Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for How to Perform System Boot and Shutdown Procedures for Solaris 10

Linux Performance Tools for Optimizing Linux: Process-Specific CPU
Post date: June 1, 2005, 03:06 Category: Optimizing Views: 140
Tutorial quote: The tools to analyze the performance of applications are varied and have existed in one form or another since the early days of UNIX. It is critical to understand how an application is interacting with the operating system, CPU, and memory system to understand its performance. This chapter will help you understand where the bottleneck in your system is occuring, and how to fix it.
Fedora+Core Tripwire on your Fedora Box
Post date: April 15, 2005, 20:04 Category: Security Views: 225
Tutorial quote: Tripwire is an Intrusion Detection System. This can be used to alert users whenever their system is compromised. Tripwire detects and reports changes in system files. It will alert you through email whenever a change is detected. If the change is due to normal system activity, you can instruct Tripwire not to report the change to that file in future. If the change is not due to normal system activity, then it is a clear indication that something is wrong and you need to act immediately and fix the issue. Thus tripwire comes very handy to maintain the integrity of the system.

There is lot of information on the web about Tripwire. Some people might argue that AIDE (Advanced Intrusion Detection Environment) is better than tripwire and so on. This comparison is beyond the scope of this article. This is an introductory article for novice users who are interested in installing Tripwire on their Fedora Box. Advanced users can refer to the web for relevant information or they can contact appropriate mailing lists like fedora users mailing list.
Linux Mastering the Enterprise Volume Management System
Post date: April 13, 2005, 15:04 Category: System Views: 62
Tutorial quote: The Enterprise Volume Management System, or EVMS, is a disk, partition, and file system manager for Linux that claims to be a comprehensive tool for all disk management tasks. I ran across EVMS and found the idea appealing, so I decided to try it out. I've been working with it for a couple of weeks now, and this article describes what I found.
Debian Giving your Xen instances a working X setup
Post date: January 2, 2006, 23:01 Category: Software Views: 91
Tutorial quote: Xen, the virtualisation system, is a great tool for running fresh copies of an operating system. However it doesn't allow you to run X11 programs. Here we can fix that with the help of VNC.
Linux Linux Web Filtering in 7 steps
Post date: April 12, 2005, 14:04 Category: Network Views: 423
Tutorial quote: How to install a transparent Squid proxy server with real-time HTTP virus scanning on Mandrake 10.0 using DansGuardian and ClamAV?

People quickly and easily access volumes of research on the Internet and correspond with a mouse click. For more and more companies, content filtering is part of the large battle to combat all kinds of online threats, including hackers, worms and viruses. Linux content filtering allows administrators to configure and manage Internet access across the entire network and to block unwanted Web content like pornography, shopping Web sites, games and gambling.

This guide contains all the necessary information for installing and understanding the architectural layout of the implementation. It was written with the assumption that you understand how to install programs and have a basic understanding of Linux Mandrake. This includes installing Linux Mandrake and RPM packages, editing files, making directories, compiling software and understanding general UNIX commands. This guide doesn’t explain how to use or configure Squid, DansGuardian and ClamAV but information on where to obtain this information can be found in the “Additional information” section.
Debian Using the 'snort' Intrusion Detection System
Post date: December 27, 2005, 10:12 Category: Security Views: 71
Tutorial quote: Snort is the leading open source Network Intrusion Detection System and is a valuable addition to the security framework at any site. Even if you are employing lots of preventative measures, such as firewalling, patching, etc., a detection system can give you an assurance that your defences truly are effective, or if not, will give you valuable information about what you need to improve.

Fortunately, there is a good set of snort packages for Debian which takes a lot of the tedious work out of building a useful Network Intrusion Detection System. Before we start on installation, we should review a few details about the networking satack that you're going to need to make sense of the alerts snort will generate. Impatient readers and those who are familiar with the TCP/IP suite of protocols may do now skip to the bit that says Stand alone snort.
OpenBSD Apache - Serving up the Web
Post date: April 11, 2006, 18:04 Category: Network Views: 19
Tutorial quote: The Apache Web Server is installed as part of the OpenBSD base system. This guide will help you configure the web server: (Apache 1.3.12 is released with OpenBSD 2.7 and 1.3.9 with OpenBSD 2.6)

To see how configurable the Apache/OpenBSD combination is we also look at allowing administrators to remotely review the server's status, we setup the system so we allow users on our system to have their own personal web-space. Of course, for the security counscious you probably want to turn some of these things off after you get things up and running.
Solaris Restoring a Sun system using JumpStart technology
Post date: April 13, 2005, 01:04 Category: Installing Views: 96
Tutorial quote: If a server crash and the file systems are corrupted or totally destroyed, then the only way to recover the data is to restore from backups. If it is only user data that is corrupted, the task is in general simple, but if the system disk fails, then there is a little bit more work involved in order to to recover the system. This article explains how to backup Sun systems using ufsrestore over NFS, and how to use Sun's JumpStart technology to restore Sun servers and workstations over the network.
Unix+clones Unattended, Encrypted, Incremental Network Backups
Post date: August 12, 2005, 14:08 Category: Network Views: 81
Tutorial quote: This article describes a complete system for creating a centralised backup system, complete with strong encryption. Incremental backups are used to minimize the bandwidth, and time, used.
RedHat Getting back my GNOME desktop from the clutches of the GNOME configuration system
Post date: July 18, 2005, 18:07 Category: Desktop Views: 86
Tutorial quote: My problem: as a user I managed to lock myself out of my GNOME desktop though a careless setting of Preferences-> Resolution.

In determining my solution I learned some key lessons about the GNOME configuration system.