Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Linux tutorials
Linux

Chmod Squad: HOWTO Use Linux File Permissions

Post date: January 6, 2007, 21:01 Category: System Views: 3673 Comments
Tutorial quote: A complete new user's guide to the Linux file permission system, with examples. Be mystified no more by cryptic file permission bits.
Linux

What's up, Doc? A guide to Linux Documentation

Post date: January 6, 2007, 21:01 Category: System Views: 2752 Comments
Tutorial quote: If you're new to Linux, you've probably been told to read the manual, but what good is that advice if you don't know where the manuals are or how to use them? Here, in one place, is complate instructions on how to find and navigate the common Linux documentation systems, including man, info, READMEs, HOWTOs, HTML, PDF/PS, DocBook, Gnome and KDE help system, and command-line option conventions. The guide I wish I'd had when I was new to Linux!
Linux

Directory Directions...a Guide to the Linux File System

Post date: January 6, 2007, 21:01 Category: System Views: 3171 Comments
Tutorial quote: Ever wonder what those short Linux file system folders mean and what they contain? A little tour with easy directions explains all here.
Linux

Change your Network card MAC ( Media Access Control) address Using macchanger

Post date: January 4, 2007, 20:01 Category: Network Views: 3113 Comments
Tutorial quote: Media Access Control address, a hardware address that uniquely identifies each node of a network. In IEEE 802 networks, the Data Link Control (DLC) layer of the OSI Reference Model is divided into two sublayers: the Logical Link Control (LLC) layer and the Media Access Control (MAC) layer. The MAC layer interfaces directly with the network medium.Consequently, each different type of network medium requires a different MAC layer. On networks that do not conform to the IEEE 802 standards but do conform to the OSI Reference Model, the node address is called the Data Link Control (DLC) address.
Linux

Tunneling MySQL connections through SSH

Post date: January 2, 2007, 20:01 Category: Security Views: 3377 Comments
Tutorial quote: This is a description of how to set up a secure tunnel between your MySQL Server and a locally running MySQL Administrator using Putty. By creating a secure tunnel to your MySQL server using Putty, you can grant localhost access to powerful applications like MySQL Administrator while at the same time, make your server appear as if it isn't even there. In effect, make your MySQL server disappear from the outside world.
Linux

How to restore deleted file on ext2

Post date: December 15, 2006, 19:12 Category: System Views: 2946 Comments
Tutorial quote: This text describes the steps needed do recover the data of a file that was recently deleted.
Linux

Accessing Windows Or Samba Shares Using AutoFS

Post date: December 14, 2006, 20:12 Category: Network Views: 3846 Comments
Tutorial quote: You already installed Linux on your networked desktop PC and now you want to work with files stored on some other PCs in your network. This is where autofs comes into play. This tutorial shows how to configure autofs to use CIFS to access Windows or Samba shares from Linux Desktop PCs. It also includes a tailored configuration file.
Linux

screen: Keep Your Processes Running Despite A Dropped Connection

Post date: December 12, 2006, 20:12 Category: System Views: 2695 Comments
Tutorial quote: I guess you all know this: you are connected to your server with SSH and in the middle of compiling some software (e.g. a new kernel) or doing some other task which takes lots of time, and suddenly your connection drops for some reason, and you lose your labour. This can be very annoying, but fortunately there is a small utility called screen which lets you reattach to a previous session so that you can finish your task. This short tutorial shows how to use screen for just this purpose.
Linux

Key-Based SSH Logins With PuTTY

Post date: December 10, 2006, 20:12 Category: Security Views: 3397 Comments
Tutorial quote: This guide describes how to generate and use a private/public key pair to log in to a remote system with SSH using PuTTY. PuTTY is an SSH client that is available for Windows and Linux (although it is more common on Windows systems). Using key-based SSH logins, you can disable the normal username/password login procedure which means that only people with a valid private/public key pair can log in. That way, there is no way for brute-force attacks to be successful, so your system is more secure.
Linux

Postfix with dkfilter (DomainKeys Implementation)

Post date: December 7, 2006, 21:12 Category: Security Views: 3981 Comments
Tutorial quote: DomainKeys is an anti-spam software application in development at Yahoo that uses a form of public key cryptography to authenticate the sender's domain. dkfilter is an SMTP-proxy designed for Postfix. It implements DomainKeys message signing and verification. It comprises two separate filters, an outbound filter for signing outgoing email on port 587, and an inbound filter for verifying signatures of incoming email on port 25. This document shows step-by-step how to install dkfilter for Postfix to deploy DomainKeys signing and verification.
Web-based applications and online marketing solutions - LumoLink