Skip to main content

Home/ Ubuntu - Linux for human beings/ Group items tagged linux

Rss Feed Group items tagged

Tim Mullins

How-to Mintify Ubuntu Linux 9.x Screencast Tutorial - 0 views

  •  
    in this new video screencast tutorial from http://www.OSGUI.com Tech Show I will show you step by step how to turn Ubuntu Linux into Linux Mint. You can turn any version of Ubuntu Linux into Mint. Ubuntu Linux 9.04 Jaunty into Linux Mint 7 Gloria Ubuntu Linux 9.10 Karmic Koala into Linux Mint 8 Helena. In this demo Im using the 64bit version of Ubuntu Linux 9.10 and I install the packages for Mint 8 Helena to get the new advanced gnome menu and Mint artwork.
munna1357

Domanin and Network configuration Part 2 step by step - YouTube - 0 views

  •  
    This Linux instructional exercise covers TCP/IP organizing, system organization and framework design nuts and bolts. Linux can bolster various system gadgets. The gadget names are numbered and start at zero and tally upwards. For instance, a PC running two ethernet cards will have two gadgets marked/dev/eth0 and/dev/eth1. Linux system arrangement, administration, observing and framework devices are secured in this instructional exercise  All the enormous, userfriendly Linux dispersions accompany different graphical apparatuses, taking into account simple setup of the PC in a nearby system, for associating it to an Internet Service Provider or for remote access. These devices can be begun up from the charge line or from a menu:  Ubuntu setup is done selecting System->Administration->Networking.  RedHat Linux accompanies redhat-config-system, which has both a graphical and a content mode interface.  Suse's YAST or YAST2 is a holding nothing back one design device.  Mandrake/Mandriva accompanies a Network and Internet Configuration Wizard, which is ideally begun up from Mandrake's Control Center.  On Gnome frameworks: elf system inclinations.  On KDE frameworks: knetworkconf.  Your framework documentation gives a lot of guidance and data about accessibility and utilization of apparatuses.  Data that you should give:  For interfacing with the nearby system, for occurrence with your home PCs, or at work: hostname, domainname and IP address. In the event that you need to set up your own particular system, best do some all the more perusing first. At work, this data is liable to be given to your PC consequently when you boot it up. If all else fails, it is better not to indicate any data than making it up.  For interfacing with the Internet: username and secret key for your ISP, phone number when utilizing a modem. Your ISP generally naturally doles out you an IP l
  •  
    This Linux instructional exercise covers TCP/IP organizing, system organization and framework design nuts and bolts. Linux can bolster various system gadgets. The gadget names are numbered and start at zero and tally upwards. For instance, a PC running two ethernet cards will have two gadgets marked/dev/eth0 and/dev/eth1. Linux system arrangement, administration, observing and framework devices are secured in this instructional exercise  All the enormous, userfriendly Linux dispersions accompany different graphical apparatuses, taking into account simple setup of the PC in a nearby system, for associating it to an Internet Service Provider or for remote access. These devices can be begun up from the charge line or from a menu:  Ubuntu setup is done selecting System->Administration->Networking.  RedHat Linux accompanies redhat-config-system, which has both a graphical and a content mode interface.  Suse's YAST or YAST2 is a holding nothing back one design device.  Mandrake/Mandriva accompanies a Network and Internet Configuration Wizard, which is ideally begun up from Mandrake's Control Center.  On Gnome frameworks: elf system inclinations.  On KDE frameworks: knetworkconf.  Your framework documentation gives a lot of guidance and data about accessibility and utilization of apparatuses.  Data that you should give:  For interfacing with the nearby system, for occurrence with your home PCs, or at work: hostname, domainname and IP address. In the event that you need to set up your own particular system, best do some all the more perusing first. At work, this data is liable to be given to your PC consequently when you boot it up. If all else fails, it is better not to indicate any data than making it up.  For interfacing with the Internet: username and secret key for your ISP, phone number when utilizing a modem. Your ISP generally naturally doles out you an IP l
Tim M

Wine 1.2 in 64bit Linux Mint 9 or Ubuntu Linux 10.04 to Run Windows Apps & Games Screen... - 0 views

  •  
    Screencast Tutorial on how-to use Wine 1.2 in 64bit Linux OS to install and run most Microsoft Windows Applications & Games on Linux Mint 9 or Ubuntu Linux 10.04. These Linux Tips & Tricks also apply to all Ubuntu Linux 10.04 Lucid Lynx derivatives
mikhail-miguel

Ubuntu.pl - 0 views

  •  
    Linux/Ubuntu Applications reviews, Frequently asked questions on linux, ubuntu updates, Linux other distribution apps updates and news. Linux basic Tutorials and howtos for Linux newbies.
Tim Mullins

cool 2 videos in 1 Linux Mint 8 RC Tutorial Review - 0 views

  •  
    Dual-screen Live Action Video and Screencast Tutorial and Review of Linux Mint 8 Helena RC 32-bit, which is based on Ubuntu Linux 9.10 Karmic Koala free open source operating system. I show you how-to install Linux Mint 8 with a dual or triple boot setup or to take over the hard drive. Lots of Linux tips and tricks in this educational video from http://www.OSGUI.com Tech Show
Tim Mullins

Ailurus System Enhancement Tool for Ubuntu Linux - 5 views

  •  
    Screencast Review of Ailurus System Enhancement Tool for Ubuntu Linux 9.10 Karmic Koala Ailurus is an application which aims at making Linux easier to use. Features: * Help users study some Linux skills * Install/remove some applications which are not provided in the official repository * Search the fastest apt repositories * Enable/disable some third party repositories * Keep track of what packages you have installed/removed * Display information about BIOS, motherboard, CPU and battery * Show/Hide Computer, Home folder, Trash icon and Network icon on desktop * Configure Nautilus thumbnail cache * Configure Nautilus context menu * Configure Window behavior * Configure GNOME auto-start applications * Show/Hide GNOME splash screen original
Tim Mullins

Google Gadgets in Ubuntu Linux 9.10 Screencast Tutorial - 0 views

shared by Tim Mullins on 27 Nov 09 - Cached
  •  
    In this new and improved Video Screencast Tutorial from the OSGUI Tech Show I will show you how to step by step install and use the Google Gadgets for Linux on Ubuntu Linux 9.10 Karmic Koala, it provides a platform for running desktop gadgets under Linux, catering to the unique needs of Linux users. It's compatible with the gadgets written for Google Desktop for Windows aso well as the Universal Gadgets on iGoogle.
munna1357

ftp configuration in linux with users and configuring permisions - YouTube - 0 views

  •  
    The framework is currently a ftp server and can acknowledge associations. To arrange the server to consequently begin the administration at boot time, execute the charge chkconfig vsftpd on as root. To stop the server, execute the order administration vsftpd stop.  Document Transfer Protocol (FTP) is one of the most seasoned and most ordinarily utilized conventions found on the Internet today. Its motivation is to dependably exchange documents between PC has on a system without requiring the client to log specifically into the remote host or know about how to utilize the remote framework. It permits clients to get to records on remote frameworks utilizing a standard arrangement of basic summons.  The Very Secure FTP Daemon (vsftpd) is planned from the beginning to be quick, stable, and, above all, safe. Its capacity to handle vast quantities of associations productively and safely is the reason vsftpd is the main stand-alone FTP conveyed with Red Hat Enterprise Linux.  In Red Hat Enterprise Linux, the vsftpd bundle gives the Very Secure FTP daemon. Run the rpm - q vsftpd order to check whether vsftpd is introduced:
  •  
    The framework is currently a ftp server and can acknowledge associations. To arrange the server to consequently begin the administration at boot time, execute the charge chkconfig vsftpd on as root. To stop the server, execute the order administration vsftpd stop.  Document Transfer Protocol (FTP) is one of the most seasoned and most ordinarily utilized conventions found on the Internet today. Its motivation is to dependably exchange documents between PC has on a system without requiring the client to log specifically into the remote host or know about how to utilize the remote framework. It permits clients to get to records on remote frameworks utilizing a standard arrangement of basic summons.  The Very Secure FTP Daemon (vsftpd) is planned from the beginning to be quick, stable, and, above all, safe. Its capacity to handle vast quantities of associations productively and safely is the reason vsftpd is the main stand-alone FTP conveyed with Red Hat Enterprise Linux.  In Red Hat Enterprise Linux, the vsftpd bundle gives the Very Secure FTP daemon. Run the rpm - q vsftpd order to check whether vsftpd is introduced:
munna1357

ssh key and DHCP configuration linux commands step by step - YouTube - 0 views

  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
Tim Mullins

Ubuntu Linux install inside Windows C: Drive with WUBI - 0 views

  •  
    Video Tutorial on how to setup Ubuntu Linux to be installed inside Windows C:\\ Drive with WUBI program that is included in the CD. I also show you how to find your Windows files while in Ubuntu Linux and how to uninstall Linux from Windows.
Tim Mullins

FileZilla FTP on Ubuntu Linux Screencast Tutorial - 2 views

  •  
    Screencast Tutorial on how to use filezilla FTP free software on Ubuntu Linux or Linux Mint. filezilla is cross-platform. Original video production
  •  
    I din't realize Filezilla was that complicated. I've been using it for years in both Windows and Linux. Never needed a tutorial...
Tim Mullins

Ubuntu Linux 9.10 Karmic Koala Release Candidate 64-bit Video Preview - 0 views

  •  
    In this new video episode of the OSGUI.com Tech Show I show you how setup Ubuntu Linux 9.10 Karmic Koala release candidate. In this video tutorial preview review Im installing and using Ubuntu Linux 9.10 Karmic Koala 64-bit free Open Source Operating System. I show how to do custom disk partitioning using Gparted in the Ubuntu Linux Live CD installer.
munna1357

NFS ( Network file system ) Configuration in linux step by step rhel6 and create users ... - 0 views

  •  
    At present, there are three variants of NFS. NFS form 2 (NFSv2) is more established and generally bolstered. NFS form 3 (NFSv3) underpins safe nonconcurrent composes and is more hearty at mistake taking care of than NFSv2; it likewise bolsters 64-bit record sizes and balances, permitting customers to get to more than 2Gb of document information.  NFS form 4 (NFSv4) works through firewalls and on the Internet, no more requires a rpcbind administration, bolsters ACLs, and uses stateful operations. Red Hat Enterprise Linux 6 underpins NFSv2, NFSv3, and NFSv4 customers. At the point when mounting a document framework through NFS, Red Hat Enterprise Linux utilizes NFSv4 as a matter of course, if the server underpins it.  All forms of NFS can utilize Transmission Control Protocol (TCP) running over an IP system, with NFSv4 requiring it. NFSv2 and NFSv3 can utilize the User Datagram Protocol (UDP) running over an IP system to give a stateless system association between the customer and server.  At the point when utilizing NFSv2 or NFSv3 with UDP, the stateless UDP association (under typical conditions) has less convention overhead than TCP. This can interpret into better execution on clean, non-congested systems. In any case, on the grounds that UDP is stateless, if the server goes down suddenly, UDP customers keep on saturating the system with solicitations for the server. Moreover, when a casing is lost with UDP, the whole RPC ask for must be retransmitted; with TCP, just the lost casing should be loathe. Consequently, TCP is the favored convention when associating with a NFS server.
  •  
    At present, there are three variants of NFS. NFS form 2 (NFSv2) is more established and generally bolstered. NFS form 3 (NFSv3) underpins safe nonconcurrent composes and is more hearty at mistake taking care of than NFSv2; it likewise bolsters 64-bit record sizes and balances, permitting customers to get to more than 2Gb of document information.  NFS form 4 (NFSv4) works through firewalls and on the Internet, no more requires a rpcbind administration, bolsters ACLs, and uses stateful operations. Red Hat Enterprise Linux 6 underpins NFSv2, NFSv3, and NFSv4 customers. At the point when mounting a document framework through NFS, Red Hat Enterprise Linux utilizes NFSv4 as a matter of course, if the server underpins it.  All forms of NFS can utilize Transmission Control Protocol (TCP) running over an IP system, with NFSv4 requiring it. NFSv2 and NFSv3 can utilize the User Datagram Protocol (UDP) running over an IP system to give a stateless system association between the customer and server.  At the point when utilizing NFSv2 or NFSv3 with UDP, the stateless UDP association (under typical conditions) has less convention overhead than TCP. This can interpret into better execution on clean, non-congested systems. In any case, on the grounds that UDP is stateless, if the server goes down suddenly, UDP customers keep on saturating the system with solicitations for the server. Moreover, when a casing is lost with UDP, the whole RPC ask for must be retransmitted; with TCP, just the lost casing should be loathe. Consequently, TCP is the favored convention when associating with a NFS server.
Tim Mullins

Ubuntu Linux & Xfce & KDE 4.4 vs Windows XP on EeePC - 0 views

  •  
    Review Demo Ubuntu Linux Karmic Koala & Xubuntu Xfce interface & Kubuntu KDE 4.4 backports interface & Microsoft Windows XP dual booting on ASUS Eee PC 1001HA conclusion to the last video on this installing Linux on this Netbook.
Tim Mullins

Wireless Drivers in Ubuntu Linux & Linux Mint How-to setup Tutorial - 0 views

  •  
    How-to setup Tutorial Live Action and Screencast educational video of how to setup Wireless Device Drivers in Ubuntu Linux 9.10 & Linux Mint 8. 100% original production
Tim Mullins

Top F.A.Q (Frequently asked questions) - Ubuntu Linux Tips - 0 views

  •  
    Top FAQ (Frequently asked questions) - Ubuntu Linux Tips I answer the most often questions that people ask me on YouTube. ... Top FAQ (Frequently asked questions) Ubuntu Linux Tips answer the most often questions that people ask me on YouTube.
Tim Mullins

Ubuntu Linux Security ClamTK Anti-Virus Firestarter Firewall Screencast Tutorial - 1 views

  •  
    Screencast Tutorial on how to setup Ubuntu Linux Security with clamtk Anti-Virus and Firestarter Firewall. Demo done with Ubuntu Linux 64bit 9.10 Karmic Koala, Recordmydesktop, kdenlive, cheese, clamtk, firestarter. Original video production
Tim Mullins

Making DVD Movies with DeVeDe in Ubuntu or Linux Mint Screencast Tutorial - 0 views

  •  
    Screencast Tutorial Making DVD Movies with devede in Ubuntu Linux or Linux Mint. I show you how to create DVD video disks from any Video file. Original video production
Tim Mullins

Linux & Open Source is Right For You & Me - 0 views

  •  
    Video Blog style Opioniated Editorial based on a file time of following the IT Industry. I know for a fact that Linux & Open Source is Right For You & Me & everyone and that all the worlds problems will be solved when Linux is dominate.
Tim M

Volume Controls Sound Settings PulseAudio Manager Kubuntu Linux 64bit KDE 4.4.2 Screenc... - 0 views

  •  
    Screencast style Tutorial on how-to use and configure Volume Controls & Sound Settings in the PulseAudio Manager and KMix with Kubuntu Linux 64bit KDE 4.4.2. I show you how to setup the Audio Volume settings in Ubuntu Linux based Open Source Operating Systems
1 - 20 of 244 Next › Last »
Showing 20 items per page