Language Selection

English French German Italian Portuguese Spanish

Today's Howtos, Tips, Tutorials:

Filed under
HowTos

Like most people, I have a fairly sizeable collection of audio files stored on my hard disk in .mp3 or .ogg format - music, copies of interviews, podcasts and old radio shows. Which is great for my MP3 player and my laptop computer, but it isn't any good for my basic standalone CD player which doesn't have a clue how to play MP3 files. So until I get a better CD player I use a simple technique to create audio CDs that all CD players can handle.

I started using this technique a couple of years ago and despite a recent spate of free software applications for Linux that can pretty much do the same by simply pointing and clicking, I still find myself reverting to the command line.

Creating audio CD compilations on Linux


phpSysInfo is a customizable PHP script that parses various files in /proc and displays them. It will display information about system facts like Uptime, CPU, Memory, SCSI, IDE, PCI, Ethernet, Floppy, and Video. It now has full internationalization support along with customizable templates.

Phpsysinfo Requirements

Web server (apache2) with php4 or later support

Installing phpsysinfo in Ubuntu

sudo apt-get install phpsysinfo

After completion of your installation this program automatically located at apache2 default document root directory i.e /var/www/phpsysinfo/ folder

Display Your system Information (Uptime,CPU,Memory,SCSI,IDE,PCI,Ethernet,Floppy,and Video) Using Phpsysinfo


Errors like these:

libGL error: open DRM failed (Operation not permitted)
libGL error: reverting to (slow) indirect rendering

can occur when the xorg.conf file is hand-edited to add or uncomment the lines:

Load "glx"
Load "dri"

...while the following section is either missing, or commented out:

Section "DRI"
Mode 0666
EndSection

libGL error: open DRM failed (Operation not permitted)


Rainlendar is a calendar application that doesn’t take up much space on your desktop. You can use it to keep track of events and tasks, and with the pro version you even can sync with network calendars.

Installing rainlendar on ubuntu is extremely simple. Just download the file and extract it wherever you feel like.

Installing Rainlendar2 on Ubuntu


Shadow passwords have been a de facto standard with Linux distributions for years, and as well as the use of md5 passwords. However, there are drawbacks to using the traditional shadow password method, and even md5 is not as secure as it used to be. One drawback to the shadow password file is that any application that requires looking up a single shadow password (i.e., your password) also can look at everyone else's shadow passwords, which means that any compromised tool that can read the shadow file will be able to obtain everyone's shadow password.

There is an alternative to shadow, called tcb, available from the tcb home page written by the Openwall Project. Migrating to tcb is fairly straightforward, although it can take a bit of work. Because only Openwall GNU/*/Linux, ALT Linux, and Annvix support tcb out-of-the-box, to get tcb support in your chosen distribution, you will have to recompile and patch a few programs.

Migrating from shadow passwords to tcb in Linux


There are many articles on the Interwobble telling you how to set the process title on Linux; they all concentrate on the problem of placing an arbitrarily long string in argv[0] to report status information in the process list.

But what if argv[0] is fine, and what you want to do is remove the following arguments from the process list? Perhaps they contain sensitive information, or perhaps they’re just likely to be surprising.

A fictional example may look like this:

Hiding arguments from ps


Open SSH is the most widely used SSH server on Linux. Using SSH, one can connect to a remote host and gain a shell access on it in a secure manner as all traffic is encrypted.

A neat feature of open SSH is to authenticate a user using a public/private key pair to log into the remote host. By doing so, you won't be prompted for the remote user's password.

This tutorial will describe how to create a SSH public/private key pair, how to enable key based authentication and finally how to disable password authentication.

Secure your SSH server with Public/Private key authentification


Image manipulations can be done through command lines. Most of the time, we use GUI software such as GIMP to manipulate graphics, but sometimes it is not convenient to use such huge tool to just perform some simple image manipulation such as resize. Image Magick and Graphics Magick gives us various of command line on image manipulation. In this post, I am going to show you a simple example on how to convert a image from one format to another and simultaneously resize it.

convert-wallpaper-format-and-size-examples


More in Tux Machines

Linux Mint 18.1 Is The Best Mint Yet

The hardcore Linux geeks won’t read this article. They’ll skip right past it… They don’t like Linux Mint much. There’s a good reason for them not to; it’s not designed for them. Linux Mint is for folks who want a stable, elegant desktop operating system that they don’t want to have to constantly tinker with. Anyone who is into Linux will find Mint rather boring because it can get as close to the bleeding edge of computer technology. That said, most of those same hardcore geeks will privately tell you that they’ve put Linux Mint on their Mom’s computer and she just loves it. Linux Mint is great for Mom. It’s stable, offers everything she needs and its familiar UI is easy for Windows refugees to figure out. If you think of Arch Linux as a finicky, high-performance sports car then Linux Mint is a reliable station wagon. The kind of car your Mom would drive. Well, I have always liked station wagons myself and if you’ve read this far then I guess you do, too. A ride in a nice station wagon, loaded with creature comforts, cold blowing AC, and a good sound system can be very relaxing, indeed. Read more

Make Gnome 3 more accessible for everyday use

Gnome 3 is a desktop environment that was created to fix a problem that did not exist. Much like PulseAudio, Wayland and Systemd, it's there to give developers a job, while offering no clear benefit over the original problem. The Gnome 2 desktop was fast, lithe, simple, and elegant, and its replacement is none of that. Maybe the presentation layer is a little less busy and you can search a bit more quickly, but that's about as far as the list of advantages goes, which is a pretty grim result for five years of coding. Despite my reservation toward Gnome 3, I still find it to be a little bit more suitable for general consumption than in the past. Some of the silly early decisions have been largely reverted, and a wee bit more sane functionality added. Not enough. Which is why I'd like to take a moment or three to discuss some extra tweaks and changes you should add to this desktop environment to make it palatable. Read more

When to Use Which Debian Linux Repository

Nothing distinguishes the Debian Linux distribution so much as its system of package repositories. Originally organized into Stable, Testing, and Unstable, additional repositories have been added over the years, until today it takes more than a knowledge of a repository's name to understand how to use it efficiently and safely. Debian repositories are installed with a section called main that consists only of free software. However, by editing the file /etc/apt/sources.list, you can add contrib, which contains software that depends on proprietary software, and non-free, which contains proprietary software. Unless you choose to use only free software, contrib and non-free are especially useful for video and wireless drivers. You should also know that the three main repositories are named for characters from the Toy Story movies. Unstable is always called Sid, while the names of Testing and Stable change. When a new version of Debian is released, Testing becomes Stable, and the new version of Testing receives a name. These names are sometimes necessary for enabling a mirror site, but otherwise, ignoring these names gives you one less thing to remember. Read more

Today in Techrights