Skip to main content

Home/ Ubuntu - Linux for human beings/ Group items tagged your

Rss Feed Group items tagged

munna1357

Domanin and Network configuration Part 2 step by step - YouTube - 0 views

  •  
    This Linux instructional exercise covers TCP/IP organizing, system organization and framework design nuts and bolts. Linux can bolster various system gadgets. The gadget names are numbered and start at zero and tally upwards. For instance, a PC running two ethernet cards will have two gadgets marked/dev/eth0 and/dev/eth1. Linux system arrangement, administration, observing and framework devices are secured in this instructional exercise  All the enormous, userfriendly Linux dispersions accompany different graphical apparatuses, taking into account simple setup of the PC in a nearby system, for associating it to an Internet Service Provider or for remote access. These devices can be begun up from the charge line or from a menu:  Ubuntu setup is done selecting System->Administration->Networking.  RedHat Linux accompanies redhat-config-system, which has both a graphical and a content mode interface.  Suse's YAST or YAST2 is a holding nothing back one design device.  Mandrake/Mandriva accompanies a Network and Internet Configuration Wizard, which is ideally begun up from Mandrake's Control Center.  On Gnome frameworks: elf system inclinations.  On KDE frameworks: knetworkconf.  Your framework documentation gives a lot of guidance and data about accessibility and utilization of apparatuses.  Data that you should give:  For interfacing with the nearby system, for occurrence with your home PCs, or at work: hostname, domainname and IP address. In the event that you need to set up your own particular system, best do some all the more perusing first. At work, this data is liable to be given to your PC consequently when you boot it up. If all else fails, it is better not to indicate any data than making it up.  For interfacing with the Internet: username and secret key for your ISP, phone number when utilizing a modem. Your ISP generally naturally doles out you an IP l
  •  
    This Linux instructional exercise covers TCP/IP organizing, system organization and framework design nuts and bolts. Linux can bolster various system gadgets. The gadget names are numbered and start at zero and tally upwards. For instance, a PC running two ethernet cards will have two gadgets marked/dev/eth0 and/dev/eth1. Linux system arrangement, administration, observing and framework devices are secured in this instructional exercise  All the enormous, userfriendly Linux dispersions accompany different graphical apparatuses, taking into account simple setup of the PC in a nearby system, for associating it to an Internet Service Provider or for remote access. These devices can be begun up from the charge line or from a menu:  Ubuntu setup is done selecting System->Administration->Networking.  RedHat Linux accompanies redhat-config-system, which has both a graphical and a content mode interface.  Suse's YAST or YAST2 is a holding nothing back one design device.  Mandrake/Mandriva accompanies a Network and Internet Configuration Wizard, which is ideally begun up from Mandrake's Control Center.  On Gnome frameworks: elf system inclinations.  On KDE frameworks: knetworkconf.  Your framework documentation gives a lot of guidance and data about accessibility and utilization of apparatuses.  Data that you should give:  For interfacing with the nearby system, for occurrence with your home PCs, or at work: hostname, domainname and IP address. In the event that you need to set up your own particular system, best do some all the more perusing first. At work, this data is liable to be given to your PC consequently when you boot it up. If all else fails, it is better not to indicate any data than making it up.  For interfacing with the Internet: username and secret key for your ISP, phone number when utilizing a modem. Your ISP generally naturally doles out you an IP l
munna1357

configuring raid part 2 step by step and iptables linux firewall configuration - YouTube - 0 views

  •  
    The striping with circulated equality implies it will part the equality data and stripe information over the numerous plates, which will have great information excess.  A Redundant Array of Independent Disks (RAID) is a progression of plates that can spare your information regardless of the possibility that a loathsome disappointment happens on one of the circles. While a few adaptations of RAID make complete duplicates of your information, others utilize the purported equality bit to permit your PC to remake the information on lost circles  Assault permits a director to shape a variety of a few hard crashes into one intelligent drive perceived as one drive by the working framework. It likewise spreads the information put away over the variety of drives to reduction circle access time and perform information excess. The information excess can be utilized to recoup information if one of the hard drives in the cluster crash.
  •  
    The striping with circulated equality implies it will part the equality data and stripe information over the numerous plates, which will have great information excess.  A Redundant Array of Independent Disks (RAID) is a progression of plates that can spare your information regardless of the possibility that a loathsome disappointment happens on one of the circles. While a few adaptations of RAID make complete duplicates of your information, others utilize the purported equality bit to permit your PC to remake the information on lost circles  Assault permits a director to shape a variety of a few hard crashes into one intelligent drive perceived as one drive by the working framework. It likewise spreads the information put away over the variety of drives to reduction circle access time and perform information excess. The information excess can be utilized to recoup information if one of the hard drives in the cluster crash.
larry hill

