Howto's

USB (Universal Serial Bus)

Introduction to USB The USB, or Universal Serial Bus, was designed to make connecting computer peripherals easier (keyboards, mice, webcams, printers, etc.). USB has proved to be a good solution that allows you to connect and add peripherals to your computer. There are two different types of...

Printing with Linux

Introduction Many Linux newbies find it difficult to configure a Linux printer. It's hard to believe all the praises of the power of Linux's printing system when you cannot get anything to print. In this section, we will figure out just how to get you printing under Linux. The lpd printing system...

Quick Installation Howto

Introduction It has become very common for the Linux newbie to hear about the thousands of free software programs, just ready for the taking. Many begin downloading the code and don't really know what to do with it next to make sense of it all. Many programs come in packages, if this is the case,...

SysVinit explained: starting and stopping of services

Welcome to the wonderful world of SystemV and one of the aspects we'll cover is the configuration of startup and shutdown processes. And yes, you do have drag-and-drop options if you don't want to use the console methods. First an explanation of the whole process The initialization process (init)...

MySQL: An Open Source RDBMS

Now that we've finally made MySQL our main database, a review would not be out place. MySQL is a very popular Open Source Relational Database Management System (RDBMS). MySQL is used by many big companies or well known sites such as Tucows Inc, http://www.linux.com, mainly because of it's...

Introduction to PostgreSQL

The Information Age has landed inhabitants of this planet with an overabundance of documented facts and fiction. So much so that just placing these items in a file cabinet or on your hard drive is not sufficient enough to get quick and easy access to these data. Our focus has shifted from...

Restoring files with debugfs

Under the Linux filesystem, files are associated to inodes. By attempting to restore these inodes we can subsequently restore the associated files. This howto does not serve as a complete (and technical) reference, but merely as a non-technical description of a scenario and the restoration process...

The Network File System, NFS

Sharing files under Linux can be done in many ways. A few of the main ones are through the File Transfer Protocol or FTP, through Telnet and SSH. These are all fine, but what if you want a more transparent file sharing process, such as the Peer-to-Peer sharing under Windows(tm)? The Network File...

A SAMBA overview

Looking for something understandable that will allow two or more operating systems, in this case Windows and Linux, to "talk" to one another? What you need is Samba. In order to use Samba you will need to have computers networked together. Without one, Samba will not be a very useful tool. Here we...

How to Linux

This document contains an index to the Linux HOWTOs as well as other information about the HOWTO project.

Shadow Passwords

Some Linux distributions may not come with shadow passwords enabled. Perhaps you are asking, what exactly is a 'shadow password'? Let's first look at how a system without shadow passwords enabled works, then take a look at how an enabled system deals with passwords. Some Linux distributions may not...

IPTABLES - A Quick Reference

What is iptables? IPTABLES now allows Linux to perform kernel/software level statefull inspection of IP packets. This allows things like NATing and "connection tracking"--and features a few advantages over IP-chains. Some Differences Between IP-Tables and IP-Chains In ipchains you used -j DENY...

Iptables Tutorial

Copyright © 2001-2002 by Oskar Andreasson Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1; with the Invariant Sections being "Introduction" and all sub-sections, with the Front-Cover Texts being "Original...

Syslog - Watching your Logs

System logs (should) have a very important part in implementing a security strategy for your network. No one, is safe from attacks and everyone should know that no matter how strong you think your network's security is, you will be attacked on some level. Some might never notice it, but knowing...

Secure Shell

Using SSH There are many ways to access a remote computer. Telnet and FTP are two of the most useful tools for Linux. With FTP you can transfer files back and forth and with telnet you can then modify them via the shell. Telnet and FTP are so basic to Linux that they are installed by default, such...