Language Selection

English French German Italian Portuguese Spanish

HowTos

some howtos & roundups:

Filed under
HowTos
  • How-To: Create CD/DVD ISO Images with K3b

  • 15 Minutes to a sweet Ubuntu install which can coexist with Windows
  • Howto: Gentoo Guest OS in VirtualBox
  • Using Screen, Script, Mkfifo And Redirection To Watch Or Log User Sessions
  • Flash not working with Firefox openSUSE 11.0
  • Fix JAVA plugin in Hardy Firefox
  • Howto Starting and Stopping Ubuntu
  • Make Ubuntu Faster and Smoother
  • Apps to View HTML files from Console
  • 4 Apps to Rip DVDs on Linux

some more howtos:

Filed under
HowTos
  • How to stop printing in Linux

  • Using the 'find' command
  • 5 Tips to Make Working with the Shell Easier
  • Virtualbox vs. VMware Server
  • Howto Install VirtualBox 1.6 in Ubuntu
  • KDE: Right Click, Extract Here
  • Using GNU Screen on a Remote Machine
  • K9Copy - DVD Backup Tool

some howtos:

Filed under
HowTos
  • For those "oops" moments: ext3undel

  • Script for RAW files into JPEG (or TIFF or PNG…)
  • Tip-redirecting with sudo command
  • Monitoring network performance with GNetWatch
  • How to Install MSN Messenger on Ubuntu Linux?
  • Edit The Applications Menu With Two-Clicks : Ubuntu 8.04
  • Fix Java in Firefox 3
  • Building shared libraries with Libtool

The Perfect Server - OpenSUSE 11

Filed under
SUSE
HowTos

This is a detailed description about how to set up an OpenSUSE 11 server that offers all services needed by ISPs and hosters: Apache web server (SSL-capable), Postfix mail server with SMTP-AUTH and TLS, BIND DNS server, Proftpd FTP server, MySQL server, Dovecot POP3/IMAP, Quota, Firewall, etc. This tutorial is written for the 32-bit version of OpenSUSE 11, but should apply to the 64-bit version with very little modifications as well.

some more howtos:

Filed under
HowTos
  • Update compiz fusion

  • Intel Wireless 3945abg on Gentoo
  • Using qemu on Windows
  • How to install Ubuntu on an MSI Wind laptop
  • Tip-add a option Delete to pop-up menu on Gnome
  • How to check what is running on your system
  • Enable Timed or Automatic Login on Ubuntu 8.04
  • Yum Download Only

some howtos:

Filed under
HowTos
  • A Simple Guide to Making the Perfect Recording in Audacity

  • qGIS on Ubuntu Hardy
  • Vim Editing Multiple Files and Windowing Support Under Linux / UNIX
  • Fast, powerful Geany editor offers IDE features
  • Using Traps Outside Of Shell Scripts On Unix Or Linux
  • From noise to grain

some howtos:

Filed under
HowTos
  • Installing applications in Linux (part II)

  • Partitions
  • Printing CD Labels with GIMP and Canon Pixma iP3000
  • How to remove the ‘ghost’ files from the USB drive
  • Howto install latest ayttm for yahoo messanger in Ubuntu
  • Double Spacing In Awk, Perl and Shell on Linux and Unix
  • Default kdesu to use sudo and not su
  • Creative VF0330 Webcam on Linux - Fedora 9
  • Designing Graphics With Gimp

How To Block Spammers/Hackers With mod_defensible On Apache2 (Debian Etch)

Filed under
HowTos

mod_defensible is an Apache 2.x module intended to block spammers/hackers/script kiddies using DNSBL servers. It will look at the client IP and check it in one or several DNSBL servers and return a 403 Forbidden page to the client. This guide shows how to install and use it with Apache 2 on a Debian Etch server.

few more howtos:

Filed under
HowTos
  • Tweaking the Eee PC part 2

  • Automating the creation of slide shows in OpenOffice.org
  • Auto-Hide Your Mouse Pointer When Idle With “Unclutter”
  • How-To: Use cdparanoia to Rip Audio CDs
  • Training Tips for New Linux Users
  • Helpful Tip: Disable Drag & Drop Images in Firefox
  • Fixing NTFS Mount Error in GNU/Linux
  • Killing those runaway processes that refuse to die

In A State Of Flux

Filed under
Fluxbox
HowTos

reddevil62-techhead.blogspot: I CAME quite late to the Fluxbox party, and now I am here I wish I had arrived earlier. Fluxbox is a lightweight window manager for the X window system used by Linux distributions. When I say “lightweight”, I mean it is not resource-hungry, so If you like your desktop cluttered with icons and shortcuts, or enjoy fancy 3D, Compiz-driven eye candy, then Fluxbox may not be for you.

