HowtoForge provides user-friendly Linux tutorials.

  • How To Search For Missing Packages With apt-file On Debian and Ubuntu

    Author: falkoTags: , Comments: 1

    How To Search For Missing Packages With apt-file On Debian and Ubuntu This short article describes how you can search for missing packages with apt-file on Debian and Ubuntu systems. apt-file allows you to search for a file name, and it gives back the name(s) of the package(s) containing that file so that you can install the appropriate package.

    read more... | add comment | view as pdf | print

  • Setting up a serial console

    Author: Daniel15Tags: Comments: 7

    Setting up a serial console This tutorial will show you how to set up a serial console on a Linux system, and connect to it via a null modem cable. This is quite useful if your Linux server is in a headless configuration (no keyboard or monitor), as it allows you to easily get a console on the system if there are any problems with it (especially network problems, when SSH is not available). In the end, the GRUB menu will appear over the serial link, as will the bootup messages (output when booting the system). I'm using Debian Etch on the server and Ubuntu Edgy on my client, although this should work on any Linux distribution.

    read more... | add comment | view as pdf | print

  • How to Set up Network Bonding in Ubuntu 6.10

    Author: stutchTags: , Comments: 8

    How to Set up Network Bonding in Ubuntu 6.10 Network Bonding, otherwise known as port trunking allows you to combine multiple network ports into a single group, effectively aggregating the bandwidth of multiple interfaces into a single connection. For example, you can aggregate two gigabyte ports into a two-gigabyte trunk port. Bonding is used primarily to provide network load balancing and fault tolerance.

    read more... | add comment | view as pdf | print

  • Fight Image Spam With FuzzyOCR And SpamAssassin On Debian/Ubuntu

    Author: falkoTags: , Comments: 4

    Fight Image Spam With FuzzyOCR And SpamAssassin On Debian/UbuntuThis tutorial describes how to scan emails for image spam with FuzzyOCR. FuzzyOCR is a plugin for SpamAssassin which is aimed at unsolicited bulk mail containing images as the main content carrier. Using different methods, it analyzes the content and properties of images to distinguish between normal mails (ham) and spam mails. FuzzyOCR tries to keep the system load low by scanning only mails that have not already been categorized as spam by SpamAssassin, thus avoiding unnecessary work.

    read more... | add comment | view as pdf | print

  • Building Apache with PHP, MySQL, OCI8 instant client support

    Author: nayyaresTags: , Comments: 1

    Building Apache with PHP, MySQL, OCI8 instant client supportThere are many howtos on building Apache with PHP, MYSQL support, but it is very rare to find some document on OCI8 support with Apache Build, recently I was building a web server in my data center and I was really in trouble when I was searching some installation document, there are few documents , but most of them are using either RPM version of packages or they are missing some of the essential steps. I am trying to write a howto that will help you to at least understand the installation with step-by-step method.

    read more... | add comment | view as pdf | print

  • How To Install KnowledgebasePublisher On Your Site

    Author: sridharTags: , Comments: 1

    How To Install KnowledgebasePublisher On Your Site This is a step-by-step tutorial on installation of KnowledgebasePublisher, an opensource knowledge base, FAQ script that you can install on your web site.

    read more... | add comment | view as pdf | print

  • Installing Ubuntu or Kubuntu, 6.06.1 LTS "Dapper Drake", on a Single/Multi -Boot RAID System

    Author: gniemcewTags: Comments: 2

    Installing Ubuntu or Kubuntu, 6.06.1 LTS "Dapper Drake", on a Single/Multi -Boot RAID System This guide describes how to install Ubuntu (Ubuntu+GNOME) or Kubuntu (Ubuntu+KDE) 6.06.1 LTS ("Dapper Drake") on a single or a multi -boot RAID system. It is meant as a variation of Ubuntu Wiki FakeRAID HowTo document, but digested and with minimum commentary. Its goal is to allow new Ubuntu users to complete an entire installation inside of 30 minutes, almost entirely by copy and paste.

    read more... | add comment | view as pdf | print

  • Detailed Guide On Arrays In PHP

    Author: haroonTags: Comments: 14

    Detailed Guide On Arrays In PHP Here is yet another article of Fast PHP Articles Series. Today we are going to discuss ARRAYS. We will learn its syntax, its different types, the different built-in array functions that help to perform different tasks related to arrays quickly and different practical examples explaining the use of arrays in PHP.

    read more... | add comment | view as pdf | print

  • .htaccess Based Authentication On Subdirectories

    Author: nayyaresTags: , Comments: 5

    .htaccess Based Authentication On Subdirectories .htaccess is used to provide facility of changing configuration per directory basis, this file can contain one or more directives that are going to be forced on the directory that contains the.htaccess file. In this howto, I will take a dummy scenario of two parallel level subdirectories and will implement password authentication on both of them. This means only those users can access these directories that have the correct username and password.

    read more... | add comment | view as pdf | print

  • Install and Configure Auth Shadow on Debian/Ubuntu

    Author: ThanatosTags: , , , , Comments: 3

    Install and Configure Auth Shadow on Debian/Ubuntu Auth Shadow or mod-auth-shadow is a module for apache (and apache2, sort of) that enables authentication against /etc/shadow. The benefits being that any system user with a password can be authenticated for web_dav, subversion or simply an https server. The only other way to do this is with PAM. That method is dangerous because the apache user (www-data in my case) must be able to read /etc/shadow. Obviously, not a good idea. Auth Shadow accomplishes this safely by using a intermediate program called validate. This works because validate can be owned by root but executable by everyone. In the event that your server is compromised through apache, your password file will not be readable.

    read more... | add comment | view as pdf | print