Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Removing A User

OpenSUSE

Removing Internet Junks (ads, banners, pop-ups, etc ..) using privoxy on OpenSuSe

Post date: April 20, 2009, 09:04 Category: Security Views: 3859 Comments
Tutorial quote: Privoxy is a Web proxy based on Internet Junkbuster with advanced filtering capabilities for protecting privacy, filtering Web page content, managing cookies, controlling access, and removing ads, banners, pop-ups, and other obnoxious Internet junk. Privoxy has a very flexible configuration and can be customized to suit individual needs and tastes. Privoxy is useful for both stand-alone systems and multi-user networks.
Linux

Removing A User

Post date: April 8, 2006, 00:04 Category: System Views: 3974 Comments
Tutorial quote: Employee turnover in most organizations runs high. So unless you run a small shop with a stable user base, you need to learn how to clean up after an employee leaves. Too many so-called system administrators do not understand the stakes involved when they manage users. Disgruntled former employees can often cause significant trouble for a company by gaining access to the network.

To remove a user, you need to learn to manage all of his or her files, mailboxes, mail aliases, print jobs, recurring –(automatic) personal processes such as the backing up of data or remote syncing of directories, and other references to the user. It is a good idea at first to disable the account in /etc/passwd, after which you can search for the user's files and other references. Once all traces of the user have been cleaned up, you can remove the user completely—but if you remove the entry from /etc/passwd while these other references exist, you have a harder time referring to them .

When you remove a user, it's a good idea to follow a pre-determined course of action so you don't forget any important steps; it may even be a good idea to make a checklist so that you have a routine. Following, you will find several items requiring attention.
Debian

Boot Debian from an external firewire drive on PowerPc Mac

Post date: December 14, 2005, 19:12 Category: Installing Views: 2601 Comments
Tutorial quote: Messing with a boot process is a delicate matter even on a Mac. Note that the Debian installer will fail at some point during the procedure.
I offer no warranty and assume no responsibility for whatever loss or damage might be caused to your hardware, software or data.
There are other ways to boot Linux from an external firewire drive documented elsewhere on the net. See the Resources section.

Adding or removing peripherals like usb keys, digital cameras, other external HDs, cdroms etc, or installing/removing devfs, udev, and similar stuff might alter the way Linux sees the firewire drive, i suggest becoming familiar with supplying boot options to yaboot during the boot process. See Man pages of yaboot and yaboot.conf.
Ubuntu

WineXS Simple graphical environment to configure Wine

Post date: August 18, 2009, 10:08 Category: Software Views: 2543 Comments
Tutorial quote: WineXS allows you to easily configure Wine by installing and removing software, editing the registry,managing files, and more.
OpenSUSE

Installation/Configuration of Last.fm Scrobbler/Player for linux

Post date: April 20, 2009, 09:04 Category: Multimedia Views: 4422 Comments
Tutorial quote: Last.fm is a UK-based Internet radio and music community website, founded in 2002. It claims over 30 million active users based in more than 200 countries.

Using a music recommender system called "Audioscrobbler", Last.fm builds a detailed profile of each user's musical taste by recording details of all the songs the user listens to, either on the streamed radio stations, the user's computer or some portable music devices. This information is transferred to Last.fm's database ("scrobbled") via a plug in installed into the user's music player. The profile data is then displayed on the user's profile page. The site offers numerous social networking features and can recommend and play artists similar to the user's favorites.
OpenBSD

Hardening OpenBSD Internet Servers

Post date: April 11, 2006, 22:04 Category: Security Views: 9307 Comments
Tutorial quote: This tutorial on how-to harden or improve security on OpenBSD Internet servers includes sections that apply to any UNIX system. Hardening is making a computer more secure by removing unneeded functions, restricting access and tracking changes and processes. It was revised to cover OpenBSD 3.0 on Dec. 15, 2001 and includes an overview of the 2.9 to 3.0 changes. A new page on priorities ranks the value of the techniques presented here. Familiarity with UNIX system administration but not OpenBSD is assumed.
Debian

Removing Unwanted Startup Debian Files or Services

Post date: January 5, 2007, 07:01 Category: System Views: 3503 Comments
Tutorial quote: Under Debian Linux ( and most other distros) startup files are stored in /etc/init.d/ directory and symbolic linked between /etc/rcX.d/ directory exists. Debian Linux (Red Hat/ Fedora) uses System V initialization scripts to start services at boot time from /etc/rcX.d/ directory. Debian Linux comes with different utilities to remove unwanted startup files.
Debian

PHP-FPM/Nginx Security In Shared Hosting Environments (Debian/Ubuntu)

Post date: September 25, 2011, 16:09 Category: Security Views: 5066 Comments
Tutorial quote: If you want to use nginx and PHP-FPM for shared hosting environments, you should make up your mind about security. In Apache/PHP environments, you can use suExec and/or suPHP to make PHP execute under individual user accounts instead of a system user like www-data. There's no such thing for PHP-FPM, but fortunately PHP-FPM allows us to set up a "pool" for each web site that makes PHP scripts execute as the user/group defined in that pool. This gives you all the benefits of suPHP, and in addition to that you don't have any FTP or SCP transfer problems because PHP scripts don't need to be owned by a specific user/group to be executed as the user/group defined in the pool.
Unix+clones

Setup the SSH server to use keys for authentication

Post date: November 16, 2005, 20:11 Category: Network Views: 3162 Comments
Tutorial quote: The user creates a keypair, which consists of a private key, that can be protected with a passphrase, and a public key. The public key is transfered to the server and the private key is kept in our workstation. We assume that the user has accounts in both the server machine and his workstation. Everytime he tries to connect to the server, the keys are validated and the user is granted access.
Ubuntu

Pybackpack - A user friendly file backup tool for Ubuntu Linux Desktop

Post date: September 7, 2008, 16:09 Category: System Views: 3340 Comments
Tutorial quote: A graphical tool to make file backup simpler. Provides a user-friendly interface which allows you to back up your files easily to an archive, to a CD/DVD or to a remote location using SSH.pybackpack is a user-friendly file backup tool written for the Gnome desktop and released under the GPL.

Web-based applications and online marketing solutions - LumoLink