Language Selection

English French German Italian Portuguese Spanish


some howtos:

Filed under
  • The mystery behind LUN (Logical Unit Number)
  • Easy Samba Sharing Setup with KDE
  • How to Choose a Partition Scheme for Your Linux PC
  • BTTB: looping for shell script under embedded linux
  • Change Bootsplash In Fedora 14
  • How to change network card speed and duplex settings in ubuntu
  • Apache, Authentication and MySQL
  • Convert DEB to RPM (RPM to DEB) Package Using Alien Command
  • Easily Find Subtitles for Any Video with Periscope
  • Install Galaxy Live Wallpaper Compiz Plugin On Ubuntu 10.10
  • Resize, Rename and Convert Images on Linux - EasyImageSizer
  • Using Variables With awk
  • Which Linux® or UNIX® Version Am I Running?

some howtos:

Filed under
  • OpenOffice Bug-- Stuck in Document Recovery Loop
  • MouseControl, Do More With The Mouse In Firefox
  • Get rid of unwanted and duplicate entries in “Open With” in Linux
  • [SOLVED] “No packages with the requested plugins found” in Debian
  • Decorate Grub 2 boot loader with Burg-Manager (GUI for Burg)
  • Navigating and Working in Scribus
  • How to create database on MySQL
  • Create a foggy window in Blender
  • Emacs in the real world – part 3
  • Useful PHP date period functions
  • Server monitoring by Monit and Munin
  • Declaring Variables in Bash Shell Scripting
  • Enhance screen with Byobu's cool functionality
  • Use byobu for extended features in your terminal window
  • Install CHDK on Your Canon Camera Using Linux
  • Sending commands to Xchat from the command line
  • LatencyTop - Track down latencies or lag on your Linux system
  • Create 'Internet Radio Station' With Ubuntu And Ampache

Virtual Users/Domains With Postfix, Courier, MySQL, SquirrelMail (Ubuntu 10.10)

Filed under

This document describes how to install a Postfix mail server that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I'll also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database that Postfix uses. The resulting Postfix server is capable of SMTP-AUTH and TLS and quota. Passwords are stored in encrypted form in the database. In addition to that, this tutorial covers the installation of Amavisd, SpamAssassin and ClamAV so that emails will be scanned for spam and viruses. I will also show how to install SquirrelMail as a webmail interface so that users can read and send emails and change their passwords.

some howtos & such:

Filed under
  • Save disk space by excluding useless files with dpkg
  • Explore Linux /proc File System
  • Open source programming for beginners
  • Fix Left Click not working after upgrading to Ubuntu 10.10
  • How to modify the F-Spot database
  • Firefox over ssh -X
  • How to Enable Non-ASCII Characters on Linux
  • vnc error: "Could not acquire name on session bus."
  • Extinguishing Firesheep for safe WiFi browsing
  • Roll your own 64-bit Lubuntu with Compiz
  • Delivering to a Maildir folder, but marking as read
  • Linux watch command – an alternative to at/cron/while?
  • Drupal 6: Theme Engines and Sub-themes
  • Make vmware 7.1.2 run with opensuse 11.4

today's leftovers & howtos:

Filed under
  • VLC v1.1.5 released
  • Speed Limit: 75MPH. Ubuntu: 110MPH.
  • FlBurn - Optical disc burning software for Linux
  • x2vnc
  • Linux Mint 10 manual disk partitioning guide
  • Drupal 7.0 Beta 3 released
  • Release of KGraphViewer, version 2.1.1
  • Burg manager app updated with new themes, new features
  • Quick and easy printer sharing in GNOME
  • Ubuntu 10.10 for the O2 Joggler
  • More Thoughts On Fedora 14
  • My first podcast - Switching from CentOS to Slackware
  • Linux Basement: Episode 63 - Just Us, Just News

The Perfect Server - Fedora 14 x86_64 [ISPConfig 2]

