Language Selection

English French German Italian Portuguese Spanish


Adobe Flash Player 9 Update 3

Filed under

linuxondesktop.blogspot: A Few weeks back Adobe released the new version of their popular Flash Player( Adobe Flash Player 9 Update 3, version identifier 9,0,115,0) on the Linux platform. To install Flash Player in Ubuntu 7.10 type in the following command in the terminal window:

Firefox 3 Beta 2 in Ubuntu 7.10

Filed under
HowTos Problem is, Ubuntu 7.10 Gutsy Gibbon comes with an unstable version of Firefox 3, in the form of a “firefox-granparadiso” package, and it’s only Alpha 8, which doesn’t have the features and stability of the past few releases. There’s a simple way to upgrade this package, keeping all links, etc. intact.

Monitoring Real-time user logins in ubuntu

Filed under
HowTos Whowatch is an console, interactive users and process monitoring tool.It displays information about the users currently logged on to the machine, in real-time. Besides standard informations (login name, tty,host, userâs process), the type of the connection (ie. telnet or ssh) is shown.

Working with Linux RPM's

Filed under

linuxshellaccount.blogspot: In this post, I wanted to hit on the basics of working with RPM's in Linux. RPM stands for the Redhat Package Management system - basically, they're the software packages that make up your system.

Colour your GRUB boot menu

Filed under

FOSSwire: That boring white on black GRUB boot menu you get when you switch on your computer is a bit, well, boring, isn’t it? Thankfully, there’s an easy way to change it if you go into your GRUB configuration file.

A Few Linux Networking Tips

Filed under

linuxshellaccount.blogspot: Here's a little something for those of us who use Linux (The place I work uses RedHat primarily) on a day to day basis. In this post, I just wanted to touch on some Linux networking basics.

some howtos:

Filed under
  • How to Use md5sum to Verify Data Integrity

  • Enhancing ‘rm’ to Send Files to Trash in KDE or Gnome
  • Syncing your BlackBerry on Linux
  • Howto Clean up your packages
  • Take charge of your window manager with WMCTRL and Devil's Pie
  • How to setup an HTTP proxy with privoxy

some howtos:

Filed under
  • Tip for RTFM

  • A Quick and Dirty Guide To Kernel Hardening with GrSecurity
  • Howto: Using newest flash in Konqueror in Fedora
  • Installing and configuring Network Access Control with PacketFence
  • Sharing Linux Printers Across Subnets

Creating Snapshot Backups Of Your Desktop With TimeVault On Ubuntu 7.10

Filed under

This document describes how to set up, configure and use TimeVault on Ubuntu 7.10. The resulting system provides a powerful backup system for desktop usage. TimeVault is a simple front-end for making snapshots of a set of directories.

some howtos:

Filed under
  • How to install KDE 4 RC 2 on Ubuntu 7.10 (screenshot tour)

  • One click monitor power-down for Linux
  • Enhancing cluster quorum with QDisk
  • Short Tip: Add Plasma widgets to the panel in KDE 4
  • HowTo: Rename Multiple Files Without A Script
  • Create an MP3 file server using Amarok and ObsidianMusic
  • How to Install Vmware Server in Ubuntu 7.10 (Gutsy Gibbon)
  • Monitor Multiple Logs in a Single Shell with MultiTail for Linux
Syndicate content

More in Tux Machines

Red Hat and Fedora

Rackspace and FOSS Report

  • The Rackspace State of Open Source
    As the OpenStack Summit in Barcelona kicks off, Rackspace has released a report entitled ‘The State of Open Source’. With every conference seemingly extolling the virtues of open source software, this report is timely. It manages to differentiate between enterprise open source and the wider open source software market.
  • Why digital transformation needs open source
    As if there wasn't already ample reason for businesses to switch to open source, Forrester analysts Paul Miller and Lauren E Nelson released a report in April 2016, entitled Open Source Powers Enterprise Digital Transformation — CIOs Need To Embrace Open Source Software To Drive Change, which further drives the point.
  • Despite Security Fears, Open Source Is Fuelling Innovation and Cost Savings in UK Businesses
  • Security concerns fail to hold back UK open source success
    However, despite its increasingly common use, many (54%) still perceive external security threats to be a big barrier to adoption, that’s according to a report published by Rackspace. The State of Open Source study, which was conducted among IT decision makers in UK businesses with over 1,000 employees and revenues over £500m, and looks at the ways open source is being used, its benefits, but also what is holding back adoption and business concerns. According to the report open source has come of age with 85% using open source technology to migrate a closed source project to open source. Open source also isn’t just a tool for small businesses; the vast majority (90%) of large businesses are now deploying open source-based enterprise applications, with 25% being completely open source. The reason for the growing adoption is because of the money and time savings. Rackspace found that for each project that had been migrated to open source technology, six out of ten organisations saved on average £30,146 and reduced project lifecycle by six months. Greater innovation was reported by many (49%), and 46% were driven to open source because of the competitive opportunities. Additionally, just under half (45%) said that it enabled them to get products and services to market faster. John Engates, Chief Technology Officer at Rackspace, said: “While open source technologies have been around for many years, it is great to see that enterprise businesses are finally dipping their toes in and seeing the tangible benefits.

FOSS and Blockchain

Security Leftovers

  • The internet apocalypse map hides the major vulnerability that created it
    During Friday’s massive distributed denial of service (DDoS) attack on DNS service provider Dyn, one might be forgiven for mistaking the maps of network outages for images of some post-apocalyptic nuclear fallout. Screenshots from sites like showed menacingly red, fuzzy heat maps of, well, effectively just population centers of the United States experiencing serious difficulty accessing Twitter, Github, Etsy, or any of Dyn's other high-profile clients. Aside from offering little detail and making a DDoS literally into a glowing red menace, they also obscured the reality of just how centralized a lot of internet infrastructure really is. DNS is ground zero for the uneasy tension of the internet’s presumed decentralized resilience and the reality that as of now, translating IP addresses into domain names requires some kind of centralized, hierarchical platform, and that’s probably not going to radically change anytime soon. Other maps provided by various business to business network infrastructure companies weren’t much more helpful. These maps seem to exist mostly to signal that the companies in question have lots of cool data and that it can be made into a flashy map — which might impress potential customers, but that doesn’t offer a ton of insights for the layperson. For example, threat intelligence company Norse's map appears to be mostly a homage to the Matthew Broderick movie War Games: a constant barrage of DDoS attacks beaming like space invader rockets across a world map. Akamai has an impressive 3D visualization that renders traffic as points beaming into the atmosphere. And website monitoring service Pingdom offers a dot map at such a far-out zoom level that it's essentially useless for seeking out more meaningful patterns than "outages happen in population centers, also there are a lot of outages."
  • CoreOS Patched Against the "Dirty COW" Linux Kernel Vulnerability, Update Now
  • World’s first hack-proof router launched
    Turris Omnia router, tagged the world’s first hack-proof router, was launched yesterday at the CES Unveiled Show in Prague, Czech Republic. As an essential part of any home internet network, routers are rather poorly secured and protected against cyber attack. More often than not, the only security feature is the default password. With easily required internet knowledge and some skills, these routers can be hacked, providing unauthorized access to a complete internet network. From there on, anything is possible.