Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Running A File-, Print-, Proxy-, DHCP-, AND Time-Server For Small/Medium Enterprises

Debian

Install .rpm Files in Debian and Ubuntu

Post date: October 5, 2006, 16:10 Category: Software Views: 7147 Comments
Tutorial quote: Some time you might find some applications are having only .rpm files but you want a .deb package for your debian,Ubuntu and other debian derived ditributions.If you can’t find .deb debian package in any of the debian,ubuntu repositories or elsewhere, you can use the alien package converter to install the .rpm file.
Linux

Block Ads / Malware / Spyware using hosts file (Windows / Linux)

Post date: January 24, 2010, 06:01 Category: Security Views: 4673 Comments
Tutorial quote: The most easy way to block advertisements and other malware sites is to point those site to ip address 127.0.0.1 or 0.0.0.0 (however the zero version may not be compatible with all systems) in your hosts file.
Debian

Using IPv6 On Debian Etch

Post date: November 6, 2008, 11:11 Category: Miscellaneous Views: 2992 Comments
Tutorial quote: This document describes how you can configure a Debian Etch system for IPv6 so that a) it can connect to other IPv6 hosts and b) other IPv6 hosts can connect to it. IPv6 should become more important in the future as recent estimates assume that there will be no more IPv4 addresses left by 2010 or 2011. Therefore it's time time to learn IPv6.
Linux

Connecting to a Wireless LAN with Linux, Part 2

Post date: April 13, 2005, 19:04 Category: Hardware Views: 3919 Comments
Tutorial quote: In Part 1 we reviewed hardware options, which wireless utilities should be present, how to use Windows drivers, and how to be open to connect to any available wireless access point. Today we'll cover configurations on Red Hat- and Debian-type systems, basic security, and hardware discovery.

Wireless connectivity can be rather overly friendly, allowing connections from anyone. This howto assumes you have a wireless access point on a LAN, which can be all wireless or mixed wired and wireless. You don't want it wide open to just any random person with a desire to snoop on your network or "borrow" your bandwidth, but you want some access controls and security. Your access point should have a unique SSID (service set identifier), WEP (wireless equivalent privacy) or WPA/WPA2 (Wi-fi protected access) set up and working, and either a DHCP server or a pool of assigned IP addresses for clients.
Ubuntu

How to Create a Private Encrypted Folder On Ubuntu 8.10

Post date: March 5, 2009, 08:03 Category: System Views: 4163 Comments
Tutorial quote: eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem for Linux.It provides advanced key management and policy features. eCryptfs stores cryptographic metadata in the header of each file written, so that encrypted files can be copied between hosts; the
file will be decryptable with the proper key, and there is no need to keep track of any additional information aside from what is already in the encrypted file itself. Think of
eCryptfs as a sort of “gnupgfs”.eCryptfs is a native Linux filesystem. The kernel module component of eCryptfs is part of the Linux kernel since 2.6.19.
Ubuntu

Unison - file synchronization tool

Post date: May 11, 2008, 14:05 Category: Software Views: 4425 Comments
Tutorial quote: Unison is a file-synchronization tool for Unix and Windows. It allows two replicas of a collection of files and directories to be stored on different hosts (or different disks on the same host), modified separately, and then brought up to date by propagating the changes in each replica to the other.

OpenSUSE

Write your own kernel module and insert it into running kernel

Post date: January 12, 2009, 08:01 Category: Programming Views: 4869 Comments
Tutorial quote: So, you want to write a kernel module. You know C, you've written a few normal programs to run as processes, and now you want to get to where the real action is, to where a single wild pointer can wipe out your file system and a core dump means a reboot.

kernel Modules are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without the need to reboot the system. For example, one type of module is the device driver, which allows the kernel to access hardware connected to the system.
Debian

ASSP With Embedded ClamAV Integrated Into Postfix With Virtual Users And Domains

Post date: September 5, 2007, 01:09 Category: Security Views: 3926 Comments
Tutorial quote: This document describes how to integrate ASSP (Anti-Spam SMTP Proxy) with embedded ClamAV into a mail server based on Postfix featuring virtual users and domains, i.e. users and domains that are in a MySQL database.
Ubuntu

How to Create a Private Encrypted Folder On Ubuntu 8.10 (Intrepid)

Post date: January 13, 2009, 13:01 Category: System Views: 4375 Comments
Tutorial quote: eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem for Linux.It provides advanced key management and policy features. eCryptfs stores cryptographic metadata in the header of each file written, so that encrypted files can be copied between hosts; the file will be decryptable with the proper key, and there is no need to keep track of any additional information aside from what is already in the encrypted file itself. Think of eCryptfs as a sort of “gnupgfs”.eCryptfs is a native Linux filesystem. The kernel module component of eCryptfs is part of the Linux kernel since 2.6.19.

Linux

Directory Directions...a Guide to the Linux File System

Post date: January 6, 2007, 21:01 Category: System Views: 3457 Comments
Tutorial quote: Ever wonder what those short Linux file system folders mean and what they contain? A little tour with easy directions explains all here.
Web-based applications and online marketing solutions - LumoLink