GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
There is less than 24 hours left to vote in the 2015 LinuxQuestions.org Members Choice Awards. Click here to go to the polls. Vote now and make sure your voice is heard!
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
And the trend towards so called trusted computing which opens the possibility of way too much private system access and monitoring by microsoft on the premise of worm/virus protection, a nasty not going to occur with Linux/Unix/Mac
Thank you all for your replies, and any new ones would still be great!
I will be sure to include information about the viruses and worms associated with Windows and with Linux (there are linux viruses and windows viruses can affect linux if windows and linux share a partition!) and mantainence options.
What is the Linux alternative to Defrag or is there such a thing?
What is the Linux alternative to Disk Cleanup or is there such a thing?
Is there any Linux Spyware/Adware removers/scanners? Info?
What are some good Linux Anti-Virus tools besides Bit Defender? Any front-ends?
In Linux I know of no defrag ,<edit> Linux uses the same as Mac .</edit>. There are cron tasks, daily weekly and monthly - these rotate out logs etc. Mac has an automatic file by file type of defrag, and similar crons and a native disk utility to control file permissions. There are virus type concerns, but they are minor by comparison to windows, and inherently pose less threat because of the user permission structure in all Unix type systems. Have a read in the Security Forums right here
Ooooh, Kernel structure... one of my favorite points about linux...... should that go into the terminal section? Or should it have a section of its own? Sorry, but I really don't know where it would go in the Windows section, as the Windows Kernel isn't talked about allot...
how about the "permissions" structure of the filesystem.......
UNIX/Linux thought of this concept first, and M$ stole the IDEA(so what else is new) and incorporated it into winNT, win 2K, and win XP!!!
Well, sadly, my three main comps. were hacked Saturday night, and the IDE chipsets in 2 got wrecked when the computer overheated due to the fans being turned off, so I won't be able to compare any linux distros that require install for a long time, so could anyone recommend any English Live CDs not found on http://www.frozentech.com/content/livecd.php? The more the better.
Thanks in advance!