Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

System related tutorials

Debian

Recovering from file system corruption using TestDisk

Post date: August 12, 2006, 18:08 Category: System Views: 2844 Comments
Tutorial quote: We've all been there. We press the wrong key, we do some silly mistake, and suddenly, one or more of our file systems refuse to work. Whenever this happens, the first thing we hear is "You should have made a backup", the dreaded sentence that we'll never listen to. Let's face it, we're stupid, and we don't backup.
Debian

Growing ext3 partition on RAID1 without rebooting

Post date: August 12, 2006, 18:08 Category: System Views: 3399 Comments
Tutorial quote: Although rather straightforward, I couldn't find an easy step-by-step guide, so here I'll describe how I ended up growing my ext3 partion on a RAID-1 array.
FreeBSD

Working with gmirror on a Sun Fire X2100

Post date: August 12, 2006, 18:08 Category: System Views: 3486 Comments
Tutorial quote: Mirror setup. Recently I was given a brand new X2100 server made by Sun Microsystems. I installed FreeBSD on it and run a mailserver. The server has two 250GB SATA drives and I decided to use gmirror(8) to create RAID-1 on those disks.
Ubuntu

NTFS-3G - Read & Write NTFS

Post date: July 30, 2006, 18:07 Category: System Views: 5318 Comments
Tutorial quote: A cool little app has been released which allows you to safely read and write to your Windows NTFS drives directly in your Linux machine.
Debian

Giving users a home directory automatically

Post date: June 16, 2006, 21:06 Category: System Views: 2872 Comments
Tutorial quote: If you are using LDAP or NIS to manage users you might discover users having problems because they don't have a home directory on each machine they can connect to. Thankfully there is a simple solution for creating home directories upon demand for users.

The Pluggable Authentication Modules library, or PAM, is a collection of shared libraries which control how users login to systems. There are a number of modules installed which can be used to restrict user access to systems in different ways. There are also several utility modules which can be used to customise login behaviour.
Linux

Backing Up and Restoring Using the cpio Command in Linux and Unix

Post date: May 26, 2006, 18:05 Category: System Views: 2743 Comments
Tutorial quote: The cpio command is one of the most commonly used Linux back up tools.

The cpio command has two unusual features

Unlike tar , in which the files to back up are typed in as part of the command, cpio reads the files to work with from the standard input (in other words, the screen).

This feature means that cpio must be used as part of a multiple command or with a redirection pipe. Examples of this usage are shown in the tables below.

cpio must always be used with one of three flags. Flags are options that set the mode in which the command runs. Only one flag can be used at a time, and it must come before any other options. In addition, the choice of flags limits the options that can be used. Each flag also has a gnu option that can used in its place. The gnu option gives a convenient name for each flag: extract, create, and pass- through.
Ubuntu

How to install ANYTHING in Ubuntu!

Post date: May 15, 2006, 16:05 Category: System Views: 4994 Comments
Tutorial quote: Having trouble figuring out how to install anything in Ubuntu? Have you been thinking questions like these? "Where's the EXE?", "Where do I need to extract this to?", "How do I run it?", "Where did it go?", "Why is it so complicated?" Is it really? It's just as easy in Ubuntu as it is in Windows, only different, and that is what this guide will teach you all about.
SuSe

A Fresh Approach - SUSE 10.1 package management

Post date: May 12, 2006, 13:05 Category: System Views: 4149 Comments
Tutorial quote: In SUSE 9.x and 10.0 the default package management software was the software management module and yast online update ( YOU ) in YaST2 and the susewatcher system tray applet. The susewatcher applet would faithfully report any security or system updates and would let you launch YOU to download and apply the updates. For third party software you could add online repositories to the installation sources module and ultimately you could manage all your software from the software management module, again in YaST2.
Linux

Controlling your locale with environment variables

Post date: May 2, 2006, 12:05 Category: System Views: 2781 Comments
Tutorial quote: People all over the world use Linux in dozens of languages. Since Linux's source code is free and open, speakers of minority languages can add support for their languages themselves, even though a large corporation might not consider them a worthwhile market. If you use more than one language, or a language other than English, you should know about Linux's use of locales to support different languages. Indeed, understanding locales can be useful even if you only use English.
Debian

Centralized Syslog Server Using syslog-NG

Post date: April 28, 2006, 15:04 Category: System Views: 3798 Comments
Tutorial quote: syslog-ngĀ© is the world's most flexible and scalable audit trail processing tool for organizations of any size. It provides a centralised, securely stored log of all devices on your network, whatever platform they run on. And syslog-ng also incorporates a host of powerful features, including filtering based on message content, as well as customisable data mining and analysis capabilities.

Web-based applications and online marketing solutions - LumoLink