Filed under

This is a detailed description about how to set up a Fedora 14 server that offers all services needed by ISPs and hosters: Apache web server (SSL-capable) with PHP5/Ruby/Python, Postfix mail server with SMTP-AUTH and TLS, BIND DNS server, Proftpd FTP server, MySQL server, Dovecot POP3/IMAP, Quota, Firewall, etc. This tutorial is written for the 64-bit version of Fedora 14, but should apply to the 32-bit version with very little modifications as well. In the end you should have a system that works reliably, and if you like you can install the free webhosting control panel ISPConfig (i.e., ISPConfig runs on it out of the box).

today's howtos & leftovers:

Filed under
  • Firefox 4, How To Undo The Changes
  • Nautilus Extensions – Right-Click Menu to Extend Functionality
  • OpenSearch in Rekonq
  • Parsing Bazaar Logs with PHP
  • Nautilus Extensions – Add “open in terminal”,”set as wallpaper” in Menu
  • The Java crisis and what it means for developers
  • Monitoring Processes
  • kde e.v. board meeting in nijmegen
  • Turning Kate into a Prolog IDE

Ignition (a racing game) Runs on Ubuntu with Wine

Filed under
HowTos Ignition is an old racing game that is now abandonware and it runs pretty well under Wine. As it’s abandonware (the company that created it no longer exists) it’s available to download from the Internet.

some howtos:

Filed under
  • Video: Five tips for improving Linux security
  • Install OpenOffice 3.2.1 on Slackware 13.1
  • Show Weather and Set Date/Time in Ubuntu Clock panel applet
  • enable auto-login and create a guest user account on Fedora 14
  • PHP Time Of Day Script
  • Print from the command line
  • 13 Features of Regular Expressions
  • Kerberos authentication with NFSv4
  • Keep Your Files Secure On Ubuntu With Sticky Bit
  • Measure website response time through curl
  • openSUSE 11.3/SLED 11 - Integrating FreeRADIUS to LDAP Servers
  • Ant Meets MySQL

some howtos:

Filed under
  • Speed Up Firefox by Moving Your Cache to RAM
  • Linux 101: kill and killall
  • Bash Shell Variables an Introduction
  • How to install vanilla GNOME 3 in Maverick
  • Install the latest version of Shutter screenshot tool in Ubuntu
  • Introduction to Blender 2.5: Color Grading
  • More GIMP Tricks for Combining Images (part 2)
  • Geotag photos with Geotag
  • Intro to Snort
  • Working with MDB Files in Linux
  • Finding the installation date for a linux machine
  • Make A Blog Look Self-Hosted & Professional
  • How to debug Shell Scripts
  • ssh -t (open a pseudo tty) run commands on a remote server
  • How to attach a GNU screen session
  • How To Cartoonify Your Photos With GIMP
  • Ubuntu 10.10 Fix The Screen Messed up at Start-up and Shutdown
  • Searches with awk
  • How to install flash player in Fedora 14
  • Using Debian package archive as a configuration tool
Syndicate content

More in Tux Machines

today's howtos

Linux Kernel and Security: LVM2, Containers, AMD

  • LVM2 Begins Work On Major Changes To Logical Volume Management
    LVM2 as the user-space tools for Logical Volume Management (LVM) on Linux is in the process of going through a big re-work.
  • Containers and Cloud Security
    The idea behind this blog post is to take a new look at how cloud security is measured and what its impact is on the various actors in the cloud ecosystem. From the measurement point of view, we look at the vertical stack: all code that is traversed to provide a service all the way from input web request to database update to output response potentially contains bugs; the bug density is variable for the different components but the more code you traverse the higher your chance of exposure to exploitable vulnerabilities. We’ll call this the Vertical Attack Profile (VAP) of the stack. However, even this axis is too narrow because the primary actors are the cloud tenant and the cloud service provider (CSP). In an IaaS cloud, part of the vertical profile belongs to the tenant (The guest kernel, guest OS and application) and part (the hypervisor and host OS) belong to the CSP. However, the CSP vertical has the additional problem that any exploit in this piece of the stack can be used to jump into either the host itself or any of the other tenant virtual machines running on the host. We’ll call this exploit causing a failure of containment the Horizontal Attack Profile (HAP). We should also note that any Horizontal Security failure is a potentially business destroying event for the CSP, so they care deeply about preventing them. Conversely any exploit occurring in the VAP owned by the Tenant can be seen by the CSP as a tenant only problem and one which the Tenant is responsible for locating and fixing. We correlate size of profile with attack risk, so the large the profile the greater the probability of being exploited.
  • Canonical Releases AMD Microcode Updates for All Ubuntu Users to Fix Spectre V2
    Canonical released a microcode update for all Ubuntu users with AMD processors to address the well-known Spectre security vulnerability. The Spectre microprocessor side-channel vulnerabilities were publicly disclosed earlier this year and discovered to affect billions of devices made in the past two decades. Unearthed by Jann Horn of Google Project Zero, the second variant (CVE-2017-5715) of the Spectre vulnerability is described as a branch target injection attack.

