Linux delete files based on date. Using netselect-apt - Tip to select the fastest Debian mirror. Each time I install Debian - and I have done it scores of times on multiple machines, I get frustrated in choosing the right Debian mirror for updating the package database on my machine using 'apt-get update', or installing a new package for that matter.
Introduction to Linux - A Hands on Guide, Free Machtelt Garrels Guide. How to Automatically Remember Running Applications from Your Last Session in Ubuntu 14.04. You’ve set up the programs you need.
Your windows are arranged just right. Then, something else demands your attention and you have to shut down. No worries. You can have Ubuntu remember all your running applications and restore them the next time you log in. To have Ubuntu remember the applications you have running in your current session and restore them the next time you log in, you will use the dconf-editor. NOTE: When we say to type something in this article and there are quotes around the text, DO NOT type the quotes, unless we specify otherwise. Once the dconf-editor is installed, click the Dash button at the top of the Unity Launcher bar. Start typing “dconf editor” in the search box. In the “dconf Editor” window, click the right arrow next to “org” in the left pane to expand that branch of the tree.
Ubuntu 14.04 print screen button does not work. Why Linux is better. Rename - Renaming a bunch of files with date modified timestamp at the end of the filename? Internet/ConnectionSharing. Internet Connection Sharing (ICS) provides the ability for one computer to share its Internet connection with another computer.
To do this, a computer with an Internet connection must be configured to function as an Internet gateway. A second computer (or network of computers) connects to the Internet indirectly via the gateway computer. 11 of the Best Free Linux Voice Over IP (VoIP) Software. Voice over IP (VoIP) software enables telephone-like voice conversations across IP based networks.
A VoIP phone service is often cheaper than a traditional Public Switched Telephone Network (PSTN) phone service and removes geographic restrictions to telephone numbers. SIP is the most popular VoIP protocol. This protocol enables two or more people to make phone calls to each other using the Internet to carry the call. SIP to SIP calls on a broadband internet connection are high quality, always free regardless of distance, and offer additional functionality such as free voicemail to email and phone numbers, caller ID, 3-way conference, speed dialing, call forwarding, simultaneous ring, call waiting, call return, caller ID block, and anonymous call rejection.
Why Linux is better. If your computer shuts itself down without asking you, if strange windows with text you don't understand and all kinds of advertisements appear when you don't ask for them, if emails get sent to all your contacts without your knowing it, then your computer probably has a virus.
The main reason for this is because it runs Windows. Linux hardly has any viruses. IPROUTE2 Utility Suite Documentation. IPROUTE2 Utility Suite Howto Main PolicyRouting.Org Website PolicyRouting Book 9.0 Obtaining & Compiling IPROUTE2 9.1 IP Command Set 9.2 ip address - protocol address management 9.3 IP Interface Primary and Secondary Addressing: 9.3.1 ip address flush --- flush protocol addresses. 9.4 ip neighbour --- neighbour/arp table management. 9.5 ip route - routing table management. 9.6 ip rule --- routing policy database management. 9.7 ip tunnel - ip tunnelling configuration 9.8 ip monitor and rtmon --- route state monitoring.
The world's open source leader. Managing Software with yum. About IPTraf. IPTraf is a console-based network statistics utility for Linux.
It gathers a variety of figures such as TCP connection packet and byte counts, interface statistics and activity indicators, TCP/UDP traffic breakdowns, and LAN station packet and byte counts. Features An IP traffic monitor that shows information on the IP traffic passing over your network. Includes TCP flag information, packet and byte counts, ICMP details, OSPF packet types. General and detailed interface statistics showing IP, TCP, UDP, ICMP, non-IP and other IP packet counts, IP checksum errors, interface activity, packet size counts. CentOS / Red Hat Configure an NTP Client And Server. How do I configure an NTP (Network Time Protocol) client or server under CentOS / RHEL / Fedora Linux to manage the system clock over a network?
The Network Time Protocol (NTP) is used to synchronize a computer's time with another reference time source. Under CentOS / RHEL you can use NTP or OpenNTPD server software. Both package provides client and server software programs for time synchronization. Install ntp.
Ubuntu. Untitled. Introduction dconf is a low-level configuration system.
Its main purpose is to provide a backend to GSettings on platforms that don't already have configuration storage systems. The Complete Guide to "useradd" Command in Linux - 15 Practical Examples. We all are aware about the most popular command called ‘useradd‘ or ‘adduser‘ in Linux.
