![[not translated]](../../common/images/frame_tuxgrey.gif) Book review: The Linux Enterprise Cluster Book review: The Linux Enterprise Cluster
 A review of the book "The Linux Enterprise Cluster" from No Starch press.
- LF Tip: USB 鼠标和笔记本电脑
 这是一个小技巧,从现在开始,LinuxFocus每月都会至少提供一个这样的技巧。 如果你有有关这些小技巧的新想法,请发邮件到:guido(at)linuxfocus.org。
 
 
- LF tip: 在 KDE 里和 kprinter 一起使用 Adobe Acrobat Reader 7
 这是一个小技巧,从现在开始,LinuxFocus每月都会至少提供一个这样的技巧。 如果你有有关这些小技巧的新想法,请发邮件到:guido(at)linuxfocus.org。
 
 
- LF Tip: 别对我嘟嘟叫啦!
 这是一个小技巧,从现在开始,LinuxFocus每月都会至少提供一个这样的技巧。 如果你有有关这些小技巧的新想法,请发邮件到:guido(at)linuxfocus.org。
 
 
- 在 Linux 下访问无线局域网
 本文中,作者叙述了驱动常见无线网卡的几种方法和其他一些相关话题,如访问使用基于802.1x认证机制的无线局域网的方法等。
 
 
- CheckInstall
 Checkinstall 是一个能从 tar.gz类的源代码自动生成RPM/Debian或Slackware安装包的程序。这样使你能用几乎所有的 tar.gz 类的源代码生成“干净”的安装或者卸载包。
 
 
- SPF 简介
 SPF 是发送方策略框架 (Sender Policy Framework) 的缩写,希望能成为一个防伪标准,来防止伪造邮件地址。这篇文章对 SPF 进行了简单介绍,并介绍了它的一些优点和不足。
 
 
![[not translated]](../../common/images/frame_tuxgrey.gif) darkstat - a network traffic analyser darkstat - a network traffic analyser
 In this article we present the network traffic analyzer "darkstat". We cover installation, start and usage of this program.
- vsftpd - Very Secure FTP Daemon 简介
 这篇文章是"Very Secure FTP Daemon" 的基本介绍。首先,我会粗略地介绍 FTP 和 vsftpd。之后,我们将会学习 vsftp 守护程序(deamon)的安装、设置和启动参数。最后,我们还要进行一个小小的功能测试。
 
 
![[not translated]](../../common/images/frame_tuxgrey.gif) Data loss, worst case Data loss, worst case
 A real-life case of data loss with a happy end, thanks to reiserfsck. Three cheers for journaling file systems and their tools.
- shivalik -- simple configuration backup (defying Murphy's laws)
 There are a whole lot of HOWTOs out there which tell you what to do if you have a serious problem with your Linux installation. Good for us. But there is no one there who told you what you should do before disaster strikes you!
 
 
- Gentoo linux
 Gentoo Linux is a source package based Linux system. It is very different from the established commercial Linux distributions.
 
 
- Colorful shells -- Using ANSI color codes
 This article explains how to use colors or bold text in a Terminal.
 
 
- uucpssh.org: UUCP e-mail for Linux fans
 In the windows world incomming mails are received via POP3 or IMAP and outgoing mails are sent directly via SMTP. This split setup can cause all kind of headaches especially if you are using different ISPs all the time.
 
 
- Rsync: The Best Backup System Ever
 Backup is one of the hardest and most neglected parts of system administration. This article presents a very easy solution based on rsync.
 
 
- storeBackup, the unconventional backup tool
 storeBackup is a very versatile backup tool.
 
