Linux delete files based on date. Using netselect-apt - Tip to select the fastest Debian mirror. Each time I install Debian - and I have done it scores of times on multiple machines, I get frustrated in choosing the right Debian mirror for updating the package database on my machine using 'apt-get update', or installing a new package for that matter. Some of the questions that I had to find a solution for were ... Do I choose the Debian mirror in my country (India) or do I use one of the US servers ? Is there any way to find which of the two are the fastest for my geographic location ? It might sound ironical, but experience tells me that the truism of choosing a Debian apt mirror closest to ones location does not hold true for me. Because at all times, when I have used a mirror from India, it is dead slow. And believe it or not, the responsiveness of the mirror will do a great deal of difference to how fast you are able to update your Debian machine.
Enter netselect-apt, a package which helps one to find and use the fastest Debian mirror for his region. . # netselect-apt etch # cp . Introduction to Linux - A Hands on Guide, Free Machtelt Garrels Guide. How to Automatically Remember Running Applications from Your Last Session in Ubuntu 14.04. You’ve set up the programs you need. Your windows are arranged just right. Then, something else demands your attention and you have to shut down. No worries. You can have Ubuntu remember all your running applications and restore them the next time you log in. To have Ubuntu remember the applications you have running in your current session and restore them the next time you log in, you will use the dconf-editor.
This tool replaces the gconf-editor available in previous versions of Ubuntu but is not available by default. NOTE: When we say to type something in this article and there are quotes around the text, DO NOT type the quotes, unless we specify otherwise. Once the dconf-editor is installed, click the Dash button at the top of the Unity Launcher bar. Start typing “dconf editor” in the search box. In the “dconf Editor” window, click the right arrow next to “org” in the left pane to expand that branch of the tree. Under “org”, click the right arrow next to “gnome.”
Ubuntu 14.04 print screen button does not work. Why Linux is better. Rename - Renaming a bunch of files with date modified timestamp at the end of the filename? Internet/ConnectionSharing. Internet Connection Sharing (ICS) provides the ability for one computer to share its Internet connection with another computer. To do this, a computer with an Internet connection must be configured to function as an Internet gateway. A second computer (or network of computers) connects to the Internet indirectly via the gateway computer. Situations in which ICS may be necessary include: Dial-up connection. Authenticated (PPPoA/E) connection. Wireless connection. When it is impractical (such as with distance) to run multiple network cables to each computer. GUI Method via Network Manager (Ubuntu 12.04) Open Settings->Network->Wireless and create a new Ad Hoc network.
GUI Method via Network Manager (Ubuntu 11.10) Follow the GUI Method via Network Manager (Ubuntu 9.10 and up) below but there is a bug which turn off and on the share connection. When you are logged in: In summary: #! 11 of the Best Free Linux Voice Over IP (VoIP) Software. Voice over IP (VoIP) software enables telephone-like voice conversations across IP based networks.
A VoIP phone service is often cheaper than a traditional Public Switched Telephone Network (PSTN) phone service and removes geographic restrictions to telephone numbers. SIP is the most popular VoIP protocol. This protocol enables two or more people to make phone calls to each other using the Internet to carry the call. SIP to SIP calls on a broadband internet connection are high quality, always free regardless of distance, and offer additional functionality such as free voicemail to email and phone numbers, caller ID, 3-way conference, speed dialing, call forwarding, simultaneous ring, call waiting, call return, caller ID block, and anonymous call rejection. Softphones are user based clients for making and receiving voice and video communication over the IP network, usually permitting integration with USB and IP Phones instead of a computer's microphone and speakers (or headset). Why Linux is better. If your computer shuts itself down without asking you, if strange windows with text you don't understand and all kinds of advertisements appear when you don't ask for them, if emails get sent to all your contacts without your knowing it, then your computer probably has a virus.
The main reason for this is because it runs Windows. Linux hardly has any viruses. And that's not like "Oh well, not very often, you know". That's like "If you've ever heard of a real Linux virus, please tell me". Of course, a Linux virus is not impossible to get. However, Linux makes it very hard for this to happen, for several reasons: Most people use Microsoft Windows, and pirates want to do as much damage (or control) as possible: therefore, they target Windows.
IPROUTE2 Utility Suite Documentation. IPROUTE2 Utility Suite Howto Main PolicyRouting.Org Website PolicyRouting Book 9.0 Obtaining & Compiling IPROUTE2 9.1 IP Command Set 9.2 ip address - protocol address management 9.3 IP Interface Primary and Secondary Addressing: 9.3.1 ip address flush --- flush protocol addresses. 9.4 ip neighbour --- neighbour/arp table management. 9.5 ip route - routing table management. 9.6 ip rule --- routing policy database management. 9.7 ip tunnel - ip tunnelling configuration 9.8 ip monitor and rtmon --- route state monitoring 9.9 rtacct - route realms and policy propagation 9.10 IP Utility Summary 9.11 IP Usage in Scripting 9.13 IPNetwork Init Script 9.14 ifcfg script 9.15 arping utility 9.16 Policy Routing - Multiple Route Tables Example IPROUTE2 Utility Suite Documentation This docvumentation covers the ip utility from IPROUTE2.
