Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for screen: Keep Your Processes Running Despite A Dropped Connection

Debian

How To Set Up Software RAID1 On A Running System (Incl. GRUB Configuration) (Debian Etch)

Post date: November 29, 2007, 11:11 Category: Installing Views: 3116 Comments
Tutorial quote: This guide explains how to set up software RAID1 on an already running Debian Etch system. The GRUB bootloader will be configured in such a way that the system will still be able to boot if one of the hard drives fails (no matter which one).
Ubuntu

How to Set up Network Bonding in Ubuntu 6.10

Post date: February 16, 2007, 22:02 Category: Network Views: 5554 Comments
Tutorial quote: Network Bonding, otherwise known as port trunking allows you to combine multiple network ports into a single group, effectively aggregating the bandwidth of multiple interfaces into a single connection. For example, you can aggregate two gigabyte ports into a two-gigabyte trunk port. Bonding is used primarily to provide network load balancing and fault tolerance.
Ubuntu

Monitoring Network Latency With Smokeping (Ubuntu 9.04)

Post date: July 16, 2009, 11:07 Category: Installing Views: 7574 Comments
Tutorial quote: This guide shows how to install and configure Smokeping on Ubuntu 9.04 to monitor network latency. SmokePing is a deluxe latency measurement tool. It can measure, store and display latency, latency distribution and packet loss. SmokePing uses RRDtool to maintain a longterm data-store and to draw pretty graphs, giving up to the minute information on the state of each network connection.
Debian

How To Set Up Software RAID1 On A Running LVM System (Debian Squeeze)

Post date: June 15, 2011, 09:06 Category: Miscellaneous Views: 2147 Comments
Tutorial quote: This guide explains how to set up software RAID1 on an already running LVM system (Debian Squeeze). The GRUB2 bootloader will be configured in such a way that the system will still be able to boot if one of the hard drives fails (no matter which one).
Linux

VMware and Xen Management with BixData

Post date: November 16, 2006, 20:11 Category: System Views: 3374 Comments
Tutorial quote: BixData is a system, application, and network monitoring tool which allows you to easily monitor nearly every aspect of your servers. The newly released version 2.6 is the only application that has the ability to control both Xen and VMware virtual machines. You can control both VM Hosts (the computer that's running the VM software) and VM Guests (the virtual machines running on the hosts).
Unix+clones

Configuring Apache - Don't Succumb To The "Slashdot Effect"

Post date: January 31, 2006, 03:01 Category: Optimizing Views: 3841 Comments
Tutorial quote: Like many techno-geeks I host my LAMP website on a cheap ($150) computer and my broadband connection. I have also wondered what would happen if my site was linked on Slashdot or Digg. Specifically, would my setup be able to survive the "Slashdot Effect?" A Pentium 100mhz can easily saturate a T1's worth of bandwidth and my upload speed is capped (supposedly) at 384kbps, so the server should easily be able to handle that. My bandwidth will be saturated before the server is incapacitated, at least that's the idea.
Linux

Backing Up and Restoring Using the cpio Command in Linux and Unix

Post date: May 26, 2006, 18:05 Category: System Views: 2696 Comments
Tutorial quote: The cpio command is one of the most commonly used Linux back up tools.

The cpio command has two unusual features

Unlike tar , in which the files to back up are typed in as part of the command, cpio reads the files to work with from the standard input (in other words, the screen).

This feature means that cpio must be used as part of a multiple command or with a redirection pipe. Examples of this usage are shown in the tables below.

cpio must always be used with one of three flags. Flags are options that set the mode in which the command runs. Only one flag can be used at a time, and it must come before any other options. In addition, the choice of flags limits the options that can be used. Each flag also has a gnu option that can used in its place. The gnu option gives a convenient name for each flag: extract, create, and pass- through.
Unix+clones

Execute Commands on Multiple Linux or UNIX Servers part II

Post date: December 28, 2005, 10:12 Category: System Views: 3293 Comments
Tutorial quote: I have already covered how to execute commands on multiple Linux or UNIX servers via shell script. The disadvantage of script is commands do not run in parallel on all servers. However, several tools exist to automate this procedure in parallel. With the help of tool called tentakel, you run distributed command execution. It is a program for executing the same command on many hosts in parallel using ssh (it supports other methods too). Main advantage is you can create several sets of servers according requirements. For example webserver group, mail server group, home servers group etc. The command is executed in parallel on all servers in this group (time saving). By default, every result is printed to stdout (screen). The output format can be defined for each group.
Linux

Removing A User

Post date: April 8, 2006, 00:04 Category: System Views: 3929 Comments
Tutorial quote: Employee turnover in most organizations runs high. So unless you run a small shop with a stable user base, you need to learn how to clean up after an employee leaves. Too many so-called system administrators do not understand the stakes involved when they manage users. Disgruntled former employees can often cause significant trouble for a company by gaining access to the network.

To remove a user, you need to learn to manage all of his or her files, mailboxes, mail aliases, print jobs, recurring –(automatic) personal processes such as the backing up of data or remote syncing of directories, and other references to the user. It is a good idea at first to disable the account in /etc/passwd, after which you can search for the user's files and other references. Once all traces of the user have been cleaned up, you can remove the user completely—but if you remove the entry from /etc/passwd while these other references exist, you have a harder time referring to them .

When you remove a user, it's a good idea to follow a pre-determined course of action so you don't forget any important steps; it may even be a good idea to make a checklist so that you have a routine. Following, you will find several items requiring attention.
Debian

How To Set Up Software RAID1 On A Running LVM System (Incl. GRUB Configuration) (Debian Etch)

Post date: March 25, 2008, 10:03 Category: System Views: 3185 Comments
Tutorial quote: This guide explains how to set up software RAID1 on an already running LVM system (Debian Etch). The GRUB bootloader will be configured in such a way that the system will still be able to boot if one of the hard drives fails (no matter which one).
Web-based applications and online marketing solutions - LumoLink