Similar Articles |
|
Linux Journal May 2001 Wayne Marshall |
Boot with GRUB Especially useful for multiboot, partitioned systems, GRUB offers flexibility and convenience for startup... |
Linux Journal March 2000 Jeff Regan |
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. |
Linux Journal August 1, 2007 Chou et al. |
Standard Operating Procedures for Embedded Linux Systems You can follow the procedures discussed in this article for building an Linux-based embedded system prototype. Also, we methods for downsizing your system. |
Linux Journal December 1, 2006 Mick Bauer |
Paranoid Penguin - Running Network Services under User-Mode Linux, Part II Our objective is to use User-Mode Linux to create one or more virtual guest machines, each running a different network service. That way, if one application on one guest machine gets compromised somehow, others won't be affected. |
RootPrompt.org June 7, 2000 Lance Spitzner |
Know Your Enemy: A Forensic Analysis A study of an attack on a system. Instead of focusing on the tools and tactics used, he focuses on how he learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn the threats your organization faces... |
RootPrompt.org April 24, 2000 Lance Spitzner |
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. |
Linux Journal July 1, 2007 |
Tech Tips Not all tips have to be complex or obscure to be useful. Convert Video from Color to Black and White... Not So Tech Tips... etc. |
Linux Journal January 12, 2006 Ryan Mauer |
Xen Virtualization and Linux Clustering, Part 1 Interested in seeing what all the fuss is about Xen? Use the steps in this tutorial to get Xen installed and domains configured. |
Linux Journal January 1, 2007 Gnull & Voyd |
Tech Tips with Gnull and Voyd Modify initrd to Make 3ware RAID the First Serial Device... Use Knoppix to recover after installing a bad kernel... Finding Disk Space and inode Hogs... |
Linux Journal September 30, 2006 Mick Bauer |
Running Network Services under User-Mode Linux, Part I Learn to leverage the Linux kernel's virtualization features to isolate network daemons. For example, you could run Apache and BIND as separate guests so that a security hole in one will not leave the other exposed. |
RootPrompt.org March 25, 2002 |
Linux Install / Reinstall Philosophy I've had a lot of practice installing slackware linux recently. As a result, I've worked out a new install philosophy... |
Linux Journal September 30, 2006 Albert Martorell |
SMART (Smart Monitoring and Rebooting Tool) If you want an agent to monitor and control services, you'll need to get SMART. It's wonderful having a colleague who is checking that everything works correctly 24/7 and who informs you about troubles after they already have been solved. |
RootPrompt.org March 13, 2000 Lance Spitzner |
Know Your Enemy: III In the third part of this three part series Lance Spitzner tells us about what happens once a Script Kiddie gains root. Specifically, how they cover their tracks and what they do next.... |
Linux Journal August 1, 2002 Ibrahim Haddad |
Supporting IPv6 on a Linux Server Node This article provides a technical tutorial on setting up IPv6 on a Linux server and connecting it to the IPv6 Internet. |
Linux Journal February 1, 2007 Steven Mathes |
The Interoperability Power of Linux-NTFS Tools Some of the best Windows utilities available might be in your Linux partition. |
Linux Journal July 2000 |
Best of Technical Support Configuring ipchains; PPP Networking; Recovery after Partitioning; Removing Another OS; Film and Video; Permission to Change; Missing Host Key?; Sender Not Receiving; SCSI and Mounting CD-ROMs |
Linux Journal April 28, 2006 Kevin Farnham |
The Ultimate Linux/Windows System Use cross-platform applications and shared data for the ultimate Linux/Windows system. |
Linux Journal April 2000 Michael J. Hammel |
Enlightenment Basics A guide to getting and installing the Enlightenment window manager. |
Linux Journal June 2000 Michael J. Hammel |
Installing Window Maker Mr. Hammel gives us the basics for installing and configuring Window Maker. |
Linux Journal December 1, 2006 George Belotsky |
A Server (Almost) of Your Own A virtual private server gives you root access without the high cost of a dedicated server. Here is how to set up e-mail on a VPS. |
Linux Journal January 1, 2007 Mick Bauer |
Paranoid Penguin - Running Network Services under User-Mode Linux, Part III Fine-tune and firewall your User-Mode Linux guest systems. |
Linux Journal November 29, 2001 Eric Jorn Seneca |
sendmail: Introduction and Configuration A guide for those of you configuring your first e-mail server... |
Linux Journal July 2001 |
Best of Technical Support Tar over rsh... Error in Loading Shared Libraries... What is the meaning of the .2 and .3 at the end of the filename?... Mandrake without X... How Can I Set the FTP Welcome Message?... Wiping a Hard Drive MBR... etc. |
Linux Journal March 2000 Tristan Greaves |
Network Monitoring with Linux Are you having trouble keeping your network under control? Here is an introduction to NOCOL: the freeware network monitoring system which will help you keep instability at bay. |
Linux Journal February 1, 2007 Irfan Habib |
Accessing Linux Filesystems in Windows You don't have to wait for Microsoft to support Linux filesystems to get at your Linux files from Windows. |