We will begin by explaining where to obtain the utility collection and how to compile it. Obtaining & Compiling IPROUTE2 After you have typed make the utility suite will compile. 1. 2. The world's open source leader. Managing Software with yum. About IPTraf. IPTraf is a console-based network statistics utility for Linux.
It gathers a variety of figures such as TCP connection packet and byte counts, interface statistics and activity indicators, TCP/UDP traffic breakdowns, and LAN station packet and byte counts. Features An IP traffic monitor that shows information on the IP traffic passing over your network. Includes TCP flag information, packet and byte counts, ICMP details, OSPF packet types. Protocols Recognized Non-IP packets will simply be indicated as "Non-IP" and, on Ethernet LAN's, will be supplied with the appropriate Ethernet addresses. Supported Interfaces Local loopback All Linux-supported Ethernet interfacesAll Linux-supported FDDI interfaces SLIP Asynchronous PPPSynchronous PPP over ISDNISDN with Raw IP encapsulationISDN with Cisco HDLC encapsulationParallel Line IP The information generated by IPTraf can be valuable in making network organization decisions, troubleshooting LANs and tracking activity of various IP hosts.
CentOS / Red Hat Configure an NTP Client And Server. How do I configure an NTP (Network Time Protocol) client or server under CentOS / RHEL / Fedora Linux to manage the system clock over a network? The Network Time Protocol (NTP) is used to synchronize a computer's time with another reference time source. Under CentOS / RHEL you can use NTP or OpenNTPD server software. Both package provides client and server software programs for time synchronization. Install ntp The ntp package contains utilities and daemons that will synchronize your computer's time to Coordinated Universal Time (UTC) via the NTP protocol and NTP servers. The ntp packageincludes ntpdate (a program for retrieving the date and time from remote machines via a network) and ntpd (a daemon which continuously adjusts system time). How do I configure an NTP Client? Simply open /etc/ntp.conf file, enter: # vi /etc/ntp.conf Make sure the following line exists: server ntp.server.com Where, ntp.server.com : the hostname or IP address of the site NTP server.
Configure an NTP Server.
Ubuntu. Untitled. Introduction dconf is a low-level configuration system. Its main purpose is to provide a backend to GSettings on platforms that don't already have configuration storage systems. News Overview dconf is a simple key-based configuration system. Change notification is supported. Stacking of multiple configuration sources is supported.
The stacking can be done at "mount points". PolicyKit integration is planned so that a normal user may temporarily gain the ability to, for example, write to the keys under /system/ (or /default/). Design Since a typical GNOME login consists of thousands of reads and ideally 0 writes, dconf is optimised for reads. Avoiding round trips and context switches is nice in itself, but the real win comes from allowing the IO scheduler in the kernel to do a better job by saturating it with requests coming from all of the applications trying to read their keys (as opposed to a common configuration server serially requesting a single key at a time). Documentation dconf API. The Complete Guide to "useradd" Command in Linux - 15 Practical Examples. We all are aware about the most popular command called ‘useradd‘ or ‘adduser‘ in Linux.
There are times when a Linux System Administrator asked to create user accounts on Linux with some specific properties, limitations or comments. In Linux, a ‘useradd‘ command is a low-level utility that is used for adding/creating user accounts in Linux and other Unix-like operating systems. The ‘adduser‘ is much similar to useradd command, because it is just a symbolic link to it. In some other Linux distributions, useradd command may comes with lightly difference version. When we run ‘useradd‘ command in Linux terminal, it performs following major things: It edits /etc/passwd, /etc/shadow, /etc/group and /etc/gshadow files for the newly created User account.Creates and populate a home directory for the new user.Sets permissions and ownerships to home directory.
Basic syntax of command is: useradd [options] username Part I: Basic usage with 10 examplesPart II: Advance usage with 5 examples 1. 2. 3. 4. 5.
Reference. 2014: The Open Source Tipping Point. For the last ten years open source has expanded into more and more segments of the computing industry. But as we review 2014, a new story emerges: software development has fundamentally shifted toward an open source model. Especially for the infrastructure software used for scale-out computing, open source is the de facto choice; in fact it’s virtually impossible to find examples of scale-out infrastructure that are not open source. As Stephen O’Grady says in his excellent post on the Scale imperative: “Virtually any category of infrastructure software today – from the virtualization layer to the OS to the runtime to the database to the cloud middleware equivalents – has high quality, open source options available.” The economics of creating a new suite of infrastructure to power distributed computing required shared development and shared investment. While one company could certainly create a new database or operating system or PaaS, why would they?
