This technique - utilizing devilspie - will create a transparent terminal session on your desktop that will remain for the duration of your login (unless you exit the terminal session for some reason) This particular how-to addresses Ubuntu specifically, but IÃƒÂ¢Ã¢â€šÂ¬Ã¢â€žÂ¢ve done this successfully in 3 or 4 distributions.
The Network Time Protocol (NTP) is a protocol for synchronizing the clocks of computer systems over packet-switched, variable-latency data networks. NTP uses UDP port 123 as its transport layer. It is designed particularly to resist the effects of variable latency (Jitter).
Webilder delivers stunning wallpapers to your Linux desktop, directly from Flickr and Webshots. You choose what keywords
(tags) to watch for, and photos are automatically downloaded to your computer. Webilder can also change the wallpaper every
The Common UNIX Printing SystemTM, or CUPS, is the software you use to print from applications like the web browser you are
using to read this page. It converts the page descriptions produced by your application (put a paragraph here, draw a line
there, and so forth) into something your printer can understand and then sends the information to the printer for printing.
ProFTPD is a proven, high-performance, scalable FTP server written from scratch, with a focus toward simplicity, security,and ease of configuration. Naturally, ProFTPD powers some of the largest sites on the Internet. It features a very Apache-like configuration syntax, modules, and a highly customizable server infrastructure, including support for multiple ÃƒÂ¢Ã¢â€šÂ¬Ã‹Å“virtualÃƒÂ¢Ã¢â€šÂ¬Ã¢â€žÂ¢ FTP servers, anonymous FTP, and permission-based directory visibility.
If you want to access a remote file system through ssh you need to install sshfs.sshfs is a filesystem client based on the SSH File Transfer Protocol. Since most SSH servers already support this protocol it is very easy to set up: i.e. on the server side thereÃƒÂ¢Ã¢â€šÂ¬Ã¢â€žÂ¢s nothing to do. On the client side mounting the file system is as easy as logging into the server with ssh.
Central Log Management System is a simple web based logging system which allows logging all syslog messages from various Network Devices, Unix, Linux, Solaris and Windows Servers. This allows the visibility of logs from all these devices in one single interface.
You can prevent automatic running of the GUI when you boot your debian machine by disabling your login manager be it KDM, GDM or XDM from running at boot time. To disable the login manager from automatically running at boot up.
AcetoneISO is CD/DVD image manipulator for Linux.Using this tool it is very easy to Mount and Unmount ISO,MDF,NRG Images
If youÃƒÂ¢Ã¢â€šÂ¬Ã¢â€žÂ¢ve just bought a new desktop,laptop or server and the box says the box is powered by 2 processors, you can actually verify that.
SSH is a great way to remotely administer a server. However, it still has a number of issues when you open it up to the
world. The server and client communications are secure but that doesnÃƒÂ¢Ã¢â€šÂ¬Ã¢â€žÂ¢t mean the hosts involved are. Opening an SSH service
to the world allows for brute force attacks and means that the carbon interface is still the weakest link.
su is run a shell with substitute user and group IDs. su is used to become another user during a login session. Invoked
without a username, su defaults to becoming the super user. The optional argument - may be used to provide an environment
similar to what the user would expect had the user logged in directly.
Do you want completely anonymous internet access? For Free? Tor is the open source leader to anonymous connections on the internet, you can anonymize your internet presence from AIM/ICQ/MSN/ Jabber/IRC/WWW/FTP and you can even issue a torify
command at the command prompt to anonymize your get/ssh/lynx/ftp/perl or whatever. Basically tor is for the people by the people, it is only alive because we make it so, we can choose to use it freely or use it freely and help it out by running a server on your computer to make the internet safer.
Let us say that you want to rename all of your ÃƒÂ¢Ã¢â€šÂ¬Ã…â€œ.php5ÃƒÂ¢Ã¢â€šÂ¬Ã‚Â³ files to ÃƒÂ¢Ã¢â€šÂ¬Ã…â€œ.phpÃƒÂ¢Ã¢â€šÂ¬Ã‚Â files. You can use for loop.
Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.