Linux Tutorials on the topic “linux”

  • Evolving A Database With MySQL

    mysql Author: DonQuichoteTags: , Comments: 0

    This tutorial explains how to "grow" your own database definition in a way that is maintainable, by using so-called "recreate" scripts. These scripts can be used to both create a database from scratch and update an existing database.

  • Boot Linux Over HTTP With netboot.me

    tux Author: Falko TimmeTags: Comments: 2

    Boot Linux Over HTTP With netboot.me This tutorial shows how you can boot Linux over HTTP with netboot.me. All that users need is Internet connectivity and a small program (gpxe) to boot the machine. This gpxe program provides network booting facility. netboot.me allows you to boot into the following distributions: Debian, Fedora, OpenSUSE, and Ubuntu. netboot.me provides gpxe images for USB sticks, CDs, and also for floppies, i.e., you can boot from a USB sticks, a CD, or a floppy.

  • Boot Linux Over HTTP With boot.kernel.org (BKO)

    tux Author: Falko TimmeTags: Comments: 11

    Boot Linux Over HTTP With boot.kernel.org (BKO) This tutorial shows how you can boot Linux over HTTP with boot.kernel.org (BKO). All that users need is Internet connectivity and a small program (gpxe) to boot the machine. This gpxe program provides network booting facility. BKO allows you to boot into the following distributions: Debian, Ubuntu, Damn Small Linux, Knoppix, Fedora. BKO provides gpxe images for USB sticks, CDs, and also for floppies, i.e., you can boot from a USB sticks, a CD, or a floppy.

  • Easier Reinstalls

    Author: ardchoille42Tags: Comments: 3

    Easier Reinstalls I typically reinstall my computer operating system every six months. The reasons for this are that it cleans out the system and reinstalls require me to be in front of the computer for a total of about ten minutes so it's painless. Notice I said "in front of the computer", the system does all of the work for me with some specially crafted bash scripts.

  • Secure Your Wordpress Blog Administration With Two-Factor Authentication

    Author: nowenTags: , , Comments: 3

    Secure Your Wordpress Blog Administration With Two-Factor Authentication Wordpress is a very popular blogging service. It was recently hit by a disturbing vulnerability that allowed attackers to reset the Administrator's password. While there is a patch for that vulnerability now, wouldn't it be best to not use static passwords? It is actually quite simple to add two-factor authentication to Wordpress.

  • Finding Files On The Command Line

    tux Author: ardchoille42Tags: Comments: 11

    Finding Files On The Command Line One of the things I like about Linux is the command line. I have used nautilus, gnome-commander, konqueror, kommander, dolphin and thunar to manage files in Linux and these file managers are great for what they do. But there are times when one simply wants to find a file when working on the command line without having to open a GUI application.

  • Configuring fail2ban With SquirrelMail On Debian Lenny 5.0/ISPConfig 3

    ispconfig Author: CubAfullTags: , , Comments: 3

    Configuring fail2ban With SquirrelMail On Debian Lenny 5.0/ISPConfig 3 In this article I will show how to prevent brute force attacks with Fail2ban against your SquirrelMail Web login using the Squirrel Logger plugin.

  • How To Install Asterisk For Your First PBX Solution

    Author: vikaskumar2020Tags: Comments: 13

    How To Install Asterisk For Your First PBX Solution Asterisk is one of the best telephony solutions which is free to use. There are others such as yate that provide same type of solutions and even more custom ones. Due to the easy of implementation Asterisk has become more popular than anything else. Asterisk is very easy to use and lots of open source and closed source panels provide a GUI for it.

  • Registering Local Or Remote Commands With logsave

    Author: PedroMouraTags: Comments: 0

    Registering Local Or Remote Commands With logsave The general idea is to use the logsave to register commands and their outputs. Initially we record local commands and then we use this technique to make a record (locally) about a remote session.

  • How To Defend slowloris DDoS With mod_qos (Apache2 On Debian [Lenny])

    apache Author: MarcusSpiegelTags: , , , , , , Comments: 6

    How To Defend slowloris DDoS With mod_qos (Apache2 On Debian [Lenny]) mod_qos gives some fine-grained opportunities to scale the number of used connections and to defend an attack according to bandwidth limits. Unfortunately it is only available as source-package and there are many possible settings, wich might be hard to setup for this special case. So I provide the way that helped me.