Tutorial

16/06/2016
Print Friendly, PDF & Email

irssi : Startup HOWTO

To new Irssi users (not to new IRC users ..) Copyright (c) 2000-2002 by Timo Sirainen, release under GNU FDL ...
Lire La Suite

TransmissionHowTo

Transmission Command Line The BitTorrent protocol can be used to reduce the server and network impact of distributing large files ...
Lire La Suite

How to make a bootable OS X 10.10 Yosemite install drive

Source: Macworld Back in the day when we bought OS X on discs, as long as you kept that disc, ...
Lire La Suite

Protect WordPress sites with .htaccess

Plug-ins Our job as WordPress users (aside from contributing to the WordPress community) is keeping our installs safe from people ...
Lire La Suite

HowTo : Change Locale (Language and Character Set) in Linux

Locales are used in Linux to define which language and character set (encoding) the user uses. In this article, I'll ...
Lire La Suite

Ubuntu Tip:How to Connect/disconnect VPN from the command line

Source: ubuntugeek.com This tutorial will explain How to Connect/disconnect VPN from the command line If you want to interact with ...
Lire La Suite

Utiliser une clé Wifi sur le Raspberry pi

Il existe deux moyens de connecter le Raspberry PI à internet, sois vous utilisez un câble Ethernet, sois une clé ...
Lire La Suite

Port Knocking : sécuriser l’accès à un port

source: http://doc.ubuntu-fr.org/port-knocking Le port-knocking est une méthode permettant de modifier le comportement d'un firewall en temps réel pour provoquer l'ouverture ...
Lire La Suite

Supervision de postfix via mailgraph avec le plugin check_mailstat.pl via Nagios/Centreon

Source:  l'admin sous GNU/Linux - blog libre Voici une procédure permettant de contrôler l’activité d’un serveur de messagerie postfix via ...
Lire La Suite

Howto: Performance Benchmarks a Webserver

source: nixCraft You can benchmark Apache, IIS and other web server with apache benchmarking tool called ab. Recently I was ...
Lire La Suite

Howto: Geolocation for Fail2ban

source: fail2ban.org Using geolocation to locate your attackers. I use fail2ban on my servers to protect them from would-be attackers, if ...
Lire La Suite

Comment créer un tunnel SSH inverse

Parfois que nous avons besoin de vous connecter via SSH à un autre ordinateur, nous trouvons que cet ordinateur que ...
Lire La Suite

8 Practical Examples of Linux Xargs Command for Beginners

The Linux xargs command may not be a hugely popular command line tool, but this doesn't take away the fact that it's extremely ...
Lire La Suite
iptables-save

How to save rules of the iptables?

On a server, iptables rules don't reload automatically at reboot. You need to reload the rules using ax executable shell scripture a ...
Lire La Suite

How to Disable Webcam / FaceTime Camera on Mac Completely

Source: osxdaily.com Some of the more privacy conscious Mac users out there might put tape over their webcam or use apps like Oversight ...
Lire La Suite

HowTo: The Ultimate Logrotate Command Tutorial with 10 Examples

Managing log files effectively is an essential task for Linux sysadmin. In this article, let us discuss how to perform ...
Lire La Suite
Les commentaires sont fermés.