Skip to main content

Home/ Ubuntu - Linux for human beings/ Group items tagged running

Rss Feed Group items tagged

munna1357

ftp configuration linux part 2 rhel6 ftp server configuration step by step process - Yo... - 0 views

  •  
    The vsftpd FTP daemon runs kept of course. SELinux arrangement characterizes how vsftpd communicates with documents, forms, and with the framework as a rule. For instance, when a verified client sign in by means of FTP, they can't read from or keep in touch with records in their home catalogs: SELinux keeps vsftpd from getting to client home registries as a matter of course. Additionally, as a matter of course, vsftpd does not have admittance to NFS or CIFS volumes, and unknown clients don't have compose access, regardless of the possibility that such compose access is arranged in/and so forth/vsftpd/vsftpd.conf. Booleans can be empowered to permit the beforehand said access.  The accompanying illustration shows a verified client signing in, and a SELinux foreswearing when attempting to view records in their home catalog:  Run the rpm - q ftp order to check whether the ftp bundle is introduced. On the off chance that it is not, run the yum introduce ftp order as the root client to introduce it.  Run the rpm - q vsftpd order to check whether the vsftpd bundle is introduced. On the off chance that it is not, run the yum introduce vsftpd order as the root client to introduce it.  In Red Hat Enterprise Linux, vsftpd just permits mysterious clients to sign in as a matter of course. To permit validated clients to sign in, alter/and so on/vsftpd/vsftpd.conf as the root client. Ensure the local_enable=YES choice is uncommented:
  •  
    The vsftpd FTP daemon runs kept of course. SELinux arrangement characterizes how vsftpd communicates with documents, forms, and with the framework as a rule. For instance, when a verified client sign in by means of FTP, they can't read from or keep in touch with records in their home catalogs: SELinux keeps vsftpd from getting to client home registries as a matter of course. Additionally, as a matter of course, vsftpd does not have admittance to NFS or CIFS volumes, and unknown clients don't have compose access, regardless of the possibility that such compose access is arranged in/and so forth/vsftpd/vsftpd.conf. Booleans can be empowered to permit the beforehand said access.  The accompanying illustration shows a verified client signing in, and a SELinux foreswearing when attempting to view records in their home catalog:  Run the rpm - q ftp order to check whether the ftp bundle is introduced. On the off chance that it is not, run the yum introduce ftp order as the root client to introduce it.  Run the rpm - q vsftpd order to check whether the vsftpd bundle is introduced. On the off chance that it is not, run the yum introduce vsftpd order as the root client to introduce it.  In Red Hat Enterprise Linux, vsftpd just permits mysterious clients to sign in as a matter of course. To permit validated clients to sign in, alter/and so on/vsftpd/vsftpd.conf as the root client. Ensure the local_enable=YES choice is uncommented:
munna1357

NFS ( Network file system ) Configuration in linux step by step rhel6 and create users ... - 0 views

