Skina IT Solutions E.U.

Bibliografía sugerida por Ricardo Naranjo Faccini

Utilice los #hashtags para elegir el tema que le interesa.


One of the most important skills you can learn as a Linux user is how to use a manual page, or "man page."

Si estás leyendo estas líneas, no hace falta que te explique qué es Vim, cual es su curva de aprendizaje o cuales son sus principales vistudes o defectos.

Believe it or not, I use Vim as my every-day word processor. I like its simple layout and its modal design that favors keyboard commands above mouse clicks.

Aparte de los que muestra el artículo revisen también que tiene un catálogo de software en rpm muy completo, sirve para Redhat y Mageia. Los que presenta el artículo están orientados a Debian y Ubuntu.

As the workforce becomes more mobile and employers look for ways to improve productivity, collaboration software become increasingly popular. According to a June 2016 study from Markets and Markets, organizations will spend $23.39 billion on cloud-based collaboration software tools this year. By 2021, the analysts expect the market to grow to $42.57 billion, for a compound annual growth rate of 12.7 percent.

Este listado tiene muchos enlaces a las páginas web de los paquetes libres y privativos que pueden ayudar para la conferencia o la revisión.

Para el software más común hay muchas alternativas en FOSS (Free and Open Source Software)

Un directorio de aplicaciones de software libre organizado por temáticas

The number of open source applications and tools that are available on today's popular operating systems is simply mind-blowing. They come in all forms. Small scripts and console tools that can be easily integrated into large projects, feature-rich applications that offer everything a complete solution, well designed tools, games that encourage real participation, and eye catching candy.

For probably the better part of 15 years, PDF has been the de facto standard for sharing, e-mailing, and printing documents. It is a well-supported format, and Linux distributions have been able to read them since, well, since forever! The only problem is, while Windows and MacOS machines can easily buy and install Adobe Acrobat Pro, there is no native Linux version. Still, there are a few good Linux PDF editors available, and I had a go at testing them for you.

Linux users are perpetually stuck in a dilemma. While the freedom of open source is great, Linux consistently sits between 1% and 2% market share, which means industry standard programs, like Photoshop, rarely give Linux users the time of day.

These open source applications replace expensive apps for home and business users, which in some cases can free you from the burden of monthly subscription fees.
Download these open source apps for all manner of creative tasks, from video to graphic image editing.

Portable apps are great invention that not many people talk about. The ability to take any program to any PC, and continue using it is very handy. This is especially true for those that need to get work done, and don't have anything with you but a flash drive.

In this article, we feature 10 ecommerce software solutions that can make setting up an online store easier. These are all open source solutions, which means that they are completely free if you run the software on your own server. If you don't want to host your own website, many of them are also available through hosting providers for a small fee.

Like many of you, I too have found myself wooed by the convenience of using Dropbox. It's cross platform, simple to setup and provides a cloud storage option for those who might otherwise be less inclined to store files off-site. In this article I'll explore alternatives to Dropbox for Linux users.

Last year, I covered five of the best open source project management tools, like ProjectLibre and OpenProject. The article struck a chord with readers and continues to prove valuable. So, this year I revisited the tools mentioned in last year's article, taking into account comments and suggestions from readers, and provided an update on where they are today. First, I share five new open source project management tools for 2015. All in all, this article will give you a good look at 11 of the top open source project management tools out there.

For the last three years, I have rounded up the most popular open source project management tools for readers. As there continues to be major reader interest in this area, I decided to take a look back at the tools we covered in 2014 and 2015, and give you updates on all of these projects. I looked to see which projects had new releases, notable new and improved features, and more.

Taiga is one of the most popular open source project management tools out there right now. It is known for being usable and having a beautiful interface, and listed it in both the Top 5 open source project management tools in 2015 and the Top 11 project management tools for 2016.

Como ya sabréis, desgraciadamente ha comenzado la cuesta de Enero, en la cual se ponen a prueba las habilidades contables de la gente para cuadrar todas las cuentas. Éstas tareas se realizan mucho más fácilmente con un buen programa contable que con una calculadora y un papel.

