Linux Tutorials on the topic “linux”

  • Using Firewall Builder To Configure Cisco ASA & PIX

    Author: mikehornTags: , , Comments: 1

    Using Firewall Builder To Configure Cisco ASA & PIX Firewall Builder is a firewall configuration and management GUI that supports configuring a wide range of firewalls from a single application. Supported firewalls include Linux iptables, BSD pf, Cisco ASA/PIX, Cisco router access lists and many more. This tutorial is the second in a series of articles that walk through the basic steps of using Firewall Builder to configure each of the supported firewall platforms. In this tutorial we will configure Access Control Lists (ACL) on a Cisco ASA firewall.

  • Adding A DHCP Server To CIITIX-WiFi

    Author: rafique.yasirTags: Comments: 2

    Adding A DHCP Server To CIITIX-WiFi CIITIX-WiFi is a turnkey solution to your WiFi hotspot needs. Built onto the rock solid stable debian linux, setting up a secure (TTLS) WiFi hotspot is just a minute away. This Howto will show you the step by step configuration of setting up a DHCP Server within CIITIX-WiFi. It is useful in the sense that it will act as a standalone solution for both CIITIX-WiFi and DHCP Server on a single machine i.e no separate machine needed for DHCP.

  • Adding Custom Certificates To CIITIX-WiFi

    Author: awanTags: Comments: 0

    Adding Custom Certificates To CIITIX-WiFi CIITIX-WiFi is a turnkey solution to your WiFi hotspot needs. Built onto the rock solid stable debian linux, setting up a secure (TTLS) WiFi hotspot is just a minute away. This guide shows how to set up an AAA server (authentication, authorization and accounting) with CIITIX-WiFi. CIITIX-WiFi comes with certificates valid till 2020 but  in case someone want to use their own certificates this tutorial can come in handy.

  • System Monitoring With sar And ksar

    tux Author: gbiTags: , Comments: 3

    System Monitoring With sar And ksar sar is one of the old and famous commandline utilities, which is often overlooked. It provides a wealth of information when you have kind of performance bottlenecks. By itself it only provides lengthy columns of numerical data, kind of hard to interpret. sar exists on most Linux distributions, for example Ubuntu, Debian, CentOS, Gentoo, and is also available on Solaris, AIX, and other commercial Unices. ksar, on the other hand, is a Java based front end for sar's numerical data. It produces friendly graphs which could be exported to .pdf and some other formats.

  • Host Based Intrusion Detection - Samhain

    Author: thirddeepTags: , , , Comments: 1

    Host Based Intrusion Detection - Samhain This article describes in some detail how to install Samhain, the host based intrusion detection system. I am not going to ramble on about what host based intrusion detection is or why to use it, as there are plenty of articles already covering those subjects. This article is just to show you how to get Samhain up and running in a client / server configuration with a couple bells and whistles thrown in for fun.

  • Changing From SquirrelMail To Atmail Open With ISPConfig 3

    ispconfig Author: sellotapeTags: , , Comments: 5

    Changing From SquirrelMail To Atmail Open With ISPConfig 3 Atmail Open is an open source webmail client which is available free of charge and is a great alternative to Squirrelmail. This tutorial shows how to use it with ISPConfig 3 (instead of SquirrelMail).

  • How To Monitor Your Linux Server With SMS Alerts And Performance Graphs

    tux Author: zdenekTags: , , Comments: 10

    How To Monitor Your Linux Server With SMS Alerts And Performance Graphs This tutorial shows how you can monitor your Linux server with a tool from Bijk - with email and SMS alerts. Bijk is an open source application, for creating live graphs and alerts, thus monitoring your server performance. With the Basic version of Bijk, you can easily set up email alerts for monitoring almost everything on your server (system overload, disk space usage, Apache troubles, MySQL, etc.).

  • CIITIX-VoIP 1.0 How-To

    Author: awanTags: , Comments: 5

    CIITIX-VoIP 1.0 How-To This document can be a used as a rough guide to installation of CIITIX-VOIP on a persistent media. It also describes the basic usage. CIITIX-VoIP is a carrier grade VoIP server distribution, leveraging upon the great efforts of the open source community. CIITIX-VoIP is based on rock solid Debian Lenny. This distribution comes as a turn-key solution to any company (small, medium to large scale) wishing to deploy a SIP-based presence service à la Skype. Laced with accounting, NAT and DB backend based features, setting up a SIP based setup is a breeze, achievable within 7 minutes.

  • How To Set Up A Wireless Network Using WPA/WPA2 With Radius Authentication With CIITIX-WiFi

    Author: lashfayTags: , Comments: 2

    How To Set Up A Wireless Network Using WPA/WPA2 With Radius Authentication With CIITIX-WiFi This document serves as quick guide on how to set up a wireless network using WPA / WPA2 with radius authentication. This document will only cover the basics and is not exhaustive of all possibilities and features but with this information and basic networking skills you should be able to get running very soon. I decided to do this guide for the users wanting to try out and implement radius authentication for WiFi security.

  • How To Configure The AIDE (Advanced Intrusion Detection Environment) File Integrity Scanner For Your Website

    Author: abefromanTags: , , Comments: 9

    How To Configure The AIDE (Advanced Intrusion Detection Environment) File Integrity Scanner For Your Website A file integrity scanner is something you need to have.  Imagine a hacker placing a backdoor on your web site, or changing your order form to email him a copy of everyone's credit card while leaving it appear to be functionally normally. By setting up daily reporting, this notifies you within, at most, 24 hours of when any file was changed, added, or removed.  It also helps establish an audit trail in the event your site is compromised. These instructions are designed for an end user, where you don't need to have root access, to implement and assumes your server has the aide binary installed.  Most hosts will have this installed already, or will install it for you upon request.