Skip to main content

Home/ Ubuntu - Linux for human beings/ Group items tagged to

Rss Feed Group items tagged

munna1357

ssh key and DHCP configuration linux commands step by step - YouTube - 0 views

  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
munna1357

ftp configuration in linux with users and configuring permisions - YouTube - 0 views

  •  
    The framework is currently a ftp server and can acknowledge associations. To arrange the server to consequently begin the administration at boot time, execute the charge chkconfig vsftpd on as root. To stop the server, execute the order administration vsftpd stop.  Document Transfer Protocol (FTP) is one of the most seasoned and most ordinarily utilized conventions found on the Internet today. Its motivation is to dependably exchange documents between PC has on a system without requiring the client to log specifically into the remote host or know about how to utilize the remote framework. It permits clients to get to records on remote frameworks utilizing a standard arrangement of basic summons.  The Very Secure FTP Daemon (vsftpd) is planned from the beginning to be quick, stable, and, above all, safe. Its capacity to handle vast quantities of associations productively and safely is the reason vsftpd is the main stand-alone FTP conveyed with Red Hat Enterprise Linux.  In Red Hat Enterprise Linux, the vsftpd bundle gives the Very Secure FTP daemon. Run the rpm - q vsftpd order to check whether vsftpd is introduced:
  •  
    The framework is currently a ftp server and can acknowledge associations. To arrange the server to consequently begin the administration at boot time, execute the charge chkconfig vsftpd on as root. To stop the server, execute the order administration vsftpd stop.  Document Transfer Protocol (FTP) is one of the most seasoned and most ordinarily utilized conventions found on the Internet today. Its motivation is to dependably exchange documents between PC has on a system without requiring the client to log specifically into the remote host or know about how to utilize the remote framework. It permits clients to get to records on remote frameworks utilizing a standard arrangement of basic summons.  The Very Secure FTP Daemon (vsftpd) is planned from the beginning to be quick, stable, and, above all, safe. Its capacity to handle vast quantities of associations productively and safely is the reason vsftpd is the main stand-alone FTP conveyed with Red Hat Enterprise Linux.  In Red Hat Enterprise Linux, the vsftpd bundle gives the Very Secure FTP daemon. Run the rpm - q vsftpd order to check whether vsftpd is introduced:
munna1357

ftp configuration linux part 2 rhel6 ftp server configuration step by step process - Yo... - 0 views

  •  
    The vsftpd FTP daemon runs kept of course. SELinux arrangement characterizes how vsftpd communicates with documents, forms, and with the framework as a rule. For instance, when a verified client sign in by means of FTP, they can't read from or keep in touch with records in their home catalogs: SELinux keeps vsftpd from getting to client home registries as a matter of course. Additionally, as a matter of course, vsftpd does not have admittance to NFS or CIFS volumes, and unknown clients don't have compose access, regardless of the possibility that such compose access is arranged in/and so forth/vsftpd/vsftpd.conf. Booleans can be empowered to permit the beforehand said access.  The accompanying illustration shows a verified client signing in, and a SELinux foreswearing when attempting to view records in their home catalog:  Run the rpm - q ftp order to check whether the ftp bundle is introduced. On the off chance that it is not, run the yum introduce ftp order as the root client to introduce it.  Run the rpm - q vsftpd order to check whether the vsftpd bundle is introduced. On the off chance that it is not, run the yum introduce vsftpd order as the root client to introduce it.  In Red Hat Enterprise Linux, vsftpd just permits mysterious clients to sign in as a matter of course. To permit validated clients to sign in, alter/and so on/vsftpd/vsftpd.conf as the root client. Ensure the local_enable=YES choice is uncommented:
  •  
    The vsftpd FTP daemon runs kept of course. SELinux arrangement characterizes how vsftpd communicates with documents, forms, and with the framework as a rule. For instance, when a verified client sign in by means of FTP, they can't read from or keep in touch with records in their home catalogs: SELinux keeps vsftpd from getting to client home registries as a matter of course. Additionally, as a matter of course, vsftpd does not have admittance to NFS or CIFS volumes, and unknown clients don't have compose access, regardless of the possibility that such compose access is arranged in/and so forth/vsftpd/vsftpd.conf. Booleans can be empowered to permit the beforehand said access.  The accompanying illustration shows a verified client signing in, and a SELinux foreswearing when attempting to view records in their home catalog:  Run the rpm - q ftp order to check whether the ftp bundle is introduced. On the off chance that it is not, run the yum introduce ftp order as the root client to introduce it.  Run the rpm - q vsftpd order to check whether the vsftpd bundle is introduced. On the off chance that it is not, run the yum introduce vsftpd order as the root client to introduce it.  In Red Hat Enterprise Linux, vsftpd just permits mysterious clients to sign in as a matter of course. To permit validated clients to sign in, alter/and so on/vsftpd/vsftpd.conf as the root client. Ensure the local_enable=YES choice is uncommented:
munna1357

