Many organizations are drawn to Internet telephony’s promise of cost savings, and its ability to move data, images, and voice traffic over the same connection. Asterisk, an open source system than runs on Linux, offers the best option. This guide covers installing, configuring, and integrating Asterisk with existing phone systems, without the need for additional […]
What is Linux From Scratch? Linux From Scratch (LFS) is a project that provides you with step-by-step instructions for building your own customized Linux system entirely from source. Linux From Scratch isn’t a distribution in the traditional sense of the word, but rather a book containing a set of instructions for building a base Linux […]
TestDisk is a powerful free data recovery software! It was primarily designed to help recover lost partitions and/or make non-booting disks bootable again when these symptoms are caused by faulty software, certain types of viruses or human error (such as accidentally deleting a Partition Table). Partition table recovery using TestDisk is really easy. TestDisk can […]
How to test the JAve version on Ubuntu kartook@K:~$ kartook@K:~$ java -version java version “1.6.0_18” OpenJDK Runtime Environment (IcedTea6 1.8) (6b18-1.8-0ubuntu1) OpenJDK 64-Bit Server VM (build 14.0-b16, mixed mode) kartook@K:~$
A 90-year-old man said to his doctor, “I’ve never felt better. I have an 18-year old bride who is pregnant with my child. What do you think about that?” The doctor considered his question for a minute and then said, “I have an elderly friend who is a hunter and never misses a season. One […]
This is something every sysadmin knows, or shoul know, but maybe Desktop Linux users does not know. Yes it is not too useful for Desktop users anyway but, in case you do not know and might need to enable or disable the loggin ability of some users here is how to. First let’s see why […]
Whilst Adobe provide a 32bit version of their Adobe Air application for Linux, a native x64 version remains a dream. Thankfully, with few installed dependencies, the 32bit version will happily run on a 64bit installation too Step 1 . Get Air, Get Dependencies First things first – you will need a copy of Adobe Air […]
John Stewart said in the Cisco 2010 Midyear Security Report that the hacking industry is now so advanced that malware writers are copy-protecting their own wares and are better funded and more astute than the forces of IT security. “Why do hackers succeed? They’re lucky, they’re patient and they’re brilliant. They’re also better funded […]
To setup Windows Active Directory authentication run the following command replacing “mydc01″ your domain controller name. Replace “mydomain.com” with your domain name. You can add redundancy by adding multiple domain controllers by running the command again with the other server names /usr/sbin/esxcfg-auth –enablead –addomain=mydomain.com –addc=mydc01.mydomain.com –krb5realm=mydomain.com –krb5kdc=mydc01.mydomain.com –krb5adminserver=mydc01.mydomain.com –krb5enable /usr/sbin/esxcfg-auth –enablead –addomain=mydomain.com –addc=mydc02.mydomain.com –krb5realm=mydomain.com –krb5kdc=mydc02.mydomain.com […]