Updated: Mar 2003. A compilation of all the possible boot time arguments that can be passed to the Linux kernel at boot time. Includes all kernel and device parameters.
Updated: Nov 2001. Aims at making the fine-tuning of your newly installed Linux box quicker and easier. You will find a set of configurations for the most common applications and services.
Updated: Jan 2004. Demonstrates how to use command-line tools to configure your Debian system for printing. It explains how to send documents from Linux to Windows printers and how to share Linux printers with Windows PCs.
Updated: Jan 2004. Describes why you should use jigdo (a tool for obtaining Debian ISOs), a little bit about how it works and how you use it to get and update Debian ISOs.
Updated: Dec 2003. Describes how to build, install, and configure LVM for Linux.
MultiOS-HOWTO, Managing Multiple Operating Systems HOWTO
Updated: Feb 2000. Covers the procedures for using removable hard disks to install and manage multiple alternative operating systems while leaving a single fixed disk to permanently house and protect the primary operating system.
Updated: Aug 2003. How to enable file system quota on a Linux host, assigning quota for users and groups, as well as the usage of miscellaneous quota commands.
Updated: Aug 1997. Discusses some issues associated with the benchmarking of Linux systems and presents a basic benchmarking toolkit.
CSPM-HOWTO, Complete System Performance Monitor HOWTO
Updated: Jun 2003. Provides an overview of the Complete System Performance Monitor, including a description of the product and installation and configuration information.
Updated: Nov 1998. Introduces the Beowulf Supercomputer architecture and provides background information on parallel programming, including links to other more specific documents.
Updated: Oct 2003. A brief description of a standard way to set up and work with a computer network for a small group of people that is inexpensive to build, easy to administer, and relatively safe.
SSI-UML-HOWTO, Creating SSI Clusters Using UML HOWTO
Updated: May 2002. A description of how to create a Single System Image (SSI) cluster of virtual User-Mode Linux (UML) machines.
Updated: Aug 1997. How to use a Linux-compatible tape drive installed on an MS-DOS machine to back up the filesystem of a Linux machine.
Clone-HOWTO, HOWTO Clone Disk Images on Linux Booted from a Network
Updated: Sep 2002. Describes a setup that allows a machine to boot Linux from BOOTP/TFTP, using the Grub boot loader, and save and restore disk and partition images to and from a TFTP server.
Updated: Dec 2003. A step-by-step tutorial on how to back up a Linux computer so as to be able to make a bare metal recovery, and how to make that bare metal recovery. Includes some related scripts. "Bare metal recovery" is the process of rebuilding a computer after a catastrophic failure.
Updated: Nov 2000. Describes a straight forward way of recovering whole directory structures, instead of file by file, that have been removed by a misplaced rm -rf
Updated: Dec 2003. A step-by-step tutorial on how to back up a Linux computer so as to be able to make a bare metal recovery, and how to make that bare metal recovery. Includes some related scripts. "Bare metal recovery" is the process of rebuilding a computer after a catastrophic failure.
Updated: Jan 2004. Eplains how to create encrypted file systems using the Cryptoloop functionality. Cryptoloop is part of the CryptoAPI in the 2.6 Linux kernel series.
Updated: Dec 2003. A method is described for encrypting a hard disk, either in whole or in part, with the encryption key stored on an external medium for increased security.
Updated: Oct 2000. Outlines the things you will probably have to do when you want to setup a network of computers under your own domain. Covers configuration of network parameters, network services, and security settings.
Updated: Feb 2000. Designed to describe the basics of firewall systems and give you some detail on setting up both a filtering and proxy firewall on a Linux based system.
Updated: Jul 2000. How to obtain, install and configure the enhanced IP firewalling chains software for Linux, and some ideas on how you might use them.
Updated: Feb 2002. Describes how to configure Snort version 1.8.3 to be used in conjunction with the statistical tools ACID (Analysis Console for Intrusion Databases) and SnortSnarf.
Term-Firewall, Using Term to Pierce an Internet Firewall
Archived - Last Update: Jul 1996. Directions for using ``term'' to do network stuff through a TCP firewall that you're not supposed to be able to.
Updated: May 2000. Explains how user and group information is stored and how users are authenticated on a Linux system (PAM), and how to secure you system's user authentication.