Linux / Unix Security, Administration, Virtualization and More Tweet Getting Started Getting Started with Linux Linux/UNIX Command Fundamentals and the File System Unix Text Processing — Free download of a classic textbook covering basic intro through document production with nroff, troff, etc. Chapter 2: UNIX shell fundamentals, Chapter 3: Learning vi, Chapter 7: Advanced editing, Chapters 11, 12: More fundamental commands, Chapter 13: awk Linux Installation, Booting, and System Design How Linux Boots, Run Levels, and Service Control — init, Upstart, and systemd BIOS / POST Beep Error Codes Rescuing a Linux System with an LVM Root File System Upgrading: Red Hat Enterprise Linux / CentOS 5–6–7 Linux Performance Tuning: Storage and Networking How to Migrate a System from Red Hat Enterprise Linux to CentOS UEFI and Secure Boot Reconfigure the Keyboard and Mouse CentOS Linux on an Alpha User and System Administration Commands Linux System Administration — The Core Set of Commands How to Build Binary Packages from Source Display the word count in the vi/vim statusline Package Management on Linux, BSD, and Solaris — A Phrase Book for rpm/yum/urpmi, apt-get/dpkg, pkg, pkg_*, and pkg* Command-Line FTP Vi editor manuals and tutorials Ext3fs details, including recovering deleted files IBM Technical Library "Anatomy of..." articles on Linux: loadable kernel modules, file systems, flash devices, SELinux, real-time Linux architectures, SCSI, networking stack, etc. Linux and BSD repository statistics Building Kernels and Other Open-Source Software How to Build Linux Kernels Exploring Linux sysfs and the PCI Buses How to Build OpenBSD Kernels and Upgrade How to Create and Use Patch Files for RPM Packages Exploring the Linux Kernel How to Build Linux kernels on Alphas Networking TCP/IP Configuration Commands for Linux, UNIX, Android, Apple OS X, Windows, and Cisco IOS Running IPv6 on Linux with a Motorola/Arris Surfboard cable modem connected to Comcast How to set up and use SSH Speeding up data transfer with tar and SSH WPA2/802.11i Wi-Fi/WLAN Wireless Networking on OpenBSD Kerberos, LDAP, Samba, and Active Directory How to build an Active Directory server from Samba running on FreeBSD on a Raspberry Pi Linux and Security How to Use Let's Encrypt ECC and RSA TLS Certificates on Google Cloud How to Use a Let's Encrypt TLS Certificate on GoDaddy Shared Hosting How to harden the TCP/IP protocol stack by tuning the kernel How to break into Linux (and how to prevent this) My general computer / network security page How to harden a Linux or BSD installation US DoD / DISA STIG Compliance For Linux Analysis of multiple intrusions into a poorly configured Linux system File System Design for Performance and Security How to set up and use SSH Secure Distributed Logging with Syslog, TLS, and Amazon EC2 Cloud Servers How to set up encrypted storage on Amazon EC2 How to make sendmail use SSL/TLS whenever possible Linux and Security Blog — Thoughts from Time to Time on Linux, Security and the Cloud How to build an Active Directory server from Samba running on FreeBSD on a Raspberry Pi OpenBSD Running OpenBSD on low-end Dell laptops: installation and some KDE/KDM tricks WPA2 / 802.11i Wi-Fi/WLAN Wireless Networking on OpenBSD How to Build Wireshark on OpenBSD How to Build OpenCV on OpenBSD How to Build OpenVAS on OpenBSD How to Build Rainbow Crack on OpenBSD Web and Electronic Mail — Firefox, Chrome, Thunderbird and Apache How to migrate your e-mail from KDE KMail to Mozilla Thunderbird How to Change Thunderbird's Default Browser: Firefox vs Chrome Using BitTorrent Magnet Links with Firefox and Chrome How to analyze Apache logs in detail with basic UNIX commands How to visualize Apache logs with color How to enable compression with mod_gzip in Apache How to create and install keys and certificates for a secure Apache web server How to password-protect Apache web pages Devices and Multimedia Building a Media Player with Kodi, Linux, and the Raspberry Pi Using Multi-Terabyte Disks with Linux /dev/random on Linux and other UNIX family operating systems — How does it work, how random is it, what about adding a hardware random number generator? Fix for: My Microphone Is Not Working Digital Cameras, Linux, and