- Web Server
- Control Panels
- Site Map/RSS Feeds
Network Monitoring With ntop
ntop is a network traffic tools that shows network usage in a real time. One of the good things about this tool is that you can use a web browser to manage and navigate through ntop traffic information to better understand network status.
Create Users And Change Passwords With A Bash Script
These two scripts are very important for the system admin who regularly works with mail servers and somehow forgets to backup his system username and password! Let’s say somehow we lost the usernames and passwords of the mail server. In this case the admin has to manually create all the users and then change the passwords for all the users. Tedious job. Let’s make our life easier.
Useful Commands For The Linux Command Line
This short guide shows some important commands for your daily work on the Linux command line.
Setting the SUID/SGID bits: Giving a program YOUR permissions when it runs
Normally, when a program runs under Linux, it inherits the permissions of the user who is running it, thus if I run a program under my account, the program runs with the same permissions that I would have if that program were me. Thus, if I cannot open a certain file, the program I am running also cannot open the file in question. If I set the SUID or SGID bit for a file, this causes any persons or processes that run the file to have access to system resources as though they are the owner of the file.
Using TAR with Bunzip2 files
Bunzipping and then unTARring in two steps is not convenient.
It is not necessary to use Bunzip2 and then TAR to unzip a file in two separate steps.
Tar will do the job on its own if the -j switch is used, thus:
tar xjvf linux-source<version>.tar.bz2
By the same token, you may use the -z switch with a gzipped file, e.g.
tar zxvf linux-source<version>.tar.gz
How to download only the new emails in Sylpheed
Sylpheed keeps downloading the same messages over and over again! I want to be able to download only the new messages, but have the option of re-downloading everything. How to do?
Prevent Phishing with Mutual Authentication
Phishing is a man-in-the-middle attack. While many people think using time-bound, one-time passwords will solve the problem, they are wrong as attacks will just become automated. What is required is strong mutual authentication - authentication of the host to the user as well as the user to the host. This article demonstrates how to do that using open-source software from WiKID.
How to Set up Network Bonding in Ubuntu 6.10
Network Bonding, otherwise known as port trunking allows you to combine multiple network ports into a single group, effectively aggregating the bandwidth of multiple interfaces into a single connection. For example, you can aggregate two gigabyte ports into a two-gigabyte trunk port. Bonding is used primarily to provide network load balancing and fault tolerance.
Custom Boot Menu for Windows XP
One of the first things that I do upon receiving a new windows computer is create my own custom boot menu that shows up every time I boot my machine. This is especially handy when you suspect a virus; you can reboot into safe mode and scan for it.
Using A Sandisk MP3 Player On A Linux Desktop
This article shows how to use a Sandisk MP3 player (Sansa E250) on a Linux desktop. Now I can have all the tunes I want without dropping into Windows to manipulate them.