HowtoForge provides user-friendly Linux tutorials about almost every topic.

If you've written a Linux tutorial that you'd like to share, you can contribute it. If you'd like to discuss Linux-related problems, you can use our forum. If you have questions, please contact us by email: info [at] howtoforge [dot] com or use our contact form.

Want to support HowtoForge? Become a subscriber!
 

Network Card Bonding On CentOS

Network Card Bonding On CentOS

Bonding is the same as port trunking. In the following I will use the word bonding because practically we will bond interfaces as one. Bonding allows you to aggregate multiple ports into a single group, effectively combining the bandwidth into a single connection. Bonding also allows you to create multi-gigabit pipes to transport traffic through the highest traffic areas of your network. For example, you can aggregate three megabits ports into a three-megabits trunk port. That is equivalent with having one interface with three megabytes speed.

Installing Google Desktop On PCLinuxOS 2007 And Ubuntu Feisty Fawn

Installing Google Desktop On PCLinuxOS 2007 And Ubuntu Feisty Fawn

This article shows how you can install the Linux version of Google Desktop on a PCLinuxOS 2007 desktop and an Ubuntu Feisty Fawn (Ubuntu 7.04) desktop. Although the program is still marked as beta, Linux users can already search for text inside documents, local email messages, their Web history, and their Gmail accounts.

TrueCrypt Tutorial: Truly Portable Data Encryption

TrueCrypt Tutorial: Truly Portable Data Encryption

TrueCrypt is a free software that encrypts data “on-the-fly”. Right now the newest version released is version 4.3. You can create an encrypted hard drive, a separate partition or a directory with TrueCrypt. It doesn’t simply encrypt the content of files, but their names and the names of the directories they are in as well. Moreover there is no way to check the size of the encrypted directory/HDD/partition. TrueCrypt is available for Windows and Linux.

Installing Beryl Or Compiz Fusion On A Fedora 7 Desktop

Installing Beryl Or Compiz Fusion On A Fedora 7 Desktop

This tutorial shows how you can install and use Beryl or Compiz Fusion on a Fedora 7 desktop (the system must have a 3D-capable graphics card). With both Beryl and Compiz Fusion, you can make your desktop use beautiful 3D effects like wobbly windows or a desktop cube.

How to secure an SSL VPN with one-time passcodes and mutual authentication

How to secure an SSL VPN with one-time passcodes and mutual authentication

SSL-based VPNs were designed to eliminate the need for complex configurations on the user's PC. Unfortunately, that was before the dangers of public WiFi networks and tougher regulatory requirements came into being. Thanks to WiFi, many attacks that were difficult are now quite simple. In particular, a man-in-the-middle attack can intercept SSL-encrypted traffic, rendering SSL-based VPNs useless - even if it's protected by a typical one-time password system. The man-in-the-middle can easily feed the one-time password into the SSL-based VPN within the alloted time.

Installing Xen On An Ubuntu Feisty Fawn Server From The Ubuntu Repositories

Installing Xen On An Ubuntu Feisty Fawn Server From The Ubuntu Repositories

This tutorial provides step-by-step instructions on how to install Xen on an Ubuntu Feisty Fawn (Ubuntu 7.04) server system (i386). You can find all the software used here in the Ubuntu repositories, so no external files or compilation are needed. Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called "virtual machines" or domUs, under a host operating system (dom0).

Entering A Safe Mirror When Logging In With Unionfs And Chroot

Entering A Safe Mirror When Logging In With Unionfs And Chroot

When reading a 'hint' on the website of LinuxFromScratch I discovered the special capabilities of unionfs, specially in combination with chroot. Later I read a HowTo on a wikiwebsite of Gentoo, about entering a chrooted homedirectory when using a special script as shell. Combining these two brings me to using a chrooted environment, which you enter when logging in as a special user. This environment is a exact copy (mirror) of the system you're working on. Because you're in safe copy of the real system, you can do whatever you like, it will never change the system, everything stays inside the cache (the readwrite branch).

Postfix Monitoring With Mailgraph And pflogsumm On Debian Etch

Postfix Monitoring With Mailgraph And pflogsumm On Debian Etch

This article describes how you can monitor your Postfix mailserver with the tools Mailgraph and pflogsumm. Mailgraph creates daily, weekly, monthly, and yearly graphs of sent, received, bounced, and rejected emails and also of spam and viruses, if SpamAssassin and ClamAV are integrated into Postfix (e.g. using amavisd-new). These graphs can be accessed with a browser, whereas pflogsumm ("Postfix Log Entry Summarizer") can be used to send reports of Postfix activity per email.

Configuring Samba 3.0 To Use The ADS Security Mode (CentOS)

Configuring Samba 3.0 To Use The ADS Security Mode (CentOS)

The intent of this article is to show you how to configure your Linux machine and Samba server to participate in a Windows 2003 Active Directory domain as a Member Server using Kerberos authentication. This involves using the security = ADS security mode in Samba.

Virtual Hosting With vsftpd And MySQL On Debian Etch

Virtual Hosting With vsftpd And MySQL On Debian Etch

Vsftpd is one of the most secure and fastest FTP servers for Linux. Usually vsftpd is configured to work with system users. This document describes how to install a vsftpd server that uses virtual users from a MySQL database instead of real system users. This is much more performant and allows to have thousands of ftp users on a single machine.

first page
previous page
...
227
...
next page
last page