Skip to main content

Home/ Ubuntu - Linux for human beings/ Group items tagged networks

Rss Feed Group items tagged

munna1357

Domanin and Network configuration Part 2 step by step - YouTube - 0 views

  •  
    This Linux instructional exercise covers TCP/IP organizing, system organization and framework design nuts and bolts. Linux can bolster various system gadgets. The gadget names are numbered and start at zero and tally upwards. For instance, a PC running two ethernet cards will have two gadgets marked/dev/eth0 and/dev/eth1. Linux system arrangement, administration, observing and framework devices are secured in this instructional exercise  All the enormous, userfriendly Linux dispersions accompany different graphical apparatuses, taking into account simple setup of the PC in a nearby system, for associating it to an Internet Service Provider or for remote access. These devices can be begun up from the charge line or from a menu:  Ubuntu setup is done selecting System->Administration->Networking.  RedHat Linux accompanies redhat-config-system, which has both a graphical and a content mode interface.  Suse's YAST or YAST2 is a holding nothing back one design device.  Mandrake/Mandriva accompanies a Network and Internet Configuration Wizard, which is ideally begun up from Mandrake's Control Center.  On Gnome frameworks: elf system inclinations.  On KDE frameworks: knetworkconf.  Your framework documentation gives a lot of guidance and data about accessibility and utilization of apparatuses.  Data that you should give:  For interfacing with the nearby system, for occurrence with your home PCs, or at work: hostname, domainname and IP address. In the event that you need to set up your own particular system, best do some all the more perusing first. At work, this data is liable to be given to your PC consequently when you boot it up. If all else fails, it is better not to indicate any data than making it up.  For interfacing with the Internet: username and secret key for your ISP, phone number when utilizing a modem. Your ISP generally naturally doles out you an IP l
  •  
    This Linux instructional exercise covers TCP/IP organizing, system organization and framework design nuts and bolts. Linux can bolster various system gadgets. The gadget names are numbered and start at zero and tally upwards. For instance, a PC running two ethernet cards will have two gadgets marked/dev/eth0 and/dev/eth1. Linux system arrangement, administration, observing and framework devices are secured in this instructional exercise  All the enormous, userfriendly Linux dispersions accompany different graphical apparatuses, taking into account simple setup of the PC in a nearby system, for associating it to an Internet Service Provider or for remote access. These devices can be begun up from the charge line or from a menu:  Ubuntu setup is done selecting System->Administration->Networking.  RedHat Linux accompanies redhat-config-system, which has both a graphical and a content mode interface.  Suse's YAST or YAST2 is a holding nothing back one design device.  Mandrake/Mandriva accompanies a Network and Internet Configuration Wizard, which is ideally begun up from Mandrake's Control Center.  On Gnome frameworks: elf system inclinations.  On KDE frameworks: knetworkconf.  Your framework documentation gives a lot of guidance and data about accessibility and utilization of apparatuses.  Data that you should give:  For interfacing with the nearby system, for occurrence with your home PCs, or at work: hostname, domainname and IP address. In the event that you need to set up your own particular system, best do some all the more perusing first. At work, this data is liable to be given to your PC consequently when you boot it up. If all else fails, it is better not to indicate any data than making it up.  For interfacing with the Internet: username and secret key for your ISP, phone number when utilizing a modem. Your ISP generally naturally doles out you an IP l
Frank Boros

How to configure network using CLI ang GUI in Ubuntu 12.04 - 0 views

  •  
    In this example I will show how to setup network configuration using command line and graphical tool in Ubuntu 12.04. To start accessing internet or sharing other resources on the network you have to configure TCP/IP settings of you ethernet card. In ubuntu you can configure network settings through
Frank Boros

How to install Samba & configure network share on Ubuntu 12.04 - 0 views

  •  
    In this example, I will show how to install samba and configure network share on Ubuntu 12.04. Samba is a graphical user interface to help with configuration and management, there are several GUI interfaces to Samba available, for me the most simple and powerful one of these tools is samba server co
Konstantinos

