Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for RH 9.0 Apache 2.0.47 + Tomcat 4.1.27 HOWTO

Debian Howto setup DHCP Server and Dynamic DNS with BIND in Debian
Post date: July 27, 2008, 18:07 Category: Network Views: 3457 Comments: 0
Tutorial quote: This tutorial will explain Howto setup DHCP Server and Dynamic DNS with BIND in Debian.
Ubuntu SAMBA (Domaincontroller) Server For Small Workgroups With Ubuntu 5.10 "Breezy Badger"
Post date: December 14, 2005, 19:12 Category: Network Views: 1686 Comments: 0
Tutorial quote: This is a detailed description about the steps to set up a Ubuntu based server (Ubuntu 5.10 - Breezy Badger) to act as file- and print server for Windows (tm) workstations in small workgroups. This howto uses the tdb backend for SAMBA to store passwords and account information. This is suitable for workgroups for up to 250 users and is easier to setup than an LDAP backend. A second howto covering the installation of LDAP + SAMBA will be published soon.
Debian Manage Apache Resources Limits With mod_slotlimit
Post date: February 19, 2009, 08:02 Category: System Views: 820 Comments: 0
Tutorial quote: mod_slotlimit is an Apache module that using dynamic slot allocation algorithm and static rules, can manage resources used for each running site.
Linux Chrooting Apache
Post date: April 13, 2005, 00:04 Category: Security Views: 1161 Comments: 0
Tutorial quote: The chroot daemon allows you to run a program and have it see a given directory as the root (/) directory. This effectively locks the process into its very own filesystem ("chroot jail") isolated from the real / filesystem. In this article we will look at how to install the Apache Web server in such an environment.
Debian Install and Configure Auth Shadow on Debian/Ubuntu
Post date: February 23, 2007, 18:02 Category: Miscellaneous Views: 1587 Comments: 0
Tutorial quote: Auth Shadow or mod-auth-shadow is a module for apache (and apache2, sort of) that enables authentication against /etc/shadow. The benefits being that any system user with a password can be authenticated for web_dav, subversion or simply an https server. The only other way to do this is with PAM. That method is dangerous because the apache user (www-data in my case) must be able to read /etc/shadow. Obviously, not a good idea. Auth Shadow accomplishes this safely by using a intermediate program called validate. This works because validate can be owned by root but executable by everyone. In the event that your server is compromised through apache, your password file will not be readable.
Unix+clones Good-looking fonts in X Windows
Post date: April 23, 2005, 09:04 Category: Desktop Views: 1044 Comments: 0
Tutorial quote: What makes the difference betweek "ugly" and "beautiful" fonts? Several things.

One of them is anti-aliasing (or AA in short). It's the technique which adds gray pixels in various shades around the edges of black text and thus blurs the jagged and pixelated edges. It works with other colors, too.

Another thing is having good quality fonts to start with. Font which are ugly by nature or don't scale well to various sizes are not much nicer when anti-aliased. See what kinds of fonts are out there by browsing through the Font HOWTO (not the same as the FDU HOWTO above).

Finally, there's the issue of readability which applies to you directly. How well does the end-product look anyhow? Do you really need anti-aliasing for an 8 pixel text? And other similar questions, which you'll learn how to answer according to your own preferences.
Linux How to Configure Apache as a Forward / Reverse Proxy
Post date: January 24, 2010, 06:01 Category: Network Views: 882 Comments: 0
Tutorial quote: Apache can be configured in both a forward and reverse proxy (also known as gateway) mode.
Unix+clones SpamAssassin, ClamAV and Procmail Howto
Post date: April 16, 2005, 00:04 Category: Network Views: 1408 Comments: 0
Tutorial quote: This document describes how to install SpamAssassin (for filtering SPAM) and ClamAV (for filtering viruses, trojans, worms, etc.) and how to invoke them by using procmail recipes. It is suitable for scenarios where Sendmail or Postfix deliver emails to local users. It should work (maybe with slight changes concerning paths etc.) on all *nix operating systems. I tested it on Debian Woody so far.

In the end you will have a system where Sendmail or Postfix deliver emails to a local user; the emails are passed to procmail which invokes SpamAssassin and ClamAV in order to filter the emails before they arrive in the user's inbox. However, the installation of Sendmail and Postfix are not covered in this document.

This howto is meant as a practical guide.
Debian Apache: Creating A Session-Aware Loadbalancer Using mod_proxy_balancer (Debian Etch)
Post date: May 29, 2007, 22:05 Category: System Views: 1763 Comments: 0
Tutorial quote: mod_proxy_balancer is an Apache module that lets you create a loadbalancer. This loadbalancer retrieves requested pages from two or more backend webservers and delivers them to the user's computer. An important feature of mod_proxy_balancer is that it keeps track of sessions so that a single user always deals with the same backend webserver.
Debian Creating A Fully Encrypted Para-Virtualised Xen Guest System Using Debian Lenny
Post date: May 3, 2009, 10:05 Category: Miscellaneous Views: 1059 Comments: 0
Tutorial quote: This document explains how to set up a fully encrypted para-virtualized XEN instance. In this howto, the host system is running Debian Etch, while the guest system to be installed will be using Debian Lenny. If you are concerned about your privacy, you might want to consider using hard disk encryption to protect your valuable private data from spying eyes. Usually, the easiest way would be to use your distribution's installer to set up a fully encrypted system; I think most recent Linux distributions support this. However, when you are using XEN to provide virtualization, there are situations where you might not want to encrypt your whole computer with all guest instances, but instead only encrypt one OS instance. This howto will deal with exactly this situation. It assumes that the XEN host system is already up and running.
Website Python Coding Tutorial Solution For Every Bookie Gambling Player.