- Web Server
- Control Panels
- Site Map/RSS Feeds
Setting Up LVM On Top Of Software RAID Subsystem - RHEL & Fedora
Here is a quick look how to build an LVM on top of RAID 1 array, so that we combine the power of these two. This kind of setup is extremely useful in situations where we want a file server to store large amounts of data which provides a centralized backup, storage space for downloadable files via ftp/http, and that may grow enormously in the coming years after the initial setup.
How To Extract Values From top And Plot Them
Many researchers who are doing performance evaluation and benchmarking need to capture the values of the CPU and the RAM. Others might need to capture the throughput as well. In this short tutorial I will show how I capture the CPU and RAM values from “top” and then extract them in one line command.
How To Reset A Forgotten Root Password With Knoppix
This guide explains how you can reset a forgotten root password with the help of the Knoppix Linux Live-CD. Afterwards you can log in to your system as root again.
Setting Up A PHP + MySQL Powered BitTorrent Tracker With RivetTracker
Efficient file distribution is an important process for many websites online. BitTorrent makes this easier by sharing the uploading and downloading among clients. This alleviates the bandwidth required by the content provider. This tutorial will show you how to install RivetTracker, a PHP and MySQL driven BitTorrent tracker. RivetTracker is a heavily modified version of PHPBTTracker, written by "DeHackEd". It aims to be easy to use and manage.
Security Issues and Poptop
PPTP does not have the best history in terms of security. The original Microsoft implementation for PPTP faired very poorly. MS-CHAPV2 solved these weaknesses - for wired networks. Unfortunately, back in 2004, Joshua Wright released a version of ASLEAP capable of brute-force attacking PPTP passwords in a wireless environment. As a systems administrator for the VPN, you can't tell if a user is connecting via some public WiFi service where someone might be running a tool like ASLEAP. Yet, the presense of PPTP client software on Windows machines makes using PPTP very tempting. The best answer to this problem is to utilize two-factor authentication. If a one-time passcode is brute-forced, it won't matter as it can't be used again.
How To Install suPHP On Various Linux Distributions For Use With ISPConfig (2.2.20 And Above)
Starting with version 2.2.20, ISPConfig has improved support for suPHP. This article explains how to install suPHP on various distributions supported by ISPConfig. (If you have used suPHP with previous ISPConfig versions, your installation will still work.)
How To Install mod_ruby On Various Linux Distributions For Use With ISPConfig (2.2.20 And Above)
Starting with version 2.2.20, ISPConfig has built-in support for Ruby. Instead of using CGI/FastCGI, ISPConfig depends on mod_ruby being available in the server's Apache. This article explains how to install mod_ruby on various distributions supported by ISPConfig.
How To Create The Sis191 Gigabit Ethernet Driver On Linux 2.6
This how-to is for those people wich have a sis191 gigabit ethernet integrated interface (on-board LAN), but cannot get sis191 default driver working. My Acer Aspire SA90 is one good example.
Three Ways To Access Linux Partitions (ext2/ext3) From Windows On Dual-Boot Systems
If you have a dual-boot Windows/Linux system, you probably know this problem: you can access files from your Windows installation while you are in Linux, but not the other way round. This tutorial shows three ways how you can access your Linux partitions (with ext2 or ext3 filesystem) from within Windows: Explore2fs, DiskInternals Linux Reader, and the Ext2 Installable File System For Windows. While the first two provide read-only access, the Ext2 Installable File System For Windows can be used for read and write operations.
Intrusion Detection: Snort, Base, MySQL, and Apache2 On Ubuntu 7.10 (Gutsy Gibbon) (Updated)
In this tutorial I will describe how to install and configure Snort (an intrusion detection system (IDS)) from source, BASE (Basic Analysis and Security Engine), MySQL, and Apache2 on Ubuntu 7.10 (Gutsy Gibbon). Snort will assist you in monitoring your network and alert you about possible threats. Snort will output its log files to a MySQL database which BASE will use to display a graphical interface in a web browser.
"Facebook" is a registered trademark of Facebook, Inc. All rights reserved.