The traditional file permission model, where read, write, and execute permissions are set on each file for the user, group, and others (UGO) has one drawback: It can't be used to define per-user or per-group permissions. For that, you need to employ access control lists (ACL). Eiciel is a graphical tool that integrates with the Nautilus file manager and allows for easy ACL management.
Read more »Smart ACL management with Eiciel
- Login to post comments
Starting SSH connections simply with SSHMenu
SSHMenu adds a button to your GNOME panel that displays a configurable drop-down list of hosts that you have might like to connect to with SSH.
Read more »- Login to post comments
Howto add permanent static routes in Ubuntu
Static routing is the term used to refer to the manual method used to set up routing. An administrator enters routes into the router using configuration commands. This method has the advantage of being predictable, and simple to set up. It is easy to manage in small networks but does not scale well.
Read more »- Login to post comments
Installing An Ubuntu Hardy 8.04 LTS DNS Server With BIND
This tutorial shows how to set up an Ubuntu Hardy Heron (Ubuntu 8.04 LTS) based server that offers DNS services. This tutorial is written for the 32-bit version of Ubuntu 8.04 LTS, but should apply to the 64-bit version.
Read more »- Login to post comments
GNU autotools primer (part two)
This is the second part of our series on the GNU autotools system, looking at autoconf, automake and libtool. In the previous installment, we looked at building a very simple C program, with just one source file, using autotools. In this article, we'll extend our program slightly, by shifting some data into a header file, and adding a man page.
Read more »- Login to post comments
Setting up an encrypted Debian system
"Even though the Debian installer can set up encrypted partitions, it is optimised for systems with a single data partition, unless you want to enter multiple passphrases when the system boots. The installer configures a LUKS volume using cryptsetup, but it provides no mechanism for the use of key files, only interactive passphrases.
Read more »GNU autotools primer - part two
Part two of a series of articles looking at learning the widely used GNU autoconf, automake and libtool utilities, by example. This installment covers adding manual pages to distributions, and the EXTRA_DIST target.
Read more »- Login to post comments
Shell Scripting, Factorial Primes And Huge Number Computations On Linux And Unix
A look at prime, composite and relative prime number generation and machine/OS limitations common to deriving them.
Read more »- Login to post comments
OpenSolaris still has some Linux copying to do
Sun has made good on its promise to deliver OpenSolaris, the company's Unix-based answer to Linux, with a company-supported, commercial update arriving in mid-May. Although far from a complete product, the latest OpenSolaris is impressive and in the long run could prove a viable alternative to Linux.
Read more »- Login to post comments
uClinux console servers add open source UPS mgmt
Opengear has integrated uninterruptible power supply (UPS) monitoring tools in its uClinux-based remote access equipment. Opengear's console servers (pictured at left) now include tools derived from the open source Network UPS Tools (NUT) project, says the company.
Read more »- Login to post comments
Apache HTTP Server 2.2.9 Released
"The Apache Software Foundation and the Apache HTTP Server Project are pleased to announce the release of version 2.2.9 of the Apache HTTP Server ("Apache")..."
Read more »- Login to post comments
eBox unites platform networking services
eBox is a server framework and platform that allows administrators to set up network services such as Lightweight Directory Access Protocol (LDAP) or a firewall from scratch relatively easily. eBox does not offer management of every option found in all service configuration files.
Read more »Shell Script To Produce Prime Numbers On Linux And Unix
A bash script to find all prime numbers up to a user-specified ceiling.
Read more »- Login to post comments
Test your environment's security with BackTrack
In the field of penetration testing, BackTrack is today's premier Linux distribution. Designed for, created by, and used by security professionals around the globe, BackTrack is the result of a merger between two earlier, competing distributions -- WHAX and Auditor Security Collection. The most recent beta version was released on June 10.
Read more »- Login to post comments
Run a Business Network on Linux: Intrusion Detection (Part 4)
In our first two installments on intrusion detection (see Resources), we got as far as setting up a Snort sensor on our network. Now it's time to set it up to automatically collect new rulesets, and set up BASE (Basic Analysis and Security Engine) to present all that data in a nice digestible way with graphs and sorting tools.
Read more »- Login to post comments





