A Quick Guide To Install SUBVERSION

Subversion depends on a number of third party tools and libraries.Some of them are only required to run a Subversion server; others are necessary just for a Subversion client. This section explains what other tools and libraries will be required so that Subversion can be built with the set of features you want

How to Support Compressed RAR File Types in Fedora

This entry aims to address file handling of RAR file types. If you are receiving this type of files from your inbox, you can configure your fedora linuxsystem to support RAR compressed file types. Fedora repository supports rpm package designed to handle and uncompressed RAR file types via unrar rpm package. UnRAR Installation – Support(…)

How to run a PHP script on cron

Lots of programmers like PHP for its ability to code and develop web applications fast. Code-debugging is a lot easier than with PERL or C. However, there is one thing a lot of developers are puzzled about, “How to run PHP Scripts with crontab?” Cron is normally available on all Unix and Linux distributions; if(…)

How to Install JIRA Standalone under Linux with MySQL

JIRA is an issue-tracking project management tool made by Atlassian. It is primarily used by the Second Life open source community and may be referred to as the “Public JIRA”, “PJIRA”, or just “JIRA”, depending on the context. There is a script available to install JIRA on linux system ,  It will take only 5(…)

How to Verify that NFS is running

This says that we have NFS versions 2 and 3, rpc.statd version 1, network lock manager (the service name for rpc.lockd) versions 1, 3, and 4. There are also different service listings depending on whether NFS is travelling over TCP or UDP. Linux systems use UDP by default unless TCP is explicitly requested; however other OSes such as Solaris default to TCP.

How to install BIND 9.3.0 on a clean Fedora Core 2 system

In retrospect this was surprising (since we had not requested any DNS software during the FC2 installation procedure – FC2 install was kind enough to do it anyway) and perhaps we should have removed this version before installing since we ended up with -in our view – an incomplete installation. We may have had a complete install if we had done this – maybe not. We issued the following command to upgrade the installation:

How to Use User Accounting to discover information on Linux Box

User accounting can be used to discover information about who is currently using the system. While you cannot necessarily verify the integrity of this information once your machine has been exploited, it can be a useful tool to track the systems a particular user has logged into, what time he or she logged in, when(…)

How to Monitor Network Services with TCP Wrappers in Linux

Most Linux distributions ship with tcp_wrappers “wrapping” all your TCP services. A tcp_wrapper (known as /usr/sbin/tcpd) is invoked from/sbin/inetd instead of the real service, such as telnet or ftp. tcpd then checks the host that is requesting the service and either executes the real server or denies access from that host. tcpd allows you to restrict access to your tcp services. You should make(…)

How to Disable Unnecessary and Unauthorized Services in Linux

Before you put your Linux system on ANY network the first thing to look at is what services you need to offer. Services that you do not need to offer should be disabled so that you have one less thing to worry about and attackers have one less place to look for a hole. You(…)

How to Bypass a Forgotten Root Password

It’s never happened to me, but I’m sure it’s happened to others. The root password is gone. Forgotten. Changed maliciously. Mysteriously gone. The Linux Gazette has a great article on the three most common ways to deal with this situation. It’s important to note that there’s no way to actually recover the password, but you can change(…)