Tor Project: Anonymity Online - 0 views

  •  
    Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.
  •  
Krizna G

Setup NFS server on ubuntu 14.04 - 0 views

  •  
    NFS ( Network file systems ) is used to share files with other computers over the network. It is mainly used for centralized home folders. This article exp
munna1357

NFS ( Network file system ) Configuration in linux step by step rhel6 and create users ... - 0 views

  •  
    At present, there are three variants of NFS. NFS form 2 (NFSv2) is more established and generally bolstered. NFS form 3 (NFSv3) underpins safe nonconcurrent composes and is more hearty at mistake taking care of than NFSv2; it likewise bolsters 64-bit record sizes and balances, permitting customers to get to more than 2Gb of document information.  NFS form 4 (NFSv4) works through firewalls and on the Internet, no more requires a rpcbind administration, bolsters ACLs, and uses stateful operations. Red Hat Enterprise Linux 6 underpins NFSv2, NFSv3, and NFSv4 customers. At the point when mounting a document framework through NFS, Red Hat Enterprise Linux utilizes NFSv4 as a matter of course, if the server underpins it.  All forms of NFS can utilize Transmission Control Protocol (TCP) running over an IP system, with NFSv4 requiring it. NFSv2 and NFSv3 can utilize the User Datagram Protocol (UDP) running over an IP system to give a stateless system association between the customer and server.  At the point when utilizing NFSv2 or NFSv3 with UDP, the stateless UDP association (under typical conditions) has less convention overhead than TCP. This can interpret into better execution on clean, non-congested systems. In any case, on the grounds that UDP is stateless, if the server goes down suddenly, UDP customers keep on saturating the system with solicitations for the server. Moreover, when a casing is lost with UDP, the whole RPC ask for must be retransmitted; with TCP, just the lost casing should be loathe. Consequently, TCP is the favored convention when associating with a NFS server.
  •  
    At present, there are three variants of NFS. NFS form 2 (NFSv2) is more established and generally bolstered. NFS form 3 (NFSv3) underpins safe nonconcurrent composes and is more hearty at mistake taking care of than NFSv2; it likewise bolsters 64-bit record sizes and balances, permitting customers to get to more than 2Gb of document information.  NFS form 4 (NFSv4) works through firewalls and on the Internet, no more requires a rpcbind administration, bolsters ACLs, and uses stateful operations. Red Hat Enterprise Linux 6 underpins NFSv2, NFSv3, and NFSv4 customers. At the point when mounting a document framework through NFS, Red Hat Enterprise Linux utilizes NFSv4 as a matter of course, if the server underpins it.  All forms of NFS can utilize Transmission Control Protocol (TCP) running over an IP system, with NFSv4 requiring it. NFSv2 and NFSv3 can utilize the User Datagram Protocol (UDP) running over an IP system to give a stateless system association between the customer and server.  At the point when utilizing NFSv2 or NFSv3 with UDP, the stateless UDP association (under typical conditions) has less convention overhead than TCP. This can interpret into better execution on clean, non-congested systems. In any case, on the grounds that UDP is stateless, if the server goes down suddenly, UDP customers keep on saturating the system with solicitations for the server. Moreover, when a casing is lost with UDP, the whole RPC ask for must be retransmitted; with TCP, just the lost casing should be loathe. Consequently, TCP is the favored convention when associating with a NFS server.
Scott Beamer

Splunk | IT Search for Log Management, Operations, Security and Compliance - 1 views

  •  
    Splunk is the world's leading software used to monitor, report and analyze live streaming IT data as well as terabytes of historical data - located on-premises or in the cloud. More than 1,850 organizations in 70 countries use Splunk to gain valuable insights from their IT data to improve service levels, reduce IT operations costs, mitigate security risks, and drive new levels of operational visibility.
Tim Mullins

