Showing headlines posted by bob
« Previous ( 1 ... 504 505 506 507 508 509 510 511 512 513 514 ... 1213 ) Next »Getting started with the i3 window manager on Linux
In my article 5 reasons the i3 window manager makes Linux better, I shared the top five reasons I use and recommend the i3 window manager as an alternative Linux desktop experience.
In this post, I will walk through the installation and basic configuration of i3 on Fedora 28 Linux.
1. Installation
Log into a Fedora workstation and open up a terminal. Use dnf to install the required package, like this:
read more
How to Install Netdata Monitoring Tool on Ubuntu 18.04 LTS
Netdata is a free, open source, simple and real-time performance and health monitoring tool with a beautiful web front-end. In this tutorial, we are going to look at how to install Netdata performance Monitoring tool on Ubuntu 18.04 server.
Creating the Concentration Game PAIRS with Bash
Exploring the nuances of writing a pair-matching memory game and one-dimensional arrays in Bash.
Mozilla's Firefox Nightly Experiment Results, EFF's Back to School Tips, HHVM 3.28 Released, Oracle Solaris 11.4 Now Available and Dropbox Vulnerability Discovered
News briefs for August 29, 2018.
Compact, Arm-based mini-PC is toughened up for IIoT
DFI’s Pico-ITX-based, DIN-rail mountable “EC900-FS6” mini-PC runs Linux or Android on an i.MX6 DualLite, and offers 2x GbE, 2x USB, 2x serial, mini-PCIe, and extensive ruggedization features. A reader recently noted our excessive use of the term “rugged,” which is fair enough. In our defense, embedded gear is increasingly tolerant of wide temperature ranges, and […]
Storj Labs forges open-source vendors and cloud services alliance
Open source powers today's cloud, but many open-source developers haven't profited from the cloud's growth. Storj Labs wants to change that dynamic so both can make money.
Free eBook from Packt - Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition
Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it.
Add GUIs to your programs and scripts easily with PySimpleGUI
Few people run Python programs by double-clicking the .py file as if it were a .exe file. When a typical user (non-programmer types) double-clicks an .exe file, they expect it to pop open with a window they can interact with. While GUIs, using tkinter, are possible using standard Python installations, it's unlikely many programs do this.
What if it were so easy to open a Python program into a GUI that complete beginners could do it? Would anyone care? Would anyone use it? It's difficult to answer because to date it's not been easy to build a custom GUI.
read more
Containers in Perl 6
In the first article in this series comparing Perl 5 to Perl 6, we looked into some of the issues you might encounter when migrating code into Perl 6. In the second article, we examined how garbage collection works in Perl 6. Here, in the third article, we'll focus on Perl 5's references and how they're handled in Perl 6, and introduce the concepts of binding and containers.
read more
4 open source monitoring tools
Isn’t monitoring just monitoring? Doesn’t it include logging, visualization, and time-series data?
The terminology around monitoring has caused a lot of confusion over the years and has led to some poor tools that tout the ability to do everything in one format. Observability proponents recognize there are many levels for observing a system. Metrics aggregation is primarily time-series data, and that’s what we’ll discuss in this article.
read more
Setting up your own name service (DNS) with ISPConfig
Internet works with IP numbers and to get from a domain name to its IP number address the Domain Name System DNS is used. You can set up your own name service or use, for example, your hosting provider's name service. This tutorial shows how to run your own nameserver setup with ISPConfig.
Upscale bitmap images with better results
Most images on the Web are small or medium sized, since otherwise users need to wait longer before their favorite web pages load. However, sometimes you need to find a larger version of an image, but the search doesn’t bear fruit. Any bitmap image can be scaled up or down in an image editor (such […]
The Difference Between Sandboxing, Honeypots & Security Deception
Networks, cyberattacks, and the strategies used to stop them are continuously evolving. Security deception is an emerging cyber-defense tactic that allows researchers and information security professionals to observe the behavior of attackers once they've gained access to what they think is a business network.
Kali Linux's New Version 2018.3, Open-Source License War, Lenovo Announces Five New Android Tablets, Google Releases Open-Source Reinforcement Learning Framework and KD Chart Update
News briefs for August 28, 2018.
Linux cut Command Explained for Beginners (with Examples)
In Linux, if you want to print a file's content on stdout, the first command that comes to mind is cat. However, there may be times when the requirement is to remove certain part of the file and print only the rest of the content. You'll be glad to know there exists a tool - dubbed cut - that lets you do this.
No do-overs! Appeals court won't hear Oracle v Google rehash
Only thing left now is a Supreme Court bid
Over eight years of feuding between Oracle and Google over the use of Java code in Android may be nearing its end following a Tuesday court ruling.…
Rugged telematics fleet computer ready to be dinked and dunked
Nexcom’s compact, IP67 protected “VTC 1911-IPK Telematics IoT Gateway” runs on a Bay Trail Atom and offers CAN 2.0B, dual mini-PCIe and SIM slots, GPS, 2x GbE, SATA, and more. It’s resistant to shock, vibration, humidity, and -40 to 70°C temperatures. With flooding and sea-level rise on the rise due to climate change, there will […]
3D-Printed Firearms Are Blowing Up
What's the practical risk with 3D-printed firearms today? In this opinion piece, Kyle explores the current state of the art.
4 Ansible playbooks you should try
In a complex IT environment, even the smallest tasks can seem to take forever. Sprawling systems are hard to develop, deploy, and maintain. Business demands only increase complexity, and IT teams struggle with management, availability, and cost.
How do you address this complexity and while meeting today's business demands? There is no doubt that Ansible can improve your current processes, migrate applications for better optimization, and provide a single language for DevOps practices across your organization.
read more
Cleaning Your Inbox with Mutt
Teach Mutt yet another trick: how to filter messages in your Inbox
with a simple macro.
« Previous ( 1 ... 504 505 506 507 508 509 510 511 512 513 514 ... 1213 ) Next »