  •  
    At present, there are three variants of NFS. NFS form 2 (NFSv2) is more established and generally bolstered. NFS form 3 (NFSv3) underpins safe nonconcurrent composes and is more hearty at mistake taking care of than NFSv2; it likewise bolsters 64-bit record sizes and balances, permitting customers to get to more than 2Gb of document information.  NFS form 4 (NFSv4) works through firewalls and on the Internet, no more requires a rpcbind administration, bolsters ACLs, and uses stateful operations. Red Hat Enterprise Linux 6 underpins NFSv2, NFSv3, and NFSv4 customers. At the point when mounting a document framework through NFS, Red Hat Enterprise Linux utilizes NFSv4 as a matter of course, if the server underpins it.  All forms of NFS can utilize Transmission Control Protocol (TCP) running over an IP system, with NFSv4 requiring it. NFSv2 and NFSv3 can utilize the User Datagram Protocol (UDP) running over an IP system to give a stateless system association between the customer and server.  At the point when utilizing NFSv2 or NFSv3 with UDP, the stateless UDP association (under typical conditions) has less convention overhead than TCP. This can interpret into better execution on clean, non-congested systems. In any case, on the grounds that UDP is stateless, if the server goes down suddenly, UDP customers keep on saturating the system with solicitations for the server. Moreover, when a casing is lost with UDP, the whole RPC ask for must be retransmitted; with TCP, just the lost casing should be loathe. Consequently, TCP is the favored convention when associating with a NFS server.
  •  
    At present, there are three variants of NFS. NFS form 2 (NFSv2) is more established and generally bolstered. NFS form 3 (NFSv3) underpins safe nonconcurrent composes and is more hearty at mistake taking care of than NFSv2; it likewise bolsters 64-bit record sizes and balances, permitting customers to get to more than 2Gb of document information.  NFS form 4 (NFSv4) works through firewalls and on the Internet, no more requires a rpcbind administration, bolsters ACLs, and uses stateful operations. Red Hat Enterprise Linux 6 underpins NFSv2, NFSv3, and NFSv4 customers. At the point when mounting a document framework through NFS, Red Hat Enterprise Linux utilizes NFSv4 as a matter of course, if the server underpins it.  All forms of NFS can utilize Transmission Control Protocol (TCP) running over an IP system, with NFSv4 requiring it. NFSv2 and NFSv3 can utilize the User Datagram Protocol (UDP) running over an IP system to give a stateless system association between the customer and server.  At the point when utilizing NFSv2 or NFSv3 with UDP, the stateless UDP association (under typical conditions) has less convention overhead than TCP. This can interpret into better execution on clean, non-congested systems. In any case, on the grounds that UDP is stateless, if the server goes down suddenly, UDP customers keep on saturating the system with solicitations for the server. Moreover, when a casing is lost with UDP, the whole RPC ask for must be retransmitted; with TCP, just the lost casing should be loathe. Consequently, TCP is the favored convention when associating with a NFS server.
Tim M

Wine 1.2 in 64bit Linux Mint 9 or Ubuntu Linux 10.04 to Run Windows Apps & Games Screen... - 0 views

  •  
    Screencast Tutorial on how-to use Wine 1.2 in 64bit Linux OS to install and run most Microsoft Windows Applications & Games on Linux Mint 9 or Ubuntu Linux 10.04. These Linux Tips & Tricks also apply to all Ubuntu Linux 10.04 Lucid Lynx derivatives
Graham Perrin

IEs4Linux - 0 views

  • Internet Explorer running on Linux
  •  
    IEs4Linux is the simpler way to have Microsoft Internet Explorer running on Linux (or any OS running Wine).
munna1357

ftp configuration in linux with users and configuring permisions - YouTube - 0 views

  •  
    The framework is currently a ftp server and can acknowledge associations. To arrange the server to consequently begin the administration at boot time, execute the charge chkconfig vsftpd on as root. To stop the server, execute the order administration vsftpd stop.  Document Transfer Protocol (FTP) is one of the most seasoned and most ordinarily utilized conventions found on the Internet today. Its motivation is to dependably exchange documents between PC has on a system without requiring the client to log specifically into the remote host or know about how to utilize the remote framework. It permits clients to get to records on remote frameworks utilizing a standard arrangement of basic summons.  The Very Secure FTP Daemon (vsftpd) is planned from the beginning to be quick, stable, and, above all, safe. Its capacity to handle vast quantities of associations productively and safely is the reason vsftpd is the main stand-alone FTP conveyed with Red Hat Enterprise Linux.  In Red Hat Enterprise Linux, the vsftpd bundle gives the Very Secure FTP daemon. Run the rpm - q vsftpd order to check whether vsftpd is introduced:
  •  
    The framework is currently a ftp server and can acknowledge associations. To arrange the server to consequently begin the administration at boot time, execute the charge chkconfig vsftpd on as root. To stop the server, execute the order administration vsftpd stop.  Document Transfer Protocol (FTP) is one of the most seasoned and most ordinarily utilized conventions found on the Internet today. Its motivation is to dependably exchange documents between PC has on a system without requiring the client to log specifically into the remote host or know about how to utilize the remote framework. It permits clients to get to records on remote frameworks utilizing a standard arrangement of basic summons.  The Very Secure FTP Daemon (vsftpd) is planned from the beginning to be quick, stable, and, above all, safe. Its capacity to handle vast quantities of associations productively and safely is the reason vsftpd is the main stand-alone FTP conveyed with Red Hat Enterprise Linux.  In Red Hat Enterprise Linux, the vsftpd bundle gives the Very Secure FTP daemon. Run the rpm - q vsftpd order to check whether vsftpd is introduced:
munna1357

