Home Search

install - search results

If you're not happy with the results, please do another search

Tips and Tricks for Making VM Migration More Secure

A challenge for any cloud installation is the constant tradeoff of availability versus security. In general, the more fluid your cloud system (i.e., making...

Using Grep-Like Commands for Non-Text Files

In the previous article, I showed how to use the grep command, which is great at finding text files that contain a string or...

How to Keep Hackers out of Your Linux Machine Part 3: Your Questions Answered

Articles one and two in this series covered the five easiest ways to keep hackers out of your Linux machine, and know if they...

4 Open Source Configuration Management Tools for DevOps

In the past, maintaining technology infrastructure, deploying applications, and provisioning environments involved many manual, iterative tasks. But in today’s DevOps arena, true automation of...

GPIO: Displaying currency exchange rate on 7-segment indicators

About the Application This tutorial is dedicated to the control of 7-segment LED indicators by means of a single Tibbit #00_1 and several shift register...

Linux Security Threats: The 7 Classes of Attackers

Start exploring Linux Security Fundamentals by downloading the free sample chapter today. DOWNLOAD NOW Organizations today are facing a worldwide security workforce shortage -- and hurting for...

Understanding Unikernels

When we describe a typical operating system kernel on a typical machine (be it physical or virtual), we are normally talking about a distinct...

Simple Card-based Access Control

About the Application This project implements a very common access control device. The LTPS is equipped with Tibbit #08 (clock/data and Wiegand interface). It gets...

5 Linux Desktop Environments on the Rise for 2017

With each passing year, the Linux desktop ecosystem shifts and morphs from one darling to the next. Although it’s sometimes challenging to tell, from...

Google Chromecast To the Rescue

In order to be suitable for business class use, particularly in regards to replacing outdated, clumsy, and prone-to-failure business presentation methods, a product must...