HowtoForge provides user-friendly Linux tutorials.

  • How to configure Apache to use Radius for Two-factor Authentication

    Author: nowenTags: , Comments: 4

    How to configure Apache to use Radius for Two-factor Authentication This brief document shows how to configure Apache to use mod_auth_xradius to authenticate users with the WiKID Strong Authentication System. Adding two-factor authentication to Apache is a very simple process with this setup.

  • Creating a dd/dcfldd Image Using Automated Image & Restore (AIR)

    Author: dream1600Tags: , Comments: 8

    Creating a dd/dcfldd Image Using Automated Image & Restore (AIR) Automated Image & Restore (AIR) is an open source application that provides a GUI front end to the dd/dcfldd (Dataset Definition (dd)) command. AIR is designed to easily create forensic disk/partition images. It supports MD5/SHAx hashes, SCSI tape drives, imaging over a TCP/IP network, splitting images, and detailed session logging. To date, the AIR utility has only been developed for use on Linux distributions. In its simplest form, AIR provides a convenient interface to execute the dd set of commands. It eliminates the risk of "fat fingering" an error in the shell terminal and ultimately makes using the dd command more user-friendly for those who are not as experienced. Please note that using the AIR front end still requires some basic knowledge of how the dd (or dcfldd) commands work.

  • The Perfect Desktop - Part 3: Ubuntu 6.10 Edgy Eft

    ubuntu Author: Falko TimmeTags: , Comments: 1

    The Perfect Desktop - Part 3: Ubuntu 6.10 Edgy Eft With the release of Microsoft's new Windows operating system (Vista), more and more people are looking for alternatives to Windows for various reasons. This tutorial is the third in a series of articles where I will show people who are willing to switch to Linux how they can set up a Linux desktop (Ubuntu 6.10 Edgy Eft in this article) that fully replaces their Windows desktop, i.e. that has all software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that runs also on older hardware, and the best thing is: all software comes free of charge.

  • Configuration Automation & Centralized Management With Puppet on Ubuntu

    Author: KbredeTags: Comments: 7

    Configuration Automation & Centralized Management With Puppet on Ubuntu This is a step by step tutorial on how to install the server component of Puppet (puppetmaster) on one machine, and the Puppet client (puppetd) on another. We then perform a simple test to make sure Puppet is working properly. If you're not familiar with Puppet, it's a configuration automation tool that allows you to centralize management of the various *nix flavors running on your network. Puppet supports central management of the important aspects of your systems, such as: files, packages, users, services, cron, mounts, etc.

  • How To Roll A Kernel the Ubuntu/Debian Way

    Author: VirtualEntityTags: , , Comments: 2

    How To Roll A Kernel the Ubuntu/Debian Way The Linux kernel is the heart of your Ubuntu Operating System. The kernel that comes with Ubuntu should contain all of the drivers you need, but just in case you would like to tweak your kernel or if for some reason you need to recompile for some special reason this guide will help you.

  • How to download only the new emails in Sylpheed

    Author: VirtualEntityTags: Comments: 0

    How to download only the new emails in Sylpheed Sylpheed keeps downloading the same messages over and over again! I want to be able to download only the new messages, but have the option of re-downloading everything. How to do?

  • Using TAR with Bunzip2 files

    Author: VirtualEntityTags: Comments: 0

    Using TAR with Bunzip2 files Bunzipping and then unTARring in two steps is not convenient. It is not necessary to use Bunzip2 and then TAR to unzip a file in two separate steps. Tar will do the job on its own if the -j switch is used, thus: tar xjvf linux-source<version>.tar.bz2 By the same token, you may use the -z switch with a gzipped file, e.g. tar zxvf linux-source<version>.tar.gz

  • Setting the SUID/SGID bits: Giving a program YOUR permissions when it runs

    Author: VirtualEntityTags: , Comments: 5

    Setting the SUID/SGID bits: Giving a program YOUR permissions when it runs Normally, when a program runs under Linux, it inherits the permissions of the user who is running it, thus if I run a program under my account, the program runs with the same permissions that I would have if that program were me. Thus, if I cannot open a certain file, the program I am running also cannot open the file in question. If I set the SUID or SGID bit for a file, this causes any persons or processes that run the file to have access to system resources as though they are the owner of the file.

  • An Explanation of Pointers (C++)

    Author: VirtualEntityTags: Comments: 1

    An Explanation of Pointers (C++) Pointers are basically the same as any other variable. However, what is different about them is that instead of containing actual data, they contain a pointer to the memory location where information can be found. This is a very important concept, and many programs and ideas rely on pointers as the basis of their design, linked lists for example.

  • MySQL Master Master Replication

    Author: sheikhsaTags: Comments: 45

    MySQL Master Master Repliction Tutorial This tutorial describes how to set up MySQL master-master replication. We need to replicate MySQL servers to achieve high-availability (HA). In my case I need two masters that are synchronized with each other so that if one of them drops down, other could take over and no data is lost. Similarly when the first one goes up again, it will still be used as slave for the live one.