How would you like to MASTER graphic design by next week?
Click here to find out how
Featured Photoshop templates - professional ready to use designs for your next project
View all templates
We hope that you will enjoy our Linux tutorials. Feel free to contact us if you would like to be a tutorial hero and contribute your own Linux tutorial to our site. Thank you !
SELinux and Smack security modules for Linux containers
A common response when someone first hears about containers is "How do I create a secure container?" This article answers that question by showing you how to use Linux Security Modules (LSM) to improve the security of containers. In particular, it shows you how to specify a security goal and meet it with both the Smack and SELinux security modules.
Perform uniform mounting with generic NFS
This article discusses the architecture and the mechanism behind a generic NFS mounter, a utility that will undoubtedly help the NFS clients by providing easier, one-point access to the files on the NFS server and by offering a more consolidated view of the NFS space. See how to automatically consolidate many different NFS versions into a uniform mount.
Linux can rule cloud computing
You can't read a technical Web site these days without some mention of so-called cloud computing. Cloud computing gives users access to massive computing and storage resources without their having to know where those resources are or how they're configured. This article discusses the anatomy of cloud computing and how Linux and the open source community contribute to the world of cloud computing. As you might have guessed, Linux and open source technologies play a huge role.
Desktop Eye Candy - Setting Up Conky
Make your desktop look awesome! We go over installing conky and basic configuration. My conkyrc file is provided with a screenshot
This article covers cp, tar, and rsync, that can aid with the security of the synchronization of UNI
There are many tools available that allow you to synchronize files across UNIX directories, but doing it effectively, and securely, takes a little bit more effort. This article looks at solutions for synchronizing files across UNIX filesystems and different computer systems securely, and at solutions that allow you to synchronize encrypted versions of your files for the purposes of backup.
Avoid virtualization overhead with Linux Containers
Linux Containers provide lightweight virtualization that lets you isolate processes and resources without the need to provide instruction interpretation mechanisms and other complexities of full virtualization. In this step-by-step tour of Linux container tools (LXC), the author introduces you to the Linux container tools and shows how to get up and running on them. This article will show you how Linux containers significantly lower the overhead of using true virtualization, while still providing isolation.
Snort Log Parser
A script I wrote in bash used to email events to you everyday rather than having to manually go through the logs.
Important LAMP systems tunning considerations
This series of three articles on tunning LAMP systems discusses many of the server configuration items that can make or break an application's performance. Part-1 covers the LAMP architecture, some measurement techniques, and some basic Linux kernel, disk, and file system tweaks. Part-2 focuses on steps you can take to optimize Apache and PHP. Part-3 looks at tuning the database layer for maximum efficiency. Each component -- Linux, Apache, PHP, or MySQL -- has various needs. These articles help you understanding them individually to eliminate the bottlenecks that can slow your application performance.
Embed Lua for scriptable apps
The Lua programming language is a small scripting language specifically designed to be embedded in other programs. Lua's C API allows exceptionally clean and simple code both to call Lua from C, and to call C from Lua. This allows developers who want a convenient runtime scripting language to easily implement the basic API elements needed by the scripting language, then use Lua code from their applications. This article introduces the Lua language as a possible tool for simplifying common development tasks, and discusses some of the reasons to embed a scripting language in the first place.
Reduce power consumption through smart activity monitors
Learn how to reduce your power consumption in your Linux computers by monitoring application-usage patterns and user activity. After tuning your kernel, hdparm, ACPI, and CPU settings, discover how to add these application monitors to more effectively enter your low-power states. Also, find out how to use the focusTracker and kst visualizations to find gaps of inactivity, and create rules that can save you some green.
The benefits of parceling Root power with POSIX
POSIX file capabilities split root user powers into smaller privileges, such as the ability to read files or to trace processes owned by another user. By assigning capabilities to a file, you can enable an unprivileged user to execute the file with those specified privileges. In this article, learn how programs can make use of POSIX capabilities, how to investigate which capabilities are needed by a program, and how to assign those capabilities to the program.
Scripting with Guile
The days of building and delivering static software and products are over. Today, users expect their products to be dynamic and easily customizable. Learn how, with Guile, you can interpret Scheme scripts, dynamically bind scheme scripts into compiled C programs, and even integrate compiled C functions into Scheme scripts.
Telecommunications and Network Security
Packt is pleased to announce a new book on CISSP. Written by M. L. Srinivasan CISSP in 21 Days is a quick revision guide that helps candidates prepare for the CISSP Exam and approach it confidently with the help of step-by-step preparation and practice questions. Success in this respected exam opens the door for ones dream job as a security expert as well as an eye catching salary. Passing the final exam is challenging as every year a lot of candidates do not prepare sufficiently and fail at the final stage. This happens when they cover everything but do not revise properly and hence lack in confidence. This books 'concise explanation' will take candidates through the final weeks before the exam with a day-by-day plan covering all of the exam topics enabling them to enter the exam room with confidence. Candidates will get to know the requirements of the CISSP examination and structure their preparation accordingly. The book helps them build their understanding of myriad concepts in the Information Security domain thus integrating their existing knowledge, experience, and prior learning to easily remember the concepts. This small and concise CISSP exam quick-revision guide provides a disciplined approach to be adopted for reviewing and revising the core concepts a month before the exam, by providing concise explanation of important concepts in all the 10 domains of the CISSP Common Body of Knowledge (CBK). Each domain is covered in two chapters that are represented as days and each chapter contains some practice questions including a full-blown mock test for practice. This book is for all aspirants who are planning to take the CISSP examination and obtain the coveted CISSP certification that is considered as the 'Gold Standard' in Information Security personal certification. The book is out now and is available from Packt. For more information, please visit http://www.packtpub.com/crack-the-cissp-exam-in-21-days/book
The Linux KVM may change the way you use linux
Linux and flexibility go hand in hand, and the options for virtualization are no different. KVM supports the virtualization of Linux guest operating systems -- even Windows with hardware that is virtualization-aware. This article explores the architecture of the Linux KVM as well as why its tight integration with the kernel may change the way you use Linux.
Nokia N810 Internet Tablet code unit testing
This installment looks at different options for helper libraries, coding with unit testing in mind, and user interface choices.
Total Tutorials in Category: 1186