- Web Server
- Control Panels
- Site Map/RSS Feeds
HowtoForge provides user-friendly Linux tutorials about almost every topic.
If you've written a Linux tutorial that you'd like to share, you can contribute it. If you'd like to discuss Linux-related problems, you can use our forum. If you have questions, please contact us by email: info [at] howtoforge [dot] com or use our contact form.
LDAP Authentication In Linux
This howto will show you howto store your users in LDAP and authenticate some of the services against it. I will not show howto install particular packages, as it is distribution/system dependant. I will focus on "pure" configuration of all componenets needed to have LDAP authentication/storage of users. The howto assumes somehow, that you are migrating from a regular passwd/shadow authentication, but it is also suitable for people who do it from scratch.
Linux GPRS/EDGE via Bluetooth HOWTO
In this guide I will show you howto configure internet access through GPRS/EDGE, using bluetooth connection with your GSM phone.
I am using gentoo and Nokia 6310i phone, but this will work with any distribution and any bluetooth capable phone.
[Debian Sarge] Installing A Bind9 Master/Slave DNS System
In this howto we will install 2 bind dns servers, one as the master and the other as a slave server. For security reasons we will chroot bind9 in its own jail.
How To Fight Spam Using Your Postfix Configuration
In this guide you will learn how to tweak the mail guide for Postfix (+Auth SMTP + Quota), http://www.howtoforge.com/virtual_postfix_mysql_quota_courier, setup to better combat SPAM and allow a little bit of backward compatibilty of the older Qmail systems.
Securing the CentOS Perfect Setup with Bastille
This article shows how to secure a CentOS server using psad, Bastille, and some other tweaks. psad is a tool that helps detect port scans and other suspicious traffic, and the Bastille hardening program locks down an operating system, proactively configuring the system for increased security and decreasing its susceptibility to compromise.
How To Monitor A System With Sysstat On Centos 4.3
A common task for System Administrators is to monitor and care for a server. That's fairly easy to do at a moment's notice, but how to keep a record of this information over time? One way to monitor your server is to use the Sysstat package.
Create Incremental Snapshot-style Backups With rSync And SSH
As neither human nor computers are perfect (humans err / computers may fail) it is quite obvious that a good backup system will prevent from too much damage once the computer may go down. This could be either because the harddrive is failing or because of hackers or because you accidentally deleted something important.
In this tutorial I will show you how to automate backups automatically in an incremental snapshot-style way by using rSync.
Security Testing your Apache Configuration with Nikto
By now you've got the perfect setup for your new Ubuntu 6.0.6 (Dapper Drake) box. You may have even followed the excellent Intrusion Detection and Prevention with BASE and Snort tutorial. And as an added precaution you installed DenyHosts to prevent hack attempts via ssh. But now that you've got your new LAMP server on the internet, how can you tell that your new web server is secure? You test it, of course!
Ubuntu LAMP Server With Torrentflux In VMware
This tutorial is meant for Linux newbies who want to try and build a Ubuntu Server box as a webserver and torrent client. It is a step by step instruction on how to do this in VMWare on Windows XP to get the feel of it. I wrote this after, being a Linux newbie myself, a lot of trial-and-error and googling. Hope this helps you!
Either with chkrootkit or with rkhunter.chkrootkit
Either install the package that comes with your distribution (on Debian you would run
apt-get install chkrootkit
), or download the sources from www.chkrootkit.org and install manually:
wget --passive-ftp ftp://ftp.pangeia.com.br/pub/seg/pac/chkrootkit.tar.gz
Afterwards, you can move the chkrootkit directory somewhere else, e.g. /usr/local/chkrootkit: