Subscribe
Tutorial search

Linux Rds Tutorials


Sort by:
How To Protect Your Server Against Dictionary Attacks
How To Protect Your Server Against Dictionary Attacks
Recently a security flaw in LinkedIn’s code has helped add 6.5 million passwords to attackers’ tradi
Difficulty:
Configuring your linux server as a Router
Configuring your linux server as a Router
Four this Tutorial you will need 2 NIC's (network Interface cards) Configured and working properly with your linux distro. You will also need IPTABLES installed on your system.
Difficulty:
Create your own PCBs using the toner transfer method
Create your own PCBs using the toner transfer method
I have been making very nice (single sided) PCBs for a while now and I've got quite good at it, so I decided to write this tutorial so you too can make your own PCBs easily and quickly - with practice working boards should be possible in a couple of hours.
Difficulty:
The significant new AIX 7 capabilities for virtualization
The significant new AIX 7 capabilities for virtualization
The IBM AIX operating system provides a highly scalable IT infrastructure for client workloads. Learn about the latest version, AIX 7.1, an open standards-based UNIX operating system, that includes significant new capabilities for virtualization, security features, availability features, and manageability.
Difficulty:
Postfix Backup MX eMail Server Anti-Spam Configuration
Postfix Backup MX eMail Server Anti-Spam Configuration
According to RFC2821 the lowest-numbered records are the most preferred MX for domain. So a target Postfix backup server is used to keep the messages in a queue waiting for the primary server to become available. This ensures that if my primary MX goes down you do not loss any emails. However, spammers are connects to backup MX to avoid anti spam filters that are running on the primary MX server. This also hides their real IP from my primary MX. This tutorial shows how to configure anti-spam and anti-virus for Red Hat / CentOS Linux ver5.3 based Postfix mx server.
Difficulty:
Supplement Creative Commons with open standards
Supplement Creative Commons with open standards
This article explains how you can protect your piece of digital content—whether it be documents, audio tracks, video clips, or cropped images that end users can download with their favorite browser. It will show you what you need to know about the DRM technology to achieve DRM interoperability from device to device.
Difficulty:
Adding Interactive Course Material using Moodle 1.9
Adding Interactive Course Material using Moodle 1.9
Moodle's assignments, journals, and lessons enable you to create course material that students interact with. This interaction is more engaging, and usually more effective, than courses consisting of static material that the students view. While you will probably begin creating your course by adding static material, the next step should usually be to ask, 'How can I add interactivity to this course?' Lessons can even take the place of many static web pages, as they consist of web pages with a question at the end of each page. Survey and Choice give teachers the opportunity to assess students, their attitudes towards learning, and their satisfaction with a course. The ATTLS survey can become part of student's record, available to all teachers who have that student in a course. The COLLES (Preferred) survey can be used at the beginning of a course to assess the student's motivation and expectations, while the COLLES (Actual) can be used every few weeks to assess the students' satisfaction. Add a Critical Incidents survey after each topic or week, and a Choice as needed, and the result is a structured, ongoing conversation between the students and teacher.
Difficulty:
Naming standards for business continuity: Best practices
Naming standards for business continuity: Best practices
In today's partitioned and virtualized computing environments, the requirement for naming standards is more apparent than ever before. This article defines naming categories and provide standards for creating enterprise-wide unique names associated with each category.
Difficulty:
Advanced Accounting in WPAR
Advanced Accounting in WPAR
This article gives an overview on configuration of Advanced Accounting for WPARs with examples, methods of enabling WPAR Accounting, and the various reporting tools available for viewing the accounting records.
Difficulty:
AIX WPAR auditing
AIX WPAR auditing
IBM AIX V6.1 introduced the software-based partition technology called Workload Partitions (WPAR). This article provides an overview of auditing subsystems in a WPAR environment and presents information about the audit reporting tools that can be used to view the audit records.
Difficulty:
Enhanced password strength with IBM Kerberos for AIX
Enhanced password strength with IBM Kerberos for AIX
In a Kerberos environment, protecting principals' passwords is imperative to preserve the system security. Learn how Kerberos administrators can take advantage of the password protection and password strength enhancement features provided by IBM Network Authentication Service (NAS) for AIX.
Difficulty:
Performance Simulator for Linux on POWER
Performance Simulator for Linux on POWER
Discover the Performance Simulator for Linux on POWER, a suite of performance models based on the POWER series of processors. Learn to examine how your code executes on various POWER processors so that you can identify and avoid common performance hazards on these processors.
Difficulty:
Kerberos and AIX v6
Kerberos and AIX v6
Learn to make use of the Kerberos authentication tickets in the day-to-day network services on IBM AIX V6 and discover how Kerberos can be useful in getting rid of the password hassles for network service logons. This is another method towards achieving single sign on (SSO) on an AIX system network.
Difficulty:
default admin passwords on the IBM hardware management console (HMC)
default admin passwords on the IBM hardware management console (HMC)
default admin passwords on the IBM hardware management console (HMC)
Difficulty:
Building an LDAP Server on Linux, Part 2
Building an LDAP Server on Linux, Part 2
LDAP provides central management of access, authentication, and authorization--in other words, it makes your life as an admin much easier. Learn the ins and outs of LDAP as well as how to build your own LDAP server in this three-part series.
Difficulty:
Search Term(s) (1): rds