This guide will show you how to use mod_auth_mysql with Apache 2 and Debian.
Firstly if you haven't alrteady done so throw some of the essentials on such as Apache 2 / PHP 4 / MySQL
In an inheritance hierarchy, permit each parent class's method to extend its child class's method so it can act as a decorator for its child class's behavior.
This article explains how to configure networking in a very pleasant way, so that it works automatically wherever you go. It is adaptable to lots of uses, and may be usefull even if you don't use Wifi but connect to multiple networks.
If you're like a lot of KDE users, you probably want to give the latest and greatest version of the popular Linux desktop environment a try. However, if you're like a lot of newer users, you're also not quite sure how to go about upgrading your desktop.
As its name suggests, Aaron Swartz's GPL-licensed rss2email utility converts RSS subscriptions into email messages and sends them to whatever address you specify. Despite the name, it handles Atom feeds as well, so you should be able to use it with just about any feed you like.
But you can erase that bit about it being for “software developers/testers” and “enterprise IT professionals”, because I’m going to show you just how simple running another Operating System on your PC is.
With the modernization and creation of a lot of newer GUI-based tools, the shell is becoming increasingly un-required to perform many tasks. But the shell is a very powerful place, and a lot is achieved through it.
Wikis are simple interactive websites which are extremely easy to use for storing easily updated text content. Debian has packaged several different Wiki systems and here we'll look at installing just one of them: KWiki.
In this month's stop on our tour of Linux music notation programs, we look at the MusiXTeX music typesetting software. MusiXTeX was created by Daniel Taupin, Ross Mitchell and Andreas Egler. MusiXTeX currently is maintained by Christian Mondrup and other volunteers.
Modern desktop computers running Linux have a sort of double personality that they do not usually share with Windows-based PCs. On the one hand, they are used as single-user workstations where the operator is granted full access to the machine resources, and on the other hand they are also real servers.
This document describes how important good iptables management is to tight security in a Linux networking environment.
If you are an MS Word user, and we all have secret shames in our pasts, you may have fallen into the habit of avoiding master documents--and for good reason. But if you have this habit of avoiding master documents, you can change it when you use OpenOffice.org Writer. They can help to organize and write long documents more efficiently.
When many other linux distributions were bogged down in dependency hell, Debian users were shielded from these problems owing to Debian's superior package handling capablities using apt-get.
Here I will explain how to go about using this package handling utility to get the results that you desire.
This is a practical selection of the commands we use most often. On my small home system, it says there are 2595 executables on my PATH. Many of these "commands" can be accessed from your favourite GUI front-end, by clicking on the right menu or button. They can all be run from the command line.
If you spend any time working at the shell, you probably use many GNU utilities. One thing that distinguishes the GNU versions from the classic Unix versions is that the GNU programs are rife with additional options. Some of these options are so useful you may want to create an alias so you can use them all the time without needing to do all the extra typing.
Not long ago, I reviewed SUSE Linux 10 and found that they had included the latest version of FreeNX. Once it was installed and working I have to say I was immediately impressed. I was overwhelmed with email from our readers asking that I write how to do it... so here we are!
Linux is great, but sometimes a guy's gotta play games. Here's how to set up a quicker Dual-Boot to get you back into windows.
Bottom line #1: Don't make a System Update blindly.
Bottom line #2: Don't make non-security updates "just because you can".
If you've inheritted a bunch of machines, or have only a single generic server in front of you, then you might be curious to learn what hardware you have. Thankfully it is very simple to discover information about your system, even remotely.