|Linux sistem yönetimi hakkındaki yazılar.|
Wireless LAN under Linux
In this article, the author talks about driver installation and usage of some common Wireless LAN adapters and related issues such as authentication based on 802.1x methods.
Checkinstall is utility to automatically build RPM/Debian/Slackware packages from tar.gz source pages. This makes it possible to do a "clean" installation and de-installation of almost any source code tar.gz package.
darkstat - bir ağ trafik analisti
In this article we present the network traffic analyzer "darkstat". We cover installation, start and usage of this program.
vsftpd - Çok güvenli bir FTP sunucusuna giriş
This article gives a basic introduction to the "Very Secure FTP Daemon". I am beginning with a general description of FTP and vsftpd. After that we will have a look at the installation, configuration and start options of the vsftp daemon.
Veri kaybı: En kötü durum senaryosu
A real-life case of data loss with a happy end, thanks to reiserfsck. Three cheers for journaling file systems and their tools.
shivalik -- basit yedekleme yapılandırılması (Murphu'nin kanunlarına karşı çıkmak.)
There are a whole lot of HOWTOs out there which tell you what to do if you have a serious problem with your Linux installation. Good for us. But there is no one there who told you what you should do before disaster strikes you!
Gentoo Linux is a source package based Linux system. It is very different from the established commercial Linux distributions.
Renkli kabuklar -- ANSI renk kodların kullanımı
This article explains how to use colors or bold text in a Terminal.
uucpssh.org: UUCP Linux hayranları için e-posta
In the windows world incomming mails are received via POP3 or IMAP and outgoing mails are sent directly via SMTP. This split setup can cause all kind of headaches especially if you are using different ISPs all the time.
Rsync: Tüm zamanların yedekleme sistemi
Backup is one of the hardest and most neglected parts of system administration. This article presents a very easy solution based on rsync.
storeBackup, alışılmamış yedekleme aracı
storeBackup is a very versatile backup tool.
8cm-Multiboot-CDROM with modified Knoppix linux
This is an instruction how to make your own bootable mini CD.
IDS - Intrusion Detection System (Saldırı
In this article we present methods to detect an intrusion and explain possibilities to respond to such and attack.
Linux ile paket filitreleme
How to setup a basic firewall
PostgreSQL'den JDBC'ye Java SSL tünel ile erişim.
This article shows how to set up JDBC access for PostgreSQL on redhat 8.0 and how to create a SSL tunnel using Sun's Java Secured Socket Extensions, to enable secured access to a remote postgres database.
This article presents the different types of external attacks that a cracker can use.
Sistem yönetimini ssh ve scp ile otomatikleştirmek
This article demonstrates the usage of ssh and scp commands to automate system administration jobs, such as installing and configuring software on Linux systems.
Debian GNU/Linux ile saldırı sezimleme
The article presents techniques and the tools for Debian GNU/Linux to detect and track people wo broke into your computer network.
SSH ile güvenli bağlantı
This article is an in depth description of SSH.
LAMP Sisteminin kurulumu
LAMP is an abbreviation for Linux Apache MySQL PHP. In this article you will learn how to install a Webserver based on LAMP.
Root-kit'ler ve bütünlük
This article presents the different operations a cracker can do after having succeeded in entering a machine. We will also discuss what an administrator can do to detect that the machine has been jeopardized.
FreeBSD, gerçek bir altenatif
This article is an overview over another free Unix system: FreeBSD
Virüsler: herkesi endişelendiren konu
Viruses, Worms and Trojan Horses could also be a threat to Linux.
Efax ile fax almak
Setting up Efax to send and receive faxes on RedHat 7.2.
Windows NT/2000 sunucusunu, Linux ve SAMBA kullanarak değiştirmek
This article is is focused on a Linux system with SAMBA in order to run some services, typically provided by Windows operating systems.
Serbest yazılım araçları ile karmaşık ağların güvenliğini sağlamak
Security in computers networks is probably one of the biggest technology challenges of the 21st century. This article provides a general overview over the most important aspects.
This article expains what cryptography is and how it works.
Linux altında Minolta Dimage 5 kamerasını kullanmak.
This is a short description on how to setup the usb drivers for the Minolta Dimage 5/7 cameras under Linux
Squid-Proxy Sunucusunun Yapılandırılması
A proxy server can help to speed up an internet connection.
Kitap incelemesi: Linux System Administration - A User's Guide
This is a review of the book titled "Linux System Administration - A User's Guide" by Marcel Gagne. The book has 532 pages and 26 chapters that cover installation, daemons, run-levels,file systems, password policy, kernel building, printing, devices, backups, network administration, secure computing, and more.
Linux altındaki tüm sunucuları chroot ortamında çalıştırmak
Chrooted system services improve security by limiting damage that someone who broke into the system can possibly do
MOSIXVIEW, MOSIX-cluster için bir yönetim KGA (Kullanıcı Grafik Arabirimi)
This article describes a management GUI for the MOSIX-Cluster technologie (www.mosix.org)
Nessus : (güvenlik) duvarına yerleştirilmiş bir tuğla daha
Nessus is more than a single security scanner
UUCP üzerinden E-ileti
UUCP is an old protocol but it is very good to handle E-mail over dialup connections.
Portların koruyucusu Psionic Portsentry 1.1
Port scan detection and active defense
Using free SSH with external applications on different OSes
Linux altında gerçek zamanlı veri yansıması
This article will explain on how to set an inexpensive real.time data replication system on Linux without need of special hardware. This kind of replication will be especially useful for ISPs or webhosts.
