Gentoo Linux

GIMP version 2.6 has been released and available for download. It is a free raster graphics editor used to manipulate digital graphics and photographs under Linux and other operating systems. It is often used as a free software replacement for Adobe Photoshop, the most widely used bitmap editor.

{ 2 comments }

There are three ways to open any file under Gnome Linux / UNIX Desktop. gnome-open is the quickest and easiest way to open any file or url.

{ 6 comments }

Geany is cross platform (UNIX/Windows/BSD) fast, powerful, easy to use integrated development environment for PHP, Java, C and much more. If you wanted to quickly edit source code, Geany is for you. Here’s an introduction to using Geany’s built-in features, including the IDE and built-in development capabilities.

{ 1 comment }

TrueCrypt version 6.0 has been released and available for download. It is free open-source hard disk encryption software for Windows Vista/XP, Mac OS X, and Linux system.

{ 1 comment }

Linux netconsole kernel module allows dmesg output to be transmitted via the syslogd network. It is kernel-level network logging over udp allowing debugging of problem where disk logging fails and serial consoles are impractical. This is a step-by-step mini howto about netconsole configuration under Red Hat, CentOS, Fedora and Debian Linux.

{ 4 comments }

From my mailbag the other day I received an interesting suggestion about obtaining information regarding all running process and network connections remotely using inetd / xinetd : SSH client can be used to execute a command(s) on a remote UNIX box. Same technique can be used to get current network and system information using netstat […]

{ 0 comments }

A long time ago I wrote about Linux command line bittorrent client. Recently I switched from command line client to a GUI based client called Deluge. Deluge is a lightweight, open source free software and cross-platform BitTorrent client (bt client). A Bittorrent client written in Python/PyGTK which offers following benefits: [a] Full Encryption – To […]

{ 4 comments }