Enable syslog with void
In void Linux, the default is without logging. Most cases it is OK for desktop use. If you want to enable syslog service in void, you need to install: socklog-void Also to let your user have access to the logs, use: ...
In void Linux, the default is without logging. Most cases it is OK for desktop use. If you want to enable syslog service in void, you need to install: socklog-void Also to let your user have access to the logs, use: ...
I boot from a USB boot drive using UEFI. Because of the UEFI boot, it just a matter of copying the files from the alpine ISO to a USB thumbdrive VFAT32 partition. Partition may be set to EFI (but this doesn't seem to be required). Since I would like to switch between different alpine versions, I wrote a script to let me have multiple alpine versions and ...
Here we explain how to use XScreenSaver EXCELLENT screensaver hack collection with the MATE screensaver applet. Install xscreensaver and mate-screensaver On my linux distribution this creates the following directories: ...
I am running void-linux at home with musl as the standard C library. While most things work well, there is a number of programs that do not and must be using glibc counterparts. To enable this I followed this guide here: Live switching Void Linux from glibc to musl. To set-up: ...
In 15 minutes, you can develop a virtual reality application and run it in a web browser, on a VR headset, or with Google Daydream. The key is A-Frame, an open source toolkit built by the Mozilla VR Team. Test It Open this link ...
Reference: positon.org You have 2 systems and you want to set up a secure backup with rsync + SSH of one system to the other. Very simply, you can use: backup.example.com# rsync -avz --numeric-ids --delete [email protected]:/path/ /backup/myserver/ To do the backup, you have to be root on the remote server, because some files are only root readable. Problem: you will allow backup.example.com to do anything on myserver.example.com, where just read only access on the directory is sufficient. ...
Writing shell scripts leaves a lot of room to make mistakes, in ways that will cause your scripts to break on certain input, or (if some input is untrusted) open up security vulnerabilities. Here are some tips on how to make your shell scripts safer. Don't The simplest step is to avoid using shell at all. Many higher-level languages are both easier to write the code in in the first place, and avoid some of the issues that shell ...
THIS IS FOR ARCHIVAL PURPOSES. THIS IS OUT-OF-DATE backup OpenShift openshift getenv(USER) from OpenShift php ssh to {user}@{app-domain} gear snapshot > file Run gear app OpenShift migration further notes ...
Windows system administration is very mouse driven and to reach all tools you need to browse through Windows explorer. If you are like me and prefer to log on a limited privilege account and use Runas to perform admin tasks, you can open these consoles with the .msc file names. Here is a list of admin tools with their .msc file names. domain.msc: AD Domains and Trusts ...
This article goes over how to implement Single-Sign-On on Linux. It goes over the integration around the Kerberos service and the applications, like for example FireFox. Pre-requisites ...
These two hyperlinks from Lifehacker are quite useful: iPhone App Guide Android App Guide ...
-atime/-ctime/-mtime the last time a files's access time, file status and modification time, measured in days or minutes. Time interval in options -ctime, -mtime and -atime is an integer with optional sign. n: If the integer n does not have sign this means exactly n days ago, 0 means today. +n: if it has plus sing, then it means more then n days ago, or older then n, -n: if it has the minus sign, then it means less than n days ago (-n), or younger then n. It's evident that -1 and 0 are the same and both mean today. ...
Testing, code coverage, style enforcement are all check-in and merge requirements that can be automated and driven from Git. If you're among the rising number of Git users out there, you're in luck: You can automate pieces of your development workflow with Git hooks. Hooks are a native Git mechanism for firing off custom scripts before or after certain operations such as commit, merge, applypatch, ...
Yealink W52P So I was looking to replace my analog cordless phones mainly because I wanted to have a centralized way to maintain phonebooks. Right now I have two cordless phone that I have to manually enter phonebook entries on the two handsets independently. Initially I was thinking of getting small/cheap Android tablet and load it with a SIP soft phone. Trying with a couple of tablets I had was not very successful. On one hand my network topology did not work very well, on the other hand, the integration of the SIP soft phone with the directory and the other phone functions did not work as well as I expected. So when I came across the W52P, I was initially attracted to the low price. Grandstream had a cheaper phone, but it did not have remote phonebooks. After checking the documentation of the W52P, I confirmed that it did have a remote phonebook functionality. So bought it and tried it out. As a phone itself, it is about the same as the analog phones that it was replacing. The voice quality was pretty good. ...
Grandstream GXP1400 The other day I replaced an analog phone with a Grandstream GXP1400 IP phone. I think it is a great value phone. It is one of the cheapest I could find yet supports all the features I was looking. Specifically I wanted a IP phone that could: Have a remote phone directory ...
I am still to test this recipe Server Configuration First of all, we must install the following components: A DHCP server to assign IP addresses to our diskless nodes. A TFTP server to transfer the boot image (a requirement of all PXE option roms). ...
There is nothing special with GitHub and Gitorious here. This technique would work exactly the same the other way around or with other servers. In a nutshell # Inital setup git clone --mirror git://gitorious.org/weasyprint/weasyprint.git weasyprint ...
Kerberos is a network authentication protocol which works on the basis of "tickets" to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. (Source Kerberos_(protocol) ) Backups Create backup: ...
A bunch of recipes useful for an ArchLinux system environment. Mostly around system administration. Custom Repos and Packages In the repo directory, put all the packages in there. repo-add ./custom.db.tar.gz ./* ...
Sharing repositories Rewriting history Rolling back the last commit ...