Syndicate content

More in Tux Machines

Development Functional Programming in JavaScript and Learning to Code

  • An introduction to functional programming in JavaScript
    When Brendan Eich created JavaScript in 1995, he intended to do Scheme in the browser. Scheme, being a dialect of Lisp, is a functional programming language. Things changed when Eich was told that the new language should be the scripting language companion to Java. Eich eventually settled on a language that has a C-style syntax (as does Java), yet has first-class functions. Java technically did not have first-class functions until version 8, however you could simulate first-class functions using anonymous classes. Those first-class functions are what makes functional programming possible in JavaScript. JavaScript is a multi-paradigm language that allows you to freely mix and match object-oriented, procedural, and functional paradigms. Recently there has been a growing trend toward functional programming. In frameworks such as Angular and React, you'll actually get a performance boost by using immutable data structures. Immutability is a core tenet of functional programming. It, along with pure functions, makes it easier to reason about and debug your programs. Replacing procedural loops with functions can increase the readability of your program and make it more elegant. Overall, there are many advantages to functional programming.
  • Learning to Code in One’s Own Language
    I recently published a paper with Sayamindu Dasgupta that provides evidence in support of the idea that kids can learn to code more quickly when they are programming in their own language. Millions of young people from around the world are learning to code. Often, during their learning experiences, these youth are using visual block-based programming languages like Scratch, App Inventor, and Code.org Studio. In block-based programming languages, coders manipulate visual, snap-together blocks that represent code constructs instead of textual symbols and commands that are found in more traditional programming languages.
  • [Older] RcppArmadillo 0.7.900.2.0

Intel Core i7 7740X Preliminary Benchmarks On Linux

For those not yet well briefed on the Core-X series since the embargo expiry last week, the i7-7740X has four cores plus Hyper Threading. It has a 4.3GHz base frequency with 4.5GHz turbo frequency and an 8MB cache. The i7-7740X has a 112 Watt TDP, natively supports DDR4-2666 of dual-channel memory, and foregoes any integrated graphics. Read more

Security: Another Massive, Worldwide Ransom Attack on Microsoft Windows, Security News About GNU/Linux

  • NSA-linked tools help power second global ransomware outbreak [Ed: And neglecting to mention it targets Microsoft Windows. Why?]
  • Hacker Behind Massive Ransomware Outbreak Can't Get Emails from Victims Who Paid
    On Tuesday, a new, worldwide ransomware outbreak took off, infecting targets in Ukraine, France, Spain, and elsewhere. The hackers hit everything from international law firms to media companies. The ransom note demands victims send bitcoin to a predefined address and contact the hacker via email to allegedly have their files decrypted.
  • Digital signatures in package management
    Serious distributions try to protect their repositories cryptographically against tampering and transmission errors. Arch Linux, Debian, Fedora, openSUSE, and Ubuntu all take different, complex, but conceptually similar approaches. Many distributions develop, test, build, and distribute their software via a heterogeneous zoo of servers, mirrors, and workstations that make central management and protection of the end product almost impossible. In terms of personnel, distributions also depend on the collaboration of a severely limited number of international helpers. This technical and human diversity creates a massive door for external and internal attackers who seek to infect popular distribution packages with malware. During updates, then, hundreds of thousands of Linux machines download and install poisoned software with root privileges. The damage could hardly be greater. The danger is less abstract than some might think. Repeatedly in the past, projects have had to take down one or more servers after hacker attacks. The motivation of (at least) all the major distributions to protect themselves from planted packages is correspondingly large and boils down to two actions: one simple and one cryptographic.
  • This Windows Defender bug was so gaping its PoC exploit had to be encrypted
    Microsoft recently patched a critical vulnerability in its ubiquitous built-in antivirus engine. The vulnerability could have allowed attackers to execute malicious code by luring users to a booby-trapped website or attaching a booby-trapped file to an e-mail or instant message.
  • [Older] Reproducible Builds: week 110 in Stretch cycle
  • [Older] Free Market Security
    I think there are many of us in security who keep waiting for demand to appear for more security. We keep watching and waiting, any day now everyone will see why this matters! It's not going to happen though. We do need security more and more each day. The way everything is heading, things aren't looking great. I'd like to think we won't have to wait for the security equivalent of a river catching on fire, but I'm pretty sure that's what it will take.
  • Linux Systems in the Hackers' Cross Hairs [Ed: This is a rewrite of a press release below. Phil Muncaster could certainly have done better than this.]
  • New Research Shows Cybersecurity Battleground Shifting to Linux and Web Servers
    "This new Firebox Feed data allows us to feel the pulse of the latest network attacks and malware trends in order to identify patterns that influence the constantly evolving threat landscape," said Corey Nachreiner, chief technology officer at WatchGuard Technologies. "The Q1 report findings continue to reinforce the importance and effectiveness of basic security policies, layered defenses and advanced malware prevention. We urge readers to examine the report's key takeways and best practices, and bring them to the forefront of information security efforts within their organizations."

Ubuntu Kylin, a Linux Distribution with a Microsoft Windows Experience

Ubuntu Kylin is an open-source Linux distribution based on Ubuntu since 2013, mainly developed by a Chinese team alongside dozens of Linux developers all over the world. It contains the basic features you would expect from Ubuntu, plus features a desktop environment and applications. As far as we know, Ubuntu Kylin is one of the most suitable Linux distributions for users who are farmiliar with Microsoft Windows, including its desktop environment, office suite and various applications. Read more