Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Unix clones tutorials
Unix+clones

Python Programming for Beginners

Post date: September 19, 2006, 09:09 Category: Programming Views: 43728 Comments
Tutorial quote: Despite what assembly code and C coders might tell us, high-level languages do have their place in every programmer's toolbox, and some of them are much more than a computer-science curiosity. Out of the many high-level languages we can choose from today, Python seems to be the most interesting for those who want to learn something new and do real work at the same time. Its no-nonsense implementation of object-oriented programming and its clean and easy-to-understand syntax make it a language that is fun to learn and use, which is not something we can say about most other languages.

In this tutorial, you will learn how to write applications that use command-line options, read and write to pipes, access environment variables, handle interrupts, read from and write to files, create temporary files and write to system logs. In other words, you will find recipes for writing real applications instead of the old boring Hello, World! stuff.
Unix+clones

MySQL Master Master Repliction

Post date: September 18, 2006, 14:09 Category: Benchmarks Views: 5668 Comments
Tutorial quote: When we need to replication mysql servers with each other some time for synchronizing for HA. In my case I need the mysql servers for which two masters must be synchronized with each other so that if any one drops down, other could take care of the one and data must not be lost. Similarly when one goes up, it will still be used as slave for the live one.

Here is a basic step by step tutorial, that will cover the mysql master and slave replication and also will describe the mysql master and master replication.
Unix+clones

C/C++ development with the Eclipse Platform

Post date: September 11, 2006, 17:09 Category: Programming Views: 3869 Comments
Tutorial quote: Get an overview of how to use the Eclipse Platform in your C/C++ development projects. Though Eclipse is mainly a Java™ development environment, its architecture ensures support for other programming languages. In this article, you'll learn how to use the C/C++ Development Toolkit (CDT), which is the best C/C++ toolkit available for Eclipse.
Unix+clones

Do everything right from the command line

Post date: September 7, 2006, 14:09 Category: Network Views: 3823 Comments
Tutorial quote: Discover three essential UNIX® utilities that deliver the entire Internet to your command line.
Unix+clones

Security Testing your Apache Configuration with Nikto

Post date: August 29, 2006, 16:08 Category: Security Views: 3426 Comments
Tutorial quote: By now you've got the perfect setup for your new Ubuntu 6.0.6 (Dapper Drake) box. You may have even followed the excellent Intrusion Detection and Prevention with BASE and Snort tutorial. And as an added precaution you installed DenyHosts to prevent hack attempts via ssh. But now that you've got your new LAMP server on the internet, how can you tell that your new web server is secure? You test it, of course!
Unix+clones

Create Incremental Snapshot-style Backups With rSync And SSH

Post date: August 29, 2006, 16:08 Category: Network Views: 3050 Comments
Tutorial quote: As neither human nor computers are perfect (humans err / computers may fail) it is quite obvious that a good backup system will prevent from too much damage once the computer may go down. This could be either because the harddrive is failing or because of hackers or because you accidentally deleted something important.

In this tutorial I will show you how to automate backups automatically in an incremental snapshot-style way by using rSync.
Unix+clones

How to restore a hacked Linux server

Post date: July 30, 2006, 18:07 Category: Security Views: 3612 Comments
Tutorial quote: Every sysadmin will try its best to secure the system/s he is managing. Hopefully you never had to restore your own system from a compromise and you will not have to do this in the future. Working on several projects to restore a compromised Linux system for various clients, I have developed a set of rules that others might find useful in similar situations. The type of hacks encountered can be very variate and you might see very different ones than the one I will present, or I have seen live, but even so, this rules might be used as a starting point to develop your own recovery plan.
Unix+clones

Manage Apache Download Speed And Traffic Limits With mod_cband

Post date: June 2, 2006, 06:06 Category: Network Views: 3417 Comments
Tutorial quote: In this tutorial I will describe how to install and configure mod_cband on an Apache2 web server. mod_cband is an Apache 2 module which provides bandwidth quota and throttling. It solves the problem of limiting users' and virtualhosts' bandwidth usage. The current version can set virtualhosts' and users' bandwidth quotas, maximal download speed, requests-per-second speed and the maximal number of simultanous IP connections.
Unix+clones

How To Automate Spamcop Submissions

Post date: May 26, 2006, 07:05 Category: Network Views: 2932 Comments
Tutorial quote: Spamcop is a service which provides RBLs for mailservers in order to reject incoming mail from spammers.

Their philosophy is to process possible spam complaints from users. When they receive a certain amount of complaints during a time-period then they will blacklist the offender. This system is dependant on spam reporting from users. However, their submission process is not very user-friendly.

As I have said above, Spamcop is pretty much dependant on the user input. If no one submits and verifies spam, then they will have no blacklist. However that whole submission and verification process is a bit annoying. Why should I bother to actually submit spam to spamcop and have it verified? If I just delete it, that will take less time...

The human being isn't really made to do repeating things. This gets quickly boring and hence my idea to automate this submission and verfication process.
In this howto I will show you how I achieved that. All I do is just putting the spam into certain folders and our good old friend cron does the rest.
Unix+clones

How to scan your Linux-Distro for Root Kits

Post date: May 19, 2006, 18:05 Category: Security Views: 3090 Comments
Tutorial quote: Do you suspect that you have a compromised system ?
Check now for root kits that the intruder may have installed !!!

So... What in the hell is a root kit ???
A root kit is a collection of programs that intruders often install after they have compromised the root account of a system.
These programs will help the intruders clean up their tracks, as well as provide access back into the system.
Root kits will sometimes leave processes running so that the intruder can come back easily and without the system administrator's knowledge !

Solution....
Scripts like chkrootkit will do the job for you automatically.
Web-based applications and online marketing solutions - LumoLink