Menu
Linux Operating System

Raspberry Pi 400 PC in a Keyboard Raspberry Pi 400 takes the same components as Raspberry Pi 4, including the system-on-chip and memory and puts them in a compact keyboard.

Connecting Linux to the Internet
Today, a computer without Internet access would be severely limited. Mozilla running on Linux provides more reliable and secure Internet access than Internet Explorer running on Microsoft Windows. More ...

Protect Your Android Device From Malware
The growth rate of mobile devices continues to soar. Android is the leading operating system for mobile devices. Cybercriminals have intensified their efforts to hack into Android devices. More ...

Running Windows Applications on Linux
The perceived inability to run windows applications on Linux is what keeps many individuals from trying Linux. It turns out that it is possible to run many popular Windows applications on Linux PCs using one of several software technologies. More ...

Set Up a Minimal Server on a Raspberry Pi
The Raspberry Pi is a small, single-board computer that is perfect for computer projects, but a Raspberry Pi can also be used as a web server on your main local network or the internet. This step-by-step guide shows you how. More ...

How to Dual Boot Windows XP and Ubuntu 8
If you want to have access to both a Windows and Linux environment on your computer, this guide will show you an easy way to have that using Windows XP and Ubuntu 8. It is assumed that you already have Windows XP installed on your computer and that you have Ubuntu 8 Desktop Edition downloaded and burned onto a CD already. More ...

Linux Server Step-by-Step Configuration Guide
This book contains no boring theory. Instead it's packed with 54 hands-on, step-by-step exercises and 185 graphics including screen captures showing you exactly what you should be seeing on your own screen. More ...

Virtual Desktop Infrastructure (VDI) With Ubuntu Linux
Ubuntu Linux is ideal for anyone who is concerned about security of a WAN based virtual desktop infrastructure. It is also perfect for organizations hosting their applications in the cloud, utilizing software-as-a-service through a web browser. More ...

How to Detect and Guard against Linux Security Vulnerabilities
You should scan your Linux-based systems to avoid hacks and gather information from both outside and inside your network. That way, you can see what the bad guys see from both directions. More ...

How to Protect Files and Directories in Linux
In Linux, you can protect the files through file ownership and the permission settings that control who can read, write, or execute the file. More ...

CFS: Completely Fair Process Scheduling in Linux
A scheduling class specifies which scheduling policy applies to which type of process. Completely fair scheduling (CFS), which became part of the Linux 2.6.23 kernel in 2007, gives every task a fair share of processor resources in a low-fuss but highly efficient way. More ...

Setting Up a Linux Modem
Almost all modems manufactured today are software modems, usually referred to as winmodems. Even though we pay a lot for a winmodem, they are cheap to manufacture because they use very little electronics. More ...

7 Steps to Securing Your Linux Server
This primer will introduce you to basic Linux server security. While it focuses on Debian/Ubuntu, you can apply everything presented here to other Linux distributions. More ...

Linux su vs sudo: What's the Difference?
A comparison of the su and sudo Linux commands for escalating privileges for non-root users. More ...

Linux Security Basics: How to Encrypt and Sign Files with GnuPG
Linux comes with the GNU Privacy Guard (GnuPG or GPG) encryption and authentication utility. With GnuPG, you can create your public and private key pair on your Linux system, encrypt files with your key, and digitally sign a message. More ...


Learn more at amazon.com

Custom Search