Short bio: Computer Scientist, FOSS supporter (read more)
Tux Machines (TM)-specific
DHCP stands for dynamic host configuration protocol. What it does is dynamically assign network settings from a server. In other words, instead of having to configure the parameters related to how your computer communicates with a network, it happens automatically.
A Debian package offers a uniform and integrated way to manage and install software on a Debian system. By packaging software, you can install, upgrade or remove the software using standard tools such as apt-get and dpkg. It also offers an easy way to distribute software, even to systems that don't have development tools installed.
This tutorial describes how to install and configure OpenSSH so that it will allow chrooted sessions for users. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of.
If you're like me you'll most likely use a wide variety of desktop applications, and spend a lot of time setting up your desktop first thing in the afternoon when you login. Minimising some applications, setting others up to be visible upon all virtual desktops, etc. Even if you have a basic window manager you can automate this activity using Devil's Pie.
Ready to synchronize your Palm OS-based PDA with your Linux desktop? Here's a trio of GUI-based options and a command-line tool for you to try.
This document describes how to install the GNU/Linux GPL IPCop firewall and create a small home office network. In the second installment we cover creating a DMZ for hosting your own web server or mail server and the Copfilter proxy for filtering web and email traffic.
There are times when you're looking for a particular library, or file, which you know is available to Debian but you cannot find the package which contains it. This is the kind of job that the Debian packages site helped with in the past, but given its current unavailability we'll look at another approach.
Buffer overflow proofs of concept are produced with routine regularity, demonstrating how easy it can be to leverage unsafe coding practices into successful attacks and system takeovers. Thus, it's imperative to follow a layered methodology to fortify applications against the perils of unchecked code.
We ended last time after configuring our first unprivileged Xen domain. In this article, we complete our cluster and then test it using an open-source parallel ray tracer. The first thing we need to do is create additional slave nodes to be used with the cluster. So, let's get down to business.
I still remember those days clearly when I was taking a short term course in Unix. The Unix flavour being SCO Unix ver 5.0. The first command we were introduced to in Unix by the instructor was the 'banner' command.
Under the 2.4 series kernel - to be able to use an IDE CD burner we were forced to use SCSI emulation (via the kernel module ide-scsi). Under the 2.6 series kernel - this is deprecated - we now use ide-cd.
When it comes to slicing and dicing text, few tools are as powerful, or as underutilized, as awk. In the Linux world, every distribution includes the GNU version, gawk (/bin/awk is usually a symbolic link to /bin/gawk). The GNU version has a few more features than the original. Let's play with some of the core features common among POSIX-compliant awks.