 
![[not translated]](../../common/images/frame_tuxgrey.gif) 8cm-Multiboot-CDROM with modified Knoppix linux 8cm-Multiboot-CDROM with modified Knoppix linux
 This is an instruction how to make your own bootable mini CD.
![[not translated]](../../common/images/frame_tuxgrey.gif) IDS - Intrusion Detection System, part II IDS - Intrusion Detection System, part II
 In this article we present methods to detect an intrusion and explain possibilities to respond to such and attack.
- Packet filtering with Linux
 How to setup a basic firewall
 
 
![[not translated]](../../common/images/frame_tuxgrey.gif) Accessing PostgreSQL through JDBC via a Java SSL tunnel Accessing PostgreSQL through JDBC via a Java SSL tunnel
 This article shows how to set up JDBC access for PostgreSQL on redhat 8.0 and how to create a SSL tunnel using Sun's Java Secured Socket Extensions, to enable secured access to a remote postgres database.
![[not translated]](../../common/images/frame_tuxgrey.gif) External attacks External attacks
 This article presents the different types of external attacks that a cracker can use.
![[not translated]](../../common/images/frame_tuxgrey.gif) Automating system administration with ssh and scp Automating system administration with ssh and scp
 This article demonstrates the usage of ssh and scp commands to automate system administration jobs, such as installing and configuring software on Linux systems.
![[not translated]](../../common/images/frame_tuxgrey.gif) Intrusion detection with Debian GNU/Linux Intrusion detection with Debian GNU/Linux
 The article presents techniques and the tools for Debian GNU/Linux to detect and track people wo broke into your computer network.
![[not translated]](../../common/images/frame_tuxgrey.gif) Secure your connections with SSH Secure your connections with SSH
 This article is an in depth description of SSH.
- Installation of a LAMP-Systems
 LAMP is an abbreviation for Linux Apache MySQL PHP. In this article you will learn how to install a Webserver based on LAMP.
 
 
![[not translated]](../../common/images/frame_tuxgrey.gif) Root-kit and integrity Root-kit and integrity
 This article presents the different operations a cracker can do after having succeeded in entering a machine. We will also discuss what an administrator can do to detect that the machine has been jeopardized.
- FreeBSD, another alternative
 This article is an overview over another free Unix system: FreeBSD
 
 
- Viruses : a concern for all of us
 Viruses, Worms and Trojan Horses could also be a threat to Linux.
 
 
- Receiving faxes with efax
 Setting up Efax to send and receive faxes on RedHat 7.2.
 
 
- Replacing a Windows NT/2000 server using Linux and SAMBA
 This article is is focused on a Linux system with SAMBA in order to run some services, typically provided by Windows operating systems.
 
 
- How to secure an heterogeneous network with free tools
 Security in computers networks is probably one of the biggest technology challenges of the 21st century. This article provides a general overview over the most important aspects.
 
 
- Introduction to cryptography
 This article expains what cryptography is and how it works.
 
 
- Using the Minolta Dimage 5 camera under Linux
 This is a short description on how to setup the usb drivers for the Minolta Dimage 5/7 cameras under Linux
 
 
- Setting up a Squid-Proxy Server
 A proxy server can help to speed up an internet connection.
 
 
- Linux System Administration - A User's Guide (Book Review)
 This is a review of the book titled "Linux System Administration - A User's Guide" by Marcel Gagne. The book has 532 pages and 26 chapters that cover installation, daemons, run-levels,file systems, password policy, kernel building, printing, devices, backups, network administration, secure computing, and more.
 
 
- Chrooting all services in Linux
 Chrooted system services improve security by limiting damage that someone who broke into the system can possibly do
 
 
![[not translated]](../../common/images/frame_tuxgrey.gif) MosixView, a management-GUI for MOSIX-cluster MosixView, a management-GUI for MOSIX-cluster
 This article describes a management GUI for the MOSIX-Cluster technologie (www.mosix.org)
![[not translated]](../../common/images/frame_tuxgrey.gif) Nessus : another brick in the (security) wall Nessus : another brick in the (security) wall
 Nessus is more than a single security scanner
![[not translated]](../../common/images/frame_tuxgrey.gif) E-mail over UUCP: The professional solution for dialup users E-mail over UUCP: The professional solution for dialup users
 UUCP is an old protocol but it is very good to handle E-mail over dialup connections.
![[not translated]](../../common/images/frame_tuxgrey.gif) Psionic Portsentry 1.1, the defender of the ports Psionic Portsentry 1.1, the defender of the ports
 Port scan detection and active defense
![[not translated]](../../common/images/frame_tuxgrey.gif) Through the tunnel Through the tunnel
 Using free SSH with external applications on different OSes
![[not translated]](../../common/images/frame_tuxgrey.gif) Realtime data mirroring on Linux Realtime data mirroring on Linux
 This article will explain on how to set an inexpensive real.time data replication system on Linux without need of special hardware. This kind of replication will be especially useful for ISPs or webhosts.
![[not translated]](../../common/images/frame_tuxgrey.gif) Using different ISPs for your Internet access Using different ISPs for your Internet access
 In this article we develop configuration files to easily change between a number of different Internet Service Providers. We extend the configuration not only to one PC but to a whole network using IP masquerading. A DNS proxy will be used to make the changing DNS IP addresses invisible inside the masqueraded network.
![[not translated]](../../common/images/frame_tuxgrey.gif) Security holes - part IV Security holes - part IV
 This fourth article deals with format strings security holes
![[not translated]](../../common/images/frame_tuxgrey.gif) Security tools Security tools
 Free tools to harden your systems
![[not translated]](../../common/images/frame_tuxgrey.gif) High Availability systems under Linux High Availability systems under Linux
 What is High Availability, why it is important and how to implement it using Linux.
- Samba Configuration
 This article describes the configuration of Linux-samba, a server needed to control domains of networks based on MS-windows machines. Examples given here are based on Debian GNU/Linux and Samba 2.0.7
 
