What a better way to start the New Year off than to get organized. For those who haven't heard about the Getting Things Done method, you should try it out. It's actually really good if you ignore the whole self-help thing about it.
C, meet Python. Python, this is C. With surprisingly little effort, the Python interpreter can be integrated into your program to add features quickly that could take months if written entirely in C.
In this chapter, you will learn how to make your system truly your own. You'll learn how to change your background, your colors, your fonts, and anything else you'll need to create a desktop as individual as you are.
Well, it's the day after christmas and like me, you got this new keyboard with all those sweet little buttons on top. How to configure that you may ask? Let's explore this together.
On install of Debian, select no packages to be installed, allow it to connect to the internet and let it download anything it needs, usually its libs etc. Exim is most likely installed at this point so dont worry it will be removed shortly.
We're going to look at installing Xen 3.0 via the packages provided by Ralph Passgang. This also includes building a custom Xen kernel from source. The advantage to building the Xen kernel from source is that you can add, or remove, drivers - so the kernel is utterly customised for your system.
Many, if not most, free and open source software projects are developed primarily on Linux-based systems using the GNU C Library (glibc). When packages are built on systems that don't use glibc they often fail. The GNU Portability Library can help developers with cross-platform programming needs.
Snort is the leading open source Network Intrusion Detection System and is a valuable addition to the security framework at any site. Even if you are employing lots of preventative measures, such as firewalling, patching, etc., a detection system can give you an assurance that your defences truly are effective, or if not, will give you valuable information about what you need to improve.
Linux has a number of useful bandwidth monitoring and management programs. A quick search on Freshmeat.net for bandwidth returns a number of applications. However, if all you need is a basic overview of your total bandwidth usage, iptables is all you really need -- and it's already installed if you're using a Linux distribution based on the 2.4.x or 2.6.x kernels.
So, you have ADSL. Or you have your Linux box connected to a network (not by a phone line) and you have quite a traffic.
You need some tools to monitor your network traffic.
Yes, troubleshooting is an art!. The key points to mastering this art is knowing the system in and out, using the right tools and, of course, googling. Troubleshooting a problem is not something that can be spoon fed or taught with precise steps. It has to evolve from logical thinking and thorough knowledge of the system.
Previously we showed how to add basic completion to commands, using facilities which were already provided by the bash completion routines. In this second part we'll demonstrate how to add completely new custom completion to commands.
Sometimes you can craftily restore a damaged master boot record after an all night hack-a-thon. With proper care, restoration software, and carefully maintained backups it usually isn't necessary to read data raw off a partition.
But even with the best recovery systems in place accidents can still happen. When you've written over the MBR of your system after deleting it during a 4AM coding marathon more drastic measures than a backup restore are called for. Enter Foremost.
Spam is one of the biggest problems of the internet and just about everybody has written Bill Gates. I did not want to be one of those guys who blogs and never wrote about spam, one of the most loved subjects of bloggers. Here are some methods to avoid spam.
DVD writers have become so common these days that there is hardly any difference between the price of a CD-writer drive and a DVD-writer drive. Below are a few tips for newbies on how to burn DVDs on a Debian box using the command line
One of the nicest facilities of the modern shell is the built in "completion" support. These facilities allow you to complete commands and their arguments easily. Read on for a brief introduction to adding your own command completions.
Even if you boot in single user mode it will ask root password for maintenance, and just imagine you do not have a backup of /etc/shadow file. How will you fix such problem in a production environment where time is critical factor? Relax here I will explain how to recover deleted /etc/shadow file in five easy steps. It will take around 10 min. to fix problem.
Network and system administrators are well-versed in using the ping utility for troubleshooting purposes, but where do you turn when ping doesn't do the trick?
Many people are interested in getting their linux or BSD desktop interface to look as much like Apple's very successful OS X gui as possible. Here is a step by step method for doing so on the KDE desktop environment.