The advent of digital mapping and geospatial information systems (GIS) has completely changed the way humans think about and interact with the world around them.

AutoCAD, esta plataforma desarrollada por Autodesk, es uno de los software más utilizados en el mundo ingenieril. Es la herramienta favorita de ingenieros civiles, ingenieros mecánicos, industriales, de construcción, arquitectos, y sobre todo de empresas como Habiteca que se dedican a la construcción de casas.

Primitive shapes can be used for geometric modeling of more complex shapes.

Every company has finite resources, so there is a dispute over the use of these resources by all members, this is the point, the dispute of these resources can cause problems among employees, wear and tear on relationships and unproductivity in the organization.
This discussion seems to be far from the technology, however, to solve these types of problem, many free Softwares are available and in this article, I write about a corporate tool able to help organize the use of resources in a fair and effective way.

Joplin allows you to store and organize notes, files, and more, without fear of vendor lock-in.

Hoy, Mozilla lo ha conseguido. Firefox 54 es la primera versión estable del navegador basada en el multiproceso. Eso significa que, a partir de ahora, cada pestaña tendrá su propio proceso independiente, y podrá ser asignado a cada núcleo por el sistema.

Odoo is one of the most popular and most powerful Open Source ERP business software based on the Python programming language. In this tutorial, we will show you how to install Odoo 10 on an Ubuntu 16.04 VPS. This new version of Odoo includes numerous improvements including new manufacturing apps and faster website operations.

ERPNext is a free and open source ERP software written in Python on top of the Frappe framework and includes Accounting, Inventory, Manufacturing, CRM, Sales, Purchase, Project Management, HRMS and more. ERPNext is a simple, powerful and easy to use ERP system. It comes with beautiful web interface that can be used to manage the day to day tasks from a central location.

In this guide, we'll show you how to install and configure the latest version of Prestashop on Debian 9.1 release, in order to create your free online shopping cart.

Prestashop is a free Open Source e-commerce content management platform written in PHP programming language which is often deployed on Linux under Apache/Nginx web servers, PHP and MySQL/MariaDB database management system.  Prestashop CMS is highly used today to create online shops for different businesses and advertise and sell services and merchandise.

ReportServer is a free and open source business intelligence (OSBI) platform with powerful reporting and analysis tools. It gathers data from multiple business touch points and generates different reports from the data. It provides a responsive and unified interface to display the data to the user. It provides powerful ad hoc reporting capabilities and integrates Jasper and Eclipse BIRT in one unified environment.

Matlab es una herramienta de computación matemática, nos ofrece un entorno de desarrollo integrado con su propio lenguaje de programación. Este software suele ser usado para análisis de datos, manipulación de matrices o representación de funciones, también suele ser usado como vínculo de comunicación con otros programas y otros lenguajes, incluso en programación hardware como podría ser Arduino.


Install the Ring Free Software VIOP client.


This guide covers Debian, Ubuntu, and Fedora, but Ring can be installed from source on other distributions.

Este documento pretende ser una guía para el novato en vi, al final se muestran las funcionalidades y la potencia de gvim, el cual puede ser utilizado apoyándose en el uso del ratón.
In this tutorial, we will show you how to edit files on the command line. This article covers three command line editors, vi (or vim), nano, and emacs.

So far, in our tutorials centered around Vim, we discussed the editor's Modeline feature as well as how Vim's feature-set can be expanded using plugins. However, as we all know, Vim offers a plethora of in-built features; so taking the discussion further, in this tutorial, we will discuss the available modes in which the editor can be launched.

Vim, as you might already know, is a feature-packed and powerful editor. Here at HowtoForge, we've written several tutorials on Vim, covering its basic usage, plugins, as well as some other useful features. But given the sea of features Vim offers, we always find something useful to share with our readership.

