Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Using extended attributes to better protect files

Debian

Run Your Own Webradio Station With Icecast2 And Ices2

Post date: February 18, 2007, 20:02 Category: Multimedia Views: 4756 Comments
Tutorial quote: This tutorial describes how to set up an audio streaming server with Icecast2. In order that Icecast2 can stream audio to listeners we install Ices2. Ices2 is a program that sends audio data to an Icecast2 server to broadcast to clients. Ices2 can either read audio data from disk (Ogg Vorbis files), or sample live audio from a sound card and encode it on the fly. In this article we will let Ices2 read .ogg files from the local hard disk.
Debian

Mounting Remote Directories With SSHFS On Debian Squeeze

Post date: September 22, 2011, 10:09 Category: Miscellaneous Views: 4138 Comments
Tutorial quote: This tutorial explains how you can mount a directory from a remote server on the local server securely using SSHFS. SSHFS (Secure SHell FileSystem) is a filesystem that serves files/directories securely over SSH, and local users can use them just as if the were local files/directories. On the local computer, the remote share is mounted via FUSE (Filesystem in Userspace). I will use Debian Squeeze for both the local and the remote server.
Debian

Version Control For Your /etc Directory With etckeeper/Bazaar On Debian Squeeze

Post date: July 17, 2011, 18:07 Category: Miscellaneous Views: 2472 Comments
Tutorial quote: This tutorial explains how you can store the contents of your /etc directory in a version control system (VCS) with the help of etckeeper on Debian Squeeze. etckeeper hooks into Debian's package manager apt so that whenever you install/remove a package with apt, etckeeper will commit all changes to the /etc directory to your VCS; it also tracks file metadata such as permissions which is important for files such as /etc/shadow. Using etckeeper, you can go back to a previous version of /etc if an update has overwritten valuable configuration files. Not only will etckeeper track apt's changes to /etc, it will also do a daily auto-commit so that your manual changes go to VCS as well; in addition to that, you can do commits at any time manually.
Ubuntu

Furius ISO Mount - Mount and Unmount ISO images with GUI Tool in Ubuntu Linux

Post date: August 31, 2008, 17:08 Category: Desktop Views: 3204 Comments
Tutorial quote: An ISO, IMG, BIN, MDF and NRG Image management utility for the Gnome Desktop Environment. Furius ISO Mount

Features
* Automatically Mounts ISO, IMG, BIN, MDF and NRG Image Files.
* Automatically creates a mount point in your home directory.
* Automatically Unmounts the Image files.
* Automatically removes the mount directory to return your home directory to its previous state.
Linux

Backing Up and Restoring Using the cpio Command in Linux and Unix

Post date: May 26, 2006, 18:05 Category: System Views: 2722 Comments
Tutorial quote: The cpio command is one of the most commonly used Linux back up tools.

The cpio command has two unusual features

Unlike tar , in which the files to back up are typed in as part of the command, cpio reads the files to work with from the standard input (in other words, the screen).

This feature means that cpio must be used as part of a multiple command or with a redirection pipe. Examples of this usage are shown in the tables below.

cpio must always be used with one of three flags. Flags are options that set the mode in which the command runs. Only one flag can be used at a time, and it must come before any other options. In addition, the choice of flags limits the options that can be used. Each flag also has a gnu option that can used in its place. The gnu option gives a convenient name for each flag: extract, create, and pass- through.
Unix+clones

Python Programming for Beginners

Post date: September 19, 2006, 09:09 Category: Programming Views: 44043 Comments
Tutorial quote: Despite what assembly code and C coders might tell us, high-level languages do have their place in every programmer's toolbox, and some of them are much more than a computer-science curiosity. Out of the many high-level languages we can choose from today, Python seems to be the most interesting for those who want to learn something new and do real work at the same time. Its no-nonsense implementation of object-oriented programming and its clean and easy-to-understand syntax make it a language that is fun to learn and use, which is not something we can say about most other languages.

In this tutorial, you will learn how to write applications that use command-line options, read and write to pipes, access environment variables, handle interrupts, read from and write to files, create temporary files and write to system logs. In other words, you will find recipes for writing real applications instead of the old boring Hello, World! stuff.
Unix+clones

How To Configure E 16.7.x

Post date: October 9, 2005, 18:10 Category: Software Views: 2833 Comments
Tutorial quote: This file documents the configuration files used in Enlightenment 16.7.x but may not match 100% with earlier or later versions. This is a work in progress and will be updated as I learn more and have the time.
Linux

Sawing Linux Logs with Simple Tools

Post date: April 14, 2005, 12:04 Category: Security Views: 2708 Comments
Tutorial quote: So there you are with all of your Linux servers humming along happily. You have tested, tweaked, and configured until they are performing at their peak of perfection. Users are hardly whining at all. Life is good. You may relax and indulge in some nice, relaxing rounds of TuxKart. After all, you earned it.

Except for one little remaining chore: monitoring your log files. [insert horrible alarming music of your choice here.] You're conscientious, so you know you can't just ignore the logs until there's a problem, especially for public services like Web and mail. Somewhere up in the pointy-haired suites, they may even be plotting to require you to track and analyze all sorts of server statistics.

Not to worry, for there are many ways to implement data reduction, which is what log parsing is all about. You want to slice and dice your logs to present only the data you're interested in viewing. Unless you wish to devote your entire life to manually analyzing log files. Even if you only pay attention to logfiles when you're debugging a problem, having some tools to weed out the noise is helpful.
Unix+clones

Fileschanged

Post date: September 25, 2007, 18:09 Category: Software Views: 3319 Comments
Tutorial quote: Fileschanged is a GNU/Linux command-line utility that reports when files have been altered.
Linux

Creating a safe directory with PAM and Encfs

Post date: June 7, 2006, 20:06 Category: Security Views: 3154 Comments
Tutorial quote: Now, in my network (and others) the credentials provided at login could (and should) be used by those programs. How can you retrieve these credentials, providing enough security?
With a the PAM modules pam_script it's possible to store the password in a file, which will be used by fusemb and mount.cifs to read the password from.

To achieve security, one could make the user logging in owner and deny read/write for anybody else. Remove this file when the user ends his/her session.
This is enough, for runtime. But I was wondering, but what if the system crashes, and the file with the credentials remains on the harddrive? Anybody who is able to mount this harddrive with for example a lifecd, can read this file!

That's why I was looking for a way to encrypt this file.

With encfs this is very possible! At run time it gives an interface to encrypted files and directories, which does only exist at runtime! When the system is not running, there are only encrypted files, useless when you do not know the key to it. And this key is exactly the (encrypted) password! That's why I've chosen for a combination of PAM and Encfs.
Web-based applications and online marketing solutions - LumoLink