Domanin and Network configuration Part 2 step by step - YouTube - 0 views

  •  
    This Linux instructional exercise covers TCP/IP organizing, system organization and framework design nuts and bolts. Linux can bolster various system gadgets. The gadget names are numbered and start at zero and tally upwards. For instance, a PC running two ethernet cards will have two gadgets marked/dev/eth0 and/dev/eth1. Linux system arrangement, administration, observing and framework devices are secured in this instructional exercise  All the enormous, userfriendly Linux dispersions accompany different graphical apparatuses, taking into account simple setup of the PC in a nearby system, for associating it to an Internet Service Provider or for remote access. These devices can be begun up from the charge line or from a menu:  Ubuntu setup is done selecting System->Administration->Networking.  RedHat Linux accompanies redhat-config-system, which has both a graphical and a content mode interface.  Suse's YAST or YAST2 is a holding nothing back one design device.  Mandrake/Mandriva accompanies a Network and Internet Configuration Wizard, which is ideally begun up from Mandrake's Control Center.  On Gnome frameworks: elf system inclinations.  On KDE frameworks: knetworkconf.  Your framework documentation gives a lot of guidance and data about accessibility and utilization of apparatuses.  Data that you should give:  For interfacing with the nearby system, for occurrence with your home PCs, or at work: hostname, domainname and IP address. In the event that you need to set up your own particular system, best do some all the more perusing first. At work, this data is liable to be given to your PC consequently when you boot it up. If all else fails, it is better not to indicate any data than making it up.  For interfacing with the Internet: username and secret key for your ISP, phone number when utilizing a modem. Your ISP generally naturally doles out you an IP l
  •  
    This Linux instructional exercise covers TCP/IP organizing, system organization and framework design nuts and bolts. Linux can bolster various system gadgets. The gadget names are numbered and start at zero and tally upwards. For instance, a PC running two ethernet cards will have two gadgets marked/dev/eth0 and/dev/eth1. Linux system arrangement, administration, observing and framework devices are secured in this instructional exercise  All the enormous, userfriendly Linux dispersions accompany different graphical apparatuses, taking into account simple setup of the PC in a nearby system, for associating it to an Internet Service Provider or for remote access. These devices can be begun up from the charge line or from a menu:  Ubuntu setup is done selecting System->Administration->Networking.  RedHat Linux accompanies redhat-config-system, which has both a graphical and a content mode interface.  Suse's YAST or YAST2 is a holding nothing back one design device.  Mandrake/Mandriva accompanies a Network and Internet Configuration Wizard, which is ideally begun up from Mandrake's Control Center.  On Gnome frameworks: elf system inclinations.  On KDE frameworks: knetworkconf.  Your framework documentation gives a lot of guidance and data about accessibility and utilization of apparatuses.  Data that you should give:  For interfacing with the nearby system, for occurrence with your home PCs, or at work: hostname, domainname and IP address. In the event that you need to set up your own particular system, best do some all the more perusing first. At work, this data is liable to be given to your PC consequently when you boot it up. If all else fails, it is better not to indicate any data than making it up.  For interfacing with the Internet: username and secret key for your ISP, phone number when utilizing a modem. Your ISP generally naturally doles out you an IP l
munna1357

ssh key and DHCP configuration linux commands step by step - YouTube - 0 views

  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
Tim Mullins

USB Startup Disk Creator for installing any Ubuntu Linux OS Tutorial - 3 views

  •  
    Educational Video with step by step instructions on how to use the USB Startup Disk Creator for installing or running any Distribution of Ubuntu Linux OS Screencast Tutorialv
Tim M

Ubuntu Linux 10.10 Maverick Meerkat 64bit Alpha 1 Screencast Review - 0 views

  •  
    Screencast style Review video to announce the availability for testing of Ubuntu Linux 10.10 Maverick Meerkat Alpha 164bit. I demonstrate the Open Source Operating System which is still in development running as both the guest OS inside a Sun VirtualBox Virtual Machine and as the host OS
Tim M

Doctor Who City of the Daleks Wine Ubuntu Linux 64bit Tutorial Screencast Review - 0 views

