Home Search
lin - search results
If you're not happy with the results, please do another search
Customizing a Linux System for an Autonomous Arctic Monitoring Station
Developing an embedded system for remote field duty is hard enough, but what if you had to contend with -40ºC temperatures, high winds, ice-encased...
Linux Kernel Developer: Shuah Khan
The Linux kernel development community remains extremely busy, as shown in the recent Linux Kernel Development Report, written by Jonathan Corbet and Greg Kroah-Hartman. Since the...
Squinting at ASCII on Linux
ASCII plays a much more important role on our systems than generating techno-art. Let's explore the commands that allow you to see how it...
How To Tell If Your Linux Server Has Been Compromised
A server being compromised or hacked for the purpose of this guide is an unauthorized person or bot logging into the server in order...
Linux, Open Source, and Beyond
Linux is 26 years old, and look what happened in those 26 years: everything. Now what? Linux is both shrinking and expanding.
Cloudy Linux
Cloud is...
Linux Kernel Development Cycle
The kernel development cycle has evolved so beautifully overtime that it has set an example in the open source world. Having contributed to the...
LiFT Scholarship Winners Put Linux Skills to Work Helping Others
Marie Drottar, 62, of the United States, is one of two recipients of the 2017 Linux Foundation Training (LiFT) Scholarships in the Women in...
How to Sign a File on Linux with GPG
Jack Wallen shows you how to use the open source gpg to sign documents for a cost-effective way to ensure your clients the files...
Migrating to Linux: Graphical Environments
This is the third article in our series on migrating to Linux. If you missed earlier articles, they provided an introduction to Linux for...
The Linux Commands You Should Never Use
Unless, of course, you like killing your machines.
Spider-Man's credo is, "With great power comes great responsibility." That’s also a wise attitude for Linux system...



