Mini-Howtos

Want to support HowtoForge? Become a subscriber!
 

Bluetooth PAND (Personal Area Network) Howto For Debian Etch

Bluetooth PAND (Personal Area Network) Howto For Debian Etch

I wanted to access the internet over bluetooth instead of GPRS/3G network from my mobile phone (SE K800i). After a lot of searching I couldn't find a clear explanation as how to accomplish this. I did manage to set it up with Windows XP, using the "Personal Area Network" in the bluetooth utility and doing internet connection sharing. After another fruitless search, I managed to figure out how to make a bluetooth internet profile instead of GPRS or 3G on the phone. Since I work in Linux most of the time, I decided to have a go and do it with Debian, my workstation's main OS. After spending a few hours, I had it working using the steps below.

How To Set Up A FreeBSD Wireless Access Point

How To Set Up A FreeBSD Wireless Access Point

This how-to explains the process of setting up a FreeBSD system that will act as a wireless router (as well as a wired router) that takes advantage of the ported version of OpenBSD's PF packet filter.

Network Monitoring With ntop

Network Monitoring With ntop

ntop is a network traffic tools that shows network usage in a real time. One of the good things about this tool is that you can use a web browser to manage and navigate through ntop traffic information to better understand network status.

Create Users And Change Passwords With A Bash Script

Create Users And Change Passwords With A Bash Script

These two scripts are very important for the system admin who regularly works with mail servers and somehow forgets to backup his system username and password! Let’s say somehow we lost the usernames and passwords of the mail server. In this case the admin has to manually create all the users and then change the passwords for all the users. Tedious job. Let’s make our life easier.

Useful Commands For The Linux Command Line

Useful Commands For The Linux Command Line

This short guide shows some important commands for your daily work on the Linux command line.

Setting the SUID/SGID bits: Giving a program YOUR permissions when it runs

Setting the SUID/SGID bits: Giving a program YOUR permissions when it runs

Normally, when a program runs under Linux, it inherits the permissions of the user who is running it, thus if I run a program under my account, the program runs with the same permissions that I would have if that program were me. Thus, if I cannot open a certain file, the program I am running also cannot open the file in question. If I set the SUID or SGID bit for a file, this causes any persons or processes that run the file to have access to system resources as though they are the owner of the file.

Using TAR with Bunzip2 files

Using TAR with Bunzip2 files

Bunzipping and then unTARring in two steps is not convenient.

It is not necessary to use Bunzip2 and then TAR to unzip a file in two separate steps.

Tar will do the job on its own if the -j switch is used, thus:

tar xjvf linux-source<version>.tar.bz2

By the same token, you may use the -z switch with a gzipped file, e.g.

tar zxvf linux-source<version>.tar.gz

How to download only the new emails in Sylpheed

How to download only the new emails in Sylpheed

Sylpheed keeps downloading the same messages over and over again! I want to be able to download only the new messages, but have the option of re-downloading everything. How to do?

Prevent Phishing with Mutual Authentication

Prevent Phishing with Mutual Authentication

Phishing is a man-in-the-middle attack. While many people think using time-bound, one-time passwords will solve the problem, they are wrong as attacks will just become automated. What is required is strong mutual authentication - authentication of the host to the user as well as the user to the host. This article demonstrates how to do that using open-source software from WiKID.

How to Set up Network Bonding in Ubuntu 6.10

How to Set up Network Bonding in Ubuntu 6.10

Network Bonding, otherwise known as port trunking allows you to combine multiple network ports into a single group, effectively aggregating the bandwidth of multiple interfaces into a single connection. For example, you can aggregate two gigabyte ports into a two-gigabyte trunk port. Bonding is used primarily to provide network load balancing and fault tolerance.

first page
previous page
...
8
...
next page
last page