As a Linux sysadmin it feels great power when monitoring system resources like cpu, memory on the commandline. To peek inside the system is a good habit here atleast, because that's one way of driving your Linux system safe. Plenty of tools like Htop, Nmon, Collectl, top and iotop etc help you accomplish the task. Today lets try another tool called Glances. Glances Glances is a tool similar to that has a very compact display to provide a complete overview of different system resources on just...
I recently read that SSH keys provide a secure way of logging into a Linux and Unix-based server. How do I set up SSH keys on a Linux or Unix based systems? In SSH for Linux/Unix, how do I set up public key authentication?
Read more: Linux setup ssh keys
Before rolling out the analysis, it’s important to understand the technology. Microsoft Lync 2013 helps connect to multiple people across different operating systems and mobile devices. As a unified enterprise-ready communications platform, it enables an environment that facilitates instant video conferencing, messaging, voice chats and meeting. In short, it provides a single and consistent presence experience for its client.
While Microsoft may project changes brought about in the Lync Server 2013, enabling better experiences than ever before, there are a few concern areas that you users need to be aware of.
- Video Conferencing limitations: Continuing to be a low area, this version of Microsoft’s Lync too has been observed to be immature in terms of its video conferencing capabilities. Besides, it doesn’t provide end-to-end solutions such as video-room systems, video desktops, telepresence systems or video gateways. Its solutions for multi-party video conferencing, works on desktops only. Its conferencing capabilities are also limited with allowing a maximum of five people in a conference only and feature lacks such as server-side recording, dual presentation and multi-casting. Other problems associated with its video conferencing capabilities are its interoperability constraints with 3rd party products and that it consumes exorbitant bandwidths which are about 600% more than its counterparts.
- ü Lack of consistent BYOD support: BYOD is the next big revolution that’s happening in working environments. As such Lync 2013’s compatibility with the BYOD culture is critical. While it does support presence and instant messaging on platforms like iOS, Android and Windows, it falls short of features like simultaneous multi-party video and viewing shared meeting content.
- ü Voice limitations persist: This was one of the major lookout areas in terms of improvements expected. To begin with, users will have to invest in conference phones, Session Border Controllers for security purposes and 3rd party gateways. If you have a pre-existent system in place, you actually have to rip it apart. Besides it doesn’t even have call recording, call parking or contact centre features, making it troublesome for most users.
- ü Real-time collaboration shortcomings: Microsoft’s Lync 2013 requires sourcing a number of applications from various 3rd party vendors, making it unsuitable for users looking for an all-in-one solution.
- ü Investments in trainings: Due its nature of complexities, organizations will need to invest in training their staff, in-mates. Besides, they will also have to hire individuals with Linux certifications to help deploy and manage the system and troubleshoot as and when required. All this requires huge investments that organization may want to reconsider beforehand.
- ü Investments in Lync Voice too high: As per the conclusions from detailed interviews done with 211 real world customers, it was observed that Lync’s users spent $1,912 on an average, in installations (on the 1st year itself).
- ü Customer Choice is limited: Essentially Microsoft’s way with its products and sales strategies, for instance, product bundling, can end up in users being locked into their systems.
For the perfect communications solution, organizations require services that can be imbibed into existing systems, with delivering effective and efficient quality services in a cost-effective structure.
Have you been using Microsoft Lync 2013? How has your experience been? What according to you are its biggest drawbacks? Share your thoughts and takes with us.
This week another episode of Minimarte - web animated series, made with open source tools, got out of the box.
The animation is on youtube, at: http://www.youtube.com/watch?v=2I82gEaX-r4
And a small text with some making of images are at oficial site, at: http://www.minimarte.com/2014/02/26/episodio-2-as-primeiras-aparicoes/
All series, and all animations made with: Gimp, Inkscape, Blender, Synfig, Audacity, Kdenlive.
-Gimp is used for frame-by-frame animation;
-Inkscape for vector illustration
-Synfig for vector animation and compositions
-Blender for character animation
-Audacity for audio tracks and effects
-Kdenlive for video editing.
Story, screenplay: Ricardo Graça, Eduardo Graça
Animation, Direction, Editing: Ricardo Graça
Sound effects and tracks: Jorge Cruz
Images ( making of ):
Unless you have no life, don't watch the news, and don't care about others snooping around your secrets, you are well aware that these days the government's favorite activity is spying and monitoring their people from all sides, by all means, with no scruples and no remorse, possibly including yourself.
Even if you do have a life, do watch the news, and do care about others snooping around your secrets, you certainly use one of those free popular e-mail accounts that boast of their awesome unlimited features without realizing that they are the ones that are secretly stabbing you on the back and violating your privacy.
It was because of such things that our team wrote a book on advanced e-mail security with cryptography and we want to share it with you. In this book you'll get the following benefits:
- Awareness: you will understand how things work and never be fooled again.
- Privacy: no one will spy your e-mails anymore, your communications will remain private.
- Security: if your e-mails ever get compromised, no one will be able to decipher and read them.
- Credibility: you will demonstrate to others how much you care about your privacy and your security, as well as theirs.
- Flexibility: the system can be implemented anywhere, from home to business to mobile devices.
- Power: high level military grade cryptography being developed for more than 15 years.
- Freedom: 100% free/libre software based on an open standard, open source, no spyware, no malware, no viruses, nothing.