There are times when a Linux System Administrator asked to create user accounts on Linux with some specific properties, limitations or comments. In Linux, a ‘useradd‘ command is a low-level utility that is used for adding/creating user accounts in Linux and other Unix-like operating systems.
Reference. 2014: The Open Source Tipping Point. For the last ten years open source has expanded into more and more segments of the computing industry. But as we review 2014, a new story emerges: software development has fundamentally shifted toward an open source model. Especially for the infrastructure software used for scale-out computing, open source is the de facto choice; in fact it’s virtually impossible to find examples of scale-out infrastructure that are not open source. As Stephen O’Grady says in his excellent post on the Scale imperative: “Virtually any category of infrastructure software today – from the virtualization layer to the OS to the runtime to the database to the cloud middleware equivalents – has high quality, open source options available.” The economics of creating a new suite of infrastructure to power distributed computing required shared development and shared investment.
The author was looking for such kind of application for a long time but haven't found anything worth while. " It offers features like vertical and horizontal terminal split, zoom in or out, terminal tabs switcher, background color scheme adjustments (choose from predefined schemes) or change background image, font resizing, shortcut keys, hide/show scroll bars and windows borders, and many more from preferences. Main Page - Linux Mint. Iperf3 — iperf3 3.0.11 documentation. Iperf is a tool for active measurements of the maximum achievable bandwidth on IP networks. It supports tuning of various parameters related to timing, protocols, and buffers.
For each test it reports the bandwidth, loss, and other parameters. This version, sometimes referred to as iperf3, is a redesign of an original version developed at NLANR / DAST. iperf3 is a new implementation from scratch, with the goal of a smaller, simpler code base, and a library version of the functionality that can be used in other programs. iperf3 also incorporates a number of features found in other tools such as nuttcp and netperf, but were missing from the original iperf. Analysis of the Linux backdoor used in freenode IRC network compromise. Tuesday October 14, 2014 Background freenode is a large IRC network providing services to Free and Open Source Software communities, and in September the freenode staff team blogged about a potential compromise of an IRC server.
NCC Group’s Cyber Defence Operations team provided pro bono digital forensic and reverse engineering services to assist the freenode infrastructure team with their incident response activities. In this post we discuss a subset of the information we documented about one of the components involved in the compromise, specifically a Linux backdoor with some interesting functionality and features. VMware Images. Gitosis - Is it possible to use the same ssh private/public key pair on 2 machines to access a git repository? 3 Steps to Perform SSH Login Without Password Using ssh-keygen & ssh-copy-id. Managing Multiple SSH Keys » Robot Goblin. SSH keys are a very efficient way to make secure connections over the internet, for a large variety of things.
Many things use SSH keys regularly, for example using Git on GitHub requires you to register a key to use when accessing repositories. Unix/Linux Permissions - An Introduction and Tutorial. 9 commands to check hard disk partitions and disk space on Linux. Linux Software Repositories – Google. SmoothWall. Kernel Korner - Linux as an Ethernet Bridge.
Iperf - The TCP/UDP Bandwidth Measurement Tool. 10 Useful 'ls' Command Interview Questions - Part 2. Continuing the legacy of ls command here is the second interview article on Listing command. The first article of the series was highly appreciated by the Tecmint Community. 7 Quirky 'ls' Command Tricks Every Linux User Should Know. Jfn linux project: How to fix multiple workspace issue in Ubuntu 12.04 & 12.10. HP Linux Imaging and Printing. Create a System Administrator User on CentOS Server — DaniloDellaquila.com. Diagnosing Network Issues with MTR. 15 Practical Examples of "dpkg commands" for Debian Based Distros. KVM Virtual Machine hypervisor installed into your Mint 17.1 64-bit desktop. Splashtop Personal Vs. Splashtop Business Comparison - Splashtop Inc. Datamation recommends remote desktop clients for Linux. New User Tutorial: Overview of the Vim Text Editor. Understanding Load Balancing. Managing Time On A Linux Server.
33.2.2. Adding a User. Fit-pc-product-line-overview.pdf. The TrackingPoint 338TP, the Linux rifle that's accurate up to a mile. MintBox Mini. Toolbox - Regular Expression Tester - Test and Learn Regex Search Syntax. Regular Expressions Cheat Sheet by DaveChild. Tecmint: Linux Howtos, Tutorials & Guides.