Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Using Steghide to Hide your Data Crypticly


Optimizing C/C++ programs using the GProf profiler

Post date: May 24, 2005, 18:05 Category: Optimizing Views: 7549 Comments
Tutorial quote: One of the most important things to keep in mind while optimizing an application is: optimize where it counts. It is no use to spend hours optimizing a piece of code that usually runs for only 0.04 seconds anyway.

GProf provides a surprisingly easy way to profile your C/C++ application and spot the interesting pieces right away. A small case study shows how GProf was used to reduce the running time of a real-world application from over 3 minutes to under 5 seconds, by identifying 2 data structures as important and optimizing those.

Historically, the program goes back as far as 1982, when it was introduced on the the SIGPLAN Symposium on Compiler Construction. It is now a standard tool available on virtually all flavors of UNIX.


Post date: January 25, 2006, 22:01 Category: Security Views: 4892 Comments
Tutorial quote: Device-mapper is a new infrastructure in the Linux 2.6 kernel that provides a generic way to create virtual layers of block devices that can do different things on top of real block devices like striping, concatenation, mirroring, snapshotting, etc... The device-mapper is used by the LVM2 and EVMS 2.x tools. dm-crypt is such a device-mapper target that provides transparent encryption of block devices using the new Linux 2.6 cryptoapi. Writes to this device will be encrypted and reads decrypted. You can mount your filesystem on it as usual. But without the key you can't access your data. It does basically the same as cryptoloop only that it's a much cleaner code and better suits the need of a block device and has a more flexible configuration interface. The on-disk format is also compatible.

Tools to access Linux Partitions from Windows

Post date: April 13, 2008, 20:04 Category: Miscellaneous Views: 4052 Comments
Tutorial quote: If you dual boot with Windows and Linux, and have data spread across different partitions on Linux and Windows, you should be really in for some issues.

It happens sometimes you need to access your files on Linux partitions from Windows, and you realize it isn’t possible easily. Not really, with these tools in hand - it’s very easy for you to access files on your Linux partitions from Windows.

Striping Across Four Storage Nodes With GlusterFS On Ubuntu 9.10

Post date: January 28, 2010, 13:01 Category: Installing Views: 2980 Comments
Tutorial quote: This tutorial shows how to do data striping across four single storage servers (running Ubuntu 9.10) with GlusterFS. The client system (Ubuntu 9.10 as well) will be able to access the storage as if it was a local filesystem. GlusterFS is a clustered file-system capable of scaling to several peta-bytes. It aggregates various storage bricks over Infiniband RDMA or TCP/IP interconnect into one large parallel network file system. Storage bricks can be made of any commodity hardware such as x86_64 servers with SATA-II RAID and Infiniband HBA.

Embedding Python In Apache2 With mod_python (Debian/Ubuntu, Fedora/CentOS, Mandriva, OpenSUSE)

Post date: July 22, 2008, 09:07 Category: Installing Views: 3942 Comments
Tutorial quote: This tutorial shows how to install and use mod_python on various distributions (Debian/Ubuntu, Fedora/CentOS, Mandriva, OpenSUSE) with Apache2. mod_python is an Apache module that embeds the Python interpreter within the server. It allows you to write web-based applications in Python that will run many times faster than traditional CGI and will have access to advanced features such as ability to retain database connections and other data between hits and access to Apache internals.

Creating Encrypted FTP Backups With duplicity And ftplicity On Debian Etch

Post date: December 18, 2007, 12:12 Category: Miscellaneous Views: 3894 Comments
Tutorial quote: When you rent a dedicated server nowadays, almost all providers give you FTP backup space for your server on one of the provider's backup systems. This tutorial shows how you can use duplicity and ftplicity to create encrypted (so that nobody with access to the backup server can read sensitive data in your backups) backups on the provider's remote backup server over FTP. ftplicity is a duplicity wrapper script (provided by the German computer magazine c't) that allows us to use duplicity without interaction (i.e., you do not have to type in any passwords).

Install and Configure Auth Shadow on Debian/Ubuntu

Post date: February 23, 2007, 18:02 Category: Miscellaneous Views: 4265 Comments
Tutorial quote: Auth Shadow or mod-auth-shadow is a module for apache (and apache2, sort of) that enables authentication against /etc/shadow. The benefits being that any system user with a password can be authenticated for web_dav, subversion or simply an https server. The only other way to do this is with PAM. That method is dangerous because the apache user (www-data in my case) must be able to read /etc/shadow. Obviously, not a good idea. Auth Shadow accomplishes this safely by using a intermediate program called validate. This works because validate can be owned by root but executable by everyone. In the event that your server is compromised through apache, your password file will not be readable.

Generating Web Site Statistics With AWStats & JAWStats On Debian Lenny

Post date: June 27, 2010, 20:06 Category: Miscellaneous Views: 5482 Comments
Tutorial quote: This tutorial explains how you can generate statistics for your web site with AWStats and JAWStats on a Debian Lenny web server. AWStats is a free powerful and featureful tool that generates advanced web server statistics. JAWStats runs in conjunction with AWStats and produces clear and informative charts, graphs and tables about your website visitors. AWStats is able to create graphical web pages for the statistics, but JAWStats presents this data in a much nicer way - it's much better organized and makes use of Ajax and Flash.

Automating Perl Database Applications

Post date: May 1, 2005, 17:05 Category: Programming Views: 3794 Comments
Tutorial quote: This article describes how Perl is used to generate Perl CGI code using the multi-platform CGIScripter application. The resulting output code automates SQL table creation commands (in this example, for a MySQL database), HTML pages and Perl code. Web security issues, data validation and image handling functionality are incorporated into the resulting Perl code. By automating the development of Perl CGI scripts, even entry-level developers can create CGI scripts that contain most of the commonly requested features in a short period of time--without manually writing any code.

Manage Your Mobile Phone With Wammu Via Bluetooth On Fedora 8

Post date: November 27, 2007, 10:11 Category: Hardware Views: 7295 Comments
Tutorial quote: This document describes how to manage your mobile phone with Wammu via bluetooth on Fedora 8. Depending on the manufacturer and model of your mobile phone, you will be able to retrieve your contacts (SIM & phone), calls, messages, todos, calendar and system information. You can also create contacts, events, todos and messages or manage data backups. In addition you can use the bluetooth manager to access your mobile phone like a standard storage media or use the Gnome phone manager for realtime messaging.
Web-based applications and online marketing solutions - LumoLink