Logo
My Journal
Tag

unix

Tag

How to Install Chromium in Ubuntu

Q. What is Chromium? A. Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all Internet users to experience the web. The Chromium codebase is the basis for Google’s Chrome browser. Q. Are there native Linux and Mac versions of Chromium availabl...

Continue reading ...

Keeping Accurate Time on Linux: Running a Ntp Time Server

Linux operating systems are becoming increasingly popular partly due to the many advantages they have over commercial systems like Windows or OS X. Linux offers increased security (as there are only a handful of viruses that can infect a Linux based system), better stability and in most cases it is ...

Continue reading ...

Install Java Runtime Environment (JRE) in Ubuntu Hardy

Installing the Java Runtime Environment First you need to check multiverse repository enabled or not after that open a terminal window. Since you are going to be installing the JRE and the web browser plug-in, you’ll be using the following command from a terminal sudo apt-get install sun-java6-jr...

Continue reading ...

find all files of a particular size using terminal command line

The Unix find command is a very powerful tool, and this short post is intended to show how easy you can achieve something that might look complicate: to find all the files of a particular size. Let’s assume you are searching for all the files of exactly 6579 bytes size inside the home directory. Y...

Continue reading ...

Top Wireless Hack Tools Packet Sniffers

Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an abundance of free tools available on the Internet. " This Blog Post Covers all the tools and how to protect against the...

Continue reading ...

Linux File Permissions

In a multi user system you need a way to protect each user from another. One of the reasons is that a user can abuse the system for his needs, or be able to read/modify/delete another users work. Even if your using your linux box in a single-user mode you need to protect your self from making deadly...

Continue reading ...