Other system administrators have fantastic toolboxes for their work. My tools consist of two everyday programs: OpenSSH and the GNU Bourne-Again Shell (bash). No other tool, whether console-based or GUI, has been so consistently useful to me as these two programs.
Mythtv is an amazing product for turning your xbox in to a home built PVR system, the downside is the Xbox is not powerful enough for having it do the recording or the streaming of your tv shows. This guide will help you through configuring the xbox as a front end "Viewer" to your already in place Myth TV System.
IT pros have been checking out the new MySQL 5.0 open source database since its recent release its commercial parent, MySQL AB. Some of those IT pros put our resident MySQL expert, Mike Hillyer, to the test, too. In this tip, he answers users' questions about the ins and outs of choosing, testing and using MySQL 5.0, an open source relational database management system.
Even if back in August 2005, www.gnome.org/bounties/Mailer.html#127516 said the status of a bounty for implementing a panel notification applet for new mail in Evolution is "Solved", even to date, Evolution 188.8.131.52 does not have anything for showing in GNOME's notification area an icon when a new mail arrives! The real solution is evonotify.
In the first part of this text, we introduced the principal concepts of Debian package building. We're now ready to build an example package of a simple command line program.
This article is a practical step-by-step guide for securing Linux production systems. It discusses basic Linux Security requirements for systems that need to pass various audits in an enterprise environment.
DHCP stands for dynamic host configuration protocol. What it does is dynamically assign network settings from a server. In other words, instead of having to configure the parameters related to how your computer communicates with a network, it happens automatically.
A Debian package offers a uniform and integrated way to manage and install software on a Debian system. By packaging software, you can install, upgrade or remove the software using standard tools such as apt-get and dpkg. It also offers an easy way to distribute software, even to systems that don't have development tools installed.
This tutorial describes how to install and configure OpenSSH so that it will allow chrooted sessions for users. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of.
If you're like me you'll most likely use a wide variety of desktop applications, and spend a lot of time setting up your desktop first thing in the afternoon when you login. Minimising some applications, setting others up to be visible upon all virtual desktops, etc. Even if you have a basic window manager you can automate this activity using Devil's Pie.
Ready to synchronize your Palm OS-based PDA with your Linux desktop? Here's a trio of GUI-based options and a command-line tool for you to try.
This document describes how to install the GNU/Linux GPL IPCop firewall and create a small home office network. In the second installment we cover creating a DMZ for hosting your own web server or mail server and the Copfilter proxy for filtering web and email traffic.
There are times when you're looking for a particular library, or file, which you know is available to Debian but you cannot find the package which contains it. This is the kind of job that the Debian packages site helped with in the past, but given its current unavailability we'll look at another approach.
Buffer overflow proofs of concept are produced with routine regularity, demonstrating how easy it can be to leverage unsafe coding practices into successful attacks and system takeovers. Thus, it's imperative to follow a layered methodology to fortify applications against the perils of unchecked code.
We ended last time after configuring our first unprivileged Xen domain. In this article, we complete our cluster and then test it using an open-source parallel ray tracer. The first thing we need to do is create additional slave nodes to be used with the cluster. So, let's get down to business.
I still remember those days clearly when I was taking a short term course in Unix. The Unix flavour being SCO Unix ver 5.0. The first command we were introduced to in Unix by the instructor was the 'banner' command.