Easy Way to Control your DSLR Camera using USB Tethered Shooting on Ubuntu - 0 views

  •  
    Tethered shooting is method hook up your DSLR camera to your Laptop/PC and take pictures, you are shooting tethered. You can either trigger the camera from your Laptop/PC or directly from the DSLR camera itself
munna1357

ssh key and DHCP configuration linux commands step by step - YouTube - 0 views

  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
larry hill

Easy Way to Checking Hard Drive for Bad Sectors and Errors in Ubuntu - 0 views

  •  
    How to know if you have bad sectors on your hard drive in Ubuntu Desktop and how to fix them. You can use badblock program to fix this problem. The badblocks is program command line based allow to test your harddrive for, you guessed it, bad blocks.
David Corking

All about Linux: Configuring xterm in Linux - 0 views

  • XTerm*background: whiteXTerm*foreground: blackXTerm*pointerColor: redXTerm*pointerColorBackground: black
  • konsole takes a whooping 8MB and gnome-terminal over 3MB of memory, you can run xterm under 1MB
  • Create a '.Xresources' file in your home directory and enter the values that you want to set. My .Xresources file is as follows:
  • ...1 more annotation...
  • By pressing [Ctrl] key and the middle mouse button, you get a pop-up menu which helps you set/unset a lot of other features of your xterm window like enabling/disabling the scroll bars and so on.
    • David Corking
       
      If you use the pop up menu to customize your settings, I don't think there is a way to save your preferences. I think you need to use a text editor to create the .Xresources file as Ravi describes above.
  •  
    My Ubuntu 9.04 installation does not seem to listen to the .Xresources file. I am trying to figure out why.
munna1357

ftp configuration in linux step by step - YouTube - 0 views

  •  
    vsftpd is lightweight, very steady, secure, and quick FTP server for Linux environment. vsftpd powers parcel of intensely utilized FTP administration as a part of the web (counting ftp.redhat.com).  vsftpd likewise bolsters virtual ip, virtual clients, transmission capacity throttling, IPv6, encryption and so on.,  This article gives orderly guidelines on the most proficient method to setup vsftpd on your server from source.
  •  
    vsftpd is lightweight, very steady, secure, and quick FTP server for Linux environment. vsftpd powers parcel of intensely utilized FTP administration as a part of the web (counting ftp.redhat.com).  vsftpd likewise bolsters virtual ip, virtual clients, transmission capacity throttling, IPv6, encryption and so on.,  This article gives orderly guidelines on the most proficient method to setup vsftpd on your server from source.
munna1357

ssh in linux installation step by step & | Package installation of linux | - YouTube - 0 views

  •  
    OpenSSH is a free open source set of PC instruments used to give secure and encoded correspondence over a PC system by utilizing the ssh convention. Numerous individuals, new to PCs and conventions, make a confusion about OpenSSH, they think it is a convention, yet it is not, it is an arrangement of PC projects that utilization the ssh convention.  OpenSSH is created by the Open BSD gathering and it is discharged under Simplified BSD License. A primary element which has made feasible for OpenSSH to be utilized such a great amount among framework overseers is its multi-stage ability and exceptionally valuable pleasant components it has. The most recent adaptation is OpenSSH 6.4 which has been discharged on November 8, 2013.  This adaptation of OpenSSH accompanies numerous new components and patches, so on the off chance that you as of now utilize OpenSSH for directing your machines, I recommend you to do an overhaul.
  •  
    OpenSSH is a free open source set of PC instruments used to give secure and encoded correspondence over a PC system by utilizing the ssh convention. Numerous individuals, new to PCs and conventions, make a confusion about OpenSSH, they think it is a convention, yet it is not, it is an arrangement of PC projects that utilization the ssh convention.  OpenSSH is created by the Open BSD gathering and it is discharged under Simplified BSD License. A primary element which has made feasible for OpenSSH to be utilized such a great amount among framework overseers is its multi-stage ability and exceptionally valuable pleasant components it has. The most recent adaptation is OpenSSH 6.4 which has been discharged on November 8, 2013.  This adaptation of OpenSSH accompanies numerous new components and patches, so on the off chance that you as of now utilize OpenSSH for directing your machines, I recommend you to do an overhaul.
Tim Mullins

