public marks

PUBLIC MARKS with tags linux & tutorial

January 2008

Integrating amavisd-new Into Postfix For Spam- And Virus-Scanning

by lecyborg & 1 other
This article shows how to integrate amavisd-new into a Postfix mail server for spam- and virus-scanning. amavisd-new is a high-performance interface between MTAs such as Postfix and content checkers: virus scanners, and/or SpamAssassin. We will use ClamAV for virus scanning and SpamAssassin for spam scanning in this tutorial. I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you!

Three Ways To Access Linux Partitions (ext2/ext3) From Windows On Dual-Boot Systems | HowtoForge - Linux Howtos and Tutorials

by camel
If you have a dual-boot Windows/Linux system, you probably know this problem: you can access files from your Windows installation while you are in Linux, but not the other way round. This tutorial shows three ways how you can access your Linux partitions (with ext2 or ext3 filesystem) from within Windows: Explore2fs, DiskInternals Linux Reader, and the Ext2 Installable File System For Windows. While the first two provide read-only access, the Ext2 Installable File System For Windows can be used for read and write operations.

Postfix Virtual Domain Hosting Howto

by lecyborg
This document requires Postfix version 2.0 or later. This document gives an overview of how Postfix can be used for hosting multiple Internet domains, both for final delivery on the machine itself and for the purpose of forwarding to destinations elsewhere. The text not only describes delivery mechanisms that are built into Postfix, but also gives pointers for using non-Postfix mail delivery software.

December 2007

Sauvegarder ses données avec rsync

by lecyborg
C’est simple copie est assez simple à mettre en place, et peut s’avérer très pratique en cas de crash du disque dur. La sauvegarde peut paraitre un peut basique, mais qui à besoin (et qui à assez d’espace disque) pour avoir une sauvegarde jours par jours avec les modifications ?

Convertir système debian en Raid1

by lecyborg
Our intention is not to build a fail-safe system nor a HA-Linux. We are just using RAID-1 mirrored disks to make sure that the system can be restored easily if 1 disk crashes. The following has been tested only twice (hey, we've got other things to do). It did work for us, it might work for you. It might also make your rats go berserk or just blow your mind.

Xen Cluster Management With Ganeti On Debian Etch | HowtoForge - Linux Howtos and Tutorials

by camel & 1 other
Ganeti is a cluster virtualization management system based on Xen. In this tutorial I will explain how to create one virtual Xen machine (called an instance) on a cluster of two physical nodes, and how to manage and failover this instance between the two physical nodes.

Automatic_Bridge_Ubuntu - VirtualBox

by lecyborg
This is a quick tutorial on how to setup your Linux environment and VirtualBox, so that it can automatically create network interfaces and put them in bridge when the VM is launched.

Installation d'un lecteur Samsung YP-U3 sur un système GNU-Linux

by lecyborg
Installation d'un lecteur Samsung YP-U3 sur un système GNU-Linux (Ubuntu Gutsy 7.10)

Artisan Numérique » Les liens dans les systèmes *nix

by gregR
Le concept de lien est présent sur beaucoup d'OS mais sous *nix (et donc linux) c'est une religion. Les liens sont partout et il suffit de taper un ls -la /etc pour s'en convaincre. Ce petit tutorial a donc pour objectif d'expliquer un peu les différents liens et leur utilisation possible.

November 2007

Linuxzoo

by ycc2106
Learn Linux from the safety of your chair using a remote private linux machine with root access.

SSH Port Forwarding

by lecyborg
SSH also has a wonderful feature called SSH Port Forwarding, sometimes called SSH Tunneling, which allows you to establish a secure SSH session and then tunnel arbitrary TCP connections through it. Tunnels can be created at any time, with almost no effort and no programming, which makes them very appealing. In this article we look at SSH Port Forwarding in detail, as it is a very useful but often misunderstood technology. SSH Port Forwarding can be used for secure communications in a myriad of different ways. Let's start with an example.

