Raspberry Pi 400 PC in a Keyboard Raspberry Pi 400 takes the same components as Raspberry Pi 4, including the system-on-chip and memory and puts them in a compact keyboard.
How to Detect and Guard against Linux Security Vulnerabilities
You should scan your Linux-based systems to avoid hacks and gather information from both outside and inside your network. That way, you can see what the bad guys see from both directions. More ...
View Your Linux Server's Network Connections With Netstat
Netstat is a command-line network utility that displays network connections, routing tables, and a number of network interfaces, and network protocol statistics. This artilce shows how to view Your Linux Server's Network Connections With Netstat. More ...
What You Need to Know to Set Up a Simple Firewall in Linux
Like any other OS, Linux needs to be protected with a firewall. Essentially, a firewall is a protective fence that keeps unwanted external data and software out and sensitive internal data and software in. More ...
Installing Fedora 3 Linux
Installing Fedora is as simple as inserting the first CD-ROM into the drive and rebooting. But first make sure that your system is set to boot from the CD drive. Watch the on-screen messages as the system boots. More ...
Check Used Disk Space on Linux With du Command
On most personal devices, drives get filled up with photos and videos and music, on servers, drives get filled up with data in user accounts and log files. You can check in on disk usage with the du command. More ...
Easy Way to Install Linux
Windows, Apple MAC OS, and Chrome are operating systems designed primarily to be marketing devices that wrestle you to their stores. May people are getting fed up with this, that's why Linux is becoming so popular. More ...
Ubuntu for Non-Geeks: A Pain-Free, Get-Things-Done Guide
If you are new to Ubuntu, or even new to Linux, this book is a great introduction to Ubuntu Linux. However, it goes beyond that. When you finish the book, you will have a lot of knowledge about Ubuntu, and you will be much more comfortable with this excellent operating system. More ...
Setting Up a Linux Modem
Almost all modems manufactured today are software modems, usually referred to as winmodems. Even though we pay a lot for a winmodem, they are cheap to manufacture because they use very little electronics. More ...
Choosing a Printer for Linux
Most Linux distributions use the Common Unix Printing System (CUPS), which contains drivers for most printers available today. This means Linux offers much wider support for printers than Windows does. More ...
Installing Software on Fedora
With windows, you execute the applications setup program (by double-clicking on setup.exe) and, 99 percent of the time, the application will install succesfully. Compare that to installing software on Linux, where you're supposed to search internet repositories and gather all the components required for the program. More ...
Virtualization Technology an Emerging Technology
Virtualization involves a physical resource being shared amoung multiple virtual resources. For example multiple virtual machines can run on the same physical host, with each virtual machine sharing the resources of the host. Virtualization represents a huge monetary savings opportunity for business. More ...
The Death of Windows
If want you to explore and learn about Linux without uninstalling Windows or making any changes to your PC, Knoppix is the way to go. maybe someday everyone will carry a Knoppix CD and a CD-RW to use on any computer they find. That day will truly be the death of Windows. More ...
Setting Up a Basic Ethernet LAN on a Linux PC
When you install most the Linux distributions on a PC connected with an Ethernet card, the Linux kernel automatically detects the Ethernet card and installs the appropriate drivers. The installer also lets you set up TCP/IP networking. More ...
Linux Server Hardening
For today's computing platforms, ease of access and openness is essential for web based communications. This is at odds with the increased necessity for comprehensive security measures in a world full of malware and hacking threats. More ...