Curious about what the new Linux subsystem in Windows 10 can and can't do? Here's what we've learned about its first release

Uncomforted reports suggest Linux users may want to be careful when upgrading Windows 10

In this tutorial, we will show you how to install Redmine on CentOS 7. Redmine is a free and open source issue tracking and web-based project management application . Redmine is built on Ruby on Rails framework and it is cross-platform and cross-database. This guide should work on other Linux VPS systems as well but was tested and written for CentOS 7 VPS

Zammad is an open source helpdesk/customer support system written in Ruby. It's a web-based ticketing system with many features, including support to manage customer communication over several channels like Facebook, telegram, chat, and emails. Zammad is distributed under the GNU AFFERO General public License (AGPL) and can be installed on different platforms like Linux, AIX, FreeBSD, OpenBSD, and MacOSX. It's available on Github and is free for install on your own server.

We've just been informed today by Krita Foundation's Scott Petrovic about the release and immediate availability of the Krita 4.0 open-source and cross-platform digital painting software for Linux, Windows, and Mac systems.


Some time ago I read that one of the distinguishing characteristics of an effective system administrator / engineer is laziness. It seemed a little contradictory at first but the author then proceeded to explain why:

if a sysadmin spends most of his time solving issues and doing repetitive tasks, you can suspect he or she is not doing things quite right. In other words, an effective system administrator / engineer should develop a plan to perform repetitive tasks with as less action on his / her part as possible, and should foresee problems by using...


While downloading files, it is not uncommon to see the .tar,  .zip or .gz extensions. But do you know the difference between Tar and Zip and Gz? Why we use them and which is more efficient, tar or zip or gz?

Sin embargo yo, personalmente, utilizo y prefiero BZIP que tiene niveles de compresión superiores, para comprimir: tar jcvf comprimido.tbz2 lista de archivos; y para descomprimir tar jxvf comprimido.tbz2

Tar (tape archive ) is the most widely used command in like operating system for creating archive of multiple files and folders into a single archive file and that archive file can be further compressed using  gzip and bzip2 techniques. In other words we can say that tar command is used to take backup by archiving multiple files and directory into a single tar or archive file and later on files & directories can be extracted from the tar compressed file.

How do I use tar command over secure ssh session running on Linux or UNIX-like system?

tar is an archive utility tool for GNU/Linux. Primarily used to distribute executable software or package the software source code in the tarball for later distribution. The most popular being gzip and you might have noticed the source file of a program usually ends with *.tar.gz. Well, that doesn't mean you can't use it to create an archive for other file types. You can.

I have a lot of Linux tutorial videos in my Laptop. I wanted all of them in my Google Drive, for the sake of backup. The problem is those videos are more than 1 GiB in size. It is practically not a good approach to upload that much big files to my Google drive. Even though Google Drive allows us to upload files up to 5TB, I find it is very time consuming, because it takes lot of time to upload. While contemplating with this issue, I figured it out that it would be much better if I can be able to split those files into smaller size and upload them all one by one. I can then download all parts of the file, and combine all of them, whenever I want. This is just an example. There might be many changes that you want to break a large file into pieces and combine them later. If you ever been in this situation, afraid not. There is a simple command line utility called "split"  which is used to split the big files into multiple smaller files, and you can join all of them late to make a single file. Sounds useful? Indeed.

Today, I wanted to reinstall one of my virtual machine which is running with Ubuntu 16.04 LTS server. Before reinstalling, I tried to backup the entire system. While searching for an easiest way to do this, I found a plausible solution in Arch Linux wiki page. I never thought that it was going to be that much simple. I copied my entire root / tree with Rsync in a single line command. Yes, it is just a one line command. While there there so many tools to backup your systems, I find this method is much easier and convenient, at least to me. Also, this method is better than disk cloning with dd command. Because It doesn't matter if your hard drive is different size, or use different filesystem. This method will work in all cases.

Find out how to use rsync in a backup scenario.

Si estábais preguntándoos como poder hacer una copia de seguridad de vuestros datos en Linux, ya podéis ir preparando los discos duros. En LinuxLinks han hecho uno de sus artículos multicapítulo para hablarnos de nada menos que 21 soluciones de backup existentes para Linux.

Rsnapshot is a filesystem snapshot utility based on rsync for UNIX-like operating systems. It allows you to easily make periodic snapshots of local machines, and remote machines over ssh. The good thing about rsnapshot is it makes extensive use of hard links whenever possible, to greatly reduce the disk space required. Since rsnapshot only keeps a fixed number of snapshots, the amount of disk space used will not continuously increase. Rnapshot is completely free, and open source utility that provides incremental backups. It is written entirely in perl, and it should work on most UNIX-like systems.

This tutorial describes how to synchronize local and remote directories in Linux using Lsyncd (Live Syncing Daemon). Using Lsyncd, we can easily mirror local to local directories or local to remote directories. It will be very helpful, when you want to sync data between directories which are frequently updated with new contents. Lsyncd is designed to synchronize a local directory tree with low profile of expected changes to a remote mirror. It is especially useful to sync data from a secure area to a not-so-secure area.

FreeFileSync is a free, open source and cross platform folder comparison and synchronization software, which helps you synchronize files and folders on Linux, Windows and Mac OS.

It is portable and can also be installed locally on a system, it's feature-rich and is intended to save time in setting up and executing backup operations while having attractive graphical interface as well.

Ser precavido vale por dos. No quita mucho tiempo y nos salvará de un disgusto en caso de desastre. Es así en casi todo, y en especial en lo referente a nuestra computadora.

Backing up app data, text messages and the like in Android can be incredibly tedious, and sometimes costly too. Many apps on the Play Store promise to back up your data but are hit and miss or cost an arm and a leg. Did you know that there's a better way to do this and that it can all be done on your computer?

Open Source system cleaner application BleachBit version 2.0 has been released. The new version brings some improvements and new features to the most used system cleaning application on Linux.


Linux ha conseguido el dominio absoluto en la élite de la supercomputación. En la última lista de TOP500 no ha aparecido ningún otro sistema operativo que no esté basado en Linux, cuando en anteriores ocasiones se pudieron ver algunos UNIX e incluso algún Windows.

SUSE technologies are helping Daimler AG, the German automotive behemoth, to migrate a large proportion of its mission-critical servers from proprietary UNIX operating systems to 'the open and flexible Linux platform'.

498 out of 500 of the world's speediest supercomputers now use Linux.


Con Wine o máquinas virtuales

I am delighted to announce that CodeWeavers has just released CrossOver 17.1.0 for both macOS and Linux. CrossOver 17.1.0 has many improvements to the core Windows compatibility layer and also specific enhancements for several popular applications.


Al descargar archivos de sitios públicos se pueden obtener versiones alteradas, intencionalmente o no, del archivo. Hay formas de verificar que el archivo descargado corresponde al original proveniente de la fuente oficial.

Por ejemplo, si los servidores oficiales de Mageia están congestionados y lentos se podría descargar una versión de Mageia desde, sin embargo quedará la duda de si el archivo no corresponde exactamente con el publicado por Mageia en su sitio oficial.

Con la metodología explicada en este artículo se puede verificar que el archivo se encuentre en buen estado.

For most people, computers don't stay the same. Software is added, removed, and updated. Configurations are changed. Think about the changes you've made to your computer since the first time you booted it up. Now imagine making those changes to 10, 100, or 1,000 more computers. Configuration management tools are what make implemententing and enforcing these changes possible.

Use these tips and tricks to customize your Fedora installation and keep it running just the way you like it.

por supuesto dan pistas para otras distribuciones

Ubuntu 16.10 was recently released with some improvements. According to the poll 53% conducted on LinuxAndUbuntu, 53% users will upgrade to Ubuntu 16.10. But what to do next after you've upgraded to Yakkety Yak. In this article, I'll walk you through the 10 Things to do after installing Ubuntu 16.10.

