Home Search

install - search results

If you're not happy with the results, please do another search

Namib Linux Makes Arch Linux a Dream for New Users

Let’s not mince words here. Arch Linux is a challenge to install. If it weren’t, we wouldn’t have so many distributions, such as Anarchy,...

Linux LAN Routing for Beginners: Part 2

Last week we reviewed IPv4 addressing and using the network admin's indispensible ipcalc tool: Now we're going to make some nice LAN routers. VirtualBox and KVM are wonderful...

How to Manage Kubernetes Apps with Helm Charts

Helm can make deploying and maintaining Kubernetes-based applications easier, said Amy Chen in her talk at KubeCon + CloudNativeCon. Chen, a Systems Software Engineer...

Endless OS Helps Tear Down Linux Wall

The Endless OS community's goal is to build a global platform for digital literacy. Its EOS Shell desktop is a big factor in making...

Plasma Mobile Could Give Life to a Mobile Linux Experience

In the past few years, it’s become clear that, outside of powering Android, Linux on mobile devices has been a resounding failure. Canonical came...

It’s HTTPS or Bust: How to Secure Your Website

Come July 2018, with the release of Chrome 68, any site not protected with Secure-Socket Layer/Transport Layer Security (SSL/TLS) will be marked with the red-triangle...

Linux LAN Routing for Beginners: Part 1

Once upon a time we learned about IPv6 routing. Now we're going to dig into the basics of IPv4 routing with Linux. We'll start...

Protecting Code Integrity with PGP — Part 2: Generating Your Master Key

In this article series, we're taking an in-depth look at using PGP and provide practical guidelines for developers working on free software projects. In...

A Look Into the Kubernetes Master Components

This blog post looks at the most important control plane components of a single Kubernetes master node — etcd, the API server, the scheduler...

AT&T Puts Smart City IoT ‘Edge’ Computing On Direct Dial

Technology platforms in the post-millennial era are heavily characterized by their use of automation and optimization techniques. As we increasingly analyze our software in...