Monthly Archive: April 2015

Apr 28 2015

Link: Running Android on Desktop: Which Emulator is the Best?

Android is one of the most popular mobile computing operating systems and powers a diverse range of phones, including the low-end ones and the high-end flagship. The good thing about Android is that other than running it on mobile devices, it can also run on the desktop with a suitable emulator. In case you have …

Continue reading »

Apr 27 2015

Link: How to set up NTP server in CentOS

Network Time Protocol (NTP) is used to synchronize system clocks of different hosts over network. All managed hosts can synchronize their time with a designated time server called an NTP server. An NTP server on the other hand synchronizes its own time with any public NTP server, or any server of your choice. The system …

Continue reading »

Apr 23 2015

Link: What the Raspberry Pi 2’s Overclock Settings Mean

The Raspberry Pi 2 is a lot faster than its predecessors, but you still might want to overclock it for the best possible performance. Blogger Hayden James breaks down what each overclock setting does and shares some configurations for better performance. Full article here: What the Raspberry Pi 2’s Overclock Settings Mean (Lifehacker)

Apr 22 2015

Link: Access Google Authenticator on the Desktop

No longer are you limited to using your smartphone to use Google’s two-step authentication. There are many apps that you can use easily on your desktop to help keep your accounts more secure. Keep in mind, though, that using a two-step authenticator app is less secure on your computer. Anyone who has access to your …

Continue reading »

Apr 21 2015

Link: How to Install and Configure NTP (Network Time Protocol) Server/Client in Debian Linux

Network Time Protocol (NTP) presents an unique ability for companies to synchronize the clocks of all the systems within the company. Time synchronization is important for many reasons ranging from application time stamps to security to proper log entries. When an organization’s systems all maintain different clock times, it becomes very difficult from a troubleshooting …

Continue reading »

Apr 20 2015

Link: DD Utility – Easily Backup and Restore Disk Image Files In Ubuntu

The legacy DD is a command line utility for UNIX like operating systems. DD stands for Data Description and the utility empowers the user to copy and convert files but it is a command line utility without any Graphical User Interface (GUI). DD utility can copy and convert simple files, device drivers (e.g for CD …

Continue reading »

Apr 19 2015

Link: Sed – An Introduction and Tutorial by Bruce Barnett

How to use sed, a special editor for modifying files automatically. If you want to write a program to make changes in a file, sed is the tool to use. There are a few programs that are the real workhorse in the UNIX toolbox. These programs are simple to use for simple applications, yet have …

Continue reading »

Apr 18 2015

Link: 5 Scribd Alternatives to Host Your PDF Files

As you probably know, Scribd is a popular document-hosting website, and if someone wanted to share a PDF file online, chances are they would upload it on Scribd. However, its interface and restrictive features, like paywall and required sign-up to download files, have been making a lot of people unhappy. Since Scribd is modifying its …

Continue reading »

Apr 17 2015

Link: OpenVPN-Setup: Shell script to set up Raspberry Pi (TM) as an OpenVPN server

About Shell script to set up Raspberry Pi (TM) as a VPN server using the free, open-source OpenVPN software. Includes templates of the necessary configuration files for easy editing, as well as a script for easily generating client .ovpn profiles after setting up the server. Based on the ReadWrite tutorial ‘Building A Raspberry Pi VPN’ …

Continue reading »

Apr 16 2015

Stop SOME SipVicious attacks from reaching your Asterisk, FreeSwitch, YATE, etc. PBX server

This tip was posted by user “infotek” on the FreePBX site but applies to all software PBX systems that use the iptables firewall. “infotek” wrote: By default the SipVicious scanner uses the ua : “friendly-scanner”. To block this ua, you can have iptables search the packet for that text. add the following line to /etc/sysconfig/iptables …

Continue reading »

Older posts «

%d bloggers like this: