Home Search

lin - search results

If you're not happy with the results, please do another search

Configure “No Password SSH Keys Authentication” with PuTTY on Linux Servers

SSH (Secure SHELL) is one of the most used network protocol to connect and login to remote Linux servers, due to its increased security...

Linux Kernel 3.17 is Released With Some Nifty New Features

Linux 3.17 has finally been released after getting a surprise seventh release candidate release last week.The release is a good one for any avid...

Indian Developers Redesigning Linux Kernel With OOP, C++ Support

Meet BOSSMOOL, an effort to redesign the Linux kernel by adding object oriented abstractions, introducing a device driver framework with C++ driver support, and...

Assorted Fun Linux Command Line Hacks

Today's fun command line festivities are inspired by Command Line Magic, who hangs out on Twitter sharing excellent Linux command line incantations for all occasions....

Cumulus Linux: First Impressions

Typically, when you buy a network router or switch, it comes bundled with some version of the manufacturer's operating system. Cisco routers come with...

GNOME 3.14 Improves Linux Desktop Visual Detail, Other Features

The GNOME 3.14 desktop release is the second major update to the popular Linux user interface in 2014. Take a look at new and...

Patent Trolls Poised to Attack OpenStack, says Linux Protection Squad

Open-source cloud's own openness a problemA group established to shield Linux from patent trolls has warned OpenStack will be the next big target for...

Slide Show: 11 Smart Eyewear Devices Running Android or Linux

Google Glass wasn't the first eyewear computer, but it achieved several technological breakthroughs, especially in its sleek, lightweight construction. The much maligned device has...

Linux-Based Kano Ships Its First 18,000 Learn-To-Code Computer Kits

Kano Computing, a startup that plays in the learn to code space by adding a step-by-step hand-holding layer atop the Raspberry Pi single-board microcomputer to make hacking around...

Secure Your Linux Desktop and SSH Login Using Two Factor Google Authenticator

The algorithm used for the one time password in the Google Authenticator app is known as the Time-based One-Time Password (TOTP) algorithm. The TOTP...