Linux Tutorials on the topic “linux”

  • Working With The GRUB Menu

    Author: CargoshipTags: , Comments: 10

    Working With The GRUB Menu This tutorial describes how to edit the GRUB menu. It will also show how to add operating systems and how to add splash screens.

  • How to Avoid Being Blacklisted

    Author: alinapTags: , , Comments: 2

    How to Avoid Being Blacklisted A blacklist usually refers to a list of e-mail or IP addresses known to send spam e-mails or some other type of unsolicited messages. Such lists are currently used by mail servers for filtering incoming e-mails and blocking the ones listed, in order to improve mail security and integrity. The blacklist is also the opposite of what is called a whitelist.

  • Create Users And Change Passwords With A Bash Script

    Author: fakrulTags: Comments: 26

    Create Users And Change Passwords With A Bash Script These two scripts are very important for the system admin who regularly works with mail servers and somehow forgets to backup his system username and password! Let’s say somehow we lost the usernames and passwords of the mail server. In this case the admin has to manually create all the users and then change the passwords for all the users. Tedious job. Let’s make our life easier.

  • Installing Multiple OS's Without A Floppy/CD/DVD/Etc.

    Author: apachedudeTags: Comments: 0

    Installing Multiple OS's Without A Floppy/CD/DVD/Etc.  This article explains how I managed to install over 50 various operating systems on my computer (one hard drive) without having to burn the distro ISO to disk to boot from. (No floppy, usb, cd, dvd, etc. needed!) The final result after some fun experimenting, is when I boot, I have a cool grub boot screen come up with the option to boot into whatever OS I want, this is handy for multiple reasons.

  • QoS And Traffic Shaping For VoIP Users Using iproute2 And Asterisk

    Author: artaxerxesTags: Comments: 0

    QoS And Traffic Shaping For VoIP Users Using iproute2 And Asterisk The quality of my VoIP phone calls suffered whenever I was downloading or uploading anything. This was irritating, especially for those calling me (I heard them better than they heard me). So I poked at Iproute2 and other howtos, especially with regard to VoIP traffic, but I couldn't find anything that worked well. After some playing around, I've found settings that were right for me: consistant VoIP quality, regardless of any activities on the wire.

  • How To Utilize Your New Multimedia Keyboard Under Linux

    Author: csarleeTags: , Comments: 5

    How To Utilize Your New Multimedia Keyboard Under Linux Xbindkeys is a program that allows you to launch shell commands with your keyboard or your mouse under X Window. It links commands to keys or mouse buttons, using its configuration file. It does not depend on the window manager and can capture all keyboard keys.

  • Lintrack As A LAN Gateway And An OpenVPN Bridge

    Author: pjfTags: , , Comments: 1

    Lintrack As A LAN Gateway And An OpenVPN Bridge This tutorial will guide you through installation and configuration of Lintrack, a GNU/Linux distribution specialized in networking tasks. We will give two LANs access to the internet along with DHCP and DNS cache servers, and then we will connect our networks using OpenVPN in bridging mode. You should be running all these in well under an hour, thanks to the unified configuration interface of Lintrack.

  • How to configure your SCSI or USB scanner to work with SANE/XSANE from your regular user account

    Author: VirtualEntityTags: , , Comments: 2

    How to configure your SCSI or USB scanner to work with SANE/XSANE from your regular user account This article shows how you can make your scanner (SCSI or USB) work with SANE/XSANE from a normal user account without getting permission errors.

  • Using TAR with Bunzip2 files

    Author: VirtualEntityTags: Comments: 0

    Using TAR with Bunzip2 files Bunzipping and then unTARring in two steps is not convenient. It is not necessary to use Bunzip2 and then TAR to unzip a file in two separate steps. Tar will do the job on its own if the -j switch is used, thus: tar xjvf linux-source<version>.tar.bz2 By the same token, you may use the -z switch with a gzipped file, e.g. tar zxvf linux-source<version>.tar.gz

  • Setting the SUID/SGID bits: Giving a program YOUR permissions when it runs

    Author: VirtualEntityTags: , Comments: 5

    Setting the SUID/SGID bits: Giving a program YOUR permissions when it runs Normally, when a program runs under Linux, it inherits the permissions of the user who is running it, thus if I run a program under my account, the program runs with the same permissions that I would have if that program were me. Thus, if I cannot open a certain file, the program I am running also cannot open the file in question. If I set the SUID or SGID bit for a file, this causes any persons or processes that run the file to have access to system resources as though they are the owner of the file.