Language Selection

English French German Italian Portuguese Spanish

LAMP Installation On Ubuntu 6.06 For Linux Noobs

Filed under
HowTos

I, like many others, made the decision to attempt an install of Ubuntu 6.06 server with the preconfigured LAMP option without having ever attempted using Linux before. My goal was to build a setup that I could host my personal web site from. Embarking on this journey I had no idea how much knowledge I lacked and in turn would learn in my quest to host. I floundered around on forums and clung helplessly to Google for aid in all the places I fell short. I found that a really good resource for building a LAMP configuration for complete Linux noobs was either not available, or stuffed neatly in some Google Bermutan triangle which my browser was afraid to go. Hence, I am writing this as a partial documentation of my trials and tribulations with hopes of aiding all Linux noobs on the steps necessary to create a basic Linux, Apache2, MySQL5 and PHP5 system with FTP. Again, this document is tailored to complete Linux beginners and is in no way a complete guide to attacking such a setup. It will get you up and running but will need security hardening like no other.

Full Story.

More in Tux Machines

Android Leftovers

Still not dead: The mainframe hangs on, sustained by Linux and hybrid cloud

The mainframe has been declared “dead”, “morphed” and “transformed” so many times over the years sometimes it’s sometimes hard to believe the Big Iron still has an identity in the enterprise world. But clearly it does and in a major way, too. Take recent news as an example: According to IBM, 75% of the top 20 global banks are running the newest z15 mainframe, and the IBM Systems Group reported a 68% gain in Q2 IBM Z revenue year-over-year. At the heart of its current vitality is Linux—primarily in the form of Big Iron-based Red Hat OpenShift—and a variety of software such as IBM Cloud Paks and open source applications. The Linux-mainframe marriage is celebrating 20 years this month, and while the incongruous mashup—certainly at the beginning anyway—has been a boon for the mainframe, by most accounts it still has plenty of good years ahead of it. Read more

What To Do After Installing deepin 20 GNU/Linux 20

Everything is fun with Deepin Twenty. If you are new to deepin, this article helps you to do things with your new computer in deepin ways. Check it out! Tuxmath and Friends: do you know that deepin brings complete set of educational applications? Starting for kids and kindergarten ages, we see Tuxmath - Tuxpaint - TuxTyping available. For middle school upwards, we see KAlgebra - KAlzium - Marble available. For universities and researchers, we see Scilab - GNU R - LaTeX available. get them all from App Store. Ethercalc and Friends: if you're teacher here is Ethercalc you can use as simple online students presence form. It is a spreadsheet just like LibreOffice Calc or Microsoft Excel but accessible online. You can make one freely at Disroot. Similarly, you can also use Etherpad the word processor you can access freely at Disroot as well. If you need free and reliable video calls, I shared my experiences in I Teach With Jitsi last month you can learn from. Quickly access Jitsi for free at the official site. Read more

6 Best Free and Open Source Linux Anti-Spam Tools

Email is one of the primary communication channels among users. The Radicati Group is an organization which publishes quantitative and qualitative research on business and consumer usage for email, instant messaging, social networking, wireless email, and unified communications. Their research estimates that the total worldwide emails in 2020 is 306 billion. The cost of spam is frightening, estimated to be approximately $50 billion each year. The tide of the daily spam is a continual thorn in the side for both providers and users. Spam is a waste of valuable network bandwidth, disk space and takes up users’ valuable time to declutter their mailboxes. Many spam messages contain URLs to a dubious website or websites, peddling fake pharmaceutical products, replicas, enhancers, or gambling. Alternatively, the URLs may be phishing attacks, for example taking an unwitting victim to a site which seeks to steal private information such as bank account login data. Read more