Quantcast
Channel: Sameh Attia
Browsing all 1406 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Japanese student sets up free VPN service

http://www.net-security.org/secworld.php?id=14602There are a lot of people around the world that would like to bypass firewalls set up by their governments, but not everybody can afford to do it. Enter...

View Article


Image may be NSFW.
Clik here to view.

Alice, the Turtle of the Modern Age

http://www.linuxjournal.com/content/alice-turtle-modern-age Many of us grew up with LOGO, the kid-friendly programming language that guided a little turtle around a screen. Yes, it was simplistic. Yes,...

View Article


Image may be NSFW.
Clik here to view.

Non-linear video editing software: Open-source alternatives to Abobe Premiere...

http://www.zdnet.com/non-linear-video-editing-software-open-source-alternatives-to-abobe-premiere-pro-cc-7000027201Summary: Adobe's shift to subscription-based cloud distribution for its flagship...

View Article

Unix: Pranks that sysadmins play

http://www.itworld.com/operating-systems/408883/unix-pranks-sysadmins-playUnix systems administrators tend to be very serious about their responsibilities -- except when they're not. And, when they're...

View Article

Image may be NSFW.
Clik here to view.

Linux / Unix: chroot Command Examples

http://www.cyberciti.biz/faq/unix-linux-chroot-command-examples-usage-syntaxI am a new Linux and Unix user. How do I change the root directory of a command? How do I change the root directory of a...

View Article


Image may be NSFW.
Clik here to view.

Five Funny Little Linux Network Testers and Monitors

http://www.linux.com/learn/tutorials/765381-five-funny-little-linux-network-testers-and-monitorsIn this roundup of Linux network testing utilities we use Bandwidthd, Speedometer, Nethogs, Darkstat, and...

View Article

Image may be NSFW.
Clik here to view.

How to set up automatic filesystem checks and repair on Linux

http://xmodulo.com/2014/03/automatic-filesystem-checks-repair-linux.htmlOne of the most important tasks in Linux administration is to check the integrity of the filesystem. The Linux filesystem can be...

View Article

Image may be NSFW.
Clik here to view.

Want an IT job? Learn OpenStack

https://opensource.com/business/14/3/want-it-job-learn-openstackWhether you love living in the cloud or still cling to your desktop applications whenever possible, it has become increasingly clear in...

View Article


How to use triggers and stored procedures in PostgreSQL

http://www.openlogic.com/wazi/bid/340581/how-to-use-triggers-and-stored-procedures-in-postgresqlThe PostgreSQL relational database management system (RDBMS) offers powerful mechanisms for the automated...

View Article


8 commands to check cpu information on Linux

http://www.binarytides.com/linux-cpu-informationCPU hardware informationThe cpu information includes details about the processor, like the architecture, vendor name, model, number of cores, speed of...

View Article

Unix: More networking basics for the beginner

http://www.itworld.com/operating-systems/411332/unix-more-networking-basics-beginnerThe ifconfig command doesn't suck; it's just not as cool or sophisticated as ip. By Sandra Henry-Stocker  1March 24,...

View Article

Image may be NSFW.
Clik here to view.

Add AD authentication to CentOS in four easy steps

http://www.openlogic.com/wazi/bid/339238/add-ad-authentication-to-centos-in-four-easy-stepsMany businesses use Microsoft Active Directory (AD) to manage their Windows server infrastructure. You can...

View Article

Setup mail forwarding in postfix on Ubuntu or Debian

http://www.binarytides.com/postfix-mail-forwarding-debianPostfix mail forwardingPostfix is a commonly used MTA (Mail Transfer Agent) program that can receive, deliver or route emails. So if you have...

View Article


Image may be NSFW.
Clik here to view.

Exploiting Linux Kernel Heap Corruptions (SLUB Allocator)

http://resources.infosecinstitute.com/exploiting-linux-kernel-heap-corruptions-slub-allocator1. IntroductionIn recent years, several researchers have studied Linux kernel security. The most common...

View Article

Image may be NSFW.
Clik here to view.

18 commands to monitor network bandwidth on Linux server

http://www.binarytides.com/linux-commands-monitor-networkThis post mentions some linux command line tools that can be used to monitor the network usage. These tools monitor the traffic flowing through...

View Article


Image may be NSFW.
Clik here to view.

How to set up HTTPS in Apache web Server on CentOS

http://xmodulo.com/2014/04/https-apache-web-server-centos.htmlWeb servers use HTTP by default, which is a clear text protocol. As the name suggests, a clear text protocol does not apply any form of...

View Article

Drag-and-Drop Cloud Orchestration with Ubuntu Juju

https://community.csc.com/community/cio-engage/blog/2014/04/02/drag-and-drop-cloud-orchestration-with-ubuntu-jujuNo, they're not kidding. As Sally Radwan, Canonical's cloud product marketing manager,...

View Article


Image may be NSFW.
Clik here to view.

How to configure Varnish for WebSocket traffic

http://forum.linuxbsdos.com/topic/184/how-to-configure-varnish-for-websocket-traffic#192This post shows how to configure Varnish to handle WebSocket traffic. Varnish is an HTTP accelerator that's...

View Article

Image may be NSFW.
Clik here to view.

Check hardware information on Linux with hwinfo command

http://www.binarytides.com/linux-hwinfo-commandHwinfoThe hwinfo command is a very handy command line tool that can be used to probe for details about hardware components. It reports information about...

View Article

Unix: More ways to spin the top command

http://www.itworld.com/operating-systems/414414/unix-more-ways-spin-top-commandThe top command is one of the most useful commands for getting a quick glimpse into how your Unix server is performing,...

View Article
Browsing all 1406 articles
Browse latest View live