Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for HOWTO: Hosting a Subversion Repository

Debian Install and Configure Auth Shadow on Debian/Ubuntu
Post date: February 23, 2007, 12:02 Category: Miscellaneous Views: 1253 Comments: 0
Tutorial quote: Auth Shadow or mod-auth-shadow is a module for apache (and apache2, sort of) that enables authentication against /etc/shadow. The benefits being that any system user with a password can be authenticated for web_dav, subversion or simply an https server. The only other way to do this is with PAM. That method is dangerous because the apache user (www-data in my case) must be able to read /etc/shadow. Obviously, not a good idea. Auth Shadow accomplishes this safely by using a intermediate program called validate. This works because validate can be owned by root but executable by everyone. In the event that your server is compromised through apache, your password file will not be readable.
Debian Virtual Hosting With PureFTPd And MySQL (Incl. Quota And Bandwidth Management) On Debian Etch
Post date: May 4, 2007, 18:05 Category: Installing Views: 1708 Comments: 0
Tutorial quote: This document describes how to install a PureFTPd server that uses virtual users from a MySQL database instead of real system users. This is much more performant and allows to have thousands of ftp users on a single machine. In addition to that I will show the use of quota and upload/download bandwidth limits with this setup. Passwords will be stored encrypted as MD5 strings in the database.
Ubuntu How to use apt-p2p For Faster Upgrades From Ubuntu 8.10 to 9.04
Post date: April 20, 2009, 02:04 Category: System Views: 544 Comments: 0
Tutorial quote: apt-p2p is a p2p proxy for apt dowloads, it will act as a proxy between apt requests and a repository server, downloading any request files from peers (if possible), else will fallback to direct HTTP download. In general, apt-p2p save bandwidth, use limited cpu and memory resources and reduce congestion on the ubuntu mirrors.apt-p2p will get the request files from peers, therefore, it will avoid the congestion on the ubuntu mirrors.

Unix+clones Good-looking fonts in X Windows
Post date: April 23, 2005, 04:04 Category: Desktop Views: 853 Comments: 0
Tutorial quote: What makes the difference betweek "ugly" and "beautiful" fonts? Several things.

One of them is anti-aliasing (or AA in short). It's the technique which adds gray pixels in various shades around the edges of black text and thus blurs the jagged and pixelated edges. It works with other colors, too.

Another thing is having good quality fonts to start with. Font which are ugly by nature or don't scale well to various sizes are not much nicer when anti-aliased. See what kinds of fonts are out there by browsing through the Font HOWTO (not the same as the FDU HOWTO above).

Finally, there's the issue of readability which applies to you directly. How well does the end-product look anyhow? Do you really need anti-aliasing for an 8 pixel text? And other similar questions, which you'll learn how to answer according to your own preferences.
Debian VHCS ISP Control Panel Configuration
Post date: April 6, 2006, 11:04 Category: Installing Views: 1110 Comments: 0
Tutorial quote: VHCS delivers a complete hosting automation appliance by offering significant security, total-cost-of-ownership, and performance advantages over competing commercial solutions.

With VHCS Pro you can configure your server and applications, create user with domains with a few point-and-click operations that take less than a minute. There is no limit to the number of resellers, users and domains that can be created.At the core of VHCS Pro are 3 easy-to-use, Web-based control panels. VHCS provides graphic user interfaces for the administrators, resellers and users
Unix+clones Using and Customizing Templates in OpenOffice.org
Post date: October 24, 2006, 12:10 Category: Software Views: 871 Comments: 0
Tutorial quote: Templates make life easier when you use them for letters, documents, brochures, etc. but they really make life easier when you use them for labels. This article is about how to use the OpenOffice.org templates, in particular the WorldLabel templates, to print the labels you need. It shows how to download them, install them, use them as they are, and how to customize them with graphics and other features. It also shows how to use the OpenOffice.org label wizard; you can use the label wizard each time, or save the template you create in the same template repository with your WorldLabel templates.
Unix+clones SpamAssassin, ClamAV and Procmail Howto
Post date: April 15, 2005, 19:04 Category: Network Views: 1132 Comments: 0
Tutorial quote: This document describes how to install SpamAssassin (for filtering SPAM) and ClamAV (for filtering viruses, trojans, worms, etc.) and how to invoke them by using procmail recipes. It is suitable for scenarios where Sendmail or Postfix deliver emails to local users. It should work (maybe with slight changes concerning paths etc.) on all *nix operating systems. I tested it on Debian Woody so far.

In the end you will have a system where Sendmail or Postfix deliver emails to a local user; the emails are passed to procmail which invokes SpamAssassin and ClamAV in order to filter the emails before they arrive in the user's inbox. However, the installation of Sendmail and Postfix are not covered in this document.

This howto is meant as a practical guide.
Ubuntu List of BitTorrent clients Available in Ubuntu Linux
Post date: August 12, 2008, 01:08 Category: Software Views: 836 Comments: 0
Tutorial quote: BitTorrent is a peer-to-peer file sharing protocol used to distribute large amounts of data. The initial distributor of the complete file or collection acts as the first seed. Each peer that downloads the data also uploads it to other peers. Relative to standard internet hosting, this provides a significant reduction in the original distributor's hardware and bandwidth resource costs. It also provides redundancy against system problems and reduces dependence on the original distributor.

A BitTorrent client is a program that manages torrent downloads and uploads using the BitTorrent protocol.
SuSe Correct Multimedia Support in SUSE Linux 9.2
Post date: April 12, 2005, 20:04 Category: Multimedia Views: 1075 Comments: 0
Tutorial quote: SUSE Linux is one of the better desktop Linux distributions on the market today, providing a functional and aesthetically pleasing environment for the new Linux user as well as seasoned veterans. On thing that puzzles many users is the lack of proper multimedia support in SUSE. The developers have basically crippled it from playing virtually all types of multimedia content that's common on the Internet today. This can be a frustrating dilema for new users, so I have written a short HOWTO to help you get everything in order on your new desktop.

It should be noted that you don't necessarily need to install apt to fix the multimedia problem on SUSE, but it's probably the most beneficial way to get it done. You can easily remove the offending packages and install new ones not provided by SUSE, but by using apt, you'll get the benefit of having a much larger package base available to you... something that SUSE has suffered from for a very long time. With or without apt, let's get things going with this HOWTO.
Debian Creating A Fully Encrypted Para-Virtualised Xen Guest System Using Debian Lenny
Post date: May 3, 2009, 05:05 Category: Miscellaneous Views: 635 Comments: 0
Tutorial quote: This document explains how to set up a fully encrypted para-virtualized XEN instance. In this howto, the host system is running Debian Etch, while the guest system to be installed will be using Debian Lenny. If you are concerned about your privacy, you might want to consider using hard disk encryption to protect your valuable private data from spying eyes. Usually, the easiest way would be to use your distribution's installer to set up a fully encrypted system; I think most recent Linux distributions support this. However, when you are using XEN to provide virtualization, there are situations where you might not want to encrypt your whole computer with all guest instances, but instead only encrypt one OS instance. This howto will deal with exactly this situation. It assumes that the XEN host system is already up and running.