There are many sites that list useful QuickLook plugins for OS X users but many of them have missed this one. Now, when you’re in Finder, a simple tap of the spacebar can show you the dimensions of an image and its file size in the title bar:
But wait, there’s more!
This plugin can also preview and generate Finder thumbnails for unsupported images formats like :
AND it comes with a Spotlight plugin to display informations of unsupported images (WebP, bpg, Portable Pixmap) in Finder’s inspector window. But really, it had me at displaying the dimensions and size of an image, since that’s information I’ve often needed after receiving an image. Real all about it at the project’s GitHub page or just download the installer.
Secure Shell Access (SSH) – Learn about Secure Shell Access (SSH), private and public keys, SCP, and all other topics related to the ssh command in our beginner’s tutorial.
Introduction – Introduction to SSH, how it’s better than telnet and basic ssh commands.
SSH Keys: RSA and DSA – Learn about SSH public and private keys, along with the most widely used key types – RSA and DSA. Also learn how to easily copy your public key to a host server with the ssh-copy-id command.
SSH Agent and SSH Add – Learn how to use the SSH agent daemon and the ssh-add command to manage your SSH keys and passphrases.
Secure Copying (SCP) – Learn how to use the scp command to upload and download files from remote hosts.
Source: Secure Shell Access (SSH) – Linux Command Line | Code Snipcademy
In this article we go over the popular choices for file systems on Linux and the benefits. We explain what each file system is for and who should use it.
Source: What’s the Best File System for my Linux Install? (Make Tech Easier)
The Google Chromebook is no stranger to modifications. Despite the fact that it’s a fairly locked platform, there are many projects dedicated to replacing the operating system that it ships with. All these projects are great, but they all have one thing in common – placing in a Linux distribution not designed from the ground up specifically for Chrome devices.
This is where GalliumOS comes in. It’s a specialized Linux distribution based on Ubuntu for Chromebooks only. Is it worth using? Let’s find out!
Source: GalliumOS: The Linux Distro For Chromebook (Make Tech Easier)
Denial-of-Service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. A distributed denial-of-service (DDoS) is where the attack source is more than one–and often thousands of-unique IP addresses.
What is mod_evasive?
mod_evasive is an evasive maneuvers module for Apache to provide evasive action in the event of an HTTP DoS or DDoS attack or brute force attack. It is also designed to be a detection and network management tool, and can be easily configured to talk to ipchains, firewalls, routers, and etcetera. mod_evasive presently reports abuses via email and syslog facilities.
Source: Protecting Apache Server From Denial-of-Service (Dos) Attack | Unixmen
With gitnonymous project, now you can obfuscate your true identity when making Git commits and pushing to public repositories.
Source: Contribute Anonymously To Git Repositories Over Tor With Gitnonymous Project (fossBytes)
At the request of many of our readers, we’ve decided to write the following tutorial to teach them how to install the Ubuntu Linux operating system on the Raspberry Pi 2 single-board computer (SBC).
Source: How to Install Ubuntu Linux on Raspberry Pi 2 (SOFTPEDIA®)
So if ipv6 is not supported on your network infrastructure, it might be useful to disable it all together. Why ? It can cause issues like delayed domain lookups, un-necessary attempts to connect to ipv6 addresses causing delay in network connection etc.
Source: How to disable Ipv6 on Ubuntu, Linux Mint, Debian (BinaryTides)
(This is also applicable to a Raspberry Pi running Raspbian, or some other Debian derivative such as RasPBX)
Is your favorite website blocked at work or a public location? If so, here are 4 of the easiest methods to access blocked websites.
Source: Access Blocked Websites With These 4 Methods (Make Tech Easier)