Monthly Archive: March 2015

Mar 31 2015

Link: Create an Apple ID without using a Credit Card

Some apps, Google Earth for example, are available as free downloads in the iTunes Apps store but you need a UK or US based Apple ID to install them on to your iPad or Phone. Similarly, some iBooks and podcasts have geo restrictions and may only be available to iTunes users who are logged in …

Continue reading »

Mar 30 2015

Link: A short course in Linux on Github, broken up into 20 daily lessons.

No real introduction to this one, it’s just a short course in Linux server administration posted on Github that is divided up into 20 daily lessons.

Mar 29 2015

Links: Linux Fundamentals, Parts 1-4

Welcome to “Linux fundamentals,” ….. designed to prepare you for the Linux Professional Institute’s 101 exam. ….. By the end of this series of tutorials (eight in all), you’ll have the knowledge you need to become a Linux Systems Administrator and will be ready to attain an LPIC Level 1 certification from the Linux Professional …

Continue reading »

Mar 28 2015

Link: Linux Troubleshooting: How To Keep A Process Running After Putty Or SSH Session Closed?

Mostly, I use SSH command to connect to my remote server. Unfortunately, today the power is gone and the Ethernet hub is turned off, so my SSH session was lost. What do you do if an important task is going on after losing your SSH session? Here is the simple tool called Tmux to keep …

Continue reading »

Mar 27 2015

Link: 6 Cool Uses of Linux Live CDs

One of the good (or bad) things about Linux is that there are a lot of different distributions and almost all of them come in the form of live CDs. For the casual user, you might be wondering why in the world you need a live Linux CD when you have a functional operating system …

Continue reading »

Mar 26 2015

Link: Understanding Linux File Permissions

The Unix operating system (and likewise, Linux) differs from other computing environments in that it is not only amultitasking system but it is also a multi-user system as well. ….. In order to make this practical, a method had to be devised to protect the users from each other. After all, you could not allow …

Continue reading »

Mar 25 2015

Link: How to Create YouTube Playlists without Logging In

There’s however a simple URL hack that will let you create “virtual” playlists on YouTube – they are like regular playlists except that they are not connected to any Google account and you can still add or remove videos on the fly. Full article here: How to Create YouTube Playlists without Logging In (Digital Inspiration)

Mar 24 2015

Link: 5 Grep Tools for Linux

As every Linux user surely knows, grep is a reliable command-line tool for in-depth file searching. Still, many beginners avoid it because they dislike the terminal. The apps presented in this article aren’t exactly alternatives to grep because in some usage scenarios grep is truly irreplaceable. Instead, let’s call them visual upgrades for grep because …

Continue reading »

Mar 23 2015

Link: A list of operating systems for the Pi 2

Who knew there were this many operating systems available for the Raspberry Pi? A list of operating systems for the Pi 2 (Reddit)

Mar 22 2015

Link: Security in Three Ds: Detect, Decide and Deny (using DenyHosts to stop brute-force SSH attacks)

Whenever a server is accessible via the Internet, it’s a safe bet that hackers will be trying to access it. Just look at the SSH logs for any server you use, and you’ll surely find lots of “authentication failure” lines, originating from IPs that have nothing to do with you or your business. Brute-force attempts …

Continue reading »

Older posts «

%d bloggers like this: