Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for HOWTO Linux Virtual Hosting Server

Linux Building a Linux Cluster, Part 1
Post date: April 17, 2005, 23:04 Category: Network Views: 65
Tutorial quote: Linux clusters have escaped. As the general popularity of the Linux operating system increases, more complex solutions built with it are becoming increasingly common in the "traditional" (more conservative) IT world. Linux computer clusters, whose provenance was originally universities and research institutions such as the U.S. National Laboratories, are showing up in increasing numbers as high-performance computing solutions within such areas as oil and gas exploration, computer-aided engineering, visualization, and software development. Linux clusters providing highly-available web, mail, and other infrastructure services are also increasingly common. If past computing history is any indicator of future trends, widespread use of Linux clusters in the mainstream IT world cannot be far behind.
Unix+clones DNS name serving through NSD
Post date: July 5, 2005, 02:07 Category: Network Views: 80
Tutorial quote: Given the sheer importance of name servers in providing Domain Name System (DNS) resolution -- a process used by every Web-facing application to translate domain names into IP addresses and vice versa -- not many people put much thought into the available software alternatives for pulling off this feat. One compelling application is NSD, an alternative to the widely deployed BIND name server.
Unix+clones SSH Port Forwarding Through a Proxy Server
Post date: April 17, 2005, 23:04 Category: Network Views: 40
Tutorial quote: A common use of SSH is port forwarding (tunneling). This use causes traffic directed to a particular port to be sent to a specified port on another computer. Because traffic is sent through SSH, the traffic is encrypted, allowing the transmission of sensitive data through arbitrary services.
Unix+clones Build Your Own IM Server with Jabber
Post date: June 26, 2005, 18:06 Category: Network Views: 81
Tutorial quote: Instant messaging is a great business communications tool. For example, here at Enterprise Networking Planet the staff and writers all work in their pajamas at home, at far-flung points all over the globe. ENP's crusty editor-with-a-heart-of-gold Perry White lives in a villa in the South of France. I send in my columns from a sailboat currently anchored at Raratonga. Sure, we can exchange emails, but there are times when a live exchange is better.
Debian Splitting updatedb into daily and weekly
Post date: April 21, 2006, 08:04 Category: System Views: 14
Tutorial quote: We all appreciate the locate command when we are such in a hurry we cannot afford a full and in-elegant find. What we like a little less, though, is the updatedb script consuming up all our disk bandwidth at each boot, summoned by anacron.

Of course, this is only the case if you are running a "desktop" machine: since you turn it on when you need to do some work, then you long for a way to shorten the period of reduced usability forced by updatedb.

Inversely, if you run a server that never goes down, and you successfully schedule your updatedb tasks late at night, then this article is not for you.
Debian Centralized Syslog Server Using syslog-NG
Post date: April 28, 2006, 11:04 Category: System Views: 9
Tutorial quote: syslog-ngŠ is the world's most flexible and scalable audit trail processing tool for organizations of any size. It provides a centralised, securely stored log of all devices on your network, whatever platform they run on. And syslog-ng also incorporates a host of powerful features, including filtering based on message content, as well as customisable data mining and analysis capabilities.

Linux Enhancing kernel security with grsecurity
Post date: November 25, 2005, 16:11 Category: Security Views: 74
Tutorial quote: Is your server as secure as it could be? Sure, you use a firewall, mandate strong passwords, and patch regularly. You even take a proactive approach by performing security audits with tools such as nmap and Nessus. Yet you may still be vulnerable to zero-day exploits and privilege escalation attacks. If these possibilities keep you awake at night, you're not alone. The sleepless folks with the grsecurity project have developed an easy-to-use set of security enhancements to help put your fears to rest.
Linux Running .Net applications on Linux with Mono
Post date: April 26, 2006, 09:04 Category: Software Views: 13
Tutorial quote: Imagine the fate of your company rests on your completing your new Linux project on time. You have a crack team of first-class developers, but they're all .Net programmers. What are you going to do? Admit that Windows is better that Linux? Cry? Resign? No, you're going to install Mono and save the world!
Unix+clones Deploying Rails with Lighttpd
Post date: December 29, 2005, 02:12 Category: Network Views: 39
Tutorial quote: In my previous essay, I said that Rails deployment can get complicated. And that it was a DIY situation. Both are true, but it doesn't have to be complicated. To help you learn how to DIY your Rails deployment and show you the easiest way to get going, here's my recipe for deploying onto a server with LightTPD.
Linux Translating DOS to Linux
Post date: September 29, 2005, 13:09 Category: Miscellaneous Views: 104
Tutorial quote: So you know DOS. You're used to it, and it makes you feel warm and fuzzy. Snap out of it. This page is a list of Linux commands and they're DOS cousins, so you can feel more comfortable navigating in the Linux world, though you might have already known some of these commands if you've ever used an FTP client.