HTML Tidy GUI Front-End for Ubuntu linux
HTML Tidy GUI Front-End for Ubuntu linux 1) sudo apt-get install tcl8.4 2) sudo apt-get install tk8.4 Download This File sudo ./install ...
Continue reading ...HTML Tidy GUI Front-End for Ubuntu linux 1) sudo apt-get install tcl8.4 2) sudo apt-get install tk8.4 Download This File sudo ./install ...
Continue reading ...Debian Helper Scripts come in handy, This package include the famous “service” command to conveniently restart programs. The service command is something that get pre-installed in Fedora therefore, on a switch to Ubuntu or Debian, these scripts will come in handy to maintain a sense of consisten...
Continue reading ...Q. What is Chromium? A. Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all Internet users to experience the web. The Chromium codebase is the basis for Google’s Chrome browser. Q. Are there native Linux and Mac versions of Chromium availabl...
Continue reading ...How to Secure Squid Proxy? Configure an NCSA-style username and password authentication lets assume that squid is installed and working fine following the guide here Tip: Before going further, test basic Squid functionality. Make sure squid is functioning without requiring authorization Step # 1...
Continue reading ...Install Squid on CentOS / RHEL 5 $ yum install squid Prompt: Install ( x ) Package(s) Total download size: ( x ) M Is this ok [y/N]: Answer y then hit Enter Key Installing: squid ######################### [1/1] Installed: squid.i386 2.5.STABLE14 Complete! Squid Basic Configuration Squid con...
Continue reading ...Fake E-mail ( How to Fool UUCP) HOW DO I MAKE FAKE MAIL (OR HOW DO I FOOL UUCP)? 1. Telnet to port 25 of any internet server (eg. telnet site.name.and.address 25) 2. If at all possible, AVOID TYPING "HELO". 3. Type: rcpt to (person to receive fake mail){ENTER} 4. Type: mail from (fake name and...
Continue reading ...The hosts file is a computer file used to store information on where to find a node on a computer network. This file maps hostnames to IP addresses. The hosts file is used as a supplement to (or instead of) the domain name system on networks of varying sizes. Unlike DNS, the hosts file is under the ...
Continue reading ...Linux Mint Server Hacked last August 15th, the server of the Linux Mint distribution was hacked and code was injected to install a trojan called JS/Tenia.d If you visited linuxmint.com between August 13-15 they recommend you to scan your computer to make sure this trojan isn’t present. As this att...
Continue reading ...