HowtoForge provides user-friendly Linux tutorials about almost every topic.

If you've written a Linux tutorial that you'd like to share, you can contribute it. If you'd like to discuss Linux-related problems, you can use our forum. If you have questions, please contact us by email: info [at] howtoforge [dot] com or use our contact form.

Want to support HowtoForge? Become a subscriber!
 

Installing Metasploit 3.0 On Ubuntu 7.10

Installing Metasploit 3.0 On Ubuntu 7.10

The Metasploit Project is an open source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its most well-known sub-project is the Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive, and security research. (Wikipedia).

Three Ways To Access Linux Partitions (ext2/ext3) From Windows On Dual-Boot Systems

Three Ways To Access Linux Partitions (ext2/ext3) From Windows On Dual-Boot Systems

If you have a dual-boot Windows/Linux system, you probably know this problem: you can access files from your Windows installation while you are in Linux, but not the other way round. This tutorial shows three ways how you can access your Linux partitions (with ext2 or ext3 filesystem) from within Windows: Explore2fs, DiskInternals Linux Reader, and the Ext2 Installable File System For Windows. While the first two provide read-only access, the Ext2 Installable File System For Windows can be used for read and write operations.

Getting Started With Ruby On Rails

Getting Started With Ruby On Rails

Generally there are 3 installations: OSX, Windows and Linux, and the latter is the most easy one.

SSH: Best Practices

SSH: Best Practices

Are you using SSH in the best way possible? Have you configured it to be as limited and secure as possible? The goal of this document is to kick in the new year with some best practices for SSH: why you should use them, how to set them up, and how to verify that they are in place. All of the examples below assume that you are using EnGarde Secure Linux but any modern Linux distribution will do just fine since, as far as I know, everybody ships OpenSSH.

TrueCrypt With GUI On Ubuntu 7.10

TrueCrypt With GUI On Ubuntu 7.10

This document describes how to set up TrueCrypt with GUI on Ubuntu 7.10. TrueCrypt is a free open-source encryption software for desktop usage.

How To Delete Mails From Or To A Specific Email Address From Your Mail Queue (Postfix)

How To Delete Mails From Or To A Specific Email Address From Your Mail Queue (Postfix)

If you get hit by a spam attack that floods your server with hundreds/thousands of emails from the same sender email address or to the same recipient email address, you can clean your mail queue from these emails with one single command before the mail flood takes your server to its knees.

Intrusion Detection: Snort, Base, MySQL, and Apache2 On Ubuntu 7.10 (Gutsy Gibbon) (Updated)

Intrusion Detection: Snort, Base, MySQL, and Apache2 On Ubuntu 7.10 (Gutsy Gibbon) (Updated)

In this tutorial I will describe how to install and configure Snort (an intrusion detection system (IDS)) from source, BASE (Basic Analysis and Security Engine), MySQL, and Apache2 on Ubuntu 7.10 (Gutsy Gibbon). Snort will assist you in monitoring your network and alert you about possible threats. Snort will output its log files to a MySQL database which BASE will use to display a graphical interface in a web browser.

Virtual Users And Domains With Postfix, Courier And MySQL (Mandriva 2008.0)

Virtual Users And Domains With Postfix, Courier And MySQL (Mandriva 2008.0)

This document describes how to install a Postfix mail server that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I'll also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses. The resulting Postfix server is capable of SMTP-AUTH and TLS and quota (quota is not built into Postfix by default, I'll show how to patch your Postfix appropriately). Passwords are stored in encrypted form in the database (most documents I found were dealing with plain text passwords which is a security risk). In addition to that, this tutorial covers the installation of Amavisd, SpamAssassin and ClamAV so that emails will be scanned for spam and viruses.

Debian "Etch" + Asterisk + Zaptel + Libpri + mISDN + Asterisk Addons + Asterisk-GUI

Debian "Etch" + Asterisk + Zaptel + Libpri + mISDN + Asterisk Addons + Asterisk-GUI

This Howto explains how to install Asterisk on a fresh Debian “Etch” system.

Magento E-Commerce Solution On Debian Etch

Magento E-Commerce Solution On Debian Etch

This document describes how to set up Magento on Debian Etch. The resulting system provides a professional open-source e-commerce solution with a many features. Please note, that Magento is currently in a preview release and not recommended for use in production environments. But at least it's worth to glance at it.

first page
previous page
...
213
...
next page
last page