Skip to main content

Home/ Ubuntu - Linux for human beings/ Group items tagged Configuration

Rss Feed Group items tagged

segnalazioni

Illustrated Dual Boot Site - 0 views

  •  
    This website is for helping people to install Ubuntu Linux in a 'dual boot' configuration after an existing operating system. 'Dual boot' means the computer will have two operating systems installed in separate disks or partitions and you can choose which one you want to boot into when your computer is starting up. 
mikhail-miguel

Ubuntu guide - 0 views

  •  
    ubuntu-tweak - Ubuntu Tweak is a tool that makes it easy to configure your system and desktop settings. (This project is no longer under maintenance)
munna1357

ftp configuration in linux step by step - YouTube - 0 views

  •  
    vsftpd is lightweight, very steady, secure, and quick FTP server for Linux environment. vsftpd powers parcel of intensely utilized FTP administration as a part of the web (counting ftp.redhat.com).  vsftpd likewise bolsters virtual ip, virtual clients, transmission capacity throttling, IPv6, encryption and so on.,  This article gives orderly guidelines on the most proficient method to setup vsftpd on your server from source.
  •  
    vsftpd is lightweight, very steady, secure, and quick FTP server for Linux environment. vsftpd powers parcel of intensely utilized FTP administration as a part of the web (counting ftp.redhat.com).  vsftpd likewise bolsters virtual ip, virtual clients, transmission capacity throttling, IPv6, encryption and so on.,  This article gives orderly guidelines on the most proficient method to setup vsftpd on your server from source.
munna1357

ssh key and DHCP configuration linux commands step by step - YouTube - 0 views

  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
David Corking

Multitasking in Ubuntu - Using Devil's Pie - OS, Software & Networking by ExtremeTech - 0 views

  • For example, I have a file called $HOME/.devilspie/games.ds that opens all games on workspace #4: (begin (if (is (application_name) "gnobots2") (begin (set_workspace 4)) ) (if (is (application_name) "iagno") (begin (set_workspace 4)) ) (if (is (application_name) "same-gnome") (begin (set_workspace 4)) ) ) Similarly, I have an xawtv.ds configuration file that says: (if (is (application_name) "xawtv") (above) )
  •  
    tutorial for an interesting new lisp-y tool
‹ Previous 21 - 30 of 30
Showing 20 items per page