Posted by meshal on Thursday, October 06, 2016 @ 20:48:45 EDT (2180 reads)
Do you think of the command line as an antiquated leftover from the past, or an old fashioned way of interacting with a computer? Think again. In Linux, it is the most flexible and powerful way to perform tasks. In this article, we will explore the basics of the Linux command line, including directory navigation, file/directory operations, and more.
Posted by meshal on Saturday, September 24, 2016 @ 10:34:21 EDT (1642 reads)
BCC (BPF Compiler Collection) is a powerful set of appropriate tools and example files for creating resourceful kernel tracing and manipulation programs. It utilizes extended BPF (Berkeley Packet Filters), initially known aseBPF which was one of the new features in Linux 3.15.
Posted by meshal on Sunday, August 10, 2014 @ 17:41:16 EDT (7910 reads)
Most Linux admins are aware of the yum (Yellow Dog Updater Modified) utility for package management in Red Hat-based distros such as RHEL, CentOS, and Fedora. Few, however, are aware of the power, benefits, and utility of yum groups.
The following tutorial is based on CentOS 6.5 and should work with other versions of Red Hat-based distros. Older versions may require that you install yum-utils in order to use yum groups.
Posted by meshal on Sunday, August 10, 2014 @ 11:57:33 EDT (6302 reads)
Well there I was, rebuilding a router and having a good time when I accidentally damaged the partition table on my main Linux installation, which is a GUID partition table, or GPT.
How did this happen? I was installing Voyage Linux on a compact flash card, and while I was messing around with GParted and other filesystem tools I accidentally ran some commands on/dev/sdb, my main hard disk, instead of /dev/sdc, the compact flash card. Like, oops. I don't know exactly which operations gummed up /dev/sdb, which would be good to know.
Posted by meshal on Saturday, August 09, 2014 @ 15:20:12 EDT (7803 reads)
Few Linux desktops have brought about such controversy as GNOME 3. It’s been ridiculed, scorned, and hated since it was first released. Thing is, it’s actually a very good desktop. It’s solid, reliable, stable, elegant, simple... and with a few minor tweaks and additions, it can be made into one of the most efficient and user-friendly desktops on the market.
I decided to go about this process by first installing a clean Ubuntu GNOME distribution that included GNOME 3.12. With the GNOME-centric desktop ready to go, it’s time to start tweaking.
Posted by meshal on Tuesday, April 13, 2004 @ 19:21:44 EDT (3200 reads)
You've prepared yourself for your Linux migration, now its time to make the jump. After reading Part 1, you should have the following items: Linux installation CDs (1-7 CDs depending on the distribution you picked), CD of drivers, a CD/DVD of your migrated files and a hard-drive with your files (if you chose this route).
Posted by meshal on Friday, April 09, 2004 @ 07:30:06 EDT (2799 reads)
Webmin is fast becoming the most popular system administration tool available for Linux, and Unix systems. Its abundance of available modules and Internet/intranet access allow system administrators to access and manage their systems from anywhere there is a web browser with Internet connectivity. Add the Perl SSLeay module, (Perl extension for using OpenSSL or SSLeay) and access is secure.
Posted by meshal on Thursday, April 01, 2004 @ 06:24:43 EST (3194 reads)
falkotimme.com: This is a detailed description about the steps to be taken to setup a Linux server based on White Box Linux that offers all services needed by ISPs and hosters (web server (SSL-capable), mail server (with SMTP-AUTH and TLS!), DNS server, FTP server, MySQL server, POP3/IMAP, Quota, Firewall, etc.).
Posted by meshal on Thursday, April 01, 2004 @ 06:13:27 EST (3165 reads)
securityfocus.com: This article describes the basic steps which should be performed in order to secure a MySQL database against both local and remote attacks. This is the third and last of the series of articles devoted to securing Apache, PHP and MySQL.
Posted by meshal on Thursday, April 01, 2004 @ 06:11:39 EST (3130 reads)
securityfocus.com: This article discusses the implementation of layered mail security using Unix as MTA in front of Microsoft groupware products. Part one describes the use of Sendmail, MIMEDefang and SpamAssassin. ..