Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged files

Rss Feed Group items tagged

2More

What are the different file types in Linux and UNIX - 0 views

  •  
    "Unix like operating system supports several different types of files. Some of the more common file types are regular files, directory files, executable files, symbolic link files, and device files, and are described in the following sub-sections."
  •  
    "Unix like operating system supports several different types of files. Some of the more common file types are regular files, directory files, executable files, symbolic link files, and device files, and are described in the following sub-sections."
2More

Secure File Transfer | Linux Journal - 0 views

  •  
    "File transfer between Linux systems (and perhaps all POSIX systems in general) is in some ways a neglected subject. The arcane protocols in common use are far from secure, and the SSH replacements offer too much power and complexity. Servers holding highly sensitive data... "
  •  
    "File transfer between Linux systems (and perhaps all POSIX systems in general) is in some ways a neglected subject. The arcane protocols in common use are far from secure, and the SSH replacements offer too much power and complexity. Servers holding highly sensitive data... "
1More

[# ! #Tech:] Discover to which package a file belongs to - Linux Audit - 0 views

  •  
    "Sometimes you want to know the related package of a file, before installation, or when it is already there. This is of great help during system hardening or general system cleanups. In this article we have a look at several ways to determine the relationships between files and the package they belong to."
2More

Tools To Password Protect Folder In Linux - LinuxAndUbuntu - 0 views

  •  
    "Most of the time, having a password protected user is all you need to keep your files private and protected from prying eyes. There are those few times when you need to allow access to your account to another person, sometimes there are folders or files you would like to keep away from being accessed. Now we can password protect folder with several handy tools. In the Windows world, these tools are quite easily available for Windows but today we will look at a few options available for the Linux user."
  •  
    "Most of the time, having a password protected user is all you need to keep your files private and protected from prying eyes. There are those few times when you need to allow access to your account to another person, sometimes there are folders or files you would like to keep away from being accessed. Now we can password protect folder with several handy tools. In the Windows world, these tools are quite easily available for Windows but today we will look at a few options available for the Linux user."
1More

3 file conversion tools for the Linux command line | Opensource.com - 0 views

  •  
    "Recently, a friend innocently asked me how many file formats there are. My semi-serious response was, "Think of a soup bowl filled with beach sand.""
1More

How to search files from the terminal on Linux - 0 views

  •  
    "While there are many ways with which we can search and locate files and directories on Linux, the easiest and quickest is probably through the terminal. However, not many Linux users know about that, which leads to unneeded frustration. Here is a quick guide that will hopefully help you locate what you're looking for in your system."
2More

transfer.sh - Easy and fast file sharing from the command-line. - 0 views

  •  
    "Easy file sharing from the command line"
  •  
    "Easy file sharing from the command line"
2More

7 Tools to Encrypt/Decrypt and Password Protect Files in Linux - 0 views

  •  
    "Encryption is the process of encoding files in such a way that only those who are authorized can access it. Mankind is using encryption from ages even when computers were not in existence. During war they would pass some kind of message that only their tribe or those who are concerned were able to understand."
  •  
    "Encryption is the process of encoding files in such a way that only those who are authorized can access it. Mankind is using encryption from ages even when computers were not in existence. During war they would pass some kind of message that only their tribe or those who are concerned were able to understand."
1More

How to Monitor Progress of (Copy/Backup/Compress) Data using 'pv' Command - 0 views

  •  
    "When making backups, coping/moving large files on your Linux system, you may want to monitor the progress of an on going operation. Many terminal tools do not have the functionality to allow you to view progress information when a command is running in a pipe. Read Also: Advance Copy Command to Show Progress Bar While Copying Files in Linux"
2More

Configuring WINE with Winetricks | linuxconfig.org - 0 views

  •  
    "If winecfg is a screwdriver, winetricks is a power drill. They both have their place, but winetricks is just a much more powerful tool. Actually, it even has the ability to launch winecfg. While winecfg gives you the ability to change the settings of WINE itself, winetricks gives you the ability to modify the actual Windows layer. It allows you to install important components like .dlls and system fonts as well as giving you the capability to edit the Windows registry. It also has a task manager, an uninstall utility, and file browser. Even though winetricks can do all of this, the majority of the time, you're going to be using it to manage dlls and Windows components."
  •  
    "If winecfg is a screwdriver, winetricks is a power drill. They both have their place, but winetricks is just a much more powerful tool. Actually, it even has the ability to launch winecfg. While winecfg gives you the ability to change the settings of WINE itself, winetricks gives you the ability to modify the actual Windows layer. It allows you to install important components like .dlls and system fonts as well as giving you the capability to edit the Windows registry. It also has a task manager, an uninstall utility, and file browser. Even though winetricks can do all of this, the majority of the time, you're going to be using it to manage dlls and Windows components."
2More

Steal This Show S02E05: Trolling For Justice - TorrentFreak - 0 views

  •  
    " By J.J. King on November 3, 2016 C: 0 News Bits Today we bring you the next episode of the Steal This Show podcast, discussing renegade media and the latest file-sharing and copyright news. In this episode we talk to The Yes Men's Mike Bonanno, aka Igor Vamos."
  •  
    " By J.J. King on November 3, 2016 C: 0 News Bits Today we bring you the next episode of the Steal This Show podcast, discussing renegade media and the latest file-sharing and copyright news. In this episode we talk to The Yes Men's Mike Bonanno, aka Igor Vamos."
2More

