Showing headlines posted by bob
« Previous ( 1 ... 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 ... 1175 ) Next »Google catches Indian Government Agency with Fake Digital Certificates
Google has identified and blocked unauthorized digital certificates for a number of its domains issued by the National Informatics Centre (NIC) of India, a unit of India's Ministry of Communications and Information Technology.
Android: Number one, with a bullet
Android is well on its way to being the most popular end-user operating system of all.
DNF and Mailing List Wars, F21 Branch, FESCo Election, Python 3.5, and Docs Beats (5tFTW 2014-07-08)
Fedora is a big project, and it’s hard to follow it all. This series highlights interesting happenings in five different areas every week. It isn’t comprehensive news coverage — just […]
How to use systemd for system administration on Debian
Soon enough, hardly any Linux user will be able to escape the ever growing grasp that systemd imposes on Linux, unless they manually opt out. systemd has created more technical, emotional, and social issues than any other piece of software as of late. This predominantly came to show in the heated discussions also dubbed as […]Continue reading...
The post How to use systemd for system administration on Debian appeared first on Xmodulo.
No related FAQ.
Zoneminder CCTV tutorial
Keep track of what’s going on with one of the most advanced CCTV servers around
How to configure a NFS server and mount NFS shares on Ubuntu 14.04
How to configure a NFS server and mount NFS shares on Ubuntu 14.04
Network File System (NFS) is a popular distributed filesystem protocol that enables users to mount remote directories on their server. The system lets you leverage storage space in a different location and write onto the same space from multiple servers in an effortless manner. It, thus, works fairly well for directories that users need to access frequently. This tutorial explains the process of mounting NFS share on an Ubuntu 14.04 server in an simple and easy-to-follow steps.
News: Linux Top 3: Distrowatch, Deepin 2014 and the NSA
There seems to be a never-ending stream of Linux distributions based on Ubuntu 14.04 and you can add Deepin 2014 to that list. Instead of just using GNOME, KDE, LXDE or Xfce, Deepin has built its own desktop environment which has a definitive Mac OS X feel.
Free Red Hat clone CentOS-7 is full of Linux Container love
The CentOS Project has announced general availability of CentOS-7, the first release of the free Linux distro based on the source code for Red Hat Enterprise Linux (RHEL) 7.
Dolphins in the NSA Dragnet
There's an old quote from Jamie Zawinkski that goes: "Some people, when confronted with a problem, think ‘I know, I'll use regular expressions.’ Now they have two problems." Even people like me who like regular expressions laugh at the truth in that quote, because we've seen the consequences when someone doesn't think through the implications of a poorly written pattern. When some people write a bad pattern, they end up with extra lines in a log file. When the NSA does it, they capture and retain Internet traffic on untold numbers of innocent people.
How to configure Automatic Updates On Debian Wheezy
How to configure Automatic Updates On Debian Wheezy
This tutorial shows how to configure a Debian Wheezy system to have package updates installed automatically without user interaction. In addition to that I will show you what needs to be done to have the system email you about available updates on a daily basis.
Open source's identity crisis
For Karen Sandler, software freedom isn't simply a technical matter. Nor is it a purely ideological one.
It's a matter of life and death.
read more
How to set up two-factor authentication for SSH login on Linux
With many high-profile password leaks nowadays, there is a lot of buzz in the industry on "multi-factor" authentication. In a multi-factor authentication system, users are required to go through two distinct authentication procedures: providing something they know (e.g., username/password), and leveraging something they have "physical" access to (e.g., one-time passcode generated by their mobile phone). […]Continue reading...
The post How to set up two-factor authentication for SSH login on Linux appeared first on Xmodulo.
Related FAQs:
How to diff remote files over ssh
How to create a secure incremental offsite backup in Linux with Duplicity
How to access ssh terminal in web browser on Linux
How to enable user authentication for a Postfix SMTP server with SASL
How to set up Samba as a Primary Domain Controller
Build the best Linux desktop
There's never one desktop that appeals to everyone but here's some of the best to customise.
Open source tools: Five outstanding audio editors
Whether you're producing podcasts or creating highly sophisticated sound recordings, one of these open source apps will suit your needs.
Linux Foundation introduces Linux for cars
The connected car is shifting into high gear, and the Linux Foundation wants an open-source platform in the pole position. The non-profit consortium recently announced the debut of Automotive Grade Linux (AGL), a customizable, open-source automotive software stack with Linux at its core. There have been Linux-based car systems before. The difference here is that the Linux Foundation is pushing AGL as the core automotive system for developers—the groundwork, as opposed to a production-ready system like Ford Sync or QNX. As Debian Linux is to Ubuntu, so the AGL aims to be for a future in-car system from the Hyundais and Toyotas of the world.
Is There a Second NSA Leaker Besides Edward Snowden?
A very interesting question has come out regarding a story on the NSA's targeting of those who utilize internet privacy tools, specifically the browser Tor (The Onion Router) and portable Linux based operating system Tails (The Amnesic Incognito Live System) as potential "terrorists" and "extremists". The question being is that the copy of the XKeyscore code published by German website Das Erste apparently was not a part of the collection of NSA documents procured by whistleblower Edward Snowden but may actually have come from a second leaker. If true this would be a bombshell as well as a game-changer that could reverberate throughout the world and shake the US national surveillance state to its very roots.
Linux OS Gets New In-Car Interface: 'Automotive Grade Linux' Launched
A common, Linux-based software platform for the ‘connected car’ is one step closer, with the release of Automotive Grade Linux (AGL) this week. AGL claims to be the industry’s only ‘fully open’ automotive platform, allowing carmakers to use a standardised single base upon which to build their own user experiences.
Big data influencer on how R is paving the way
The R programming language is used for data visualization and expermiental analysis for the likes of Facebook and has a rapidly growing user base of more than two million. What began in 1995 as an open source academic research tool has evolved for use among commercial and industrial businesses around the world.
read more
TI spins Cortex-A9 Sitara SoC
TI unveiled a 1GHz, Cortex-A9 Sitara “AM437x” SoC with a 3D GPU, a Linux SDK, and an updated PRU module for dual simultaneous control of fieldbus protocols. The Sitara AM437x is a major upgrade to the Texas Instruments Sitara AM335x, as well as the related Sitara AM3715 and Sitara AM3874. The Sitara AM437x is said […]
Are you an extremist?
Since the news broke yesterday that we are an extremist publication according to the NSA, we at Linux Journal have thought a lot about what that might mean to our readers.
« Previous ( 1 ... 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 ... 1175 ) Next »