Skip to main content

Home/ Ubuntu - Linux for human beings/ Group items tagged like

Rss Feed Group items tagged

munna1357

ssh key and DHCP configuration linux commands step by step - YouTube - 0 views

  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
Tim Mullins

Docks in Ubuntu Linux to make it look like Apple Mac OS X - 0 views

  •  
    Screencast Tutorial to show you how to use 2 different Docks in Ubuntu Linux to make it look like Apple Mac OS X. The docks I show you are Avant Window Navigator and GLX-Dock. They can be installed via Ubuntu Tweak. Educational video
Tim Mullins

Why I am not a Apple Mac fan - 0 views

  •  
    This is my personal explanation of Why I am not a Apple Mac fan... My Reasons: - I don't like Intel either, I do not support companies who got illegally obtained monopolies - I like clones - Apple is not 100% Open Source, they use and abuse Open Source for their own benefit. - Apple charges money fro their software - Apple does not make Linux versions of their software - Microsoft owns $150 million of Apple
munna1357

How to install Linux RHEL6 in Vmware and explained it detailed - YouTube - 0 views

  •  
    Among other critical change like changing to systemd, who now oversees daemons, forms and other imperative framework assets notwithstanding for init administrations that are presently left through systemd begin behind, utilization of Linux Containers with Docker, cross-domain trust for Microsoft Active Directory, one vital viewpoint speaks to the XFS as the default filesystem, which can bolster filesystems up to 16 exabytes and records up to 8 exabytes Despite the fact that RHEL can be introduced on an assortment of stages, for example, AMD 64, Intel 64, IBM System Z, IBM Power, and so forth. This instructional exercise covers the RHEL 7.0 fundamental negligible establishment with on an Intel x86-64 processor design utilizing a parallel DVD ISO picture, an establishment most appropriate for building up a high adaptable server stage with no Graphical Interface.
  •  
    Among other critical change like changing to systemd, who now oversees daemons, forms and other imperative framework assets notwithstanding for init administrations that are presently left through systemd begin behind, utilization of Linux Containers with Docker, cross-domain trust for Microsoft Active Directory, one vital viewpoint speaks to the XFS as the default filesystem, which can bolster filesystems up to 16 exabytes and records up to 8 exabytes Despite the fact that RHEL can be introduced on an assortment of stages, for example, AMD 64, Intel 64, IBM System Z, IBM Power, and so forth. This instructional exercise covers the RHEL 7.0 fundamental negligible establishment with on an Intel x86-64 processor design utilizing a parallel DVD ISO picture, an establishment most appropriate for building up a high adaptable server stage with no Graphical Interface.
larry hill

Take a Screenshot and Edit Them in Ubuntu Desktop with Hotshots - 0 views

  •  
    Hotshots is an alternative to screenshot applications like Shutter, is lighter and brings such attractive features can capture specific windows or only capture a specific area included a tool to easily edit the captured images.
Krizna G

How to install phpmyadmin on ubuntu 14.04 - 0 views

  •  
    Phpmyadmin is a free web tool used to administrative MySQL database. You can perform all major tasks like creating , deleting and modifying databases.
Krizna G

How to Install adobe flash player on ubuntu 14.04 - 0 views

  •  
    Installing flash player on ubuntu 14.04 : Adobe flash player is the most essential application. it allows you to browse all multimedia content like animati
Paul Sydney Orozco

How to Use @Required Annotation in Spring - 0 views

  •  
    An Example explaining on how @Required annotation from Spring Framework works. Provides sample on how to use @Required and expected exception if beans are not properly configured like BeanInitializationException or Property is required for bean.
Tim Mullins

AutoTalent Filter in AudaCity Open Source Alternative to AutoTune Tutorial Screencast - 0 views

  •  
    Tutorial Screencast on how to use the new AutoTalent Filter in AudaCity which is a Open Source Alternative to AutoTune world famous software to help make people sound like they can sing well. I'm doing this demo in Ubuntu Linux 9.10 64bit
Tim Mullins

