Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for screen: Keep Your Processes Running Despite A Dropped Connection

Mandriva

Virtualization With VirtualBox 3.1.x On A Headless Mandriva 2010.0 Server

Post date: March 21, 2010, 12:03 Category: Installing Views: 5201 Comments
Tutorial quote: This guide explains how you can run virtual machines with Sun VirtualBox 3.1.x on a headless Mandriva 2010.0 server. Normally you use the VirtualBox GUI to manage your virtual machines, but a server does not have a desktop environment. Fortunately, VirtualBox comes with a tool called VBoxHeadless that allows you to connect to the virtual machines over a remote desktop connection, so there's no need for the VirtualBox GUI.
SuSe

Xgl on SUSE 10.1 for Gnome and KDE with NVidia Graphics Cards

Post date: May 12, 2006, 13:05 Category: Desktop Views: 4280 Comments
Tutorial quote: Perhaps the most interesting eye-candy introduced to a mainstream Linux distribution is that of the Xgl 3D desktop environment. Naturally, when seen, it fosters the thought, "How can I do that on my own desktop?" I'll be honest with you, it's not quite as point-and-click as some of the other desktop niceties that we've discussed in the past, such as gdesklets or the gkrellm monitors. That in mind, if you're interested in getting Xgl installed and running on your desktop, you've found the right place. We'll take it a bit at a time and make sure we get you set up. First of all, I need to make sure that you are using this tutorial for a machine running either SUSE Linux 10.1 or SUSE Linux Enterprise Desktop 10, and that you have an NVidia video card. With that, let's get going.
Ubuntu

Setting up squid proxy server on Ubuntu (Quick Start Guide)

Post date: October 10, 2010, 05:10 Category: Software Views: 4150 Comments
Tutorial quote: Squid is an internet proxy server that can be used within a network to distribute an internet connection to all the computers within the network. One central computer is connected to the internet through any means such as dial-up, cable modem, ISDN, DSL, or T1, runs squid, and thus acts as the firewall to the internet. Because it is a proxy, it has the capabilities to log all user actions such as the URLs visited. There are many features that can be configured in squid. This guide is meant to be a quick start guide for those who are eager to get squid working and then configure it from there.
OpenSUSE

IPTraf - Console based IP Traffic Monitor in openSUSE

Post date: March 3, 2009, 05:03 Category: Network Views: 6237 Comments
Tutorial quote: IPTraf is a console-based network statistics utility for Linux. It gathers a variety of figures such as TCP connection packet and byte counts, interface statistics and activity indicators, TCP/UDP traffic breakdowns, and LAN station packet and byte counts. IPTraf is an IP traffic monitor that shows information on the IP traffic passing over your network.
Ubuntu

VBoxHeadless - VirtualBox 4.0 On A Headless Ubuntu 11.04 Server

Post date: May 22, 2011, 18:05 Category: Installing Views: 2655 Comments
Tutorial quote: This guide explains how you can run virtual machines with VirtualBox 4.0 on a headless Ubuntu 11.04 server. Normally you use the VirtualBox GUI to manage your virtual machines, but a server does not have a desktop environment. Fortunately, VirtualBox comes with a tool called VBoxHeadless that allows you to connect to the virtual machines over a remote desktop connection, so there's no need for the VirtualBox GUI.
Debian

Creating .deb-Packages With Checkinstall

Post date: April 12, 2005, 17:04 Category: Miscellaneous Views: 2445 Comments
Tutorial quote: Checkinstall is a nice tool to create simple .deb-packages that you can use in your local network (e.g. if you have to install the same piece of software on multiple computers running Debian). It lets you compile and install software from the sources like before, but with the difference that you end up with a simple Debian package which also means that you can easily uninstall the software you just compiled by running dpkg -r!

I will demonstrate the use of checkinstall by compiling and installing the anti-virus software ClamAV on a Debian system.

This howto is meant as a practical guide; it does not cover the theoretical backgrounds. They are treated in a lot of other documents in the web.
Unix+clones

The 'no-configuration, only-active-when-needed' SSH VPN

Post date: April 13, 2005, 03:04 Category: Network Views: 2688 Comments
Tutorial quote: So, we started thinking about how we might set up a VPN between the application server and our internal software mirror. The only requirement is that the VPN be initiated from the "inside-out" and that the connection is only active for as long as we need to use. In other words, it would only be active during an administration session. Ideally, it wouldn't be a lot of work to setup and tear down either.

SSH to the rescue...

Fortunately, SSH client and server come with support for this out of the box, requiring no additional software to be installed, and no configuration changes. On the server side, sshd, the setting "AllowTcpForwarding" defaults to "yes" unless your sshd_config file explicitly disables it. On the client side, all you have to do is request the forwarding.
BSD

Firewalling with OpenBSD's PF packet filter

Post date: April 19, 2005, 02:04 Category: Network Views: 6495 Comments
Tutorial quote: PF operates in a world which consists of packets, protocols, connections and ports.

Based on where a packet is coming from or where it's going, which protocol, connection of port it is designated for, PF is able to determine where to lead the packet, or decide if it is to be let through at all.

It's equally possible to direct network traffic based on packet contents, usually referred to as application level filtering, but this is not the kind of thing PF does. We will come back later to some cases where PF will hand off these kinds of tasks to other software, but first let us deal with some basics.

We've already mentioned the firewall concept. One important feature of PF and similar software, perhaps the most important feature, is that it is able to identify and block traffic which is you do not want to let into your local network or let out to the world outside. At some point the term 'firewall' was coined.
Ubuntu

How To Set Up MySQL Database Replication With SSL Encryption On Ubuntu 9.10

Post date: February 9, 2010, 01:02 Category: Installing Views: 2695 Comments
Tutorial quote: This tutorial describes how to set up database replication in MySQL using an SSL connection for encryption (to make it impossible for hackers to sniff out passwords and data transferred between the master and slave). MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync. This is not a backup policy because an accidentally issued DELETE command will also be carried out on the slave; but replication can help protect against hardware failures.
CentOS

How To Set Up MySQL Database Replication With SSL Encryption On CentOS 5.4

Post date: February 18, 2010, 13:02 Category: Miscellaneous Views: 4397 Comments
Tutorial quote: This tutorial describes how to set up database replication in MySQL using an SSL connection for encryption (to make it impossible for hackers to sniff out passwords and data transferred between the master and slave). MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync. This is not a backup policy because an accidentally issued DELETE command will also be carried out on the slave; but replication can help protect against hardware failures.
Web-based applications and online marketing solutions - LumoLink