Linux
-
Applications
- BusyBox: Creation and Usage of a BusyBox
- CPUBurn: Stress Testing Your CPU
- Crontab: Usage
- FTP: Automate Transfers
- Gnuplot: Graph Data Easily
- Linux-Unix Cheat Sheets - The Ultimate Collection
- MFi: Install a Ubiquiti server to manage powerstrips
- Mirroring a Website
- Restarting difficult services
- Task Scheduling
- Weechat: A User Friendly IRC Client
- Yubikey: Configure Your Yubikey with PAM
- ZNC: Use a Bouncer to Get History
Shell
- Batch Renaming Elements
- Chat with Users on the Same Machine via Terminal
- Command-line Burning
- Console Colorization
- Cpulimit: Limit CPU Usage
- Date: Advanced Usage of the Date Command
- Differences between du and df
- Environment Variables
- Execute Commands at Logout
- Fifo and Cat: Share a Session with Multiple Users
- Locate Large Files and Directories
- Find all dependencies related to a package
- Finding Broken Symbolic Links
- How to Kill a Crashed Application or Handle a Frozen Screen
- Ivconv: Text Transcoding to Any Character Set
- Jobs: How to Use Jobs
- Kill and lsof: Killing the process listening on a specific port
- Most Used Commands List
- MOTD: Modifying the Console Opening Message
- Pstree: List Processes as a Tree
- Redirect a Service Output to a File
- Removing Superfluous Elements in Text Files
- Screen: Most Used Commands
- Sed & Awk: Some Examples of These Wonders
- Shell: Batch Renaming with Counter
- Sipcalc: Subnet Calculator
- The find command or the power of search
- Tmux: The Terminal Multiplexer Replacing Screen
- Unix Toolbox: All Useful Commands
- Xterm: Customizing the Display
- ZSH: A Very Practical Shell
TextEditors
-
Coding & Debug
-
Desktop
- Fluxbox: Rounded Corners for All Windows
- Awesome: A Lightweight and Powerful Desktop
- Compiz: Setting Up a 3D Desktop
- Disable Sound in GDM
- Disable the PC Speaker Beep
- Export a Display or Forward an X11 Connection
- Gnome: Locked Dashboards
- GNOME Shell: Using Settings to Configure Your Desktop
- Gnome-shell: Automatic Wallpaper Change
- How to install and configure a monitoring machine for supervision
- Infinality fonts for retina display
- Numlockx: Enabling the numeric keypad at boot
- Restart X
- Synergy: Multi-screen Setup with Multiple Computers
- Using the Numeric Keypad as a Mouse with X
- Wacom: Setting up the Wacom Bamboo
- Xmodmap: Map All Your Mouse Buttons
- Zenity: GUI for Your Scripts Easily
VNC
-
Filesystems & Storage
- ACL: Implementing NT-type Permissions on Linux
- Anatomy of a Linux Filesystem
- AutoFsck: Changing Filesystem Checks on Ubuntu
- AutoSSH: Automatically Reconnect SSH Tunnels
- BTRFS: Using the Ext4 Replacement
- Clone a Hard Drive
- Filesystem Conversion
- Creating Blank Images for Testing Filesystems
- Ext3: Resize partitions without data loss
- Foremost: Recover Deleted Data
- FUSE: Unable to Mount Disks Due to /dev/fuse
- Hdparm: Optimizing Disk Access
- Incron: Execute Automatic Actions When File States Change
- Limiting I/O usage by an application
- LVM: Working with Logical Volume Management
- No space left on device while there is space available
- Optimizing Hard Disk Performance on Linux
- Parted: Solving Partitioning Problems on Large Filesystems
- Scalpel: Recovering Deleted Data
- Setting up quotas on Linux
- Smartmontools: Hard Drive Monitoring
- SWAP: Creating Dynamic Swap
- TestDisk: Recovering Lost Data
- Tmpfs: RAM filesystem or how to write to RAM
- ZFS On Linux: Setting up ZFS on Linux
LVM
Raid
- Linux RAID Performance
- Optimization of extX filesystems and RAID under Linux
- Recovering Data from a RAID1 LVM
- Software RAID Configuration
Storage Encryption
-
Kernel
- How to Check the Page Size of Your Machine
- Initramfs: Fixing Kernel Boot Issues with Initramfs
- Kernel: Module Compilation
- Kexec: Optimize Your Boot Times
- Linux Memory Management
- Linux Process and Scheduler Management
- Managing Zombie Processes in Linux
- Memory Addressing and Allocation
- Memory Caches
- Modifying Source Version
- OProfile: Profile Your System
- Process Latency and Kernel Timing
- Queueing Theory
- Recompile your kernel
- Securing Your Kernel with Grsecurity and PaX
- Strengthening Linux Kernel Security Functions
- Sysctl: Configuring Kernel Options in Linux
