Language Selection

English French German Italian Portuguese Spanish

HowTos

some howtos:

Filed under
HowTos
  • Per-Process Namespaces

  • Duplicate your Ubuntu Installation....
  • Fast access to frequently used directories
  • How Linux Shuts Down
  • bash completion: /dev/fd/62: No such file or directory
  • Adding Custom Shortcuts to Gnome
  • How to resolve the ‘/bin/rm: Argument list too long’ error
  • Extract the MP3 Audio Portion of a Video

How To: Turn Your Linux Rig into a Streaming Media Center

Filed under
HowTos

maximumpc.com: These days, most people have at least one computer and a large collection of media files. The conventional practice for most people has always been to have redundant copies of their media collection on their various computers. While this system technically works, it is highly inefficient.

some howtos:

Filed under
HowTos
  • Linux Shell Tricks To Save You A Few Gray Hairs

  • Run a command when not busy
  • How to know which drivers you may need when configuring your Kernel
  • Migrating from Outlook to Mozilla Thunderbird in Linux (part 1)
  • Periodic Table of the Operators
  • How to upgrade Debian Lenny to Squeeze
  • Benchmark Your Computer with Debian 5 Lenny
  • Upgrading a C# Mono Application on Gentoo Linux, Pt 3

Howto Upgrade Debian 4 Etch to Debian 5.0 Lenny

Filed under
HowTos

cyberciti.biz: Debian version 5.0 has been released. It is recommended that you upgrade the system to latest version. Upgrading remote Debian server is a piece of cake. In this tutorial, you will learn.

Installing Windows XP As A KVM Guest On Ubuntu 8.10 Desktop

Filed under
Ubuntu
HowTos

There's a bug in virt-install and virt-manager on Ubuntu 8.10 that does not let you run Windows XP as a guest under KVM. During the Windows installation, the guest needs to be rebooted, and then you get the following error, and Windows XP refuses to boot: "A disk read error occured. Press Ctrl+Alt+Del to restart".

some howtos:

Filed under
HowTos
  • Opera 10: Remove ‘Click to activate’ on flash in Linux

  • How to deny root ssh login
  • Simple bash script to monitor your webserver remotely on different ports
  • Howto Round Robin DNS on a Linux server
  • Installing Webcams In Ubuntu: The Easy Way
  • How to measure and read disk activity
  • Command Line Image Editing with ImageMagick
  • How to enable last.fm audioscrobbler for xmms2
  • More about customization on Konsole
  • Adding times to the history
  • How to get a screenshot in linux using command line tools: xwininfo, convert.
  • Migrating to Linux: Tip 1: Do DHCP and DNS first

some howtos:

Filed under
HowTos
  • Howto SetUp Dual-Dual NIC Bonding On Ubuntu

  • Screencasting in Linux!
  • How to add static route through a virtual (alias) interface in RHEL5?
  • Crush images on the command-line with Groovy
  • A few tips for a better EeePC
  • Kill the process locking a file
  • Plot your graphs with command line gnuplot
  • HowTo: Reset the XOrg configuration file in Debian
  • HOWTO: Install THC-Hydra 5.4 in Ubuntu Intrepid Ibex
  • Bcfg2 0.9.6 debian package for etch
  • clear cached memory in ubuntu
  • Change screen resolution in Ubuntu Linux

Virtualization With Xen 3.3.1 On Debian Etch

Filed under
HowTos

This tutorial provides step-by-step instructions on how to install Xen 3.3.1 on a Debian Etch (4.0) system. Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called "virtual machines" or domUs, under a host operating system (dom0).

some howtos:

Filed under
HowTos
  • 7 ways to optimize Firefox 3 for your netbook

  • Compile mplayer with VDPAU support on Ubuntu
  • Changing Ubuntu’s Default Configuration
  • Small tip - How to prevent Linux to "remember" your sudo password
  • Get broadband on the move with Linux
  • CPU frequency scaling in Linux with cpufreq
  • Ubuntu 8.10: Support dropped for ATI Mobility Radeon 9700 / rv300 chips
  • Blocking IP address of any country with iptables
  • Installing OpenOffice 3 in *buntu
  • Compiling a Linux kernel
  • How to patch and recompile a source rpm
  • Force Firefox To Remember Initial Window Setting In KDE
  • Read & Remove EXIF Data From the Command Line

