Links - Howtos
This HOWTO specifically details how to create a dual boot system using Redhat Linux 7.2 and Windows XP with a NTFS file system using the GRUB boot loader.
I am sure almost all users of the Linux OS have heard or read, at one time or other, how Linux can and is being run on old 486s with just 16MB of RAM. And if you are (un)lucky enough to know some Linux guru, he would surely have boasted of this fact (and probably more than once). Upon hearing/reading this, the question that most surely pops up in a normal user\'s mind is, \"Hey, how come my Celeron with 64MB of RAM is so slow?\" Don\'t worry, help is here.
"Today, we'll take a look at what is involved in adding a 2nd hard drive to your system. I'll assume, fair or not, that your setup is like mine. You have a hard drive that has ext2 on it as your 1st hard drive and that it is on /dev/hda. I'll also assume that, like me, you began running out of disk space and said "Hard drives are very inexpensive these days, let me go grab one that has about 25 gigs on it and I'll put Reiser File System on it so that I don't have to wait an hour for the file system check to happen."
It is important to carry out a scanning of your own network, and look for vulnerabilities. There are several scanning tools for this purpose. Here we look at nmap. Nmap is among the most complete scanners and security tools. It allows the system administrator to scan the networks in order to know which servers are active and which services they offer. For this purpose, nmap offers several scanning techniques. This article will work on a limited number of them, reviewing (maybe teaching?) some aspects of TCP protocol."
If you are running Linux, or most UNIX variants, and you have taken appropriate precautions, you probably have a simple workaround. This workaround is also useful for the times when your X server crashes, and you need to clean up the carcass. I am writing this on my desktop computer in spite of the fact that my monitor just died. I'm using my laptop as an X terminal. The purpose of this note is to tell you how to do that.
Tripwire is a little software package available for Linux as well as for other Unix variants and Windows. It is a file integrity tool and can prove to be very effective measure against malicious code, sniffers, trojans or any other software post installed to your system. Tripwire, effective as it is, cannot help you if your system has been compromised prior to the installation of Tripwire. So, in order to use it properly, install it just after you install and set up your system. A howto to help you install and use it.
"The method I'm going to describe for getting your virtual consoles logged in automatically consists of installing some software and changing a few lines in /etc/inittab. Before I do that, I'll take you on a mind-expanding journey through the land of getties and logins to see just how a Unix user gets logged in."
If you're new (or even not so new) to Linux, there are hundreds of questions, problems, and concerns that arise during the learning process, especially when you're coming from the world of Microsoft Windows. This article addresses a number of miscellaneous questions, both the frequently- and rarely-asked questions, and groups them by topic. The focus is on helping Windows users make the transition to Linux, but those converting from other operating systems should find useful information here as well.
"Compilation and configuration of a custom Linux kernel involves a number of complicated steps. Fortunately, the user is abstracted from all these by the shell. But, when the Compilation and configuration steps have not been carried out in a perfect manner, one is bound to get error messages on the screen. Though these can vary from as simple as "typos in /etc/lilo.conf", but can be as complicated as "bad cache memory" and others."