SSH-Agent Tutorial

by redyrod & 1 other
Security is best when it is handy. ssh-agent is pretty darn handy. Ssh-agent can authenticate you to a remote machine via keypairs, rather than the traditional hand-typed username/password combination, with no loss of security.

SSH-Agent Tutorial

by lecyborg & 1 other
Security is best when it is handy. ssh-agent is pretty darn handy. Ssh-agent can authenticate you to a remote machine via keypairs, rather than the traditional hand-typed username/password combination, with no loss of security.

RAID1 on Debian Sarge

by lecyborg
A RAID device is a Redundant Array of Independent Disks. The concept was developed in 1987 at UC Berkeley and involves the creation of a virtual disk from multiple small disks in order to deliver improved performance and reliability. There are many flavors of RAID and lots of variations in how to implement it. We detail here a specific instance we use: software RAID1 using IDE disks on a Dell PowerEdge box running Debian "sarge" loaded with grub, managed by mdadm, using the ext3 journaling file system.

How to convert your debian partition to a software raid 1 on the fly

by lecyborg
The system is equipped with 2 similar hard disks (they do not have to be the same but it helps if they are at least similar). The first disk is attached to the primary IDE as master, it will be referenced as /dev/hda. The second disk is attached to the secondary IDE also as master, it will be referenced as /dev/hdc.

Howto crack (or hack) a wireless network with Wired Equivalent Privacy (WEP)

by lecyborg
WEP was intended to provide comparable confidentiality to a traditional wired network (in particular it does not protect users of the network from each other), hence the name. Several serious weaknesses were identified by cryptanalysts — any WEP key can be cracked with readily available software in two minutes or less — and WEP was superseded by Wi-Fi Protected Access (WPA) in 2003, and then by the full IEEE 802.11i standard (also known as WPA2) in 2004. Despite the weaknesses, WEP provides a level of security that can deter casual snooping

HOWTO improving your internet connection using wondershaper - Ubuntu Forums

by lecyborg
wondershaper is an easy to use traffic shaping script that provides these improvements: * Low latency for interactive traffic (and pings) at all times * Allow websurfing at reasonable speeds while uploading / downloading * Make sure uploads don't hurt downloads * Make sure downloads don't hurt uploads

How to Install Openvpn

by lecyborg
The purpose of this document is to describe how to install OpenVPN server on an Ubuntu Linux system and have it utilize an Ethernet bridge to access your local network. Ethernet bridges essentially allow the operating system to treat multiple network interfaces as one combined port. When used with OpenVPN a bridge will allow you to easily connect external users to your internal network and have them receive all traffic as though they were locally connected. The alternative is to use OpenVPN with a route but that will not allow some forms of traffic through (such as multicast), multicast traffic is important to me as many games require multicast data.

Le RAID sous GNU/Linux

by lecyborg
Ce document explique comment mettre en place plusieurs types différents de RAID logiciel sur une plateforme Linux.

October 2007

The perfect start with Smoothwall Express 3.0

by lecyborg
Smoothwall Express is an internet firewall, which allows you to protect your network, as well as providing NAT functionality. It is ease to use and configurable via a web-based GUI. This open source firewall distribution requires absolutely no knowledge of Linux to install or use. This workshop shows the installation and basic configuration of the current release Smoothwall Express 3.0.

Xen from Backports on Debian Sarge

by lecyborg
There is a great howto about installing Xen on Debian Unstable. It is really easy to do and it runs fine. Nevertheless, on production servers, that's not an optimal solution. Debian Unstable has too many updates and things change too often. On production machines, a Xen host system should be stable, secure and should not need much attention. That is where Sarge comes in. If you pull the Xen packages from backports and install them on Debian stable you've got the best of both worlds. Let's do so!

Firewall et sécurisation d'un réseau personnel sous Linux

by lecyborg & 1 other
Ce document a pour but d'expliquer les rudiments de la sécurité d'une machine Linux placée dans un réseau local (typiquement une maison on un appartement), reliée à Internet. Il est tout particulièrement destiné aux utilisateurs néophytes, ou n'ayant pas ou peu de connaissance sur la sécurité informatique en général, et sous Linux en particulier.