Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Removing A User

Debian

Mini-Howto for User Mode Linux

Post date: April 12, 2005, 17:04 Category: System Views: 2258 Comments
Tutorial quote: UML ("User Mode Linux") allows you to run multiple Linux servers on one physical machine. This can be handy for many different purposes. For example, you might want to give different people root rights, but prevent them from interfering with one another. Or, you might want to have several identically configured servers, one for production, one for development, and one for testing, but without investing in multiple physical machines.

Once you have prepared your machine for running UML instances as described in the following section, adding new instances will take less than five minutes. The preparation, however, might take a bit longer.
Debian

VHCS ISP Control Panel Configuration

Post date: April 6, 2006, 16:04 Category: Installing Views: 2835 Comments
Tutorial quote: VHCS delivers a complete hosting automation appliance by offering significant security, total-cost-of-ownership, and performance advantages over competing commercial solutions.

With VHCS Pro you can configure your server and applications, create user with domains with a few point-and-click operations that take less than a minute. There is no limit to the number of resellers, users and domains that can be created.At the core of VHCS Pro are 3 easy-to-use, Web-based control panels. VHCS provides graphic user interfaces for the administrators, resellers and users
PC-BSD

The Perfect Desktop - PC-BSD 1.5

Post date: March 20, 2008, 12:03 Category: Desktop Views: 8138 Comments
Tutorial quote: This document describes how to set up PC-BSD v1.5. This release is based upon FreeBSD 6.3 and uses KDE 3.5.8 as default desktop environment. Taken from the PC-BSD page: PC-BSD is a complete desktop operating system, which has been designed with the "casual" computer user in mind. It offers the stability and security that only a BSD-based operating system can bring, while as the same time providing a comfortable user experience, allowing you to get the most out of your computing time. With PC-BSD you can spend less time working to fix viruses or spyware and instead have the computer work for you.
Debian

Install and Configure Auth Shadow on Debian/Ubuntu

Post date: February 23, 2007, 18:02 Category: Miscellaneous Views: 3651 Comments
Tutorial quote: Auth Shadow or mod-auth-shadow is a module for apache (and apache2, sort of) that enables authentication against /etc/shadow. The benefits being that any system user with a password can be authenticated for web_dav, subversion or simply an https server. The only other way to do this is with PAM. That method is dangerous because the apache user (www-data in my case) must be able to read /etc/shadow. Obviously, not a good idea. Auth Shadow accomplishes this safely by using a intermediate program called validate. This works because validate can be owned by root but executable by everyone. In the event that your server is compromised through apache, your password file will not be readable.
Linux

Back Up Linux And Windows Systems With BackupPC

Post date: January 28, 2007, 21:01 Category: System Views: 4454 Comments
Tutorial quote: This tutorial shows how you can back up Linux and Windows systems with BackupPC. BackupPC acts as a server and is installed on a Linux system, and from there it can connect to all Linux and Windows systems in your local network to back them up and restore them without interfering with the user's work on that system. On the clients minimal to no configuration is needed. BackupPC supports full and incremental backups, and it comes with a neat web frontend for the administrator and normal user so that backups and recoveries can be managed through a web browser. It should be noted, however, that BackupPC does file-based backups, not bit-wise backups like Ghost4Linux, for example, so it is not made for disk/partition imaging.
Unix+clones

SpamAssassin, ClamAV and Procmail Howto

Post date: April 16, 2005, 00:04 Category: Network Views: 2959 Comments
Tutorial quote: This document describes how to install SpamAssassin (for filtering SPAM) and ClamAV (for filtering viruses, trojans, worms, etc.) and how to invoke them by using procmail recipes. It is suitable for scenarios where Sendmail or Postfix deliver emails to local users. It should work (maybe with slight changes concerning paths etc.) on all *nix operating systems. I tested it on Debian Woody so far.

In the end you will have a system where Sendmail or Postfix deliver emails to a local user; the emails are passed to procmail which invokes SpamAssassin and ClamAV in order to filter the emails before they arrive in the user's inbox. However, the installation of Sendmail and Postfix are not covered in this document.

This howto is meant as a practical guide.
FreeBSD

Step by step install of Wordpress multi user in FreeBSD

Post date: June 28, 2008, 12:06 Category: Network Views: 6918 Comments
Tutorial quote: Step by step install wordpress multi user in FreeBSD
Unix+clones

How To Automate Spamcop Submissions

Post date: May 26, 2006, 07:05 Category: Network Views: 3032 Comments
Tutorial quote: Spamcop is a service which provides RBLs for mailservers in order to reject incoming mail from spammers.

Their philosophy is to process possible spam complaints from users. When they receive a certain amount of complaints during a time-period then they will blacklist the offender. This system is dependant on spam reporting from users. However, their submission process is not very user-friendly.

As I have said above, Spamcop is pretty much dependant on the user input. If no one submits and verifies spam, then they will have no blacklist. However that whole submission and verification process is a bit annoying. Why should I bother to actually submit spam to spamcop and have it verified? If I just delete it, that will take less time...

The human being isn't really made to do repeating things. This gets quickly boring and hence my idea to automate this submission and verfication process.
In this howto I will show you how I achieved that. All I do is just putting the spam into certain folders and our good old friend cron does the rest.
Unix+clones

CGI Programming on the World Wide Web

Post date: December 12, 2005, 17:12 Category: Programming Views: 2998 Comments
Tutorial quote: The Common Gateway Interface (CGI) emerged as the first way to present dynamically generated information on the World Wide Web. CGI allows the computer to generate Web pages instantly at the user's request rather than being written by someone in advance. And at the time of this writing, it remains the only stable and well-understood method for creating such pages. Java presents problems that have not yet been solved. Other products are currently just in the announcement stage.

CGI is fun. You can get a kick out of writing scripts that perform tricks for you, and the users enjoy the spice the scripts add to your Web pages. But CGI has a serious side too: It lets the Internet offer the kind of interactive, user-driven applications that modern computer users have come to expect. CGI opens up an entire class of modern applications to the Web.
Linux

Roll Your Own Firewall

Post date: March 28, 2006, 21:03 Category: Network Views: 3054 Comments
Tutorial quote: A comprehensive user friendly guide to setting up your own firewall on GNU/Linux.
Web-based applications and online marketing solutions - LumoLink