Showing headlines posted by mweber

« Previous ( 1 2 3 )

Using "shred" to Securely Delete Files

  • BeginLinux.com; By Donnie Tevault (Posted by mweber on Feb 27, 2008 3:30 PM EDT)
  • Story Type: Tutorial
When you use the "rm" utility, you may think that you're deleting a file, but you're not. All you're doing is removing the file's index--or, inode number--from the hard drive. The file is still there, and can still be recovered, as long as you don't overwrite the space that it occupies with another file.

Setting Up iptables MASQUERADE

  • SpiderTools.com; By Michael Morris (Posted by mweber on Jan 25, 2008 1:17 PM EDT)
  • Story Type: Tutorial
The simplest application of NAT is address translation from a more trusted segment to a less trusted segment. The simplest use of NAT with iptables is MASQUERADE.

Using Advanced Filesystem Attributes

  • BeginLinux.com; By Donnie Tevault (Posted by mweber on Jan 21, 2008 12:24 PM EDT)
  • Story Type: Tutorial
As a Linux administrator, you may be called upon to set up a control system for file access. You probably already know how to set read, write, and execute permissions on files, and you will need to make extensive use of that knowledge. But, sometimes, you'll need more than just these permissions settings to get the job done.

Installing Applications on gOS

  • BeginLinux.com; By Mike Weber (Posted by mweber on Jan 13, 2008 8:29 PM EDT)
  • Story Type: Tutorial
gOS is more than a Google Connection. It is simple to use and allows you to add many of the applications of that you are familiar with on Ubuntu.

Reusable Computer Network (ReCoN)

  • BeginLinux.com; By Mike Weber (Posted by mweber on Jan 2, 2008 6:45 PM EDT)
  • Story Type: Tutorial
The Reusable Computer Network (ReCoN) builds networks of computers from mini-itx, USB ThumbDrives and older computers. ReCoN uses two Linux distributions to create a powerful network of computers that can be built for next to nothing. The concept is based on the fact that, most homes, schools and businesses now have at least one new computer at their location and they also have a number of older computers they just do not know what to do with.

Calculating Subnets with "ipcalc"

  • BeginLinux.com; By Donnie Tevault (Posted by mweber on Dec 16, 2007 2:09 PM EDT)
  • Story Type: Tutorial
Setting up a network can be fairly quick and easy if you're setting it up with straight Class A, Class B, or Class C network addresses. But, there may be occasions when you would only have a few hosts assigned to a given network segment. In that case, you wouldn't want to use a straight "classful " network addressing scheme, because you would waste too many IP addresses for that network. (You may need to use these IP addresses later if you decide to add other segments to your network.) This is where subnetting comes in handy.

Upgrade Your Ubuntu Kernel

  • beginlinux.com; By Mike Weber (Posted by mweber on Dec 4, 2007 5:24 PM EDT)
  • Story Type: Tutorial
One of the frustrations of an easy install from one CD is that regardless of your processor, you will get a generic kernel that may not be well suited for your hardware. This tutorial shows you how to upgrade from the generic kernel that is designed for the Desktop to a kernel that provides better use of a higher end CPU.

3 Wireless Setups for Ubuntu Gutsy Gibbon

  • BeginLinux.com; By Mike Weber (Posted by mweber on Nov 26, 2007 5:17 AM EDT)
  • Story Type: Tutorial
Check out 3 ways to install wireless on Ubuntu Gutsy Gibbon; works out of the box, ndiswrapper and manual install.

Access Control Lists: Usage and Backup

  • BeginLinux.com; By Mike Weber (Posted by mweber on Nov 16, 2007 8:22 PM EDT)
  • Story Type: Tutorial
Access Control Lists (ACLs) allow you to provide different levels of access to files and folders for different users.

How to Secure Ubuntu With AppArmor

  • BeginLinux.com; By Mike Weber (Posted by mweber on Oct 30, 2007 6:09 PM EDT)
  • Story Type: Tutorial
AppArmor is one way to protect your assets on your Ubuntu Gutsy system. AppArmor attempts to protect processes on the server or desktop from security threats. AppArmor enforces limits on what processes can access on the system.

Free Ubuntu Feisty Training Course Offered by BeginLinux.org

The Ubuntu Feisty Training Course has more than 150 pages of online content as well as 7 movies.

Free Online Courses in Linux

  • beginlinux.org; By Mike Weber (Posted by mweber on Jan 17, 2007 3:05 PM EDT)
  • Story Type: Tutorial; Groups: SUSE, Ubuntu
There are currently 7 FREE Courses available including: Ubuntu, SUSE, OpenOffice Writer, OpenOffice Impress, Gimp, Scribus and nmap.

Power Management for Ubuntu

  • SpiderTools.com; By Mike Weber (Posted by mweber on Dec 26, 2006 7:08 AM EDT)
  • Story Type: Tutorial
Fine Tune your battery usage. Using the GNOME Power Management options will provide better use of your laptop battery life. Knowing the difference between suspend and hibernate may save you a loss of data. This article will explore your best use of power on a lapto

Evaluating What Users Do on the Computer with Process Accounting

This article will show you how to evaluate the actions of users on the server. You will be able to track the commands they use, the programs they run and how much of server resources they waste. The program is called process accounting. It will provide complete accountability for resources used on the server.

Detecting Intruders with IPCop

  • SpiderTools.com; By Mike Weber (Posted by mweber on Oct 9, 2006 4:02 AM EDT)
  • Story Type: Tutorial
IPCop offers an interesting interface that provides you with detailed information about what kind of attacks are currently active on your network. This information is provided as an integration with Snort, a project that focuses on discovering intrusion attempts.

Port Forwarding with IPCop

  • SpiderTools.com; By Mike Weber (Posted by mweber on Sep 10, 2006 8:48 PM EDT)
  • Story Type: News Story
The purpose of this project is to forward web traffic to a protected server on the internal network. This provides a protected environment for the web server.

« Previous ( 1 2 3 )