Using Screen to Manage Multiple Remote and Interrupted SSH Sessions

Filed under
Software
HowTos

linuxplanet.com: In a day of laptops and remote systems, it's often impractical to keep the same ssh session going to a specific server indefinitely. Screen is great for letting you start a terminal session, walk away from it, and then come back later.

Syndicate content

More in Tux Machines

Honor 9 Lite review: Leader of the affordable Android pack

As Huawei's budget brand, Honor handsets are well known for offering good value for money. With the Honor 9 Lite the 'good value' theme is raised a notch, thanks to an 18:9 aspect ratio 5.65-inch screen and no fewer than four cameras. Judging by its name, you might expect the Honor 9 Lite to be a trimmed-down version of the Honor 9, but there are some significant variances that suggest the new handset is a step sideways rather than a step down. The Honor 9's 5.15-inch 1,080-by-1,920 (16:9) screen is trumped here by a bigger, taller 5.65-inch 1,080-by-2,160 (18:9) display. There are also dual cameras front and back, whereas the Honor 9 only has dual rear cameras. At the time of writing the Honor 9 is selling for £349 (inc. VAT) direct from Honor, so the Honor 9 Lite's £199.99 looks very appealing. Read more

Linux command history: Choosing what to remember and how

Linux history – the record of commands that you’ve used on the command line – can simplify repeating commands and provide some very useful information when you’re trying to track down how recent system or account changes might have come about. Two things you need to understand before you begin your sleuthing, however, are that the shell’s command memory can be selective and that dates and times for when commands were run are optional. Read more

Security: Voting Machines With Windows and Back Doors in Windows Help Crypto-jacking

  • Election Security a High Priority — Until It Comes to Paying for New Voting Machines [Ed: Sadly, the US has outsourced its voting machines to a private company whose systems are managed by Microsoft]
    When poll workers arrived at 6 a.m. to open the voting location in Allentown, New Jersey, for last November’s gubernatorial election, they found that none of the borough’s four voting machines were working. Their replacements, which were delivered about four hours later, also failed. Voters had to cast their ballots on paper, which then were counted by hand. Machine malfunctions are a regular feature of American elections. Even as worries over cybersecurity and election interference loom, many local jurisdictions depend on aging voting equipment based on frequently obsolete and sometimes insecure technology. And the counties and states that fund elections have dragged their heels on providing the money to buy new equipment.
  • Congress Can Act Right Now to Prevent Interference in the 2018 Elections [Ed: "confidence" is not security]

    To create that confidence the SAFE Act would: [...]

  • America’s Election Meddling Would Indeed Justify Other Countries Retaliating In Kind
    There is still no clear proof that the Russian government interfered with the 2016 U.S. election in any meaningful way. Which is weird, because Russia and every other country on earth would be perfectly justified in doing so.
  • NSA Exploit Now Powering Cryptocurrency Mining Malware [Ed: Microsoft Windows back door]
    You may have been asked if you'd like to try your hand at mining cryptocurrency. You may have demurred, citing the shortage in graphics cards or perhaps wary you were being coaxed into an elaborate Ponzi scheme. So much for opting out. Thanks to the NSA, you may be involved in mining cryptocurrency, but you're likely not seeing any of the benefits.
  • Cryptocurrency-mining criminals that netted $3 million gear up for more
    Separately, researchers from security firm FireEye said attackers, presumably with no relation to the one reported by Check Point, are exploiting unpatched systems running Oracle's WebLogic Server to install cryptocurrency-mining malware. Oracle patched the vulnerability, indexed as CVE-2017-10271, in October.

today's howtos