- Web Server
- Control Panels
- Site Map/RSS Feeds
Using TAR with Bunzip2 files
Bunzipping and then unTARring in two steps is not convenient.
It is not necessary to use Bunzip2 and then TAR to unzip a file in two separate steps.
Tar will do the job on its own if the -j switch is used, thus:
tar xjvf linux-source<version>.tar.bz2
By the same token, you may use the -z switch with a gzipped file, e.g.
tar zxvf linux-source<version>.tar.gz
How to download only the new emails in Sylpheed
Sylpheed keeps downloading the same messages over and over again! I want to be able to download only the new messages, but have the option of re-downloading everything. How to do?
Prevent Phishing with Mutual Authentication
Phishing is a man-in-the-middle attack. While many people think using time-bound, one-time passwords will solve the problem, they are wrong as attacks will just become automated. What is required is strong mutual authentication - authentication of the host to the user as well as the user to the host. This article demonstrates how to do that using open-source software from WiKID.
How to Set up Network Bonding in Ubuntu 6.10
Network Bonding, otherwise known as port trunking allows you to combine multiple network ports into a single group, effectively aggregating the bandwidth of multiple interfaces into a single connection. For example, you can aggregate two gigabyte ports into a two-gigabyte trunk port. Bonding is used primarily to provide network load balancing and fault tolerance.
Custom Boot Menu for Windows XP
One of the first things that I do upon receiving a new windows computer is create my own custom boot menu that shows up every time I boot my machine. This is especially handy when you suspect a virus; you can reboot into safe mode and scan for it.
Using A Sandisk MP3 Player On A Linux Desktop
This article shows how to use a Sandisk MP3 player (Sansa E250) on a Linux desktop. Now I can have all the tunes I want without dropping into Windows to manipulate them.
Decision Making Using PHP Switch Statement
Today I am going to discuss Switch Statement. The basic concept of Switch is similar to the IF-ELSE statement; it helps you to write decision making code just like IF-ELSE but it is a little more organized, elegant and handy when dealing with complex logics as compare to IF-ELSE.
Set Up Postfix For Relaying Emails Through Another Mailserver
This short guide shows how you can set up Postfix to relay emails through another mailserver. This can be useful if you run a Postfix mailserver in your local network and have a dynamic IP address because most dynamic IP addresses are blacklisted today. By relaying your emails through another mailserver that is hosted on a static IP address in a data center (e.g. your ISP's mailserver) you can prevent your emails from being categorized as spam.
.htaccess Based Authentication On Subdirectories
.htaccess is used to provide facility of changing configuration per directory basis, this file can contain one or more directives that are going to be forced on the directory that contains the.htaccess file. In this howto, I will take a dummy scenario of two parallel level subdirectories and will implement password authentication on both of them. This means only those users can access these directories that have the correct username and password.
Secure your SSH deployment with WiKID two-factor authentication
In this document we are going to demonstrate how to combine two-factor authentication from WiKID with an SSH gateway server with hosted private keys to create a highly secure, auditable and easy to use remote access solution. The WiKID Strong Authentication System is a commercial/open source two-factor authentication solution.