“Some people report better performance using KVM. I haven’t benchmarked KVM agains VirtualBox, but I found they both performed adequately on my AMD Athlon. VirtualBox is certainly the slicker of the two: if you run the free-as-in-beer guest extensions, desktop integration is fantastic. I will say I prefer the KVM pure CLI management interface. VirtualBox has notions of tracking virtual machines in a registry while in KVM you specify the hardware specs on invocation. The only thing that’s preserved on VM reboots is the hard drive. So converting a VM from VirtualBox to KVM really means converting the hard drive image…”
“Join us as we discuss Docker and linux containers…”
“Few weeks ago we wrote about the release of Intel Linux Graphics Driver that can be installed in Ubuntu 12.04 and 12.10 to ensure the best user experience when using Intel Graphic hardware. That post can be found @ http://www.liberiangeek.net/2013/03/intel-releases-linux-graphic-drivers-installerhow-to-install-it-in-ubuntu/
The previous post shows you how to manually install the drivers. This post on the other hand is going to show you how to add the driver’s repository so that it can be updated everytime you run system updates. In Ubuntu and other Linux based OS, the best way to get quick support and the latest updates for software installed on your machine is to add its repository…”
“By default, SSH already uses a secure data communication between remote machines, but if you want to add some extra security layer to your SSH connections, you can add a Google Authenticator (two-factor authentication) module that allow you to enter a random one-time password (TOTP) verification code while connecting to SSH servers. You’ll have to enter the verification code from your smartphone or PC when you connect.
The Google Authenticator is an open-source module that includes implementations of one-time passcodes (TOTP) verification token developed by Google. It supports several mobile platforms, as well as PAM (Pluggable Authentication Module). These one-time passcodes are generated using open standards created by the OATH (Initiative for Open Authentication)…”
“Swiss Army Knife of networking netcat is a versatile tool that is able to read and write data across TCP and UDP network . Combined with other tools and redirection it can be used in number of ways in your scripts. You will be surprised to see what you can accomplish with Linux netcat command.
What netcat does it opens the connection between two machines and give back two streams. After that everything is up to your imagination. You can build a server, transfer files, chat with friends, stream media or use it as a standalone client for some other protocols.
Here are some of the usage of netcat…”
“Reverting a file can be a little confusing in git because git uses a different model than, say, SubVersion. You are in a catch-22 because to learn the model you need to know the terminology. To learn the terminology you need to know the model. I think the best explanations I’ve read so far have been in the book Pro Git, written by Scott Chacon and published by Apress. Scott put the entire book up online, and for that he deserves a medal. You can also buy a dead-tree version…”
“The default CentOS installation provides many security features that are not enabled by default and that we all should take benefit of. Here are some to consider…”
“This tutorial is a three part series as an introduction to Bash Shell Scripting. Part I is mainly basics of shell scripting and is generic, Part II will gradually move towards some more advanced techniques and focus mostly on the bash shell and finally in Part III we will try to use all the techniques to create working program.
“Going though some log files the other day I came to a realization. Most modern machine are muti-processor machines and they are rarely used as such. I had a boat-load of log files that had been archived I had to go though. It was taking forever to un-compress each one by one. At first I thought I would just make a loop, send all the gunzip processes to the background and wait for them to be done…”
This is what the Lua program looks like for creating a new disk image from scratch…”