Sometimes, especially when you create your own RPMs, it is extremely useful to keep them in a local YUM repository. The advantage of this is that, when you install a package, YUM automatically resolves any dependencies, not only by downloading the necessary packages from the other repositories you might have in you list, but also…
This article describes how to quickly convert the default Atom 0.3 that WordPress v1.5.2 produces to the Atom 1.0 Specification. It also provides some brief info about enhancing the Atom feed with RSS extension modules.
This guide will help you install and configure AWStats, schedule the parsing of the Apache access log files and use the statistical data to generate web traffic reports. All steps are explained in great detail.
This article will guide you through the process of using your CUPS printer by issuing commands in the terminal and also outlines the available print job options you can set in order to fine tune the final prints.
Secure your data in encrypted partitions and removable volumes, or even volumes within a file, using dm-crypt and the flexibility of LUKS. In this article I describe how I encrypted a ZIP diskette and a partition contained in a file.
How to prepare CD-RW and DVD±RW media (formatting, creation of UDF structure) and mount them for use as large floppy diskettes.
This article describes how to become your own Certificate Authority (CA) and issue your own server certificates. Be advised that noone else, apart from you, your internal network’s people or your friends, will or should trust this kind of certificates (self-signed). These are intended only for providing secure communication with your own services or for testing purposes.
This article describes in brief how to configure VNC server instances for one or multiple users on a remote machine, how to use VNC to start graphical applications on boot and finally how to enhance security by connecting to the server through encrypted SSH tunnels.
In this article I describe how to configure the SSH server, so that users authenticate using keys, how to generate DSA keys using ssh-keygen, how to configure ssh-agent and finally how to use ssh-add to manage cached passphrases.
This is a short article about the most common practices in user and group management from the command line. The information is specific to Fedora Core and Red Hat based distros, but would do for any distribution probably with slight differences in the command options.