Language Selection

English French German Italian Portuguese Spanish

HowTos

OpenOffice.org Calc function tools

Filed under
OOo
HowTos

Once you are comfortable with inputting functions and formulas, the next step is to learn how to automate the processes. Calc includes over half a dozen tools to help you manipulate functions and formulas, ranging from features for copying and reusing data to creating subtotals automatically to ones for varying information to help you find the answers that you need.

How to Rip DVD audio to mp3 or ogg

Filed under
HowTos

You can extract sound from a DVD, one track at a time or a chapter at a time. Some simple command line examples should suffice to demonstrate how this is done.

First thing you need to do is make sure you have lsdvd and transcode installed:

sudo apt-get install lsdvd transcode

File Server Configuration in Debian Using Samba

Filed under
HowTos

Samba is a suite of Unix applications that speak the SMB (Server Message Block) protocol. Many operating systems,including Windows and OS/2, use SMB to perform client-server networking. By supporting this protocol, Samba allows Unix servers to get in on the action, communicating with the same networking protocol as Microsoft Windows products.

Install Samba in Debian

How To Utilize Your New Multimedia Keyboard Under Linux

Filed under
HowTos

Xbindkeys is a program that allows you to launch shell commands with your keyboard or your mouse under X Window. It links commands to keys or mouse buttons, using its configuration file. It does not depend on the window manager and can capture all keyboard keys.

Prerequisites:

a keyboard with special/multimedia buttons
xbindkeys

Perfect Setup Of Snort + Base + PostgreSQL On Ubuntu 6.06 LTS

Filed under
Ubuntu
HowTos

This tutorial describes how you can install and configure the Snort IDS (intrusion detection system) and BASE (Basic Analysis and Security Engine) on an Ubuntu 6.06 (Dapper Drake) system. With the help of Snort and BASE, you can monitor your system - with BASE you can perform analysis of intrusions that Snort has detected on your network. Snort will use a PostgreSQL database to store/log the data it gathers.

E-mail Architecture I

Filed under
HowTos

E-mail is the most popular application on the Internet today. Closelyfollowed by search. This article aims to take a high level view of thevarious components that go into making e-mail work for you.

Building the XO: Porting a PyGTK game to Sugar, part two

Filed under
HowTos

In the last lesson we learned about what made Block Party tick. In this lesson, we will turn the same PyGtk codebase into a Sugar activity with only minimal modification of the core code.

How To Install VMware Server On Debian 4.0 (Etch)

Filed under
HowTos

This tutorial provides step-by-step instructions about how to install the free VMware Server (version 1.0.2) on a Debian Etch system. With VMware Server you can create and run guest operating systems (virtual machines) such as Linux, Windows, FreeBSD, etc. under a host operating system.

Stash your cache

Filed under
HowTos

Here’s the deal: I reinstall once, sometimes twice or even three times a week. Why? Well, that’s beside the point. Sometimes I break something, but sometimes I just feel like it. Never mind that. What I want to suggest is that, if you’re like me, you can save yourself a little bandwidth and a lot of time downloading if you take the time to copy your apt cache before you erase your drive.

The Two Most Useful Search Tricks I Know

Filed under
Moz/FF
HowTos

I use these all day and every day. One of these tricks allows you to do a search quickly in Firefox. The other trick allows you to narrow searches down to a particular site.

Syndicate content

More in Tux Machines

Black Hat 2014: Open Source Could Solve Medical Device Security

On the topic of source code liability, Greer suggests that eventually software developers, including medical device development companies, will be responsible for the trouble their software causes (or fails to prevent). I think it’s fair to say that it is impossible to guarantee a totally secure system. You cannot prove a negative statement after all. Given enough time, most systems can be breached. So where does this potential liability end? What if my company has sloppy coding standards, no code reviews, or I use a third-party software library that has a vulnerability? Should hacking be considered foreseeable misuse? Read more

Does government finally grok open source?

Yes, the government -- one U.S. federal government employee told me that government IT tends to be "stove-piped," with people "even working within the same building" not having much of a clue what their peers are doing, which is not exactly the open source way. That's changing. One way to see this shift is in government policies. For the U.S. federal government, there is now a "default to open," a dramatic reversal on long-standing practices of spending heavily with a core of proprietary technology vendors. Read more

The OS LinuX Desktop

Reader Oliver wanted to make his Linux Mint desktop look as much like a Mac as possible so others would find it easy to use. Given some of our previous Linux featured desktops, we know it wasn't tough, but the end-result still looks great. Here's how it's all set up. Read more

A Linux Desktop Designed for You

Desktop environments for Linux are not released ready-made. Behind each is a set of assumptions about what a desktop should be, and how users should interact with them. Increasingly, too, each environment has a history -- some of which are many years old. As you shop around for a desktop, these assumptions are worth taking note of. Often, they can reveal tendencies that you might not discover without several days of probing and working with the desktop. Read more