Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for How To Configure E 16.7.x

Unix+clones How To Configure E 16.7.x
Post date: October 9, 2005, 14:10 Category: Software Views: 54
Tutorial quote: This file documents the configuration files used in Enlightenment 16.7.x but may not match 100% with earlier or later versions. This is a work in progress and will be updated as I learn more and have the time.
Arch XOrg Font Configuration
Post date: April 13, 2005, 21:04 Category: Desktop Views: 122
Tutorial quote: Learn how to add/remove and configure your fonts on Arch.
Unix+clones How to setup your keyboard's extra keys in X11
Post date: December 29, 2005, 01:12 Category: Desktop Views: 40
Tutorial quote: Well, it's the day after christmas and like me, you got this new keyboard with all those sweet little buttons on top. How to configure that you may ask? Let's explore this together
Debian Network profiles for a laptop
Post date: December 22, 2005, 19:12 Category: Network Views: 50
Tutorial quote: This article explains how to configure networking in a very pleasant way, so that it works automatically wherever you go. It is adaptable to lots of uses, and may be usefull even if you don't use Wifi but connect to multiple networks.
FreeBSD Using Software RAID-1 with FreeBSD
Post date: November 28, 2005, 22:11 Category: System Views: 104
Tutorial quote: Have you ever needed a software RAID solution for a low-end server install? Perhaps you've wanted your workstation to take advantage of the redundancy provided by a disk mirror without investing in a hardware RAID controller. Has a prior painful configuration experience turned you off software RAID altogether on Unix systems?

Since 5.3-Release, FreeBSD comes with gmirror(8), which allows you to easily configure a software RAID 1 solution. While tutorials on gmirror exist, I found them to require either manual calculations of partition sizes with bsdlabel or the use of a fix-it floppy on an existing system.

It made more sense to me to configure RAID during the install of the operating system. I also wanted a procedure that was easy to follow and didn't introduce human error in the form of a math miscalculation. After cobbling together the available documentation and experimenting my way through various configurations, I came across a procedure that has worked well for me on several different systems. I also received valuable feedback from Pawel Jakub Dawidek, the author of gmirror, who gave some insight into some of the not yet documented features of gmirror.
RedHat My First Linux Server, Part 1
Post date: April 14, 2005, 18:04 Category: Miscellaneous Views: 100
Tutorial quote: Many small businesses are turning to Linux as way to swim against the tide of rising software costs. Are you thinking about diving into Linux for your small business? From the outside, Linux can appear to be a deep ocean of strange jargon in unchartered waters. Who has the time to wade through all that to save a few clams? With Linux, it's not a sink or swim proposition.

Linux is now a lot simpler than you may think. We can provide you with the easiest, simplest, no-problem process for installing Linux on a PC. After going through this simple installation process, you will have a basic machine that you can configure into any kind of server, workstation, or office desktop. Future articles in this My First Linux Server series will help you build productive, Linux-based servers and small office workstations.

The best choices for your first Linux machine are probably the popular Red Hat Linux or SUSE Linux, primarily because both are easy to install and configure. Additionally, these companies are sound choices for the home office or small business. Both vendors have specialized in Linux for many years and offer full corporate product lines supporting your expansion.
Linux Three tools to help you configure iptables
Post date: May 25, 2005, 10:05 Category: Network Views: 90
Tutorial quote: Every user whose client connects to the Internet should configure his firewall immediately after installation. Some Linux distributions include firewall configuration as a part of installation, often offering a set of defaults configurations to choose from. However, to ensure that your machine presents the minimum "attack surface" (a measure of the number of vulnerable ports, user accounts, and sockets exposed to attack) to the predatory inhabitants of the Internet, you may need to do some manual configuration of your firewall. Here are three tools that can help.
The Linux kernel (version 2.4 onwards) contains a framework for packet filtering and firewalling using netfilter and iptables. Netfilter is a set of hooks inside the Linux kernel that allows kernel modules to register callback functions with the network stack. Iptables is a generic table structure for the definition of rulesets. Each rule within an IP table consists of a number of classifiers (iptables matches) and one connected action (iptables target). Iptables has extensive documentation that can be accessed online or by typing man iptables at the command line. Yet despite the depth of the documentation available for iptables, its complexity can be baffling.
Debian Chrooted SSH HowTo
Post date: January 30, 2006, 02:01 Category: Security Views: 50
Tutorial quote: This tutorial describes how to install and configure OpenSSH so that it will allow chrooted sessions for users. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of.
Linux Linux Web Filtering in 7 steps
Post date: April 12, 2005, 14:04 Category: Network Views: 423
Tutorial quote: How to install a transparent Squid proxy server with real-time HTTP virus scanning on Mandrake 10.0 using DansGuardian and ClamAV?

People quickly and easily access volumes of research on the Internet and correspond with a mouse click. For more and more companies, content filtering is part of the large battle to combat all kinds of online threats, including hackers, worms and viruses. Linux content filtering allows administrators to configure and manage Internet access across the entire network and to block unwanted Web content like pornography, shopping Web sites, games and gambling.

This guide contains all the necessary information for installing and understanding the architectural layout of the implementation. It was written with the assumption that you understand how to install programs and have a basic understanding of Linux Mandrake. This includes installing Linux Mandrake and RPM packages, editing files, making directories, compiling software and understanding general UNIX commands. This guide doesn’t explain how to use or configure Squid, DansGuardian and ClamAV but information on where to obtain this information can be found in the “Additional information” section.
Gentoo HOWTO Linux Virtual Hosting Server
Post date: April 9, 2006, 10:04 Category: Software Views: 53
Tutorial quote: This document will explain how to install and configure a mail server capable of handling hundreds of domains and users. This how-to uses Postfix, Courier-imap, Mysql, and Apache as the core of this virtual system. If these packages don't appeal to you, Gentoo has a number of how-to's built around other MTA's or databases.