Language Selection

English French German Italian Portuguese Spanish

Howtos

Forget About Photoshop: Five CSS Hacks to Help You Stop Using Images

Filed under
Howtos

When you are laying out a new design for a web site, the last thing you generally want to do is create a ton of images for the layout. You might make a rounded corner or shadowed text in Photoshop, but that is wasted time if the client doesn’t like it or the website doesn’t turn out as expected.

A way through SourceForge

Filed under
Howtos

I made a simple (should be) tutorial from creating of a project until releasing it on SourceForge.net

Qt for beginners

Filed under
Howtos

I made some tutorials how to use the Qt Creator and how to begin with Qt. Also a example how to convert binary numbers into decimal and back.

Ubuntu's way to get bleeding edge kernel

Filed under
Howtos

Ubuntu’s release cycle is 6 months. Though this seems to be aggressive cycle, it is not enough for someone who depends on bleeding edge kernel which may support some new hardware or damn smart feature. In this scenario you need to wait till next release of ubuntu, if you are not comfortable in downloading the vanilla kernel...

How to add Awn main menu applet in AWN 0.3.2

Filed under
Howtos

The latest Awn 0.3.2 has seen a few applets been removed, one of them being the good old AWN main menu. This is a quick guide to run it in the new 0.3.2

Could not boot into XP from GRUB and how i found a work around

Filed under
Howtos

First, GRUB was erased. After fixing it, XP did not boot from GRUB owing to ‘ERROR 12′. Lastly, How I could fix both, rather discovered work-around for some part. I am a newbie yet and see if I've done justice to the solution.

“Can’t locate module” Error in Linux and Data Loss

Filed under
Howtos

When you start your Linux system, at boot time, the process may get terminated and you might come across with the following error message:
“Can't Locate Module ”
After this error message, the system does not boot and none of your data can be accessed from it.

How to do md5sum check

Filed under
Howtos

"md5sum is a computer program that calculates and verifies 128-bit MD5hashes, as described in RFC 1321. The MD5 hash (or checksum) functions as a compact digital fingerprint of a file." ~Wikipedia
In simple words, if you download a Linux Distro and the md5sum result matches the one provided by the web site, your file has practically been downloaded OK.

So, how do we do this md5sum?


Rest of article

Linux Cheat Sheets (awk, ed, sed, perl, bash, screen)

Filed under
Howtos

I have made several linux cheat sheets to speed up the learning process of some tools.

Recently I decided to put them on my blog.

Here is a link to all the cheat sheets on my blog:
cheat sheets at catonmat (my blog)

They include:

How to get SLAB working with SMART

Filed under
Howtos

If i had to name one thing that i sincerely hate about openSUSE, it'd have to be YaST's package manager with its zypper backend, so, as you may have guessed from the title, i use Smart instead, and i don't think i'm the only one here.

Syndicate content

More in Tux Machines

Games: Ostriv, Back to Bed, EVERSPACE, Hiveswap: Act 1

Openwashing and Microsoft FUD

BlueBorne Vulnerability Is Patched in All Supported Ubuntu Releases, Update Now

Canonical released today new kernel updates for all of its supported Ubuntu Linux releases, patching recently discovered security vulnerabilities, including the infamous BlueBorne that exposes billions of Bluetooth devices. The BlueBorne vulnerability (CVE-2017-1000251) appears to affect all supported Ubuntu versions, including Ubuntu 17.04 (Zesty Zapus), Ubuntu 16.04 LTS (Xenial Xerus) up to 16.04.3, Ubuntu 14.04 LTS (Trusty Tahr) up to 14.04.5, and Ubuntu 12.04 LTS (Precise Pangolin) up to 12.04.5. Read more

Security: Updates, 2017 Linux Security Summit, Software Updates for Embedded Linux and More

  • Security updates for Tuesday
  • The 2017 Linux Security Summit
    The past Thursday and Friday was the 2017 Linux Security Summit, and once again I think it was a great success. A round of thanks to James Morris for leading the effort, the program committee for selecting a solid set of talks (we saw a big increase in submissions this year), the presenters, the attendees, the Linux Foundation, and our sponsor - thank you all! Unfortunately we don't have recordings of the talks, but I've included my notes on each of the presentations below. I've also included links to the slides, but not all of the slides were available at the time of writing; check the LSS 2017 slide archive for updates.
  • Key Considerations for Software Updates for Embedded Linux and IoT
    The Mirai botnet attack that enslaved poorly secured connected embedded devices is yet another tangible example of the importance of security before bringing your embedded devices online. A new strain of Mirai has caused network outages to about a million Deutsche Telekom customers due to poorly secured routers. Many of these embedded devices run a variant of embedded Linux; typically, the distribution size is around 16MB today. Unfortunately, the Linux kernel, although very widely used, is far from immune to critical security vulnerabilities as well. In fact, in a presentation at Linux Security Summit 2016, Kees Cook highlighted two examples of critical security vulnerabilities in the Linux kernel: one being present in kernel versions from 2.6.1 all the way to 3.15, the other from 3.4 to 3.14. He also showed that a myriad of high severity vulnerabilities are continuously being found and addressed—more than 30 in his data set.
  • APNIC-sponsored proposal could vastly improve DNS resilience against DDoS