Showing headlines posted by linuxaria
« Previous ( 1 ... 15 16 17 18 19 20 21 22 23 24 25 ... 27 ) Next »PGP tutorial
Herein resides a brief (somewhat) tutorial on creating and signing PGP keys with GPG. I’d originally intended to use this as the outline for a presentation on the subject, but decided to put it on the web so I could point people at it. The introductory section (Basics) is pretty lean, but should provide enough of a background for simple stuff. All of this is documented elsewhere on the web.
Bitfighter multi-player Indie game, needs you.
Bitfighter is a free multi-player 2-D space combat game with Robotron-like controls. It’s a team-based strategy game featuring retro vector graphics and customizable ships. It’s fast, fun, and frenetic. Bitfighter centers around creating and playing levels made by others. This is done by players hosting servers.
SSH: Tips And Tricks You Need to Know
SSH is one of the most widely used protocols for connecting to remote shells. While there are numerous SSH clients the most-used still remains OpenSSH’s ssh. There is a plethora of tips and tricks that can be used to make your experience even better than it already is. Read on to discover some of the best tweaks to your favorite SSH client.
Guide to regular expressions with examples
The regular expression, or regexp, are the most powerful, versatile and hated tool used by programmers and system administrators.
They allow to express with a few characters search for strings, characters or words, and if done well can lead to good results, but if they are wrong they can not give you any useful result, and the worst thing is that often it is difficult to understand whether or not a regepx it is written with a correct syntax to cover all the possibility.
They allow to express with a few characters search for strings, characters or words, and if done well can lead to good results, but if they are wrong they can not give you any useful result, and the worst thing is that often it is difficult to understand whether or not a regepx it is written with a correct syntax to cover all the possibility.
Pidgin: your favourite Internet Messenger or Power of Plugin
Communications are very important nowadays. But sometimes there are so many ways to communicate that people lose tracks: what, where and how. If we look at the world of instant messaging, there are 1001 protocol in the world: ICQ, QQ, GTalk, MSN to name a few. Most of them have their own clients which you can use standalone. But soon you’ll get lost between them. Isn’t it easier to use single messaging client which supports multiple messaging systems and protocols? Of course it is! That’s time for our today’s hero to come on stage. Please meet! Pidgin!
Find out what is using your swap
Have you ever logged in to a server, ran `free`, seen that a bit of swap is used and wondered what’s in there? It’s usually not very indicative of anything, or even overly helpful knowing what’s in there, mostly it’s a curiosity thing.
Linux and the financial crisis
On December 2007, the New York Stock Exchange adopted Linux. In late August 2008, we saw one of the worse worldwide stock market crash of the last hundred years. This crisis was not predicted by mainstream economists and experts. It took them by surprise and it took weeks or months before an explanation could emerge. Even to this day, there is much debate about what really caused the crisis and what makes the recovery so difficult.
Top 6 Web Vulnerability Scanner Tool
Web site security is very important because the website contain relevant information about a company and now a days website defacement is very common even a script kiddies and a new born hackers can do this. The most common vulnerability like SQL-Injection and cross site scripting lead towards the defacement.
Keep your disk clean with BleachBit
This is an utility to clean junk to free disk space and to maintain privacy deleting in a secure way files and directory.
BleachBit quickly frees disk space and tirelessly guards your privacy. Free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn’t know was there. Designed for Linux and Windows systems, it wipes clean 90 applications including Firefox, Internet Explorer, Adobe Flash, Google Chrome, Opera, OpenOffice, Safari,and more
BleachBit quickly frees disk space and tirelessly guards your privacy. Free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn’t know was there. Designed for Linux and Windows systems, it wipes clean 90 applications including Firefox, Internet Explorer, Adobe Flash, Google Chrome, Opera, OpenOffice, Safari,and more
Enable automatic security update in Debian/Ubuntu
The thought that a server update itself (and maybe even execute a reboot) is not actually something that makes me feel so confident, but it is certainly better than not applying patches to serious security bugs that could expose services to large risks.
