The best way to find large files on your Linux system is to use the command line. This how-to will suggest a few methods for listing such files in specific directories or complete file systems.
When Ubuntu 10.04 LTS (Lucid Lynx) was released in April 2010, you may have noticed the Maximize, Minimize & Close buttons have been moved from right to left corner in the default Desktop Theme. This Ubuntu How-To will guide you though switching position, order and alignment of these buttons back to the right hand-side.
Last fall AMD unleashed four new graphic cards based on their Evergreen GPU architecture. First introduced was the high-end Radeon HD 5870, quickly followed by the launch of the Radeon HD 5850, two cards that had many enthusiasts drooling over raw performance power. Though these cards were proven to be a great success, the premium price point was a little high.
Known for their reliability and industry's firsts, Seagate is once again leading the way in enterprise-class storage solutions with the introduction of two new drive models, the 2.5-inch Constellation and the 3.5-inch Constellation ES hard drives. Today we're going to review the Seagate Constellation SATA 500GB Hard Drive, but first let me tell you a little more about this new line-up of enterprise drives.
As Solid State Drives (SSD) drop down in price each month, more and more consumers are adopting the technology by swapping out their old hard drives. But many end up being disappointed with their new purchase. Not with the SSD itself, but the fact that majority of desktop PC cases on the market today have drive bays built for 3.5-inch drives, not 2.5-inch.
This How-To will guide your through successfully recovering (resetting) the root password on most Linux based systems.
This How-To will walk you through setting up public key authentication over SSH. Using key-based authentication instead of passwords means you don't have to give away system passwords. There are several benefits for doing this. For example, it can be used to automate authentication, or to enhance security by requiring a user-generated key in addition to a passphrase. Key-based authentication also simplifies the distribution and management of login credentials across several remote systems.
Have you ever wanted to extract or view the contents of an ISO file without burning it to CD/DVD media? This Linux How-To will walk you though mounting the ISO file directly under Linux.