Red Hat Magazine: SSH (Secure SHell) is well known to Linux administrators as the de facto method for connecting to other systems. An administrator typically runs SSH to login to another system, often to run a shell on the remote host and issue commands. SSH, however, has many extra tricks up its sleeve beyond simply securing a connection.
Also: Automatic SSH login
onlamp.com: X Window, X11 or "X," as it is known for short, provides the programming framework and the underlying runtime system for most Unix and Linux-based network-transparent windowing implementations. On its own, X Window requires, but does not provide software to manage and display flexible GUI elements, e.g., windows.
nixcraft: Is it possible to migrate the printer configuration from one machine to another, just like user migration? Yes, it is possible since Linux uses CUPS.
linux.com: When you're programming a shell script, you often only need the current directory name, not the whole path that the pwd command returns. Here are four ways you can extract only the current directory.
This tutorial provides step-by-step instructions on how to install Xen on an Ubuntu Gutsy Gibbon (Ubuntu 7.10) server system (i386).
packtpub.com: Recording a good podcast is as much about good voice training and delivery, as much as it is about the technology used to record it. As with other things, you only get better with practice. In this article we will use Linux command line tools and optionally Audacity to create a quick, no-frills podcast with a background music track.
- How to Install the Eternity Screensaver in Ubuntu
- Quick tutorial - installing Flash Player on Fedora 7
- Beginners guide to database administration tools
- Customize Your Places Directories
- Define disk quotas to keep users from hogging drive space
- a simple tutorial for network scanning software nmap
- Google Docs Extension for OpenOffice
- 13 Not-So-Easy Steps to Install Linux on iPod
- Configuring ndiswrapper in SLED
- Using OpenBSD 4.2
- Adding shortcuts to the right click menu in Ubuntu
linux.com: When you listen to digital music, your software or hardware player usually shows information about the current song, which it gets from MP3 tags or Ogg Vorbis comments. Most ripping software supports acquiring this metadata from the CDDB or FreeDB services based on a CD's disc ID. But you can also can fill in and edit metadata with tools such as EasyTag and Picard.
iTWire: Network monitoring and intrusion detection are integral parts of network security. This becomes even more important when introducing wireless access, because now there’s an openly available entry point into your network. Here’s how to build monitoring in from the onset along with some great open-source tools.
abhay-techzone.blogspot: I have a three years old desktop with AMD 2400+ CPU, 640 MB RAM on a Via KM400 motherboard. I love my desktop as it helps me in experimenting with the latest and the greatest software and distribution releases. Currently I have OpenSUSE 10.3 on it. Its a fairly old computer so I could not try the latest eye candy on it, I am referring to compiz-fusion.