As Solid State Drives (SSD) drop down in price each month, more and more consumers are adopting the technology by swapping out their old hard drives. But many end up being disappointed with their new purchase. Not with the SSD itself, but the fact that majority of desktop PC cases on the market today have drive bays built for 3.5-inch drives, not 2.5-inch.
This How-To will guide your through successfully recovering (resetting) the root password on most Linux based systems.
This How-To will walk you through setting up public key authentication over SSH. Using key-based authentication instead of passwords means you don't have to give away system passwords. There are several benefits for doing this. For example, it can be used to automate authentication, or to enhance security by requiring a user-generated key in addition to a passphrase. Key-based authentication also simplifies the distribution and management of login credentials across several remote systems.
Have you ever wanted to extract or view the contents of an ISO file without burning it to CD/DVD media? This Linux How-To will walk you though mounting the ISO file directly under Linux.
In this How-To we're going to walk you though changing the default SSH port on a Linux system.
Text editors are programs used to create or edit files. One of the most popular editors on Linux/Unix systems (also available for other platforms) is vi. Though it does take some time getting use to, this easy to follow HowTo will walk you through the essentials of using vi.
Anyone that has used a Windows Operating System should be familiar with Task Manager, the program that allows you to end processes and to view a dynamic display of your computer's performance. For those making the switch over to Linux here are the alternatives to Task Manager.
Have you ever had a stray process eating up all your system resources or just wanted to terminate a program? This HowTo will guide you through the steps of killing any process on your Linux system.