background preloader

--ux

Facebook Twitter

My Move From Arch To Aptosid « IgnorantGuru's Blog. I recently moved over to Aptosid, and after a few days of using it I think it’s going to be a keeper as a replacement for Arch.

My Move From Arch To Aptosid « IgnorantGuru's Blog

While it’s fresh in my mind, I thought I would share my experience of moving – from the perspective of someone who has used Arch Linux for a couple of years. I’ll give a little background, then a brief summary, then some real details on how I got some things to work. Background I wanted to move from Arch Linux for these primary reasons: Lack of package signing and general concerns with the Arch dev’s lax security practices and attitudes (link1 link2 link3) Dislike for how the Arch devs regard their users and contributors The reasons I was reluctant to give up Arch: Rolling release which I prefer over periodic large upgrades Package availability and the extended AUR user-contributed repository that makes installing most software very easy Ability to have a custom, lightweight, fast system without unnecessary baggage and with mostly vanilla software.

Welcome to Freecode – Freecode - Iceweasel. Looking at his methodology: New site ranks Linux and BSD popularity - Iceweasel. Linux Community - The Linux Distro Community - Iceweasel. List of Linux distributions that run from RAM - Wikipedia, the free encyclopedia - Iceweasel. Puppy Linux 5.10 desktop running in RAM This is a list of Linux distributions that run entirely from the computer's RAM.

List of Linux distributions that run from RAM - Wikipedia, the free encyclopedia - Iceweasel

That ability allows them to be very fast, since reading and writing data from/to RAM is much faster than on a hard disk drive. Many of these operating systems will run from a Live CD or another removable media, but a "frugal" install can be made to have them boot up from a hard disk drive. See also[edit] References[edit] External links[edit] 15 Greatest Open Source Terminal Applications Of 2012 - Iceweasel. Linux on the desktop is making great progress.

15 Greatest Open Source Terminal Applications Of 2012 - Iceweasel

However, the real beauty of Linux and Unix like operating system lies beneath the surface at the command prompt. nixCraft picks his best open source terminal applications of 2012. Most of the following tools are packaged by all major Linux distributions and can be installed on *BSD or Apple OS X. #1: siege - An HTTP/HTTPS stress load tester Fig.01: siege in action. Calcul de sha256 : Support Debian - Iceweasel. Pkgng: First look at FreeBSD's new package manager - Iceweasel. FreeBSD has been long due a better package management system, pkg_add, pkg_info, etc just doesn’t cut it any more.

pkgng: First look at FreeBSD's new package manager - Iceweasel

For a long time GNU/linux users have always used this as a reason not to use FreeBSD and instead favour some GNU/linux combination with an all encompassing easy to use package manager, such as Debian’s apt-get. FreeBSD’s response has always been, (not actual quote), “We have the ports collection, which is cooler and more flexible than just having some easy to use package manager. Planet FreeBSD - Iceweasel. FreeBSD Desktop - O'Reilly Sysadmin - Iceweasel. FreeBSD, It's a Shame... [Archive] - Ubuntu Forums - Iceweasel. HappinessNow July 20th, 2009, 09:09 PM I happen to be tinkering with PC-BSD at the moment.

FreeBSD, It's a Shame... [Archive] - Ubuntu Forums - Iceweasel

I really love the Ports system, and the simplified app installation tool is pretty sweet. PC-BSD is a very nice BSD Distro and one I consider the best of the best. It is ashamed it is lacking in popularity on the Developer's side, it does have the potential to be one of the best Operating Systems. I'm going to have to disagree with you there, bodhi. Ubuntu buzz I agree started way back with Hoary, most people were excited about the free ship-it CDs. I believe the free CD's were the catalyst that helped Ubuntu and Ubuntuforums grow to what it is today. If anything it gave it notoriety, and a buzz among social networks and blogs that other distros simply never had. Google with the induction of Google Chrome OS, brings Linux into the mainstream, beyond anything that Canonical/Ubuntu could have ever done. Aptosid - Debian hot and spicy! - Iceweasel.

Mounting NTFS to FreeBSD or UNIX « LordHendrix’s Weblog - Iceweasel. eCryptfs - ArchWiki - Iceweasel. This article describes basic usage of eCryptfs.

eCryptfs - ArchWiki - Iceweasel

It guides you through the process of creating a private and secure encrypted directory within your $HOME directory, where you can store all your sensitive files and private data. In implementation eCryptfs differs from dm-crypt, which provides a block device encryption layer, while eCryptfs is an actual file-system – a stacked cryptographic file system to be exact. For comparison of the two you can refer to this table . The summary is that it doesn't require special on-disk storage allocation effort, such as separate partitions, you can mount eCryptfs on top of any single directory to protect it. That includes e.g. your entire $HOME and network file systems (i.e. having encrypted NFS shares). For more details on how eCryptfs compares to other disk encryption solutions, see Disk encryption#Comparison table. André Frimberger » Blog Archive » SSHFS: fix for wrong file permissions on server - Iceweasel. SSHFS normally propagates the umask of the client to the server.

André Frimberger » Blog Archive » SSHFS: fix for wrong file permissions on server - Iceweasel

This works great when the sftp server doesn’t care about the umask while creating files or directories. But the problem is, that the openssh sftp server indeed cares about the server side umask. For every file or directory created through the sftp server the umask from the server is subtracted. Umask - Wikipedia, the free encyclopedia - Iceweasel. In UNIX, each file and directory has sets of attributes which control who is permitted access (aka modes).

umask - Wikipedia, the free encyclopedia - Iceweasel

When a file or directory is created the permissions to be set are specified. The mask restricts which permissions are allowed. If the mask bit is set to "1", the corresponding permission will be disabled. For a bit set to "0", the corresponding permission will be determined by the program and the system. In other words, the mask acts as a last-stage filter that strips away permissions as a file or directory is created where the bit that is set to a "1". The mask is always stored as a group of bits. The umask command is used with Unix-like operating systems and the umask function is defined in the POSIX.1 specification. History[edit] The mask, the umask command, and the umask function were not part of the original implementation of UNIX. Unix eventually grew to serve hundreds of users from different organizations.