Linux tutorials
 |
Chmod Squad: HOWTO Use Linux File Permissions |
Post date: January 6, 2007, 21:01 Category: System Views: 1610 Comments: 0 |
Tutorial quote: A complete new user's guide to the Linux file permission system, with examples. Be mystified no more by cryptic file permission bits. |
 |
What's up, Doc? A guide to Linux Documentation |
Post date: January 6, 2007, 21:01 Category: System Views: 1177 Comments: 0 |
Tutorial quote: If you're new to Linux, you've probably been told to read the manual, but what good is that advice if you don't know where the manuals are or how to use them? Here, in one place, is complate instructions on how to find and navigate the common Linux documentation systems, including man, info, READMEs, HOWTOs, HTML, PDF/PS, DocBook, Gnome and KDE help system, and command-line option conventions. The guide I wish I'd had when I was new to Linux! |
 |
Change your Network card MAC ( Media Access Control) address Using macchanger |
Post date: January 4, 2007, 20:01 Category: Network Views: 1316 Comments: 0 |
Tutorial quote: Media Access Control address, a hardware address that uniquely identifies each node of a network. In IEEE 802 networks, the Data Link Control (DLC) layer of the OSI Reference Model is divided into two sublayers: the Logical Link Control (LLC) layer and the Media Access Control (MAC) layer. The MAC layer interfaces directly with the network medium.Consequently, each different type of network medium requires a different MAC layer. On networks that do not conform to the IEEE 802 standards but do conform to the OSI Reference Model, the node address is called the Data Link Control (DLC) address. |
 |
Tunneling MySQL connections through SSH |
Post date: January 2, 2007, 20:01 Category: Security Views: 1434 Comments: 0 |
Tutorial quote: This is a description of how to set up a secure tunnel between your MySQL Server and a locally running MySQL Administrator using Putty. By creating a secure tunnel to your MySQL server using Putty, you can grant localhost access to powerful applications like MySQL Administrator while at the same time, make your server appear as if it isn't even there. In effect, make your MySQL server disappear from the outside world. |
 |
How to restore deleted file on ext2 |
Post date: December 15, 2006, 19:12 Category: System Views: 1257 Comments: 0 |
Tutorial quote: This text describes the steps needed do recover the data of a file that was recently deleted. |
 |
Accessing Windows Or Samba Shares Using AutoFS |
Post date: December 14, 2006, 20:12 Category: Network Views: 1799 Comments: 0 |
Tutorial quote: You already installed Linux on your networked desktop PC and now you want to work with files stored on some other PCs in your network. This is where autofs comes into play. This tutorial shows how to configure autofs to use CIFS to access Windows or Samba shares from Linux Desktop PCs. It also includes a tailored configuration file. |
 |
screen: Keep Your Processes Running Despite A Dropped Connection |
Post date: December 12, 2006, 20:12 Category: System Views: 1045 Comments: 0 |
Tutorial quote: I guess you all know this: you are connected to your server with SSH and in the middle of compiling some software (e.g. a new kernel) or doing some other task which takes lots of time, and suddenly your connection drops for some reason, and you lose your labour. This can be very annoying, but fortunately there is a small utility called screen which lets you reattach to a previous session so that you can finish your task. This short tutorial shows how to use screen for just this purpose. |
 |
Key-Based SSH Logins With PuTTY |
Post date: December 10, 2006, 20:12 Category: Security Views: 1563 Comments: 0 |
Tutorial quote: This guide describes how to generate and use a private/public key pair to log in to a remote system with SSH using PuTTY. PuTTY is an SSH client that is available for Windows and Linux (although it is more common on Windows systems). Using key-based SSH logins, you can disable the normal username/password login procedure which means that only people with a valid private/public key pair can log in. That way, there is no way for brute-force attacks to be successful, so your system is more secure. |
 |
Postfix with dkfilter (DomainKeys Implementation) |
Post date: December 7, 2006, 21:12 Category: Security Views: 2002 Comments: 0 |
Tutorial quote: DomainKeys is an anti-spam software application in development at Yahoo that uses a form of public key cryptography to authenticate the sender's domain. dkfilter is an SMTP-proxy designed for Postfix. It implements DomainKeys message signing and verification. It comprises two separate filters, an outbound filter for signing outgoing email on port 587, and an inbound filter for verifying signatures of incoming email on port 25. This document shows step-by-step how to install dkfilter for Postfix to deploy DomainKeys signing and verification. |
|
|