Showing headlines posted by linuxer

« Previous ( 1 ... 22 23 24 25 26 27 )

USB stick encryption using Linux

In case you will loose your USB stick, all data stored on it will be lost and what is more important they will be most likely in hands of some unknown person which will then have an access to your private information and use this information in any way s/he sees fit. This is one of many fears of USB stick users. One solution which can be easily applied is to not to store any private information on USB stick, however this will diminish a prime usage of your USB stick to a bare minimum as all non-private data usually do not have to be stored on USB since they can be almost always downloaded anytime and anywhere from the Internet.

Install debian server in a linux chroot environment

Running Linux system inside a chroot environment allows a system admin to decrease an impact on a production server when the server gets compromised. Change root will change root directory to all current running processes and its children to a chroot jail. Testing of various package installations and server configuration in a chrooted environment can be another handy way how to utilize a chroot jail. This tutorial will provide a reader with step by step guide on how to install Debian with ssh daemon inside chroot environment using debootstrap.

Linux WD EARS Advanced Hard Drive Format

Nowadays hard drive manufactures are switching to a new hard drive technology which uses 4KB sectors size instead of conventional 512B. This new technology requires little tweaks to get a better performance in comparison to out-of-the-box settings. This article will describe some simple to follow instruction on how to partition the WD EARS hard-drive to get better overall performance. Getting the partitioning part done by aligning each partition can rapidly increase a hard drive's performance.

Bash scripts to scan and monitor network

This article provides few simple scripts to scan and monitor network using combination of bash and ping command. Obviously, these scripts are no match to a full monitoring dedicated software like nagios but they could be useful for a small home brand networks, where implementing sophisticated monitoring system can become an overhead.

How to crack a wireless WEP key using AIR Crack

This article shortly describes simple steps on how to crack a wireless WEP key using AIR Crack software. This can be done by sniffing a wireless network, capturing encrypted packets and running appropriate encryption cracking program in attempt to decrypt captured data. WEP ( Wired Equivalent Privacy ) is quite easy to crack as it uses only one key to encrypt all traffic.

Install Ubuntu Lucid Lynx Linux from USB stick

If from any reason you are not able to install Ubuntu Lucid Lynx Linux from conventional CD/DVD-ROM or you just do not want to walk around with cd's, there is always option to use USB memory stick to do this job. This short tutorial will describe this simple task from preparing your USB stick, load a Ubuntu Lucid Lynx Linux image and finishing with boot process. Although this guide describes this procedure specifically for Ubuntu Lucid Lynx Linux i386, it can be used with simple modifications to create Ubuntu USB install stick for any Ubuntu versions available including different architectures.

Getting know a hardware on your Linux box

When you buy a new PC, laptop or server and install a Linux you want to know what hardware is actually in the Linux box and more importantly which piece of hardware is supported by the kernel out of the box and which needs special tweaking with modules to get it work. Here is a list of commands which should help you to troubleshoot your hardware and find some information about it. This is not a ultimate troubleshooting guide but certainly will serve as a good starting point.

PROUHD: RAID for the end-user

RAID has still not been adopted by most end-users despite its inherent quality such as performance and reliability. Reasons such as complexity of RAID technology (levels, hard/soft), set-up, or support may be given. We believe the main reason is that most end-users own a vast amount of heterogeneous storage devices (USB stick, IDE/SATA/SCSI internal/external hard drives, SD/XD Card, SSD, etc.), and that RAID-based systems are mostly designed for homogeneous (in size and technology) hard disks. Therefore, there is currently no storage solution that manages heterogeneous storage devices efficiently. In this article, we propose such a solution and we call it PROUHD (Pool of RAID Over User Heterogeneous Devices). This solution supports heterogeneous (in size and technology) storage devices, maximizes the available storage space consumption, is tolerant to device failure up to a customizable degree, still makes automatic addition, removal and replacement of storage devices possible and remains performant in the face of average end-user workflow.

Install Debian Linux from USB boot memory stick

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on Apr 9, 2010 7:06 AM EDT)
  • Story Type: Tutorial; Groups: Linux
There are more and more Laptops nowadays which do not have a CD/DVD-ROM facility build in but are able to boot from USB memory stick. This small guide provides all needs on how to create a bootable USB memory stick to install a Debian without a need for CD/DVD drive.