RootPrompt.org September 13, 2000 Sander Plomp |
Amateur Fortress Building in Linux Part 2 Of course, deep down there is always some potential for catastrophic security hole - in the TCP stack, the kernel, whatever. That is inevitable. I can live with that. I just don't want it to be a biweekly event... |
Linux Journal April 1, 2002 |
Best of Technical Support RPM Won't Let Me Upgrade... USB Keyboard Stopped Working... SuSE Won't Boot, Red Hat Won't Display... You Can't Log in Now; Get a Life... I Have No DHCP and I Must Network... Opening a File with filep_open... |
PC Magazine August 31, 2005 Kaven & Rupley |
D.I.Y. Linux Here are step-by-step instructions for installing and customizing your own Linux system. |
RootPrompt.org September 11, 2000 |
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... |
Linux Journal October 1, 2002 |
Best of Tech Support Help for upgrading SCSI disks, dual booting with Slackware and Linux home routers. |
Linux Journal May 2000 |
Best of Technical Support Lost Linux root password... Problems with sis6215 chip... ``modem busy''... Problems with 2nd CD-ROM drive... Printing... mgetty with modem... etc. |
Linux Journal December 2000 Michael O'Brien |
A Linux-Based Automatic Backup System A step-by-step procedure for establishing a backup system that will save time and money. |
Linux Journal October 2000 |
Best of Technical Support Dependencies and Libraries... One Working Parallel Port... Booting Problem... Function Keys Not Working... Cannot Access C: Drive... |
Linux Journal July 20, 2001 Cliff Brake |
Flash Filesystems for Embedded Linux Systems Flash isn't only a hard disk with no moving parts. This article shows you how to combine filesystem technologies to make the best use of Flash. |
Linux Journal December 1, 2006 Paul Sery |
Tighter SSH Security with Two-Factor Authentication How to set up two-factor authentication using a USB pendrive and ssh-agent for root logins. |
Linux Journal June 1, 2007 Kamran Soomro |
Read Source Code the HTML Way Cross-reference and convert source code to HTML for easy viewing with LXR -- Linux Cross-Referencing -- tool. |
RootPrompt.org September 7, 2000 Sander Plomp |
Amateur Fortress Building in Linux Part 1 Sander Plomp is tired of articles telling you to edit inetd.conf. So he wrote this article that looks at how to turn your system into amateur fortress in some interesting ways. |
Linux Journal July 1, 2007 Richard Bullington-McGuire |
Mambo Exploit Blocked by SELinux A real-world case where Security-Enhanced Linux proved its worth. SELinux prevented the attacker from executing the second stage of the attack, possibly preventing a root compromise. |
Linux Journal June 2000 |
Best of Technical Support Route 675... Li Lo, Sweet Linux... Can't Get No Resolution... Driving Miss Printer... You've Got Mail |
Linux Journal November 2001 |
Best of Technical Support Mounting Mac OS Partitions on YellowDog 2.0... Firewall Takes Hours to Start... Printing Stopped Working... How to Change Samba Passwords... How to Start a Web Server Automatically... I Have No Phone and I Must Connect... Adding a Hard Drive... etc. |
Linux Journal February 1, 2002 Various |
Best of Technical Support Restoring /dev... Extra RAM Makes System Flaky... PCMCIA Card Doesn't Work with 2.4... Unsupported Filesystem... etc. |
PC Magazine April 16, 2009 Neil J. Rubenking |
FAT Drives Lie If you copy lots of small files to a USB drive, you may unexpectedly get a "Disk full" message even if plenty of space is left. |
Linux Journal December 1, 2001 Various |
Best of Technical Support 128-Bit Precision with GCC... Upgrade Causes Weekly Crash... Insufficient Space for Install... PAM on Slackware?... SCSI Emulation for Just One Drive... etc. |
Linux Journal May 1, 2002 Greg Kroah-Hartman |
How the PCI Hot Plug Driver Filesystem Works How the PCI Hot Plug core implements a RAM-based filesystem and how you can do the same for your drivers... |
Linux Journal September 2001 Don Marti |
Review: SuSE Linux 7.2 Professional If you're going to install your first Linux server or take on the task of deploying Linux on the desktop, you could do a lot worse than SuSE 7.2 Professional. Key features include a journaling filesystem, a crypto filesystem, an easy-to-use desktop environment and network updates... |
New Architect November 2002 Al Williams |
Server Sandboxes Dedicated hosting without the hassle: deploy a single OS kernel on a single machine, but divide the kernel's system resources into multiple "lite" virtual servers, or sandboxes. |
Unix Insider August 2000 Peter Baer Galvin |
Debugging a performance problem This month, Pete solves a performance problem using Solaris tools and reviews the second edition of Building Internet Firewalls. |
Linux Journal April 1, 2007 Dinil Divakaran |
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. |
Linux Journal April 6, 2005 Greg Kroah-Hartman |
Driving Me Nuts - Things You Never Should Do in the Kernel This is the first in an occasional series for new Linux developers that attempts to explain why it is not a good idea to do certain things. Then, we break all of the rules and show you exactly how to do them anyway. |
Linux Journal April 1, 2007 Mick Bauer |
Paranoid Penguin - Linux Firewalls for Everyone Need a personal firewall, an enterprise Internet gateway or something in between? iptables does it all! |