Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Software RAID and Encrypted Filesystem Benchmarks

Slackware

The Perfect Desktop - Slackware 12

Post date: October 12, 2007, 09:10 Category: Desktop Views: 11732 Comments
Tutorial quote: This tutorial shows how you can set up a Slackware 12 GNU/Linux desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktop.
Ubuntu

Running Internet Explorer in Ubuntu Linux

Post date: December 29, 2006, 20:12 Category: Desktop Views: 4184 Comments
Tutorial quote: No clicks needed. No boring setup processes. No Wine complications. Just one easy script and you’ll get three IE versions to test your Sites. And it’s free and open source.This may be very helpful for software developers and web developers to test their applications.
Debian

Running Internet Explorer in Debian and ubuntu Linux

Post date: September 29, 2006, 23:09 Category: Installing Views: 5796 Comments
Tutorial quote: No clicks needed. No boring setup processes. No Wine complications. Just one easy script and you’ll get three IE versions to test your Sites. And it’s free and open source.This may be very helpful for software developers and web developers to test their applications.
Fedora+Core

Building a Linux cluster on a budget

Post date: November 18, 2005, 19:11 Category: Network Views: 4646 Comments
Tutorial quote: So you need a lot of computing power but don't want to spend tens of thousands of dollars on a commercial cluster? Or maybe you just have a lot of machines sitting idle that you would like to put to good use? You can build a powerful and scalable Linux cluster using only free software and off-the-shelf components. Here's how.
OpenSUSE

Protection from malware using Squid proxy server

Post date: September 28, 2008, 09:09 Category: Security Views: 5056 Comments
Tutorial quote: Malware (for "malicious software") is any program or file that is harmful to a computer user. Thus, malware includes computer viruses, worms, Trojan horses, and also spyware, programming that gathers information about a computer user without permission.
Ubuntu

Setting Up Subversion And Trac As Virtual Hosts On An Ubuntu Server

Post date: January 13, 2008, 11:01 Category: Installing Views: 3965 Comments
Tutorial quote: This howto outlines the process by which one can set up the Subversion version control system, and have it work in tandem with Trac, the project manager for software development projects, on a server running Ubuntu (or possibly Debian).
Unix+clones

Postfix performance tuning

Post date: May 21, 2005, 11:05 Category: Optimizing Views: 4126 Comments
Tutorial quote: Postfix is fast out of the box, but like other packages, you can usually tune it to work even faster. Furthermore, there are situations where Postfix may not perform as well as you expected, whether because of hardware or software limitations on the server system or other adverse conditions, such as a big influx of spam or undeliverable mail. This article shows you how to find and analyze the most common performance problems.
OpenSUSE

Virtual Box - How to Install & Configure in openSUSE

Post date: August 9, 2008, 17:08 Category: Emulation Views: 6877 Comments
Tutorial quote: VirtualBox is a family of powerful x86 virtualization products for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL).
Linux

Keep Your Processes Running Despite A Dropped Connection

Post date: February 17, 2009, 08:02 Category: Software Views: 3523 Comments
Tutorial quote: I guess you all know this: you are connected to your server with SSH and in the middle of compiling some software (e.g. a new kernel) or doing some other task which takes lots of time, and suddenly your connection drops for some reason, and you lose your labor. This can be very annoying, but fortunately there is a small utility called screen which lets you reattach to a previous session so that you can finish your task.
Linux

Cutting the tcp/ip network connection with cutter

Post date: December 13, 2005, 03:12 Category: Network Views: 3532 Comments
Tutorial quote: Recently I came across very powerful and nifty tool (used by one of our Sr. network admin). Just imagine that people in your private network using peer to peer software such as Kazaa, iMesh or others and you want to cut them or just want to cut all ftp connection over my firewall but not all traffic to host.
Web-based applications and online marketing solutions - LumoLink