Ubuntu blogs

Azureus - A Nice Java BitTorrent Client

Azureus implements the BitTorrent protocol using java language and comes bundled with many invaluable features for both beginners and advanced users.Azureus offers multiple torrent downloads, queuing/priority systems (on torrents and files), start/stop seeding options and instant access to numerous pieces of information about your torrents. Azureus now features an embedded tracker easily set up and ready to use.

Full Story

Web,Streaming,ftp or mail server Logs analyzer Using Awstats

AWStats is a free powerful and featureful tool that generates advanced web, streaming, ftp or mail server statistics,graphically. This log analyzer works as a CGI or from command line and shows you all possible information your log contains, in few graphical web pages. It uses a partial information file to be able to process large log files, often and quickly. It can analyze log files from all major server tools like Apache log files (NCSA
combined/XLF/ELF log format or common/CLF log format), WebStar, IIS (W3C log format) and a lot of other web, proxy,wap, streaming servers,mail servers and some ftp servers.

Full Story

Retrieving Emails From Remote Servers With fetchmail (Debian Etch)

Fetchmail is a program for retrieving emails from remote servers. Imagine you have five email accounts on five different servers. Of course, you do not want to connect to each of them to get your emails. This is where fetchmail comes into play. If you have a user account on a Linux server, you can make fetchmail download emails from remote servers and put them into just one mailbox (the one of your Linux user), from where you can retrieve them with your email client (e.g. Thunderbird or Outlook). http://www.howtoforge.com/debian_etch_fetchmail


 What book will teach me 7.04 stuff?Thanks

Apache: Creating A Session-Aware Loadbalancer Using mod_proxy_balancer (Debian Etch)

mod_proxy_balancer is an Apache module that lets you create a loadbalancer. This loadbalancer retrieves requested pages from two or more backend webservers and delivers them to the user's computer. An important feature of mod_proxy_balancer is that it keeps track of sessions so that a single user always deals with the same backend webserver. http://www.howtoforge.com/load_balancing_apache_mod_proxy_balancer

nBox - Envision your network with nBox (Embedded Ntop)

The life of a systems or network administrator requires us to maintain an expansive understanding of our network infrastructure to more effectively manage it. Amidst volumes of complex data that some IT problems present and network management is no exception to these complications. Visual tools allow us to better see trends and make sense of the macro view of our networks. Ntop, nBox, nProbe are just the right FOSS tools that can help us gain greater insight. http://www.howtoforge.com/network_monitoring_with_nbox

Fixing a scanner broken by the Feisty upgrade

If you have been using a USB scanner and upgrade from Edgy to Feisty, you may find that your scanner no longer works.You can use this fix to solve your scanner problem.

Full Story

Filesystem Encryption Tools for Linux

Crypto filesystems keep your data safe – even if someone steals your computer.Linux offers a number of encrypted filesystem options – each with a different approach to the encryption problem.Encrypted filesystems may be overkill for family photos or your résumé, but they make sense for network-accessible servers that hold sensitive business documents, databases that contain credit-card information, offline backups, and laptops.

Full Story

Using Ruby On Rails With Apache2 On Debian Etch

This article shows how you can install Ruby on Rails (RoR) and integrate it in Apache2 on a Debian Etch system. Ruby on Rails is a web application framework which is rapidly gaining popularity among web programmers. It aims to increase the speed and ease with which database-driven web sites can be created and offers skeleton code frameworks (scaffolding) from the outset. Applications using the RoR framework are developed using the Model-View-Controller design pattern. http://www.howtoforge.com/ruby_on_rails_debian_etch

Howto Setup Dual Monitors with NVidia in Ubuntu

This tutorial explains how to setup Dual Monitors with NVidia in Ubuntu.It’s quite a pain to get dual monitors working your first time using Linux, however I hope this guide will make the process relatively quick and painless.

Full Story

Howto Change Default text editor in Debian Etch

By Default Debian Etch Provides the nano editor you need to follow this procedure.In this example i want to use vi editor as my default editor.This is Veryuseful if you want to change Default editor to your own choice.

Full Story

QoS And Traffic Shaping For VoIP Users Using iproute2 And Asterisk

The quality of my VoIP phone calls suffered whenever I was downloading or uploading anything. This was irritating, especially for those calling me (I heard them better than they heard me). So I poked at Iproute2 and other howtos, especially with regard to VoIP traffic, but I couldn't find anything that worked well. After some playing around, I've found settings that were right for me: consistant VoIP quality, regardless of any activities on the wire. http://www.howtoforge.com/voip_qos_traffic_shaping_iproute2_asterisk


I got my free 7.04 cd in the mail saturday, and I bought a $30 'puter from goodwill. i got the net up on this using linux. I am still learning and installing stuff. Much cheaper than an MS machine with Vista.

Thanks Ubuntu!

Secure Websites Using SSL And Certificates

This article will guide you through the entire process of setting up a secure website using SSL and digital certificates. This guide assumes that you already have a fully functional (and configured) server running Apache, BIND, and OpenSSL. Just as a side note, this guide was written based on a Fedora Core 6 distribution, but should be the same for most other distros out there. http://www.howtoforge.com/secure_websites_using_openssl_and_apache

Don't forget - Microsoft is a convicted criminal organization

Most harmful of all is the message that Microsoft's actions have conveyed to every enterprise with the potential to innovate in the computer industry. Through its conduct toward Netscape, IBM, Compaq, Intel, and others, Microsoft has demonstrated that it will use its prodigious market power and immense profits to harm any firm that insists on pursuing initiatives that could intensify competition against one of Microsoft's core products. Microsoft's past success in hurting such companies and stifling innovation deters investment in technologies and businesses that exhibit the potential to threaten Microsoft. The ultimate result is that some innovations that would truly benefit consumers never occur for the sole reason that they do not coincide with Microsoft's self-interest.