In an earlier look at LDAP, we set up a simple LDAP-based authentication system. We configured client machines to retrieve authentication information from a server running OpenLDAP. Now let's go further by enabling encryption and looking at how to make user modifications through LDAP.
Read our article on Basic Dial-Up for Fedora and SuSe. Or start using Linux broadband with our article on DSL and Cable Modem Use.
Here's a short and sweet howto on setting up an easy raid array.
Need to pull some data from text--maybe e-mail messages--and sort it, graph it or otherwise manipulate it? Here's an AWK script to use as a starting point.
What do you look for in an email program? You may find it in Mutt, an easy-to-use text-based messaging client. Here's all you need to know to get started with Mutt.
Ever wanted your own bootable CD? Something personalized for your users and complete with all of your own Linux-based software and configuration?
If you usually run for a coffee refill while your computer is booting up, here's a look at what you're missing. For those perhaps new to Linux who want to know a bit more about their OS, this article looks inside the startup sequence of Linux on a PC.
When you install an application package in a Debian-based system, sometimes prerequisite application packages are unavailable. These missing packages are known as broken dependencies. Left unresolved, they can cripple your system's ability to install new packages.
CUPS is what its name says: a common UNIX printing system. This is a basic introduction to what CUPS is and why you might want to use it rather than LPD.
This is a detailed description about the steps to be taken to setup a Ubuntu based server (Ubuntu 5.10 - Breezy Badger) that offers all services needed by ISPs and hosters (web server (SSL-capable), mail server (with SMTP-AUTH and TLS!), DNS server, FTP server, MySQL server, POP3/POP3s/IMAP/IMAPs, Quota, Firewall, etc.).
I must admit that I had mixed feelings when I saw the new toolbar metaphor for OpenOffice.org 2.0, the huge list of toolbars under the "View" menu of the OpenOffice.org 2.0 (release candidate) seemed potentially overwhelming.
KDE 3.x has some nice, built-in, multi-protocol network browsing features, but, unfortunately, chances are that your Linux distribution doesn’t enable or configure those features automatically. So, this month, let’s dive into KDE and get connected.
Many Linux users who have used Squid have taken advantage of its simple setup, and ignore or overlook its advanced features. Here's an introduction to some of those features and how to use them.
This document describes how to install a Proftpd server that uses virtual users from a MySQL database instead of real system users.
There are many times when you need to work with CD-ROM images (or ISO files) under Linux. This simple cookbook shows you how to accomplish the most common tasks.
Are the improved hardware support, easier installations, up-to-date packages, new features in Linux real? To find a partial answer to the question, I decided to test the wireless networking features in SUSE Linux 10.0.
Trojan Scan is a simple but effective tool that monitors connections and alerts you to unauthorized activity of the sort that a rootkit, trojan, or other bad-to-the-bone-ware might engage in. Jump down out of that hi-tech hammock you're in and let's take a look.
Learn to use Wireless Assistant for Linux to access wireless networks. Vincent Danen tells you how in this Linux tip.
This document will serve as a basic how-to on using iptables. This How-To is performed on a Debian Sarge 3.1 box, though the commands and syntax should work for any linux distro.