Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Set Up PC-BSD v1.4 beta

CentOS

Zimbra Collaboration Suite Open Source Edition On CentOS

Post date: March 13, 2008, 11:03 Category: Installing Views: 5893 Comments
Tutorial quote: This tutorial shows how to set up Zimbra Collaboration Suite - Open Source Edition on CentOS. This tutorial covers installation of CentOS, dependencies for ZCS and setup of Split DNS when working behind a firewall. This tutorial is based on the way I set this server up and is only a suggestion. It carries no guarantees and it is highly suggested that you do this on a test server first to verify functionality. If you don't have a test server available you should download VMWare Server 1.0 and perform this tutorial on a test virtual server.
Debian

How To Set Up A USB-Over-IP Server And Client With Debian Lenny

Post date: January 24, 2010, 01:01 Category: Installing Views: 4074 Comments
Tutorial quote: This tutorial shows how to set up a USB-over-IP server with Debian Lenny as well as a USB-over-IP client (also running Debian Lenny). The USB/IP Project aims to develop a general USB device sharing system over IP network. To share USB devices between computers with their full functionality, USB/IP encapsulates "USB I/O messages" into TCP/IP payloads and transmits them between computers. USB-over-IP can be useful for virtual machines, for example, that don't have access to the host system's hardware - USB-over-IP allows virtual machines to use remote USB devices.
Mandriva

How To Set Up A USB-Over-IP Server And Client With Mandriva 2010.0

Post date: April 13, 2010, 11:04 Category: Installing Views: 4755 Comments
Tutorial quote: This tutorial shows how to set up a USB-over-IP server with Mandriva 2010.0 as well as a USB-over-IP client (also running Mandriva 2010.0). The USB/IP Project aims to develop a general USB device sharing system over IP network. To share USB devices between computers with their full functionality, USB/IP encapsulates "USB I/O messages" into TCP/IP payloads and transmits them between computers. USB-over-IP can be useful for virtual machines, for example, that don't have access to the host system's hardware - USB-over-IP allows virtual machines to use remote USB devices.
CentOS

How To Set Up MySQL Database Replication With SSL Encryption On CentOS 5.4

Post date: February 18, 2010, 13:02 Category: Miscellaneous Views: 5026 Comments
Tutorial quote: This tutorial describes how to set up database replication in MySQL using an SSL connection for encryption (to make it impossible for hackers to sniff out passwords and data transferred between the master and slave). MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync. This is not a backup policy because an accidentally issued DELETE command will also be carried out on the slave; but replication can help protect against hardware failures.
Ubuntu

How To Set Up MySQL Database Replication With SSL Encryption On Ubuntu 9.10

Post date: February 9, 2010, 01:02 Category: Installing Views: 3183 Comments
Tutorial quote: This tutorial describes how to set up database replication in MySQL using an SSL connection for encryption (to make it impossible for hackers to sniff out passwords and data transferred between the master and slave). MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync. This is not a backup policy because an accidentally issued DELETE command will also be carried out on the slave; but replication can help protect against hardware failures.
Debian

Running A File-, Print-, Proxy-, DHCP-, AND Time-Server For Small/Medium Enterprises

Post date: October 18, 2006, 18:10 Category: System Views: 4371 Comments
Tutorial quote: This article shows how to run a file-, print-, HTTP proxy- DHCP-, and time server for small and medium enterprises (SME) on one single Debian Sarge system. It is very easy to set up, and management is done with an easy-to-use web interface called eBox so once the system is set up, you can forget about the command line. eBox was developed to administrate advanced services for corporate networks, and it was created for Debian Sarge.
Unix+clones

How To Set Up Database Replication In MySQL

Post date: December 14, 2005, 19:12 Category: Software Views: 4347 Comments
Tutorial quote: This tutorial describes how to set up database replication in MySQL. MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync. This is not a backup policy because an accidentally issued DELETE command will also be carried out on the slave; but replication can help protect against hardware failures though.

In this tutorial I will show how to replicate the database exampledb from the master with the IP address 192.168.0.100 to a slave. Both systems (master and slave) are running Debian Sarge; however, the configuration should apply to almost all distributions with little or no modification.
Debian

Intrusion Detection For PHP Applications With PHPIDS

Post date: June 24, 2008, 14:06 Category: Security Views: 5006 Comments
Tutorial quote: This tutorial explains how to set up PHPIDS on a web server with Apache2 and PHP5. PHPIDS (PHP-Intrusion Detection System) is a simple to use, well structured, fast and state-of-the-art security layer for your PHP based web application. The IDS neither strips, sanitizes nor filters any malicious input, it simply recognizes when an attacker tries to break your site and reacts in exactly the way you want it to. Based on a set of approved and heavily tested filter rules any attack is given a numerical impact rating which makes it easy to decide what kind of action should follow the hacking attempt. This could range from simple logging to sending out an emergency mail to the development team, displaying a warning message for the attacker or even ending the userís session.
Debian

Creating A Fully Encrypted Para-Virtualised Xen Guest System Using Debian Lenny

Post date: May 3, 2009, 10:05 Category: Miscellaneous Views: 3851 Comments
Tutorial quote: This document explains how to set up a fully encrypted para-virtualized XEN instance. In this howto, the host system is running Debian Etch, while the guest system to be installed will be using Debian Lenny. If you are concerned about your privacy, you might want to consider using hard disk encryption to protect your valuable private data from spying eyes. Usually, the easiest way would be to use your distribution's installer to set up a fully encrypted system; I think most recent Linux distributions support this. However, when you are using XEN to provide virtualization, there are situations where you might not want to encrypt your whole computer with all guest instances, but instead only encrypt one OS instance. This howto will deal with exactly this situation. It assumes that the XEN host system is already up and running.
Unix+clones

How to Set Up a Jabber Server

Post date: April 12, 2005, 16:04 Category: Software Views: 6865 Comments
Tutorial quote: Unless you have been living under a rock for the past few years, you must have heard about instant messaging and how it has changed the world of communications over the Internet. According to http://www.webopedia.com, Instant Messaging (IM) is a service that alerts users when their friends or colleagues are on line and allows them to communicate in real time through private online chat areas. Two of the most popular IM services are AOL Instant Messenger (AIM) and MSN Messenger. Unfortunately, most of the publicly available servers use proprietary protocols that only allow you to communicate with users on the same system. These systems are not compatible with each other and can't be accessed from other clients.

Jabber is an open source implementation of the IM server that aims to change this. It uses streaming XML protocols that are free, open, and public. These protocols have been formalized by the Internet Engineering Task Force (IETF) as the approved instant messaging and presence technology under the name of XMPP. The first Jabber technologies were developed in 1998 by Jeremie Miller and is now used on thousands of servers world-wide to enable millions of users to communicate with each other.

The biggest advantage of the Jabber server when compared with commercial IM servers is that, since it is open source, anyone can run a Jabber server and it can be restricted to a specific community like a company work force or a group of friends. In this article, I will document the steps I took to set up a Jabber server and how I managed to overcome the difficulties I faced. Hopefully this will make it easier for you to set up your own Jabber server.
Web-based applications and online marketing solutions - LumoLink