HOWTOs

Xastir—Open-Source Client for the Automatic Packet Reporting System

What do search and rescue, Amateur Radio and Linux have in common? more>>

Hack and / - Dr hjkl Meets the Vimperator

If you want to be a futuristic Web-browsing machine, terminate that mouse, pick up the keyboard, and find out how Vimperator can transform Firefox into a modal half-vim, half-browser cyborg. more>>

Hack and / - Message for You Sir

Why check for new e-mail every minute when a script can do it for you? Learn how to trigger desktop notifications in your own scripts. more>>

Multisession Workstations

Press F1 for bash, F2 for Windows, F3 for Ubuntu, F4 for Mac OS and F5 for Citrix. Linux makes it all possible, and you don't even need a hard drive! more>>

IPv4 Anycast with Linux and Quagga

Ease configuration headaches and improve availability with anycast. more>>

Use Linux as a SAN Provider

At one-tenth the cost of the typical commercial appliance, Linux can deliver storage with speed and redundancy. Make the move toward a full-featured iSCSI SAN solution with what you already have in your server room. more>>

Hack and / - Dr hjkl and Mr Hack

Arrow keys, schmarrow keys—some of the best programs out there let you move around from the home row just like vim intended it. more>>

Host Identity Protocol for Linux

Have you ever wondered why your multimedia streams stop working after you switch to a different network with your laptop? Have you thought about why setting up a server on your home network behind a NAT is so awkward or even impossible? Host Identity Protocol for Linux (HIPL) offers a remedy to these and other problems. more>>

Coreboot at Your Service!

Don't let your PC's closed-source BIOS stop you from doing what you want with your hardware. more>>

FPGA Programming with Linux

Short of opening your own chip fab, you can't get much closer to the metal than FPGA programming. more>>

Innovative Interfaces with Clutter

Use Clutter to develop OpenGL applications with rich 2-D and 3-D interfaces that include object rotation, scaling, texturing and more. more>>

Linux KVM as a Learning Tool

Low-level system programming is a difficult task, but with Linux KVM, it's a whole lot easier. more>>

Android Everywhere!

Put Android where you'd least expect it—from phones to virtual machines. more>>
Syndicate content
Webinar
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Webinar
Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix