Locking Down Linux for Kids
Linux can be an excellent operating system for kids. Viruses and malware designed for Windows computers will do nothing on a Linux computer, and many security measures are built into the various...
View ArticleWhat Is Spooling in Linux?
As with most modern operating systems, Linux supports spooling, a feature that automatically manages printing as an independent task, letting you create reports without tying up your computer. The...
View ArticleHow to Give All Permission in Ubuntu
Just like with Windows and OS X, you can grant administrative permissions to a user in Ubuntu to allow that user to make changes to the system. Administrators in Ubuntu are part of the "sudo" group,...
View ArticleHow to Check if a Linux Server Is Accepting SMTP Connections
If you've set up and configured a Linux SMTP server, it's a good idea to test it before you roll it out for use. In Linux, you can send a test message using telnet from the command line. Note that if...
View ArticleHow to Set Up a CVS Repository With Ubuntu
A CVS, or Concurrent Versions System, server is a version control system that keeps track of changes to files you're working on. The CVS server comes complete with a CVS repository, so you need to...
View ArticleDetecting Backdoors in Linux
Linux systems are not immune to malware or hacking. They benefit from Unix's system of multiple users and distinct file permissions, but hackers can still find (or install their own) backdoors through...
View ArticleWhy Your Grandpa Should Use Linux
Linux has evolved into a user-friendly, highly-functional operating system, and could be the perfect OS for Senior Citizens.
View ArticleHow to Format in Knoppix
Knoppix is a Linux Live CD. The entire operating system is run from the computer's memory and not from the hard drive. You can use a Knoppix CD to format any hard drive, or partition regardless of the...
View ArticleHow to Install PCSX2 on Linux
If you have a 32-bit version of Linux, you can install the PlayStation 2 emulator, PCSX2. The program does not work on 64-bit versions of Linux. After installing the program, you can play your...
View ArticleHow to Make a Whitelist in SquidGuard
SquidGuard is a Web-filter plug-in for the Squid proxy server. You can use Squidguard to block inappropriate websites on a network. In some cases, a website that you want to allow access to may be...
View ArticleHow to Install Webmin in Mint
Linux Mint is a free operating system based off the Ubuntu operating system. It is designed to take up as few system resources as possible and be a good option for individuals and businesses. Webmin is...
View ArticleHow to Disable Sendmail in RHEL
Red Hat Enterprise Linux systems include the Sendmail mail transfer agent, which transfers email between computer systems using the simple mail transfer protocol. The Sendmail mail transfer agent runs...
View ArticleHow to Increase the File System on AIX
IBM's AIX UNIX operating system creates file systems on volume groups that can extend across multiple hard disk devices. Each file system has its own mount point at a directory and has a maximum total...
View ArticleHow to Export a Display in AIX
AIX is a Unix operating system developed by IBM. AIX is server software, so the system does not normally have a video card or display adapter. Instead of displaying graphics on the server itself, AIX...
View ArticleHow to Install Wireshark on Linux
Wireshark, a free graphical network protocol analyzer, can be installed on any Linux distribution using the source code available on the website. Wireshark allows you to browse and capture network...
View ArticleHow to Convert ASCII to Character in KSH
Ksh is an abbreviation for the Korn shell, a command interpreter for Unix and Linux operating systems. Ksh, as with all command-line interfaces, accepts typed commands from the user, executes them, and...
View ArticleHow to Add a Script to the Startup in Linux
The Linux operating system goes through different levels, called runlevels, as the system boots up. Each runlevel has a specific number and a "rc" file that is associated with it. The rc files specify...
View ArticleHow to Format a Gparted SD Card if Read Only
Clear and reuse an SD (Secure Digital) card as a portable medium for your Linux computer if you no longer need the files contained on the SD card. You can remove all files from the SD card quickly by...
View ArticleHow to Find a Hidden SSID With a BackTrack
BackTrack Linux is a "penetration testing" distribution of the Linux operating system; it was developed for testing network security and vulnerabilities in the operating system. BackTrack uses a number...
View ArticleHow to Read an Ext3 in Windows
Linux distributions often use the ext3 file system to store data on partitions. Windows doesn’t include support for reading files from ext3 file systems by default, only support for reading from NTFS...
View Article