- SystemTap: Profile and Quickly Use Kernel Features
- Udev: Using a Socket to Communicate with Kernel Devices
- Understanding the Content of /proc
-
Misc
- Converting Unix Timestamp to Date
- Activating the Serial Port on Linux
- Enabling and Disabling Screen Savers from Command Line
- How to Check BIOS Version Without Rebooting
- Connect to Debian via Serial Port
- Creating an ISO Image
- Uncompress for Different Formats
- Disable Screen Standby on Debian
- DrawIt: A VIM Extension for Creating ASCII Diagrams
- Gentoo: Getting Started
- Gentoo: Using Portage
- Getting Hardware Information from a Machine
- GRUB: Using a Bootloader
- GS: Merge Multiple PDFs Into One
- Installing Mac OS X and Ubuntu in Dual Boot
- IRC: Setting up an IRC server with UnrealIRCD and Anope Services
- Linux Boot Process
- Linux: Launching Daemons at Boot
- Manipulating Images via Command Line
- Measuring Execution Time of One or Multiple Commands
- Activating the Numeric Keypad
- RAM Information
- Replacing an installed RedHat with Debian without formatting
- Sending Emails from Command Line
- Sudo: Running commands as root without being root
- Sysstat: Essential Tools for Analyzing Performance Issues
- Systemd: How to Debug on Boot Failure
- Understanding Time Management in Linux
- Understanding Load Average
- Vagrant: Quickly Deploy Virtual Machines
- VirtualBox: VMware Alternative
- Wine: Running Windows Applications on Linux
Debian
- Advanced Usage of Debian Packages
- Automate Debian Installation
- Broadcom Drivers and Debian
- Checking File Integrity on Debian
- Creating a Debian Repository
- Cron-apt: Automatic Security Updates Installation
- Debian: Changing Default Tools (e.g., Editor)
- Debian: GPG Error During apt-get update
- Debian: No More Dependency Errors When Configuring From Source
- Debian: Reinstalling a Server Almost Identically
- How to use old Debian repository for unmaintained Debian versions
- Installing Debian on a Mac in Single Boot
- Integrit: Add an integrity control tool on your Debian
- Modifying CPU Frequency
- Recompile a Software the Debian Way
RedHat
-
Multimedia
-
Network
- Bwm-ng: Measure Bandwidth Consumption in Real Time
- Check Connections Per IP
- Cisco VPN Client: Installation on Red Hat 6
- Configuring a Local Network on Debian and Ubuntu
- DNS FQDN Name Resolution in Local Network
- Dnsmasq and dhclient: use a specific DNS for a specific domain
- Ifrename: Renaming Network Cards Without Using Udev
- IP: Network Interface Management Command
- Iperf: Testing End-to-End Bandwidth
- IPv6: Complete Removal, IPv4 Only on Debian
- Kernel and Network: Pushing the Limits of Connectivity
- Make Network Card LEDs Flash
- Network: Creating Bonding
- Proxychains: Proxy Any Outbound Connection
- Rename Network Interfaces to ethX
- Displaying Active Machines on the Current Network
- Trickle: Limit Your Application Bandwidth
Netcat
- Netcat: Creating a Listening Port
- Netcat: File Transfer
- Netcat: Remote Partition Backup
- Netcat: Usage
OpenSSH
- Belier: Script Your SSH Connection
- Bypassing HTTPS Proxies for SSH
- Chroot SSH Accounts
- Creating a VPN with OpenSSH
- Fanout: Run the Same Command on Multiple Machines Simultaneously
- OpenSSH FAQ
- OpenSSH: Creating an SSH SOCKS Proxy
- OpenSSH: Graphical Window Forwarding
- OpenSSH HPN (High Performance): Implementation and Installation
- OpenSSH: SSH Connection Multiplexing
- OpenSSH: SSH Key Exchange
- OpenSSH : Tunneling VPN
- OpenSSH: Using Stepstones
- Reverse Tunneling with OpenSSH
- Securing OpenSSH
- Setting up an SSH Bouncer Server for Your SSH Connections
-
Packages
Debian
- Apt & Aptitude: Useful Commands
- Apt-cacher-ng: Setting Up a Proxy for APT
- Apt-file: Searching for Files That Prevent Compilation
- APT: Adding Release Preferences for Specific Packages
RedHat
-
Security
- Force User to Change Password at First Login
- Acct: The Ultimate Keyfinder
- Encrypt and Decrypt a File with OpenSSL
- Encrypting a Password with MD5
- Fail2ban: Implementing automated iptables rules to counter bruteforce attacks
- Freeze a Machine by CPU Overload
- GnuPG: Encrypt Your Emails
- Lshell: Limiting Shell Capabilities
- Secure Your Architecture with SELinux
- Ulimit: Using System Limits
- Xinetd: Securing Services