Boxee Box Review
For many, the Internet has become a preferred source of entertainment. With offerings like Netflix, VUDU, Hulu and digital downloads, even once loyal cable television subscribers are abandoning…
Create an ISO Image File in Linux
Have you ever wanted to create an identical copy of an original CD, DVD, or Blu-ray disc? By using the following commands, contents of an optical disc or local directory can be perfectly…
Wacom Intuos4 (Medium) Review
The Wacom Intuos4 graphics tablet is a pressure sensitive computer input device that allows free-hand drawing, similar to traditional pencil and paper artistry.
In this review we're going…
Find All Large Files On A Linux System
The best way to find large files on your Linux system is to use the command line. This HowTo will suggest a few methods for listing such files in specific directories or complete file systems.…
Move Ubuntu 10.04 LTS Window Control Buttons From Left To Right Side
When Ubuntu 10.04 LTS (Lucid Lynx) was released in April 2010, you may have noticed the Maximize, Minimize & Close buttons have been moved from right to left corner in the default Desktop…
ATI Radeon HD 5770 Review
Last fall AMD unleashed four new graphic cards based on their Evergreen GPU architecture. First introduced was the high-end Radeon HD 5870, quickly followed by the launch of the Radeon HD 5850,…
Seagate Constellation Hard Drive Review
Known for their reliability and industry's firsts, Seagate is once again leading the way in enterprise-class storage solutions with the introduction of two new drive models, the 2.5-inch…
SilverStone 3.5 to 2.5 Bay Converter Review
As Solid State Drives (SSD) drop down in price each month, more and more consumers are adopting the technology by swapping out their old hard drives. But many end up being disappointed with their…
Recover a root password on Linux systems
This HowTo will guide your through successfully recovering (resetting) the root password on most Linux based systems.
Generally all Linux distributions now use GRUB bootloader, but for…
SSH public key authentication
This How-To will walk you through setting up public key authentication over SSH. Using key-based authentication instead of passwords means you don't have to give away system passwords. There are…