We’ve covered enough of the basics in our guide on shell scripting that you should feel comfortable experimenting. In this week’s installment, we’ll be tackling some of the more fun stuff, like conditions and “if-then” statements.
Linux has grown exponentially in the last 20 years; check out this then-and-now style infographic to compare everything from lines of code to user base to number of top super computers running the OS.
Technology often yields ridiculous conveniences, like being able to turn on your computer from miles away without pushing the power button. Wake-on-LAN, has been around for a while, so let’s see how it works and how we can enable it.
This week we learned how to cut a Linux PC’s boot time in half with E4rat, create a Windows event log notification system, found out how you stay connected when away from home, downloaded a free action pack of the best HTG Photoshop effects, had fun decorating our desktops with a Google+ customization set, and more.
Linux is pretty quick to boot on modern computers, but why not pare it down some more? If you’re hurting from a lack of SSD or just want to boot faster, E4rat will easily shave down your boot time.
Once a week we dip into the tips box and share some of the gems we find there. This week we’re looking at how to easily generate secure passwords with a personal algorithm, upgrade the font rendering in Windows, and manage your Android volume more effectively.
Whether you’ve been searching with Grep or looking at programs that can batch rename files for you, you’ve probably wondered if there was an easier way to get your job done. Thankfully, there is, and it’s called “regular expressions.”
Have you ever wondered where Firefox keeps all of the history it has remembered from your previous browsing sessions… not just URL’s but saved password, form data and certain preference values? The answer, quite simply, is inside of SQLite databases in your Firefox profile folder.
You’ve learned how to create scripts, use arguments, and build for loops. Now, let’s take a look at some more basic commands, text file manipulation, and redirecting input and output to files and other commands.
Apple, like most companies, doesn’t really offer Linux support, so it’s a great thing when the community can deliver much-desired functionality. By adding a repo and installing a package or two, you can get tethering working via USB or Bluetooth.
Windows Home Server (WHS) is one of the most reliable and feature rich network attached storage devices on the market. However, WHS 2011 removed some key features. If you’re looking for an upgrade without losing features, look no further than Amahi.
We’ve been covering topics on shell scripting because Linux can be put on almost anything. The versatility of the command-line shell is what really allows this, but what makes each shell different and why do people prefer one over another?
If you want to build up your geek cred, join us for the second installment in our shell scripting series. We have a few corrections, a few improvements to last week’s script, and a guide on looping for the uninitiated.
Ubuntu’s new Unity is a slick interface, but they’ve pared things down to keep it that way. Not many icons appear in the system tray, even for apps that are running. Luckily for us, there’s an easy fix.
If you’ve been using Linux for some time (and even OS X) you’ll probably have come across a “permissions” error. But what exactly are they, and why are they necessary or useful? Let’s take an inside look.
If you’re a Galaxy Tab owner you can easily install Ubuntu 10.10 on the tablet and enjoy dual booting between Ubuntu and Honeycomb.
This week we learned how to setup Rsync backups on Linux the easy way, “always keep app windows on top, pin a custom library to the Windows 7 start menu, & fixing the IE user agent”, learned what a Virtual Machine Hypervisor is, found out your thoughts on monitoring bandwidth usage, got our hands on some great Geek Deals, and more.
Most people these days use some type of online backup like Dropbox, but what if you just want the same feature, but backing up to an external hard drive instead? Here’s how to do it the easy way.
You may have seen MD5 hashes listed next to downloads during your internet travels, but what exactly are they? Let’s take a look at what these cryptic strings are and how you can use them to verify your downloads.
Whether you’re setting up a new home network or overhauling the one you’ve got, planning and mapping out your devices and intended uses can save you a lot of headaches.
Do you have folders filled with myriad of files that need a serious spring cleaning ? If you do, we have Cruftbuster, an automated self-cleaning tool for Linux, to sort out your messy folders.
Earlier this week we asked you to sound off with your love (or lack there of) for the command line. You sounded off in force and now we’re back with a comment roundup.
We’ve already shown you how to use the BitDefender Rescue CD to clean your infected PC, but what if you wanted to achieve the same thing only without a CD over the network? In this guide, we’ll show you how.
Do you know someone who is still learning about Ubuntu or is considering trying it out for the first time? Then here is the perfect book to help get them on their way. The Ubuntu Manual Team has recently completed and made av...
Angry Tux Wallpaper [deviantART]