Ubuntu 16.02 LTS Installation Step by Step Process Updated OS with VMware - YouTube - 0 views

  •  
    Also, clients will see an immense distinction in regards to Ubuntu Software Center (Figure 3). That is on account of it's gone. Ubuntu has moved to GNOME Software, which is as a rule effectively created, is more develop, and will include new components, for example, the capacity to redesign the OS and firmware from the application. Ubuntu is a precarious appropriation. As much as I cherish it on my home server, my desktop is an alternate ballgame. As far as I can tell, discharges between LTS variants have numerous new innovations that might possibly make due in the following LTS. There were numerous advances or elements that Canonical believed were aspiring - HUD, exploring different avenues regarding menus, online dash seek, Ubuntu Software Center, and so on - however they were deserted. In this way, if I somehow managed to utilize Ubuntu on my desktop, I would at present pick LTS. The issue with any LTS discharge, nonetheless, is that it sort of gets solidified in time, and you need to backport everything or utilize PPA to get the most recent variant of uses or bundles. There are numerous situations where the same bundle is not accessible for all Ubuntu discharges. That is the reason I utilize Arch on my desktop. Talking about applications, the tremendous news for desktop clients is that 16.04 at long last conveys Snap bundles to Ubuntu. Snaps are the eventual fate of uses on Ubuntu stage - from desktop to portable.
  •  
    Also, clients will see an immense distinction in regards to Ubuntu Software Center (Figure 3). That is on account of it's gone. Ubuntu has moved to GNOME Software, which is as a rule effectively created, is more develop, and will include new components, for example, the capacity to redesign the OS and firmware from the application. Ubuntu is a precarious appropriation. As much as I cherish it on my home server, my desktop is an alternate ballgame. As far as I can tell, discharges between LTS variants have numerous new innovations that might possibly make due in the following LTS. There were numerous advances or elements that Canonical believed were aspiring - HUD, exploring different avenues regarding menus, online dash seek, Ubuntu Software Center, and so on - however they were deserted. In this way, if I somehow managed to utilize Ubuntu on my desktop, I would at present pick LTS. The issue with any LTS discharge, nonetheless, is that it sort of gets solidified in time, and you need to backport everything or utilize PPA to get the most recent variant of uses or bundles. There are numerous situations where the same bundle is not accessible for all Ubuntu discharges. That is the reason I utilize Arch on my desktop. Talking about applications, the tremendous news for desktop clients is that 16.04 at long last conveys Snap bundles to Ubuntu. Snaps are the eventual fate of uses on Ubuntu stage - from desktop to portable.
munna1357

