0

Essential Linux Tool: SystemRescueCd

http://www.junauza.com

SystemRescueCd is a Gentoo-based Linux distribution that specializes in repairing unbootable computer systems and recovering data after a system crash. Since it is loaded with system utilities, its main aim is to provide a handy tool to anyone that needs to perform computer admin tasks.

Read more »
giantrobot's picture
Created by giantrobot 17 years 33 weeks ago
Category: High End   Tags:
0

Webalizer - Apache web server log file analysis Tool

http://www.ubuntugeek.com

The Webalizer is a fast, free web server log file analysis program. It produces highly detailed, easily configurable usage reports in HTML format, for viewing with a standard web browser.

Read more »
giantrobot's picture
Created by giantrobot 17 years 33 weeks ago
Category: High End   Tags:
0

How To Repair MySQL Replication

http://www.howtoforge.com

If you have set up MySQL replication, you probably know this problem: sometimes there are invalid MySQL queries which cause the replication to not work anymore. In this short guide I explain how you can repair the replication on the MySQL slave without the need to set it up from scratch again.

Read more »
serdar's picture
Created by serdar 17 years 33 weeks ago
Category: High End   Tags:
0

Debian Installer lenny beta 2 released

http://lists.debian.org

"The Debian Installer team is proud to announce the second beta release of the installer for Debian GNU/Linux Lenny..."

Read more »
can.axis's picture
Created by can.axis 17 years 33 weeks ago
Category: High End   Tags:
0

AMD Talks About Stream SDK On Linux

http://www.phoronix.com

Late last month AMD had announced the release of the Stream SDK for Linux. This Stream SDK brings support for the CAL and Brook+ libraries on Linux. The version released was Stream SDK 1.1 Beta, which arrived at the same time as the SDK for Windows XP. With this new Linux support, we ran a small Q&A session with Michael Chu, who serves as the product manager for AMD Stream software.

Read more »
extra's picture
Created by extra 17 years 33 weeks ago
Category: High End   Tags:
0

Distributed revision control with Mercurial

http://hgbook.red-bean.com

"Welcome to the home of the book 'Distributed revision control with Mercurial', by Bryan O'Sullivan. This is a freely licensed book about the Mercurial revision control system..."

Read more »
can.axis's picture
Created by can.axis 17 years 33 weeks ago
Category: High End   Tags:
0

USB thumb drive RAID

http://linuxgazette.net

It is well known that the so-called "solid-state disks" (SSD) have very low access times. I could have tried to buy an SSD, but being a tinkerer, I decided for another option. Thumb drives / flash drives / pen drives are also a kind of SSDs, one could say - but they have lousy transfer rates. In the end, I decided to create a software RAID using four 2GB USB drives.

Read more »
serdar's picture
Created by serdar 17 years 33 weeks ago
Category: High End   Tags:
0

The art of Linux

http://www.brajeshwar.com

The existence of Linux is inevitable in the realm of LAMP based web development. It is more than incomplete to talk about LAMP without the operating system - Linux. Although Apache, mySQL and PHP/Python/Perl are equally capable of running over non-*nix machines too, Linux predominantly holds a larger share in terms of developers’ choice. Hence the acronym - LAMP. So, where lies the difference?

Read more »
bluecheese's picture
Created by bluecheese 17 years 33 weeks ago
Category: High End   Tags:
0

One-Time Contributers

http://kerneltrap.org

Tony Luck offered some statistics focused on the frequency of developers that only contribute to the Linux kernel one time

Read more »
serdar's picture
Created by serdar 17 years 33 weeks ago
Category: High End   Tags:
0

Untangle: Aptly Named

http://www.informationweek.com

Scarcely a week goes by when I don't hear about yet another new (or relatively new) open source project that stands in for a proprietary solution. Consider Untangle, a network gateway appliance than runs on any commodity hardware and handles spam, firewalling, Web filtering and protocol controls, VPN, and tons more. They'll even send you a preloaded demo server.

Read more »
missgeek's picture
Created by missgeek 17 years 33 weeks ago
Category: High End   Tags:
0

Run-levels: Create, use, modify, and master

http://www.redhatmagazine.com

In this article, we cover how to create, use, modify, and ultimately master run-levels. Bookmark this page with your favorite bookmarking service, and rest easy about ever missing that interview question again.

Read more »
missgeek's picture
Created by missgeek 17 years 33 weeks ago
Category: High End   Tags:
0

Enable the Advanced File Permissions Dialog in Nautilus — The GUI Way

http://www.ubuntugeek.com

Recently on Tombuntu there's a post which tells you how to Enable the Advanced File Permissions Dialog in Nautilus by issuing the command in a terminal. If you feel more comfortable to achieve the goal through a GUI way. Here you go:

Read more »
giantrobot's picture
Created by giantrobot 17 years 33 weeks ago
Category: High End   Tags:
0

Git, Mercurial, Bazaar Repository Size Benchmark

http://vcscompare.blogspot.com

"I have finished all conversions of the repositories that I’m going to test. [...] Tests were done using Git v1.5.5.3, Bzr v1.5, Hg v1.0 ..."

Read more »
can.axis's picture
Created by can.axis 17 years 33 weeks ago
Category: High End   Tags:
0

Defeat Nmap OS Fingerprinting with ippersonality & iplog

http://tuxtraining.com

Remote OS Fingerprinting is becoming more and more important, not only for security pen-testers,but for the black-hat. Just because Nmap is getting popularity as the tool for guessing which OS is running in a remote system, some security tools have been developed to fake Nmap in its OS Fingerprinting purpose.

Read more »
switchpin's picture
Created by switchpin 17 years 33 weeks ago
Category: High End   Tags:
0

Avoid Detection with nmap Port Scan Decoys

http://tuxtraining.com

nmap has -D option. It is called decoy scan. With -D option it appear to the remote host that the host(s) you specify as decoys are scanning the target network too. Thus their IDS might report 5-10 port scans from unique IP addresses, but they won’t know which IP was scanning them and which were innocent decoys.

Read more »
switchpin's picture
Created by switchpin 17 years 33 weeks ago
Category: High End   Tags:

Best karma users