Language Selection

English French German Italian Portuguese Spanish

HowTos

some howtos:

Filed under
HowTos
  • Crack copy protected PDFs using two simple commands in Ubuntu
  • Guide: Debian LAMP Server Setup
  • Exploring Drupal
  • 5 essential Ubuntu optimization tips for newbies
  • Howto switch from Ubuntu to Debian – My Experience – Part II
  • Download youtube video in ubuntu / Debian using UTube Ripper
  • Download PGP Keys with Apt-key
  • How to Automatic and timed login in Fedora 12
  • checkinstall - Smartly manage your installations
  • Keep track of your consulting times and invoicing with GnoTime
  • Disk Space Eaters in Linux
  • Understanding NIC Bonding with Linux
  • Modify Mandriva Bootsplash
  • Getting the most from bug mail

some howtos:

Filed under
HowTos
  • Reinstall Ubuntu automatically
  • How to solve problems in Linux - a novice's guide
  • Some wget tricks
  • Howto switch from Ubuntu to Debian – My Experience – Part I
  • Howto setup Wireless on Chrome OS
  • Acetone: Mount and manage your CD/DVD ISOs
  • Drupal 6.14, Introduction and Installation
  • How To Tell If Someone Is On Your Wireless Home Network
  • Faster Internet With an Old Laptop – Revisited

The Perfect Desktop - Linux Mint 8 (Helena)

Filed under
HowTos

This tutorial shows how you can set up a Linux Mint 8 (Helena) desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge. Linux Mint 8 is a Linux distribution based on Ubuntu 9.10 that has lots of packages in its repositories (like multimedia codecs, Adobe Flash, Adobe Reader, Skype, Google Earth, etc.) that are relatively hard to install on other distributions; it therefore provides a user-friendly desktop experience even for Linux newbies.

some howtos:

Filed under
HowTos
  • How to Convert smbpasswd to tdbsam on Samba
  • SFTP on Ubuntu and Debian in 9 easy steps
  • “bash: ./configure: /bin/sh: bad interpreter: Permission denied”
  • How to Take Perfect Screenshots with KSnapshot
  • How to Establish Simple Remote Desktop Access Between Ubuntu and Windows
  • Regain Compiz desktop rotation with the mouse in Ubuntu 9.10
  • Sharing the Same Files Between Two PC’s
  • How to DHCP server on Ubuntu
  • OOo: How to do a holiday letter using mail merge, and print labels for the envelopes
  • Linux Security with Fail2Ban
  • fix bricked xos automatically
  • Have your Arch Linux always ready for an upgrade
  • Tomdroid with Ubuntu One syncing goodness
  • How to Print Large Posters in Ubuntu / Debian Linux
  • Graphic styles in OpenOffice.org Draw and Impress

today's howtos & leftovers:

Filed under
News
HowTos
  • A Broken Debian unstable/testing Installation
  • How to use Wiimotes w/ Linux
  • Are open source programmers fools and suckers?
  • How to beat proxy using ssh
  • Insiders are selling; should you?
  • Former MySQL boss Marten Mickos talks open source
  • xset
  • Recover lost photos from a camera card with PhotoRec
  • Simple Linux disk burning with Brasero
  • advanced course for Red Hat Enterprise Linux system administrators
  • How to use Redirection and Pipes on Linux System
  • GIMP: Reducing UI Clutter, Docking Bars Removed
  • Key sequence to kill the X server (Control + Alt + Backspace)
  • DtO: after the KKK
  • How to make KVM virtual machines in Red Hat Enterprise Linux 5.4

The Perfect Desktop - Fedora 12 i686 (GNOME)

Filed under
HowTos

This tutorial shows how you can set up a Fedora 12 desktop (GNOME) that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.

Remix Linux: how to customise your install

Filed under
Linux
HowTos

techradar.com: Mainstream Linux distro developers have to make decisions that affect thousands of potential users. Should they include or remove a particular package? Should they apply a patch that may break compatibility with older machines?

some howtos:

Filed under
HowTos
  • Moving a MySQL Database To Another Server
  • Running Flash Builder 4 on linux
  • Recover lost root password
  • How To Create A Custom Splash Image For Grub 2 [Linux]
  • molly-guard – protects machines from accidental shutdowns/reboots
  • Roll Your Own Ubuntu Private Cloud
  • How does Ubuntu’s screenshot tool Take Screenshot actually work?
  • Domino 8.5.1 on OpenSUSE Parts 1 - 3

Using eBox As A Windows Primary Domain Controller

Filed under
HowTos

eBox Platform is an open source small business server that allows you to manage all your services like firewall, DHCP, DNS, VPN, proxy, IDS, mail, file and printer sharing, VoIP, IM and much more. These functionalities are tightly integrated, automating most tasks, avoiding mistakes and saving time for system administrators. This tutorial shows you step by step how to use eBox as a Windows Primary Domain Controller. At the end of it you will be using eBox Platform 1.2 for users and shared resources management on your Windows domain.

Syndicate content

More in Tux Machines

New Emojis Come, Celtx Goes Away

Development News

Security Leftovers

  • How To Improve The Linux System’s Security Using Firejail
    As you already know, Linux kernel is secure by default. But, it doesn’t mean that the softwares on the Linux system are completely secure. Say for example, there is a possibility that any add-ons on your web browser may cause some serious security issues. While doing financial transactions over internet, some key logger may be active in browser which you are not aware of. Even though, we can’t completely give the bullet-proof security to our Linux box, we still can add an extra pinch of security using an application called Firejail. It is a security utility which can sandbox any such application and let it to run in a controlled environment. To put this simply, Firejail is a SUID (Set owner User ID up on execution) program that reduces the risk of security breaches by restricting the running environment of untrusted applications.
  • “Httpd and Relayd Mastery” off to copyedit
  • Kalyna Block Cipher

Containers vs. Zones vs. Jails vs. VMs

  • Setting the Record Straight: containers vs. Zones vs. Jails vs. VMs
    I’m tired of having the same conversation over and over again with people so I figured I would put it into a blog post. Many people ask me if I have tried or what I think of Solaris Zones / BSD Jails. The answer is simply: I have tried them and I definitely like them. The conversation then heads towards them telling me how Zones and Jails are far superior to containers and that I should basically just give up with Linux containers and use VMs. Which to be honest is a bit forward to someone who has spent a large portion of her career working with containers and trying to make containers more secure. Here is what I tell them:
  • [Old] Hadoop Has Failed Us, Tech Experts Say

    The Hadoop community has so far failed to account for the poor performance and high complexity of Hadoop, Johnson says. “The Hadoop ecosystem is still basically in the hands of a small number of experts,” he says. “If you have that power and you’ve learned know how to use these tools and you’re programmer, then this thing is super powerful. But there aren’t a lot of those people. I’ve read all these things how we need another million data scientists in the world, which I think means our tools aren’t very good.”