Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Virtual Users And Domains With Postfix, Courier And MySQL (Fedora 8)

Debian

Giving users a home directory automatically

Post date: June 16, 2006, 21:06 Category: System Views: 3467 Comments
Tutorial quote: If you are using LDAP or NIS to manage users you might discover users having problems because they don't have a home directory on each machine they can connect to. Thankfully there is a simple solution for creating home directories upon demand for users.

The Pluggable Authentication Modules library, or PAM, is a collection of shared libraries which control how users login to systems. There are a number of modules installed which can be used to restrict user access to systems in different ways. There are also several utility modules which can be used to customise login behaviour.
Debian

Chrooted SSH/SFTP Tutorial (Debian Etch)

Post date: September 7, 2007, 22:09 Category: Security Views: 4528 Comments
Tutorial quote: This tutorial describes two ways how to give users chrooted SSH access. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. The users will also be able to use SFTP in their chroot jails.
Fedora

Setting Up A High-Availability Load Balancer With HAProxy/Heartbeat On Fedora 8

Post date: March 2, 2008, 12:03 Category: Installing Views: 4762 Comments
Tutorial quote: This document describes how to set up a two-node load balancer in an active/passive configuration with HAProxy and heartbeat on Fedora 8. The load balancer acts between the user and two (or more) Apache web servers that hold the same content. The load balancer passes the requests to the web servers and it also checks their health. If one of them is down, all requests will automatically be redirected to the remaining web server(s). In addition to that, the two load balancer nodes monitor each other using heartbeat. If the master fails, the slave becomes the master - users will not notice any disruption of the service. HAProxy is session-aware - you can use it with any web application that makes use of sessions like forums, shopping carts, etc.
CentOS

Installing Xen On CentOS 5.2 (i386)

Post date: November 9, 2008, 12:11 Category: Installing Views: 5517 Comments
Tutorial quote: This tutorial provides step-by-step instructions on how to install Xen on a CentOS 5.2 system. Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called virtual machines or domUs, under a host operating system (dom0). Using Xen you can separate your applications into different virtual machines that are totally independent from each other (e.g. a virtual machine for a mail server, a virtual machine for a high-traffic web site, another virtual machine that serves your customers' web sites, a virtual machine for DNS, etc.), but still use the same hardware. This saves money, and what is even more important, it's more secure. If the virtual machine of your DNS server gets hacked, it has no effect on your other virtual machines. Plus, you can move virtual machines from one Xen server to the next one.
CentOS

Virtual Hosting Howto With Virtualmin On CentOS 5.1

Post date: March 4, 2008, 11:03 Category: Installing Views: 5848 Comments
Tutorial quote: This tutorial shows how to set up a CentOS 5.x server to offer all services needed by virtual web hosters. These include web hosting, smtp server with (SMTP-AUTH and TLS, SPF, DKIM, Domainkeys), DNS, FTP, MySQL, POP3/IMAP, Firewall, Webalizer for stats.
Debian

The Perfect Xen 3.0 Setup For Debian

Post date: April 1, 2006, 05:04 Category: System Views: 3225 Comments
Tutorial quote: This tutorial provides step-by-step instructions on how to install Xen (version 3.0.1) on a Debian Sarge (3.1) system.

Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called "virtual machines" or domUs, under a host operating system (dom0). Using Xen you can separate your applications into different virtual machines that are totally independent from each other (e.g. a virtual machine for a mail server, a virtual machine for a high-traffic web site, another virtual machine that serves your customers' web sites, a virtual machine for DNS, etc.), but still use the same hardware. This saves money, and what is even more important, it's more secure. If the virtual machine of your DNS server gets hacked, it has no effect on your other virtual machines. Plus, you can move virtual machines from one Xen server to the next one.
Debian

Restricting Users To SFTP Plus Setting Up Chrooted SSH/SFTP (Debian Squeeze)

Post date: September 6, 2011, 07:09 Category: Miscellaneous Views: 6397 Comments
Tutorial quote: This tutorial describes how to give users chrooted SSH and/or chrooted SFTP access on Debian Squeeze. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. I will also show how to restrict users to SFTP so that they cannot use SSH (this part is independent from the chroot part of this tutorial).
CentOS

Paravirtualization With Xen On CentOS 5.3 (x86_64)

Post date: May 17, 2009, 13:05 Category: Miscellaneous Views: 5399 Comments
Tutorial quote: This tutorial provides step-by-step instructions on how to install Xen (version 3.0.3) on a CentOS 5.3 (x86_64) system. Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called "virtual machines" or domUs, under a host operating system (dom0). Using Xen you can separate your applications into different virtual machines that are totally independent from each other (e.g. a virtual machine for a mail server, a virtual machine for a high-traffic web site, another virtual machine that serves your customers' web sites, a virtual machine for DNS, etc.), but still use the same hardware. This saves money, and what is even more important, it's more secure. If the virtual machine of your DNS server gets hacked, it has no effect on your other virtual machines. Plus, you can move virtual machines from one Xen server to the next one.
Debian

How To Combat Viruses Using Your Postfix Configuration

Post date: September 18, 2006, 14:09 Category: Security Views: 3992 Comments
Tutorial quote: In this guide you will learn how to tweak the HowtoForge mail guide for Postfix (+Auth SMTP + Quota), setup to give better Virus protection.
Debian

Virtualization With Xen On Debian Lenny (AMD64)

Post date: February 8, 2009, 13:02 Category: Installing Views: 3823 Comments
Tutorial quote: This tutorial provides step-by-step instructions on how to install Xen on a Debian Lenny (5.0) system (AMD64). Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called "virtual machines" or domUs, under a host operating system (dom0). Using Xen you can separate your applications into different virtual machines that are totally independent from each other (e.g. a virtual machine for a mail server, a virtual machine for a high-traffic web site, another virtual machine that serves your customers' web sites, a virtual machine for DNS, etc.), but still use the same hardware. This saves money, and what is even more important, it's more secure. If the virtual machine of your DNS server gets hacked, it has no effect on your other virtual machines. Plus, you can move virtual machines from one Xen server to the next one.
Web-based applications and online marketing solutions - LumoLink