System administration involves numerous tasks including managing users/groups and under user management, some of the minor tasks involved are adding, modifying, suspending, or deactivating user accounts, and many more.

Even though Linux is secure by design, there are many chances for the security breach. One of them is weak passwords. As a System administrator, you must provide a strong password for the users. Because, mostly system breaches are happening due to weak passwords. This tutorial describes how to set password policies such as password length, password complexity, password expiration period etc., in DEB based systems like Debian, Ubuntu, Linux Mint, and RPM based systems like RHEL, CentOS, Scientific Linux.

Recently we published post about how to update packages in RHEL system using YUM. In this post we have explained how to update single or multiple packages and even all packages at once using command line. But these ways are manual tasks and needs human intervention to complete them.

While CentOS/RHEL platforms maintain several official repositories (e.g., base, updates, contrib), they are lacking in terms of software coverage and release cycles. To bridge the gap between what is available and what is commonly needed, third-party repositories are created to serve community needs for commonly requested software packages.

One such third-party software repository for CentOS/RHEL is ELRepo (The Community Enterprise Linux Repository). ELRepo is actually one of few "community-approved" repositories due to its high maintenance quality.

Spacewalk manages software content updates for Red Hat derived distributions such as Fedora, CentOS, and Scientific Linux, within your firewall. This is the open source version of RedHat satellite 5.We do have RedHat satellite 6 and the open source version is katello. I will show you in detail of how to configure that in detail in my next tutorial. Spacewalk is a very powerful tool when it comes to manage the infrastructure and is really stable and well build.

APT is package manager which handles debian packages (.deb). Linux distributions like Ubuntu, Debian uses APT whereas Red Hat, CentOS uses YUM. Package repository is index of packages which can be used to search, view, install & update packages for Linux In this article we will be walking though steps to configure local APT repository.

Today, a friend of mine asked me how to check the latest available version of a package in the Ubuntu repositories. He just wanted to know the package's version without installing it. I never knew that before, so I immediately went to askubuntu forums, and search for the answer. This is my first preferred site where I regularly search for Ubuntu related help. Luckily, someone has already asked the same question, and got the solution. I wanted to share those instructions for the OSTechNix readers, and keep it myself for future reference.

As you probably know GRUB 2 is default boot loader for most Linux operating systems. GRUB stands for GRand Unified Bootloader. GRUB boot loader is the first program that runs when the computer starts. It is responsible for loading and transferring control to the operating system Kernel. Then, the Kernel takes charge, and initializes the rest of the operating system.

In this tutorial, we will be discussing about configuring some important GRUB2 Boot Loader's settings Ubuntu 16.04 LTS desktop. I tested this guide in Ubuntu 16.04 LTS desktop, however these instructions might work on all Linux operating systems that uses GRUB 2 boot loader.

Software que se usa en modo live CD y nos saca del apuro cuando necesitamos reparar grub en nuestro equipo, ya sea porque lo rompimos, o formateamos la partición con Windows y nos voló Grub, esta simple y potente herramienta nos saca del apuro.

En este artículo me gustaría mostraros una herramienta que me ha salvado la vida muchas veces (y las que quedan) cuando he tenido problemas con el grub de GNU/Linux al instalar Windows. Para quien quiera tener dual-boot con Windows y Linux, le recomiendo primero instalar Windows y luego Linux, ya que si es al revés, Windows romperá el arranque de Linux y tendréis que leer este tutorial para saber cómo arreglarlo. ¡Esperamos que eso nunca pase!

Alguna vez puede pasar que perdamos el arranque o grub de nuestro querido Ubuntu, esto puede pasar por varias razones, pero una de las más comunes suele ser que:
Tengamos instalado windows en una partición y ubuntu en otra.
De pronto windows falla y tenemos que formatearlo para instalarlo de nuevo (vaya sorpresa).

No pasa nada, cogemos nuestro disco de instalación de Ubuntu (Live-CD), que debe de ser el mismo con el que instalamos Ubuntu (para trabajar con la misma versión del grub).

