HowtoForge provides user-friendly Linux tutorials.

  • How To Set Up A Shockvoice Server On Linux Using Mono

    Author: kobayashiTags: Comments: 0

    How To Set Up A Shockvoice Server On Linux Using Mono This is a step-by-step instruction on how to install Shockvoice on a Linux machine. Shockvoice is a voice-over-ip communication tool. This tool is slightly different in its features. It's simply coded in C# and therefore runs on almost any platform of interest, be it Windows, Unix, Macintosh or Solaris. The client will only be available for Windows in the beginning.

  • HOWTO: Automatically Unlock LUKS Encrypted Drives With A Keyfile

    Author: sjauTags: Comments: 25

    HOWTO: Automatically Unlock LUKS Encrypted Drives With A Keyfile This howto shows how to unlock multiple devices in the intial ramdisk remotely. I suggest to use a keyfile for automatic unlocking. The keyfile should be stored in the normally encrypted root partition - so you still have to unlock that one. During boot process it will then be used to unlock all the other devices.

  • How To Block Spammers/Hackers With mod_defensible On Apache2 (Debian Etch)

    VMWare Image Download Author: Falko TimmeTags: , , Comments: 7

    How To Block Spammers/Hackers With mod_defensible On Apache2 (Debian Etch) mod_defensible is an Apache 2.x module intended to block spammers/hackers/script kiddies using DNSBL servers. It will look at the client IP and check it in one or several DNSBL servers and return a 403 Forbidden page to the client. This guide shows how to install and use it with Apache 2 on a Debian Etch server.

  • How To Set Up DHCP Failover On Centos 5.1

    Author: topdogTags: , Comments: 1

    How To Set Up DHCP Failover On Centos 5.1 This tutorial will walk you through setting up DHCP fail over on CentOS 5.1 using the default ISC dhcp server, this can easily be adapted to any other Linux distro out there. You will most likely need Failover in environments where network down time can not be tolerated. My home is running a DLNA setup so I need my devices to be able to obtain network parameters at all times.

  • Apache2: Logging To A MySQL Database With mod_log_sql (Debian Etch)

    Author: Falko TimmeTags: , , Comments: 5

    Apache2: Logging To A MySQL Database With mod_log_sql (Debian Etch) This guide shows how you can write the Apache2 access log to a MySQL database instead of a file. To achieve this, I use the Apache2 module mod_log_sql. I'm using a Debian Etch server in this tutorial.

  • How To Set Up Shorewall (Shoreline) 4.0 Firewall On CentOS 5.1

    Author: poustchiTags: , Comments: 1

    How To Set Up Shorewall (Shoreline) 4.0 Firewall On CentOS 5.1 This tutorial will walk you through setting up Shorewall (Shoreline) 4.0 firewall on CentOS 5.1 , this can easily be adapted to any other Linux distribution out there.

  • The Bash Script To Configure The Firewall Using IPTABLES

    Author: ajaonchatTags: , , Comments: 1

    About the Script: This script is about to build a firewall in Linux OS by using iptables, the user only needs to follow and answer the simple and easy steps and the script will generate the user specified iptables rule in its original form. I HAVE TESTED THE SCRIPT ON PCLINUXOS, FEDORA-9, DREAM_LINUX, UBUNTU-8. This is my iptables Version 1.0 (USMAN AKRAM - Lucky)

  • Virtual Hosting With Proftpd And MySQL (Incl. Quota) On Ubuntu 8.04 LTS

    ubuntu Author: Falko TimmeTags: , Comments: 10

    This document describes how to install a Proftpd server that uses virtual users from a MySQL database instead of real system users. This is much more performant and allows to have thousands of ftp users on a single machine. In addition to that I will show the use of quota with this setup.

  • The Perfect Desktop - OpenSUSE 11 (GNOME)

    opensuse Author: Falko TimmeTags: , Comments: 5

    The Perfect Desktop - OpenSUSE 11 (GNOME) This tutorial shows how you can set up an OpenSUSE 11 desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.

  • How To Automate Spamcop Submissions

    Author: Stephan JauTags: Comments: 17

    How To Automate Spamcop Submissions Spamcop is a service which provides RBLs for mailservers in order to reject incoming mail from spammers. Their philosophy is to process possible spam complaints from users. When they receive a certain amount of complaints during a time-period then they will blacklist the offender. This system is dependant on spam reporting from users. However, their submission process is not very user-friendly [...]