Language Selection

English French German Italian Portuguese Spanish

HowTos

few howtos:

Filed under
HowTos
  • 30 Cool Acer Aspire One Hacks

  • Bypassing automatic updates Debian-based distros
  • Firewall with QoS for home setup
  • Ask Linux.com: Mobile broadband, partitioning thumbs
  • Using SnortSP and Snort 2.8.2
  • 5 ways to make using bash more productive
  • Read Firefox cookie file
  • How to compile The Fabulous Logic Analyzer on Gentoo Linux
  • My home network
  • How To Use UUID To Mount Partitions Under Ubuntu Linux

few howtos:

Filed under
HowTos
  • How-To: Quick Wireless Setup With Ubuntu 8.04

  • Installation and Configuration of Gnome-DO
  • KDE - Blog from KOrganizer HOWTO
  • Package management in Fedora 9
  • Tip: Multimedia codecs on OpenSUSE 11.0
  • Recover Deleted Files with Foremost & scalpel in Ubuntu
  • How to get package info on just about anything in Ubuntu

Installing Linux apps: A few good tips

Filed under
HowTos

computerworld.com: Sooner or later, we all end up installing new software on our computers. Whether it's a new version of Firefox, or a cool game, or a video editing package, there comes a time when you want to make your system do more than it can do now.

Do-it-yourself Konqueror commands

Filed under
HowTos

linux.com: KDE's Konqueror is as multifunctional as a Swiss Army knife. It works as both a file manager and a Web browser, and you can enhance it even further by adding new commands to its repertoire by means of service menus.

few early howtos:

Filed under
HowTos
  • Tweaking your wireless on PCLinuxOS

  • Reset Your Ubuntu Password Easily from the Live CD
  • 5 Ways To Search For Files Using The Terminal
  • Exherbo Installation
  • Easily displaying two-dimensional data with GtkDatabox

some howtos:

Filed under
HowTos
  • Change Volume From a Bash Script

  • Having Home, Computer recycle bin and network services icons under Gnome
  • More Short Cut Keys
  • Using the Jamendo Plugin to Find Cool New Music
  • Create a Private Encrypted Folder On Ubuntu Hardy With eCryptfs
  • Virtualization As An Alternative To Dual Booting Part 3
  • Ubuntu Certification Tutorials
  • OOo: Harmonizing With MS Office, Managing Large Complex Documents
  • How to install openSUSE 11 in OS X using Parallels - a complete walkthrough
  • Howto: Pimp your kickstart, Part two
  • Mandriva : Tiny HOWTO : removing -debug packages with urpme
  • Install Fedora 9 on a laptop with a broken DVD drive

few more howtos:

Filed under
HowTos
  • A Wic’d Solution

  • Encrypted Private Directory in Ubuntu 8.10
  • Developing with libyui/libzypp & python - part2
  • How to Use more than 3GB RAM on 32-bit Ubuntu
  • Tracking Linux Memory Performance Statistics
  • Command Line Tip - Verify Downloaded Files
  • Try out the Intrepid themes in Hardy
  • Easy Way to Create Simple Linux Packages
  • Print Installed font list with preview for each font
  • Force users to change their passwords upon first login

few howtos:

Filed under
HowTos
  • Pidgin NoSound Solution

  • Emergency Booting RedHat Linux With USB
  • Finding log files X number of days old and deleteing them
  • How to add KDE to Ubuntu Eee 8.04.1
  • Fwknopping your way to success with Single Packet Authorisation

Umit, the graphical network scanner

Filed under
Software
HowTos

linux.com: Umit is a user-friendly graphical interface to Nmap that lets you perform network port scanning. The utility's most useful features are its stored scan profiles and the ability to search and compare saved network scans.

some howtos:

Filed under
HowTos
  • Reset Your Forgotten Ubuntu Password in 2 Minutes or Less

  • Installing Real Player and Configuring Mozilla Plugin
  • Virtualization As An Alternative To Dual Booting Part 2
  • Basic APT commands
  • Install VirtualBox 2 Guest Additions in Ubuntu
  • Charting your boot processes with bootchart
  • How To: Increase Battery Life in Ubuntu or Debian Linux
  • Running CrossOver Chromium aka "Google Chrome" under Ubuntu
  • Changing what time a process thinks it is with libfaketime
Syndicate content

More in Tux Machines

Security Leftovers

  • Friday's security updates
  • Hacking Slack accounts: As easy as searching GitHub
    A surprisingly large number of developers are posting their Slack login credentials to GitHub and other public websites, a practice that in many cases allows anyone to surreptitiously eavesdrop on their conversations and download proprietary data exchanged over the chat service. According to a blog post published Thursday, company researchers recently estimated that about 1,500 access tokens were publicly available, some belonging to people who worked for Fortune 500 companies, payment providers, Internet service providers, and health care providers. The researchers privately reported their findings to Slack, and the chat service said it regularly monitors public sites for posts that publish the sensitive tokens.
  • Time for a patch: six vulns fixed in NTP daemon
  • NTP Daemon Gets Fixes for Vulnerabilities Causing DoS and Authentication Bypass
  • Cisco Spots New NTP Bugs
  • Network Time Keeps on Ticking with Long-Running NTP Project [Ed: corrected URL]
  • Open Source Milagro Project Aims to Fix Web Security for Cloud, Mobile, IoT
    As the Internet continues to both grow in size and widen in scope, so do demands on the supporting infrastructure. The number of users and devices, amount of activity, internationalization of the web, and new devices that range from mobile apps and cloud instances to "Internet of Things," put strain on the system. Not just for bandwidth or service availability, but also on the assurance of trust -- trust that the entities at each end are who (or what) they say they are, and that their communications are private and secure.
  • M2Mi Obtains DHS Open-Source Cryptographic Tool Development Funds
    Machine-to-Machine Intelligence Corp. has been awarded $75,000 in funds by the Department of Homeland Security‘s science and technology directorate to create a deployable cryptographic protocol for an Internet of Things security initiative.
  • Encrypted Network Traffic Comes at a Cost
    The use of encryption over the Internet is growing. Fueled by Edward Snowden's revelations on the extent of NSA and GCHQ content monitoring, encryption is now increasingly provided by the big tech companies as part of their standard product offerings. It's effectiveness can be seen in the continuing demands by different governments for these same tech companies to provide government backdoors for that encryption. Encryption works: it safeguards privacy. Against this background, the use of Secure Sockets Layer (SSL) or Transport Layer Security (TLS) to encrypt network traffic is likely to grow dramatically. Google is encouraging this. It already uses HTTPS as a positive weight for web sites in its search algorithm, while current rumors suggest it will soon start to place a warning red X in the URL bar of sites that do not use it. Taken together, these are strong incentives for businesses that don't currently use SSL/TLS to start doing so. Some predictions believe that almost 70% of network traffic will be encrypted by the end of this year.
  • Raptor Engineering Updates Details On Their POWER8-Based Talos Secure Workstation
    Raptor Engineering has published new information around their proposed high-performance Talos Secure Workstation that for around $3k is a high-end POWER8 motherboard.

GNOME privacy options give users even more desktop security

GNOME is helping you to improve security by wiping away that breadcrumb trail. Instead of having to manage these issues in various places such as display settings, file manager, and location settings, the developers of GNOME put these security-centric settings in one location: the GNOME Privacy tool. Read more

FRAND Is Not A Compliance Issue

The European Commission has been persuaded by lobbyists to change its position on standards to permit the use of FRAND license terms for patents applicable to technologies within those standards. This is a massive mistake that will harm innovation by chilling open source community engagement. Read more