Articles
Categories
All articles
Getting started with BASH
Here we'll cover what BASH is, some basic BASH usage, and point you toward what you need to learn to configure BASH and customise the …
Using Thunderbird for your email (IMAP vs POP3)
Use Thunderbird Mail with your email accounts to allow offline access to important email and allow the set up features such as email signing & …
How to find out if your Processor is 64-bit or 32-bit
Usually when installing a Linux distro you have the option to install either 32-bit or 64-bit. This quick guide will help you choose whether you …
How to create a bootable live CD or DVD
Creating a bootable live CD/DVD allows you to Install Ubuntu, or another Linux Distro, on your Computer or even just try it without installing it. …
How to create a bootable live USB
Creating a bootable live USB allows you to Install Ubuntu, or another Linux Distro, on your Computer or even just try it without installing it.
Preparing VirtualBox for virtual OS installations
Whether you want to install Ubuntu within Windows/Mac or install another OS within Ubuntu this guide will show you how to prepare VirtualBox for a …
VirtualBox full virtualization software
VirtualBox is a general-purpose full virtualizer, extremely feature rich, high performance and free. VirtualBox is cross platform (Linux, Mac & Windows) and is extremely useful …
Logical volume management guide
This guide will help you get to grips with the fundamental concepts of logical volume management (LVM) in Ubuntu. We'll then run through preparing disks …
Logical volume management snapshots
In this LVM (Logical Volume Management) Guide, we'll show you how to use LVM snapshots for backups and how to revert a logical volume to …
Identify disk/swap hungry processes with iotop
If you need to find out what processes on your desktop or server are doing a lot of disk I/O (reads/writes) or swapping in and …
Monitoring per process network bandwidth usage with NetHogs
Do you suspect that some process running on your box is using up a lot of network bandwidth? Would like to investigate and identify the …
Using ps to list processes (advanced)
The ps program can be used to identify problematic processes, for example you can use it to identify hung processes, cpu busy processes and memory …
Using ps to list processes (introduction)
The ps program can be used to take a snapshot of processes on your system. This post shows you some basic usage.
Using top to monitor processes
In this tutorial, we'll show you how to use top to monitor your processes in real time. Top gives an overview of what cpu and …
A FAQ style introduction to grep
The grep command is one of the best pattern matching tools available for Ubuntu and Linux users in general. This is a quick FAQ style …
An intermediate look at the find utility
Use the find command to locate files on your box that were accessed or modified recently, or to find files based on size or owner.
Find files based on their permissions
In this post we'll show you how to use the Ubuntu/Linux find command to locate files on your system based on file permissions.
Getting started with the find utility
This is the first of several posts about the "find" command line utility. Below, we'll introduce some basic practical usage to help get you started …
Performing actions on search results with the find command
Learn how the Ubuntu/Linux find command can perform actions on each result returned from a search. We'll cover actions carried out by find (itself), and …
Easy file encryption using openssl
If you're new to encryption or simply want to encrypt a file but don't want to bother setting up a public/private key pair (required by …
Encrypted data transfer using cryptcat
If you like Netcat but don't want to use it because it offers no encryption you should take a look at Cryptcat, It allows the …
GPG encryption guide part 1
Learn how to use military-grade encryption using GPG. This is the first in a series of guides that will teach you about using gpg for …
GPG encryption guide part 2 (asymmetric encryption)
This is the next post in our series of GPG guides. Here, we cover asymmetric encryption and decryption of data using the gpg command.
GPG encryption guide part 3 (digital signatures)
This GPG guide covers how to digitally sign data in various ways, explains the purpose of digital signatures, and shows how to verify them.
GPG encryption guide part 4 (symmetric encryption)
This GPG guide covers how to use the gpg command for simple yet strong symmetric encryption using various different block cipher algorithms.
Allow multiple SSH sessions over an existing connection
Enabling SSH connection sharing allows you to reuse an existing ssh connection thus saving resources and removing the need to enter a password. Here, we'll …
Installing SSH daemon (sshd)
OpenSSH is at the top of the pile of utilities you can use for encrypted data transfer. Here, we'll cover how to install the server …
Secure encrypted communications using OpenSSH
OpenSSH is an implementation of SSH (secure shell) which is used for secure communication between two machines (a client and a server). OpenSSH is the …
Secure file transfer using SFTP
In this post, we'll run through the commands that will allow you to use SFTP to securely transfer files from one machine to another using …
Securely copy files remotely using SCP
Secure copy (or scp as the program is called) is a program used to securely copy files between hosts on a network. In this post …
Using a public/private key pair for auto SSH login
In this post we cover how using a public/private key pair for SSH, you can enable automatic login to remote machines and (if you use …
Using SSHFS to securely mount remote file systems
Securely mount remote file systems easily with sshfs. Edit remote files in your favourite GUI editor locally as if they were present on your own …
Encrypt and sign email with Thunderbird using GPG
Learn how to digitally sign, verify, encrypt, and decrypt Gmail (or any other email) using the Enigmail add-on for Tunderbird Mail in Ubuntu.
BASH configuration
In this article we explain which scripts are run to configure BASH and what sort of stuff you can put in those scripts to customise …
Getting started with the CLI (command line interface)
If you are new to using the command line, this is the place to find out about what it is, what you can do with …
Handy BASH shortcuts
In this post, we'll show you some handy bash shortcuts. When you've become comfortable with using these (or at least some of them) your productivity …
Linux file permissions, chmod and umask
Understand how Linux file permissions and special mode bits work. Learn how to change these permissions using the chmod command. Find out how default permissions …
Getting started with netcat
Netcat is a utility which allows us to perform a myriad of network related tasks such as data transfer and remote command execution over any …
Terminal basics
This article is aimed at people new to Ubuntu and linux in general. It will give you some background info about what a terminal is …
User account & group management with the command line
Learn how to manage user accounts and groups. We walk through how to add and delete users and groups (normal and system). Find out how …
A FAQ style introduction to apt-get and apt-cache
Learn how to quickly install, update, remove, and search for software with the command line in this FAQ style introduction to the apt-get and apt-cache …
How to change update check fequency & automatically install security updates
This post will show you how to change how frequently your system checks for updates and ensure that you always have security updates installed as …
How to manage Ubuntu applications and PPAs via the terminal
If you are new to Ubuntu or the command line here are a few useful software related commands that will help you maintain your system …
Easily install Microsoft Office in Ubuntu
If you are using Ubuntu and need to use Microsoft Office either for compatibility reasons or out of preference this guide will show you how …