Linux tutorials
 |
Basic Linux Commands With Man Pages |
Post date: October 11, 2006, 16:10 Category: Installing Views: 1424 Comments: 0 |
Tutorial quote: Here are some basic commands to get you started in the wonderful world of Linux and other UNIX variants. All of these commands should work from your command prompt (regardless which shell you’re using). |
 |
Building a Virtual Cluster with Xen |
Post date: September 28, 2006, 04:09 Category: Emulation Views: 3617 Comments: 0 |
Tutorial quote: It is a common practice to have development and test servers for each production server, so that you can experiment with changes without the fear of breaking anything important, but this is usually not feasible with clusters. So how do you try that new version of your favorite program before committing it to the production cluster? A cheap and convenient possibility is to build a virtual cluster.
Thanks to the Xen virtual machine monitor, you can create a number of virtual machines, all running simultaneously in your computer, install different operating systems in them, or just different configurations, and connect them via (virtual) network cards. Xen is a terrific tool for building virtual Beowulf clusters. It can prove useful when learning or teaching about clusters or for testing new features/software without the fear of causing major damage to an existing cluster. |
 |
Linux GPRS/EDGE via Bluetooth |
Post date: August 29, 2006, 15:08 Category: Network Views: 1388 Comments: 0 |
Tutorial quote: In this guide I will show you howto configure internet access through GPRS/EDGE, using bluetooth connection with your GSM phone. |
 |
LDAP Authentication In Linux |
Post date: August 26, 2006, 06:08 Category: Security Views: 2011 Comments: 0 |
Tutorial quote: This howto will show you howto store your users in LDAP and authenticate some of the services against it. I will not show howto install particular packages, as it is distribution/system dependant. I will focus on "pure" configuration of all componenets needed to have LDAP authentication/storage of users. The howto assumes somehow, that you are migrating from a regular passwd/shadow authentication, but it is also suitable for people who do it from scratch. |
 |
Creating DjVu Documents Linux HOWTO |
Post date: July 16, 2006, 16:07 Category: Miscellaneous Views: 1567 Comments: 0 |
Tutorial quote: This document explains some of the uses of djvulibre implementation of DjVu for creating quality DjVu documents in linux. DjVu format features bitmap document compression and hypertext structure. It is used by numerous web sites all around the world for storing and distributing digital documents including scanned documents and high-resolution pictures. One of the advantages of DjVu files is that they are notably small, often smaller than PDF or JPEG files with the same content. This makes DjVu a helpful tool for digitizing books and journals, especially scientific ones.
Below it is considered the case when a DjVu document is created from a number of separate JPEG files each containing a single page. Here JPEG format is not a limitation, and the examples can cover arbitrary image formats. Conversion from PDF to DjVu is also discussed. Usage of scanner software is not explained: refer to the relevant documentation. |
 |
Monitoring disk space and usage |
Post date: June 17, 2006, 15:06 Category: Software Views: 2586 Comments: 0 |
Tutorial quote: Monitoring disk space is a vital part of your job as a UNIX administrator. This article gives you the tools you need to be successful, including the use of df, du, find, and even the use of quotas. Let's get started by taking a look at how useful df can be. |
 |
How To Run Your Own Name Servers With ISPConfig And GoDaddy |
Post date: June 16, 2006, 22:06 Category: Network Views: 1234 Comments: 0 |
Tutorial quote: This tutorial shows how you can run your own name servers for domains that you register with GoDaddy. Of course, this works with every other registrar as well, although the procedure might differ a little bit. |
 |
Creating a safe directory with PAM and Encfs |
Post date: June 7, 2006, 20:06 Category: Security Views: 1338 Comments: 0 |
Tutorial quote: Now, in my network (and others) the credentials provided at login could (and should) be used by those programs. How can you retrieve these credentials, providing enough security?
With a the PAM modules pam_script it's possible to store the password in a file, which will be used by fusemb and mount.cifs to read the password from.
To achieve security, one could make the user logging in owner and deny read/write for anybody else. Remove this file when the user ends his/her session.
This is enough, for runtime. But I was wondering, but what if the system crashes, and the file with the credentials remains on the harddrive? Anybody who is able to mount this harddrive with for example a lifecd, can read this file!
That's why I was looking for a way to encrypt this file.
With encfs this is very possible! At run time it gives an interface to encrypted files and directories, which does only exist at runtime! When the system is not running, there are only encrypted files, useless when you do not know the key to it. And this key is exactly the (encrypted) password! That's why I've chosen for a combination of PAM and Encfs. |
 |
How to suspend and hibernate a laptop under Linux |
Post date: June 7, 2006, 20:06 Category: Hardware Views: 2907 Comments: 0 |
Tutorial quote: Many people prefer working with laptops instead of desktops for the flexibility they offer. Some of them would also like to switch to a free and open source operating system like GNU/Linux and have their laptop do all the things that proprietary OSes offer, such as suspending their laptops. Several distributions try to make this work out of the box, but knowing what's under the hood always comes in handy, particularly when something goes wrong and needs fixing. Let's take a look at how to suspend and hibernate your laptop under Linux. |
|
|