Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Working with SUSE Linux Enterprise Server 9

Debian Aggregating network interfaces
Post date: February 12, 2006, 01:02 Category: Network Views: 1182 Comments: 0
Tutorial quote: Using more than one hard drive to achieve better performance and fault tolerance is very common. Less well known is that it's also possible to aggregate more than one network interface into a single logical interface. In Linux, this is handled by the bonding driver. Benefits of doing this are much the same as the benefits of aggregating discs using RAID: if one device dies, your server carries on working and by using two devices in parallel, performance can be improved.
FreeBSD Working with gmirror on a Sun Fire X2100
Post date: August 12, 2006, 13:08 Category: System Views: 1251 Comments: 0
Tutorial quote: Mirror setup. Recently I was given a brand new X2100 server made by Sun Microsystems. I installed FreeBSD on it and run a mailserver. The server has two 250GB SATA drives and I decided to use gmirror(8) to create RAID-1 on those disks.
Ubuntu Get your wireless card working in Ubuntu
Post date: June 3, 2006, 06:06 Category: Network Views: 2393 Comments: 0
Tutorial quote: Okay so you have a wireless card that shows up in ubuntu but doesnt connect to any wireless network?

The reason the card shows up but doesnt work is because ubuntu is distributed with its driver (so it can recognize it) but not with its firmware (so it can USE it) for legal reasons.

However you can take the firmware out of the windows drivers and put them into ubuntu and make the card work
Follow these steps to get your wireless card working under ubuntu dapper 6.06
Unix+clones Remote backup using ssh, tar and cron
Post date: April 12, 2005, 20:04 Category: Miscellaneous Views: 939 Comments: 0
Tutorial quote: Are you looking for a solution to backup your data to a remote location? While a solid backup solution such as Arkeia or TSM from IBM are nice from an enterprise point of view, simpler solutions are available from a home user's perspective. I will walk you through on you how you can backup your data to a remote server, using the default tools available on all linux systems. In a nutshell, we will use ssh capabilities to allow a cron job to transfer a tarball from you local machine to a remote machine.

For the purpose of this tutorial, the local machine will be called “localmachine” (running slackware) and the remote server will be called “remoteserver” (slackware as well). The user will be joe (me). You will have to substitute those 3 with your own machines names and user.
Gentoo EVMS Howto for Gentoo Linux
Post date: April 14, 2005, 23:04 Category: Hardware Views: 2271 Comments: 0
Tutorial quote: EVMS stands for Enterprise Volume Management System. It's a all-in-one utility written by IBM to manage disk partitions, logical volumes, software RAID and even filesystems.

It does everything from installing the partition table to mounting volumes, fscking and resizing them. It has a plugin mechanism which allow a user to extend EVMS with external drivers.
Linux How to suspend and hibernate a laptop under Linux
Post date: June 7, 2006, 15:06 Category: Hardware Views: 2429 Comments: 0
Tutorial quote: Many people prefer working with laptops instead of desktops for the flexibility they offer. Some of them would also like to switch to a free and open source operating system like GNU/Linux and have their laptop do all the things that proprietary OSes offer, such as suspending their laptops. Several distributions try to make this work out of the box, but knowing what's under the hood always comes in handy, particularly when something goes wrong and needs fixing. Let's take a look at how to suspend and hibernate your laptop under Linux.
Ubuntu How to Create a Private Encrypted Folder On Ubuntu 8.10
Post date: March 5, 2009, 02:03 Category: System Views: 1039 Comments: 0
Tutorial quote: eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem for Linux.It provides advanced key management and policy features. eCryptfs stores cryptographic metadata in the header of each file written, so that encrypted files can be copied between hosts; the
file will be decryptable with the proper key, and there is no need to keep track of any additional information aside from what is already in the encrypted file itself. Think of
eCryptfs as a sort of gnupgfs.eCryptfs is a native Linux filesystem. The kernel module component of eCryptfs is part of the Linux kernel since 2.6.19.
Ubuntu How to Create a Private Encrypted Folder On Ubuntu 8.10 (Intrepid)
Post date: January 13, 2009, 07:01 Category: System Views: 938 Comments: 0
Tutorial quote: eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem for Linux.It provides advanced key management and policy features. eCryptfs stores cryptographic metadata in the header of each file written, so that encrypted files can be copied between hosts; the file will be decryptable with the proper key, and there is no need to keep track of any additional information aside from what is already in the encrypted file itself. Think of eCryptfs as a sort of gnupgfs.eCryptfs is a native Linux filesystem. The kernel module component of eCryptfs is part of the Linux kernel since 2.6.19.

Unix+clones Build Your Own IM Server with Jabber
Post date: June 26, 2005, 17:06 Category: Network Views: 2164 Comments: 0
Tutorial quote: Instant messaging is a great business communications tool. For example, here at Enterprise Networking Planet the staff and writers all work in their pajamas at home, at far-flung points all over the globe. ENP's crusty editor-with-a-heart-of-gold Perry White lives in a villa in the South of France. I send in my columns from a sailboat currently anchored at Raratonga. Sure, we can exchange emails, but there are times when a live exchange is better.
Solaris NIST Publically-Released Fedora/Red Hat Core Security Guide
Post date: October 20, 2006, 23:10 Category: Security Views: 1889 Comments: 0
Tutorial quote: The Benchmark is a compilation of security configuration actions and settings that "harden" Red Hat Linux operating systems. It is a CIS Level-I benchmark: the prudent level of minimum due care for operating system security. This benchmark was developed and tested on Red Hat Enterprise Linux (RHEL) including RHEL 2.1, RHEL 3.0, and Fedora Core 1, 2, & 3. It is likely to work for other Linux distributions - especially Red Hat and Fedora derivatives - as well.