Thoughts about Network Transparency
Every time there is an article about Wayland you can see that there a lots of uneducated comments about the “fact” that Wayland does not support network trancparency and because of that it is completely wrong to go for network trancparency. These discussions contain a lot of myths and even FUD and I consider it important to share my thoughts about these concerns as I am belonging to those who actively work to bring the benefits of Wayland to the KDE Plasma Workspaces.
Why isn’t SSL turned on by default for all websites?
There has been a lot of talking, over the past few months, about a Firefox extension called Firesheep which, in the words of author Eric Butler,
“demonstrates HTTP session hijacking attacks“.
Discussions around the Internet on the matter have been quite heated, with lots of people thanking him for his efforts in raising awareness on the security issues of modern Internet applications, and many others blaming him for making it way too easy for anyone -even people who know close to nothing regarding security- to hack into other people’s accounts on social networks, webmails and other web applications, provided some conditions are met.
“demonstrates HTTP session hijacking attacks“.
Discussions around the Internet on the matter have been quite heated, with lots of people thanking him for his efforts in raising awareness on the security issues of modern Internet applications, and many others blaming him for making it way too easy for anyone -even people who know close to nothing regarding security- to hack into other people’s accounts on social networks, webmails and other web applications, provided some conditions are met.
How to undelete files from ext3/ext4
Sometimes, especially on the command line, it happens that you delete a file or directory you didn’t really plan to delete. A second after hit enter you realize what you have done, maybe you are fast enough to stop the deletion process and save some files, but in the most cases it’s already to late, at least for some files. If you have no or a too old backup you’re screwed.
OpenELEC, a media center based on XBMC
OpenELEC is an embedded operating system built specifically to run XBMC, the open source entertainment media hub. The idea behind OpenELEC is to allow people to use their Home Theatre PC (HTPC) like any other device you might have attached to your TV, like a DVD player or Sky box.
Zentyal The Small Business Server with Linux
Zentyal, formerly known as eBox Platform, is a multi-purpose Linux Ubuntu remastered and it’s based on Ubuntu server 10.04 (LTS). It can function as a network gateway, unified threat manager, office server, infrastructure manager, and a unified communications server. The project’s source code is available under terms of the GNU General Public License. The declared goal of this software it’s to be an alternative for small and medium business to Windows.
Awesome but often unknown Linux commands and tools
I’ve been working in this industry for a while now and naturally spend a lot of time using Linux on a daily basis. This gives lots of exposure to various Linux commands and tools. That said, I am sometimes surprised when I see, often very experienced system administrators, using somewhat convoluted commands to do something relatively simple using a different tool.
The broken dreams of a Linux system administrator
After some studies, or perhaps a specialist course or presentation you’d like to start to implement in your company the best practice you have learnt, and perhaps start a new and better era for your IT department.
But it seem that something always go in the wrong way or there are unexpected difficulties that make all your plans, and dreams, fails; and after some fight you usually end saying “ok that WAS the best practice and we are sure to don’t follow it”.
This is my list of things I’ve found impossible to realize in some years of work.
But it seem that something always go in the wrong way or there are unexpected difficulties that make all your plans, and dreams, fails; and after some fight you usually end saying “ok that WAS the best practice and we are sure to don’t follow it”.
This is my list of things I’ve found impossible to realize in some years of work.
Top 5 Music Notation Apps
Roundup on 5 applications to do Music Notation, they are music engraving programs, devoted to producing the highest-quality sheet music possible.
Longomatch a sports video analysis tool
LongoMatch is a sports video analysis tool for coaches and sports scientists, to assist them on making games video analysis. It simplifies video analysis by providing a set of intuitive tools to tag, review and edit the most important plays of the game. It allows to group plays by categories and adjust their the boundaries (lead and lag time) through a timeline.
Cracking WEP/WPA/2 networks with Aircrack-ng Linux
In depth tutorial on how to use Aircrack-ng on Linux to test the security of WEP, WPA and WPA2 wireless encryption standard.
« Previous ( 1 ... 15 16 17 18 19 20 21 22 23 24 25 ... 27 ) Next »