İnternet erişiminiz için farklı İSS(İnternet Sevis Sağlayıcı)'lerin kullanımı.
In this article we develop configuration files to easily change between a number of different Internet Service Providers. We extend the configuration not only to one PC but to a whole network using IP masquerading. A DNS proxy will be used to make the changing DNS IP addresses invisible inside the masqueraded network.
Uygulama geliştirme sırasında güvenlik açıklarından kaçınmak.
This fourth article deals with format strings security holes
Free tools to harden your systems
Linux altında Yüksek Erişilebilirlik
What is High Availability, why it is important and how to implement it using Linux.
Samba Yapılandırım Rehberi
This article describes the configuration of Linux-samba, a server needed to control domains of networks based on MS-windows machines. Examples given here are based on Debian GNU/Linux and Samba 2.0.7
xinetd - extended Internet services daemon - provides an excellent security against the intrusions, and limit certain risks of attacks by Deny of Services ( DoS ). It allows, just like the most known pair ( inetd + tcpd ), to set access control to a computer, but its capacities extend well beyond. This article proposes you to discover them.
Açık kod yazılımlarla sağlam ISP'lerin
In my last article, I introduced you to using LDAP on Linux. In this article, we will build a scalable ISP that can scale from one to any number of backend machines. The backbone of setting up this ISP is LDAP.
nmap ile öğrenmek
nmap is a security scanner
Available by the beginning of june,version 1.1 of Bastille-Linux is not a new Linux Distribution but a set of security scripts. The authors have adopted a very pedagogic approach and one can learn a lot simply installing these scripts.
NFS - Ağ Dosya Sistemi
Network File System (NFS) is a tool to manage files spread among several computers on a network as if they were on the same local machine. So, the final user does not have to worry of the exact location of its own files in order to access them.
Sarı Sayfalar, bölüm 3 : Sunucu tarafı
In this last article about NIS, we explain how to install a NIS server. We will see which programs are used, configuration files and the building of the database.
Sarı Sayfalar, bölüm 2
My previous article was an introduction to the yellow pages and RPCs. This one explains how to configure a NIS client, how this client works and a small introduction to the different tools coming with NIS. Finally, we'll have a few words about NIS+
Linux'un Debian paketinin yüklenmesi.
Article on how to install the Debian package of LinuxFocus.
Linux altında LDAP'a giriş
This article will talk about the benefits of deploying LDAP in an organization and how to implement it on Linux.
Slackware 7.0 Bölüm II: Yapılandırma Rehberi
After the installation in the first part, the author now describes some basic configuration tasks in his now favorite Linux distribution. He explains how to configure X, how to compile a kernel (and how to use it with lilo), how to do user account management, how to dial in to internet and how to give your system some basic security.
VNC olarak bilinen Sanal Ağ hesaplamaları.
The dream of the network administrator come true
Slackware 7.0 bölüm I: Yükleme Rehberi
The author describes in detail the installation of the Slackware 7.0 Linux distribution. This article is written for beginners.
IP-Masquerading provides the possibility to connect several computers to the Internet using a computer running Linux with just one public IP address.
Otomatik DHCP Oluşturmak
This article explains how to configure easily DHCP on a network.
Sarı Sayfalar, bölüm 1
The Network Information Service (NIS) manages a data base on server. Each computer on a network running a NIS client NIS can then poll the server for informations (login name,password, users and groups informations, ...).
Maskeleme yapan host ardından Apache Proxy
This article demonstrates how to make a webserver behind a firewall available on the internet without changing rules on your firewall or compromising security.
Automount ve Autofs
Automount and autofs are powerful tools and ease file systems management.
Ev Ağı, genel olarak gözden geçirim.
This article explains hardware and networking terminology
VXE, bir Linux güvenlik aracıdır
Serge Lozovsky presents a software package that he developed to make UNIX systems more secure.
Sendmail ve Fetchmail: Yerel ileti sunucusu
Sendmail is a powerful but complex software. This article explains how to configure sendmail and fetchmail for use on a typical home computer.
Ip Adreslerinin Apache ile yeniden devri
This article demonstrates how to serve multiple virtual web servers using the same Ip address with Apache on Unix/Linux.
Linux altında kullanım için Windows parçası nasıl serbestlenir
This article describes how to remove Windows and give the disk space to Linux without re-installing it
Linux Bölüm I de Japonlar
This article takes a brief overview at how to make your Linux system Japanese-capable.
Linux'ta Çince Kullanımı
This brief article describes how to enable Chinese locale on a "standard" Linux box.
İletişmağı Açınımına ve
An advanced article that explains how to bootstrap your computer from a program stored in non-volatile memory without accessing your hard disk.
TCPD ve IPFWADM kullanan
This article describes very briefly how to configure the inetd services in order to improve security on your system. We concentrate in the of the tool IPFWADM to administer and configure inetd services
Yaygın Linux Sürümlerine
How to modify a Linux distribution out of the box to get better security.
You may have wondered what happens behind the scenes in Netscape after you enter a URL. This article will help you to understand the name-lookup process.
X Görüntü İşletmeni
The X Display Manager runs as a daemon on a host machine and manages multiple X displays.
sendmail 8.8x'in Yapılandırımı, Kurulumu ve
This is a copy of a Mini HOWTO on sendmail
Linux'la İletişimağı İşletimi ve Gözlemlenimi
Some handy tools for managing today's ubiquitous networks
Görselyöre sayfalarının bakımı, LinuxFocus
Editörleri tarafından yapılmaktadır
|generated by lfthemes, 2007-09-14, version: ver: 2.3|