Category: Tutorials

0

Linux analysis of execution time with time

On Linux, the time command can be used to measure the execution time for a command line program. This article shows this with the example of the updatedb program. call The timecommand is simply given before the program...

0

Varnish Web accelerator

Varnish is a web accelerator (reverse proxy), which provides relief for the actual web server (the backend). It has been designed from the ground up just for this use, unlike traditional proxies (eg Squid). The project...

0

Network configuration in Debian

This article gives an overview of how the network configuration in Debian can be stored and modified in the configuration file / etc / network / interfaces . Automatic activation at startup In order for certain interfaces to be activated automatically...

0

Installing Synology Assistant on Ubuntu

This article shows how to install Synology Assistant on Ubuntu . The Synology Assistant is a small tool to disk or RackStations to locate the local network. It facilitates the commissioning of a new NAS and connects after entering the user information to the...

0

Unlock full-encrypted system via SSH

A complete encryption of your own system is an excellent way to ensure the confidentiality of your own data. The current Ubuntu installer offers a guided installation to encrypt the entire system with ” encrypted LVMs “. For...

0

Restrict executable SSH commands with authorized keys

The OpenSSH Secure Shell Server provides secure, encrypted remote access to Linux and Unix systems. The server side is the file authozired_keys in .ssh a user’s primary folder to configure a public-key authentication . Normally, a user gets full access to the system where the authentication...