Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Xen Virtualization and Linux Clustering, Part 1

Linux

Three tools to help you configure iptables

Post date: May 25, 2005, 14:05 Category: Network Views: 3470 Comments
Tutorial quote: Every user whose client connects to the Internet should configure his firewall immediately after installation. Some Linux distributions include firewall configuration as a part of installation, often offering a set of defaults configurations to choose from. However, to ensure that your machine presents the minimum "attack surface" (a measure of the number of vulnerable ports, user accounts, and sockets exposed to attack) to the predatory inhabitants of the Internet, you may need to do some manual configuration of your firewall. Here are three tools that can help.
The Linux kernel (version 2.4 onwards) contains a framework for packet filtering and firewalling using netfilter and iptables. Netfilter is a set of hooks inside the Linux kernel that allows kernel modules to register callback functions with the network stack. Iptables is a generic table structure for the definition of rulesets. Each rule within an IP table consists of a number of classifiers (iptables matches) and one connected action (iptables target). Iptables has extensive documentation that can be accessed online or by typing man iptables at the command line. Yet despite the depth of the documentation available for iptables, its complexity can be baffling.
Unix+clones

Backing up your files with rsync

Post date: October 14, 2007, 15:10 Category: Network Views: 4095 Comments
Tutorial quote: Backing up files on a regular basis is an integral part of administering your server.

One way is to download each and every file when you want to save them. However, rsync makes the task a lot easier as it only downloads files that have changed - saving time and bandwidth.
Debian

Monitoring your bandwidth usage with vnstat

Post date: January 14, 2006, 20:01 Category: Network Views: 3411 Comments
Tutorial quote: There are many occasions where it is useful to have an idea of your bandwidth usage, perhaps to know when you're going to be charged more by your ISP, or perhaps just as part of general monitoring. The vnstat tool is a simple means of doing just that.
FreeBSD

Bluetooth Security Review, Part 1

Post date: April 30, 2005, 00:04 Category: Security Views: 3543 Comments
Tutorial quote: Bluetooth (BT) wireless technology provides an easy way for a wide range of devices to communicate with each other and connect to the Internet without the need for wires, cables and connectors. The technology seams to be very interesting and beneficial, yet it can also be a high threat for the privacy and security of Bluetooth users.
Unix+clones

Performance Tuning with GCC, Part 1

Post date: November 26, 2005, 01:11 Category: Optimizing Views: 4203 Comments
Tutorial quote: This article provides an overview of the different flags controlling optimization in GCC and some hints on how to use them to get the most performance out of your application. In particular, it discusses some of the new optimization features of the GCC 4.x series included in Fedora™ Core 4 and the upcoming Red Hat® Enterprise Linux® versions.
Fedora+Core

IPTABLES Explained Part 4: IPTables and Portsentry, the dynamic duo

Post date: January 3, 2007, 10:01 Category: Security Views: 9041 Comments
Tutorial quote: A tutorial that explains on how to make Portsentry and IPTables to work smoothly together on Fedora. This includes the dynamic adding AND the periodic removal of "old" IPs as well as saving your blocked IP lists in case you need to change your IPTables script or reboot.
Ubuntu

Disable unnecessary services in Ubuntu - Boot-Up Manager

Post date: November 17, 2008, 11:11 Category: Optimizing Views: 9563 Comments
Tutorial quote: The startup scripts located in /etc/init.d are part of the bootup sequence of every Debian-like distro. Very often Ubuntu's documentation and guides have suggested - in order to deactivate init scripts - to change the permissions of the scripts in /etc/init.d, making them non-executable.
Linux

Hardening Linux: a 10 step approach to a secure server

Post date: June 22, 2005, 10:06 Category: Security Views: 3984 Comments
Tutorial quote: The Internet has become a far more dangerous place than it was 20 years ago. Nowadays, Operating System and application security is an integral part of a server configuration and, while firewalls are very important, they are not the panacea.

This list of steps is intended as a guideline with a practical approach. We’ll try to provide a complete picture without getting into unnecesary details. This list won’t replace a good book on secure systems administration, but it will be useful as a quick guide.

Before we get started it’s worth to mention that security is not a status: it’s just a process. The correct initial setup of the server only provides a good start and helps you get half the way through. But you actually need to walk the other half of the road, by providing proper security vigilance, monitoring and updating.
Unix+clones

File Transfer Protocol

Post date: April 12, 2005, 18:04 Category: Network Views: 2699 Comments
Tutorial quote: Wake up, you goodness-to-GUI slacksters! It's time to get up and get out of that hammock and put your feet on the ground and your hands on the CLI. This week we're going to talk about data in motion. Taking a file from one place on the network. Putting it someplace else. Most often today some form of FTP, the File Transfer Protocol, is used to do those things. It's been part of the Internet since there was an Internet.
FreeBSD

Using FreeBSD's ACLs

Post date: September 29, 2005, 17:09 Category: Security Views: 3999 Comments
Tutorial quote: Five years ago (gee, has it really been that long?), I wrote a series of articles on understanding Unix permissions. Since then, FreeBSD has implemented something known as ACLs (Access Control Lists).

ACLs came to BSD as part of the TrustedBSD project. As the name suggests, they give a user finer access control over permissions.
Web-based applications and online marketing solutions - LumoLink