Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Removing A User

Linux

An Easy Way To Install Gnome Shell

Post date: September 21, 2009, 16:09 Category: Benchmarks Views: 3656 Comments
Tutorial quote: Gnome Shell consists of two big parts: the panel and overlay. The panel part is pretty much obvious - system tray, user name, and clock stuff and the activities button which activates the overlay -, and about the "overlay", well, take a look at this screenshot:


Basically, it allows the user to concentrate on switching to a new activity by opening new applications, documents, or both. It displays all the current user workspaces and open windows and facilitates organizing them.

So far, the Gnome Shell installation was quite time-consuming, so most people didn't try it until now. With time, however, this has changed, and you can install it by running a script. Here is how:
OpenSUSE

Protection from malware using Squid proxy server

Post date: September 28, 2008, 09:09 Category: Security Views: 4344 Comments
Tutorial quote: Malware (for "malicious software") is any program or file that is harmful to a computer user. Thus, malware includes computer viruses, worms, Trojan horses, and also spyware, programming that gathers information about a computer user without permission.
Ubuntu

Ubuntu Customization Guide v2

Post date: November 26, 2007, 05:11 Category: Desktop Views: 5710 Comments
Tutorial quote: Today with a hike in Linux acceptance its pretty hard for competitors to provide similar solutions at free of cost. Open Source is known for User Interaction with Operating System which cannot be done with other OS. Linux user can customize, create, edit, add files according to his/her taste..and customization is the part where Linux is one step ahead of every OS.
Debian

An apt-get primer

Post date: April 12, 2005, 17:04 Category: System Views: 2683 Comments
Tutorial quote: If any single program defines the Debian Linux project, that program is apt-get. apt-get is Debian's main tool for installing and removing software. Working with the .deb package format, apt-get offers sophisticated package management that few Red Hat Package Manager RPM-based distributions can match.

Besides the convenience, an advantage of apt-get is that it reduces the chances of falling into dependency hell, that limbo where software installation fails for lack of another piece of software, whose installation fails for lack of another piece of software, and so on. If you know how Debian's archive system works, and how to choose the sources that apt-get uses, and use a few precautions in your upgrades, then the chances are that dependency problems will never bedevil you. Should you descend into dependency hell anyway, apt-get offers useful tools for climbing out of it.
Nexenta

How To Build A Standalone File Server With Nexenta 3.0 Beta2

Post date: May 6, 2010, 11:05 Category: Installing Views: 4350 Comments
Tutorial quote: Nexenta is a project developing a debian user-land for the OpenSolaris kernel. This provides all of the advantages of apt as a package respoitory (based on the Ubuntu LTS apt repository, currently using 8.04) as well as the advantages of the ZFS filesystem. In the resulting setup every user can have his/her own home directory accessible via the SMB protocol or NFS with read-/write access.
Debian

Apache: Creating A Session-Aware Loadbalancer Using mod_proxy_balancer (Debian Etch)

Post date: May 29, 2007, 22:05 Category: System Views: 3782 Comments
Tutorial quote: mod_proxy_balancer is an Apache module that lets you create a loadbalancer. This loadbalancer retrieves requested pages from two or more backend webservers and delivers them to the user's computer. An important feature of mod_proxy_balancer is that it keeps track of sessions so that a single user always deals with the same backend webserver.
Unix+clones

Remote backup using ssh, tar and cron

Post date: April 13, 2005, 01:04 Category: Miscellaneous Views: 2841 Comments
Tutorial quote: Are you looking for a solution to backup your data to a remote location? While a solid backup solution such as Arkeia or TSM from IBM are nice from an enterprise point of view, simpler solutions are available from a home user's perspective. I will walk you through on you how you can backup your data to a remote server, using the default tools available on all linux systems. In a nutshell, we will use ssh capabilities to allow a cron job to transfer a tarball from you local machine to a remote machine.

For the purpose of this tutorial, the local machine will be called “localmachine” (running slackware) and the remote server will be called “remoteserver” (slackware as well). The user will be joe (me). You will have to substitute those 3 with your own machines names and user.
OpenSUSE

Comix - User firendly Comic book & general image viewer in openSUSE

Post date: October 29, 2008, 08:10 Category: Optimizing Views: 5015 Comments
Tutorial quote: Comix is a user-friendly, customizable image viewer. It is specifically designed to handle comic books, but also serves as a generic viewer. It reads images in ZIP, RAR or tar archives (also gzip or bzip2 compressed) as well as plain image files.
Debian

PostgreSQL Database Server Configuration in Debian

Post date: March 24, 2006, 17:03 Category: Software Views: 2222 Comments
Tutorial quote: PostgreSQL is a fully featured object-relational database management system. It supports a large part of the SQL standard and is designed to be extensible by users in many aspects. Some of the features are: ACID transactions, foreign keys, views, sequences, subqueries, triggers, user-defined types and functions, outer joins, multiversion concurrency control. Graphical user interfaces and bindings for many programming languages are available as well.
Debian

System encryption on Debian Etch

Post date: August 16, 2006, 16:08 Category: Security Views: 4984 Comments
Tutorial quote: In this article I will describe how to setup a nearly complete encrypted system using Debian Etch and cryptsetup with LUKS. The goal is: encrypt all partitions except /boot. The user should enter a password at boot time or provide a keyfile on an USB device to decrypt the root partition. Keyfiles for additional partitions are located on the root, so the user does not need to enter a password for every partition.
Web-based applications and online marketing solutions - LumoLink