 
![[not translated]](../../common/images/frame_tuxgrey.gif) xinetd - extended Internet services daemon xinetd - extended Internet services daemon
 xinetd - extended Internet services daemon - provides an excellent security against the intrusions, and limit certain risks of attacks by Deny of Services ( DoS ). It allows, just like the most known pair ( inetd + tcpd ), to set access control to a computer, but its capacities extend well beyond. This article proposes you to discover them.
![[not translated]](../../common/images/frame_tuxgrey.gif) Building Scalable ISPs with opensource softwares Building Scalable ISPs with opensource softwares
 In my last article, I introduced you to using LDAP on Linux. In this article, we will build a scalable ISP that can scale from one to any number of backend machines. The backbone of setting up this ISP is LDAP.
![[not translated]](../../common/images/frame_tuxgrey.gif) Learning with nmap Learning with nmap
 nmap is a security scanner
![[not translated]](../../common/images/frame_tuxgrey.gif) Bastille Linux Bastille Linux
 Available by the beginning of june,version 1.1 of Bastille-Linux is not a new Linux Distribution but a set of security scripts. The authors have adopted a very pedagogic approach and one can learn a lot simply installing these scripts.
![[not translated]](../../common/images/frame_tuxgrey.gif) Network File System (NFS) Network File System (NFS)
 Network File System (NFS) is a tool to manage files spread among several computers on a network as if they were on the same local machine. So, the final user does not have to worry of the exact location of its own files in order to access them.
![[not translated]](../../common/images/frame_tuxgrey.gif) Yellow Pages (Part III) Yellow Pages (Part III)
 In this last article about NIS, we explain how to install a NIS server. We will see which programs are used, configuration files and the building of the database.
![[not translated]](../../common/images/frame_tuxgrey.gif) Yellow Pages (Part II) Yellow Pages (Part II)
 My previous article was an introduction to the yellow pages and RPCs. This one explains how to configure a NIS client, how this client works and a small introduction to the different tools coming with NIS. Finally, we'll have a few words about NIS+
![[not translated]](../../common/images/frame_tuxgrey.gif) Installing Debian packages of LinuxFocus Installing Debian packages of LinuxFocus
 Article on how to install the Debian package of LinuxFocus.
![[not translated]](../../common/images/frame_tuxgrey.gif) Using LDAP under Linux Using LDAP under Linux
 This article will talk about the benefits of deploying LDAP in an organization and how to implement it on Linux.
![[not translated]](../../common/images/frame_tuxgrey.gif) Slackware 7.0 part II: Configuration Guide Slackware 7.0 part II: Configuration Guide
 After the installation in the first part, the author now describes some basic configuration tasks in his now favorite Linux distribution. He explains how to configure X, how to compile a kernel (and how to use it with lilo), how to do user account management, how to dial in to internet and how to give your system some basic security.
![[not translated]](../../common/images/frame_tuxgrey.gif) Virtual Network Computing Virtual Network Computing
 The dream of the network administrator come true
![[not translated]](../../common/images/frame_tuxgrey.gif) Slackware 7.0 part I: Installation Guide Slackware 7.0 part I: Installation Guide
 The author describes in detail the installation of the Slackware 7.0 Linux distribution. This article is written for beginners.
![[not translated]](../../common/images/frame_tuxgrey.gif) Setting up IP-Masquerading Setting up IP-Masquerading
 IP-Masquerading provides the possibility to connect several computers to the Internet using a computer running Linux with just one public IP address.
![[not translated]](../../common/images/frame_tuxgrey.gif) Building DHCP automatically Building DHCP automatically
 This article explains how to configure easily DHCP on a network.
![[not translated]](../../common/images/frame_tuxgrey.gif) Yellow Pages Yellow Pages
 The Network Information Service (NIS) manages a data base on server. Each computer on a network running a NIS client NIS can then poll the server for informations (login name,password, users and groups informations, ...).
![[not translated]](../../common/images/frame_tuxgrey.gif) Using Apache ProxyPass to access servers behind a Masquerading Using Apache ProxyPass to access servers behind a Masquerading
 This article demonstrates how to make a webserver behind a firewall available on the internet without changing rules on your firewall or compromising security.
![[not translated]](../../common/images/frame_tuxgrey.gif) Automount and autofs Automount and autofs
 Automount and autofs are powerful tools and ease file systems management.
![[not translated]](../../common/images/frame_tuxgrey.gif) Home Networking, glossary and overview Home Networking, glossary and overview
 This article explains hardware and networking terminology
![[not translated]](../../common/images/frame_tuxgrey.gif) VXE, a Linux security tool VXE, a Linux security tool
 Serge Lozovsky presents a software package that he developed to make UNIX systems more secure.
![[not translated]](../../common/images/frame_tuxgrey.gif) Sendmail and Fetchmail: A local mail server. Sendmail and Fetchmail: A local mail server.
 Sendmail is a powerful but complex software. This article explains how to configure sendmail and fetchmail for use on a typical home computer.
![[not translated]](../../common/images/frame_tuxgrey.gif) Recycling Ip Addresses with Apache Recycling Ip Addresses with Apache
 This article demonstrates how to serve multiple virtual web servers using the same Ip address with Apache on Unix/Linux.
- How to remove windows
 This article describes how to remove Windows and give the disk space to Linux without re-installing it
 