Programming: 5 Pillars of Learning Programming, New Releases of Rust and Git

  • 5 Pillars of Learning Programming
    Learning how to program is hard. I often find that university courses and boot camps miss important aspects of programming and take poor approaches to teaching rookies. I want to share the 5 basic pillars I believe a successful programming course should build upon. As always, I am addressing the context of mainstream web applications. A rookie’s goal is to master the fundamentals of programming and to understand the importance of libraries and frameworks. Advanced topics such as the cloud, operations in general, or build tools should not be part of the curriculum. I am also skeptical when it comes to Design Patterns. They presume experience that beginners never have.
  • The Rust Programming Language Blog: Announcing Rust 1.27
    The Rust team is happy to announce a new version of Rust, 1.27.0. Rust is a systems programming language focused on safety, speed, and concurrency.
  • Rust 1.27 Released With SIMD Improvements
    Most notable to Rust 1.27 is SIMD support via the std::arch module to make use of SIMD (Single Instruction, Multiple Data) instructions directly. Up to now Rust could already make use of LLVM's auto-vectorization support, but this lets Rust developers write SIMD instructions on their own and to allow for the proper Rust code to be executed based upon the CPU at run-time.
  • Git 2.18 Released With Initial Version Of Its New Wire Protocol
    Version 2.18 of the Git distributed revision control system is now available. Arguably most notable about Git 2.18 is the introduction of its new wire protocol "protocol_v2" that is designed to offer much greater performance. This new protocol is designed to be much faster and is already being used at Google and elsewhere due to the significant performance benefits.
  • Git v2.18.0
    The latest feature release Git v2.18.0 is now available at the usual places. It is comprised of 903 non-merge commits since v2.17.0, contributed by 80 people, 24 of which are new faces.

Linux Foundation: Heather Kirksey and the New LF Report

  • Heather Kirksey on Integrating Networking and Cloud Native
    As highlighted in the recent Open Source Jobs Report, cloud and networking skills are in high demand. And, if you want to hear about the latest networking developments, there is no one better to talk with than Heather Kirksey, VP, Community and Ecosystem Development, Networking at The Linux Foundation. Kirksey was the Director of OPNFV before the recent consolidation of several networking-related projects under the new LF Networking umbrella, and I spoke with her to learn more about LF Networking (LFN) and how the initiative is working closely with cloud native technologies. Kirksey explained the reasoning behind the move and expansion of her role. “At OPNFV, we were focused on integration and end-to-end testing across the LFN projects. We had interaction with all of those communities. At the same time, we were separate legal entities, and things like that created more barriers to collaboration. Now, it’s easy to look at them more strategically as a portfolio to facilitate member engagement and deliver solutions to service providers.”
  • Linux Skills Most Wanted: Open Source Jobs Report
    The 2018 Open Source Technology Jobs Report shows rapid growth in the demand for open source technical talent, with Linux skills a must-have requirement for entry-level positions. The seventh annual report from The Linux Foundation and Dice, released Wednesday, identifies Linux coding as the most sought-after open source skill. Linux-based container technology is a close second. The report provides an overview of open source career trends, factors motivating professionals in the industry, and ways employers attract and retain qualified talent. As with the last two open source jobs reports, the focus this year is on all aspects of open source software and is not limited to Linux.