Home Search

bit - search results

If you're not happy with the results, please do another search

Run Applications in Secure Sandboxes with SELinux

  Have an application that you want to run, but without giving it full access to the rest of your system? Welcome to SELinux's sandbox...

Red Hat Warns of Hole in OpenSSL

Red Hat warns of a race condition in the OpenSSL code for parsing TLS extensions that is said to allow arbitrary code to be...

How to enable wireless in RHEL 6.0

1. Firstly, we must find out what exactly wireless device we own, you can use lspci to list all devices,# lspci 00:18.2 Host bridge: Advanced...

The Case for Single Sign-On

If you asked system administrators what their favorite part of the job was, very few would put user administration in their top 10. But...

Creating Macros Without Scripting in LibreOffice and OpenOffice.org

If you find yourself doing the same task over and over again in LibreOffice (or OpenOffice.org), you need to learn about macros. Whether it's...

Podcast: Supermicro Fires Up GPUs and Many-Core Blades at SC10

In this podcast, I interview Tao Leng, GM of Supermicro. Of note is Supermicro’s announcement of a blade enclosure that has up to 2,880 x86...

HOWTO: Reconfigure MySQL to use innodb_file_per_table with zero downtime

InnoDB is a very good storage engine for MySQL that combines reasonable performance with wide popularity and, as a consequence, a good set of...

Red Hat Enterprise Linux 6 Hits the Streets

  It's tough to keep a secret in the Linux community. There was very little surprise yesterday when Red Hat announced Red Hat Enterprise Linux...

How to Configure Wireless on Any Linux Desktop

  If you are a mobile Linux user one of the first things you need to do is to connect that mobile device to a...

Do Away with PowerPoint with S5 on Linux

  Public speaking and giving presentations are stressful enough for most folks — why add to that with complex software and worries about platform compatibility?...