- Web Server
- Control Panels
- Site Map/RSS Feeds
The Perfect Desktop - Part 1: Fedora Core 6
With the release of Microsoft's new Windows operating system (Vista), more and more people are looking for alternatives to Windows for various reasons. This tutorial is the first of a series of articles where I will show people who are willing to switch to Linux how they can set up a Linux desktop (Fedora Core 6 in this article) that fully replaces their Windows desktop, i.e. that has all software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions, and the best thing is: all software comes free of charge.
How to make a small change to a Debian tool and repackage it?
This mini-tutorial shows how to modify a small option of a standard Debian/Ubuntu package to accomodate your personal preferences and rebuild and install this package on your system.
Step-by-step OpenLDAP Installation and Configuration
This tutorial describes how to install and configure an OpenLDAP server and also an OpenLDAP client.
Run Your Own Webradio Station With Icecast2 And Ices2
This tutorial describes how to set up an audio streaming server with Icecast2. In order that Icecast2 can stream audio to listeners we install Ices2. Ices2 is a program that sends audio data to an Icecast2 server to broadcast to clients. Ices2 can either read audio data from disk (Ogg Vorbis files), or sample live audio from a sound card and encode it on the fly. In this article we will let Ices2 read .ogg files from the local hard disk.
How To Search For Missing Packages With apt-file On Debian and Ubuntu
This short article describes how you can search for missing packages with apt-file on Debian and Ubuntu systems. apt-file allows you to search for a file name, and it gives back the name(s) of the package(s) containing that file so that you can install the appropriate package.
Setting up a serial console
This tutorial will show you how to set up a serial console on a Linux system, and connect to it via a null modem cable. This is quite useful if your Linux server is in a headless configuration (no keyboard or monitor), as it allows you to easily get a console on the system if there are any problems with it (especially network problems, when SSH is not available). In the end, the GRUB menu will appear over the serial link, as will the bootup messages (output when booting the system). I'm using Debian Etch on the server and Ubuntu Edgy on my client, although this should work on any Linux distribution.
How to Set up Network Bonding in Ubuntu 6.10
Network Bonding, otherwise known as port trunking allows you to combine multiple network ports into a single group, effectively aggregating the bandwidth of multiple interfaces into a single connection. For example, you can aggregate two gigabyte ports into a two-gigabyte trunk port. Bonding is used primarily to provide network load balancing and fault tolerance.
Installing Ubuntu or Kubuntu, 6.06.1 LTS "Dapper Drake", on a Single/Multi -Boot RAID System
This guide describes how to install Ubuntu (Ubuntu+GNOME) or Kubuntu (Ubuntu+KDE) 6.06.1 LTS ("Dapper Drake") on a single or a multi -boot RAID system. It is meant as a variation of Ubuntu Wiki FakeRAID HowTo document, but digested and with minimum commentary. Its goal is to allow new Ubuntu users to complete an entire installation inside of 30 minutes, almost entirely by copy and paste.
VirtualBox On FC6 / CentOS 4 / OpenSuSE 10.2
InnoTek VirtualBox is a family of powerful x86 virtualization products for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU Public License (GPL).
Install and Configure Auth Shadow on Debian/Ubuntu
Auth Shadow or mod-auth-shadow is a module for apache (and apache2, sort of) that enables authentication against /etc/shadow. The benefits being that any system user with a password can be authenticated for web_dav, subversion or simply an https server. The only other way to do this is with PAM. That method is dangerous because the apache user (www-data in my case) must be able to read /etc/shadow. Obviously, not a good idea. Auth Shadow accomplishes this safely by using a intermediate program called validate. This works because validate can be owned by root but executable by everyone. In the event that your server is compromised through apache, your password file will not be readable.