Domanin and Network configuration Part 2 step by step - YouTube - 0 views

  •  
    This Linux instructional exercise covers TCP/IP organizing, system organization and framework design nuts and bolts. Linux can bolster various system gadgets. The gadget names are numbered and start at zero and tally upwards. For instance, a PC running two ethernet cards will have two gadgets marked/dev/eth0 and/dev/eth1. Linux system arrangement, administration, observing and framework devices are secured in this instructional exercise  All the enormous, userfriendly Linux dispersions accompany different graphical apparatuses, taking into account simple setup of the PC in a nearby system, for associating it to an Internet Service Provider or for remote access. These devices can be begun up from the charge line or from a menu:  Ubuntu setup is done selecting System->Administration->Networking.  RedHat Linux accompanies redhat-config-system, which has both a graphical and a content mode interface.  Suse's YAST or YAST2 is a holding nothing back one design device.  Mandrake/Mandriva accompanies a Network and Internet Configuration Wizard, which is ideally begun up from Mandrake's Control Center.  On Gnome frameworks: elf system inclinations.  On KDE frameworks: knetworkconf.  Your framework documentation gives a lot of guidance and data about accessibility and utilization of apparatuses.  Data that you should give:  For interfacing with the nearby system, for occurrence with your home PCs, or at work: hostname, domainname and IP address. In the event that you need to set up your own particular system, best do some all the more perusing first. At work, this data is liable to be given to your PC consequently when you boot it up. If all else fails, it is better not to indicate any data than making it up.  For interfacing with the Internet: username and secret key for your ISP, phone number when utilizing a modem. Your ISP generally naturally doles out you an IP l
  •  
    This Linux instructional exercise covers TCP/IP organizing, system organization and framework design nuts and bolts. Linux can bolster various system gadgets. The gadget names are numbered and start at zero and tally upwards. For instance, a PC running two ethernet cards will have two gadgets marked/dev/eth0 and/dev/eth1. Linux system arrangement, administration, observing and framework devices are secured in this instructional exercise  All the enormous, userfriendly Linux dispersions accompany different graphical apparatuses, taking into account simple setup of the PC in a nearby system, for associating it to an Internet Service Provider or for remote access. These devices can be begun up from the charge line or from a menu:  Ubuntu setup is done selecting System->Administration->Networking.  RedHat Linux accompanies redhat-config-system, which has both a graphical and a content mode interface.  Suse's YAST or YAST2 is a holding nothing back one design device.  Mandrake/Mandriva accompanies a Network and Internet Configuration Wizard, which is ideally begun up from Mandrake's Control Center.  On Gnome frameworks: elf system inclinations.  On KDE frameworks: knetworkconf.  Your framework documentation gives a lot of guidance and data about accessibility and utilization of apparatuses.  Data that you should give:  For interfacing with the nearby system, for occurrence with your home PCs, or at work: hostname, domainname and IP address. In the event that you need to set up your own particular system, best do some all the more perusing first. At work, this data is liable to be given to your PC consequently when you boot it up. If all else fails, it is better not to indicate any data than making it up.  For interfacing with the Internet: username and secret key for your ISP, phone number when utilizing a modem. Your ISP generally naturally doles out you an IP l
munna1357

configuring raid part 2 step by step and iptables linux firewall configuration - YouTube - 0 views

  •  
    The striping with circulated equality implies it will part the equality data and stripe information over the numerous plates, which will have great information excess.  A Redundant Array of Independent Disks (RAID) is a progression of plates that can spare your information regardless of the possibility that a loathsome disappointment happens on one of the circles. While a few adaptations of RAID make complete duplicates of your information, others utilize the purported equality bit to permit your PC to remake the information on lost circles  Assault permits a director to shape a variety of a few hard crashes into one intelligent drive perceived as one drive by the working framework. It likewise spreads the information put away over the variety of drives to reduction circle access time and perform information excess. The information excess can be utilized to recoup information if one of the hard drives in the cluster crash.
  •  
    The striping with circulated equality implies it will part the equality data and stripe information over the numerous plates, which will have great information excess.  A Redundant Array of Independent Disks (RAID) is a progression of plates that can spare your information regardless of the possibility that a loathsome disappointment happens on one of the circles. While a few adaptations of RAID make complete duplicates of your information, others utilize the purported equality bit to permit your PC to remake the information on lost circles  Assault permits a director to shape a variety of a few hard crashes into one intelligent drive perceived as one drive by the working framework. It likewise spreads the information put away over the variety of drives to reduction circle access time and perform information excess. The information excess can be utilized to recoup information if one of the hard drives in the cluster crash.
munna1357

How to install Linux RHEL6 in Vmware and explained it detailed - YouTube - 0 views

  •  
    Among other critical change like changing to systemd, who now oversees daemons, forms and other imperative framework assets notwithstanding for init administrations that are presently left through systemd begin behind, utilization of Linux Containers with Docker, cross-domain trust for Microsoft Active Directory, one vital viewpoint speaks to the XFS as the default filesystem, which can bolster filesystems up to 16 exabytes and records up to 8 exabytes Despite the fact that RHEL can be introduced on an assortment of stages, for example, AMD 64, Intel 64, IBM System Z, IBM Power, and so forth. This instructional exercise covers the RHEL 7.0 fundamental negligible establishment with on an Intel x86-64 processor design utilizing a parallel DVD ISO picture, an establishment most appropriate for building up a high adaptable server stage with no Graphical Interface.
  •  
    Among other critical change like changing to systemd, who now oversees daemons, forms and other imperative framework assets notwithstanding for init administrations that are presently left through systemd begin behind, utilization of Linux Containers with Docker, cross-domain trust for Microsoft Active Directory, one vital viewpoint speaks to the XFS as the default filesystem, which can bolster filesystems up to 16 exabytes and records up to 8 exabytes Despite the fact that RHEL can be introduced on an assortment of stages, for example, AMD 64, Intel 64, IBM System Z, IBM Power, and so forth. This instructional exercise covers the RHEL 7.0 fundamental negligible establishment with on an Intel x86-64 processor design utilizing a parallel DVD ISO picture, an establishment most appropriate for building up a high adaptable server stage with no Graphical Interface.
munna1357

ssh in linux installation step by step & | Package installation of linux | - YouTube - 0 views

  •  
    OpenSSH is a free open source set of PC instruments used to give secure and encoded correspondence over a PC system by utilizing the ssh convention. Numerous individuals, new to PCs and conventions, make a confusion about OpenSSH, they think it is a convention, yet it is not, it is an arrangement of PC projects that utilization the ssh convention.  OpenSSH is created by the Open BSD gathering and it is discharged under Simplified BSD License. A primary element which has made feasible for OpenSSH to be utilized such a great amount among framework overseers is its multi-stage ability and exceptionally valuable pleasant components it has. The most recent adaptation is OpenSSH 6.4 which has been discharged on November 8, 2013.  This adaptation of OpenSSH accompanies numerous new components and patches, so on the off chance that you as of now utilize OpenSSH for directing your machines, I recommend you to do an overhaul.
  •  
    OpenSSH is a free open source set of PC instruments used to give secure and encoded correspondence over a PC system by utilizing the ssh convention. Numerous individuals, new to PCs and conventions, make a confusion about OpenSSH, they think it is a convention, yet it is not, it is an arrangement of PC projects that utilization the ssh convention.  OpenSSH is created by the Open BSD gathering and it is discharged under Simplified BSD License. A primary element which has made feasible for OpenSSH to be utilized such a great amount among framework overseers is its multi-stage ability and exceptionally valuable pleasant components it has. The most recent adaptation is OpenSSH 6.4 which has been discharged on November 8, 2013.  This adaptation of OpenSSH accompanies numerous new components and patches, so on the off chance that you as of now utilize OpenSSH for directing your machines, I recommend you to do an overhaul.
David Corking

All about Linux: Configuring xterm in Linux - 0 views

  • XTerm*background: whiteXTerm*foreground: blackXTerm*pointerColor: redXTerm*pointerColorBackground: black
  • konsole takes a whooping 8MB and gnome-terminal over 3MB of memory, you can run xterm under 1MB
  • Create a '.Xresources' file in your home directory and enter the values that you want to set. My .Xresources file is as follows:
  • ...1 more annotation...
  • By pressing [Ctrl] key and the middle mouse button, you get a pop-up menu which helps you set/unset a lot of other features of your xterm window like enabling/disabling the scroll bars and so on.
    • David Corking
       
      If you use the pop up menu to customize your settings, I don't think there is a way to save your preferences. I think you need to use a text editor to create the .Xresources file as Ravi describes above.
  •  
    My Ubuntu 9.04 installation does not seem to listen to the .Xresources file. I am trying to figure out why.
larry hill

Easy Way to Checking Hard Drive for Bad Sectors and Errors in Ubuntu - 0 views

  •  
    How to know if you have bad sectors on your hard drive in Ubuntu Desktop and how to fix them. You can use badblock program to fix this problem. The badblocks is program command line based allow to test your harddrive for, you guessed it, bad blocks.
Tim M

Wine 1.2 in 64bit Linux Mint 9 or Ubuntu Linux 10.04 to Run Windows Apps & Games Screen... - 0 views

  •  
    Screencast Tutorial on how-to use Wine 1.2 in 64bit Linux OS to install and run most Microsoft Windows Applications & Games on Linux Mint 9 or Ubuntu Linux 10.04. These Linux Tips & Tricks also apply to all Ubuntu Linux 10.04 Lucid Lynx derivatives
Tim Mullins

Video Editing in Linux with Kdenlive How to Install and Use - 1 views

  •  
    Education video I first show you how to install Kdenlive 0.7.6 in Ubuntu linux 9.10 Karmic Koala and 9.04 Januty picture-in-picture, live action and screencast tutorial on how to use Kdenlive and do Video Editing in Linux. I show you how to do animated text over films, and I also show you how to use Pitivi non-linear video editing.
munna1357

NFS ( Network file system ) Configuration in linux step by step rhel6 and create users ... - 0 views

