Skip to main content

Home/ Ubuntu - Linux for human beings/ Group items tagged commands

Rss Feed Group items tagged

anonymous

Death of the command line revisited - 0 views

  •  
    "Death of the command line revisited Five years ago I wrote a little blurb called Death of the command line. As it happened, that article was misunderstood by many who read it - I don't know if it was my fault or theirs, but somehow many readers ended up thinking I was either predicting the demise of CLI's (Command Line Interfaces) or hoping for that demise or both. Nothing could have been farther from the truth. I remain a big fan of CLI's and use them daily. And yet, just five years later and still at risk of angering yet another batch of folk who won't read carefully, I'm going to suggest that predicting the death of the CLI may not be such a bad bet after all. What triggered this was that I happened to be doing a bit of editing to another article - Using the shell (Terminal) in Mac OS X. As I made some corrections, I thought "Nobody cares about this nowadays". That's not entirely true. That particular page still gets five thousand or more visitors every month and has even been "plussed" a few times, so obviously a few people still care. On the other hand, in the greater world of folks I run into daily, nobody uses the CLI and most don't even know that they could. But why would you use the CLI?"
bryan yu

How to login as root on Ubuntu - 0 views

  •  
    Many people want to know how to obtain root permission on Ubuntu no matter su command or login x window. The root passwd have never been configured when you install ubuntu first time. You can use below command to change root password...
Dan McCrea

Unix Toolbox - 15 views

  •  
    A collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users, a compact and practical reference.
larry hill

Easy Way to Checking Hard Drive for Bad Sectors and Errors in Ubuntu - 0 views

  •  
    How to know if you have bad sectors on your hard drive in Ubuntu Desktop and how to fix them. You can use badblock program to fix this problem. The badblocks is program command line based allow to test your harddrive for, you guessed it, bad blocks.
Frank Boros

How to configure network using CLI ang GUI in Ubuntu 12.04 - 0 views

  •  
    In this example I will show how to setup network configuration using command line and graphical tool in Ubuntu 12.04. To start accessing internet or sharing other resources on the network you have to configure TCP/IP settings of you ethernet card. In ubuntu you can configure network settings through
David Corking

Installation/LowMemorySystems - Community Ubuntu Documentation - 0 views

  • Adding a Window ManagerOpenboxIceWMFluxboxFVWM-CrystalXFCE
    • David Corking
       
      Interesting selection of Window Managers. It is a list of usual suspects, with 2 promising recruits: FVWM-Crystal and Openbox, but the omission of Enlightenment, Blackbox and WindowMaker.
  •  
    A 'howto' with aptitude and other commands to get things going.
munna1357

ssh key and DHCP configuration linux commands step by step - YouTube - 0 views

  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
1 - 20 of 24 Next ›
Showing 20 items per page