Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Version Control with Subversion (Online book)

Linux

Change your Network card MAC ( Media Access Control) address Using macchanger

Post date: January 4, 2007, 20:01 Category: Network Views: 3835 Comments
Tutorial quote: Media Access Control address, a hardware address that uniquely identifies each node of a network. In IEEE 802 networks, the Data Link Control (DLC) layer of the OSI Reference Model is divided into two sublayers: the Logical Link Control (LLC) layer and the Media Access Control (MAC) layer. The MAC layer interfaces directly with the network medium.Consequently, each different type of network medium requires a different MAC layer. On networks that do not conform to the IEEE 802 standards but do conform to the OSI Reference Model, the node address is called the Data Link Control (DLC) address.
Gentoo

Remote Backup Using Flexbackup and SSH

Post date: December 31, 2005, 15:12 Category: Network Views: 8950 Comments
Tutorial quote: I have a server running Gentoo Linux which hosts a Subversion repository, a vpopmail and qmail system, a MySql database and more. I’m going to make a backup copy of the data on this machine in the event that I need to rebuild this server. I have chosen Flexbackup to perform this task.
Ubuntu

Blogging From Ubuntu Using Drivel

Post date: January 4, 2007, 20:01 Category: Desktop Views: 3771 Comments
Tutorial quote: Drivel is a GNOME client for working with online journals, also known as weblogs or simply blogs. It retains a simple and elegant design while providing many powerful features.
Unix+clones

How to build KDE 4

Post date: May 15, 2006, 22:05 Category: Installing Views: 3690 Comments
Tutorial quote: This topic describes how to build KDE 4 from subversion. I use an example way to show best practices. First, I get the build to work for the user kde-devel. This builds as well kdebase as kdelibs (arts is no longer needed). Then, I give some hints how to change code to KDE 4 for the case that you are in another KDE module.
To reduce complexity, we use the bash-shell (standard) throughout the tutorial.
Ubuntu

How to Upgrade to Alsa 1.0.20 on Ubuntu Jaunty 9.04

Post date: August 14, 2009, 18:08 Category: Installing Views: 2416 Comments
Tutorial quote: Advanced Linux Sound Architecture (known by the acronym ALSA) is a Linux kernel component intended to replace the original Open Sound System (OSS) for providing device drivers for sound cards. If you are experiencing sound issues on Ubuntu Jaunty 9.04 or just want the latest version, you may want to upgrade to ALSA 1.0.20 (Ubuntu Jaunty comes with Alsa version 1.0.18rc3 - you can check this by typing this in a terminal: cat /proc/asound/version). Read on!
Linux

Apache2: How To Redirect Users To Mobile Or Normal Web Site Based On Device Using mod_rewrite

Post date: September 9, 2011, 07:09 Category: Miscellaneous Views: 4701 Comments
Tutorial quote: Since the massive rise of smartphones and tablets like the iPhone, iPad, Android phones and tablets, BlackBerries, etc. you might have considered creating a mobile version of your web site. This tutorial explains how to configure Apache to serve the mobile version of your web site if the visitor uses a mobile device, and the normal version if the visitor uses a normal desktop PC. This can be achieved with Apache's rewrite module.
OSX

VNC control of a Mac under OS X 10.4

Post date: December 10, 2005, 08:12 Category: Network Views: 6773 Comments
Tutorial quote: VNC support is built right into Tiger. This means you can remote control you mac from an another mac a PC or even you Palm or Blackberry.

However the functionality is a bit hidden. Here are the simple steps to set it up. Remember this is TIGER not Panther.
Debian

Change your Network card MAC ( Media Access Control) address

Post date: December 4, 2007, 10:12 Category: Network Views: 3722 Comments
Tutorial quote: Media Access Control address, a hardware address that uniquely identifies each node of a network. In IEEE 802 networks, the Data Link Control (DLC) layer of the OSI Reference Model is divided into two sublayers: the Logical Link Control (LLC) layer and the Media Access Control (MAC) layer. The MAC layer interfaces directly with the network medium.Consequently, each different type of network medium requires a different MAC layer. On networks that do not conform to the IEEE 802 standards but do conform to the OSI Reference Model, the node address is called the Data Link Control (DLC) address.

If you want to change your network card mac address you need to use simple utility called mac changer.MAC changer is a utility for manipulating the MAC address of network interfaces
Proxmox+VE

KVM & OpenVZ Virtualization And Cloud Computing With Proxmox VE

Post date: February 17, 2009, 12:02 Category: Installing Views: 20161 Comments
Tutorial quote: Proxmox VE (virtual environment) is a distribution based on Debian Etch (x86_64); it provides an OpenSource virtualization platform for running virtual machines (OpenVZ and KVM) and comes with a powerful, web-based control panel (it includes a web-based graphical console that you can use to connect to the virtual machines). With Proxmox VE, you can even create a cluster of virtualization hosts and create/control virtual machines on remote hosts from the control panel. Proxmox VE also supports live migration of virtual machines from one host to the other. This guide shows how you can use Proxmox VE to control KVM and OpenVZ virtual machines and how to create a small computing cloud with it.
Linux

Three tools to help you configure iptables

Post date: May 25, 2005, 14:05 Category: Network Views: 3717 Comments
Tutorial quote: Every user whose client connects to the Internet should configure his firewall immediately after installation. Some Linux distributions include firewall configuration as a part of installation, often offering a set of defaults configurations to choose from. However, to ensure that your machine presents the minimum "attack surface" (a measure of the number of vulnerable ports, user accounts, and sockets exposed to attack) to the predatory inhabitants of the Internet, you may need to do some manual configuration of your firewall. Here are three tools that can help.
The Linux kernel (version 2.4 onwards) contains a framework for packet filtering and firewalling using netfilter and iptables. Netfilter is a set of hooks inside the Linux kernel that allows kernel modules to register callback functions with the network stack. Iptables is a generic table structure for the definition of rulesets. Each rule within an IP table consists of a number of classifiers (iptables matches) and one connected action (iptables target). Iptables has extensive documentation that can be accessed online or by typing man iptables at the command line. Yet despite the depth of the documentation available for iptables, its complexity can be baffling.
Web-based applications and online marketing solutions - LumoLink