AboutWelcome to Free Software Daily (FSD). FSD is a hub for news and articles by and for the free and open source community. FSD is a community driven site where members of the community submit and vote for the stories that they think are important and interesting to them. Click the "About" link to read more...
In Part I of this two-part tutorial we discovered options on remoting between Linux and Windows machines. Plus we setup the VNC solution on each platform. Now we'll continue by configuring our router for connections over the Internet. Additionally, we'll see how to encrypt the connections and how to remote into the native display. Let's get started!
* Part 1: Introduction to Snort intrusion detection and prevention
* Part 2: Hardware and network setup requirements
* Part 3: Installation prerequisites
* Part 4: Compiling and configuration with MySQL
* Part 5: Configuring Snort and setting up rules
* Part 6: Editing the snort.conf file
This series has been moving along rather slowly, but it's summer and there are many important things to do. Like go to the lake and take naps a lot. Nevertheless, the show must go on, so here we are at Part 3. (Here are Part 1 and Part 2.)
Part 1 of this article provided the general background a reader needs to solve problems with Linux. Part 2 of this article discussed the process of solving Linux problems. In this final part of a three-part series, we'll step through a real-world example of solving a Linux problem.
As you may recall, in the previous part (Part I) of this 13 part analytical series about GNU/Linux, I gave a little introduction about GNU/Linux in the Past and a general quick view of the transformation that GNU/Linux has made in Desktop area.
"This is the third and final part of a three-part article on the famous Awk one-liners. This part will explain Awk one-liners for selective printing and deletion of certain lines. See part one for introduction of the series..."