Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Unix clones tutorials
Unix+clones

How to write really small TCP/IP stacks

Post date: April 20, 2005, 10:04 Category: Programming Views: 2923 Comments
Tutorial quote: Writing really small TCP/IP stacks and making them withstand slashdottings.
Unix+clones

Considerations for the system architect: Performance

Post date: April 20, 2005, 10:04 Category: Miscellaneous Views: 2845 Comments
Tutorial quote: For many developers and engineers, performance is often an afterthought. But when a product functions as designed and has proven stability and the right feature mix, success in the marketplace often depends upon performance. Architectural decisions define the ultimate feasible performance of any product. In this article, learn how performance-monitoring technology initially developed for mainframes can help you improve your own code's performance.
Unix+clones

SSH Port Forwarding Through a Proxy Server

Post date: April 18, 2005, 03:04 Category: Network Views: 2515 Comments
Tutorial quote: A common use of SSH is port forwarding (tunneling). This use causes traffic directed to a particular port to be sent to a specified port on another computer. Because traffic is sent through SSH, the traffic is encrypted, allowing the transmission of sensitive data through arbitrary services.
Unix+clones

How to securely send and retrieve your mail via SSH

Post date: April 18, 2005, 00:04 Category: Network Views: 2137 Comments
Tutorial quote: SSH allows you to create an encrypted network tunnel between your machine and other network. This document will show you how to set up this tunnel and then use it to securely send and retrieve your mail.
Unix+clones

DNS Common Abuses

Post date: April 17, 2005, 09:04 Category: Security Views: 2369 Comments
Tutorial quote: In paper I have present several features of DNS to make the reader familiar with the basics of the Domain Name System. I have also covered several well known and wide spread attacks that are used to exploit DNS. These attacks are by no means theoretical. In truth they grow more and more common as attackers become more sophisticated. The suggested defense methods outlined at the end of each section cover only the basic recommendations that can be used to thwart attackers.
Unix+clones

Introduction to Python

Post date: April 17, 2005, 09:04 Category: Programming Views: 2828 Comments
Tutorial quote: Ok, first part is going to be fairly boring, but put up with it. Im just going to go through a few reasons why you should choose Python as a language to learn. First off it free!, there is no cost involved in gettin Python, although there is a license, but this is just a standard license that goes with all free and open source software. Python is an open source language, as is the interpreter (Python is written in C).
Unix+clones

How to Use GIMP for Photo and Image Editing

Post date: April 16, 2005, 00:04 Category: Software Views: 2512 Comments
Tutorial quote: In today's hands-on tutorial, you will learn how to apply The GIMP's powerful layer and pattern tools to put a frame or border around a digital photo or digital image by editing a photograph in our digital darkroom. It's a simple application of what you already have learned in our Gimp tutorial series about using the Gimp's layer and pattern tools.
Unix+clones

SpamAssassin, ClamAV and Procmail Howto

Post date: April 16, 2005, 00:04 Category: Network Views: 2918 Comments
Tutorial quote: This document describes how to install SpamAssassin (for filtering SPAM) and ClamAV (for filtering viruses, trojans, worms, etc.) and how to invoke them by using procmail recipes. It is suitable for scenarios where Sendmail or Postfix deliver emails to local users. It should work (maybe with slight changes concerning paths etc.) on all *nix operating systems. I tested it on Debian Woody so far.

In the end you will have a system where Sendmail or Postfix deliver emails to a local user; the emails are passed to procmail which invokes SpamAssassin and ClamAV in order to filter the emails before they arrive in the user's inbox. However, the installation of Sendmail and Postfix are not covered in this document.

This howto is meant as a practical guide.
Unix+clones

Using the GNU Privacy Guard

Post date: April 16, 2005, 00:04 Category: Software Views: 2389 Comments
Tutorial quote: Tonight we will investigate the gnupg utility (version 1.07). I will be running it on an OpenBSD 3.2 system but, as usual, any unix-like system should not display any significant differences. I will assume that GPG is already installed.

The GNU Privacy Guard can be regarded as a complete replacement for the popular PGP (Pretty Good Privacy) software. The difference between the two is that GnuPG does not have any licensing restrictions and it also runs on more platforms. They are both open source products. Although owned by a commercial entity, a freeware version of PGP is available (although only for Windows and Macintosh).

In a nutshell, what all this software does is allow two parties to communicate securely. This implies the following:
- the message has arrived at its destination unaltered
- the message can only be read by its intended recipient
- the authenticity of the sender has been verified by the recipient
Unix+clones

Screen: an introduction and beginner's tutorial

Post date: April 15, 2005, 23:04 Category: Software Views: 2512 Comments
Tutorial quote: Most modern Unix-based operating systems (e.g. Linux, MacOS X, and BSD) come with a little console-mode utility called GNU Screen. It's a powerful tool in the hands of the console warrior, a veritable Swiss Army knife of text-mode human-computer interaction.

This utility, despite its considerable usefulness, goes unused by a great many people. Why is this? Few people even know it's there, and those that do rarely understand the problem it solves. In this article, I will explain what screen does for you, and provide a simple set of instructions for accomplishing basic tasks using screen. My audience is those that are skilled with the command line but who have little or no experience with screen itself.
Web-based applications and online marketing solutions - LumoLink