Tag: Urdu CBTs

Learn | Teach Open Source Technologies

Featured Video Play Icon

Urdu CBT Linux System Administration SQUID 2/15 Transparent Proxy

This is an old CBT (created in 2006). It explains how you can configure squid cache service. This video covers transparent proxy. Author: Muhammad Kamran Azeem Courtesy: http://wbitt.com

Featured Video Play Icon

Urdu CBT Linux System Administration SQUID 1/15

This is an old CBT (created in 2006). It explains how you can configure squid cache service. Author: Muhammad Kamran Azeem Courtesy: http://wbitt.com

Featured Video Play Icon

Urdu CBT System Repair 2/2

This CBT show how you can repair a broken system. Author: Muhammad Kamran Azeem Courtesy: http://wbitt.com

Featured Video Play Icon

Urdu CBT System Destruction

This CBT describes, how you would destroy / corrupt various components of a Linux system, in order to later fix them. Author: Muhammad Kamran Azeem Courtesy: http://wbitt.com

Featured Video Play Icon

Urdu CBT Linux System Administration 006 Understanding IPTables Firewall 3

This CBT explains (in detail) the linux firewall tool “IPTables”. Valid for Fedora, RHEL, CENTOS, and any other distribution derived from these. Author: Muhammad Kamran Azeem Courtesy: http://wbitt.com

Featured Video Play Icon

Urdu CBT Linux System Administration 006 Understanding IPTables Firewall 2

This CBT shows how to configure BIND domain name server (DNS) on CENTOS through CLI. Valid for Fedora, RHEL, CENTOS, and any other distribution derived from these. Author: Muhammad Kamran Azeem Courtesy: http://wbitt.com

Featured Video Play Icon

Urdu CBT Linux System Administration 006 Understanding IPTables Firewall 1

This CBT explains (in detail) the Linux Firewall tool “IPTables”. Valid for Fedora, RHEL, CENTOS, and any other distribution derived from these. Author: Muhammad Kamran Azeem Courtesy: http://wbitt.com

Featured Video Play Icon

Urdu CBT Generating and using RSA Key-Pair for key based authentication Windows and Linux

Explained in Urdu, this video explains how you can generate and use RSA key-pair to be used with SSH, for key based user authentication. Remember, you MUST protect your key with a pass-phrase of strong strength. Author: Muhammad Kamran Azeem Courtesy: http://wbitt.com

Featured Video Play Icon

Urdu CBT Linux System Administration Samba 7/7

Explained in Urdu, This CBT shows how to setup SAMBA server for file sharing, and printing. Author: Muhammad Kamran Azeem Courtesy: http://wbitt.com

Featured Video Play Icon

Urdu CBT Linux System Administration Samba 6/7

Explained in Urdu, This CBT shows how to setup SAMBA server for file sharing. Author: Muhammad Kamran Azeem Courtesy: http://wbitt.com