background preloader

LINUX

Facebook Twitter

10 Commercial Apps for Linux That I Never Knew Existed. One thing that keeps Linux in the back foot is the lack of good quality applications that can compete with the best out there. The advent of paid softwares section in Ubuntu Software Center is a start, things like that can kick start application development for Linux in a big way. But things were not as bad I thought it would be. On further browsing, I found out that there are indeed a good number of paid applications for Linux, some of them were a total surprise for me.

Here are some of those paid applications for Linux which I found interesting. Guitar Pro is a multitrack editor of guitar and bass tablature and musical scores meant for guitarists and musicians. Its great ease of use and the success of its specific file format have made it a software used by guitarists worldwide. Guitar Pro 6 includes editing support for many other instruments like the piano or the drums, a realistic audio engine, and interactive tools to support every musician's practice. Transcribe! Sécuriser un serveur Linux – La documentation de la NSA. Je parie que parmi vous certains se gratte la tête car ils doivent sécuriser un serveur Linux ! On trouve des tonnes de tutos sur le net, ça part un peu dans tous les sens et forcement, on oublie des trucs où on ne le fait pas forcement bien.

Alors pourquoi ne pas s'en remettre aux grands de ce monde, qui ont des besoins de dingue en terme de sécurisation ? Je ne parle pas de suivre les conseils de Sony (d'ailleurs, je ne crois pas qu'ils en donnent ^^) mais plutôt de se référer à une documentation rédigée par la NSA (National Security Agency) qui traite de la sécurisation d'une Red Hat Entreprise 5. Bien que ce soit à destination des Red Hat, on y retrouve plein de petits conseils que vous pouvez appliquer sur n'importe quelle distribution. Par exemple, le paramétrage des permissions, la désactivation de l'USB, la sécurisation physique de la machine, le paramétrage d'IPTable, les logs et autres audits, l'envoi des emails, le SSL...etc etc. Rhel5 Guide i731 [Photo] Linux 101: Using chmod and chown. When you use Linux long enough you are going to use the command line.

Although nearly every command line trick can be done from a GUI front end now, there are times when the command line is the only route (headless server for example). When you have to go that route, you will be glad to have the fundamentals of the more important Linux commands under your belt. Two very important commands, chmod and chown, deal with permissions and ownership (respectively). With these tools you control who owns and who reads, writes, and executes files and folders on your Linux system. Let's take a look at how to use these commands. Installation? Not a bit. Chmod The chmod command allows you to change permissions on a file. Chmod PERMISSIONS FILE Where PERMISSIONS is either the numeric or the alpha equivalent of the permissions you want to assign and FILE is the file (or folder) you want to effect.

Since the numeric permissions are the easiest to understand (and use) let's look at that method. Chown.