, as with human relations, life -- and data -- are pretty meaningless without tight connections.

This tip on creating forms is part of a series I'm writing on OpenOffice.org 2.0 Base. So far, I've discussed making a plain database from scratch, creating tables, entering data using the table editor and a simple form and creating a view of a table or tables.

Let's start off with a description of what table relations are anyway, then discuss how to create a data entry form like this one, which has data from two related tables.
Debian

Apache: Creating A Session-Aware Loadbalancer Using mod_proxy_balancer (Debian Etch)

Post date: May 29, 2007, 22:05 Category: System Views: 3782 Comments
Tutorial quote: mod_proxy_balancer is an Apache module that lets you create a loadbalancer. This loadbalancer retrieves requested pages from two or more backend webservers and delivers them to the user's computer. An important feature of mod_proxy_balancer is that it keeps track of sessions so that a single user always deals with the same backend webserver.
Debian

Benchmark: Apache2 vs. Lighttpd (Static HTML Files)

Post date: September 21, 2008, 12:09 Category: Benchmarks Views: 5661 Comments
Tutorial quote: This benchmark shows how Apache2 (version 2.2.3) and lighttpd (version 1.4.13) perform compared to each other when delivering a static HTML file (about 50KB in size). This benchmark was created with the help of ab (Apache benchmark) on a VMware vm (Debian Etch); if you try this yourself, your numbers might differ (depending on your hardware), but the tendency should be the same.
Linux

How To Secure An SSL VPN With One-Time Passcodes And Mutual Authentication

Post date: June 30, 2007, 23:06 Category: Security Views: 3383 Comments
Tutorial quote: SSL-based VPNs were designed to eliminate the need for complex configurations on the user's PC. Unfortunately, that was before the dangers of public WiFi networks and tougher regulatory requirements came into being. Thanks to WiFi, many attacks that were difficult are now quite simple. In particular, a man-in-the-middle attack can intercept SSL-encrypted traffic, rendering SSL-based VPNs useless - even if it is protected by a typical one-time password system. The man-in-the-middle can easily feed the one-time password into the SSL-based VPN within the alloted time.
Web-based applications and online marketing solutions - LumoLink