Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Running scripts after a reboot for non-root users

Ubuntu

Enable WPA Wireless access point in Ubuntu

Post date: February 15, 2007, 01:02 Category: Network Views: 4866 Comments
Tutorial quote: I have a Thoshiba laptop at home, I was running “Edgy Eft” (Ubuntu Linux 6.10) But one of the important things about it was its inability to connect to WPA-encrypted Wifi access points.In my home i have a WPA Enabled Wireless router so i need to connect to my wireless network using WPA.I am giving the procedure that worked for me to enable wpa in my toshiba laptop.This will work most of ubuntu users who is trying to access WPA network.
Ubuntu

Ten tips for new Ubuntu users

Post date: June 22, 2006, 15:06 Category: Miscellaneous Views: 6576 Comments
Tutorial quote: Ubuntu has become the most popular Linux distribution for new Linux users. It's easy to install, easy to use, and usually "just works." But moving to a different operating system can be confusing, no matter how well-designed it is. Here's a list of tips that might save you some time while you're getting used to Ubuntu.
Linux

Port Knocking

Post date: April 16, 2005, 10:04 Category: Network Views: 3302 Comments
Tutorial quote: Firewall administrators are challenged to balance flexibility and security when designing a comprehensive rule set. A firewall should provide protection against malfeasants, while allowing trusted users to connect. Unfortunately, it is not always possible to filter out the bad guys, because filtering on the basis of IP addresses and ports does not distinguish connecting users. Bad guys can and do come from trusted IP addresses. Open ports remain a necessary vulnerability: they allow connections to applications but also may turn into open doors for attack. This article presents a new security system, termed port knocking, in which trusted users manipulate firewall rules by transmitting information across closed ports.
Ubuntu

Install KDE 4.3 In Ubuntu Jaunty 9.04

Post date: August 5, 2009, 12:08 Category: Installing Views: 1955 Comments
Tutorial quote: Ubuntu 9.10 Karmic Koala simply have do an apt-get upgrade to update to the latest KDE 4.3 (which was released yesterday) but (K)Ubuntu 9.04 Jaunty Jackalope users have to add the Kubuntu PPA backports so they can install the latest KDE 4.3.

IMPORTANT NOTE: The packages for Jaunty are not officially supported. KDE 4.3 will be part of Karmic Koala Kubuntu 9.10 which will be officially released in October.

If you still want to continue, you can add these repositories by running the following command in a terminal:
Fedora

Speed Up Your System With Preload On Fedora 8

Post date: March 16, 2008, 12:03 Category: Desktop Views: 3259 Comments
Tutorial quote: This document describes how to install preload on Fedora 8. preload is an adaptive readahead daemon. It monitors applications that users run, and by analyzing this data, predicts what applications users might run, and fetches those binaries and their dependencies into memory for faster startup times.
Fedora

Virtual Users & Domains With Postfix, Courier, MySQL, SquirrelMail (Fedora 10)

Post date: February 1, 2009, 11:02 Category: Installing Views: 3597 Comments
Tutorial quote: This document describes how to install a Postfix mail server that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I'll also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses. The resulting Postfix server is capable of SMTP-AUTH and TLS and quota (quota is not built into Postfix by default, I'll show how to patch your Postfix appropriately). Passwords are stored in encrypted form in the database (most documents I found were dealing with plain text passwords which is a security risk). In addition to that, this tutorial covers the installation of Amavisd, SpamAssassin and ClamAV so that emails will be scanned for spam and viruses. I will also show how to install SquirrelMail as a webmail interface so that users can read and send emails and change their passwords.
Fedora+Core

Tripwire on your Fedora Box

Post date: April 16, 2005, 00:04 Category: Security Views: 5270 Comments
Tutorial quote: Tripwire is an Intrusion Detection System. This can be used to alert users whenever their system is compromised. Tripwire detects and reports changes in system files. It will alert you through email whenever a change is detected. If the change is due to normal system activity, you can instruct Tripwire not to report the change to that file in future. If the change is not due to normal system activity, then it is a clear indication that something is wrong and you need to act immediately and fix the issue. Thus tripwire comes very handy to maintain the integrity of the system.

There is lot of information on the web about Tripwire. Some people might argue that AIDE (Advanced Intrusion Detection Environment) is better than tripwire and so on. This comparison is beyond the scope of this article. This is an introductory article for novice users who are interested in installing Tripwire on their Fedora Box. Advanced users can refer to the web for relevant information or they can contact appropriate mailing lists like fedora users mailing list.
Linux

Grub From the Ground Up

Post date: April 12, 2005, 17:04 Category: Software Views: 3098 Comments
Tutorial quote: Grub is a world-class boot loader with insufficient documentation. In many ways it blows the doors of LILO. For instance, it's MUCH easier to use Knoppix to rebuild a grub boot loader than to rebuild a LILO boot loader. However, until you're comfortable with grub, it might seem just the opposite. All too often grub dumps you at a grub> prompt with no hint of what you should do. You might have heard that a successful reboot is just three commands away, but which commands? The state of grub's documentation is such that you can't figure it out unless you already know grub.

That catch 22 is the very purpose of this document. This document will to give you enough grub expertise that you can create a grub boot floppy on a working machine with grub installed (not necessarily as the bootloader, just installed), and use that floppy to bust back into a Linux machine with a blown bootloader, and then use that floppy to actually install grub as the bootloader.

This document does not discuss using grub to boot or dual boot Windows, mach, BSD, or other non-Linux operating systems. I might write on that subject later. But in the meantime, once you're familiar with the principles and practices of grub, given some study of existing documentation you'll probably be able to use grub to boot non-Linux operating systems.
Ubuntu

How To Set Up Software RAID1 On A Running System (Ubuntu 10.04)

Post date: July 6, 2010, 11:07 Category: Installing Views: 2881 Comments
Tutorial quote: This guide explains how to set up software RAID1 on an already running Ubuntu 10.04 system. The GRUB2 bootloader will be configured in such a way that the system will still be able to boot if one of the hard drives fails (no matter which one).
Ubuntu

Network Bandwidth Monitoring Tools

Post date: December 21, 2006, 17:12 Category: Network Views: 9070 Comments
Tutorial quote: This is list of Network Bandwidth Monitoring Tools for Ubuntu Users includes bmon bwbar,bwm,bwm-ng,iftop,iperf,ipfm speedometer,cbm,ibmonitor,pktstat,mactrack,MRTG,Cacti.This tutorial also contains how to install and configure each tool with examples and screenshots.This is very useful for all Linux users and admins
Web-based applications and online marketing solutions - LumoLink