- Web Server
- Control Panels
- Site Map/RSS Feeds
HowtoForge provides user-friendly Linux tutorials about almost every topic.
If you've written a Linux tutorial that you'd like to share, you can contribute it. If you'd like to discuss Linux-related problems, you can use our forum. If you have questions, please contact us by email: info [at] howtoforge [dot] com or use our contact form.
Data Recovery With TestDisk
TestDisk is a powerful free data recovery software which was primarily designed to help recover lost partitions and/or make non-booting disks bootable again when these symptoms are caused by faulty software, certain types of viruses or human error (such as accidentally deleting your partition table). TestDisk is available for lots of operating systems, including Linux, Windows, and MacOS, and supports lots of filesystems.
Using Compiz, Beryl, And Metisse On A Mandriva 2007 Spring Desktop
This tutorial shows how you can use Compiz, Beryl, and Metisse on a Mandriva 2007 Spring (Mandriva 2007.1) desktop (the system must have a 3D-capable graphics card). With Compiz, Beryl, and Metisse, you can make your desktop use beautiful 3D effects like wobbly windows or a desktop cube (although the desktop cube isn't available on Metisse).
How to Avoid Being Blacklisted
A blacklist usually refers to a list of e-mail or IP addresses known to send spam e-mails or some other type of unsolicited messages. Such lists are currently used by mail servers for filtering incoming e-mails and blocking the ones listed, in order to improve mail security and integrity. The blacklist is also the opposite of what is called a whitelist.
Installing ModSecurity2 On Debian Etch
This article shows how to install and configure ModSecurity (version 2) for use with Apache2 on a Debian Etch system. ModSecurity is an Apache module that provides intrusion detection and prevention for web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection attacks, cross-site scripting, path traversal attacks, etc.
Network Card Bonding On CentOS
Bonding is the same as port trunking. In the following I will use the word bonding because practically we will bond interfaces as one. Bonding allows you to aggregate multiple ports into a single group, effectively combining the bandwidth into a single connection. Bonding also allows you to create multi-gigabit pipes to transport traffic through the highest traffic areas of your network. For example, you can aggregate three megabits ports into a three-megabits trunk port. That is equivalent with having one interface with three megabytes speed.
Installing Google Desktop On PCLinuxOS 2007 And Ubuntu Feisty Fawn
This article shows how you can install the Linux version of Google Desktop on a PCLinuxOS 2007 desktop and an Ubuntu Feisty Fawn (Ubuntu 7.04) desktop. Although the program is still marked as beta, Linux users can already search for text inside documents, local email messages, their Web history, and their Gmail accounts.
TrueCrypt Tutorial: Truly Portable Data Encryption
is a free software that encrypts data “on-the-fly”. Right now the newest version released is version 4.3. You can create an encrypted hard drive, a separate partition or a directory with TrueCrypt. It doesn’t simply encrypt the content of files, but their names and the names of the directories they are in as well. Moreover there is no way to check the size of the encrypted directory/HDD/partition. TrueCrypt is available for Windows and Linux.
Installing Beryl Or Compiz Fusion On A Fedora 7 Desktop
This tutorial shows how you can install and use Beryl or Compiz Fusion on a Fedora 7 desktop (the system must have a 3D-capable graphics card). With both Beryl and Compiz Fusion, you can make your desktop use beautiful 3D effects like wobbly windows or a desktop cube.
How to secure an SSL VPN with one-time passcodes and mutual authentication
SSL-based VPNs were designed to eliminate the need for complex configurations on the user's PC. Unfortunately, that was before the dangers of public WiFi networks and tougher regulatory requirements came into being. Thanks to WiFi, many attacks that were difficult are now quite simple. In particular, a man-in-the-middle attack can intercept SSL-encrypted traffic, rendering SSL-based VPNs useless - even if it's protected by a typical one-time password system. The man-in-the-middle can easily feed the one-time password into the SSL-based VPN within the alloted time.
Installing Xen On An Ubuntu Feisty Fawn Server From The Ubuntu Repositories
This tutorial provides step-by-step instructions on how to install Xen on an Ubuntu Feisty Fawn (Ubuntu 7.04) server system (i386). You can find all the software used here in the Ubuntu repositories, so no external files or compilation are needed. Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called "virtual machines" or domUs, under a host operating system (dom0).