Introduction to Computer Vision with OpenCV on Linux

The purpose of this document is to help a reader to get started with Computer Vision library OpenCV on Linux system. OpencCV is a multi-platform library, but this article will be focused only on OpenCV using Linux operating system. ( although, just the installation of the OpenCV library and video camera is platform-specific, all examples in this article should compile on any platform where OpenCV is properly installed such as Mac OS, MS Windows and etc.) Reader will be guided through a step-by-step guide on how to install and use some of the basic functions of OpenCV library such as displaying images, playing a video or using a video camera to process a video input stream.

How to create, bundle, upload and access a custom Debian AMI using ubuntu

This guide will provide all necessary steps on how to create, bundle, upload, run and connect Debian ETCH AMI on Amazon Elastic Compute Cloud (Amazon EC2). For this guide we have used a Ubuntu 9.04. However, any other Linux distribution can also be used as long as it contains java and ruby packages.

C++ : Understanding pointers

  • linuxconfig.org; By Lubos Rendek (Posted by linuxer on Sep 17, 2009 2:17 AM EDT)
  • Story Type: Tutorial; Groups: Eclipse
This article is intended to all programing enthusiasts on all levels who do wish to understand pointers in C++ language. All code presented here is not a compiler specific and all examples will be written in plain ANSI C++. Debate about pointers can stretch for miles, and you would need to go really far to master it all. If you really want to run that far, this article gives you a clear understanding of fundamental concepts about pointers and prepares you for that journey.

APACHE web server and SSL authentication

  • linuxconfig.org; By Jaroslav Imrich (Posted by linuxer on Sep 5, 2009 1:24 PM EDT)
  • Story Type: Tutorial; Groups:
This article describes configuration techniques of module mod_ssl, which extends a functionality of Apache HTTPD to support SSL protocol. The article will deal with authentication of server (One-way SSL authentication), as well as it will also include authentication of clients by using certificates (Two-way SSL authentication).

IPwatchD an IP conflict detection tool for Linux

When using a GNU/Linux operating system, from time to time you may come across a situation where network connectivity was interrupted due to the IP conflict. An IP conflict event occurs when two or more hosts on the same network are configured with identical IP addresses. At the present, there appears to be no code in the Linux kernel to take care of this situation by means of appropriate Gratuitous ARP response . Very often a network administrator is left in the complete ignorance by the Linux kernel and needs to troubleshoot IP conflict the hard way. Fortunately, there is a simple daemon called IPwatchD which main purpose is to catch and evaluate packets on the network and this way is able to prevent an IP conflict occurrence. This is done by help of libpcap library. IPwatchD daemon is written in C language and can run in passive or active modes.

VIM video tutorial

  • linuxconfig.org (Posted by linuxer on Aug 6, 2009 1:12 AM EDT)
  • Story Type: Tutorial; Groups: Linux
This tutorial has been written for both vi and vim. It starts with really basics, such as cursor navigation and ends with more advanced techniques like merging files. For every section of this tutorial there is a short video with hints to help you understand how vim / vi works. Even that I have divided this tutorial into parts from novice to the expert user, there is plenty more what vim can do to make your work with vim editor easier and more efficient. However completing this tutorial you will give sufficient knowledge about vim / vi and its features for your daily tasks.

Virtual Private Network and OpenVPN

  • linuxconfig.org (Posted by linuxer on Aug 4, 2009 3:20 AM EDT)
  • Story Type: Tutorial
This article will describe a configuration of Virtual Private Network connection by using an OpenVPN application. Firstly, you will be exposed to some basic theory behind Virtual Private Networks. Then, the article will guide you with step-by-step instructions on how to setup a OpenVPN virtual private network by using Symmetric Key Encryption and Public Key Encryption. This article is meant for everybody who possesses a basic knowledge of linux administration and networking.

Choosing the right Linux File System Layout using a Top-Bottom Process

  • linuxconfig.org ( ISSN 1836-5930 ); By Pierre Vignéras (Posted by linuxer on Aug 1, 2009 11:02 PM EDT)
  • Story Type: Tutorial; Groups: Linux
As you may probably know, Linux supports various filesystems such as ext2, ext3, ext4, xfs, reiserfs, jfs among others. Few users really consider this part of a system, selecting default options of their distribution's installer. In this article, I will give some reasons for a better consideration of the file-system and of its layout. I will suggest a top-bottom process for the design of a ``smart'' layout that remains as stable as possible over time for a given computer usage.

« Previous ( 1 ... 22 23 24 25 26 27 )