Language Selection

English French German Italian Portuguese Spanish

HowTos

The Perfect Desktop - Ubuntu Studio 9.10

Filed under
Ubuntu
HowTos

This tutorial shows how you can set up an Ubuntu Studio 9.10 desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.

Using Kate As a Web Editor

Filed under
HowTos
  • Using Kate As a Web Editor
  • Linux Disable Mounting of Uncommon Filesystem
  • Basic postgresql server setup
  • Color Management in digiKam
  • Adding a sudoer to use sudo on Debian
  • Live upgrade from openSUSE 11.0 to 11.2

How To Secure Your D-Link Wireless Router

Filed under
Hardware
HowTos

makeuseof.com: Security is probably the most important aspect of any computing experience and probably one of the most neglected. Let’s lock your door by securing your D-Link Wireless Router. Ok, off-topic, but by me, so go read it.

some howtos:

Filed under
HowTos
  • Install OpenGoo for in house collaboration tools
  • Apache troubleshooting tips
  • LiveCD’s and MD5SUMS – A Tutorial
  • How to get Hard disk, CPU infomation, and temp in Ubuntu
  • How to record audio playing on your computer using Audacity
  • Using color in shell scripts (Linux, Mac OS X)
  • Drupal Site with temporary URL
  • Using BitlBee to consolidate instant messaging into one client
  • My desktop backup solution
  • Pavilion two fingers touchpad scrolling
  • Ubuntu 9.10 Installing Microsoft Office 2007

Hidden Linux : What the fsck?

Filed under
HowTos

blogs.pcworld.co.nz: Linux's file system check utility fsck is little recognised and largely unloved, no doubt because it seems to know whenever you're in a hurry to boot your machine. Then - and why is it only then? - it starts doing what it was designed for -

Ubuntu 9.10

Filed under
Ubuntu
HowTos
  • Ubuntu 9.10
  • Ubuntu should focus its marketing on LTS versions
  • How to Configure Ubuntu desktop to use your proxy server
  • freedom desktops closing in on me
  • Ubuntu: Nope, You Can’t Watch TV On The Web
  • Ubuntu Open Week in a Nutshell
  • How to Setup Transparent Squid Proxy Server in Ubuntu
  • Ubuntu: the complete beginner's guide
  • A use for choice
  • XBMC on Karmic with VDPAU and VDR
  • Mic not working with skype on Ubuntu 9.10 karmic koala

The Perfect Server - Ubuntu 9.10

Filed under
Ubuntu
HowTos

This tutorial shows how to set up an Ubuntu Karmic Koala (Ubuntu 9.10) server that offers all services needed by ISPs and hosters: Apache web server (SSL-capable), Postfix mail server with SMTP-AUTH and TLS, BIND DNS server, Proftpd FTP server, MySQL server, Courier POP3/IMAP, Quota, Firewall, etc. In the end you should have a system that works reliably, and if you like you can install the free webhosting control panel ISPConfig 2 (i.e., ISPConfig runs on it out of the box).

few howtos:

Filed under
HowTos
  • [ How to ] open Corel Draw files ( .cdr ) in Linux
  • Create a minimal Slackware LiveUSB system
  • How to enable root login at startup in Ubuntu Karmic 9.10?
  • Batch Renaming Photos with Command-Line Tools
  • How to add hard disks in VirtualBox - Tutorial
  • How to turn an old PC into a media centre

Windows 7 or Ubuntu 9.10

Filed under
Ubuntu
HowTos
  • The Best and Worst About Ubuntu Karmic
  • Windows 7 or Ubuntu 9.10 : Which OS will you prefer?
  • Windows 7 vs Ubuntu 9.10
  • Karmic 9.10 Dell Ubuntu And BIOS
  • Install a graphical firewall client on Ubuntu 9.10
  • Ubuntu: Fix blacked-out desktop on older ATI Radeon in 9.10

other howtos:

Filed under
HowTos
  • An important Linux Security Fix
  • Useful Mysql Commands
  • Snoop on your own network with ntop
  • Convert PNG to GIF via Command Line
  • Beginner's Guide to Linux Desktops Backups: Basic Strategies and Tools
  • Wireless Linux: Using the Linux Wireless ToolBox
  • Installing Linux on WRT54g Wireless Router
Syndicate content

More in Tux Machines

Security Leftovers

  • Security updates for Thursday
  • Security Tips for Installing Linux on Your SysAdmin Workstation
    Once you’ve chosen a Linux distro that meets all the security guidelines set out in our last article, you’ll need to install the distro on your workstation.
  • Fedora 26 crypto policy Test Day today (2017-03-30)!
  • Open-source developers targeted in sophisticated malware attack
    For the past few months, developers who publish their code on GitHub have been targeted in an attack campaign that uses a little-known but potent cyberespionage malware. The attacks started in January and consisted of malicious emails specifically crafted to attract the attention of developers, such as requests for help with development projects and offers of payment for custom programming jobs. The emails had .gz attachments that contained Word documents with malicious macro code attached. If allowed to execute, the macro code executed a PowerShell script that reached out to a remote server and downloaded a malware program known as Dimnie.
  • A scramble at Cisco exposes uncomfortable truths about U.S. cyber defense
    When WikiLeaks founder Julian Assange disclosed earlier this month that his anti-secrecy group had obtained CIA tools for hacking into technology products made by U.S. companies, security engineers at Cisco Systems (CSCO.O) swung into action. The Wikileaks documents described how the Central Intelligence Agency had learned more than a year ago how to exploit flaws in Cisco's widely used Internet switches, which direct electronic traffic, to enable eavesdropping. Senior Cisco managers immediately reassigned staff from other projects to figure out how the CIA hacking tricks worked, so they could help customers patch their systems and prevent criminal hackers or spies from using the same methods, three employees told Reuters on condition of anonymity.
  • NTPsec: a Secure, Hardened NTP Implementation
    Network time synchronization—aligning your computer's clock to the same Universal Coordinated Time (UTC) that everyone else is using—is both necessary and a hard problem. Many internet protocols rely on being able to exchange UTC timestamps accurate to small tolerances, but the clock crystal in your computer drifts (its frequency varies by temperature), so it needs occasional adjustments. That's where life gets complicated. Sure, you can get another computer to tell you what time it thinks it is, but if you don't know how long that packet took to get to you, the report isn't very useful. On top of that, its clock might be broken—or lying. To get anywhere, you need to exchange packets with several computers that allow you to compare your notion of UTC with theirs, estimate network delays, apply statistical cluster analysis to the resulting inputs to get a plausible approximation of real UTC, and then adjust your local clock to it. Generally speaking, you can get sustained accuracy to on the close order of 10 milliseconds this way, although asymmetrical routing delays can make it much worse if you're in a bad neighborhood of the internet.
  • Zelda Coatings
    I assume that every permutation of scams will eventually be tried; it is interesting that the initial ones preyed on people's avarice and dishonesty: "I will transfer millions to your bank account, then you share with me" - with subsequent scams appealing to another demographic: "I want to donate a large sum to your religious charity" - to perhaps capture a more virtuous but still credulous lot. Where will it end ?

Tizen and Android

Linux and Linux Foundation

Mesa and Intel Graphics