Month: October 2014

Link: Automated monitoring of web pages using Page2RSS, Feedly and IFTTT

This post will show you how to use these tools to automatically monitor any web page to notify you when there are changes you might be interested in.

Full article here:
Automated monitoring of web pages using Page2RSS, Feedly and IFTTT (Thoughts from the Nerd State)

Link: How to Manage Startup Applications in Ubuntu 14.04

Whenever you boot up your Ubuntu machine, there will be a lot of third party applications and services that will start up automatically with the core services and applications. If you found that your Ubuntu machine bootup is becoming slower and slower, these piled up startup applications could be the cause for it.

Full article here:
How to Manage Startup Applications in Ubuntu 14.04 (Make Tech Easier)

Link: 15 Practical Examples of ‘cd’ Command in Linux

In Linux ‘cd‘ (Change Directory) command is one of the most important and most widely used command for newbies as well as system administrators. For admins on a headless server, ‘cd‘ is the only way to navigate to a directory to check log, execute a program/application/script and for every other task. For newbie it is among those initial commands they make their hands dirty with.

Full article here:
15 Practical Examples of ‘cd’ Command in Linux (Tecmint)

Link: Systemd Dev Slams FOSS Culture

The open source community is “quite a sick place to be in,” Red Hat engineer and Systemd developer Lennart Poettering said Monday in a post on Google+.

“The open source community is full of [assh*les], and I probably more than most others am one of their most favorite targets,” Poettering added. “I get hate mail for hacking on open source. People have started multiple ‘petitions’ …. asking me to stop working. Recently, people started collecting Bitcoins to hire a hitman for me (this really happened!).”

Full article here:
Systemd Dev Slams FOSS Culture (LinuxInsider.com)

We are just happy to see that someone is finally shedding some light on the very pervasive problem of online bullies that hang out in Linux and open source software communities. And they don’t just attack developers, they also go after inexperienced users that ask simple questions about how to do something. Not all forums allow this sort of behavior, but enough do that it has caused many people to want nothing to do with Linux, or with a particular piece of software.

There’s also a lot of passive-aggressive behavior in such forums – for example, a user asks how to perform some task and is told to go read a man page or to f*cking Google it. People who respond in that way are no less bullies than the sort that outright attack other participants, and should have sledge hammers applied to their keyboards! These people are a scourge on the open source and Linux communities, and are probably the major reason that Linux is not as popular as Windows or OS X. No new user wants to be talked down to, or treated in a condescending manner by some asshole who thinks he is superior to everyone else in a group.

I do realize that this is not a problem in Linux and open source communities alone; I’ve seen similar behavior on other forums that have nothing to do with those. But for some odd reason, communities based around Linux and open source software seem to attract a higher percentage of these types. Here’s a hint: If someone asks a question and you don’t feel like actually helping them, then DON’T TYPE ANYTHING! Move on to the next thread, or go do something more productive, or watch TV for a while, or do ANYTHING else, but KEEP YOUR DAMN FINGERS OFF THE KEYBOARD!

Link: How to Setup Monitorix – Network and System Monitoring Tool for Linux

Monitorix is an open source and lightweight system monitoring tool designed to monitor network and system resources in linux/UNIX operating system. Monitorix can collects network and system performce and also resources and then display the informations into graphs. it will help system adn network administrator to detect abnormal activities and detecting bottlenecks. This post will show to setup Monitorix on linux centOS 6.5.

Full article here:
How to Setup Monitorix – Network and System Monitoring Tool for Linux (eHow Stuff)

Link: How To Recover A CryptoLocker Infected Hard Drive

CryptoLocker is a ransomware which is just simple and devastating. Up until now, computers effected by CryptoLocker were unusable unless you paid the demanded monetary payment.

…..

Up until now, there was no way to recover the data encrypted by CryptoLocker.

Thanks to the researchers at Fox-IT and FireEye, though, who managed to recover the private encryption keys and Kyrus Technologies for building the actual decryption engine. Combining the efforts, these security firms launched a website which can be used by the victims of CryptoLocker to decrypt their encrypted files free of charge.

Full article here:
How To Recover A CryptoLocker Infected Hard Drive (Make Tech Easier)

Link: Configure “No Password SSH Keys Authentication” with PuTTY on Linux Servers

SSH (Secure SHELL) is one of the most used network protocol to connect and login to remote Linux servers, due to its increased security provided by its cryptographic secure channel established for data flow over insecure networks and its Public Key Authentication.

While using passwords to login to remote servers can provide a less secure to system security, because a password can be brute-force cracked, SSH Public Key Authentication provides the best secure method to perform distance logins, because it’s almost impossible to decipher the key and the private key guarantees that the sender it’s always who it claims to be.

This article will show you how you can generate and use SSH Keys from Windows based platforms using Putty client to automatically perform remote logins on Linux servers without the need to enter passwords.

Full article here:
Configure “No Password SSH Keys Authentication” with PuTTY on Linux Servers (Tecmint)

Link: How to Install and Configure Cygwin in Windows Environment

If you are a Linux or Unix user, I am sure you will miss the terminal (and all the wonderful things you can do with command lines) in a Windows environment. Most of the time you won’t need to use the command prompt in Windows, and its user-interface is not as friendly either. However, if you have the need to use a terminal, Cygwin is the best tool for you. Let us see how to install and configure Cygwin in the Windows environment.

Full article here:
How to Install and Configure Cygwin in Windows Environment (Make Tech Easier)

Link: Perform Multiple Operations in Linux with the ‘xargs’ Command

Xargs is a useful command that acts as a bridge between two commands, reading output of one and executing the other with the items read. The command is most commonly used in scenarios when a user is searching for a pattern, removing and renaming files, and more.

…..

While the xargs command can be used in various command line operations, it comes in really handy when used with the find command. In this article, we will discuss some useful examples to understand how xargs and find can be used together.

Full article here:
Perform Multiple Operations in Linux with the ‘xargs’ Command (Make Tech Easier)

Link: How to Boot Linux ISO Images Directly From Your Hard Drive

Linux’s GRUB2 boot loader can boot Linux ISO files directly from your hard drive. Boot Linux live CDs or even install Linux on another hard drive partition without burning it to disc or booting from a USB drive.

We performed this process on Ubuntu 14.04 — Ubuntu and Ubuntu-based Linux distributions have good support for this. Other Linux distributions should work similarly.

Full article here:
How to Boot Linux ISO Images Directly From Your Hard Drive (How-To Geek)

Recent Posts

Recent Comments

Archives

Categories

Meta

GiottoPress by Enrique Chavez