Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo
Unix clones tutorials
Unix+clones Tweaking Opera under *NIX
Post date: April 21, 2005, 09:04 Category: Software Views: 824 Comments: 0
Tutorial quote: As with everything else on linux, getting Opera's features to work perfectly sometimes requires a few adjustments to be done by hand. This tutorial will help you install plugins for opera (flash, java etc) as well as making opera fonts look smooth.
Unix+clones Xen Disk I/O benchmarking: NetBSD dom0 vs Linux dom0
Post date: April 21, 2005, 05:04 Category: Benchmarks Views: 1050 Comments: 0
Tutorial quote: Xen is a relatively new technology to enable several virtual machines (domU) to run on one computer. The purpose of this article is to determine what operating system (NetBSD or Linux) should be selected as domain 0 (dom0) operating system to get the best performance when running several CPU and disk intensive virtual machines at the same time.
Unix+clones How to write really small TCP/IP stacks
Post date: April 20, 2005, 05:04 Category: Programming Views: 912 Comments: 0
Tutorial quote: Writing really small TCP/IP stacks and making them withstand slashdottings.
Unix+clones Considerations for the system architect: Performance
Post date: April 20, 2005, 05:04 Category: Miscellaneous Views: 1178 Comments: 0
Tutorial quote: For many developers and engineers, performance is often an afterthought. But when a product functions as designed and has proven stability and the right feature mix, success in the marketplace often depends upon performance. Architectural decisions define the ultimate feasible performance of any product. In this article, learn how performance-monitoring technology initially developed for mainframes can help you improve your own code's performance.
Unix+clones SSH Port Forwarding Through a Proxy Server
Post date: April 17, 2005, 22:04 Category: Network Views: 700 Comments: 0
Tutorial quote: A common use of SSH is port forwarding (tunneling). This use causes traffic directed to a particular port to be sent to a specified port on another computer. Because traffic is sent through SSH, the traffic is encrypted, allowing the transmission of sensitive data through arbitrary services.
Unix+clones How to securely send and retrieve your mail via SSH
Post date: April 17, 2005, 19:04 Category: Network Views: 555 Comments: 0
Tutorial quote: SSH allows you to create an encrypted network tunnel between your machine and other network. This document will show you how to set up this tunnel and then use it to securely send and retrieve your mail.
Unix+clones DNS Common Abuses
Post date: April 17, 2005, 04:04 Category: Security Views: 768 Comments: 0
Tutorial quote: In paper I have present several features of DNS to make the reader familiar with the basics of the Domain Name System. I have also covered several well known and wide spread attacks that are used to exploit DNS. These attacks are by no means theoretical. In truth they grow more and more common as attackers become more sophisticated. The suggested defense methods outlined at the end of each section cover only the basic recommendations that can be used to thwart attackers.
Unix+clones Introduction to Python
Post date: April 17, 2005, 04:04 Category: Programming Views: 922 Comments: 0
Tutorial quote: Ok, first part is going to be fairly boring, but put up with it. Im just going to go through a few reasons why you should choose Python as a language to learn. First off it free!, there is no cost involved in gettin Python, although there is a license, but this is just a standard license that goes with all free and open source software. Python is an open source language, as is the interpreter (Python is written in C).
Unix+clones How to Use GIMP for Photo and Image Editing
Post date: April 15, 2005, 19:04 Category: Software Views: 723 Comments: 0
Tutorial quote: In today's hands-on tutorial, you will learn how to apply The GIMP's powerful layer and pattern tools to put a frame or border around a digital photo or digital image by editing a photograph in our digital darkroom. It's a simple application of what you already have learned in our Gimp tutorial series about using the Gimp's layer and pattern tools.
Unix+clones SpamAssassin, ClamAV and Procmail Howto
Post date: April 15, 2005, 19:04 Category: Network Views: 1130 Comments: 0
Tutorial quote: This document describes how to install SpamAssassin (for filtering SPAM) and ClamAV (for filtering viruses, trojans, worms, etc.) and how to invoke them by using procmail recipes. It is suitable for scenarios where Sendmail or Postfix deliver emails to local users. It should work (maybe with slight changes concerning paths etc.) on all *nix operating systems. I tested it on Debian Woody so far.

In the end you will have a system where Sendmail or Postfix deliver emails to a local user; the emails are passed to procmail which invokes SpamAssassin and ClamAV in order to filter the emails before they arrive in the user's inbox. However, the installation of Sendmail and Postfix are not covered in this document.

This howto is meant as a practical guide.