HowtoForge provides user-friendly Linux tutorials.

  • The Perfect Desktop - OpenSUSE 11 (GNOME)

    opensuse Author: Falko TimmeTags: , Comments: 5

    The Perfect Desktop - OpenSUSE 11 (GNOME) This tutorial shows how you can set up an OpenSUSE 11 desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.

  • How To Automate Spamcop Submissions

    Author: Stephan JauTags: Comments: 17

    How To Automate Spamcop Submissions Spamcop is a service which provides RBLs for mailservers in order to reject incoming mail from spammers. Their philosophy is to process possible spam complaints from users. When they receive a certain amount of complaints during a time-period then they will blacklist the offender. This system is dependant on spam reporting from users. However, their submission process is not very user-friendly [...]

  • Create A Desktop Background Wallpaper Changer For Xfce

    Author: Stephan JauTags: , Comments: 8

    Create A Desktop Background Wallpaper Changer For Xfce I have switched to Xubuntu a few months ago coming from Kubuntu. In Kubuntu I liked the (already available) option of setting up a list of image files and have them randomly displayed as background image on the desktop. This was one of the things I have missed so far in Xfce. This small howto shows you how you can randomly display background wallpapers in XFCE.

  • Create Incremental Snapshot-style Backups With rSync And SSH

    Author: sjauTags: Comments: 26

    Create Incremental Snapshot-style Backups With rSync And SSHAs neither human nor computers are perfect (humans err / computers may fail) it is quite obvious that a good backup system will prevent from too much damage once the computer may go down. This could be either because the harddrive is failing or because of hackers or because you accidentally deleted something important.In this tutorial I will show you how to automate backups automatically in an incremental snapshot-style way by using rSync.

  • How To Compile rTorrent From SVN In Ubuntu Gutsy Gibbon

    Author: Stephan JauTags: Comments: 0

    How To Compile rTorrent From SVN In Ubuntu Gutsy Gibbon Torrent is a great way to transfer large files very quickly. However most torrent clients are gui based and have quite some impact on system resources (e.g. Azureus). rTorrent is a lightweight client running from the terminal. Being able to run it in a screen session (also upon boot) makes it ideal to also control it from a remote location.

  • HowTo Compile rTorrent From SVN In Ubuntu 8.04 Hardy Heron

    Author: Stephan JauTags: Comments: 4

    HowTo Compile rTorrent From SVN In Ubuntu 8.04 Hardy Heron Torrent is a great way to transfer large files very quickly. However most torrent clients are gui based and have quite some impact on system resources (e.g. Azureus). rTorrent is a lightweight client running from the terminal. Being able to run it in a screen session (also upon boot) makes it ideal to also control it from a remote location.

  • The Perfect Desktop - Linux Mint 5 Elyssa R1

    linux_mint Author: Falko TimmeTags: , Comments: 2

    The Perfect Desktop - Linux Mint 5 Elyssa R1 This tutorial shows how you can set up a Linux Mint 5 Elyssa R1 desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge. Linux Mint 5 is a Linux distribution based on Ubuntu 8.04 that has lots of packages in its repositories (like multimedia codecs, Adobe Flash, Adobe Reader, Skype, Google Earth, etc.) that are relatively hard to install on other distributions; it therefore provides a user-friendly desktop experience even for Linux newbies.

  • How To Secure Postgresql Using Two-Factor Authentication From WiKID

    Author: nowenTags: , Comments: 0

    How To Secure Postgresql Using Two-Factor Authentication From WiKID Databases are the key repository for critical data.  If you are storing information that needs to be kept secure from prying eyes, especially credit card or personally identifiable information (PII) you might be required to control access using two-factor authentication.  This tutorial demonstrates how to secure Postgresql with two-factor authentication from WiKID.

  • Installing MySQL Proxy On CentOS 5 (FINAL) x86_64

    Author: [email protected]Tags: , Comments: 0

    Installing MySQL Proxy On CentOS 5 (FINAL) x86_64 This tutorial explains how you can install MySQL Proxy on a CentOS 5 (x86_64) system. MySQL Proxy is a simple program that sits between your client and MySQL server(s) that can monitor, analyze or transform their communication. Its flexibility allows for unlimited uses; common ones include: load balancing; failover; query analysis; query filtering and modification; and many more.

  • Intrusion Detection For PHP Applications With PHPIDS

    Author: Falko TimmeTags: , Comments: 5

    Intrusion Detection For PHP Applications With PHPIDS This tutorial explains how to set up PHPIDS on a web server with Apache2 and PHP5. PHPIDS (PHP-Intrusion Detection System) is a simple to use, well structured, fast and state-of-the-art security layer for your PHP based web application. The IDS neither strips, sanitizes nor filters any malicious input, it simply recognizes when an attacker tries to break your site and reacts in exactly the way you want it to. Based on a set of approved and heavily tested filter rules any attack is given a numerical impact rating which makes it easy to decide what kind of action should follow the hacking attempt. This could range from simple logging to sending out an emergency mail to the development team, displaying a warning message for the attacker or even ending the user’s session.