Language Selection

English French German Italian Portuguese Spanish

HowTos

xrandr and the X Window System

Filed under
Software
HowTos

blog.hydrasystemsllc: For those of us who have traveled outside of the world of Microsoft Windows and into UNIX-like operating systems, we should already be somewhat familiar with the X Window System. Some of us even understand its full potential. Over the years, I have grown really fond of one specific command line utility and that is xrandr.

some howtos:

Filed under
HowTos
  • A free, open-source Linux multimedia streamer

  • How to Join the Ubuntu Community
  • Creating an adhoc host with Ubuntu
  • Taming the Wild Eee PC: Replacing the Operating System, Part 1
  • The Detail Guide To Perform A Debian 5.0 Network Install
  • 10 iptables rules to help secure your Linux box
  • Aligning filesystems to an SSD’s erase block size
  • Use netstat to See Internet Connections
  • Using ntfs partitions from GNU/Linux
  • Make Firefox flag secure web pages in Ubuntu and Mint
  • Retheaming Ubuntu - Part 2
  • Building OpenJDK under Ubuntu

Connecting to Windows servers from GNU/Linux using pyNeighborhood

Filed under
HowTos

Need to connect to a Windows server from a computer running GNU/Linux? pyNeighborhood gives you an easy and graphical way to do just that.

Read the full tutorial at Freesoftware Magazine.

The Perfect Server - Debian Lenny (Debian 5.0) [ISPConfig 2]

Filed under
HowTos

This tutorial shows how to set up a Debian Lenny (Debian 5.0) server that offers all services needed by ISPs and hosters: Apache web server (SSL-capable), Postfix mail server with SMTP-AUTH and TLS, BIND DNS server, Proftpd FTP server, MySQL server, Courier POP3/IMAP, Quota, Firewall, etc.

some howtos:

Filed under
HowTos
  • Per-Process Namespaces

  • Duplicate your Ubuntu Installation....
  • Fast access to frequently used directories
  • How Linux Shuts Down
  • bash completion: /dev/fd/62: No such file or directory
  • Adding Custom Shortcuts to Gnome
  • How to resolve the ‘/bin/rm: Argument list too long’ error
  • Extract the MP3 Audio Portion of a Video

How To: Turn Your Linux Rig into a Streaming Media Center

Filed under
HowTos

maximumpc.com: These days, most people have at least one computer and a large collection of media files. The conventional practice for most people has always been to have redundant copies of their media collection on their various computers. While this system technically works, it is highly inefficient.

some howtos:

Filed under
HowTos
  • Linux Shell Tricks To Save You A Few Gray Hairs

  • Run a command when not busy
  • How to know which drivers you may need when configuring your Kernel
  • Migrating from Outlook to Mozilla Thunderbird in Linux (part 1)
  • Periodic Table of the Operators
  • How to upgrade Debian Lenny to Squeeze
  • Benchmark Your Computer with Debian 5 Lenny
  • Upgrading a C# Mono Application on Gentoo Linux, Pt 3

Howto Upgrade Debian 4 Etch to Debian 5.0 Lenny

Filed under
HowTos

cyberciti.biz: Debian version 5.0 has been released. It is recommended that you upgrade the system to latest version. Upgrading remote Debian server is a piece of cake. In this tutorial, you will learn.

Installing Windows XP As A KVM Guest On Ubuntu 8.10 Desktop

Filed under
Ubuntu
HowTos

There's a bug in virt-install and virt-manager on Ubuntu 8.10 that does not let you run Windows XP as a guest under KVM. During the Windows installation, the guest needs to be rebooted, and then you get the following error, and Windows XP refuses to boot: "A disk read error occured. Press Ctrl+Alt+Del to restart".

some howtos:

Filed under
HowTos
  • Opera 10: Remove ‘Click to activate’ on flash in Linux

  • How to deny root ssh login
  • Simple bash script to monitor your webserver remotely on different ports
  • Howto Round Robin DNS on a Linux server
  • Installing Webcams In Ubuntu: The Easy Way
  • How to measure and read disk activity
  • Command Line Image Editing with ImageMagick
  • How to enable last.fm audioscrobbler for xmms2
  • More about customization on Konsole
  • Adding times to the history
  • How to get a screenshot in linux using command line tools: xwininfo, convert.
  • Migrating to Linux: Tip 1: Do DHCP and DNS first
Syndicate content

More in Tux Machines

Android N’s navigation buttons could get a face-lift

New Zealand vs Wales Live Streaming

Android Leftovers

IT runs on the cloud, and the cloud runs on Linux. Any questions?

A recent survey by the Uptime Institute of 1,000 IT executives found that 50 percent of senior enterprise IT executives expect the majority of IT workloads to reside off-premise in cloud or colocation sites in the future. Of those surveyed, 23 percent expect the shift to happen next year, and 70 percent expect that shift to occur within the next four years. Read more

Security Leftovers

  • Teardrop Attack: What Is It And How Does It Work?
    In Teardrop Attack, fragmented packets that are sent in the to the target machine, are buggy in nature and the victim’s machine is unable to reassemble those packets due to the bug in the TCP/IP fragmentation.
  • Updating code can mean fewer security headaches
    Organizations with high rates of code deployments spend half as much time fixing security issues as organizations without such frequent code updates, according to a newly released study. In its latest annual state-of-the-developer report, Devops software provider Puppet found that by better integrating security objectives into daily work, teams in "high-performing organizations" build more secure systems. The report, which surveyed 4,600 technical professionals worldwide, defines high IT performers as offering on-demand, multiple code deploys per day, with lead times for changes of less than one hour. Puppet has been publishing its annual report for five years.
  • Over half of world's top domains weak against email spoofing
    Over half of the world's most popular online services have misconfigured servers which could place users at risk from spoof emails, researchers have warned. According to Swedish cybersecurity firm Detectify, poor authentication processes and configuration settings in servers belonging to hundreds of major online domains are could put users at risk of legitimate-looking phishing campaigns and fraudulent emails.