Raspberry Pi 400 PC in a Keyboard Raspberry Pi 400 takes the same components as Raspberry Pi 4, including the system-on-chip and memory and puts them in a compact keyboard.
Linux Security Basics: How to Encrypt and Sign Files with GnuPG
Linux comes with the GNU Privacy Guard (GnuPG or GPG) encryption and authentication utility. With GnuPG, you can create your public and private key pair on your Linux system, encrypt files with your key, and digitally sign a message. More ...
Connecting Linux to the Internet
Today, a computer without Internet access would be severely limited. Mozilla running on Linux provides more reliable and secure Internet access than Internet Explorer running on Microsoft Windows. More ...
Setting Up a Linux Modem
Almost all modems manufactured today are software modems, usually referred to as winmodems. Even though we pay a lot for a winmodem, they are cheap to manufacture because they use very little electronics. More ...
Linux Memory User Space
Linux Memory is divided into two distinct areas: user space, which is a set of locations where user processes run, and kernel space, which is the location where the code of the kernel is stored, and executes under. More ...
CFS: Completely Fair Process Scheduling in Linux
A scheduling class specifies which scheduling policy applies to which type of process. Completely fair scheduling (CFS), which became part of the Linux 2.6.23 kernel in 2007, gives every task a fair share of processor resources in a low-fuss but highly efficient way. More ...
What is a Linux Distribution
An operating system consists of a lot of files and the files that make up Linux along with an installer for the files are called a distribution. More ...
What You Need to Know to Set Up a Simple Firewall in Linux
Like any other OS, Linux needs to be protected with a firewall. Essentially, a firewall is a protective fence that keeps unwanted external data and software out and sensitive internal data and software in. More ...
How to Use the VIM Text Editor in Linux
In 1988, an improved version of Vi, called vim (vi iMproved), was released. This article provides some examples that illustrate some basic operations with text as well as its extra features that make vim unique and useful. More ...
Bootloaders In Linux
A boot loader is a program that controls the the initial sequence of operations performed in the process of starting the Operating System when the computer is switched on. More ...
Commands to Display Your Linux Computer's Hardware Information
Get the details on the hardware inside your Linux computer from the command line. More ...
How to Protect Files and Directories in Linux
In Linux, you can protect the files through file ownership and the permission settings that control who can read, write, or execute the file. More ...
View Your Linux Server's Network Connections With Netstat
Netstat is a command-line network utility that displays network connections, routing tables, and a number of network interfaces, and network protocol statistics. This artilce shows how to view Your Linux Server's Network Connections With Netstat. More ...
How to Detect and Guard against Linux Security Vulnerabilities
You should scan your Linux-based systems to avoid hacks and gather information from both outside and inside your network. That way, you can see what the bad guys see from both directions. More ...
Welcome to the world of Knoppix
Knoppix is a bootable CD with a collection of GNU/Linux software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and USB devices and other peripherals. It is not necessary to install anything on a hard disk. More ...