36 private links
Ce document est un guide de préparation et déroulement pour toute activité d'installation Linux ou logiciels libres.
This is a project to anonymously collect hardware details of Linux-powered computers over the world and help people to collaboratively debug hardware related issues, check for Linux-compatibility and find drivers.
Liste des prochains InstallFest / Installe-o-thon Linux
#Pretalx is an open-source conference organising tool that allows you to manage everything from simple one-day conferences to huge week-long events with dozens of rooms and involved, double-blind review processes.
Pretalx is Free Open Source available under the Apache License 2.0.
DF files are great for sharing documents, but they are not easy to edit or convert into other formats. If you want to convert a PDF to Markdown format (while keeping the images), this guide will show you how to do it using poppler-utils and pandoc, two powerful open-source tools used for document processing.
“Amigurumi (編みぐるみ?, literally knitted or crocheted plush) is the Japanese art of knitting or crocheting small animals and anthropomorphic creatures.” Wikipedia
Here you'll find my amigurumi plush creations inspired by mascots, Linux logos and other computer systems, crocheted in 100% cotton and stuffed with anti-mite synthetic wadding.
Ideal for decoration, key rings
:muscle: Ubuntu 18.04 setup & customization routine for developers. - utkuufuk/ubuntu-on-steroids
The Secure Shell is widely used to provide secure access to remote systems, and everybody who uses it is familiar with routine password access. This is the easiest to set up, is available by default, but suffers from a number of limitations. These include both security and usability issues, and we hope to cover them here.
In this paper, we'll present the various forms of authentication available to the Secure Shell user and contrast the security and usability tradeoffs of each. Then we'll add the extra functionality of agent key forwarding, we hope to make the case that using ssh public key access is a substantial win.
This article describes a method how to use a #USB memory device as an #authentication token to log in into a #Linux system instead of traditional #password. This can be accomplished by use of Pluggable Authentication Modules ( PAM ) and some sort of USB storage device such as USB memory stick of Mobile phone with SD card attached.
Document PDF (80 pages)
Ubuntu, Tux (Powered by LINUX) and Android PC stickers
SLIMBOOK is the Linux-friendly ultraboook that now comes with a more powerful hardware. Completely renovated, the KDE SLIMBOOK II is also completely better.
KDE Neon, the best operating system for PLASMA, has also been renewed with incredible innovations, better performance and hundreds of new features.
Microsoft started the war against Linux at least as far back as 1996. It has been going on for 15 years or more:
http://groups.google.com/group/comp.os.linux.advocacy/msg/67a9771825742ab0
Microsoft doesn't even deny any of the tactics below. In fact, they have defended these activities in court hearings and commission hearings as "typical of the PC industry", because they control the PC industry.
Since the adoption of Kernel 2.6, Linux has used the udev system to handle devices such as USB connected peripherals. If you want to change the behavior when you plug something into a USB port, this section is for you. As an example, we will use a USB thumb drive but these methods should translate to any device handled by udev. As a goal for this exercise we decided to create a symlink and execute a script when a specific thumb drive was loaded. The operating system we used for this exercise is Ubuntu 9.04 Jaunty Jackalope.