Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
I have installed syslog-ng in my rhel5 server. I need to configure for more number of routers and switches and filtering the logs in concern router logs in concern folder, how can i do this ... please kind do needful.
Finally, I installed QGIS successfully. One of dependency of QGIS is grass. I had to look for the dependency of grass too. So, I searched the dependency. I got them. But, I don't know, why I couldn't find where the application. I will search the internet.
Remote (and secure) access to another system makes use of the ssh package.
At its simplest, this provides secure copying from one machine to an account on another remote machine:
Login to the other machine can be automated by creating a private/public key pair to sign the access. The public key is added to the authorized keys of the destination account. The private key must be kept secure.
Posted 05-07-2011 at 11:33 AM byalan_ri (Thoughts and other things about Linux, GNU, FOSS etc.)
As one can see on the site there are at this very moment;
[B]3256 screenshots online[/B]
But the fact is there are almost 30000 Debian packages out there, which suggest that there are many screenshots missing. Screenshots are very useful in Synaptic Package Manager for example, because it can obviously give you a picture of what you want to install. The process of uploading a screenshot is simple as it can be, so help make Debian better by uploading screnshots of some apps...