Ubuntu Linux install inside Windows C: Drive with WUBI - 0 views

  •  
    Video Tutorial on how to setup Ubuntu Linux to be installed inside Windows C:\\ Drive with WUBI program that is included in the CD. I also show you how to find your Windows files while in Ubuntu Linux and how to uninstall Linux from Windows.
larry hill

Bumblebee 3.1 Tumbleweed Released: Bring Support for NVIDIA Optimus Technology - 0 views

  •  
    Bumblebee 3.1 tumbleweed has been released and announced by The Bumblebee Project Team.The important news of this update is the integrated support for backend Primus, which can - your choice - go to the backend VirtualGL default for optirun
Ricardo Jorge

Grooveshark Scope For Unity Music Lens ~ Web Upd8: Ubuntu / Linux blog - 0 views

  •  
    David Callé has released a Grooveshark scrope for the Unity Music lens which lets you search for music on Grooveshark from Dash. The new scope uses the free Grooveshark API and clicking on a search result opens a new tab in your default browser, playing the selected song...
anonymous

How To Remove Ubuntu's Password Keyring - 4 views

  • So here’s how you get rid of the keyring manager.
  • Open up your Home Folder by clicking Places>Home Folder Press CTRL-H (or click View>Show Hidden Files) Find a folder called .gnome2 (it has a period at the beginning of the name) and open it by double clicking on it Inside of the .gnome2 folder, there is another folder called keyrings.  Open it up. Delete any files you find within the keyrings folder Restart the computer
  • After you restart and login (if you’re automatically logging in) you’ll probably be asked to enter your wireless networks WPA/WEP encryption key (because we made it forget).  After you type that password in, the keyring manager will appear to let you know that it would like to handle the storage of that password and lock it away with a new keyring.
  • ...2 more annotations...
  • Instead of typing in a new password, leave both boxes completely empty and click Create. You’ll then be asked if you know what the hell you’re doing:
  • Go ahead and click Use Unsafe Storage.
Tim Mullins

gOS 3.1 Linux (Good OS) Review Screencast - 1 views

  •  
    Review Screencast Tutorial about gOS 3.1 Linux (Good OS) which is based on Ubuntu Linux 8.10 32bit, and it includes many of the Google Apps built-in. I show you all the programs and games that are installed and show you how to install the OS on your computer.
samantha armstrong

FixComputerpProblemsSite Surely Knows How to Fix Computer Problems! - 1 views

I was having problems with my laptop before. Good thing FixComputerpProblemsSite helped me fix it. And they are really the experts when it comes to solving any computer related issues. They can eas...

fix computer problems linux ubuntu tutorial Screencast video to how Karmic Koala review

started by samantha armstrong on 07 Jun 11 no follow-up yet
shalani mujer

One on One Professional Online Tech Support - 3 views

I love working with these guys. Their tech support technicians are very professional and polite. They offer one-on-one tech support. They listen to what your issues are, diagnose what your problem ...

tech support

started by shalani mujer on 06 Jun 11 no follow-up yet
Rem PC

The Best Remote PC Support I Ever Had - 1 views

The Remote PC Support Now excellent remote PC support services are the best. They have skilled computer tech professionals who can fix your PC while you wait or just go back to work or just simply...

remote PC support

started by Rem PC on 12 Sep 11 no follow-up yet
Jasmine Stewart

Improved Business Practices with Full AQTF Compliance - 1 views

BluegemEXPLORE has the software that our RTO requires to help us maintain compliance with AQTF standards, automate our company's operations, and help us prepare for RTO registration. The software e...

Training Management Systems

started by Jasmine Stewart on 05 Oct 11 no follow-up yet
David Corking

The KDE Education Project - Marble - 0 views

  • opposite to other virtual globes Marble also features multiple projections: Choose between a Flat Map ("Plate carré"), Mercator or the Globe. The best of all: Marble is Free Software / Open Source Software and promotes the usage of free maps.
  •  
    This is not Google Earth - both the source code and the data are free to share with your neighbour.
1 - 20 of 34 Next ›
Showing 20 items per page