Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Creating self signed SSL Certificates Using Openssl

SuSe How to set up the SUSE Linux Virtual I/O Server
Post date: May 27, 2005, 20:05 Category: Network Views: 440
Tutorial quote: Reduce your operation costs for complex environments by creating efficient and flexible virtualisation capabilities. Nigel Griffiths describes the benefits of the IBM® POWER5™ servers and provides examples on how to set up the environment for pSeries®, p5, and eServer™ OpenPower systems.
White+Box The perfect Setup - White Box Linux
Post date: April 15, 2005, 19:04 Category: Installing Views: 76
Tutorial quote: This is a detailed description about the steps to be taken to setup a Linux server based on White Box Linux that offers all services needed by ISPs and hosters (web server (SSL-capable), mail server (with SMTP-AUTH and TLS!), DNS server, FTP server, MySQL server, POP3/IMAP, Quota, Firewall, etc.).

Since White Box Linux is very similar to Red Hat Enterprise Linux this tutorial should also work for Red Hat Enterprise Linux.
Debian Creating an initrd image
Post date: April 15, 2005, 19:04 Category: System Views: 75
Tutorial quote: When I started booting a box with multiple SCSI adapters, I wanted to keep the device ordering sane. I find it’s best when the boot ordering matches the order in which Linux initializes the drivers for each controller. One effective way to handle this under Debian GNU/Linux with one of the stock kernels is to create a custom initrd image.
Linux Easy Linux Network Backup
Post date: April 12, 2005, 19:04 Category: Network Views: 42
Tutorial quote: If you use Linux, you already have access to extremely powerful tools for creating custom backup solutions. The solutions in this article can help you perform simple to more advanced and secure network backups using open source tools that are part of nearly every Linux distribution.
Linux Tuneups and Tweaks for the Better Spam-Trap
Post date: April 14, 2005, 09:04 Category: Network Views: 44
Tutorial quote: In parts 1 and 2 of our thrilling "Building an Anti-Virus/Anti-Spam Gateway" series, we covered the basic steps for setting up SpamAssassin and Clam Anti-virus with Postfix. This installment is devoted to testing and tweaking, and creating whitelists in Amavisd-new. Whitelists are essential when you set up any kind of spam filtering: It's the best way to make sure your wanted mail gets through.
OpenBSD Creating secure wireless access points with OpenBSD and OpenVPN
Post date: December 13, 2005, 13:12 Category: Network Views: 108
Tutorial quote: You know how insecure 802.11x wireless networks are. In this article we'll create an OpenBSD-based secure wireless access point that prevents unauthorized access and encrypts every packet using a VPN tunnel. OpenBSD is one of the most secure operating systems available, is easy to use, and includes almost everything you need for this project in the base installation.
Unix+clones Installing and securing Squid
Post date: March 13, 2006, 10:03 Category: Software Views: 67
Tutorial quote: Squid is a high-performance proxy caching server for web clients, supporting FTP, gopher, and HTTP data objects. Unlike traditional caching software, Squid handles all requests in a single, non-blocking, I/O-driven process. Squid keeps meta data and especially hot objects cached in RAM, caches DNS lookups, supports non-blocking DNS lookups, and implements negative caching of failed requests. Squid supports SSL, extensive access controls, and full request logging. By using the lightweight Internet Cache Protocol, Squid caches can be arranged in a hierarchy or mesh for additional bandwidth savings.

After the installation and base configuration of squid we will add another layer of security by chrooting it.
Debian Loop-AES
Post date: January 25, 2006, 18:01 Category: Security Views: 71
Tutorial quote: This is a step by step tutorial on creating an encrypted partition using Loop-AES (using AES-256). This tutorial is known to work under sarge.

Loop-AES is more secure than dm-crypt (and possibly faster), although it requires a custom kernel module and is more work to install than dm-crypt.
Debian Manipulating the windows upon your desktop
Post date: January 19, 2006, 08:01 Category: Desktop Views: 79
Tutorial quote: If you're like me you'll most likely use a wide variety of desktop applications, and spend a lot of time setting up your desktop first thing in the afternoon when you login. Minimising some applications, setting others up to be visible upon all virtual desktops, etc. Even if you have a basic window manager you can automate this activity using Devil's Pie.

Devil's Pie is a simple utility, inspired by the Sawfish's matched windows option, which allows you to conduct actions upon desktop windows. Using it is a simple matter of creating a configuration file and starting the program when you login.
Debian Creating .deb-Packages With Checkinstall
Post date: April 12, 2005, 13:04 Category: Miscellaneous Views: 48
Tutorial quote: Checkinstall is a nice tool to create simple .deb-packages that you can use in your local network (e.g. if you have to install the same piece of software on multiple computers running Debian). It lets you compile and install software from the sources like before, but with the difference that you end up with a simple Debian package which also means that you can easily uninstall the software you just compiled by running dpkg -r!

I will demonstrate the use of checkinstall by compiling and installing the anti-virus software ClamAV on a Debian system.

This howto is meant as a practical guide; it does not cover the theoretical backgrounds. They are treated in a lot of other documents in the web.