BSD Linux on Blu-ray Players How to Add MP3/MPEG Support to Red Hat, CentOS, Fedora, Oracle, and Scientific Linux Adobe Flash Plugin on Older Non-SSE2 CPUs How to download YouTube videos and convert them to XviD and DivX Using a Canon PIXMA Multifunction Printer / Scanner with Linux Solve the Xsane problem: Failed to open device, invalid argument Change the printer "Ready" message to whatever you want Fixing the Problems Causing Warning and Error Messages Warning Messages About Font Aliases Having multiple <family> in <alias> isn't supported and may not work as expected Error Messages About Missing GTK Modules Failed to load module "libcanberra-gtk-module.so": libcanberra-gtk-module.so: cannot open shared object file: No such file or directory Raspberry Pi Hardware and Background Linux and other operating systems on a low-cost 86×54 mm board Networking Wired and Wireless, IPv4 and IPv6, Static and DHCP, WPA2-PSK Security Vulnerability Scanning Building an OpenVAS Vulnerability Scanner On the Raspberry Pi Network Storage Building a Network-Attached Storage Appliance with a Raspberry Pi ADS-B Flight Tracking with a Raspberry Pi and USB-Connected Software-Defined Radio How to build an Active Directory server from Samba running on FreeBSD on a Raspberry Pi Building a Media Player with Kodi, Linux, and the Raspberry Pi Virtualization Commands for Linux Virtualization: chroot, LXC, Docker, QEMU/KVM, virsh, and XML definitions of virtual machines VMware Networking How to Build VirtualBox on Linux How to install the QEMU emulator and Linux on a USB device, so you can run Linux within a window on a hosting machine running Linux or BSD or Windows How to install and run Windows within the QEMU emulator on an OpenBSD or Linux desktop CyanogenMod on Samsung Galaxy Smart Phones How to install CyanogenMod on the Samsung Galaxy How to solve the "Insufficient Storage Available" problem on Android and CyanogenMod How to take a screenshot on the Samsung Galaxy How to set custom ringtones, alarms and notification sounds on a Samsung Galaxy SIM unlocking the Samsung Galaxy Installing a local SIM How to connect the Samsung Galaxy to Linux or OpenBSD How to run an SSH server on CyanogenMod How to block calls from telemarketers How to access the secret test menu Other Varied Linux/Unix Topics Linux/Unix tips and tricks EIDE / PATA / SATA / USB / Floppy cable pinouts Learning Tree course 144 supplemental material Learning Tree course 1901 supplemental material Learning Tree course 1902 supplemental material The Evolution of Computers: Software and Coding USENIX, The Advanced Computing Systems Association, has made all their conference proceedings available to everyone Self-Service Linux — Mastering the Art of Problem Determination, 456 Page: Free Download Windows, if we must How to Multiboot OpenBSD and Windows Fixing the PATH on Windows so you can easily run useful software that you had to add Installing Office 2007 on Windows XP — Dealing with: "The specified program requires a newer version of Windows" Oddities The Gallery of Epic Fail and Crash Dump Screens UNIX the Supermodel UNIX the Fire Extinguisher Linux the Laundry Detergent The Gospel of Tux Biblical Unix What might be Windows Vista source code How does one patch KDE2 under FreeBSD? Как пропатчить KDE2 под FreeBSD? The Doom that Came to Puppet — Posts generated by a Markov chain trained on the Puppet documentation and the assorted works of H. P. Lovecraft. "Puppet is an open-source next-generation server automation tool. It is composed of a viscous jelly." "Place this schema into your schema directory, on Debian for example this would be the mighty beetle civilisation." "I was awake and dreaming at the same time, which is why this only works for local variables." "Puppet's Resource Abstraction Layer (RAL) allows you to retrieve much of the archaic life and lore of the primal planet." "The official Puppet Labs packages will install it as a monstrous cylindrical tower." "This document is currently being used in production at several large sites, but there are some experiences and intimations which scar too deeply to permit of healing, and leave only such an added sensitiveness that memory reinspires all the original horror."