Linux operating systems come with a various set of tools allowing you to manipulate the Wireless Extensions and monitor wireless networks. Here is a list of Linux tools used for wireless network monitoring tools that can be used from your laptop or desktop system to find out wifi network speed, bit rate, signal quality/strength, and more. [continue reading…]
Linux comes with a host based firewall called Netfilter. The netfilter is a set of hooks inside the Linux kernel that allows kernel modules to register callback functions with the network stack. A registered callback function is then called back for every packet that traverses the respective hook within the network stack. This Linux based firewall is controlled by the program called iptables to handles filtering for IPv4, and ip6tables handles filtering for IPv6. I strongly recommend that you first read our quick tutorial that explains how to configure a host-based firewall called Netfilter (iptables) under CentOS / RHEL / Fedora / Redhat Enterprise Linux. If you are using Ubuntu/Debian Linux, see how to setup UFW for more info. This post lists most simple iptables solutions required by a new Linux user to secure his or her Linux operating system from intruders. [continue reading…]
All major laptop (notebook) hardware is supported by Linux. The important things to take into account when looking to buy a Linux powered laptop are as follows to avoid any hardware compatibility problems. Selecting correct specification is important. In this first part, I will cover what to look out for when buying a Linux powered laptop. [continue reading…]
Linux comes with various GUI based email client to stay in touch with your friends and family and share information in newsgroups with other users. The following software is similar to Windows mail. In this post, I will list some of the best Linux email clients for desktop. Some of these clients work on macOS and Windows too.
Best email clients for Linux, macOS and Windows
Webmail interfaces allow users to access their mail with any standard web browser, from any computer, rather than relying on an e-mail client. However, e-mail client remains extremely popular in a large corporate environment, small business, home and power users. An email client (also mail user agent (MUA)) is a frontend computer program used to manage e-mail. Mail can be stored on the client, on the server side, or in both places. Standard formats for mailboxes include Maildir and mbox. The following are top thirteen fantastic pieces of cross-platform software from various projects to make your life easy with a wide variety of plug-ins/add-ons. [continue reading…]
Google has announced Google Chrome OS, which should be available mid-2010. This is a direct challenge to MS Windows operating systems. This is excellent news and it is going to tied tightly to its Chrome Web browser. Google Chrome running within a new windowing system on top of a Linux kernel. Speed, simplicity and security are the key aspects of Google Chrome OS – said Sundar Pichai, VP Product Management, in a blog post. [continue reading…]
Yet another reason to get an open source operating system.
MS-Windows 7 started edition can only runs 3 apps at a time. This is worse than MS-DOS limitations. Is Microsoft nuts? You can install Ubuntu and run as many apps you want for the Internet and office work. [continue reading…]
Linus Torvalds, Linux’s creator, dislikes the GNOME desktop. There was a big flame war(s) between Linus Torvalds and the GNOME community. At one point he claimed that – “Gnome seems to be developed by interface Nazis and that its developers believe their users are idiots“. And guess what? Who made the switch to Gnome? [continue reading…]
Linux and other Unix-like operating systems use the term “swap” to describe both the act of moving memory pages between RAM and disk and the region of a disk the pages are stored on. It is common to use a whole partition of a hard disk for swapping. However, with the 2.6 Linux kernel, swap files are just as fast as swap partitions. Now, many admins (both Windows and Linux/UNIX) follow an old rule of thumb that your swap partition should be twice the size of your main system RAM. Let us say I’ve 32GB RAM, should I set swap space to 64 GB? Is 64 GB of swap space required? How big should your Linux / UNIX swap space be? [continue reading…]
With the growing ubiquity of, and user reliance on, mobile computing devices (laptops, PDAs, smart phones, etc.), loss or theft of a device is increasingly likely, disruptive, and costly.
Adeona is the first Open Source system for tracking the location of your lost or stolen laptop that does not rely on a proprietary, central service. This means that you can install Adeona on your laptop and go — there’s no need to rely on a single third party. What’s more, Adeona addresses a critical privacy goal different from existing commercial offerings. It is privacy-preserving. This means that no one besides the owner (or an agent of the owner’s choosing) can use Adeona to track a laptop. Unlike other systems, users of Adeona can rest assured that no one can abuse the system in order to track where they use their laptop.
This looks good solution but if thief wipe the hard drive at first boot then this software will not help you. If your laptop carries sensitive data encrypt it with software.
Click here to download open source Adeona software for Mac OS X, Linux and Windows operating systems (via Linux.com)
TrueCrypt version 6.0 has been released and available for download. It is free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux system. A perfect software for laptop or desktop system which allows data be to be protected even when the OS is not active, for example, if data is read directly from the hardware.
Version 6.0x offers parallelized encryption/decryption on multi-core processors (multi-processor systems). Increase in encryption/decryption speed is directly proportional to the number of cores and/or processors. Ability to create and run an encrypted hidden operating system whose existence is impossible to prove. Ability to create hidden volumes under Mac OS X and Linux.
(Fig. 01: TrueCrypt in action [image credit TrueCrypt project])