Who should read this article? Everyone who is interested in computer security and computer networking. Introduction If you run a network small or big, you need a flexible and productive way to monitor network traffic. You need to provide security to machines connected to your network, especially if you have a wi-fi network. Monitoring the […]
Did you know that Unix and Linux has no concept of a file extension? What is a file name extension? A .txt extension tells us that it is a TEXT file and .pdf extension tells us that it is a PDF file. By following this logic, you understand that a file name extension is the […]
The usage of MySQL for development is free. As you are not giving away that product (MySQL), no GPL restrictions apply. If you want to distribute MySQL in some form, the licenses apply. See: MySQL commercial license MariaDB is a community-developed fork of the MySQL relational database management system, the impetus being the community maintenance of its free status under the GNU […]
“I am having problems in connecting the Galaxy Tab to Ubuntu via USB cable.”; This is a common question around the web and specially in android forums. Sometimes you need to transfer files from your computer to your android device and vice versa.
My intent is to introduce new Linux users to the Linux command line shell and make them feel comfortable with the command line environment. What does it happen when you click a button with your mouse? When you click a button a command is executed and interpreted by the shell. What is a shell? A […]
The minimum you can do to protect yourself is to avoid weak passwords. In most cases people do not know what weak passwords are and why are called such. Passwords that can be easily guessed or cracked are called weak passwords. Many security breaches worldwide are often the result of poor password choices. These poor […]
We have not really seen any large changes or updates in the Linux kernel for quite some time. This is actually a good thing as it shows that Linux has become a strong, robust and mature kernel. Development of the kernel progresses fast these days. And there is always plenty going on in the background. […]
If you have lot of developers or programmers who access your servers frequently in your company and if you wanna to keep an eye on what data they are accessing, what commands they are issuing, how long they have been accessing servers and how much system resources are consumed by them, then psacct or acct […]