Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Linux tutorials
Linux

Installing Google Desktop On PCLinuxOS 2007 And Ubuntu Feisty Fawn

Post date: July 3, 2007, 23:07 Category: Desktop Views: 2906 Comments
Tutorial quote: This article shows how you can install the Linux version of Google Desktop on a PCLinuxOS 2007 desktop and an Ubuntu Feisty Fawn (Ubuntu 7.04) desktop. Although the program is still marked as beta, Linux users can already search for text inside documents, local email messages, their Web history, and their Gmail accounts.
Linux

TrueCrypt Tutorial: Truly Portable Data Encryption

Post date: July 2, 2007, 23:07 Category: Security Views: 3486 Comments
Tutorial quote: TrueCrypt is a free software that encrypts data on-the-fly. Right now the newest version released is version 4.3. You can create an encrypted hard drive, a separate partition or a directory with TrueCrypt. It does not simply encrypt the content of files, but their names and the names of the directories they are in as well. Moreover there is no way to check the size of the encrypted directory/HDD/partition. TrueCrypt is available for Windows and Linux.
Linux

How To Secure An SSL VPN With One-Time Passcodes And Mutual Authentication

Post date: June 30, 2007, 23:06 Category: Security Views: 3388 Comments
Tutorial quote: SSL-based VPNs were designed to eliminate the need for complex configurations on the user's PC. Unfortunately, that was before the dangers of public WiFi networks and tougher regulatory requirements came into being. Thanks to WiFi, many attacks that were difficult are now quite simple. In particular, a man-in-the-middle attack can intercept SSL-encrypted traffic, rendering SSL-based VPNs useless - even if it is protected by a typical one-time password system. The man-in-the-middle can easily feed the one-time password into the SSL-based VPN within the alloted time.
Linux

Entering A Safe Mirror When Logging In With Unionfs And Chroot

Post date: June 28, 2007, 00:06 Category: Miscellaneous Views: 2581 Comments
Tutorial quote: When reading a hint on the website of LinuxFromScratch I discovered the special capabilities of unionfs, specially in combination with chroot. Later I read a HowTo on a wikiwebsite of Gentoo, about entering a chrooted home directory when using a special script as shell. Combining these two brings me to using a chrooted environment, which you enter when logging in as a special user. This environment is an exact copy (mirror) of the system you are working on. Because you are in safe copy of the real system, you can do whatever you like, it will never change the system, everything stays inside the cache (the readwrite branch).
Linux

Setting Up Postfix As A Backup MX

Post date: June 23, 2007, 01:06 Category: Miscellaneous Views: 3030 Comments
Tutorial quote: In this tutorial I will show how you can set up a Postfix mailserver as a backup mail exchanger for a domain so that it accepts mails for this domain in case the primary mail exchanger is down or unreachable, and passes the mails on to the primary MX once that one is up again.
Linux

How to install MusicPD, Pitchfork and IceCast

Post date: June 22, 2007, 03:06 Category: Multimedia Views: 6207 Comments
Tutorial quote: Music Player Daemon (MPD) allows remote access for playing music (MP3, Ogg Vorbis, FLAC, AAC, Mod, and wave files) and managing playlists. MPD is designed for integrating a computer into a stereo system that provides control for music playback over a local network. Pitchfork on the other hand is a graphical user interface based on Ajax, allowing you to control MPD with your browser.
In this tutorial you'll see how to get them up and running.
Linux

Setting Up A Subversion Repository Using Apache, With Auto Updatable Working Copy

Post date: June 19, 2007, 02:06 Category: Miscellaneous Views: 3054 Comments
Tutorial quote: Subversion is a free/open-source version control system. That is, Subversion manages files and directories over time. A tree of files is placed into a central repository. The repository is much like an ordinary file server, except that it remembers every change ever made to your files and directories. This allows you to recover older versions of your data, or examine the history of how your data changed. In this regard, many people think of a version control system as a sort of time machine.
Linux

Splitting Apache Logs With vlogger

Post date: June 17, 2007, 22:06 Category: Software Views: 3322 Comments
Tutorial quote: Vlogger is a little tool with which you can write Apache logs broken down by virtual hosts and days. With vlogger, we need to put just one CustomLog directive into our global Apache configuration, and it will write access logs for each virtual host and day. Therefore, you do not have to split Apache's overall access log into access logs for each virtual host each day, and you do not have to configure Apache to write one access log per virtual host (which could make you run out of file descriptors very fast).
Linux

Converting All Your MS Outlook PST Files To Maildir Format

Post date: June 14, 2007, 01:06 Category: Miscellaneous Views: 2884 Comments
Tutorial quote: One of the challenges you may face when converting an office from Microsoft Windows to Linux is that many people archive their emails in PST files. There are PST tools available, but most of them are commercial, since the PST file format is closed and protected by Microsoft. There are several non-commercial methods to achieve roughly the same goal, and in this tutorial we use IMAP (more specifically, courier-imap) to convert all our emails from PST to the Maildir format. The advantage of this approach is that you also lay the foundation for a new mail system, with all your old emails already imported the day you switch over.
Linux

Introducing Remo - An Easy Way to Secure an Insecure Online Application with ModSecurity

Post date: June 6, 2007, 23:06 Category: Security Views: 3203 Comments
Tutorial quote: Say you have a nasty application on your Apache webserver that has been installed by some people from the marketing department and you can neither remove nor patch it. Maybe it is a time problem, a lack of know-how, a lack of source-code, or possibly even political reasons. Consequently you need to protect it without touching it. There is ModSecurity, but they say this is only for experts. A straightforward alternative is Remo, a graphical rule editor for ModSecurity that comes with a whitelist approach. It has all you need to lock down the application.
Web-based applications and online marketing solutions - LumoLink