Linux

Facebook Twitter
Linux (Ubuntu) Desktop

supervision

DNS & LoadBalancing

Nmap - Free Security Scanner For Network Exploration & Security

Nmap - Free Security Scanner For Network Exploration & Security We're pleased to release our new and Improved Icons of the Web project—a 5-gigapixel interactive collage of the top million sites on the Internet! We've also launched a Kickstarter for a 36x24 inch poster version, but you need to order by January 17! Nmap has been discovered in two new movies! It's used to hack Matt Damon's brain in Elysium and also to launch nuclear missiles in G.I. Joe: Retaliation!
KeepAlived - HowTo
If you're new here, you may want to subscribe to my RSS feed and if you have questions related to your ubuntu system post question to our forums. Thanks for visiting! Sponsored Link The basics for any network based on *nix hosts is the Transport Control Protocol/ Internet Protocol (TCP/IP) combination of three protocols. This combination consists of the Internet Protocol (IP),Transport Control Protocol (TCP), and Universal Datagram Protocol (UDP). Ubuntu Networking Configuration Using Command Line  Ubuntu Networking Configuration Using Command Line 
heddar.fr | comment devenir un bon linuxien, en peu de temps
Serveur IRC (hybrid-ircd + hybserv)

configurer et utiliser le ssh
Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers). The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I will provide 20 hardening tips for default installation of Linux system. Linux Server Hardening Checklist and Tips The following instructions assume that you are using CentOS/RHEL or Ubuntu/Debian based Linux distribution. 20 Linux Server Hardening Security Tips

20 Linux Server Hardening Security Tips

20 Linux System Monitoring Tools Every SysAdmin Should Know

20 Linux System Monitoring Tools Every SysAdmin Should Know Need to monitor Linux server performance? Try these built-in commands and a few add-on tools. Most Linux distributions are equipped with tons of monitoring. These tools provide metrics which can be used to get information about system activities. You can use these tools to find the possible causes of a performance problem. The commands discussed below are some of the most basic commands when it comes to system analysis and debugging server issues such as:
blender

Vala Vala Introduction Vala is a new programming language that aims to bring modern programming language features to GNOME developers without imposing any additional runtime requirements and without using a different ABI compared to applications and libraries written in C. News About Vala Using Vala Contributing