Original version written in 1995 and published in the Sun Observer How to limit access to your files. In this tutorial, I'll go into detail over file permissions, and discuss some of the more subtle aspects. Basic File Attributes - Read, Write and Execute There are three basic attributes for plain file permissions: read, write, and execute. Read Permission of a file If you have read permission of a file, you can see the contents. Write Permission of a file. NoobsLab | Ubuntu/Linux News, Reviews, Tutorials, Apps. "QTerminal" A Lightweight Multiplexer Terminal Emulator (Multiscreens in Terminal) Qterminal is a Qt-based multitab terminal forked from QTermWidget, it is lightweight, open-source, specially designed for LXQt desktop environment.
Author of QTermWidget had no time to make it more advanced, thus this fork was created. Unlike Tmux or Screen, it is much easier to deal with it. "Initially this project was started as an attempt to create relatively light and stable terminal emulator application like Konsole or gnome-terminal but without any dependency from such monsters as KDE or Gnome. The author was looking for such kind of application for a long time but haven't found anything worth while. " It offers features like vertical and horizontal terminal split, zoom in or out, terminal tabs switcher, background color scheme adjustments (choose from predefined schemes) or change background image, font resizing, shortcut keys, hide/show scroll bars and windows borders, and many more from preferences. Main Page - Linux Mint. Iperf3 — iperf3 3.0.11 documentation. Iperf is a tool for active measurements of the maximum achievable bandwidth on IP networks.
It supports tuning of various parameters related to timing, protocols, and buffers. For each test it reports the bandwidth, loss, and other parameters. This version, sometimes referred to as iperf3, is a redesign of an original version developed at NLANR / DAST. iperf3 is a new implementation from scratch, with the goal of a smaller, simpler code base, and a library version of the functionality that can be used in other programs. iperf3 also incorporates a number of features found in other tools such as nuttcp and netperf, but were missing from the original iperf. These include, for example, a zero-copy mode and optional JSON output. Note that iperf3 is not backwards compatible with the original iperf. Primary development for iperf3 takes place on CentOS 6 Linux, FreeBSD 10, and MacOS 10.10. Iperf3 is principally developed by ESnet / Lawrence Berkeley National Laboratory. Analysis of the Linux backdoor used in freenode IRC network compromise | NCC Group.
Tuesday October 14, 2014 Background freenode is a large IRC network providing services to Free and Open Source Software communities, and in September the freenode staff team blogged about a potential compromise of an IRC server. NCC Group’s Cyber Defence Operations team provided pro bono digital forensic and reverse engineering services to assist the freenode infrastructure team with their incident response activities. In this post we discuss a subset of the information we documented about one of the components involved in the compromise, specifically a Linux backdoor with some interesting functionality and features. One difficulty all attackers face after compromising a system is how to retain control over a long period of time in a stealthy manner.
Backdoor tools which listen for incoming connections can be easily identified by a port scan or by listing open sockets. Mechanism of operation The overall backdoor package found on the server consists of: Overview Triggering the backdoor Caveats: VMware Images. Gitosis - Is it possible to use the same ssh private/public key pair on 2 machines to access a git repository? 3 Steps to Perform SSH Login Without Password Using ssh-keygen & ssh-copy-id. Unix/Linux Permissions - An Introduction and Tutorial. 9 commands to check hard disk partitions and disk space on Linux.
Linux Software Repositories – Google. SmoothWall. Kernel Korner - Linux as an Ethernet Bridge.
Iperf - The TCP/UDP Bandwidth Measurement Tool. 10 Useful 'ls' Command Interview Questions - Part 2. 7 Quirky 'ls' Command Tricks Every Linux User Should Know. Jfn linux project: How to fix multiple workspace issue in Ubuntu 12.04 & 12.10. HP Linux Imaging and Printing. Create a System Administrator User on CentOS Server — DaniloDellaquila.com. Diagnosing Network Issues with MTR. 15 Practical Examples of "dpkg commands" for Debian Based Distros. KVM Virtual Machine hypervisor installed into your Mint 17.1 64-bit desktop. Splashtop Personal Vs. Splashtop Business Comparison - Splashtop Inc.
Datamation recommends remote desktop clients for Linux. New User Tutorial: Overview of the Vim Text Editor. Understanding Load Balancing. Managing Time On A Linux Server. 33.2.2. Adding a User. Fit-pc-product-line-overview.pdf. The TrackingPoint 338TP, the Linux rifle that's accurate up to a mile | ZDNet. MintBox Mini. Toolbox - Regular Expression Tester - Test and Learn Regex Search Syntax. Regular Expressions Cheat Sheet by DaveChild. Tecmint: Linux Howtos, Tutorials & Guides.