  •  
    At present, there are three variants of NFS. NFS form 2 (NFSv2) is more established and generally bolstered. NFS form 3 (NFSv3) underpins safe nonconcurrent composes and is more hearty at mistake taking care of than NFSv2; it likewise bolsters 64-bit record sizes and balances, permitting customers to get to more than 2Gb of document information.  NFS form 4 (NFSv4) works through firewalls and on the Internet, no more requires a rpcbind administration, bolsters ACLs, and uses stateful operations. Red Hat Enterprise Linux 6 underpins NFSv2, NFSv3, and NFSv4 customers. At the point when mounting a document framework through NFS, Red Hat Enterprise Linux utilizes NFSv4 as a matter of course, if the server underpins it.  All forms of NFS can utilize Transmission Control Protocol (TCP) running over an IP system, with NFSv4 requiring it. NFSv2 and NFSv3 can utilize the User Datagram Protocol (UDP) running over an IP system to give a stateless system association between the customer and server.  At the point when utilizing NFSv2 or NFSv3 with UDP, the stateless UDP association (under typical conditions) has less convention overhead than TCP. This can interpret into better execution on clean, non-congested systems. In any case, on the grounds that UDP is stateless, if the server goes down suddenly, UDP customers keep on saturating the system with solicitations for the server. Moreover, when a casing is lost with UDP, the whole RPC ask for must be retransmitted; with TCP, just the lost casing should be loathe. Consequently, TCP is the favored convention when associating with a NFS server.
  •  
    At present, there are three variants of NFS. NFS form 2 (NFSv2) is more established and generally bolstered. NFS form 3 (NFSv3) underpins safe nonconcurrent composes and is more hearty at mistake taking care of than NFSv2; it likewise bolsters 64-bit record sizes and balances, permitting customers to get to more than 2Gb of document information.  NFS form 4 (NFSv4) works through firewalls and on the Internet, no more requires a rpcbind administration, bolsters ACLs, and uses stateful operations. Red Hat Enterprise Linux 6 underpins NFSv2, NFSv3, and NFSv4 customers. At the point when mounting a document framework through NFS, Red Hat Enterprise Linux utilizes NFSv4 as a matter of course, if the server underpins it.  All forms of NFS can utilize Transmission Control Protocol (TCP) running over an IP system, with NFSv4 requiring it. NFSv2 and NFSv3 can utilize the User Datagram Protocol (UDP) running over an IP system to give a stateless system association between the customer and server.  At the point when utilizing NFSv2 or NFSv3 with UDP, the stateless UDP association (under typical conditions) has less convention overhead than TCP. This can interpret into better execution on clean, non-congested systems. In any case, on the grounds that UDP is stateless, if the server goes down suddenly, UDP customers keep on saturating the system with solicitations for the server. Moreover, when a casing is lost with UDP, the whole RPC ask for must be retransmitted; with TCP, just the lost casing should be loathe. Consequently, TCP is the favored convention when associating with a NFS server.
Frank Boros

How to configure network using CLI ang GUI in Ubuntu 12.04 - 0 views

  •  
    In this example I will show how to setup network configuration using command line and graphical tool in Ubuntu 12.04. To start accessing internet or sharing other resources on the network you have to configure TCP/IP settings of you ethernet card. In ubuntu you can configure network settings through
Frank Boros

How to install Samba & configure network share on Ubuntu 12.04 - 0 views

  •  
    In this example, I will show how to install samba and configure network share on Ubuntu 12.04. Samba is a graphical user interface to help with configuration and management, there are several GUI interfaces to Samba available, for me the most simple and powerful one of these tools is samba server co
Tim Mullins

AutoTalent Filter in AudaCity Open Source Alternative to AutoTune Tutorial Screencast - 0 views

  •  
    Tutorial Screencast on how to use the new AutoTalent Filter in AudaCity which is a Open Source Alternative to AutoTune world famous software to help make people sound like they can sing well. I'm doing this demo in Ubuntu Linux 9.10 64bit
Tim Mullins

Ubuntu Linux install inside Windows C: Drive with WUBI - 0 views

  •  
    Video Tutorial on how to setup Ubuntu Linux to be installed inside Windows C:\\ Drive with WUBI program that is included in the CD. I also show you how to find your Windows files while in Ubuntu Linux and how to uninstall Linux from Windows.
samantha armstrong

FixComputerpProblemsSite Surely Knows How to Fix Computer Problems! - 1 views

I was having problems with my laptop before. Good thing FixComputerpProblemsSite helped me fix it. And they are really the experts when it comes to solving any computer related issues. They can eas...

fix computer problems linux ubuntu tutorial Screencast video to how Karmic Koala review

started by samantha armstrong on 07 Jun 11 no follow-up yet
larry hill

How to Remove White Dot From LightDM Login Screen Ubuntu 13.04 - 0 views

  •  
    This simple guide is going to show you how to remove/disable white dots from the LightDM login screen in Ubuntu 13.04 Raring Ringtail. There are two methods to remove white dots from the LightDM login screen:
1 - 20 of 238 Next › Last »
Showing 20 items per page