http://www.commandlinefu.com/commands/browse/sort-by-votes
Hardening the Linux desktop Introduction Malicious attacks against computers are on the rise. Although fewer viruses have been written to attack GNU/Linux systems than Windows systems, GNU/Linux viruses do exist. Wordpress Installation on Debian - Debian Wiki Introduction This HOWTO will show you how to install Wordpress (version 2.3.1) from the Debian package manager as well as configure a Wordpress blog for multiple domains. Please note that there are other HOWTOs available for setting up Wordpress on Debian Etch but this is the method that worked best for me. YMMV. Requirements
TERMINATOR - 13 different Admin Backend pages Admin backend template that has a hell of a lot of features. It’s designed with cool “Storm Black / Aluminium” colors to make your backend even better than it is Template is touch screen ready, tested on iPad, iPhone and Android. The best thing is to click on EVERYTHING you see in the live demo! Testimonials Hi, This is the best purchase I have made on Theme Forest so far. Assorted Fun Linux Command Line Hacks Today's fun command line festivities are inspired by Command Line Magic, who hangs out on Twitter sharing excellent Linux command line incantations for all occasions. Today's assortment includes shell rainbows, Is the Internet on Fire?, Star Wars Traceroute, and creating annoying sounds from the console. Rainbows In Your Shell This little gem creates a colorful scrolling display. Ctrl+c stops it:
UncomplicatedFirewall Introduction The Linux kernel in Ubuntu provides a packet filtering system called netfilter, and the traditional interface for manipulating netfilter are the iptables suite of commands. iptables provide a complete firewall solution that is both highly configurable and highly flexible. Becoming proficient in iptables takes time, and getting started with netfilter firewalling using only iptables can be a daunting task. As a result, many frontends for iptables have been created over the years, each trying to achieve a different result and targeting a different audience. UFW in Ubuntu Ubuntu 8.04 LTS introduced ufw, and it is available by default in all Ubuntu installations after 8.04 LTS.
Blog - Extended data source options with DataTables Thu, 9th Aug 2012 Welcome to the new DataTables blog! I would like to use this section of the site to introduce various topics which are useful for DataTables and give tutorials about how to integrate some of the more advanced aspects of DataTables into your site. For my first post, I'd like to introduce one of the new features in the forthcoming 1.8 release of DataTables (which is currently in beta: available here) - that of extended data source options. This new feature in DataTables 1.8 relaxes the data formatting constraints that DataTables places on the data source.
Example uses of the Linux Command find The following examples illustrate typical uses of the command find for finding files on a computer. find / -name game Looks for a file named "game" starting at the root directory (searching all directories including mounted filesystems). The `-name' option makes the search case sensitive. Blog Archive » 7 Cool Things to Do With Linux So you’ve taken the plunge and installed Linux. You’ve followed all the HOWTOs all over the net. You’ve got your wireless card working flawlessly. You’ve got your video card working (and you’ve begun to loathe that spinning cube). You’ve installed all the “restricted” software like Adobe Flash, Sun Java and Google Earth.
Unix shell script for removing duplicate files by Jarno Elonen, 2003-04-06...2013-01-17 The following shell script (one-liner) finds duplicate (2 or more identical) files and outputs a new shell script containing commented-out rm statements for deleting them (copy-paste from here): OUTF=rem-duplicates.sh; echo "#! /bin/sh" > $OUTF; find "$@" -type f -printf "%s\n" | sort -n | uniq -d | xargs -I@@ -n1 find "$@" -type f -size @@c -exec md5sum {} \; | sort --key=1,32 | uniq -w 32 -d --all-repeated=separate | sed -r 's/^[0-9a-f]*( )*//;s/([^a-zA-Z0-9./_-])/\\\1/g;s/(.+)/#rm \1/' >> $OUTF; chmod a+x $OUTF; ls -l $OUTF
CSS3 drop shadow Until a while ago, web developers were forced to learn Photoshop or count with a trustful graphic designer to help them with things like shadows, gradients and stuff, this because there was no method to create these elements directly on CSS. Then the world saw the release of CSS3 with its fantastic features, which included of course making shadows. On this post we have gathered a big list with some of the best resources to let you know a little bit more about CSS3 shadows, you will find useful tutorials, great plugins and code examples, shadow generators and a few extra links. Android from the command-line - Antoine Amarilli's blog Something I hate about Android is that there are almost no bridges between the usual *nix command-line world and the brave new world of Java. If things had been done properly, for instance, you would be able to ssh to your phone and run a trivial bash one-liner to save the current GPS coordinates to the SD card every 30 seconds, instead of having to write a verbose Java application to do that (or installing a third-party app which will come with all sorts of bells and whistles). Also, if things had been done properly, there wouldn't be obscure terminal glitches and bizarre and gratuitous deviations from the FHS... Now, my Android phone fell, the screen broke, and I am left with a perfectly functional ARM-based computer with a lot of usable hardware, such as: Wifi with master mode supportSpeakers and headphone plugMicrophone and cameraGPSVibrator and notification LEDGSMBluetooth
Linux Directory Structure (File System Structure) Explained with Examples by Ramesh Natarajan on September 8, 2010 Have you wondered why certain programs are located under /bin, or /sbin, or /usr/bin, or /usr/sbin? For example, less command is located under /usr/bin directory. Why not /bin, or /sbin, or /usr/sbin? What is the different between all these directories? In this article, let us review the Linux filesystem structures and understand the meaning of individual high-level directories.
Log trigger It is a particular technique for change data capturing, and -in data warehousing- for dealing with slowly changing dimensions. Definition[edit] Column1, Column2, ..., Columnn Type1, Type2, ..., Typen Useful Commands For The Linux Command Line This short guide shows some important commands for your daily work on the Linux command line. arch Outputs the processor architecture. $ arch