Ya era hora de dejar de ayudar a engordar el imperio Mitosoft. EstÃƒÆ’Ã‚Â¡ claro que MS ha llevado un ordenador a casi todas las partes del mundo, pero una cosa que he podido aprender en los años que llevo viviendo en esta "esfera gigante" es que los monopolios no son buena cosa, en cualquier ÃƒÆ’Ã‚Â¡mbito. En el momento que dependes de algo... estÃƒÆ’Ã‚Â¡s teniendo una debilidad. Y cuando dependes totalmente... pasas a ser un esclavo. Windows ofrece al usuario medio (teÃƒÆ’Ã‚Â³ricamente a cambio de dinero, no lo olvidemos) la posibilidad de realizar tareas bastante complejas con relativa facilidad, lo cual estÃƒÆ’Ã‚Â¡ muy bien y no rebato, pero también es cierto que se trata de un super alto nivel forzado, que no te deja entender qué es lo que ocurre debajo. Bien, "no es necesario saber cÃƒÆ’Ã‚Â³mo funciona el protocolo TCP/IP para navegar por internet", cierto, y tampoco es necesario saber mecÃƒÆ’Ã‚Â¡nica para conducir un coche pero... ¿y si quieres saber como funciona? - Pues Linux.
This tutorial shows how to implement SPF (Sender Policy Framework) in a Postfix 2.x installation. The Sender Policy Framework is an open standard specifying a technical method to prevent sender address forgery. There are lots of SPF extensions and patches available for Postfix, but most require that you recompile Postfix. Therefore we will install the postfix-policyd-spf-perl package from openspf.org which is a Perl package and can be implemented in existing Postfix installations (no Postfix compilation required). http://www.howtoforge.com/postfix_spf
Auth Shadow or mod-auth-shadow is a module for apache (and apache2, sort of) that enables authentication against /etc/shadow. The benefits being that any system user with a password can be authenticated for web_dav, subversion or simply an https server. The only other way to do this is with PAM. That method is dangerous because the apache user (www-data in my case) must be able to read /etc/shadow. Obviously, not a good idea. Auth Shadow accomplishes this safely by using a intermediate program called validate. This works because validate can be owned by root but executable by everyone. In the event that your server is compromised through apache, your password file will not be readable. http://www.howtoforge.com/apache_mod_auth_shadow_debian_ubuntu
Did anyone catch the articles appearing today about Eric S. Raymond and his dropping
any interest in Fedora Core, whose development team has really 'blown it' over the
proprietary codec issues.
He's finally realizing (as many of us already have)that no Linux distro stands a
chance in the real world without the ability (on some reasonable level)to play a DVD
or any video without an engineering degree..!
Newb's will not abandon M$ (whose media player can do all these things by default)if,
unlike Ubuntu,developers don't include this to some degree.
SongbirdÃƒÂ¢Ã¢â‚¬Å¾Ã‚Â¢ is a desktop Web player, a digital jukebox and Web browser mash-up. Like Winamp, it supports extensions and skins feathers. Like FirefoxÃƒâ€šÃ‚Â®, it is built from MozillaÃƒâ€šÃ‚Â®, cross-platform and open source.
vsftpd is a GPL licensed FTP server for UNIX systems, including Linux. It is secure and extremely fast. It is stable.Don’t take my word for it, though. Below, we will see evidence supporting all three assertions. We will also see a list of a few important sites which are happily using vsftpd. This demonstrates vsftpd is a mature and trusted solution.vsftpd is an FTP server, or daemon. The “vs” stands for Very Secure. Full Story
This short article describes how you can search for missing packages with apt-file on Debian and Ubuntu systems. apt-file allows you to search for a file name, and it gives back the name(s) of the package(s) containing that file so that you can install the appropriate package. http://www.howtoforge.com/apt_file_debian_ubuntu
This article shows how you can convert a physical Windows system (XP, 2003, 2000, NT4 SP4+) into a VMware virtual machine with the free VMware Converter Starter. The resulting virtual machine can be run in the free VMware Player and VMware Server, and also in VMware Workstation and other VMware products. VMware Converter comes in handy if you want to switch to a Linux desktop, but feel the need to run your old Windows desktop from time to time. By converting your Windows desktop into a virtual machine, you can run it under VMware Server/Player, etc. on your Linux desktop. http://www.howtoforge.com/vmware_converter_windows_linux
This tutorial will show you how to set up a serial console on a Linux system, and connect to it via a null modem cable. This is quite useful if your Linux server is in a headless configuration (no keyboard or monitor), as it allows you to easily get a console on the system if there are any problems with it (especially network problems, when SSH is not available). In the end, the GRUB menu will appear over the serial link, as will the bootup messages (output when booting the system). I am using Debian Etch on the server and Ubuntu Edgy on my client, although this should work on any Linux distribution. http://www.howtoforge.com/setting_up_a_serial_console
This tutorial describes how to set up an audio streaming server with Icecast2. In order that Icecast2 can stream audio to listeners we install Ices2. Ices2 is a program that sends audio data to an Icecast2 server to broadcast to clients. Ices2 can either read audio data from disk (Ogg Vorbis files), or sample live audio from a sound card and encode it on the fly. In this article we will let Ices2 read .ogg files from the local hard disk. http://www.howtoforge.com/linux_webradio_with_icecast2_ices2
This would indeed be a sake for open eyed marvel!Say you have all programs running, all updates right the system is selfcontained and working optimal.Now you just want to suck up the entire settings and programs for a re-installable backup.That would be great!But can this be done?
I have this particular problem.I want everything old to run on linux Ubuntu 6.10. Even the Sigma software for my Sigma SD10.I have tried WINE and since I am as green as I am I cannot get it to start install of the package.Has elder and wiser the time to guide me here?http://www.sigmaphoto.com/support/camerasb_sd10_downloads_spp21.asp
Network Bonding, otherwise known as port trunking allows you to combine multiple network ports into a single group, effectively aggregating the bandwidth of multiple interfaces into a single connection. For example, you can aggregate two gigabyte ports into a two-gigabyte trunk port. Bonding is used primarily to provide network load balancing and fault tolerance. http://www.howtoforge.com/network_bonding_ubuntu_6.10
This tutorial describes how to scan emails for image spam with FuzzyOCR. FuzzyOCR is a plugin for SpamAssassin which is aimed at unsolicited bulk mail containing images as the main content carrier. Using different methods, it analyzes the content and properties of images to distinguish between normal mails (ham) and spam mails. FuzzyOCR tries to keep the system load low by scanning only mails that have not already been categorized as spam by SpamAssassin, thus avoiding unnecessary work. http://www.howtoforge.com/fight_image_spam_with_fuzzyocr_spamassassin
I have a Thoshiba laptop at home, I was running ÃƒÂ¢Ã¢â€šÂ¬Ã…â€œEdgy EftÃƒÂ¢Ã¢â€šÂ¬? (Ubuntu Linux 6.10) But one of the important things about it was its inability to connect to WPA-encrypted Wifi access points.In my home i have a WPA Enabled Wireless router so i need to connect to my wireless network using WPA.I am giving the procedure that worked for me to enable wpa in my toshiba laptop.This will work most of ubuntu users who is trying to access WPA network.