Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Network related tutorials

Gentoo Time synchronization with ntp daemon
Post date: May 4, 2005, 12:05 Category: Network Views: 1366 Comments: 0
Tutorial quote: The following instructions will install the ntpd program. After following the instructions below your system time will automatically be kept accurate by ntpd. Which will synchronize your computer's time with that kept by a time server out on the Internet.
Gentoo Shoutcast Streaming Server Guide
Post date: May 4, 2005, 12:05 Category: Network Views: 2459 Comments: 0
Tutorial quote: This guide explains how to set up a Shoutcast streaming music server. It covers situations when the server and transcoder are on the same machine, and when they are on different macines. The entire installation should take between 15-30 minutes at most.

The system works by taking mp3 files and feeding them into a transcoder. The transcoder in turn re-encodes the music and passes it to the server. The server receives the stream and when listeners connect, the server splits the stream so that each listener can hear the mp3's.
OpenBSD Failover Firewalls with OpenBSD and CARP
Post date: April 27, 2005, 21:04 Category: Network Views: 3016 Comments: 0
Tutorial quote: Firewalls are a required component in commercial and residential computer networks. For many installations, the firewall is a single point of failure between client systems and external resources. It can also become a liability when hardware or applications fail, leaving potential customers unable to reach your servers. A properly designed and executed failover configuration for your primary firewall will address many of these concerns. This article introduces a proven method for installing redundant stateful firewalls using native OpenBSD features.
Linux Building a Linux Cluster, Part 3: How To Get Started
Post date: April 25, 2005, 09:04 Category: Network Views: 928 Comments: 0
Tutorial quote: In the previous two articles in this series, we examined some of the whys and whats of building Linux clusters. This article concludes our series by concentrating on the hows of cluster building. We've seen that a clustered approach to certain computing solutions can save lots of money in hardware and support costs. Now our job is to produce a method of building clusters that's repeatable and predictable—we don't want to give back our hard-won savings in project cost overruns.
FreeBSD Secure Batch Email on FreeBSD with UUCP and SSH
Post date: April 18, 2005, 21:04 Category: Network Views: 914 Comments: 0
Tutorial quote: Not everyone has reliable, always-on Internet access. For some, reliability has to come through software, not hardware. Fortunately, protocols designed to work around slow and unreliable networks still work. Christophe Prevotaux demonstrates how to set up FreeBSD, Postfix, and SSH to send and receive email via UUCP.
BSD Firewalling with OpenBSD's PF packet filter
Post date: April 18, 2005, 21:04 Category: Network Views: 2214 Comments: 0
Tutorial quote: PF operates in a world which consists of packets, protocols, connections and ports.

Based on where a packet is coming from or where it's going, which protocol, connection of port it is designated for, PF is able to determine where to lead the packet, or decide if it is to be let through at all.

It's equally possible to direct network traffic based on packet contents, usually referred to as application level filtering, but this is not the kind of thing PF does. We will come back later to some cases where PF will hand off these kinds of tasks to other software, but first let us deal with some basics.

We've already mentioned the firewall concept. One important feature of PF and similar software, perhaps the most important feature, is that it is able to identify and block traffic which is you do not want to let into your local network or let out to the world outside. At some point the term 'firewall' was coined.
Linux Building a Linux Cluster, Part 1
Post date: April 17, 2005, 22:04 Category: Network Views: 908 Comments: 0
Tutorial quote: Linux clusters have escaped. As the general popularity of the Linux operating system increases, more complex solutions built with it are becoming increasingly common in the "traditional" (more conservative) IT world. Linux computer clusters, whose provenance was originally universities and research institutions such as the U.S. National Laboratories, are showing up in increasing numbers as high-performance computing solutions within such areas as oil and gas exploration, computer-aided engineering, visualization, and software development. Linux clusters providing highly-available web, mail, and other infrastructure services are also increasingly common. If past computing history is any indicator of future trends, widespread use of Linux clusters in the mainstream IT world cannot be far behind.
Linux Building a Linux Cluster, Part 2
Post date: April 17, 2005, 22:04 Category: Network Views: 981 Comments: 0
Tutorial quote: In this installment, we consider the what of cluster building: the hardware and software components that make up a Linux cluster, and some ways to think about integrating them into a solution for your environment.
Unix+clones SSH Port Forwarding Through a Proxy Server
Post date: April 17, 2005, 22:04 Category: Network Views: 712 Comments: 0
Tutorial quote: A common use of SSH is port forwarding (tunneling). This use causes traffic directed to a particular port to be sent to a specified port on another computer. Because traffic is sent through SSH, the traffic is encrypted, allowing the transmission of sensitive data through arbitrary services.
Unix+clones How to securely send and retrieve your mail via SSH
Post date: April 17, 2005, 19:04 Category: Network Views: 561 Comments: 0
Tutorial quote: SSH allows you to create an encrypted network tunnel between your machine and other network. This document will show you how to set up this tunnel and then use it to securely send and retrieve your mail.