14 items | 2 visits
*nix operating systems related topics.
Updated on Oct 19, 14
Created on Aug 12, 13
Category: Computers & Internet
URL:
Using The GNU GDB Debugger:
Table of Contents
Download: Certification Preparation Guide
Share on Twitter
Share on Facebook
Stumble this
Share via Email
Becoming a Linux Foundation Certified System Administrator or Engineer is no small feat, so to help you with your preparation, we’ve created this guide to give you some extra assistance. In this guide, you’ll find:
Some critical things to keep in mind on test day
An array of both free and paid study resources to help you be as prepared as possible
A few tips and tricks that could make the difference at exam time
A checklist of all the domains and competencies covered in the exam
This guide is full of helpful information, and best of all, it’s completely free.
Sysadmin Casts - simple bite sized sysadmin screencasts (released weekly)
Install MongoDB on Ubuntu
Overview
Use this tutorial to install MongoDB on Ubuntu Linux systems. The tutorial uses .deb packages to install. While Ubuntu includes its own MongoDB packages, the official MongoDB packages are generally more up-to-date.
I have marked with a * those which I think are absolutely essential
Items for each section are sorted by oldest to newest. Come back soon for more!
Install LEMP Server (Nginx, MySQL or MariaDB, PHP And phpMyAdmin) On Ubuntu 14.04/13.10
Practical Tmux
Today I switched over completely from GNU Screen to the more modern BSD-licensed alternative, tmux. After making sure that tmux had replacements for all Screen's key features, I took the plunge, and haven't looked back. The project's webpage has a complete list of features available under tmux, but as an everyday user of Screen, here are the major reasons I switched:
bro pages are a highly readable supplement to man pages
bro pages show concise, common-case examples for Unix commands
"Backtrack 5 Tutorial / Curso en Español"
Backtrack 5 Tutorial / Curso en Español http://t.co/ArFLDTxxWX
1. Introduction
This tutorial has been written for both vi and vim. It starts with real basics, such as cursor navigation and ends with more advanced techniques like merging files.
For every section of this tutorial there is a short video with hints to help you understand how vim / vi works. Even that I have divided this tutorial into parts from novice to the expert user, there is plenty more what vim can do to make your work with vim editor easier and more efficient.
However completing this tutorial you will give sufficient knowledge about vim / vi and its features for your daily tasks.
write down a command-line to see the help text that matches each argument
(support for control flows (if/while/etc.) and command substitutions will be added later on)
Curso Back|Track 5
El conocimiento es libre! Aprende con nuestro curso gratuito de #hacking http://t.co/8CC4LWFrqR
Material gratuito para aprender de hacking y seguridad informática http://t.co/8CC4LWFrqR #cymothoa #websploit #set
“@OMHE_org: Material gratuito para aprender de hacking y seguridad informática http://t.co/uHbZ2UdxJD #cymothoa #websploit #set”
Linux Crypto: Introduction
Posted on March 31, 2013
Cryptography for authentication and encryption is a complex and frequently changing field, and for somebody new to using it, it can be hard to know where to start. If you're a Linux user comfortable with the terminal, but unfamiliar with the cryptographic tools available to you on open source UNIX-like operating systems, this series of posts aims at getting you set up with some basic tools that will allow you to keep your own information secure, to authenticate conveniently and safely with remote servers, and to work with signed and encrypted files online.
I'll be working on Debian GNU/Linux, but most of these tools should adapt well to other open source UNIX-likes, including BSD. Please feel free to comment on the articles with details relevant to your own implementations, or with extra security considerations for interested readers.
As a disclaimer, I'm not myself an expert on cryptographic algorithms or key security. If you are, and you find an error or security problem with any of my explanations or suggestions, please let me know and I will correct it and credit you.
14 items | 2 visits
*nix operating systems related topics.
Updated on Oct 19, 14
Created on Aug 12, 13
Category: Computers & Internet
URL: