SSH Hacks
This article provides information on issues related to the secure shell (ssh) including:
This article provides information on issues related to the secure shell (ssh) including:
You can verify that your hard disk does not contain any defect sectors by performing a disk selftest using SMART (replace /dev/sda in the examples with your ...
Moving rows between 2 tables
Compressing/Decompressing data streams to be compatible with java.util.zip.GZIPOutputStream, java.util.zip.GZIPInputStream compressed data.
This page introduces configuration tweaks for your linux desktop configuration.
Tools
KVM - Increase CPU and RAM during runtime
This page summarizes some resources committed to Linux desktop search:
In this tutorial we will create a Debian package for lesslog. If this program is installed, it will copy two binaries and a readme-file in /usr/local/pgsql/b...
Jhove (Jstore/Havard Object Validation Environment) is a tool that provides functions to perform format-specific identification, validation and characterizat...
Binary Data
This page presents you recommended material for programming and working in a Linux Environment.