Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Centralized Syslog Server Using syslog-NG

Unix+clones Tunneling SSH over HTTP(S)
Post date: March 12, 2006, 04:03 Category: Network Views: 54
Tutorial quote: This document explains how to set up an Apache server and SSH client to allow tunneling SSH over HTTP(S). This can be useful on restricted networks that either firewall everything except HTTP traffic (tcp/80) or require users to use a local (HTTP) proxy.
Unix+clones Postfix performance tuning
Post date: May 21, 2005, 07:05 Category: Optimizing Views: 82
Tutorial quote: Postfix is fast out of the box, but like other packages, you can usually tune it to work even faster. Furthermore, there are situations where Postfix may not perform as well as you expected, whether because of hardware or software limitations on the server system or other adverse conditions, such as a big influx of spam or undeliverable mail. This article shows you how to find and analyze the most common performance problems.
Linux Build a Home Terabyte Backup System Using Linux
Post date: November 30, 2005, 20:11 Category: Miscellaneous Views: 84
Tutorial quote: A terabyte-plus backup and storage system is now an affordable option for Linux users. This article discusses options for building and configuring an inexpensive, expandable, Linux-based backup server.
Debian Aggregating network interfaces
Post date: February 12, 2006, 02:02 Category: Network Views: 43
Tutorial quote: Using more than one hard drive to achieve better performance and fault tolerance is very common. Less well known is that it's also possible to aggregate more than one network interface into a single logical interface. In Linux, this is handled by the bonding driver. Benefits of doing this are much the same as the benefits of aggregating discs using RAID: if one device dies, your server carries on working and by using two devices in parallel, performance can be improved.
Debian Filesystems (ext3, reiser, xfs, jfs) comparison on Debian Etch
Post date: April 23, 2006, 04:04 Category: Benchmarks Views: 16
Tutorial quote: There are a lot of Linux filesystems comparisons available but most of them are anecdotal, based on artificial tasks or completed under older kernels. This benchmark essay is based on 11 real-world tasks appropriate for a file server with older generation hardware (Pentium II/III, EIDE hard-drive).
Unix+clones DNS name serving through NSD
Post date: July 5, 2005, 02:07 Category: Network Views: 80
Tutorial quote: Given the sheer importance of name servers in providing Domain Name System (DNS) resolution -- a process used by every Web-facing application to translate domain names into IP addresses and vice versa -- not many people put much thought into the available software alternatives for pulling off this feat. One compelling application is NSD, an alternative to the widely deployed BIND name server.
Unix+clones SSH Port Forwarding Through a Proxy Server
Post date: April 17, 2005, 23:04 Category: Network Views: 40
Tutorial quote: A common use of SSH is port forwarding (tunneling). This use causes traffic directed to a particular port to be sent to a specified port on another computer. Because traffic is sent through SSH, the traffic is encrypted, allowing the transmission of sensitive data through arbitrary services.
Unix+clones Build Your Own IM Server with Jabber
Post date: June 26, 2005, 18:06 Category: Network Views: 81
Tutorial quote: Instant messaging is a great business communications tool. For example, here at Enterprise Networking Planet the staff and writers all work in their pajamas at home, at far-flung points all over the globe. ENP's crusty editor-with-a-heart-of-gold Perry White lives in a villa in the South of France. I send in my columns from a sailboat currently anchored at Raratonga. Sure, we can exchange emails, but there are times when a live exchange is better.
Debian Splitting updatedb into daily and weekly
Post date: April 21, 2006, 08:04 Category: System Views: 14
Tutorial quote: We all appreciate the locate command when we are such in a hurry we cannot afford a full and in-elegant find. What we like a little less, though, is the updatedb script consuming up all our disk bandwidth at each boot, summoned by anacron.

Of course, this is only the case if you are running a "desktop" machine: since you turn it on when you need to do some work, then you long for a way to shorten the period of reduced usability forced by updatedb.

Inversely, if you run a server that never goes down, and you successfully schedule your updatedb tasks late at night, then this article is not for you.
Linux Enhancing kernel security with grsecurity
Post date: November 25, 2005, 16:11 Category: Security Views: 74
Tutorial quote: Is your server as secure as it could be? Sure, you use a firewall, mandate strong passwords, and patch regularly. You even take a proactive approach by performing security audits with tools such as nmap and Nessus. Yet you may still be vulnerable to zero-day exploits and privilege escalation attacks. If these possibilities keep you awake at night, you're not alone. The sleepless folks with the grsecurity project have developed an easy-to-use set of security enhancements to help put your fears to rest.