Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Xen Virtualization and Linux Clustering, Part 1

Linux Rip DVDs in Linux the (Semi-)Easy Way
Post date: December 8, 2007, 08:12 Category: Multimedia Views: 1364 Comments: 0
Tutorial quote: With its hacker-friendly aesthetic and open source mentality, you'd think a Linux desktop would be the best place to assert your digital rights—you know, make backup copies of your DVDs, convert them for iPods, that kind of thing.

And you'd be half right. There are plenty of programs that let you take control of your video discs, but they're only useful if you can make it through a maze of configuration menus, command line options, choices about bit rates and codecs, and the occasional confusing message about a missing library.

I've tried out a good number of DVD ripping and conversion programs, and I've made peace with one method, and one program, that gets the job done more often than not. It's not exactly one-click, but once your system is set up, you can drop in DVDs and back them up or convert them with relative ease.

Note on system differences: I set up my ripping/burning system on a Lenovo Thinkpad T61 running a brand-new installation of Ubuntu 7.10 (Gutsy Gibbon). As with so many things Linux, packages and commands may vary based on your system. But for the most part, the tools I use in this walkthrough work across distributions and on both major desktop environments, GNOME and KDE.
Linux Linux Web Filtering in 7 steps
Post date: April 12, 2005, 13:04 Category: Network Views: 1893 Comments: 0
Tutorial quote: How to install a transparent Squid proxy server with real-time HTTP virus scanning on Mandrake 10.0 using DansGuardian and ClamAV?

People quickly and easily access volumes of research on the Internet and correspond with a mouse click. For more and more companies, content filtering is part of the large battle to combat all kinds of online threats, including hackers, worms and viruses. Linux content filtering allows administrators to configure and manage Internet access across the entire network and to block unwanted Web content like pornography, shopping Web sites, games and gambling.

This guide contains all the necessary information for installing and understanding the architectural layout of the implementation. It was written with the assumption that you understand how to install programs and have a basic understanding of Linux Mandrake. This includes installing Linux Mandrake and RPM packages, editing files, making directories, compiling software and understanding general UNIX commands. This guide doesn’t explain how to use or configure Squid, DansGuardian and ClamAV but information on where to obtain this information can be found in the “Additional information” section.
Unix+clones Backing up your files with rsync
Post date: October 14, 2007, 10:10 Category: Network Views: 1449 Comments: 0
Tutorial quote: Backing up files on a regular basis is an integral part of administering your server.

One way is to download each and every file when you want to save them. However, rsync makes the task a lot easier as it only downloads files that have changed - saving time and bandwidth.
Linux Three tools to help you configure iptables
Post date: May 25, 2005, 09:05 Category: Network Views: 1205 Comments: 0
Tutorial quote: Every user whose client connects to the Internet should configure his firewall immediately after installation. Some Linux distributions include firewall configuration as a part of installation, often offering a set of defaults configurations to choose from. However, to ensure that your machine presents the minimum "attack surface" (a measure of the number of vulnerable ports, user accounts, and sockets exposed to attack) to the predatory inhabitants of the Internet, you may need to do some manual configuration of your firewall. Here are three tools that can help.
The Linux kernel (version 2.4 onwards) contains a framework for packet filtering and firewalling using netfilter and iptables. Netfilter is a set of hooks inside the Linux kernel that allows kernel modules to register callback functions with the network stack. Iptables is a generic table structure for the definition of rulesets. Each rule within an IP table consists of a number of classifiers (iptables matches) and one connected action (iptables target). Iptables has extensive documentation that can be accessed online or by typing man iptables at the command line. Yet despite the depth of the documentation available for iptables, its complexity can be baffling.
Debian Monitoring your bandwidth usage with vnstat
Post date: January 14, 2006, 14:01 Category: Network Views: 1211 Comments: 0
Tutorial quote: There are many occasions where it is useful to have an idea of your bandwidth usage, perhaps to know when you're going to be charged more by your ISP, or perhaps just as part of general monitoring. The vnstat tool is a simple means of doing just that.
Ubuntu Disable unnecessary services in Ubuntu - Boot-Up Manager
Post date: November 17, 2008, 05:11 Category: Optimizing Views: 3928 Comments: 0
Tutorial quote: The startup scripts located in /etc/init.d are part of the bootup sequence of every Debian-like distro. Very often Ubuntu's documentation and guides have suggested - in order to deactivate init scripts - to change the permissions of the scripts in /etc/init.d, making them non-executable.
FreeBSD Bluetooth Security Review, Part 1
Post date: April 29, 2005, 19:04 Category: Security Views: 980 Comments: 0
Tutorial quote: Bluetooth (BT) wireless technology provides an easy way for a wide range of devices to communicate with each other and connect to the Internet without the need for wires, cables and connectors. The technology seams to be very interesting and beneficial, yet it can also be a high threat for the privacy and security of Bluetooth users.
Unix+clones Performance Tuning with GCC, Part 1
Post date: November 25, 2005, 19:11 Category: Optimizing Views: 1145 Comments: 0
Tutorial quote: This article provides an overview of the different flags controlling optimization in GCC and some hints on how to use them to get the most performance out of your application. In particular, it discusses some of the new optimization features of the GCC 4.x series included in Fedora™ Core 4 and the upcoming Red Hat® Enterprise Linux® versions.
Fedora+Core IPTABLES Explained Part 4: IPTables and Portsentry, the dynamic duo
Post date: January 3, 2007, 04:01 Category: Security Views: 3682 Comments: 0
Tutorial quote: A tutorial that explains on how to make Portsentry and IPTables to work smoothly together on Fedora. This includes the dynamic adding AND the periodic removal of "old" IPs as well as saving your blocked IP lists in case you need to change your IPTables script or reboot.
Ubuntu KVM Guest Management With Virt-Manager On Ubuntu 8.10
Post date: February 10, 2009, 06:02 Category: Miscellaneous Views: 1119 Comments: 0
Tutorial quote: Virt-Manager (Virtual Machine Manager) is a graphical interface for managing KVM and Xen guests on the local and also on remote systems. You can use it to start, stop, pause, create, and delete guests, and you can connect to the guests using the graphical console. This guide shows how you can use it to manage KVM guests on an Ubuntu 8.10 desktop.