Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Split and Reassemble Files

Linux

Sawing Linux Logs with Simple Tools

Post date: April 14, 2005, 12:04 Category: Security Views: 3383 Comments
Tutorial quote: So there you are with all of your Linux servers humming along happily. You have tested, tweaked, and configured until they are performing at their peak of perfection. Users are hardly whining at all. Life is good. You may relax and indulge in some nice, relaxing rounds of TuxKart. After all, you earned it.

Except for one little remaining chore: monitoring your log files. [insert horrible alarming music of your choice here.] You're conscientious, so you know you can't just ignore the logs until there's a problem, especially for public services like Web and mail. Somewhere up in the pointy-haired suites, they may even be plotting to require you to track and analyze all sorts of server statistics.

Not to worry, for there are many ways to implement data reduction, which is what log parsing is all about. You want to slice and dice your logs to present only the data you're interested in viewing. Unless you wish to devote your entire life to manually analyzing log files. Even if you only pay attention to logfiles when you're debugging a problem, having some tools to weed out the noise is helpful.
Unix+clones

Fileschanged

Post date: September 25, 2007, 18:09 Category: Software Views: 4024 Comments
Tutorial quote: Fileschanged is a GNU/Linux command-line utility that reports when files have been altered.
Linux

Creating a safe directory with PAM and Encfs

Post date: June 7, 2006, 20:06 Category: Security Views: 4091 Comments
Tutorial quote: Now, in my network (and others) the credentials provided at login could (and should) be used by those programs. How can you retrieve these credentials, providing enough security?
With a the PAM modules pam_script it's possible to store the password in a file, which will be used by fusemb and mount.cifs to read the password from.

To achieve security, one could make the user logging in owner and deny read/write for anybody else. Remove this file when the user ends his/her session.
This is enough, for runtime. But I was wondering, but what if the system crashes, and the file with the credentials remains on the harddrive? Anybody who is able to mount this harddrive with for example a lifecd, can read this file!

That's why I was looking for a way to encrypt this file.

With encfs this is very possible! At run time it gives an interface to encrypted files and directories, which does only exist at runtime! When the system is not running, there are only encrypted files, useless when you do not know the key to it. And this key is exactly the (encrypted) password! That's why I've chosen for a combination of PAM and Encfs.
Unix+clones

Getting started with SSH

Post date: February 11, 2006, 04:02 Category: Network Views: 3538 Comments
Tutorial quote: The following sections hope to provide enough information to setup a user new to ssh with the appropriate files necessary for accessing remote hosts in a secure manner.
Linux

Removing A User

Post date: April 8, 2006, 00:04 Category: System Views: 4735 Comments
Tutorial quote: Employee turnover in most organizations runs high. So unless you run a small shop with a stable user base, you need to learn how to clean up after an employee leaves. Too many so-called system administrators do not understand the stakes involved when they manage users. Disgruntled former employees can often cause significant trouble for a company by gaining access to the network.

To remove a user, you need to learn to manage all of his or her files, mailboxes, mail aliases, print jobs, recurring –(automatic) personal processes such as the backing up of data or remote syncing of directories, and other references to the user. It is a good idea at first to disable the account in /etc/passwd, after which you can search for the user's files and other references. Once all traces of the user have been cleaned up, you can remove the user completely—but if you remove the entry from /etc/passwd while these other references exist, you have a harder time referring to them .

When you remove a user, it's a good idea to follow a pre-determined course of action so you don't forget any important steps; it may even be a good idea to make a checklist so that you have a routine. Following, you will find several items requiring attention.
Linux

How the One-Liner For-Loop in Bash Goes

Post date: January 6, 2007, 21:01 Category: System Views: 4184 Comments
Tutorial quote: A mini-guide to one of the coolest tricks at the Bash command line - performing the same operation on a whole group of files at once using the "for-do-done" loop syntax.
Linux

ffmpeg Cheat Sheet - 19 Best Practices

Post date: August 12, 2009, 11:08 Category: Benchmarks Views: 5172 Comments
Tutorial quote: ffmpeg is a multiplatform, open-source library for video and audio files. It is usualy available in your distribution repositories, so search for it and install it.

This article will present 19 ffmpeg very useful commands.
Linux

Asterisk : Basic SOHO environment VoIP PABX configuration

Post date: October 30, 2010, 05:10 Category: Installing Views: 3275 Comments
Tutorial quote: Asterisk is a free telephony software. Im posting here sample commented configuration files for reference purposes, hoping they will help you get kickstarted if needed.
Ubuntu

WineXS Simple graphical environment to configure Wine

Post date: August 18, 2009, 10:08 Category: Software Views: 3274 Comments
Tutorial quote: WineXS allows you to easily configure Wine by installing and removing software, editing the registry,managing files, and more.
Ubuntu

Recover Files from a Windows OS with PhotoRec via an Ubuntu Live CD

Post date: January 8, 2011, 23:01 Category: Miscellaneous Views: 3797 Comments
Tutorial quote: This tutorial guides you through recovering data from a crashed drive by using PhotoRec via n Ubuntu Live CD. It is written in plain language.
Web-based applications and online marketing solutions - LumoLink