Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for HOWTO Linux Virtual Hosting Server

Debian Manipulating the windows upon your desktop
Post date: January 19, 2006, 08:01 Category: Desktop Views: 79
Tutorial quote: If you're like me you'll most likely use a wide variety of desktop applications, and spend a lot of time setting up your desktop first thing in the afternoon when you login. Minimising some applications, setting others up to be visible upon all virtual desktops, etc. Even if you have a basic window manager you can automate this activity using Devil's Pie.

Devil's Pie is a simple utility, inspired by the Sawfish's matched windows option, which allows you to conduct actions upon desktop windows. Using it is a simple matter of creating a configuration file and starting the program when you login.
Gentoo Remote Backup Using Flexbackup and SSH
Post date: December 31, 2005, 10:12 Category: Network Views: 97
Tutorial quote: I have a server running Gentoo Linux which hosts a Subversion repository, a vpopmail and qmail system, a MySql database and more. I’m going to make a backup copy of the data on this machine in the event that I need to rebuild this server. I have chosen Flexbackup to perform this task.
Unix+clones Unattended rdiff-backup HOWTO
Post date: April 3, 2006, 04:04 Category: Software Views: 35
Tutorial quote: This page describes how to set up rdiff-backup to run, as a non-root user, unattended from a crontab. We will utilize features of rdiff-backup and OpenSSH to secure the setup as much as possible.
Debian Debian Kernel Compile Howto (Kernel 2.6)
Post date: April 12, 2005, 14:04 Category: System Views: 93
Tutorial quote: In some cases you might want to compile your own kernel that suits your needs better than the standard kernel that comes with your distribution. I will describe how to do this on a Debian machine. Please note that this tutorial is for kernel 2.6 only!
Linux Building an LDAP Server on Linux, Part 1
Post date: April 15, 2005, 13:04 Category: Network Views: 48
Tutorial quote: Your network is growing in size and complexity. It's taking on a life of its own, spreading and growing and absorbing everything in its path. You're tearing your hair out trying to keep track, and your users have somehow discovered your secret phone number and are pestering you with endless questions and demands--where do I find this; I don't want to keep track of a dozen different passwords; nothing works like it should.

Of several possible solutions, consider two: 1) find a new hiding place, or 2) implement an LDAP server. While finding a new hiding place might sound ideal, it's an option we're going to have to save for a future article. This series will instead explain what LDAP is good for, detail how to build an LDAP server, and cover what you can do with it.
Unix+clones Setup the SSH server to use keys for authentication
Post date: November 16, 2005, 15:11 Category: Network Views: 57
Tutorial quote: The user creates a keypair, which consists of a private key, that can be protected with a passphrase, and a public key. The public key is transfered to the server and the private key is kept in our workstation. We assume that the user has accounts in both the server machine and his workstation. Everytime he tries to connect to the server, the keys are validated and the user is granted access.
SuSe Working with SUSE Linux Enterprise Server 9
Post date: June 22, 2005, 05:06 Category: System Views: 130
Tutorial quote: Working with SUSE Linux Enterprise Server (SLES) requires an understanding of the login process, including local account files, system accounts, and managing identities.

Using a console shell or the graphical environment are two possible methods of working on a SLES machine.

Finding your way around a SLES installation requires an in-depth knowledge of the filesystem layout. Essential filesystem components are documented and explained in this chapter. Basic filesystem permissions are also described.
Linux Linux stateful firewall design
Post date: April 12, 2005, 13:04 Category: Network Views: 40
Tutorial quote: This tutorial shows you how to use netfilter to set up a powerful Linux stateful firewall. All you need is an existing Linux system that's currently using a Linux 2.4.x or 2.6.x kernel. A laptop, workstation, router or server with at a Linux 2.4.x or 2.6.x kernel will do. You should be reasonably familiar with standard network terminology like IP addresses, source and destination port numbers, TCP, UDP and ICMP, etc. By the end of the tutorial, you'll understand how Linux stateful firewalls are put together and you'll have several example configurations to use in your own projects.
Linux Configuring Apache for Maximum Performance
Post date: March 31, 2006, 22:03 Category: Optimizing Views: 14
Tutorial quote: Apache server performance can be improved by adding additional hardware resources such as RAM, faster CPU etc. But, most of the time, the same result can be achieved by custom configuration of the server. This article looks into getting maximum performance out of Apache with the existing hardware resources, specifically on the Linux systems.
Linux Build a Home Terabyte Backup System Using Linux
Post date: November 30, 2005, 20:11 Category: Miscellaneous Views: 84
Tutorial quote: A terabyte-plus backup and storage system is now an affordable option for Linux users. This article discusses options for building and configuring an inexpensive, expandable, Linux-based backup server.