Showing headlines posted by nixcraft
« Previous ( 1 2 3 4 5 ... 6 ) Next »Decompile .chm file to view as html file under Linux
You can view .chm file using gnochm or kchmviewer under Linux. However sometime you cannot install these programs. There is a third alternative - arCHMage. It is an extensible reader and decompiler for files in the CHM format. This is the format used by Microsoft HTML Help, and is also known as Compiled HTML. arCHMage is based on python-chm binding to chmlib from GnoCHM project.
Samba share permissions simplified
Samba software, is a free, open source implementation of networking protocols to share files between UNIX/Linux and Windows computers. There are many ways to set permissions to your Samba shares and improve security. This article will cover some of the basic permissions and permission precedence with examples.
How do I find out Linux CPU utilization?
Whenever a Linux system CPU is occupied by a process, it is unavailable for processing other requests. Pending requests must wait till CPU is free. This becomes a bottleneck in the system. Following command will help you to identify CPU utilization, so that you can troubleshoot CPU related performance problems.
Linux hard drive benchmark & bottleneck testing
The stress test of hardware (hard drive benchmarks) is a simplistic test. There are a number of benchmarking applications software that can be used as hard disk (storage) stress testing. My favorite is Bonnie++ software. Bonnie++ is a benchmark suite that is aimed at performing a number of simple tests of hard drive and file system performance. Then you can decide which test is important and decide how to compare different systems after running it.
Simple and effective squid content filtering to block MP3 and EXE files
For security and to save bandwidth you may wish to configure Squid proxy server to block content. You do not want users to download files having extension such as MP3, MPEG, MPG, AVG, EXE etc This tutorial explains simple but effect squid content filtering using access control list to block files easily.
How to protect buggy programs from security vulnerabilities/buffer overflows under Linux and UNIX
A Buffer overflows is a serious security problem. It allows an attacker to inject executable code of their choice into an already-running application. This ability to run arbitrary code at certain memory addresses is dangerous as attacker being able to execute the instructions from anywhere in memory.
This howto explains use of DieHard software to protect popular application such as Mozilla firefox. It protects applications from as-yet unfixed bugs and security vulnerabilities that exploit them. Think of DieHard as a new line of defense against hackers, together with anti-virus protection and firewalls.
This howto explains use of DieHard software to protect popular application such as Mozilla firefox. It protects applications from as-yet unfixed bugs and security vulnerabilities that exploit them. Think of DieHard as a new line of defense against hackers, together with anti-virus protection and firewalls.
Apache and Lighttpd mod_rewrite for temporary site outage
Here's a nice howto on using mod_rewrite under Apache and Lighttpd for temporary site outages. This tip will help you to disable a site for maintenance using mod_rewrite without redirecting url. Both Lighttpd and Apache webserver allows you to send this message to client using server side rewriting using mod_rewrite and php. This is useful if you are running popular database driven community or e-commerce website. Error 503 informs search engine that site is temporary out of service. A good idea if your websites is heavily depends upon search engine for selling products and services.
Linux check passwords against a dictionary attack
A dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. You can be configured to verify that passwords cannot be guessed easily using Linux PAM module called pam_cracklib.so. This article describes this configuration.
Linux automatically monitor and restart services when daemon is killed
When you cannot monitor your server for service availability, it is better to take help of automated monitor and restart utility...
How to keep a detailed audit trail of what's being done on your Linux systems
Intrusions can take place from both authorized and unauthorized users. My personal experience shows that unhappy user can damage the system, especially if they have a shell access. Some users are little smart and removes history file (such as ~/.bash_history) but you can monitor all user executed commands.
Why Linux don’t support mp3 and selected wifi cards out of the box?
This question is asked again and again. Short answer — copyright/IP laws prevent shipping all the software and technologies/plug-ins with each Linux distro. Some distributions come with all these goodies but they are not free. So how do I get mp3s and other stuff working? The following shows you the work around in most distributions!
Howto Browse a Samba or windows share securely over Internet
You can browse Samba or windows share from Nautilus GUI file manager or command prompt using smbclient.
But SSLBridge allows you to browse Samba/windows share over Internet using secure VPN connection.
Users can access and manipulate files over the internet using a browser, as if they were at their own Desktop system. With this software you can access your corporate resources using your existing Active Directory Account username and password.
But SSLBridge allows you to browse Samba/windows share over Internet using secure VPN connection.
Users can access and manipulate files over the internet using a browser, as if they were at their own Desktop system. With this software you can access your corporate resources using your existing Active Directory Account username and password.
Linux/UNIX Easy date manipulation with yest
Sometime it is necessary to run a command or script on the last day of a month. There is old good hack that will decide whether tomorrow is the first day of the next month. All these years I was using *dirty shell script hacks* to create my own date manipulation utilities for backups and other admin task. Thanks to this project no more dirty work. yest is highly recommended tool for all seasoned UNIX admin.
Linux - Frequently Asked Questions collection
There is so much to read, so little time! If that is the problem, you can read these solutions. It will help you cut through the clutter of information overload. Linux / UNIX Frequently Asked Questions collection offers solution to many common or uncommon problems. Usually it covers sys admin related issues. The questions are asked by Linux newbie or picked up from UNIX chat rooms.
How to add ethtool duplex settings to a network card permanently
This tutorial shows you how to upgrade/downgrade your Linux Ethernet port speed using command line options. It also explain how to set the interface speed, duplex or auto negotiation on boot up for Fedora Core/ Cent OS/ Red Hat enterprise Linux and Debian/Ubentu Linux using a shell script.
Quick way to switch from KDE to GNOME or viceversa
Faster swithing is just a click away. switchdesk is the command to switch from KDE to GNOME or viceversa. This command provides a simple method of choosing between the various desktop environments available under Fedora Core, Cent OS and Red Hat Enterprise Linux. If X Windows is running, switchdesk will bring up a dialog box which allows the user to choose between the available desktops installed on the system.
Linux/UNIX: Double your download speed with download accelerator
It is true that wget is ultimate command line downloader. But when it comes to download acceleration wget fails to deliver the download speed. Linux and UNIX oses can use Axel and prozilla programs. These programs opens more than one HTTP/FTP connection per download and each connection transfer its own, separate, part of the file. It may sound weird, but it works very well in practice. For example, some FTP sites limit the speed of each connection; therefore opening more than one connection at a time multiplies the allowable bandwidth.
Book review: SpamAssassin - A Practical Guide to Integration and Configuration
Spam is unsolicited emails with advertisements, which costs money. According to one survey spam costs up to $1000 per employee per year. Spam is send without the permission of the recipients. According to wikipedia, in June 2006 55 billion spam emails send per day. The book SpamAssassin is a practical guide to configure and install one of the most popular open source spam filter software.
Book review: Setup and Run a Small Office Email Server Using Postfix, Courier, Procmail, Squirrelmail, Clamav and Spamassassin
Email is one the killer application of Internet. It is the easy method of composing, sending, storing, and receiving messages over electronic communication systems. However many new sysadmin finds it difficult to setup and maintain an email server system. This book is aimed at all new sysadmin who wish to learn the basis of mail server, setup & configuration issues, and advanced topics such as spam/virus protection. This book gives you just what you need to know to set up and maintain an email server.
Smart way to reinstall Linux software after crash
Hardware and Software failures are part of Life. That is why you need to have a backup. However, you need not to backup all installed binaries (mostly software). In order to reinstall or restore your installed software you need to have a list of all installed software. This tutorial show how to backup list of installed software and apply it when needed after crash. It will not just save your time but both Debian and RHEL distro can update them instantly for you.