HowtoForge provides user-friendly Linux tutorials about almost every topic.

If you've written a Linux tutorial that you'd like to share, you can contribute it. If you'd like to discuss Linux-related problems, you can use our forum. If you have questions, please contact us by email: info [at] howtoforge [dot] com or use our contact form.

Want to support HowtoForge? Become a subscriber!
 

Virtual Hosting With PureFTPd And MySQL (Incl. Quota And Bandwidth Management) On Fedora 7

Virtual Hosting With PureFTPd And MySQL (Incl. Quota And Bandwidth Management) On Fedora 7

This document describes how to install a PureFTPd server that uses virtual users from a MySQL database instead of real system users. This is much more performant and allows to have thousands of ftp users on a single machine. In addition to that I will show the use of quota and upload/download bandwidth limits with this setup. Passwords will be stored encrypted as MD5 strings in the database.

Data Recovery With TestDisk

Data Recovery With TestDisk

TestDisk is a powerful free data recovery software which was primarily designed to help recover lost partitions and/or make non-booting disks bootable again when these symptoms are caused by faulty software, certain types of viruses or human error (such as accidentally deleting your partition table). TestDisk is available for lots of operating systems, including Linux, Windows, and MacOS, and supports lots of filesystems.

Using Compiz, Beryl, And Metisse On A Mandriva 2007 Spring Desktop

Using Compiz, Beryl, And Metisse On A Mandriva 2007 Spring Desktop

This tutorial shows how you can use Compiz, Beryl, and Metisse on a Mandriva 2007 Spring (Mandriva 2007.1) desktop (the system must have a 3D-capable graphics card). With Compiz, Beryl, and Metisse, you can make your desktop use beautiful 3D effects like wobbly windows or a desktop cube (although the desktop cube isn't available on Metisse).

How to Avoid Being Blacklisted

How to Avoid Being Blacklisted

A blacklist usually refers to a list of e-mail or IP addresses known to send spam e-mails or some other type of unsolicited messages. Such lists are currently used by mail servers for filtering incoming e-mails and blocking the ones listed, in order to improve mail security and integrity. The blacklist is also the opposite of what is called a whitelist.

Installing ModSecurity2 On Debian Etch

Installing ModSecurity2 On Debian Etch

This article shows how to install and configure ModSecurity (version 2) for use with Apache2 on a Debian Etch system. ModSecurity is an Apache module that provides intrusion detection and prevention for web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection attacks, cross-site scripting, path traversal attacks, etc.

Network Card Bonding On CentOS

Network Card Bonding On CentOS

Bonding is the same as port trunking. In the following I will use the word bonding because practically we will bond interfaces as one. Bonding allows you to aggregate multiple ports into a single group, effectively combining the bandwidth into a single connection. Bonding also allows you to create multi-gigabit pipes to transport traffic through the highest traffic areas of your network. For example, you can aggregate three megabits ports into a three-megabits trunk port. That is equivalent with having one interface with three megabytes speed.

Installing Google Desktop On PCLinuxOS 2007 And Ubuntu Feisty Fawn

Installing Google Desktop On PCLinuxOS 2007 And Ubuntu Feisty Fawn

This article shows how you can install the Linux version of Google Desktop on a PCLinuxOS 2007 desktop and an Ubuntu Feisty Fawn (Ubuntu 7.04) desktop. Although the program is still marked as beta, Linux users can already search for text inside documents, local email messages, their Web history, and their Gmail accounts.

TrueCrypt Tutorial: Truly Portable Data Encryption

TrueCrypt Tutorial: Truly Portable Data Encryption

TrueCrypt is a free software that encrypts data “on-the-fly”. Right now the newest version released is version 4.3. You can create an encrypted hard drive, a separate partition or a directory with TrueCrypt. It doesn’t simply encrypt the content of files, but their names and the names of the directories they are in as well. Moreover there is no way to check the size of the encrypted directory/HDD/partition. TrueCrypt is available for Windows and Linux.

Installing Beryl Or Compiz Fusion On A Fedora 7 Desktop

Installing Beryl Or Compiz Fusion On A Fedora 7 Desktop

This tutorial shows how you can install and use Beryl or Compiz Fusion on a Fedora 7 desktop (the system must have a 3D-capable graphics card). With both Beryl and Compiz Fusion, you can make your desktop use beautiful 3D effects like wobbly windows or a desktop cube.

How to secure an SSL VPN with one-time passcodes and mutual authentication

How to secure an SSL VPN with one-time passcodes and mutual authentication

SSL-based VPNs were designed to eliminate the need for complex configurations on the user's PC. Unfortunately, that was before the dangers of public WiFi networks and tougher regulatory requirements came into being. Thanks to WiFi, many attacks that were difficult are now quite simple. In particular, a man-in-the-middle attack can intercept SSL-encrypted traffic, rendering SSL-based VPNs useless - even if it's protected by a typical one-time password system. The man-in-the-middle can easily feed the one-time password into the SSL-based VPN within the alloted time.

first page
previous page
...
220
...
next page
last page