Linux Tutorials on the topic “linux”

  • How do I scan my Linux system for rootkits, worms, trojans, etc.?

    linux Author: Falko TimmeTags: , , Comments: 3

    Either with chkrootkit or with rkhunter. chkrootkit Either install the package that comes with your distribution (on Debian you would run apt-get install chkrootkit ), or download the sources from www.chkrootkit.org and install manually: wget --passive-ftp ftp://ftp.pangeia.com.br/pub/seg/pac/chkrootkit.tar.gz tar xvfz chkrootkit.tar.gz cd chkrootkit-<version>/ make sense Afterwards, you can move the chkrootkit directory somewhere else, e.g. /usr/local/chkrootkit:

  • Creating DjVu Documents Linux HOWTO

    Author: volodyaTags: Comments: 3

    Creating DjVu Documents Linux HOWTO This document explains some of the uses of djvulibre implementation of DjVu for creating quality DjVu documents in linux. DjVu format features bitmap document compression and hypertext structure. It is used by numerous web sites all around the world for storing and distributing digital documents including scanned documents and high-resolution pictures. One of the advantages of DjVu files is that they are notably small, often smaller than PDF or JPEG files with the same content. This makes DjVu a helpful tool for digitizing books and journals, especially scientific ones.

  • Cisco 350 Series And Kismet

    Author: un1xTags: , Comments: 0

    Cisco 350 Series And Kismet This tutorial is describing how to configure a Cisco Aironet wireless card and how to set up kismet in order to run with it.

  • How to perform a point in time restoration using ZRM for MySQL

    Author: tkrTags: , , , Comments: 0

    How to perform a point in time restoration using ZRM for MySQL ZRM for MySQL is a powerful, flexible and robust backup and recovery solution for  MySQL databases for all storage engines. With ZRM for MySQL a Database Administrator can automate logical or raw backup to a local or remote disk. In this How To, we attempt to explain how to recover from an user error at any given point in time.

  • Step-By-Step Configuration of NAT with iptables

    Author: ganesh35Tags: , Comments: 29

    Step-By-Step Configuration of NAT with iptables This tutorial shows how to set up network-address-translation (NAT) on a Linux system with iptables rules so that the system can act as a gateway and provide internet access to multiple hosts on a local network using a single public IP address. This is achieved by rewriting the source and/or destination addresses of IP packets as they pass through the NAT system.

  • Step-by-Step IPP based Print Server using CUPS

    Author: ganesh35Tags: Comments: 5

    Step-by-Step IPP based Print Server using CUPS  This tutorial describes how to install a Linux print server with CUPS. It also covers the installation and configuration of printer drivers on the print server as well as the printer setup on a Windows 2000 client.

  • Racoon Roadwarrior Configuration

    Author: matija.zemanTags: , Comments: 0

    Racoon Roadwarrior Configuration Racoon Roadwarrior is a client that uses unknown, dynamically assigned IP addresses to connect to a VPN gateway (in this case also firewall). This is one of the most interesting and today most needed scenarios in business environment. This tutorial shows how to configure Racoon Roadwarrior.

  • Integrate Thunderbird with Active Directory

    Author: artaxerxesTags: Comments: 1

    Integrate Thunderbird with Active Directory To integrate Thunderbird to the AD, you must already have installed and configured Kerberos and Samba so that you can use the net ads to obtain the information you need. There are a lot of documentation out there to get to that point. I will just highlight the main points for the sake of completeness.

  • Creating .deb-Packages With Checkinstall

    Author: Falko TimmeTags: , , Comments: 2

    Creating .deb-Packages With Checkinstall Checkinstall is a nice tool to create simple .deb-packages that you can use in your local network (e.g. if you have to install the same piece of software on multiple computers running Debian). It lets you compile and install software from the sources like before, but with the difference that you end up with a simple Debian package which also means that you can easily uninstall the software you just compiled by running dpkg -r!

  • How to Build an Effective Mail Server Defense

    Author: alinapTags: , , , Comments: 2

    How to Build an Effective Mail Server Defense When speaking of mail server-related security, one tends to limit the issue to message applied security measures, and even more to Antivirus and Antispam protection. This is however only one stage in the more complex process of securing your server. This article aims at identifying and explaining all security layers, highly important when choosing a certain mail server and consequently when configuring and using it.