Skip to main content

Home/ Ubuntu - Linux for human beings/ Group items matching "X" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Tim Mullins

Docks in Ubuntu Linux to make it look like Apple Mac OS x - 0 views

  •  
    Screencast Tutorial to show you how to use 2 different Docks in Ubuntu Linux to make it look like Apple Mac OS x. The docks I show you are Avant Window Navigator and GLx-Dock. They can be installed via Ubuntu Tweak. Educational video
munna1357

ssh key and DHCP configuration linux commands step by step - YouTube - 0 views

  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, x session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, x session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
Graham Perrin

WineHQ - Run Windows applications on Linux, BSD and Mac OS x - 0 views

  • Run Windows applications on Linux, BSD and Mac OS x
anonymous

Death of the command line revisited - 0 views

  •  
    "Death of the command line revisited Five years ago I wrote a little blurb called Death of the command line. As it happened, that article was misunderstood by many who read it - I don't know if it was my fault or theirs, but somehow many readers ended up thinking I was either predicting the demise of CLI's (Command Line Interfaces) or hoping for that demise or both. Nothing could have been farther from the truth. I remain a big fan of CLI's and use them daily. And yet, just five years later and still at risk of angering yet another batch of folk who won't read carefully, I'm going to suggest that predicting the death of the CLI may not be such a bad bet after all. What triggered this was that I happened to be doing a bit of editing to another article - Using the shell (Terminal) in Mac OS X. As I made some corrections, I thought "Nobody cares about this nowadays". That's not entirely true. That particular page still gets five thousand or more visitors every month and has even been "plussed" a few times, so obviously a few people still care. On the other hand, in the greater world of folks I run into daily, nobody uses the CLI and most don't even know that they could. But why would you use the CLI?"
Tim Mullins

Ubuntu Linux 9.10 Automatic Crash Reports Screencast - 0 views

  •  
    In this new video screencast tutorial from the http://www.OSGUI.com Tech Show I show you how to step by step use the inbuilt Error and Crash reporting feature of Ubuntu Linux 9.x either Jaunty or Karmic Koala. The tool is called apport and it automatically collects data from crashed processes and compiles a problem report in /var/crash/. This utilizes the crashdump helper hook provided by the Ubuntu kernel.
David Corking

Pretty Emacs (fonts) - Alexandre Vassalotti 2007 - 0 views

  • For Ubuntu 9.04 “Jaunty Jackalope” and newer, use the packages in Ubuntu repositories.
    • David Corking
       
      I think he means the package "emacs-snapshot". The default Emacs in Ubuntu 9.04 is still version 22, which, as far as I can tell, does not support Xfont (in the body of the editor). I certainly can't get it to work, and Emacs is too important to risk using the snapshot ;)
  •  
    Xfont - vector fonts with hinting and antialiasing for LinuX (already done for Mac OS X and Windows)
bryan yu

How to login as root on Ubuntu - 0 views

  •  
    Many people want to know how to obtain root permission on Ubuntu no matter su command or login x window. The root passwd have never been configured when you install ubuntu first time. You can use below command to change root password...
Tim Mullins

How-to Mintify Ubuntu Linux 9.x Screencast Tutorial - 0 views

  •  
    in this new video screencast tutorial from http://www.OSGUI.com Tech Show I will show you step by step how to turn Ubuntu Linux into Linux Mint. You can turn any version of Ubuntu Linux into Mint. Ubuntu Linux 9.04 Jaunty into Linux Mint 7 Gloria Ubuntu Linux 9.10 Karmic Koala into Linux Mint 8 Helena. In this demo Im using the 64bit version of Ubuntu Linux 9.10 and I install the packages for Mint 8 Helena to get the new advanced gnome menu and Mint artwork.
1 - 9 of 9
Showing 20 items per page