- Cost: completely free - gratis - you won't have to buy or pay for any software.
The book is short, full of images and graphics and easy to understand. It was written for laypersons, so anyone can follow it and do the required steps very easily.
And how about the price? Well you'll love that part: you can get and share the book for free, no hidden fees or registration required, you pay how much you want for it. That's it, that's how we work, you only pay if you like.
If you like it we suggest a contribution of $10.00, the price of a decent cappuccino cup. We put a lot of effort to write it and it took a long time to be finished, so if you like it we would very much appreciate a $10.00 contribution from you.
You can get a copy of the book right here in our official website: https://goldencontest.wordpress.com
Are you still not convinced? We are giving you 10 reasons why this book will benefit you. It is called "The 10 most common mistakes people make when using e-mail". Here they are:
- MISTAKE 1: I use a popular e-mail provider
- MISTAKE 2: I think only the recipients can read my messages
- MISTAKE 3: When I empty the trash bin I believe my messages were erased forever
- MISTAKE 4: I think it is great that my e-mail account is free
- MISTAKE 5: I own my own messages, they are mine
- MISTAKE 6: I think cryptography is unecessary
- MISTAKE 7: I don’t care about what the NSA is doing
- MISTAKE 8: I think my messages are safe
- MISTAKE 9: I trust my e-mail provider
- MISTAKE 10: I believe I have privacy online
You can find the detailed description of all those mistakes in our website, as well as how to correct them.
Check out our website now and get a copy of our book for free. You will not only get a book, you will also get your security and privacy back.
The Golden Keys Team
“Regular expressions” (often shortened to “regex”) is a language used to represent patterns for matching text. Regular expressions are the primary text-matching schema in all text-processing tools, including grep,egrep,awk ,sed.
Read more in ...in website link
Cantata, a Qt-based music player for MPD (Music Player Daemon), has reached version 1.3.0 just yesterday, and a fix for compiling it in KDE, 126.96.36.199, was put out a few moments ago. This release comes with 87 fixes and improvements. Some major changes and new features include:
- add option to control start-up state: visible, hidden or remembered from previous run
- undo/redo support for play queue
- many interface fixes and improvements
- add remove duplicates functionality to playlists and play queue
- read lyrics from the LYRICS tag in FLAC, Vorbis, Opus and Speex files
Image source: Image credit
Overall, Cantata suffered major overhauls on all levels. The interface has suffered lots of fixes and improvements; communication with MPD was improved too; playlist and play queue handling also suffered fixes.
Image source: Image credit
Installing Cantata 1.3.0 in Ubuntu 13.10
Installing from the PPA
Open the terminal and type the following commands to install Cantata from the PPA:
sudo add-apt-repository ppa:ubuntuhandbook1/cantata
sudo apt-get update
sudo apt-get install cantata
Installing from Source
Make seems to give the following error on Ubuntu 13.10 with Cantata 1.3.0 (this was fixed in Cantata 188.8.131.52):
lconvert: could not exec '/usr/lib/i386-linux-gnu/qt4/bin/lconvert': No such file or directory
make: *** [translations] Error 1
make: *** [po/CMakeFiles/translations.dir/all] Error 2
make: *** [all] Error 2
However, the binary is successfully built, available in the build directory and you can run Cantata as ./cantata.
Cantata 184.108.40.206 was released few moments ago with a fix for compiling it. Follow the next steps:
Download the source tarball from here and uncompress it:
tar -xjf cantata-220.127.116.11.tar.bz2
Next, install the dependencies:
sudo apt-get build-dep cantata
You will need the source repositories enabled for this to work.
Finally, change the working directory to cantata-18.104.22.168 and type the commands:
mkdir build && cd build
sudo make install
To install as normal user in a different prefix, use this:
mkdir build && cd build
cmake .. -DCMAKE_INSTALL_PREFIX=$HOME/usr
Cantata offers a wealth of options, as well as Internet services like Jamendo and support for podcasts:
Bitcoin is a decentralized peer-to-peer payment system and digital currency that is powered by its users with no central authority, central server or middlemen. Instead, managing transactions and issuing money are carried out collectively by the network. Bitcoin is controlled by all Bitcoin users around the world.
To provide an insight into the quality of software that is available, we have compiled a list of 5 highly promising Bitcoin clients. Hopefully, there will be something of interest here for anyone who wants ease of use, security and advanced features.
One of the most used commands by Linux users and the one that a Linux beginner must learn is- 'ls' Command. It is usually used to view the contents of current directory. So, when you run this command, the files and sub-directories included under the current directory will be listed before you. Very useful command and everyone who uses Linux should know this command.
This article will guide you to know more about 'ls' command with it's basic usages. Here we start !
Read More at YourOwnLinux.
The inode ( also known as Index Node) is a very basic concept related to Linux and UNIX filesystem. Each and every object/element in the filesystem is associated with an inode.
You must be aware of the fact that, most of the countries have given a unique identity to their citizens in the form of a unique identification number ('Aadhar Card' in India and 'SSN' in the USA) to identify an individual easily and uniquely. This also leads to make all the paper work corresponding to any citizen easier to be handled.
Just like these identification numbers for people, there is a unique identity of every member of a Linux filesystem which is known as Inode number and it uniquely exists for each and every individual file on Linux or Unix filesystems.
Read more at YourOwnLinux