  •  
    Doctor Who City of the Daleks Windows Game from BBC running with Wine 1.2 in Ubuntu Linux 10.04 64bit Lucid Lynx Tutorial Screencast Review.
Tim Mullins

Google Desktop Search on Ubuntu Linux Screencast - 0 views

  •  
    Screencast Review of Google Desktop Search running on Ubuntu Linux 9.10 64bit Karmic Koala
Tim Mullins

How to easily run Windows Apps on Linux with Wine-Doors - 1 views

  •  
    Short 2step-tutorial about how to run popular Windows applications under Linux using the program Wine-Doors.
Tim Mullins

Google Chromium Web Browser in Ubuntu Linux 9.10 Karmic Koala - 0 views

  •  
    Screencast Tutorial Video on how to use and install Google Chromium Web Browser in Ubuntu Linux 9.10 Karmic Koala 64bit, which is the development open source version of Google Chrome Web Browser. With full Adobe Flash support which makes YouTube run perfect. It\'s the same browser as Google Chrome OS which I did a Video on too. I also show the Google Toolbar in Firefox 3.5 Lots of Linux tips and tricks in this educational video
anonymous

Death of the command line revisited - 0 views

  •  
    "Death of the command line revisited Five years ago I wrote a little blurb called Death of the command line. As it happened, that article was misunderstood by many who read it - I don't know if it was my fault or theirs, but somehow many readers ended up thinking I was either predicting the demise of CLI's (Command Line Interfaces) or hoping for that demise or both. Nothing could have been farther from the truth. I remain a big fan of CLI's and use them daily. And yet, just five years later and still at risk of angering yet another batch of folk who won't read carefully, I'm going to suggest that predicting the death of the CLI may not be such a bad bet after all. What triggered this was that I happened to be doing a bit of editing to another article - Using the shell (Terminal) in Mac OS X. As I made some corrections, I thought "Nobody cares about this nowadays". That's not entirely true. That particular page still gets five thousand or more visitors every month and has even been "plussed" a few times, so obviously a few people still care. On the other hand, in the greater world of folks I run into daily, nobody uses the CLI and most don't even know that they could. But why would you use the CLI?"
jameswaltz

Desktop Support to Keep My PC Running Fast - 1 views

I have been subscribing to desktop support from OnlineDesktopSupport for almost a year already. I dit it because I need to keep my PC running fast. If I have a slow computer, I will not be able to ...

desktop support

started by jameswaltz on 12 Sep 11 no follow-up yet
Rem PC

The Best Remote PC Support I Ever Had - 1 views

The Remote PC Support Now excellent remote PC support services are the best. They have skilled computer tech professionals who can fix your PC while you wait or just go back to work or just simply...

remote PC support

started by Rem PC on 12 Sep 11 no follow-up yet
Tim Mullins

Ubuntu Netbook Remix 9.10 Install Screencast Tutorial Review - 1 views

  •  
    This editorial style review screencast tutorial podcast video from http://www.OSGUI.com Tech Show is about Ubuntu Netbook Remix (UNR) is a version of Ubuntu that has been optimized to enable it to work better on netbooks or devices with small screens. I show you how to install it step by step and then run through its features.
Tim Mullins

Ubuntu One screencast review - 0 views

  •  
    In this new video screencast tutorial from the OSGUI.com Tech Show I will show you how to use Ubuntu One in Ubuntu Linux 9.10 Karmic Koala. Ubuntu One is a storage application and service operated by Canonical Ltd and currently in public beta, the service enables users to store and sync files online and between computers. Ubuntu One has a client application that only runs on Ubuntu 9.04 and further. A free Ubuntu One account offers 2 GB of storage. Users may upgrade to 50 GB by paying a monthly fee of $10.
Graham Perrin

WineHQ - Run Windows applications on Linux, BSD and Mac OS X - 0 views

  • Run Windows applications on Linux, BSD and Mac OS X
David Corking

[squeak-dev] Re: [etoys-dev] Installing Etoys and Squeak on Ubuntu 9.04 - 0 views

  • sudo gedit /usr/bin/etoys go to line 12 add this -vm sound=OSS
    • David Corking
       
      should be -vm-sound-OSS
  •  
    This thread explains how to get the 2009 version of Etoys running on Ubuntu.
1 - 20 of 39 Next ›
Showing 20 items per page