Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Solving the ugly key problem

Debian

Updating multiple machines on low bandwidth

Post date: June 16, 2006, 21:06 Category: Network Views: 2812 Comments
Tutorial quote: There are situations where it is common to want to update multiple machines running Debian GNU/Linux whilst minimizing the bandwidth used for downloading packages and updates. There are several different solutions for this problem and here we'll look at one of them: apt-proxy.
Gentoo

Tunneling the hard way: using slirp, pppd and socat

Post date: January 29, 2006, 13:01 Category: Network Views: 11224 Comments
Tutorial quote: Every now and then you might come across a "bad" ISP. The one I have at home for example is dropping UDP packets ever so often when I try to play online games -- and it tends to drop random packets while I try to log onto a gameserver too which makes a certain game I like to play crash during the loading phase so it can't recover. I also heard of other ISPs blocking certain ports on external servers -- universities for example seem to like blocking p2p network ports and the school i was attending till last august blocked everything but port 80 for http -- including ftp which made even on-topic "research" a pita at times.
Usually there's three ways of working around this problem if "giving up" is not an option to you: a) change your ISP, b) use ssh to redirect ports, c) connect to an external VPN to route for you. a) can be tricky -- it's impossible if you're sharing the link with your parents and they insist on their email addresses or in the university/workplace/school scenario. b) will only work with single port/host combinations and for c) you will need a full-fledged rootbox idling around on the internet -- which tend to be expensive and "virtual servers" might not work because those often don't include tun/tap devices and/or kernel-level ppp support if you rent them and in case you rented them you probably can't fiddle around with its kernel to enable it (that was my problem at least). If any of this rings a bell to you, read on and discover method d)
Debian

Installing Debian onto USB flash media with everything encrypted

Post date: September 28, 2005, 16:09 Category: Security Views: 6796 Comments
Tutorial quote: This is a simple procedure for installing Debian GNU/Linux onto a USB key flash media. It includes several configuration changes but tries to stay as close to a default debian install as possible.

This is useful for administrators that need to carry sensitive information or people concerned about their privacy.
Ubuntu

Fixing a scanner broken by the Feisty upgrade

Post date: May 28, 2007, 00:05 Category: Desktop Views: 3272 Comments
Tutorial quote: If you have been using a USB scanner and upgrade from Edgy to Feisty, you may find that your scanner no longer works.You can use this fix to solve your scanner problem.
Fedora+Core

The IPv6 Internet: Connect Today with Linux

Post date: April 13, 2005, 03:04 Category: Network Views: 3142 Comments
Tutorial quote: IPv6 is a key technology and a long-term solution to build scalable, reliable, manageable, secure, and high-performance IP networks. In this article, I demonstrated how to configure a Linux machine running Fedora Core 1 to support IPv6 and connect it to the IPv6 Internet using the Freenet6 service.
Linux

Recursively Encrypt / Decrypt Directories using gpgdir on Linux

Post date: January 24, 2010, 06:01 Category: Security Views: 4518 Comments
Tutorial quote: gpgdir is a script that encrypts and decrypts directories using a GPG key. It supports recursively descending through a directory in order to make sure it encrypts or decrypts every file in a directory and all of its subdirectories.
Debian

Create an Encrypted Loopback Device

Post date: April 12, 2005, 18:04 Category: Security Views: 3325 Comments
Tutorial quote: A loopback device is a very special device that allows you to mount a normal file as it was a physical device. loopbacks can be encrypted: this becomes very useful sometimes.

Consider, as na example, that you need to encrypt a few files, nothing big, let's say 100 MB or so. Encrypting an entire partition could be too much. Then a cryptoloop could be the right solution to your problem.
Unix+clones

Bypass any Firewall or Throttling ISP with SSH

Post date: October 22, 2007, 06:10 Category: Network Views: 4474 Comments
Tutorial quote: On some networks it’s impossible to use BitTorrent. For example, if you’re at work, school, or connected to Comcast or a public hotspot. But there’s an easy solution to overcome this problem. By using a secure connection (SSH), you can bypass almost every firewall or traffic shaping application.
Fedora+Core

Resolving Domains Internally And Externally With Bind9 And Caching Nameserver

Post date: February 11, 2007, 19:02 Category: Network Views: 8002 Comments
Tutorial quote: Sometimes, we are required to resolve our internal domains on a local nameserver and external (internet) domains on our ISP's nameserver. There are different solutions to this problem, but in this tutorial, we are going to solve it through configuring a combination of caching-nameserver and BIND 9.
Debian

Gnu Privacy Guard (GPG)

Post date: March 21, 2006, 19:03 Category: Security Views: 2743 Comments
Tutorial quote: GNU Privacy Guard, or GPG, is a free replacement for the famous encryption tool PGP written by Phil Zimmermann. It is a tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. Here we'll provide a quick introduction to generating a key-pair and using it for basic tasks.
Web-based applications and online marketing solutions - LumoLink