"It's all just a bunch of hocus pocus!" — Max in Hocus Pocus Over my many years as a system administrator, I've heard many horror stories about the different ghosts that have haunted new admins due to their inexperience. Here are three of the stories that stand out to me the most in helping build my character as a good sysadmin. read more
Doc Searls and Katherine Druckman talk to Corbin Champion about Userland, an easy way to run Linux on your Android device, and other new projects.
Criptext is a fairly new encrypted email service that claims it "doesn't store any emails in its servers" and instead, "all your emails are stored on your device alone". The service uses the open source Signal Protocol to encrypt emails from end to end.
Hardware hacks are particularly scary because they trump any software security safeguards—for example, they can render all accounts on a server password-less. Fortunately, we can benefit from what the software industry has learned from decades of fighting prolific software hackers: Using open source techniques can, perhaps counterintuitively, make a system more secure. Open source hardware and distributed manufacturing can provide protection from future attacks. read more
Odoo is the most popular all-in-one business software in the world. It offers a range of business applications including CRM, website, e-Commerce, billing, accounting, manufacturing, warehouse, project management, inventory and much more, all seamlessly integrated. In this tutorial, we’ll show you how to install Odoo 12 from source inside a Python virtual environment on a CentOS 7 machine.
This tutorial is Part 2 of a three-part "Learning PHP" series teaching you how to use PHP through building a simple workflow application. Take this tutorial if you have a basic understanding of PHP and want to learn about uploading files from the browser, sessions, or using PHP to process XML or JSON.
Fedora 29 was just officially released. You’ll likely want to upgrade your system to the latest version of Fedora. Fedora Workstation has a graphical upgrade method. Alternatively, Fedora offers a command-line method for upgrading Fedora 28 to Fedora 29. Upgrading Fedora 28 Workstation to Fedora 29 Soon after release time, a notification appears to tell […]
At times, we are running some important applications on our system but for some reason, our system goes into hibernation mode. We do not want to lose the applications that we were running and want to restore the system to its previous state.
There are several ways to compress and decompress files in Linux. One of them is the xz command. We will discuss the basics of this command line tool in this tutorial.
It’s that time of year again: The weather gets chilly, the leaves change colors, and kids everywhere transform into tiny ghosts, goblins, and zombies. But did you know that Unix (and Linux) and its various offshoots are also chock-full of creepy crawly things? Let’s take a quick look at some of the spookier aspects of the operating system we all know and love. read more
Automotive Grade Linux (AGL) is a collaborative open source project that is accelerating development of a fully open software platform for automotive applications.
Textile is a lightweight and simple markup language that makes it easy to structure content for articles, blogs, wikis, and documentation. It’s origin traces back to the blogging software Textpattern.
Fedora 29 Workstation is the latest release of our free, leading-edge operating system. You can download it from the official website here right now. There are several new and noteworthy changes in Fedora Workstation. Read more details below. GNOME 3.30 Fedora 29 features GNOME 3.30 as the default desktop environment. GNOME 3.30 includes a number of enhancements to the core applications, […]
With Linux kernel 4.19 hitting the streets, a new version of the GNU Linux-libre kernel is now available, version 4.19, based on the upstream kernel but without any proprietary drivers.
So purely as an exercise in scripting, let's write a script that converts any string you hand it into a "web-safe" sequence. Before starting, however, pull out a piece of paper and jot down how you'd solve it...
Data streams can be manipulated by inserting transformers into the stream using pipes. Each transformer program is used by the sysadmin to perform some operation on the data in the stream, thus changing its contents in some manner. Redirection can then be used at the end of the pipeline to direct the data stream to a file.
The new release of Red Hat's flagship Linux platform adds TPM 2.0 support for security authentication, as well as integrating the open source nftables firewall technology effort.
Offensive Security released Kali Linux 2018.4, the fourth and last snapshot in 2018 for their ethical hacking and penetration testing GNU/Linux distribution, the successor of BackTrack Linux.
How to use gnuplot to put data points on a basemap.
In presenting the results of its survey of 4,300 cloud developers, DigitalOcean seemed surprised that only 55 percent of respondents contribute to open source projects. Yet to tech outsiders -- or old-timers -- it may be more surprising that more than half of developers do contribute. There are relatively few professions in which companies and their employers regularly offer pro bono services for the greater good of the industry.