 
- Japanese on Linux Part I
 This article takes a brief overview at how to make your Linux system Japanese-capable.
 
 
![[not translated]](../../common/images/frame_tuxgrey.gif) Enabling Chinese on Linux Enabling Chinese on Linux
 This brief article describes how to enable Chinese locale on a "standard" Linux box.
![[not translated]](../../common/images/frame_tuxgrey.gif) An Introduction to Network Booting and Etherboot An Introduction to Network Booting and Etherboot
 An advanced article that explains how to bootstrap your computer from a program stored in non-volatile memory without accessing your hard disk.
![[not translated]](../../common/images/frame_tuxgrey.gif) TCPD and Firewalls using IPFWADM TCPD and Firewalls using IPFWADM
 This article describes very briefly how to configure the inetd services in order to improve security on your system. We concentrate in the of the tool IPFWADM to administer and configure inetd services
![[not translated]](../../common/images/frame_tuxgrey.gif) Adding Security to Common Linux Distributions Adding Security to Common Linux Distributions
 How to modify a Linux distribution out of the box to get better security.
![[not translated]](../../common/images/frame_tuxgrey.gif) Introduction to DNS Introduction to DNS
 You may have wondered what happens behind the scenes in Netscape after you enter a URL. This article will help you to understand the name-lookup process.
![[not translated]](../../common/images/frame_tuxgrey.gif) The X Display Manager The X Display Manager
 The X Display Manager runs as a daemon on a host machine and manages multiple X displays.
![[not translated]](../../common/images/frame_tuxgrey.gif) Building, Installing and Configuring sendmail 8.8.x Building, Installing and Configuring sendmail 8.8.x
 This is a copy of a Mini HOWTO on sendmail
![[not translated]](../../common/images/frame_tuxgrey.gif) Network Management and Monitoring with Linux Network Management and Monitoring with Linux
 Some handy tools for managing today's ubiquitous networks