Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Enterprise Volume Management System Mini How-To

Unix+clones Unattended, Encrypted, Incremental Network Backups
Post date: August 12, 2005, 14:08 Category: Network Views: 81
Tutorial quote: This article describes a complete system for creating a centralised backup system, complete with strong encryption. Incremental backups are used to minimize the bandwidth, and time, used.
RedHat Getting back my GNOME desktop from the clutches of the GNOME configuration system
Post date: July 18, 2005, 18:07 Category: Desktop Views: 86
Tutorial quote: My problem: as a user I managed to lock myself out of my GNOME desktop though a careless setting of Preferences-> Resolution.

In determining my solution I learned some key lessons about the GNOME configuration system.
Linux Build a Home Terabyte Backup System Using Linux
Post date: November 30, 2005, 20:11 Category: Miscellaneous Views: 84
Tutorial quote: A terabyte-plus backup and storage system is now an affordable option for Linux users. This article discusses options for building and configuring an inexpensive, expandable, Linux-based backup server.
SGI Installing IRIX 6.5 Across a Network
Post date: May 21, 2005, 06:05 Category: Installing Views: 119
Tutorial quote: Installing across a network may be desirable for a number of reasons, usually speed, convenience (disks/CDROM attached to remote system) or necessity. I've done network installs on O2s, Octanes and Indys; in each case, a remote disk file system contained local copies of all the relevant 6.5 media.
OSX Panther versus Tiger
Post date: April 29, 2005, 20:04 Category: Benchmarks Views: 106
Tutorial quote: According to Apple, "...unmodified applications that use the system math functions will get an automatic performance boost on the G5..." when switching from Panther to Tiger. We decided to run some tests to see if we got a speed gain right out of the box with applications that we suspect use system math functions.
Linux The Linux /proc Filesystem as a Programmers' Tool
Post date: June 22, 2005, 05:06 Category: Programming Views: 137
Tutorial quote: My entry into systems programming was guided by my desire to understand further the operating systems I was working with daily as a contract UNIX and, later, Linux system administrator. The result of this was ifchk, a packet sniffer detector I wrote in C and released in June of 2003. ifchk initially was written under IRIX and then ported to Linux, mostly under the 2.4 kernel. The current ifchk revision, beta 4, recently was released and beta 5 is on the way.

My work on ifchk has allowed me to examine programmatically several areas of operating system functionality. Examples include the Linux netlink(7) and rtnetlink(7) facilities, device control--that is, network interfaces--via ioctl(2), signals and proc, the process filesystem. Proc and its ability to display a wide array of data concerning the runtime state of a system are the focus of our discussion here.
SmoothWall Install SquidGuard on Smoothwall
Post date: April 12, 2005, 14:04 Category: Software Views: 254
Tutorial quote: squidGuard describes itself as: "An ultrafast and free filter, redirector and access controller for Squid". In my experience, it is the ideal web filter for use with Smoothwall and IpCop since it is lightweight and easy to set up. I use it on an i486, 33Mhz system with 18Mb of Ram and 500Mb of hard drive - and while there is a minor performance hit, the hit is not significant.

This simple how-to describes the steps I took to install squidGuard on my system - it should work for yours too.
Unix+clones Xen Disk I/O benchmarking: NetBSD dom0 vs Linux dom0
Post date: April 21, 2005, 06:04 Category: Benchmarks Views: 107
Tutorial quote: Xen is a relatively new technology to enable several virtual machines (domU) to run on one computer. The purpose of this article is to determine what operating system (NetBSD or Linux) should be selected as domain 0 (dom0) operating system to get the best performance when running several CPU and disk intensive virtual machines at the same time.
OpenBSD Hardening OpenBSD Internet Servers
Post date: April 11, 2006, 18:04 Category: Security Views: 36
Tutorial quote: This tutorial on how-to harden or improve security on OpenBSD Internet servers includes sections that apply to any UNIX system. Hardening is making a computer more secure by removing unneeded functions, restricting access and tracking changes and processes. It was revised to cover OpenBSD 3.0 on Dec. 15, 2001 and includes an overview of the 2.9 to 3.0 changes. A new page on priorities ranks the value of the techniques presented here. Familiarity with UNIX system administration but not OpenBSD is assumed.
SuSe User-Mode Linux
Post date: December 8, 2005, 08:12 Category: Software Views: 137
Tutorial quote: One of the largest efforts involved with software engineering is testing the software to make sure that it works as designed. Testing can require several different types of system configurations and could require multiple instances of Linux. One way to create this type of environment is to use a virtual machine.

User-Mode Linux (UML) is a fully functional Linux kernel. It runs its own scheduler and virtual memory (VM) system, relying on the host kernel for hardware support. It includes virtual block, network, and serial devices to provide an environment that is almost as full-featured as a hardware-based machine. UML cannot destroy the host machine. Furthermore, the UML block devices, also called disks, can be files on the native Linux file system, so you cannot affect the native block devices. This is very useful when you're testing and debugging block operations.