Today security is one of the key aspects in our daily life - sometimes conscious, sometimes unconscious. Security has many aspects and one of them is computer security or security of your or your business' computer data. In this tutorial I will show how to encrypt a whole disk drive using (X)Ubuntu Feisty, dm-crypt, and LUKS. The article also contains some legal considerations.
Its true. Linux lovers love to mount. Mounting things is part and parcel of a linux lovers life. They mount everything. Now before you get the wrong idea I wish to specify that I am talking about the mount command that is part of linux based systems.
I never thought I’d need it, but today I did. I needed a timer (for shutdown) in linux.
context: I was doing some bittorrent downloads during an ISP limited timeframe. I had to finish by 8:00am otherwise it would cost me dearly!
tried and failed: I googled for “timed shutdown” and found two main solutions… THAT DIDN’T WORK in openSUSE.
So what worked?
Why Squid? Why only five minutes?
There are many great tools that Squid has to offer, but when I need to redirect http traffic to a caching server for performance increases or security, squid’s my pick. Squid has built in proxy and caching tools that are simple, yet effective.
Here’s the scenario. You’ve got a 6.10 box with Automatix2 installed, which you’ve used to install a number of third party additions to your nice, shiney Ubuntu box. Now you want to upgrade from 6.10 to 7.04 but you’re a bit gun shy as you recall what it was like to update to 6.10.
So what’s it going to be like this time? Let’s find out!
We all know about the rampant spam email problem. Nearly all of the potential solutions offered for it are based on the idea of the mail server receiving messages, classifying them as either spam or legitimate, and then processing further (deleting or forwarding messages) as appropriate. The problem with this strategy is that you end up using extra resources on the mail server.
Debian is one of the most common distributions in the world. With a possible total of twenty one CDs, it is also one of the biggest. As you may have gathered from the fact that this guide exists, Debian is not the easiest distribution. However, anybody that is relatively competent with computers should be able to use Debian (after all, I am!).
bzip2 and bunzip2 are file compression and decompression utilities. The bzip2 and bunzip2 utilities are newer than gzip and gunzip and are not as common yet, but they are rapidly gaining popularity. The bzip2 utility is capable of greater compression ratios than gzip. Therefore, a bzip2 file can be 10-20% smaller than a gzip version of the same file.
All Internet content carries a risk. Content Filtering helps companies and home users to stop unwanted data. It is used as part of Internet Firewalls or Proxy Servers to screen the content of all incoming Internet traffic. Content filtering usually works by specifying character strings that, if matched, indicate undesirable content that is to be screened out.
A process is a fundamental part of any operating system - irrespective of whether they are proprietary or Free. And all Operating systems usually have a lot of processes running at any given time. This begs the question, what exactly is a process ?