Tech Shows - G'Day Mate & Happy New Year 2010 - 0 views

  •  
    The Meaning of G'Day Mate, and a Big Happy New Year for 2010. My Voice has effects on it from audacity to make me sound like a echo boom-box announcer at a stadium or big event.
anonymous

How To Remove Ubuntu's Password Keyring - 4 views

  • So here’s how you get rid of the keyring manager.
  • Open up your Home Folder by clicking Places>Home Folder Press CTRL-H (or click View>Show Hidden Files) Find a folder called .gnome2 (it has a period at the beginning of the name) and open it by double clicking on it Inside of the .gnome2 folder, there is another folder called keyrings.  Open it up. Delete any files you find within the keyrings folder Restart the computer
  • After you restart and login (if you’re automatically logging in) you’ll probably be asked to enter your wireless networks WPA/WEP encryption key (because we made it forget).  After you type that password in, the keyring manager will appear to let you know that it would like to handle the storage of that password and lock it away with a new keyring.
  • ...2 more annotations...
  • Instead of typing in a new password, leave both boxes completely empty and click Create. You’ll then be asked if you know what the hell you’re doing:
  • Go ahead and click Use Unsafe Storage.
Ace Dee

SEO Services that Exceeds Expectations - 1 views

Oracle Digital impressed me greatly with their content, knowledge and passion for the industry. After following Oracle Digital for three months and liking what I saw, I approached them for an initi...

SEO Perth Brisbane

started by Ace Dee on 22 Feb 11 no follow-up yet
Rem PC

Why I Like Remote PC Support - 1 views

I really am impressed with remote PC support from Remote PC Support Now. Aside that it is very responsive and quick, remote PC support provides complete resolution to a wide variety of computer iss...

remote PC support

started by Rem PC on 09 Aug 11 no follow-up yet
David Corking

BBC Breakfast Talk Up Windows 7 Dismiss Rivals | popey.com blog |Oct 21 2009 - 0 views

  • ‘little community’ building Free Software you say Rory? Dismissive and unnecessarily Patronising
    • David Corking
       
      I didn't like that bit either
  • No mention of the pain users will have upgrading
    • David Corking
       
      yes there is
  • Ubuntu isn’t ‘out next week’. The latest version is.
    • David Corking
       
      big oops
  •  
    Cellan-Jones not up to his usual standards - though this piece is a little too harsh on him.
David Corking

All about Linux: Configuring xterm in Linux - 0 views

  • XTerm*background: whiteXTerm*foreground: blackXTerm*pointerColor: redXTerm*pointerColorBackground: black
  • konsole takes a whooping 8MB and gnome-terminal over 3MB of memory, you can run xterm under 1MB
  • Create a '.Xresources' file in your home directory and enter the values that you want to set. My .Xresources file is as follows:
  • ...1 more annotation...
  • By pressing [Ctrl] key and the middle mouse button, you get a pop-up menu which helps you set/unset a lot of other features of your xterm window like enabling/disabling the scroll bars and so on.
    • David Corking
       
      If you use the pop up menu to customize your settings, I don't think there is a way to save your preferences. I think you need to use a text editor to create the .Xresources file as Ravi describes above.
  •  
    My Ubuntu 9.04 installation does not seem to listen to the .Xresources file. I am trying to figure out why.
sally pearson

Computer Help like No Other! - 1 views

ComputerHelpFastOnline answered my call for computer help fast! I never expected how quickly they can resolve my computer problem. Their computer help expert technicians really knew their job and...

computer help

started by sally pearson on 13 Jul 11 no follow-up yet
seth kutcher

Fast and Reliable Computer Repair Services - 1 views

One day, I was working on my thesis which was due in three days and then suddenly my computer shut down. I then browsed for companies that offer computer repair services and found Computer Hardwar...

computer repair services

started by seth kutcher on 02 Nov 11 no follow-up yet
1 - 18 of 18
Showing 20 items per page