HowtoForge provides user-friendly Linux tutorials.

  • Installing And Working With eyeOS Under Debian 4.0

    Author: jfheinsTags: , , Comments: 2

    Installing And Working With eyeOS Under Debian 4.0 This tutorial shows how you can install eyeOS on a standard Linux system. When you have finished this tutorial, you will have a full, working eyeOS on your server. eyeOS is a kind of operating system which works online, i.e. it manages files on the server and enables the user to upload, download and edit files.

    read more... | add comment | view as pdf | print

  • Converting All Your MS Outlook PST Files To Maildir Format

    Author: nicc777Tags: Comments: 3

    Converting All Your MS Outlook PST Files To Maildir Format One of the challenges you may face when converting an office from Microsoft Windows to Linux is that many people archive their e-mail in PST files. There are PST tools available, but most of them are commercial, since the PST file format is closed and protected by Microsoft. There are several non-commercial methods to achieve roughly the same goal, and in this tutorial we use IMAP (more specifically, courier-imap) to convert all our e-mails from PST to the Maildir format. The advantage of this approach is that you also lay the foundation for a new mail system, with all your old e-mails already imported the day you switch over.

    read more... | add comment | view as pdf | print

  • How To Compile A Kernel - Debian Etch

    Author: falkoTags: , Comments: 3

    How To Compile A Kernel - Debian Etch Each distribution has some specific tools to build a custom kernel from the sources. This article is about compiling a kernel on a Debian Etch system. It describes how to build a custom kernel using the latest unmodified kernel sources from www.kernel.org (vanilla kernel) so that you are independent from the kernels supplied by your distribution. It also shows how to patch the kernel sources if you need features that are not in there.

    read more... | add comment | view as pdf | print

  • Introduction to Antispam Practices

    Author: alinapTags: , Comments: 1

    Introduction to Antispam Practices Competitive Antispam products, proper legislation, efforts towards a better user education, it has all been tried in order to stop spam. However, unsolicited emails keep consuming the space and time of all email users. Moreover, spam messages can be the cause of serious virus and spyware outbreaks, while others “phish” for sensitive information like bank accounts and passwords.

    read more... | add comment | view as pdf | print

  • nBox - Envision your network with nBox -- (Embedded Ntop)

    Author: evolutionaryitTags: Comments: 2

    nBox - Envision your network with nBox -- (Embedded Ntop) The life of a systems or network administrator requires us to maintain an expansive understanding of our network infrastructure to more effectively manage it. Amidst volumes of complex data that some IT problems present and network management is no exception to these complications. Visual tools allow us to better see trends and make sense of the macro view of our networks. Ntop, nBox, nProbe are just the right FOSS tools that can help us gain greater insight.

    read more... | add comment | view as pdf | print

  • Introducing Remo - An Easy Way to Secure an Insecure Online Application with ModSecurity

    Author: dune73Tags: , Comments: 2

    Introducing Remo - An Easy Way to Secure an Insecure Online Application with ModSecurity Say you have a nasty application on your Apache webserver that has been installed by some jerks from the marketing department and you can neither remove nor patch it. Maybe it is a time problem, a lack of know-how, a lack of source-code, or possibly even political reasons. Consequently you need to protect it without touching it. There is ModSecurity, but they say this is only for experts. A straightforward alternative is Remo, a graphical rule editor for ModSecurity that comes with a whitelist approach. It has all you need to lock down the application.

    read more... | add comment | view as pdf | print

  • How To Block Spam Before It Enters The Server (Postfix)

    Author: falkoTags: , Comments: 11

    How To Block Spam Before It Enters The Server (Postfix) The last few weeks have seen a dramatic increase in spam (once again). Estimates say that spam makes now up for 80 - 90% of all emails, and many mail servers have difficulties in managing the additional load caused by the latest spam, and spam filters such as SpamAssassin do not recognize large parts of that spam as they did before. Fortunately, we can block a big amount of that spam at the MTA level, for example by using blacklists, running tests on the sender and recipient domains, etc. An additional benefit of doing this is that it lowers the load on the mail servers because the (resource-hungry) spamfilters have to look at less emails.

    read more... | add comment | view as pdf | print

  • Virtual Users And Domains With Postfix, Courier And MySQL (Debian Etch)

    debian Author: falkoTags: , , Comments: 18

    Virtual Users And Domains With Postfix, Courier And MySQL (Debian Etch)This document describes how to install a mail server based on Postfix that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I'll also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses.

    read more... | add comment | view as pdf | print

  • Create Users And Change Passwords With A Bash Script

    Author: fakrulTags: Comments: 19

    Create Users And Change Passwords With A Bash Script These two scripts are very important for the system admin who regularly works with mail servers and somehow forgets to backup his system username and password! Let’s say somehow we lost the usernames and passwords of the mail server. In this case the admin has to manually create all the users and then change the passwords for all the users. Tedious job. Let’s make our life easier.

    read more... | add comment | view as pdf | print

  • The Perfect Desktop - Fedora 7

    fedora Author: falkoTags: , Comments: 6

    The Perfect Desktop - Fedora 7 This tutorial shows how you can set up a Fedora 7 desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.

    read more... | add comment | view as pdf | print