Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for User-Mode Linux

Debian Mini-Howto for User Mode Linux
Post date: April 12, 2005, 12:04 Category: System Views: 725 Comments: 0
Tutorial quote: UML ("User Mode Linux") allows you to run multiple Linux servers on one physical machine. This can be handy for many different purposes. For example, you might want to give different people root rights, but prevent them from interfering with one another. Or, you might want to have several identically configured servers, one for production, one for development, and one for testing, but without investing in multiple physical machines.

Once you have prepared your machine for running UML instances as described in the following section, adding new instances will take less than five minutes. The preparation, however, might take a bit longer.
SuSe User-Mode Linux
Post date: December 8, 2005, 07:12 Category: Software Views: 1389 Comments: 0
Tutorial quote: One of the largest efforts involved with software engineering is testing the software to make sure that it works as designed. Testing can require several different types of system configurations and could require multiple instances of Linux. One way to create this type of environment is to use a virtual machine.

User-Mode Linux (UML) is a fully functional Linux kernel. It runs its own scheduler and virtual memory (VM) system, relying on the host kernel for hardware support. It includes virtual block, network, and serial devices to provide an environment that is almost as full-featured as a hardware-based machine. UML cannot destroy the host machine. Furthermore, the UML block devices, also called disks, can be files on the native Linux file system, so you cannot affect the native block devices. This is very useful when you're testing and debugging block operations.
CentOS Configuring Samba 3.0 To Use The ADS Security Mode (CentOS)
Post date: June 25, 2007, 18:06 Category: Installing Views: 1655 Comments: 0
Tutorial quote: The intent of this article is to show you how to configure your Linux machine and Samba server to participate in a Windows 2003 Active Directory domain as a Member Server using Kerberos authentication. This involves using the security = ADS security mode in Samba.
Unix+clones Screen: an introduction and beginner's tutorial
Post date: April 15, 2005, 18:04 Category: Software Views: 802 Comments: 0
Tutorial quote: Most modern Unix-based operating systems (e.g. Linux, MacOS X, and BSD) come with a little console-mode utility called GNU Screen. It's a powerful tool in the hands of the console warrior, a veritable Swiss Army knife of text-mode human-computer interaction.

This utility, despite its considerable usefulness, goes unused by a great many people. Why is this? Few people even know it's there, and those that do rarely understand the problem it solves. In this article, I will explain what screen does for you, and provide a simple set of instructions for accomplishing basic tasks using screen. My audience is those that are skilled with the command line but who have little or no experience with screen itself.
Debian How To Enable Networking In Xen Guests On Hetzner's New EQ Servers (Debian Lenny)
Post date: October 27, 2009, 18:10 Category: Network Views: 321 Comments: 0
Tutorial quote: This tutorial shows how you can enable networking in Xen guests (domU) on Hetzner's new EQ servers. With the new EQ servers, you can get up to three additional IPs that are in the same subnet as the server's main IP. The problem is that these additional IPs are bound to the MAC address of the host system (dom0) - Hetzner's routers will dump IP packets if they come from an unknown MAC address. This means we cannot use Xen's bridged mode, but must switch to Xen's routed mode where the host system (dom0) acts as the gateway for the guests.
Ubuntu Ubuntu Customization Guide v2
Post date: November 25, 2007, 23:11 Category: Desktop Views: 3786 Comments: 0
Tutorial quote: Today with a hike in Linux acceptance its pretty hard for competitors to provide similar solutions at free of cost. Open Source is known for User Interaction with Operating System which cannot be done with other OS. Linux user can customize, create, edit, add files according to his/her taste..and customization is the part where Linux is one step ahead of every OS.
Lintrack Lintrack As A LAN Gateway And An OpenVPN Bridge
Post date: May 9, 2007, 17:05 Category: Installing Views: 2106 Comments: 0
Tutorial quote: This tutorial will guide you through the installation and configuration of Lintrack, a GNU/Linux distribution specialized in networking tasks. We will give two LANs access to the internet along with DHCP and DNS cache servers, and then we will connect our networks using OpenVPN in bridging mode. You should be running all these in well under an hour, thanks to the unified configuration interface of Lintrack.
Ubuntu Pybackpack - A user friendly file backup tool for Ubuntu Linux Desktop
Post date: September 7, 2008, 11:09 Category: System Views: 802 Comments: 0
Tutorial quote: A graphical tool to make file backup simpler. Provides a user-friendly interface which allows you to back up your files easily to an archive, to a CD/DVD or to a remote location using SSH.pybackpack is a user-friendly file backup tool written for the Gnome desktop and released under the GPL.

Linux Removing A User
Post date: April 7, 2006, 19:04 Category: System Views: 888 Comments: 0
Tutorial quote: Employee turnover in most organizations runs high. So unless you run a small shop with a stable user base, you need to learn how to clean up after an employee leaves. Too many so-called system administrators do not understand the stakes involved when they manage users. Disgruntled former employees can often cause significant trouble for a company by gaining access to the network.

To remove a user, you need to learn to manage all of his or her files, mailboxes, mail aliases, print jobs, recurring –(automatic) personal processes such as the backing up of data or remote syncing of directories, and other references to the user. It is a good idea at first to disable the account in /etc/passwd, after which you can search for the user's files and other references. Once all traces of the user have been cleaned up, you can remove the user completely—but if you remove the entry from /etc/passwd while these other references exist, you have a harder time referring to them .

When you remove a user, it's a good idea to follow a pre-determined course of action so you don't forget any important steps; it may even be a good idea to make a checklist so that you have a routine. Following, you will find several items requiring attention.
Linux Backing Up and Restoring Using the cpio Command in Linux and Unix
Post date: May 26, 2006, 13:05 Category: System Views: 938 Comments: 0
Tutorial quote: The cpio command is one of the most commonly used Linux back up tools.

The cpio command has two unusual features

Unlike tar , in which the files to back up are typed in as part of the command, cpio reads the files to work with from the standard input (in other words, the screen).

This feature means that cpio must be used as part of a multiple command or with a redirection pipe. Examples of this usage are shown in the tables below.

cpio must always be used with one of three flags. Flags are options that set the mode in which the command runs. Only one flag can be used at a time, and it must come before any other options. In addition, the choice of flags limits the options that can be used. Each flag also has a gnu option that can used in its place. The gnu option gives a convenient name for each flag: extract, create, and pass- through.