Linux Tutorials on the topic “linux”
-
Create Users And Change Passwords With A Bash Script
Author: fakrul • Tags: linux • Comments: 26Create Users And Change Passwords With A Bash Script These two scripts are very important for the system admin who regularly works with mail servers and somehow forgets to backup his system username and password! Let’s say somehow we lost the usernames and passwords of the mail server. In this case the admin has to manually create all the users and then change the passwords for all the users. Tedious job. Let’s make our life easier.
-
Installing Multiple OS's Without A Floppy/CD/DVD/Etc.
Author: apachedude • Tags: linux • Comments: 0Installing Multiple OS's Without A Floppy/CD/DVD/Etc. This article explains how I managed to install over 50 various operating systems on my computer (one hard drive) without having to burn the distro ISO to disk to boot from. (No floppy, usb, cd, dvd, etc. needed!) The final result after some fun experimenting, is when I boot, I have a cool grub boot screen come up with the option to boot into whatever OS I want, this is handy for multiple reasons.
-
QoS And Traffic Shaping For VoIP Users Using iproute2 And Asterisk
Author: artaxerxes • Tags: linux • Comments: 0QoS And Traffic Shaping For VoIP Users Using iproute2 And Asterisk The quality of my VoIP phone calls suffered whenever I was downloading or uploading anything. This was irritating, especially for those calling me (I heard them better than they heard me). So I poked at Iproute2 and other howtos, especially with regard to VoIP traffic, but I couldn't find anything that worked well. After some playing around, I've found settings that were right for me: consistant VoIP quality, regardless of any activities on the wire.
-
-
How To Utilize Your New Multimedia Keyboard Under Linux
Author: csarlee • Tags: desktop, linux • Comments: 5How To Utilize Your New Multimedia Keyboard Under Linux Xbindkeys is a program that allows you to launch shell commands with your keyboard or your mouse under X Window. It links commands to keys or mouse buttons, using its configuration file. It does not depend on the window manager and can capture all keyboard keys.
-
Lintrack As A LAN Gateway And An OpenVPN Bridge
Author: pjf • Tags: control panels, dns, linux • Comments: 1Lintrack As A LAN Gateway And An OpenVPN Bridge This tutorial will guide you through installation and configuration of Lintrack, a GNU/Linux distribution specialized in networking tasks. We will give two LANs access to the internet along with DHCP and DNS cache servers, and then we will connect our networks using OpenVPN in bridging mode. You should be running all these in well under an hour, thanks to the unified configuration interface of Lintrack.
-
How to configure your SCSI or USB scanner to work with SANE/XSANE from your regular user account
Author: VirtualEntity • Tags: desktop, linux, other • Comments: 2How to configure your SCSI or USB scanner to work with SANE/XSANE from your regular user account This article shows how you can make your scanner (SCSI or USB) work with SANE/XSANE from a normal user account without getting permission errors.
-
Using TAR with Bunzip2 files
Author: VirtualEntity • Tags: linux • Comments: 0Using TAR with Bunzip2 files Bunzipping and then unTARring in two steps is not convenient. It is not necessary to use Bunzip2 and then TAR to unzip a file in two separate steps. Tar will do the job on its own if the -j switch is used, thus: tar xjvf linux-source<version>.tar.bz2 By the same token, you may use the -z switch with a gzipped file, e.g. tar zxvf linux-source<version>.tar.gz
-
Setting the SUID/SGID bits: Giving a program YOUR permissions when it runs
Author: VirtualEntity • Tags: linux, linux • Comments: 5Setting the SUID/SGID bits: Giving a program YOUR permissions when it runs Normally, when a program runs under Linux, it inherits the permissions of the user who is running it, thus if I run a program under my account, the program runs with the same permissions that I would have if that program were me. Thus, if I cannot open a certain file, the program I am running also cannot open the file in question. If I set the SUID or SGID bit for a file, this causes any persons or processes that run the file to have access to system resources as though they are the owner of the file.
-
Step-by-step OpenLDAP Installation and Configuration
Author: ganesh35 • Tags: linux • Comments: 29Step-by-step OpenLDAP Installation and Configuration This tutorial describes how to install and configure an OpenLDAP server and also an OpenLDAP client.
-
Setting up a serial console
Author: Daniel15 • Tags: linux • Comments: 7Setting up a serial console This tutorial will show you how to set up a serial console on a Linux system, and connect to it via a null modem cable. This is quite useful if your Linux server is in a headless configuration (no keyboard or monitor), as it allows you to easily get a console on the system if there are any problems with it (especially network problems, when SSH is not available). In the end, the GRUB menu will appear over the serial link, as will the bootup messages (output when booting the system). I'm using Debian Etch on the server and Ubuntu Edgy on my client, although this should work on any Linux distribution.