Raspberry Pi 400 PC in a Keyboard Raspberry Pi 400 takes the same components as Raspberry Pi 4, including the system-on-chip and memory and puts them in a compact keyboard.
View Your Linux Server's Network Connections With Netstat
Netstat is a command-line network utility that displays network connections, routing tables, and a number of network interfaces, and network protocol statistics. This artilce shows how to view Your Linux Server's Network Connections With Netstat. More ...
Linux Server Step-by-Step Configuration Guide
This book contains no boring theory. Instead it's packed with 54 hands-on, step-by-step exercises and 185 graphics including screen captures showing you exactly what you should be seeing on your own screen. More ...
What is Bash?
A shell is a computer program which exposes an operating systems services to a human user or other program. It normally uses a command-line interface, but may have a graphical user interface. It is called a shell because it is the outermost layer around the operating system. More ...
Bootloaders In Linux
A boot loader is a program that controls the the initial sequence of operations performed in the process of starting the Operating System when the computer is switched on. More ...
CFS: Completely Fair Process Scheduling in Linux
A scheduling class specifies which scheduling policy applies to which type of process. Completely fair scheduling (CFS), which became part of the Linux 2.6.23 kernel in 2007, gives every task a fair share of processor resources in a low-fuss but highly efficient way. More ...
Basic Linux File and Directory Commands
This article explains the basic Linux file and directory commands used in their simple forms. How to determine you location in the directory hierarchy, create a directory, delete a directory, create a new file, move a file, copy a file, delete a file, and more. More ...
Dual-Boot Windows and Ubuntu
with your dual-boot Windows and Ubuntu configuration you can see what Ubuntu can do when installed to your hard disk running at full speed, and you can still run Windows when you need to use legacy applications that don't come in a Linux version. More ...
The Death of Windows
If want you to explore and learn about Linux without uninstalling Windows or making any changes to your PC, Knoppix is the way to go. maybe someday everyone will carry a Knoppix CD and a CD-RW to use on any computer they find. That day will truly be the death of Windows. More ...
An introduction to the Linux Boot and Startup Processes
Ever wondered what it takes to get your system ready to run applications? Here's what is going on under the hood. More ...
You Can Switch to Linux!
Books have been written with solutions for all the potential pitfalls the Linux-switcher faces. Instead of just telling you what to do, I?m going to tell you how to do things and explain why you're doing them. I'm going to focus on the things that are truly a challenge (and poorly documented), but still give you a head start on the easy stuff. More ...
Virtual Desktop Infrastructure (VDI) With Ubuntu Linux
Ubuntu Linux is ideal for anyone who is concerned about security of a WAN based virtual desktop infrastructure. It is also perfect for organizations hosting their applications in the cloud, utilizing software-as-a-service through a web browser. More ...
Fedora 3 Modem Installation
An external modem connects to your computer's USB or serial port. External modems have their own controller and DSP circuits. An external modem is the best choice if you have several computers because it be moved without opening the computer's case. More ...
Migrating to Linux: Installing Software
The typical approach to get software installed on your computer is to get it from a vendor and run the install program. With Linux there is a central repository of software. Just about any program you might want will be in a list of available packages that you can install. More ...
Protect Your Android Device From Malware
The growth rate of mobile devices continues to soar. Android is the leading operating system for mobile devices. Cybercriminals have intensified their efforts to hack into Android devices. More ...