Ailurus System Enhancement Tool for Ubuntu Linux - 5 views

  •  
    Screencast Review of Ailurus System Enhancement Tool for Ubuntu Linux 9.10 Karmic Koala Ailurus is an application which aims at making Linux easier to use. Features: * Help users study some Linux skills * Install/remove some applications which are not provided in the official repository * Search the fastest apt repositories * Enable/disable some third party repositories * Keep track of what packages you have installed/removed * Display information about BIOS, motherboard, CPU and battery * Show/Hide Computer, Home folder, Trash icon and Network icon on desktop * Configure Nautilus thumbnail cache * Configure Nautilus context menu * Configure Window behavior * Configure GNOME auto-start applications * Show/Hide GNOME splash screen original
Krizna G

How to setup FTP server on ubuntu 14.04 ( VSFTPD ) - 0 views

  •  
    FTP is used to transfer files from one host to another over TCP network. This article explains how to setup FTP server on ubuntu 14.04 . There are 3 popula
anonymous

How To Remove Ubuntu's Password Keyring - 4 views

  • So here’s how you get rid of the keyring manager.
  • Open up your Home Folder by clicking Places>Home Folder Press CTRL-H (or click View>Show Hidden Files) Find a folder called .gnome2 (it has a period at the beginning of the name) and open it by double clicking on it Inside of the .gnome2 folder, there is another folder called keyrings.  Open it up. Delete any files you find within the keyrings folder Restart the computer
  • After you restart and login (if you’re automatically logging in) you’ll probably be asked to enter your wireless networks WPA/WEP encryption key (because we made it forget).  After you type that password in, the keyring manager will appear to let you know that it would like to handle the storage of that password and lock it away with a new keyring.
  • ...2 more annotations...
  • Instead of typing in a new password, leave both boxes completely empty and click Create. You’ll then be asked if you know what the hell you’re doing:
  • Go ahead and click Use Unsafe Storage.
shai edrote

Troubleshooting and Fixing Computers - 1 views

My computer often experiences network trouble. It does not only cause me inconvenience but, it also causes delays in my work as well. I often hire computer technicians to help me troubleshoot my co...

Fix Computer

started by shai edrote on 12 Sep 11 no follow-up yet
Scott Beamer

Linux Today - Editor's Note: Ubuntu Is Not Our Savior - 0 views

  • And no matter how superior Ubuntu becomes, Gentoo, Slackware, Red Hat, Fedora, and Debian are more important because they are the primal Linuxes. Everything else flows from them. They are the progenitors, and are essential. Let's also remember non-Linux FOSS operating systems such as FreeBSD, NetBSD, and OpenBSD. From these also come herds of wonderful things such as routers, firewalls, drivers, network stacks, and stout high-demand servers. (Take a look at the top servers on Netcraft.)
  •  
    There is more to Linux then the almighty Ubuntu
David Corking

Multitasking in Ubuntu - Using Devil's Pie - OS, Software & Networking by ExtremeTech - 0 views

  • For example, I have a file called $HOME/.devilspie/games.ds that opens all games on workspace #4: (begin (if (is (application_name) "gnobots2") (begin (set_workspace 4)) ) (if (is (application_name) "iagno") (begin (set_workspace 4)) ) (if (is (application_name) "same-gnome") (begin (set_workspace 4)) ) ) Similarly, I have an xawtv.ds configuration file that says: (if (is (application_name) "xawtv") (above) )
  •  
    tutorial for an interesting new lisp-y tool
Linux Training

No.1 Red Hat Training and Exam Certification Chennai-Bangalore - 1 views

ANAL DEB, Sep 4, 2018 Plexus Networks is the best place in Chennai to learn and get hands on training for RedHat training. The trainers are very nice and knowledgeable I took Linux training and c...

ubuntu Linux tutorial

started by Linux Training on 25 Sep 18 no follow-up yet
1 - 20 of 21 Next ›
Showing 20 items per page