Did you know Konqueror has a handy little program to create photo galleries in a few quick steps? Here's how to use it.
In this introductory article, Jon Watson provides an easy guide to installing the new Open Office source on non-rpm Linux systems. The emphasis is on the use of alien to help convert rpm packages for quick installation to the latest Debian releases.
Sudo is a handy little tool that is of value to both system administrators and common folks like us. What does it do? It allows you to temporarily assume the permissions of another user, up to and including root.
Last week, I wrote a small introduction to Gaim, a great chat client written for GTK. The functionality of Gaim has gotten quite advanced, which has made it one of the leading-edge open-source chat clients currently available.
We've previously covered setting up your own repository for the Debian's apt-get system, but we didn't cover managing automatic uploads. Thankfully this is a simple task with the reprepro, and dupload tools and a small amount of scripting.
The concept of NIC Bonding (or sometimes called NIC Teaming) is that you have two NICs bonded together to appear as if they are the same physical device. The ultimate goal of NIC teaming is limiting a "Single Point of Failure".
A quick glance through the ls man or info pages shows that hackers have been busy adding capabilities to ls and many other longstanding utilities. Let’s take a tour of new features of ls that could have you brushing the cobwebs off of your documentation.
It's not flashy, but if you're re-using text often or need to streamline your template and macro lists, spend a little time with AutoText.
This article will show you how to build a complete DNS System with Debian. This includes a Master server, a Slave server, DDNS, and a bunch of DNSSEC. I'll be using BIND 9 for the server.
QEMU lets you run another operating system on top of your existing OS. Going through the process of installing and configuring QEMU not only gave me a worthwhile new software tool, but also helped me learn a few things about Linux.
I recently went through the painful exercise of configuring Tomcat 5.5 behind Apache 2 using the mod_jk connector. So here's my own howto:
Don't you just hate it when you can't find a file you need, but you know it's on your computer? Wouldn't you like an easy way to track down files anywhere on your computer? If so, I have good news for you, a command available to you at the friendly Linux CLI called find.
You are alone in a dark cubicle. To the North is your boss’s office, to the West is your Team Lead’s cubicle, to the East is a window opening out to a five-floor drop, and to the South is a kitchenette containing a freshly brewed pot of coffee. You stare at your computer screen in bewilderment as the phone rings for the fifth time in as many minutes indicating that your users are unable to connect to their server.
In an earlier look at LDAP, we set up a simple LDAP-based authentication system. We configured client machines to retrieve authentication information from a server running OpenLDAP. Now let's go further by enabling encryption and looking at how to make user modifications through LDAP.
Read our article on Basic Dial-Up for Fedora and SuSe. Or start using Linux broadband with our article on DSL and Cable Modem Use.
Here's a short and sweet howto on setting up an easy raid array.
Need to pull some data from text--maybe e-mail messages--and sort it, graph it or otherwise manipulate it? Here's an AWK script to use as a starting point.
What do you look for in an email program? You may find it in Mutt, an easy-to-use text-based messaging client. Here's all you need to know to get started with Mutt.