- Web Server
- Control Panels
- Site Map/RSS Feeds
HowtoForge provides user-friendly Linux tutorials about almost every topic.
If you've written a Linux tutorial that you'd like to share, you can contribute it. If you'd like to discuss Linux-related problems, you can use our forum. If you have questions, please contact us by email: info [at] howtoforge [dot] com or use our contact form.
The Perfect Desktop - Part 1: Fedora Core 6
With the release of Microsoft's new Windows operating system (Vista), more and more people are looking for alternatives to Windows for various reasons. This tutorial is the first of a series of articles where I will show people who are willing to switch to Linux how they can set up a Linux desktop (Fedora Core 6 in this article) that fully replaces their Windows desktop, i.e. that has all software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions, and the best thing is: all software comes free of charge.
Prevent Phishing with Mutual Authentication
Phishing is a man-in-the-middle attack. While many people think using time-bound, one-time passwords will solve the problem, they are wrong as attacks will just become automated. What is required is strong mutual authentication - authentication of the host to the user as well as the user to the host. This article demonstrates how to do that using open-source software from WiKID.
Convert Physical Windows Systems Into Virtual Machines To Be Run On A Linux Desktop
This article shows how you can convert a physical Windows system (XP, 2003, 2000, NT4 SP4+) into a VMware virtual machine with the free VMware Converter Starter. The resulting virtual machine can be run in the free VMware Player and VMware Server, and also in VMware Workstation and other VMware products. Vmware Converter comes in handy if you want to switch to a Linux desktop, but feel the need to run your old Windows desktop from time to time. By converting your Windows desktop into a virtual machine, you can run it under VMware Server/Player, etc. on your Linux desktop.
How to make a small change to a Debian tool and repackage it?
This mini-tutorial shows how to modify a small option of a standard Debian/Ubuntu package to accomodate your personal preferences and rebuild and install this package on your system.
Step-by-step OpenLDAP Installation and Configuration
This tutorial describes how to install and configure an OpenLDAP server and also an OpenLDAP client.
Run Your Own Webradio Station With Icecast2 And Ices2
This tutorial describes how to set up an audio streaming server with Icecast2. In order that Icecast2 can stream audio to listeners we install Ices2. Ices2 is a program that sends audio data to an Icecast2 server to broadcast to clients. Ices2 can either read audio data from disk (Ogg Vorbis files), or sample live audio from a sound card and encode it on the fly. In this article we will let Ices2 read .ogg files from the local hard disk.
How To Search For Missing Packages With apt-file On Debian and Ubuntu
This short article describes how you can search for missing packages with apt-file on Debian and Ubuntu systems. apt-file allows you to search for a file name, and it gives back the name(s) of the package(s) containing that file so that you can install the appropriate package.
Setting up a serial console
This tutorial will show you how to set up a serial console on a Linux system, and connect to it via a null modem cable. This is quite useful if your Linux server is in a headless configuration (no keyboard or monitor), as it allows you to easily get a console on the system if there are any problems with it (especially network problems, when SSH is not available). In the end, the GRUB menu will appear over the serial link, as will the bootup messages (output when booting the system). I'm using Debian Etch on the server and Ubuntu Edgy on my client, although this should work on any Linux distribution.
How to Set up Network Bonding in Ubuntu 6.10
Network Bonding, otherwise known as port trunking allows you to combine multiple network ports into a single group, effectively aggregating the bandwidth of multiple interfaces into a single connection. For example, you can aggregate two gigabyte ports into a two-gigabyte trunk port. Bonding is used primarily to provide network load balancing and fault tolerance.
Fight Image Spam With FuzzyOCR And SpamAssassin On Debian/Ubuntu
This tutorial describes how to scan emails for image spam with FuzzyOCR. FuzzyOCR is a plugin for SpamAssassin which is aimed at unsolicited bulk mail containing images as the main content carrier. Using different methods, it analyzes the content and properties of images to distinguish between normal mails (ham) and spam mails. FuzzyOCR tries to keep the system load low by scanning only mails that have not already been categorized as spam by SpamAssassin, thus avoiding unnecessary work.