Home Search
bit - search results
If you're not happy with the results, please do another search
Run Applications in Secure Sandboxes with SELinux
Have an application that you want to run, but without giving it full access to the rest of your system? Welcome to SELinux's sandbox...
Red Hat Warns of Hole in OpenSSL
Red Hat warns of a race condition in the OpenSSL code for parsing TLS extensions that is said to allow arbitrary code to be...
How to enable wireless in RHEL 6.0
1. Firstly, we must find out what exactly wireless device we own, you can use lspci to list all devices,# lspci 00:18.2 Host bridge: Advanced...
The Case for Single Sign-On
If you asked system administrators what their favorite part of the job was, very few would put user administration in their top 10. But...
Creating Macros Without Scripting in LibreOffice and OpenOffice.org
If you find yourself doing the same task over and over again in LibreOffice (or OpenOffice.org), you need to learn about macros. Whether it's...
Podcast: Supermicro Fires Up GPUs and Many-Core Blades at SC10
In this podcast, I interview Tao Leng, GM of Supermicro. Of note is Supermicro’s announcement of a blade enclosure that has up to 2,880 x86...
HOWTO: Reconfigure MySQL to use innodb_file_per_table with zero downtime
InnoDB is a very good storage engine for MySQL that combines reasonable performance with wide popularity and, as a consequence, a good set of...
Red Hat Enterprise Linux 6 Hits the Streets
It's tough to keep a secret in the Linux community. There was very little surprise yesterday when Red Hat announced Red Hat Enterprise Linux...
How to Configure Wireless on Any Linux Desktop
¬â€
If you are a mobile Linux user one of the first things you need to do is to connect that mobile device to a...
Do Away with PowerPoint with S5 on Linux
Public speaking and giving presentations are stressful enough for most folks — why add to that with complex software and worries about platform compatibility?...