How to integrate Git into your everyday workflow | Opensource.com - 0 views

  •  
    "Read: Part 1: What is Git? Part 2: Getting started with Git Part 3: Creating your first Git repository Part 4: How to restore older file versions in Git Part 5: 3 graphical tools for Git"
  •  
    "Read: Part 1: What is Git? Part 2: Getting started with Git Part 3: Creating your first Git repository Part 4: How to restore older file versions in Git Part 5: 3 graphical tools for Git"
2More

Google Is One Big Fat Pirate-Linking Search Engine - Digital Music News - 0 views

  •  
    "Is Google bullying the entire media industry? On Wednesday, Getty Images filed a complaint with the European Union's antitrust commission over Google's alleged piracy of its content. Getty Images claims that Google 'siphons traffic' away from the company's premium website."
  •  
    "Is Google bullying the entire media industry? On Wednesday, Getty Images filed a complaint with the European Union's antitrust commission over Google's alleged piracy of its content. Getty Images claims that Google 'siphons traffic' away from the company's premium website."
2More

How to master the Linux terminal with core commands | TechRadar - 0 views

  •  
    "By Linux Format How To Discover the core commands for file and text handling and networking"
  •  
    "By Linux Format How To Discover the core commands for file and text handling and networking"
3More

Beware: Piracy Defense Lawyers Can Be "Trolls" Too - TorrentFreak [# ! Note] - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! Copyright Enforcement is, sadly, corrupting The Law... ... The Justice... The Coexistence. # ! And, as You may see, it seems that everybody is benefiting from 'Piracy' (beyond the mentioned Defense Attorneys...): From Musicians for the extra promotion; Collecting Societies and Audiovisual Producers getting Grants from Governments and Governments themselves, acquiring 'extra control' over Media... and The Culture itself, promoting Censorship with the excuse of the 'Protection of The Intellectual Property'...
  •  
    " Ernesto on February 8, 2016 C: 37 News Every month hundreds of people are sued for sharing copyrighted media through file-sharing networks, mostly BitTorrent. This practice is big business for copyright holders and lawyers alike. Unfortunately, however, not all defense attorneys appear to have the best interests of their clients at heart."
  •  
    " Ernesto on February 8, 2016 C: 37 News Every month hundreds of people are sued for sharing copyrighted media through file-sharing networks, mostly BitTorrent. This practice is big business for copyright holders and lawyers alike. Unfortunately, however, not all defense attorneys appear to have the best interests of their clients at heart."
1More

Court Of Human Rights: Convictions For File-Sharing Violate Human Rights - Falkvinge on... - 0 views

  •  
    "The European Court of Human Rights has declared that the copyright monopoly stands in direct conflict with fundamental Human Rights, as defined in the European Union and elsewhere. "
2More

5 signs your Web application has been hacked | ITworld - 0 views

  •  
    "hacked FREE Become An Insider Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more. Other Insider Recommendations Java 101 primer: Composition and inheritance 6 simple tricks for protecting your passwords Free course: "JavaScript: The Good Parts" Free Course: The Dark Side of Technology Careers Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all"
  •  
    "hacked FREE Become An Insider Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more. Other Insider Recommendations Java 101 primer: Composition and inheritance 6 simple tricks for protecting your passwords Free course: "JavaScript: The Good Parts" Free Course: The Dark Side of Technology Careers Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all"
1More

Problems and Strategies in Financing Voluntary Free Software Projects :: Benjamin Mako ... - 0 views

  •  
    "Benjamin Mako Hill mako@atdot.cc This is revision 0.2.1 of this file and was published on November 20, 2012. Revision 0.2 was published on June 10, 2005. Revision 0.1 was published on May 15, 2005 and was written was presented as a talk at Linuxtag 2005 given in Karlsruhe, Germany. Revision 0 was published on May 2004 is based in part of the research and work done for a presentation on the subject given at the International Free Software Forum (FISL) given in Porto Alegre, Brazil."
1More

Agedu - Find Out Wasted Disk Space In Linux - OSTechNix - 0 views

  •  
    "Today, let us talk about a simple, yet another must-have utility in your arsenal. Meet agedu, a small utility that tracks down the wasted disk space in your Linux system. Running out of disk space? No worries! Install agedu and find out which directories or files are consuming more space. Just delete them if they are no longer needed or move them safely to an archive medium to free up some space. It works on Windows and Unix-like operating systems. It is available under MIT license. That means you can use it for free, copy, distribute, and reuse."
1More

Hello World · GitHub Guides - 0 views

  •  
    "The Hello World project is a time-honored tradition in computer programming. It is a simple exercise that gets you started when learning something new. Let's get started with GitHub! You'll learn how to: Create and use a repository Start and manage a new branch Make changes to a file and push them to GitHub as commits Open and merge a pull request"
1 - 20 of 37 Next ›
Showing 20 items per page