Debugging Linux pppd / PPTP VPN Problems
I've already written about setting up PPTP VPN client for proprietary Microsoft Point-to-Point vpn server using Linux pptp client. Learn how to troubleshoot and resolve common PPTP network connection...
View ArticlePaid Support From Novell / Red Hat Not Important for Linux Adoption
Companies are increasingly choosing free community-driven Linux distributions instead of commercial offerings with conventional support options from Red Hat or Novell due to dissatisfaction with the...
View ArticleGnome Desktop Tip: Quickly Open Any File / URL / Write Email
There are three ways to open any file under Gnome Linux / UNIX Desktop. gnome-open is the quickest and easiest way to open any file or url.
View ArticleInstall Linux on Fujitsu Siemens ESPRIMO E5720
I was trying to install Redhat ( RHEL 5) / CentOS 5 server on a Fujitsu Siemens ESPRIMO E5720 and got problem with the installer.
View ArticleNagios: System and Network Monitoring Book
The convenience and reliability that monitoring programs offer system administrators is astounding. Whether at home, commuting, or on vacation, admins can continuously monitor their networks, learning...
View ArticleRAID 5 vs RAID 10: Recommended RAID For Safety and Performance
A Redundant Array of Independent Drives (or Disks), also known as Redundant Array of Inexpensive Drives (or Disks) (RAID) is an term for data storage schemes that divide and/or replicate data among...
View ArticleLinux / UNIX: Find Out If a Directory Exists or Not
I've already written a small tutorial about finding out if a file exists or not under Linux / UNIX bash shell. However, couple of our regular readers like to know more about a directory checking using...
View ArticleLinux: Should You Use Twice the Amount of Ram as Swap Space?
Linux and other Unix-like operating systems use the term "swap" to describe both the act of moving memory pages between RAM and disk, and the region of a disk the pages are stored on. It is common to...
View Articlefold: Wrap Text File / Line / Words To Fit in Specified Width
fold is really nifty command line utility to make a text file word wrap. This is useful for large number of text files processing. There is no need to write a perl / python code or use a word processor.
View ArticleBASH Shell: For Loop File Names With Spaces
BASH for loop works nicely under UNIX / Linux / Windows and OS X while working on set of files. However, if you try to process a for loop on file name with spaces in them you are going to have some...
View ArticleHP to Ship Compaq Business PC with Pre Installed Suse Linux
Good news for all holiday buyers and open source software supporters. HP today announced the plans to introduce Linux as an operating system choice for business desktop customers. After Dell, HP the...
View ArticleDownload of the day: openSUSE 11.1 CD / ISO Images
openSUSE version 11.1 has been released and available for download (jump to download) from the official project website. The 11.1 release includes a ton of new features and improvements, an improved...
View ArticleImportant: Openssl Security Update [CVE-2008-5077]
Linux / BSD and UNIX like operating systems includes software from the OpenSSL Project. The OpenSSL is commercial-grade, industry-strength, full-featured Open Source toolkit implementing the Secure...
View ArticleLinux Convert ext3 to ext4 File system
Some time ago ext4 was released and available for Linux kernel. ext4 provides some additional benefits and perforce over ext3 file system. You can easily convert ext3 to ext4 file system. The next...
View ArticleHow To Tail (View) Multiple Files on UNIX / Linux Console
tail is one of the best tool to view log files in a real time (tail -f /path/to/log.file). The program MultiTail lets you view one or multiple files like the original tail program. The difference is...
View ArticleLighttpd Install mod_geoip For Country / City Level Geo Targeting
Geolocation software is used to get the geographic location of visitor using IP address. You can determine country, organization and guess visitors location. This is useful for: a] Fraud detection. b]...
View ArticleLinux Kernel Security (SELinux vs AppArmor vs Grsecurity)
Linux kernel is the central component of Linux operating systems. It is responsible for managing the system's resources, the communication between hardware and software and security. Kernel play a...
View ArticleTop 20 OpenSSH Server Best Security Practices
OpenSSH is the implementation of the SSH protocol. OpenSSH is recommended for remote login, making backups, remote file transfer via scp or sftp, and much more. SSH is perfect to keep confidentiality...
View ArticleBIND 9 Dynamic Update DoS Security Update
BIND 9 is an implementation of the Domain Name System (DNS) protocols. named daemon is an Internet Domain Name Server for UNIX like operating systems. Dynamic update messages may be used to update...
View Article20 Linux Server Hardening Security Tips
Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers). The system administrator is responsible for security Linux box. In...
View Article
More Pages to Explore .....