Linux

Want to support HowtoForge? Become a subscriber!
 

dmidecode: Finding Out Hardware Details Without Opening The Computer Case

dmidecode: Finding Out Hardware Details Without Opening The Computer Case

dmidecode is a tool for dumping a computer's DMI (some say SMBIOS) table contents in a human-readable format. This table contains a description of the system's hardware components, as well as other useful pieces of information such as serial numbers and BIOS revision. Thanks to this table, you can retrieve this information without having to probe for the actual hardware.

Installing and Configuring Openfiler with DRBD and Heartbeat

Installing and Configuring Openfiler with DRBD and Heartbeat

Openfiler is a high performance operating system tailored for use as a SAN/NAS appliance. This configuration will enable two Openfiler appliances to work in an Active/Passive high availability scenario.

Logical Volume Manager: How can I extend a Volume Group?

Logical Volume Manager: How can I extend a Volume Group?

It is a good choice to use LVM on Linux. It provides flexible storage management than any other traditional physical partitoning. With LVM, you can easily create, delete, resize storage volumes. First of all, if you want to know what LVM is, there are many documents on the Internet. In this example we will learn how to extend a Volume Group size.

Convert YouTube Videos Into MP3s

Convert YouTube Videos Into MP3s

I do have a few songs that are broken and that I can't get somewhere else and can't buy however they are on YouTube. I know, quality is not the best on YouTube but for some stuff you have it might be better. Question is, how could I put those flash videos onto my music player? It's actually very simple but the legality of it depends on where you live. Better check out first if you are allowed to convert YouTube videos into mp3s.

Secure SSH Using WiKID Two-Factor Authentication And TACACS+

Secure SSH Using WiKID Two-Factor Authentication And TACACS+

These instructions are designed to help you configure and test using the WiKID TACACS+ protocol module via Linux PAM on Red Hat. This document has been updated to cover pam .99 and higher. We assume that you have already installed the open-source WiKID Strong Authentication Server Community Edition.

Running Linux Live-CDs On Windows With MobaLiveCD

Running Linux Live-CDs On Windows With MobaLiveCD

This article is a short introduction to running Linux Live-CDs with MobaLiveCD. MobaLiveCD is a standalone Windows application (i.e., you do not have to install it - it runs by clicking on the executable) that uses the Qemu emulator to run Linux Live-CDs on your Windows desktop.

Using Zivios Identity Management

Using Zivios Identity Management

Zivios is an open source web based identity management application featuring single sign on, certificate authority, user, group and computer provisioning with remote management of services. Zivios is an n-tiered PHP-5 application and uses MySQL and OpenLDAP as it's data store, with OpenLdap being the primary back end for identity management and application integration and MySQL being used for panel specific data.

ISPConfig 2.x: How To Add A "Move to SPAM"-Option To Your ISPConfig Installation

ISPConfig 2.x: How To Add A "Move to SPAM"-Option To Your ISPConfig Installation

This document describes the steps needed to add a third spam filter strategy to your ISPConfig 2.x installation. It will allow you and your users to select, wether they want to drop spam, allow spam or move it to the corresponding IMAP junk mail folder.

Reverse SSH Tunneling

Reverse SSH Tunneling

Have you ever wanted to ssh to your Linux box that sits behind NAT? Now you can with reverse SSH tunneling. This document will show you step by step how to set up reverse SSH tunneling. The reverse SSH tunneling should work fine with Unix like systems.

Spam Blocking And Web Filtering With The Untangle 5.3 Network Gateway

Spam Blocking And Web Filtering With The Untangle 5.3 Network Gateway

Untangle bundles common open-source applications for blocking spam, spyware, viruses, adware and unwanted content on the network in one single Linux distribution. It can be integrated into existing networks either as a router or as a transparent bridge (directly behind the router, but before the switch that connects the client PCs with the router). The best thing about Untangle is that you don't have to reconfigure the client PCs - Untangle works out of the box.

first page
previous page
...
21
...
next page
last page
XML feed
"Facebook" is a registered trademark of Facebook, Inc. All rights reserved.