Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Setting up yum on SUSE LINUX 10.0


Setting Up Master-Master Replication With MySQL 5 On Debian Etch

Post date: October 25, 2007, 11:10 Category: Miscellaneous Views: 3131 Comments
Tutorial quote: Since version 5, MySQL comes with built-in support for master-master replication, solving the problem that can happen with self-generated keys. In former MySQL versions, the problem with master-master replication was that conflicts arose immediately if node A and node B both inserted an auto-incrementing key on the same table. The advantages of master-master replication over the traditional master-slave replication are that you do not have to modify your applications to make write accesses only to the master, and that it is easier to provide high-availability because if the master fails, you still have the other master.

Setting Up A Subversion Repository Using Apache, With Auto Updatable Working Copy

Post date: June 19, 2007, 02:06 Category: Miscellaneous Views: 3052 Comments
Tutorial quote: Subversion is a free/open-source version control system. That is, Subversion manages files and directories over time. A tree of files is placed into a central repository. The repository is much like an ordinary file server, except that it remembers every change ever made to your files and directories. This allows you to recover older versions of your data, or examine the history of how your data changed. In this regard, many people think of a version control system as a sort of time machine.

Using Public Key Authentication with SSH

Post date: June 26, 2008, 10:06 Category: Network Views: 4673 Comments
Tutorial quote: The current leading SSH server, OpenSSH, offers two main methods of authentication: interactive password and public key authentication. While interactive password authentication is the default, there are several reasons for using public key authentication. After reading some background information about public key cryptography, you should have a firm understanding of what public key cryptography is and how it works. You're welcome to skip straight to generating keys for use with SSH. Setting up public key authentication will require a few minutes, but the results are worthwhile.

Setting up squid proxy server on Ubuntu (Quick Start Guide)

Post date: October 10, 2010, 05:10 Category: Software Views: 4122 Comments
Tutorial quote: Squid is an internet proxy server that can be used within a network to distribute an internet connection to all the computers within the network. One central computer is connected to the internet through any means such as dial-up, cable modem, ISDN, DSL, or T1, runs squid, and thus acts as the firewall to the internet. Because it is a proxy, it has the capabilities to log all user actions such as the URLs visited. There are many features that can be configured in squid. This guide is meant to be a quick start guide for those who are eager to get squid working and then configure it from there.

The 'no-configuration, only-active-when-needed' SSH VPN

Post date: April 13, 2005, 03:04 Category: Network Views: 2671 Comments
Tutorial quote: So, we started thinking about how we might set up a VPN between the application server and our internal software mirror. The only requirement is that the VPN be initiated from the "inside-out" and that the connection is only active for as long as we need to use. In other words, it would only be active during an administration session. Ideally, it wouldn't be a lot of work to setup and tear down either.

SSH to the rescue...

Fortunately, SSH client and server come with support for this out of the box, requiring no additional software to be installed, and no configuration changes. On the server side, sshd, the setting "AllowTcpForwarding" defaults to "yes" unless your sshd_config file explicitly disables it. On the client side, all you have to do is request the forwarding.

Restricting Users To SFTP Plus Setting Up Chrooted SSH/SFTP (Debian Squeeze)

Post date: September 6, 2011, 07:09 Category: Miscellaneous Views: 5229 Comments
Tutorial quote: This tutorial describes how to give users chrooted SSH and/or chrooted SFTP access on Debian Squeeze. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. I will also show how to restrict users to SFTP so that they cannot use SSH (this part is independent from the chroot part of this tutorial).

Secure Your Apache With mod_security

Post date: July 16, 2006, 16:07 Category: Security Views: 4929 Comments
Tutorial quote: This article shows how to install and configure mod_security. mod_security is an Apache module (for Apache 1 and 2) that provides intrusion detection and prevention for web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection attacks, cross-site scripting, path traversal attacks, etc.

In the first chapter I will show how to install mod_security on Debian Sarge, Ubuntu 6.06 LTS (Dapper Drake), and on Fedora Core 5, and in the second chapter I will describe how to configure Apache for mod_security which is independent from the distribution you're using.

I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you!

Setting Up A High-Availability Load Balancer With HAProxy/Heartbeat On Fedora 8

Post date: March 2, 2008, 12:03 Category: Installing Views: 4113 Comments
Tutorial quote: This document describes how to set up a two-node load balancer in an active/passive configuration with HAProxy and heartbeat on Fedora 8. The load balancer acts between the user and two (or more) Apache web servers that hold the same content. The load balancer passes the requests to the web servers and it also checks their health. If one of them is down, all requests will automatically be redirected to the remaining web server(s). In addition to that, the two load balancer nodes monitor each other using heartbeat. If the master fails, the slave becomes the master - users will not notice any disruption of the service. HAProxy is session-aware - you can use it with any web application that makes use of sessions like forums, shopping carts, etc.

Setting Up Master-Master Replication On Four Nodes With MySQL 5 On Debian Etch

Post date: November 20, 2008, 12:11 Category: Miscellaneous Views: 2878 Comments
Tutorial quote: This tutorial explains how you can set up MySQL master-master replication on four MySQL nodes (running on Debian Etch). The difference to a two node master-master replication is that if you have more than two nodes, the replication goes in a circle, i.e., with four nodes, the replication goes from node1 to node2, from node2 to node3, from node3 to node4, and from node4 to node1.

Linux stateful firewall design

Post date: April 12, 2005, 17:04 Category: Network Views: 2390 Comments
Tutorial quote: This tutorial shows you how to use netfilter to set up a powerful Linux stateful firewall. All you need is an existing Linux system that's currently using a Linux 2.4.x or 2.6.x kernel. A laptop, workstation, router or server with at a Linux 2.4.x or 2.6.x kernel will do. You should be reasonably familiar with standard network terminology like IP addresses, source and destination port numbers, TCP, UDP and ICMP, etc. By the end of the tutorial, you'll understand how Linux stateful firewalls are put together and you'll have several example configurations to use in your own projects.
Web-based applications and online marketing solutions - LumoLink