This document lists the majority of services available for any distribution of Linux. The list includes a description of each service's purpose, and a comment regarding whether it is a required service.
In long documents, a strong search-and-replace tool is essential for editing duties. Although many users confine themselves to simple text searches, OpenOffice.org's various searches are a match for any rival's. They also are remarkably consistent throughout Writer, Calc, Draw and Impress, the four main OOo applications.
Build managers allow developers to better coordinate their coding efforts by providing an automatically generated current and working snapshot of an application, including a binary file for immediate testing. Build managers are the next logical step to source code repositories. Urbancode's Anthill build management server for Java applications provides build automation, unit tests, build tracking, and support for a number of version control systems.
Spam appears to be a fact of life for most of the online world at the moment. Here is how I personally handle the filtering of incoming mail, using a combination of Pyzor, SpamBayes and Procmail. These tools each integrate nicely, and work easily with my mail reader of choice: mutt.
In this tutorial I will describe how to install and configure MyDNS, a DNS server that uses a MySQL database as backend instead of configuration files like, for example, Bind or djbdns. This has the advantage that you can easily use web-based frontends to administrate your DNS records.
If you need to give a presentation, you're going to need slides. If you don't give presentations often, you may spend a lot of time playing hunt-the-feature with a traditional presentation application as you try to bring the slides in your mind's eye to the screen. Pylize, a Python-based command-line tool, lets you use familiar HTML coding techniques to get the job done.
Since my College days, when I was introduced to Unixes, I love to have my own compiled kernel. It gave me that special feeling of "my machine is better than yours". Besides, a custom kernel serves as an interesting conversation topic with geeks. Just ask them "What is your kernel size ?".
What a better way to start the New Year off than to get organized. For those who haven't heard about the Getting Things Done method, you should try it out. It's actually really good if you ignore the whole self-help thing about it.
C, meet Python. Python, this is C. With surprisingly little effort, the Python interpreter can be integrated into your program to add features quickly that could take months if written entirely in C.
In this chapter, you will learn how to make your system truly your own. You'll learn how to change your background, your colors, your fonts, and anything else you'll need to create a desktop as individual as you are.
Well, it's the day after christmas and like me, you got this new keyboard with all those sweet little buttons on top. How to configure that you may ask? Let's explore this together.
On install of Debian, select no packages to be installed, allow it to connect to the internet and let it download anything it needs, usually its libs etc. Exim is most likely installed at this point so dont worry it will be removed shortly.
We're going to look at installing Xen 3.0 via the packages provided by Ralph Passgang. This also includes building a custom Xen kernel from source. The advantage to building the Xen kernel from source is that you can add, or remove, drivers - so the kernel is utterly customised for your system.
Many, if not most, free and open source software projects are developed primarily on Linux-based systems using the GNU C Library (glibc). When packages are built on systems that don't use glibc they often fail. The GNU Portability Library can help developers with cross-platform programming needs.
Snort is the leading open source Network Intrusion Detection System and is a valuable addition to the security framework at any site. Even if you are employing lots of preventative measures, such as firewalling, patching, etc., a detection system can give you an assurance that your defences truly are effective, or if not, will give you valuable information about what you need to improve.
Linux has a number of useful bandwidth monitoring and management programs. A quick search on Freshmeat.net for bandwidth returns a number of applications. However, if all you need is a basic overview of your total bandwidth usage, iptables is all you really need -- and it's already installed if you're using a Linux distribution based on the 2.4.x or 2.6.x kernels.
So, you have ADSL. Or you have your Linux box connected to a network (not by a phone line) and you have quite a traffic.
You need some tools to monitor your network traffic.
Yes, troubleshooting is an art!. The key points to mastering this art is knowing the system in and out, using the right tools and, of course, googling. Troubleshooting a problem is not something that can be spoon fed or taught with precise steps. It has to evolve from logical thinking and thorough knowledge of the system.
Previously we showed how to add basic completion to commands, using facilities which were already provided by the bash completion routines. In this second part we'll demonstrate how to add completely new custom completion to commands.