Showing headlines posted by bob
« Previous ( 1 ... 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 ... 1247 ) Next »How to set up NTP server in CentOS
Network Time Protocol (NTP) is used to synchronize system clocks of different hosts over network. All managed hosts can synchronize their time with a designated time server called an NTP server. An NTP server on the other hand synchronizes its own time with any public NTP server, or any server of your choice. The system […]Continue reading...
The post How to set up NTP server in CentOS appeared first on Xmodulo.
Related FAQs:
How to synchronize time with NTP
How to set up Open WebMail in CentOS
How to set up Squid as a transparent web proxy on CentOS or RHEL
How to install LEMP stack (nginx, MariaDB/MySQL and PHP) on CentOS
How to share a directory with Samba on Fedora or CentOS
What is open source? Licensing, history, and more
Recently, I had the pleasure of attending a talk by Gina Likins from Red Hat at the 2015 Consortium for Computing Sciences in Colleges (CCSC): South Central conference about teaching open source.
read more
Quad-core ARM TV-PC dual boots Android and Ubuntu
Ugoos launched a $179 “UT3S” TV-PC that dual boots Android 4.4 and Ubuntu 14.10 on a 1.8GHz quad-core Cortex-A17 Rockchip RK3288, and supports 4Kx2K video. Finding a media player or mini-PC that runs Android is easy, but finding one that ships with other species of Linux pre-installed is a bit trickier. Now Ugoos has released […]
How to install a Debian 8 (Jessie) Minimal Server
This tutorial shows how to install a Debian 8 (Jessie) minimal server in detail with many screenshots. The purpose of this guide is to provide a minimal setup that can be used as basis for our other Debian 8 tutorials here at howtoforge.com.
Debian 8 is released
After almost 24 months of constant development the Debian project is proud to present its new stable version 8 (code name "Jessie"), which will be supported for the next 5 years thanks to the combined work of the Debian Security team and of the Debian Long Term Support team.
Linux-friendly i.MX6 SBC is loaded with I/O, supports PoE
Gateworks’s latest Ventana SBC runs Linux and Android on a Freescale i.MX6 SoC and features A/V, serial, and mini-PCIe I/O, plus wide temperature operation. The Ventana GW5220 is nearly identical to the Ventana GW5200 SBC announced in 2013, “but only supports PCIe signaling on one mIni-PCIe slot and adds SPI support,” says Gateworks. Like the […]
Fandroids, take your phone's antivirus and burn it
Our security is that good, honest
RSA 2015 Google takes a lot of stick from Apple and others over malware on the Android platform, but the company thinks the OS is now so secure that users don't need antivirus software.…
Open-source IoT kit runs OpenWRT, mimics Arduino Yun
A “Domino.IO” Kickstarter project offers an Atheros AR9331 module running OpenWRT Linux, plus two tiny baseboards, one of which is Arduino Yun compatible. To stand out from the growing number of OpenWRT Linux-based computer-on-modules and tiny, com-LIKE single board computers running Qualcomm’s WiFi-ready Atheros AR9331 system-on-chip, startups are now offering entire modular kit families based […]
How to simply Linux chores, a tool to find the right open source library, and more
In this week's Top 5, I cover tools for finding just the right open source library, streamlining and simplifing necessary chores, and more.
read more
F22 Beta, feedback for Fedora Workstation, security challenge, better Spins website, and PyCon report
Fedora is a big project, and it’s hard to keep up with everything. This series highlights interesting happenings in five different areas every week. It isn’t comprehensive news coverage — just quick summaries with links to each. Here are the... Continue Reading →
Home router security 2015 - 9 settings that will keep the bad guys out
Broadband routers are increasingly under attack... Our research has revealed that four out of five top-selling home routers are vulnerable to attack with nearly half of them being exploitable with publicly available reports.
8 new tutorials for success with OpenStack
OpenStack is undoubtedly a skill in hot demand. Whether you're a seasoned IT pro looking to leverage cloud technology in your organization, or just starting out in your career and hoping to put some experience under your belt, we're here to help.
read more
How to install Arch Linux with Full Disk Encryption
This tutorial explains the installation of Arch Linux + XFCE Desktop with Full Disk Encryption.
House Passes Cybersecurity Bill Despite Privacy Protests
House of Representatives voted 307-116 to pass the Protecting Cyber Networks Act, a bill designed to allow more fluid sharing of cybersecurity threat data between corporations and government agencies... But privacy critics say it also threatens to open up a new backchannel for surveillance of American citizens, in some cases granting the same companies legal immunity to share their users’ private data with government agencies that include the NSA.
Open source policies show commitment to student data privacy
In the growing hubbub around student data privacy and security, it can be hard for edtech companies to identify concrete steps to demonstrate their commitment to protecting student information. Education tech startup Clever recently made a commitment to transparency by making their privacy policies open source, posting the policy on GitHub so anyone can track changes.
read more
Open mapping for sustainability, 3D printing on the farm, and more open source news
In this week's edition of our open source news roundup, we take a look at the new release of Ubuntu 15.04 Vivid Vervet, 3D printing on the farm, open mapping for sustainability, and more.
Open source news roundup: April 18 - 24, 2015
read more
How to encrypt a partition with DM-Crypt LUKS on Linux
TrueCrypt is no more, and the purpose of this post is to show you straightforward partition encryption with dm-crypt luks.
DM-Crypt is transparent drive encryption that is kernel module and part of the device mapper framework for mapping physical block device onto higher-level virtual block devices, it uses cryptographic routines from the kernel's crypto api. Long story short, device mapping encryption provided by the kernel "linux" crypto api.
DM-Crypt is transparent drive encryption that is kernel module and part of the device mapper framework for mapping physical block device onto higher-level virtual block devices, it uses cryptographic routines from the kernel's crypto api. Long story short, device mapping encryption provided by the kernel "linux" crypto api.
6 Most Dangerous New Attack Techniques in 2015
Experts with the SANS Institute convened at RSA Conference for their annual threats panel, this time dishing on the six most dangerous new attack techniques.
How Tor is building a new Dark Net with help from the U.S. military
The Dark Net is under attack. Actually, it's always under attack. That's the smart attitude to take as the spotlight has been turned up on technology like the Tor-anonymizing network. Threats from governments and hackers around the world have pushed Tor's decade-old hidden service technology to its limits.
The huge flaw in Moore's Law? It's NOT a law after all
Critics have had half a century to pick apart and predict the end of Moore’s Law, which marked its Big Five Zero birthday this week.
« Previous ( 1 ... 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 ... 1247 ) Next »
