Showing headlines posted by mweber
« Previous ( 1 2 3 )Using "shred" to Securely Delete Files
When you use the "rm" utility, you may think that you're deleting a file, but you're not. All you're doing is removing the file's index--or, inode number--from the hard drive. The file is still there, and can still be recovered, as long as you don't overwrite the space that it occupies with another file.
Setting Up iptables MASQUERADE
The simplest application of NAT is address translation from a more trusted segment to a less trusted segment. The simplest use of NAT with iptables is MASQUERADE.
Using Advanced Filesystem Attributes
As a Linux administrator, you may be called upon to set up a control system for file access. You probably already know how to set read, write, and execute permissions on files, and you will need to make extensive use of that knowledge. But, sometimes, you'll need more than just these permissions settings to get the job done.
Installing Applications on gOS
gOS is more than a Google Connection. It is simple to use and allows you to add many of the applications of that you are familiar with on Ubuntu.
Reusable Computer Network (ReCoN)
The Reusable Computer Network (ReCoN) builds networks of computers from mini-itx, USB ThumbDrives and older computers. ReCoN uses two Linux distributions to create a powerful network of computers that can be built for next to nothing. The concept is based on the fact that, most homes, schools and businesses now have at least one new computer at their location and they also have a number of older computers they just do not know what to do with.
Calculating Subnets with "ipcalc"
Setting up a network can be fairly quick and easy if you're setting it up with straight Class A, Class B, or Class C network addresses. But, there may be occasions when you would only have a few hosts assigned to a given network segment. In that case, you wouldn't want to use a straight "classful " network addressing scheme, because you would waste too many IP addresses for that network. (You may need to use these IP addresses later if you decide to add other segments to your network.) This is where subnetting comes in handy.
Upgrade Your Ubuntu Kernel
One of the frustrations of an easy install from one CD is that regardless of your processor, you will get a generic kernel that may not be well suited for your hardware. This tutorial shows you how to upgrade from the generic kernel that is designed for the Desktop to a kernel that provides better use of a higher end CPU.
3 Wireless Setups for Ubuntu Gutsy Gibbon
Check out 3 ways to install wireless on Ubuntu Gutsy Gibbon; works out of the box, ndiswrapper and manual install.
Access Control Lists: Usage and Backup
Access Control Lists (ACLs) allow you to provide different levels of access to files and folders for different users.
How to Secure Ubuntu With AppArmor
AppArmor is one way to protect your assets on your Ubuntu Gutsy system. AppArmor attempts to protect processes on the server or desktop from security threats. AppArmor enforces limits on what processes can access on the system.
Free Ubuntu Feisty Training Course Offered by BeginLinux.org
The Ubuntu Feisty Training Course has more than 150 pages of online content as well as 7 movies.
Free Online Courses in Linux
There are currently 7 FREE Courses available including: Ubuntu, SUSE, OpenOffice Writer, OpenOffice Impress, Gimp, Scribus and nmap.
Power Management for Ubuntu
Fine Tune your battery usage. Using the GNOME Power Management options will provide better use of your laptop battery life. Knowing the difference between suspend and hibernate may save you a loss of data. This article will explore your best use of power on a lapto
Evaluating What Users Do on the Computer with Process Accounting
This article will show you how to evaluate the actions of users on the server. You will be able to track the commands they use, the programs they run and how much of server resources they waste. The program is called process accounting. It will provide complete accountability for resources used on the server.
Detecting Intruders with IPCop
IPCop offers an interesting interface that provides you with detailed information about what kind of attacks are currently active on your network. This information is provided as an integration with Snort, a project that focuses on discovering intrusion attempts.
Port Forwarding with IPCop
The purpose of this project is to forward web traffic to a protected server on the internal network. This provides a protected environment for the web server.
« Previous ( 1 2 3 )