Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Using multiple network cards in XEN

Unix+clones

Two-in-one DNS server with BIND9

Post date: April 1, 2006, 05:04 Category: Software Views: 4629 Comments
Tutorial quote: This tutorial shows you how to configure BIND9 DNS server to serve an internal network and an external network at the same time with different set of information. To accomplish that goal, a new feature of BIND9 called view is used. As a tutorial it'll walk you through the whole set up, but initial knowledge of BIND and DNS is required, there are plenty of documents that cover that information on the Internet.
Unix+clones

Easy Automated Snapshot-Style Backups with Linux and Rsync

Post date: February 1, 2006, 00:02 Category: Software Views: 3686 Comments
Tutorial quote: This document describes a method for generating automatic rotating "snapshot"-style backups on a Unix-based system, with specific examples drawn from the author's GNU/Linux experience. Snapshot backups are a feature of some high-end industrial file servers; they create the illusion of multiple, full backups per day without the space or processing overhead. All of the snapshots are read-only, and are accessible directly by users as special system directories. It is often possible to store several hours, days, and even weeks' worth of snapshots with slightly more than 2x storage. This method, while not as space-efficient as some of the proprietary technologies (which, using special copy-on-write filesystems, can operate on slightly more than 1x storage), makes use of only standard file utilities and the common rsync program, which is installed by default on most Linux distributions. Properly configured, the method can also protect against hard disk failure, root compromises, or even back up a network of heterogeneous desktops automatically.
Linux

Setting Up Subversion for One or Multiple Projects

Post date: April 13, 2005, 00:04 Category: Miscellaneous Views: 4592 Comments
Tutorial quote: Deploying a secure and manageable Subversion installation that uses Apache 2.0 as a central authentication checkpoint and SSL for data integrity and confidentiality.
Untangle

Spam Blocking And Web Filtering With The Untangle 5.3 Network Gateway

Post date: September 4, 2008, 10:09 Category: Security Views: 8411 Comments
Tutorial quote: Untangle bundles common open-source applications for blocking spam, spyware, viruses, adware and unwanted content on the network in one single Linux distribution. It can be integrated into existing networks either as a router or as a transparent bridge (directly behind the router, but before the switch that connects the client PCs with the router). The best thing about Untangle is that you do not have to reconfigure the client PCs - Untangle works out of the box.
Ubuntu

Kismet An 802.11 wireless network detector, sniffer, and intrusion detection system

Post date: September 2, 2009, 13:09 Category: Software Views: 4246 Comments
Tutorial quote: Kismet is a 802.11b wireless network sniffer. It is capable of sniffing using almost any supported wireless card using the Airo, HostAP, Wlan-NG, and Orinoco (with a kernel patch) drivers.Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence of nonbeaconing networks via data
traffic.
Ubuntu

Create a LAN for Virtual Servers with KVM and VDE

Post date: November 11, 2008, 19:11 Category: System Views: 4388 Comments
Tutorial quote: You have one host [ hoster ] running KVM on UBUNTU with 1 network interface accessing to internet.You want to have 2 debian etch virtual servers [ guest ] ( debian01 and debian02 ) running on your hoster with network access between them and hoster in a local LAN. In this case virtual servers will not be able to access to internet, but later I will explain how to do it.
Linux

How To Modify Your Gnu/Linux Box To Serve As A USB Over IP Server

Post date: January 7, 2010, 13:01 Category: Installing Views: 3393 Comments
Tutorial quote: There was a long time that I was looking for a way to put away my old CRM server! But why? Because I had installed a virtualization environment with Xen and all my servers are turned to small VPS on a nice pretty infrastructure. The base point was that the CRM had a USB/Lock and there was no way to take the lock under a virtualized VPS. This tutorial shows how you can set up a USB-over-IP server.
Unix+clones

A web server in a shell script

Post date: March 14, 2006, 08:03 Category: Programming Views: 17149 Comments
Tutorial quote: Suppose you want to experiment a little with web pages and CGI's, but you don't want the hassle of installing the full Apache package. This quick and dirty shell script could just be what you need.

Put simply, a web server is an application that sends local text files over the network to the clients that request them. If you let another program (for example inetd) deal with the network part, the web server could be reduced to a mere cat "$filename" to stdout. Of course, the difficult part would be to extract that filename out of the HTTP request string: nothing that a Bash script cannot easily do!
Ubuntu

Enable WPA Wireless access point in Ubuntu

Post date: February 15, 2007, 01:02 Category: Network Views: 5125 Comments
Tutorial quote: I have a Thoshiba laptop at home, I was running “Edgy Eft” (Ubuntu Linux 6.10) But one of the important things about it was its inability to connect to WPA-encrypted Wifi access points.In my home i have a WPA Enabled Wireless router so i need to connect to my wireless network using WPA.I am giving the procedure that worked for me to enable wpa in my toshiba laptop.This will work most of ubuntu users who is trying to access WPA network.
Ubuntu

Setting up squid proxy server on Ubuntu (Quick Start Guide)

Post date: October 10, 2010, 05:10 Category: Software Views: 5092 Comments
Tutorial quote: Squid is an internet proxy server that can be used within a network to distribute an internet connection to all the computers within the network. One central computer is connected to the internet through any means such as dial-up, cable modem, ISDN, DSL, or T1, runs squid, and thus acts as the firewall to the internet. Because it is a proxy, it has the capabilities to log all user actions such as the URLs visited. There are many features that can be configured in squid. This guide is meant to be a quick start guide for those who are eager to get squid working and then configure it from there.
Web-based applications and online marketing solutions - LumoLink