Mini-Howtos

Want to support HowtoForge? Become a subscriber!
 

Using A Sandisk MP3 Player On A Linux Desktop

Using A Sandisk MP3 Player On A Linux Desktop

This article shows how to use a Sandisk MP3 player (Sansa E250) on a Linux desktop. Now I can have all the tunes I want without dropping into Windows to manipulate them.

Decision Making Using PHP Switch Statement

Decision Making Using PHP Switch Statement

Today I am going to discuss Switch Statement. The basic concept of Switch is similar to the IF-ELSE statement; it helps you to write decision making code just like IF-ELSE but it is a little more organized, elegant and handy when dealing with complex logics as compare to IF-ELSE.

Set Up Postfix For Relaying Emails Through Another Mailserver

Set Up Postfix For Relaying Emails Through Another Mailserver

This short guide shows how you can set up Postfix to relay emails through another mailserver. This can be useful if you run a Postfix mailserver in your local network and have a dynamic IP address because most dynamic IP addresses are blacklisted today. By relaying your emails through another mailserver that is hosted on a static IP address in a data center (e.g. your ISP's mailserver) you can prevent your emails from being categorized as spam.

.htaccess Based Authentication On Subdirectories

.htaccess Based Authentication On Subdirectories

.htaccess is used to provide facility of changing configuration per directory basis, this file can contain one or more directives that are going to be forced on the directory that contains the.htaccess file. In this howto, I will take a dummy scenario of two parallel level subdirectories and will implement password authentication on both of them. This means only those users can access these directories that have the correct username and password.

Secure your SSH deployment with WiKID two-factor authentication

Secure your SSH deployment with WiKID two-factor authentication

In this document we are going to demonstrate how to combine two-factor authentication from WiKID with an SSH gateway server with hosted private keys to create a highly secure, auditable and easy to use remote access solution. The WiKID Strong Authentication System is a commercial/open source two-factor authentication solution.

How to configure OpenVPN to use WiKID Strong Authentication

How to configure OpenVPN to use WiKID Strong Authentication 

The WiKID Strong Authentication System  is a commercial/open source two-factor authentication solution.  This guide demonstrates how to OpenVPN and SSH to use one-time passwords from WiKID.  While both solutions support private key authentication, that may not be sufficient for your requirements; you may need one-time passwords for webmail or extranet access; or centralized authentication management and logging.

Create A Desktop Background Wallpaper Changer For Xfce

Create A Desktop Background Wallpaper Changer For Xfce

I have switched to Xubuntu a few months ago coming from Kubuntu. In Kubuntu I liked the (already available) option of setting up a list of image files and have them randomly displayed as background image on the desktop. This was one of the things I have missed so far in Xfce. This small howto shows you how you can randomly display background wallpapers in XFCE.

Securing the connection between MySQL and MySQL Administrator using an SSH tunnel

Securing the connection between MySQL and MySQL Administrator using an SSH tunnel

This is a description of how to set up a secure tunnel between your MySQL Server and a locally running MySQL Administrator using Putty. By creating a secure tunnel to your MySQL server using Putty, you can grant localhost access to powerful applications like MySQL Administrator while at the same time, make your server appear as if it isn't even there. In effect, make your MySQL server disappear from the outside world.

Cisco 350 Series And Kismet

Cisco 350 Series And Kismet

This tutorial is describing how to configure a Cisco Aironet wireless card and how to set up kismet in order to run with it.

How to perform a point in time restoration using ZRM for MySQL

How to perform a point in time restoration using ZRM for MySQL

ZRM for MySQL is a powerful, flexible and robust backup and recovery solution for  MySQL databases for all storage engines. With ZRM for MySQL a Database Administrator can automate logical or raw backup to a local or remote disk. In this How To, we attempt to explain how to recover from an user error at any given point in time.

first page
previous page
...
9
...
next page
last page