Install KDE in FreeBSD 9.x
Some people like to play with FreeBSD and to use it like a desktop operating system. Normally, FreeBSD is a text mode server OS...
10 ‘cat’ Command Examples for Beginners
"cat" is one of the commands that is used mostly in our everyday activities, so far as the terminal is concerned. It is mostly...
vnStat PHP: A Graphical Frontend for vnStat Network Bandwidth Monitoring Tool
We have already shown you how to install and monitor network interface bandwidth usage using vnStat in our previous article. Since vnStat command is...
How to Monitor Network Bandwidth with vnstat
There are many tools available to monitor our network bandwidth usage at a particular date and time. Those tools will collect and send the...
How to Compile and Install a Linux Software from Source Code
Most often we do install software from the terminal by the help of apt-get, rpm, yum, Ubuntu Software Center (GUI) and other forms on...
Ten ‘Find’ Command Examples for Beginners
find command is used for locate files in a directory hierarchy on Linux/Unix systems. You can search for files according to name, owner, group, type, permissions,...
Scrot: A Command-Line Screenshot Tool
There are a lot ways to take screenshot in Linux. scrot is a very useful command-line tool for taking screenshots.
scrot is pre-installed in most...
Ten ‘Top’ Command Examples
The "top" command provides a dynamic real-time view of a running system. It can display system summary information as well as a list of processes or...
Copying Files to Multiple Systems Simultaneously with PSSH
Have you ever wondered if there is a simple way to copy files and run commands on multiple machines from one command?
Well there are...
Install Tripwire Intrusion Detection System (IDS) on Linux
Tripwire is an open-source security and data integrity tool useful for monitoring and alerting on specific file change(s) on a range of systems. If any...
Block SSH Brute Force Attacks Using SSHGuard
SSHGuard is a fast and lightweight monitoring tool written in C language. It monitors and protects servers from brute force attacks using their logging...
ClusterSSH: Manage Multiple SSH Sessions on Linux
ClusterSSH is a Cluster administration tool via SSH. It is used to control number of xterm windows via a single graphical console window to allow commands...
Setup the Raspberry Pi as a NAS
The Raspberry Pi is a great device with many possibilities and one such great use is as a NAS server for your LAN.
The Raspberry...
Determine Your Specifications from Command-Line
We recently published article about how to determine your computer's architecture via GUI. Today am going to show how to do the same thing...
Setup Backup Server Using rsnapshot
rsnapshot is a filsystem snapshot utility written in Perl. It is a remote backup utility used to take single or multiple backup of filesystems...
Dictionaries in Python
A dictionary is a container that stores Python objects and each item of the dictionary consist of a key and value. Python dictionaries are...
Lists in Python
What are lists in Python? Lists are one of the six built-in types of sequences in Python programming language. A sequence is the most...
Argument Handling in Python
Argument handling gives user the chance to interact with the script and use it for different tasks. Two ways to do this in Python...