Last week we began playing around with ZeroShell, a multi-purpose LAN server that can run on a old PC. We gathered the hardware, downloaded the CD image, and burnt the Live CD. Then we booted up ZeroShell and configured the IP settings to use an existing router. Finally, we created a profile to store the settings, so they're saved and loaded after reboots or shutdowns.
Read more »Set up Secure Wireless With Zeroshell Linux (part 2)
- Login to post comments
Modeling Furniture in Blender
In this article, you will learn how important it is to use furniture in models and scenes to make the environment more real. The tutorial takes you through the process of modeling of a sofa and a chair. You will also see how to build your own furniture library for reuse in future.
For more information, read
- Login to post comments
Europe funds secure operating system research
A Dutch university has landed a European Research Council grant to continue work on a Unix-type operating system that aims to be more reliable and secure than Linux or Microsoft Windows.
Read more »- Login to post comments
Teaching a Class with GNU Screen
I led an Ubuntu Open Week session earlier this morning on screen-profiles. As part of the session, I setup a demo on an Amazon EC2 instance running Ubuntu 9.04. In that shared screen session, I as the "teacher" had read/write access to the instance, and 50+ "students" had read-only access. This proved incredibly handy for doing such a demonstration!
Read more »- Login to post comments
That Non-X Linux Thing
Let’s talk about Linux without X. Sure, there are several nice lists of applications which don’t require X. I use several of them. However, there is a whole range of things not considered if we simply talk console.
Read more »- Login to post comments
Peer-to-peer (P2P) Architectures - Internet-Draft - Expires October 20, 2009
"...In this document we provide a survey of P2P (Peer-to-Peer) systems. The survey includes a definition and a taxonomy of P2P systems. This survey also includes a description of which types of applications can be built with P2P technologies and examples of P2P applications that are currently in use on the Internet.
Read more »Creating A Fully Encrypted Para-Virtualised Xen Guest System Using Debian Lenny
This document explains how to set up a fully encrypted para-virtualized XEN instance. In this howto, the host system is running Debian Etch, while the guest system to be installed will be using Debian Lenny.
Read more »- Login to post comments
Mandriva Cooker (2010.0) opened
Since Friday the cooker repositories, which will lead to Mandriva 2010.0 in 6 months, are open again. In only 3 days about 400 new package releases were made.
Read more »- Login to post comments
How to Configure Samba Server in Linux
Introduction to Samba Verify installed version To see the version of samba
Read more »- Login to post comments
Linux Still Not Ready for Prime Time
I’m a Fedora fan, and I’m impressed with each new release, but in the end, its just nowhere near ready. You have to do far too much research and under the hood work to get it to do everything you want it to do, and in the end, not everyone writes drivers for Linux, and the community doesn’t write drivers for everything.
Read more »- Login to post comments
Kernel log: X.org 7.5 coming in summer, re-write for Intel's graphics driver
X.org 7.5 is scheduled to appear in summer, and could include a new Intel graphics driver. The developers have slashed its code to boost reliability and performance. The kernel developers have now presented versions 2.6.30-rc4 and 2.6.29.2 of Linux, 2.6.27.22 and 2.6.28.10 are released and guest mascot Tuz bows out.
Read more »- Login to post comments
Tutorial: Build a Linux web kiosk browser
This third installment of Simtec's tutorial series on embedded Linux system development covers the construction of a web browser for a web kiosk system. The tutorial was written by ARM Linux kernel hackers Vincent Sanders and Daniel Silverstone (pictured), both from UK-based embedded firm Simtec Electronics.
Read more »- Login to post comments
Vyatta - a fortnight in review
Someone on this blog pointed me at vyatta, and to that person - THANK YOU! I have now tried Vyatta, not only have I tried it I have fallen in love with it. In a nutshell Vyatta is a fantastic mangment layer on top of Debian, OpenVPN, iptables, Quagga, Snort and OpenSWAN amongst others.
Read more »- Login to post comments
Creating a Fancy 3D-Effect GIMP Plugin in Python
Last time I wrote about the basics of a GIMP plug-in written in Python. But how do you figure out how to do anything that's actually useful? This article will show you.
Read more »- Login to post comments
Worry-free Linux power-downs with Anacron
Linux® ordinarily uses Cron to automatically perform routine system maintenance, such as rotating log files and updating spam filtering rules. This works well for servers and other systems that are powered on 24/7. If, however, you want to save power by shutting off the computer when it's not in use, as is common for desktop and laptop systems, Cron can't run.
Read more »






