Tutorials Shared by the Internet Community
Found 167 Tutorials
Most Recent Tutorials
Depending on the business and industry, spreadsheets can be anything from very simple lists used for sorting to kazillion cell
Automate redundant repetitive tasks with Perl, using these ten neat tricks!
The word Unix has traditionally brought to mind images of a mystical operating system for high-end workstations
At first glance many people think the Unix Shell is a more cryptic version of the MS-Windows/DOS command prompt.
Ken Coar explains the Apache CVS Repository and how you can use it to stay on top of Apache.
This article looks at Bash, the default command shell on most Linux distributions.
If you are still lumbering along with the good, but antique, Linux Loader, its time to consider a move to GRUB
A tutorial on telnet for beginners. Explains what telnet is and how to use it.
This tutorial is about SSH and SCP. You will learn how to connect to a remote host and how to copy between hosts.
The commands diff and patch form a powerful combination.
The bash shell is just amazing. There are so many tasks that can be simplified using its handy features.
The solution is the use of the suexec wrapper, which is part of the Apache distribution.
One of the most powerful aspects of Linux is its ability to launch services, or daemons, and run them in the background as needed.
Our updated network security basics document will get you well on your way to locking your system down.
General advices regarding security of a Linux, FreeBSD, OpenBSD, NetBSD and generaly Unix.
This tutorial shows some effective methods to help prevent SSH attacks.
Recently, I have been watching a lot of my friends who use various versions of Windows getting a lot of viruses
A friend of mine had a problem, he has a home network similar to mine and a Wireless Access Point (AP) that he wanted to use since mobility
Things are explained very simply here but it WILL give you a good understanding what iptables is and how to begin writing a script.
If you know linux you should have basic knowledge of the command line. If you dont this tutorial will help you out.
A rootkit is a program designed to take fundamental control of a computer system, without authorization by the systems owners and legitimate managers
The solution may just be an LDAP server of your very own.