Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 ... 7359 ) Next »

An introduction to the GNU Core Utilities

Two sets of utilities—the GNU Core Utilities and util-linux—comprise many of the Linux system administrator's most basic and regularly used tools. Their basic functions allow sysadmins to perform many of the tasks required to administer a Linux computer, including management and manipulation of text files, directories, data streams, storage media, process controls, filesystems, and much more. read more

Package management in Ubuntu : Learn dpkg command with examples

Ubuntu, Debian & distros based on these uses .deb files for installation of softwares/applications on the system & in order to install these deb, we use dpkg package manager. With dpkg, we can install,...

Best Free Python Web Frameworks – Rapid Development

One of the types of software that’s important for a web developer is the web framework. A framework “is a code library that makes a developer’s life easier when building reliable, scalable, and maintainable web applications” by providing reusable code or extensions for common operations. By saving development time, developers can concentrate on application logic rather than mundane elements.

A gentle introduction to FreeDOS

FreeDOS is an old operating system, but it is new to many people. In 1994, several developers and I came together to create FreeDOS—a complete, free, DOS-compatible operating system you can use to play classic DOS games, run legacy business software, or develop embedded systems. Any program that works on MS-DOS should also run on FreeDOS. read more

Introduction to the Doctrine ORM and data mapper pattern in php

  • linuxconfig.org; By Egidio Docile (Posted by LinuxCareer on Apr 24, 2018 5:50 AM EDT)
  • Story Type: Tutorial; Groups: PHP
In this tutorial we will see how to take our first steps with Doctrine, a data mapper pattern implementation that is part of the Symfony php framework, but can also be used on its own.

Userspace Networking with DPDK

DPDK is a fully open-source project that operates in userspace. It's a multi-vendor and multi-architecture project, and it aims at achieving high I/O performance and reaching high packet processing rates, which are some of the most important features in the networking arena. It was created by Intel in 2010 and moved to the Linux Foundation in April 2017.

New Terminal App in Chome OS Hints at Upcoming Support for Linux Applications

More evidence popped up recently that Google might be working on implementing support for Linux program on its Linux-based Chrome OS operating system for Chromebooks.

Heptio Announces Gimbal, Netflix Open-Sources Titus, Linux 4.15 Reaches End of Life and More

News briefs for April 23, 2018.

How Netflix handles failovers, Anaconda, Linux command-line tricks, Python datetime libraries, GDPR, microservices, and more

  • Opensource.com; By Rikki Endsley (Posted by bob on Apr 24, 2018 12:52 AM EDT)
  • Story Type: Roundups; Groups: Linux, Python
With more than 12,000 page views, Amjith Ramanujam's article on how Netflix does failovers in 7 minutes flat was our runaway hit last week.

Raspberry Pi DAC HAT has dual 24-Bit DACs and a 128dB SNR

Orchard Audio’s “ApplePi DAC” audio HAT add-on for the Raspberry Pi is available for $175 on Kickstarter, featuring two 24-bit TI PCM1794A monoaural DACs, a 128dB SNR, and both balanced and unbalanced outputs.

SUSE Launches Beta Program for SUSE Linux Enterprise High Performance Computing

SUSE recently announced a public beta program for its SUSE Linux Enterprise High Performance Computing (HPC) product as part of the upcoming SUSE Linux Enterprise 15 operating system release.

Put Wind into your Deployments with Kubernetes and Helm

Learn how to run and test your code on a production-like environment with Kubernetes and Helm. I’m a Software Engineer. Every day, I come into work and write code. That’s what I’m paid to do. As I write my code, I need to be confident that it’s of the highest quality. I can test it locally, but anyone who’s ever heard the words, “...but it works on my machine,” knows that’s not enough.

Linux id Command Tutorial for Beginners (5 Examples)

  • Howtoforge Linux Howtos und Tutorials (Posted by bob on Apr 23, 2018 7:55 PM EDT)
  • Story Type: Tutorial; Groups: Linux
If you are new to system administration in Linux, you will gradually learn that user management is an important aspect of your work. The Linux command line offers several command-line utilities for this purpose, and one of them is the id command.

It's not just you: Spammers have been slipping spoofed messages to Gmail's 'sent' folder

Google confirms reports of mysterious mails popping up. Google has confirmed that it is possible for spammers to create spoofed emails that appear in a user's 'sent mail' folder.…

Record Terminal Activity For Ubuntu 16.04 LTS Server

At times system administrators and developers need to use many, complex and lengthy commands in order to perform a critical task. Most of the users will copy those commands and output generated by those respective commands in a text file for review or future reference. Of course, “history” feature of the shell will help you in getting the list of commands used in the past but it won’t help in getting the output generated for those commands.

Managing virtual environments with Vagrant

Vagrant is a tool that offers a simple and easy to use command-line client for managing virtual environments. I started using it because it made it easier for me to develop websites, test solutions, and learn new things. According to Vagrant's website, "Vagrant lowers development environment setup time, increases production parity, and makes the 'works on my machine' excuse a relic of the past."

Breach detection with Linux filesystem forensics

  • Opensource.com; By Gary Smith (Posted by bob on Apr 23, 2018 2:45 PM EDT)
  • Story Type: Security, Tutorial; Groups: Linux
Forensic analysis of a Linux disk image is often part of incident response to determine if a breach has occurred. Linux forensics is a different and fascinating world compared to Microsoft Windows forensics. In this article, I will analyze a disk image from a potentially compromised Linux system in order to determine the who, what, when, where, why, and how of the incident and create event and filesystem timelines. Finally, I will extract artifacts of interest from the disk image.

How to reset a root password on Fedora

  • Fedora Magazine (Posted by bob on Apr 23, 2018 1:30 PM EDT)
  • Groups: Fedora; Story Type: News Story
A system administrator can easily reset a password for a user that has forgotten their password. But what happens if the system administrator forgets the root password? This guide will show you how to reset a lost or forgotten root password. Note that to reset the root password, you need to have physical access to […]

How to Install and Configure OpenSSH on Ubuntu 16.04

In this tutorial we will show you how to install, configure and use OpenSSH on Ubuntu 16.04. SSH (Secure Shell) is a protocol that allows you to access a remote machine securely while OpenSSH is a set of tools based on the SSH protocol.

gksu Removed From Ubuntu, Here’s What You Can Use Instead

  • ITSFOSS.COM; By Abhishek Prakash (Posted by elobga on Apr 23, 2018 11:02 AM EDT)
  • Story Type: Tutorial
gksu has been been removed from Debian, Ubuntu 18.04 and other Linux distros. However, you can still get its functionality by using gvfs admin backend. This post from It's Foss guides you on how to do it.

« Previous ( 1 ... 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 ... 7359 ) Next »