Network related tutorials
 |
VNC control of a Mac under OS X 10.4 |
Post date: December 10, 2005, 08:12 Category: Network Views: 2339 Comments: 0 |
Tutorial quote: VNC support is built right into Tiger. This means you can remote control you mac from an another mac a PC or even you Palm or Blackberry.
However the functionality is a bit hidden. Here are the simple steps to set it up. Remember this is TIGER not Panther. |
 |
CLI Magic: More on SSH |
Post date: December 9, 2005, 01:12 Category: Network Views: 1133 Comments: 0 |
Tutorial quote: We've covered SSH before in CLI Magic, but this week let's look at some additional SSH features that new users might not be aware of. For the purpose of this article, we'll be looking specifically at OpenSSH, but many of these features apply to other SSH variants as well. |
 |
iptables: The Linux Firewall Administration Program |
Post date: November 29, 2005, 20:11 Category: Network Views: 1305 Comments: 0 |
Tutorial quote: This chapter covers the iptables firewall administration program used to build a Netfilter firewall. For those of you who are familiar with or accustomed to the older ipfwadm and ipchains programs used with the IPFW technology, iptables will look very similar to those programs. However, it is much more feature-rich and flexible, and it is very different on subtle levels. |
 |
Building a Linux cluster on a budget |
Post date: November 18, 2005, 19:11 Category: Network Views: 2107 Comments: 0 |
Tutorial quote: So you need a lot of computing power but don't want to spend tens of thousands of dollars on a commercial cluster? Or maybe you just have a lot of machines sitting idle that you would like to put to good use? You can build a powerful and scalable Linux cluster using only free software and off-the-shelf components. Here's how. |
 |
Setup the SSH server to use keys for authentication |
Post date: November 16, 2005, 20:11 Category: Network Views: 1314 Comments: 0 |
Tutorial quote: The user creates a keypair, which consists of a private key, that can be protected with a passphrase, and a public key. The public key is transfered to the server and the private key is kept in our workstation. We assume that the user has accounts in both the server machine and his workstation. Everytime he tries to connect to the server, the keys are validated and the user is granted access. |
 |
ISP Server Setup - OpenSUSE 10 RC 1 |
Post date: October 9, 2005, 18:10 Category: Network Views: 3151 Comments: 0 |
Tutorial quote: This is a detailed description about the steps to be taken to setup a OpenSUSE 10.0 based server that offers all services needed by ISPs and hosters (web server (SSL-capable), mail server (with SMTP-AUTH and TLS!), DNS server, FTP server, MySQL server, POP3/IMAP, Quota, Firewall, etc.) and the ISPConfig control panel. |
 |
ISP-Server Setup - Ubuntu 5.0.4 "The Hoary Hedgehog" |
Post date: October 9, 2005, 18:10 Category: Network Views: 1481 Comments: 0 |
Tutorial quote: This is a detailed description about the steps to be taken to setup a Ubuntu based server (Ubuntu 5.0.4 - The Hoary Hedgehog) that offers all services needed by ISPs and hosters (web server (SSL-capable), mail server (with SMTP-AUTH and TLS!), DNS server, FTP server, MySQL server, POP3/POP3s/IMAP/IMAPs, Quota, Firewall, etc.). |
 |
Virtual Users And Domains With Postfix, Courier And MySQL (+ SMTP-AUTH, Quota, SpamAssassin, ClamAV) |
Post date: October 9, 2005, 18:10 Category: Network Views: 1783 Comments: 0 |
Tutorial quote: This document describes how to install a mail server based on Postfix that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I'll also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses.
The resulting Postfix server is capable of SMTP-AUTH and TLS and quota (quota is not built into Postfix by default, I'll show how to patch your Postfix appropriately). Passwords are stored in encrypted form in the database (most documents I found were dealing with plain text passwords which is a security risk). In addition to that, this tutorial covers the installation of Amavisd, SpamAssassin and ClamAV so that emails will be scanned for spam and viruses. |
 |
Installing ProFTPD |
Post date: August 26, 2005, 13:08 Category: Network Views: 1575 Comments: 0 |
Tutorial quote: This document is about replacing the standard ftpd from the FreeBSD kernel with the fancier ProFTPd. |
 |
Unattended, Encrypted, Incremental Network Backups |
Post date: August 12, 2005, 18:08 Category: Network Views: 1404 Comments: 0 |
Tutorial quote: This article describes a complete system for creating a centralised backup system, complete with strong encryption. Incremental backups are used to minimize the bandwidth, and time, used. |
|
|