Author: Oliver Meyer <o [dot] meyer [at] projektfarm [dot] de>
Last edited 12/18/2007
This document describes how to set up TrueCrypt with GUI on Ubuntu 7.10. TrueCrypt is a free open-source encryption software for desktop usage.
This howto is a practical guide without any warranty – it doesn’t cover the theoretical backgrounds. There are many ways to set up such a system – this is the way I chose.
This tutorial is based on another howto written by DevilMan, however I didn’t like the idea of manually compiling every package or the use of a GUI to get the software installed. This howto will work on a Gutsy Server or Gutsy desktop. With that said some of this howto is a direct copy from the original.
In this tutorial I will describe how to install and configure Snort (an intrusion detection system (IDS)) from source, BASE (Basic Analysis and Security Engine), MySQL, and Apache2 on Ubuntu 7.10 (Gutsy Gibbon). Snort will assist you in monitoring your network and alert you about possible threats. Snort will output its log files to a MySQL database which BASE will use to display a graphical interface in a web browser.
This document is a step by step guide for configuring Ubuntu 7.10 as a Samba Domain Controller with an LDAP backend (OpenLDAP). The point is to configure a server that can be comparable, from a central authentication point of view, to a Windows Server 2003 Domain Controller. The end result will be a server with an LDAP directory for storing user, group, and computer accounts. A Windows XP Professional SP2 workstation will be able to join the domain once properly configured. Please note that you do not have a fully comparable Windows domain controller at this time. Do not kid yourself, this guide only gets you a server with LDAP authentication. Of course this can be expanded to include slave servers to spread out authentication over multiple networks. Please also note that it took me approximately two and a half weeks to compile this information and get it working. The same functionality can be had in Windows in less than four hours (and this includes operating system installation). In my humble opinion the open source community will need to work on this side of Linux in order for it to be a true alternative to Windows.
Creating an AS400 terminal with an Old PC and Ubuntu
This how to uses Ubuntu 7.10 Server install. I am sure that this could be done with a much smaller install base, rather than server – I might have used the Alternative CD, or maybe even some other distribution like DSL, or Puppy Linux (if you needed GUI [graphical user interface] ). But for proof of concept this worked fine. I used an Old Dell GX100 Optiplex with 256 MB of RAM (I don’t think I need any more that 128 [maybe even 64MB], but this is what was in the box when I pulled it out of the pile). It has a small form factor, and runs pretty quiet. My steps are geared toward English & US, so you may want to change those if your using something else =).
Build A HylaFax Server With AvantFax Frontend Using Debian Etch
Install Debian. I used the basic barebones install option. I did
some things that were done because of preference, and not necessary. I
have marked them approriately. I encourage contributions from anyone
who would like to add or correct something in this HowTo to contact me
so I can fix it. I have installed this setup twice following these
instructions and used Avantfax 2.3.0. Thanks to all the resources who
helped me figure this out. Especially Razametal, who submitted a
fantastic Spanish language walkthrough on ecualug.org.
Writing Snort Rules On EnGarde
There are already tons of written Snort rules, but there just might
be a time where you need to write one yourself. You can think of
writing Snort rules as writing a program. They can include variables,
keywords and functions. Why do we need to write rules? The reason is,
without rules Snort will never detect someone trying to hack your
machine. This HOWTO will give you confidence to write your own rules.
How To Masquerade On Linux (Internet Connection Sharing)
It’s very simple to masquerade (internet connection sharing in
Windows language ) on Linux with a few lines of iptables and ip_forward
Network Management And Monitoring With Hyperic HQ On Fedora 8
This document describes how to set up Hyperic HQ on Fedora 8. The
resulting system provides an awesome, web-based “System
ManagementSoftware”. It’s the next stage of classical monitoring and
able to manage all kinds of operating systems, web servers, application
servers and database servers.
Sample Configuration of DRBD On CentOS 4.5
DRBD is an abbreviation of Distributed Replicated Block Device.
DRBD is a block device which is designed to build high-availability
clusters. This is done by mirroring a whole block device via (a
dedicated) network. You could see it as a network RAID1.
Creating Snapshot Backups Of Your Desktop With Timevault On Ubuntu 7.10
This document describes how to set up, configure and use Timevault
on Ubuntu 7.10. The resulting system provides a powerful backup system
for desktop usage. TimeVault is a simple front-end for making snapshots
of a set of directories. Snapshots are a copy of a directory structure
or file at a certain point in time. Restore functionality is integrated
into Nautilus – previous versions of a file or directory that has a
snapshot can be accessed by examining the properties and selecting the
‘Previous Versions’ tab.