How would you like to MASTER graphic design by next week?
Click here to find out how
Featured Photoshop templates - professional ready to use designs for your next project
View all templates
We hope that you will enjoy our Linux tutorials. Feel free to contact us if you would like to be a tutorial hero and contribute your own Linux tutorial to our site. Thank you !
SSH: Linux Generate Public/Private Key Login
On your desktop or the computer you want to SSH from run this command:
Installing Nvidia drivers in Debian 5 (lenny)
Grab the latest nvidia driver for your architecture from nvidia.com.
Linux Security, The Ultimate Linux Security Gateway
In this tutorial I am going to explain to you all how to write a linux security wall that can beat Windows ISA Server in security level. The main idea is really simple. Basicly we are going to make a Small Linux server that is security Based.
Spoonfed Linux Tutorials- Installing software from source
I will try to make this as "spoonfed" to new linux users as I can. This is one of many tutorials. I will be writing.
window pull backup files from linux
window automate pulling backup files from linux server using pscp.
Syntax highlighting in VIM editor
Syntax highlighting is nice feature and easy to find the syntax errors while coding. This tutorial explains how to turn on and turn off syntax highlighting in VIM editor.
Create your own PCBs using the toner transfer method
I have been making very nice (single sided) PCBs for a while now and I've got quite good at it, so I decided to write this tutorial so you too can make your own PCBs easily and quickly - with practice working boards should be possible in a couple of hours.
Rotate Eagle Parts by 45° and Other Mad Angles
This subject is quite scarce on the intertubes, so I thought I would write a nice little tutorial on how to rotate Eagle parts by obscure angles, as Eagle will only allow you to rotate parts by 90° usually.
How To: Create, Burn or Convert ISO Image using Gburner
Gburner not only allows the users to burn files onto a writable CD/DVD, it also allows to make an ISO image of a particular disk inserted in your drive and then burning that ISO image onto a writable CD/DVD at a later time.
How To: Convert Movies Into Images or Animated GIF Using Ubuntu
In this how to you will learn how you can extract all the frames of a movie (avi, mp4 and basically any format). It will take sometime to extract, but if you really want to do this, it’s easy as pie.
How To: Restore The Volume In Ubuntu
This tutorial will teach you how to restore the volume in Ubuntu if you are experiencing very low sound problems.
Porting Perl To Python
Python programmers shouldn't get too smug. While many people agree that Python is designed in a way that makes it a highly readable language, there can still be problems with legacy, untested Python code too. Porting legacy Perl to Python can be a daunting task. In this article, learn some of the theory behind dealing with legacy code, including what not to do.
The significant new AIX 7 capabilities for virtualization
The IBM AIX operating system provides a highly scalable IT infrastructure for client workloads. Learn about the latest version, AIX 7.1, an open standards-based UNIX operating system, that includes significant new capabilities for virtualization, security features, availability features, and manageability.
Yeah - Learn Linux: Maintain the integrity of filesystems
Learn how to check the integrity of your Linux filesystems, monitor free space, and fix simple problems. Use the material in this article to study for the Linux Professional Institute (LPI) 101 exam for Linux system administrator certification—or just to check your filesystems and keep them in good working order, especially after a system crash or power loss.
Block crackers with 3 locks to your SSH door
Security always requires a multi-layered scheme. SSH is a good example of this. Methods range from simple sshd configuration through the use of PAM to specify who can use SSH, to application of port-knocking techniques, or to hide the fact that SSH access even exists. Applying these techniques can make life much harder for possible intruders, who will have to go past three unusual barriers.
Total Tutorials in Category: 1186