Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Using a jail as a virtual machine

Linux Using iptables to rate-limit incoming connections
Post date: December 16, 2005, 17:12 Category: Network Views: 74
Tutorial quote: There are times when you have to allow arbitary incoming connections, when you are travelling for example.

In these situations you can open up your system to allow incoming connections and be the target of a dictionary attack - literally a machine trying to connect and login over and over again using usernames and passwords from a dictionary.

In this situation you can create a collection of firewalling rules which will deny access from remote clients who attempt to connect "too many" times.
OpenBSD Rebuilding the OpenBSD kernel
Post date: April 24, 2005, 16:04 Category: System Views: 93
Tutorial quote: Users who want their OpenBSD machine to perform specific functions or need additional device drivers might want to customize their kernel. In other OS's, like some types of Linux, it is very popular to rebuild the kernel because the default is so bloated. For most users, the default OpenBSD kernel is sufficient; however, you should still apply kernel patches, which will require rebuilding and installing a fresh kernel.
Linux Adding Windows Fonts in Linux
Post date: December 3, 2005, 02:12 Category: Desktop Views: 73
Tutorial quote: Unlike past times, Linux do come with good fonts. And the font rendering can be made better by choosing to antialiase the fonts. But at times you come across a website which has been designed with the windows user in mind. Such websites are best viewed with one of the windows fonts. If you have windows OS installed on your machine, you can copy the essential fonts from the windows partition to linux and use them to get a better web experience. Here is how you do it.
Linux NFS over CIPE-VPN tunnels
Post date: May 23, 2005, 12:05 Category: Network Views: 60
Tutorial quote: The Network File System (NFS) is a standard protocol for sharing file services with Linux and Unix computers. It is a distributed file system that enables local access to remote disks and file systems and is based on the client\server architecture. Although easy to configure, it is typically used only to transfer data over an intranet or LAN because of its transparency and security potholes when exposed to the risks of the Internet. However, it still can be employed -- without compromising security -- to share files over the Internet by configuring it to run on a Virtual Private Network (VPN) connection. This article will show you how to set up NFS to run over a CIPE-VPN connection between two Linux systems.
Unix+clones Enhance boot-time security with GRUB passwords
Post date: April 26, 2006, 09:04 Category: Security Views: 14
Tutorial quote: The security of data files on your computer is at risk, and not just because you are connected to the Internet. Anyone with physical access to your machine can bypass all passwords to gain entry to your hard disk with one simple command given to the bootloader. Fortunately, the popular GRand Unified Bootloader (GRUB) is equipped with security features to prevent such an 'attack.' It can password protect each entry of your boot menu.
Unix+clones How to securely send and retrieve your mail via SSH
Post date: April 17, 2005, 20:04 Category: Network Views: 39
Tutorial quote: SSH allows you to create an encrypted network tunnel between your machine and other network. This document will show you how to set up this tunnel and then use it to securely send and retrieve your mail.
Unix+clones Setup the SSH server to use keys for authentication
Post date: November 16, 2005, 15:11 Category: Network Views: 57
Tutorial quote: The user creates a keypair, which consists of a private key, that can be protected with a passphrase, and a public key. The public key is transfered to the server and the private key is kept in our workstation. We assume that the user has accounts in both the server machine and his workstation. Everytime he tries to connect to the server, the keys are validated and the user is granted access.
Gentoo Shoutcast Streaming Server Guide
Post date: May 4, 2005, 13:05 Category: Network Views: 70
Tutorial quote: This guide explains how to set up a Shoutcast streaming music server. It covers situations when the server and transcoder are on the same machine, and when they are on different macines. The entire installation should take between 15-30 minutes at most.

The system works by taking mp3 files and feeding them into a transcoder. The transcoder in turn re-encodes the music and passes it to the server. The server receives the stream and when listeners connect, the server splits the stream so that each listener can hear the mp3's.
SuSe Working with SUSE Linux Enterprise Server 9
Post date: June 22, 2005, 05:06 Category: System Views: 130
Tutorial quote: Working with SUSE Linux Enterprise Server (SLES) requires an understanding of the login process, including local account files, system accounts, and managing identities.

Using a console shell or the graphical environment are two possible methods of working on a SLES machine.

Finding your way around a SLES installation requires an in-depth knowledge of the filesystem layout. Essential filesystem components are documented and explained in this chapter. Basic filesystem permissions are also described.
Linux Gnu Queue: Linux Clustering Made Easy
Post date: December 22, 2005, 14:12 Category: System Views: 85
Tutorial quote: GNU Queue makes it easy to cluster Linux workstations. If you already know how to control jobs running on your local machine, you already know how to control remote jobs using GNU Queue. You don't even need special privileges to install and run GNU Queue on your cluster--anyone can do it. Once you've discovered how incredibly easy it is to cluster Linux environments with GNU Queue, you'll wonder why organizations continue to spend so much money on comparatively hard-to-cluster Windows NT environments.