Many people want to dual boot Windows 10, especially the latest version with alternative operating systems such as Ubuntu. However, dual booting, partitioning and configuring multiple operating systems can be difficult. That's why we've decided to make this guide: a complete tutorial on how to dual boot Windows 10 (with Anniversary update) and Ubuntu.

Los nuevos BIOS están protegidos contra los rootkit malware's mediante la tecnología UEFI... esto genera inconvenientes y obstáculos a la hora de instalar Linux,

El Secure Boot es una de esas funcionalidades que solo sabe qué existen cuando quieres desactivarlo. Si no, es bastante poco probable que hayas oído hablar de él alguna vez. Pues bien, Secure Boot es una opción que vino en las placas base UEFI, las que sustituyeron a la BIOS y que impedía, e impide, la ejecución de cualquier software no firmado o certificado. Esto, en teoría, impediría instalar distribuciones Linux, aunque actualmente esto no es del todo cierto.

Complemento este artículo con este enlace a una página que tiene muchísimos tipos de letra de uso gratuito y que además cuenta con una herramienta de búsqueda fantástica en la columna derecha:

There is much talk in the Linux world about the mythical "average user." There is no such thing with Linux. First off, people who use Linux usually are those who know a thing or two about computers to begin with and want to take advantage of all the choices Linux offers. Linux has been considered the place for nerds, hackers and programmers for years. These folks are NOT typical at all. Secondly, it is unfortunate but true that most advanced Linux users are completely out of touch with what an average user really is.

Choose a Linux desktop should be about finding the Linux environment that works best for your individual workflow.

Aquí hay más opciones para que quede aún más confundido... pero también los prós y contras de cada una

Cuales son las diferencias entre estos 3 forks del gnome original

9 Linux desktop environments to watch in 2016

18 razones para usar Gnome en su cumpleaños 18

Liberado GNOME 3.22 'Karlsruhe'

Para quienes quieran engallar su gnome Sell con widgets que facilitan la vida, he aquí el artículo donde los guían en sus primeros pasos

By default, the GNOME (Shell) overview displays applications in two views: "all", where all the applications are listed in alphabetic order, and "frequent", in which the frequently used applications are displayed.
GNOME Shell supports grouping applications in app folders, and there are two such predefined folders, "Utilities" and "Sundry". Some might not know how to create custom app folders, so here are two ways of achieving this.

Webmin is a popular, open source web-based system info and administration tool for UNIX-like systems including Linux and Windows systems. It is sort of a Linux control panel which enables you to view a summary of current system info and statistics, manage system configurations such as setting up user accounts, disk quotas, services configuration such as Apache, DNS, PHP or MySQL, file sharing and many more remotely via a web browser.

Webmin is web based interface for managing UNIX systems. It provides simple yet powerful web interface and allows you to manage entire system via this interface. It is supported on wide ranges of UNIX variants like Linux, Solaris, FreeBSD and so on.
One of the good thing about webmin is that it is released under BSD 3-clause license, which is very liberal. You are free to use it for personal as well as commercial purpose.

So you have a shiny new HiDPI screen, and you want to use it with Linux. The bad news is there isn't a one-size-fits-all solution. Each desktop environment handles scaling differently. The good news is there is a way to handle HiDPI displays on each of the major Linux desktop environments.

Some times, a particular might consume more CPU usage, and affects the performance of the whole system. Since that particular process consumes more CPU, you couldn't do other tasks. You need to wait for the particular process to finish before starting a new task. Luckily, this can be now solved by an useful utility called CPULimit. As the name implies, CPULimit limits the CPU usage of a process. This can be really useful to control the batch jobs, when you don't want them to consume more CPU usage.

An RPM package contains a set of files, typically compiled software binaries, libraries, and their development source files. These files are packaged in a cpio archive format, and finally wrapped in an RPM file along with any necessary package-specific metadata.

What are snaps and why you should use them? The Linux ecosystem has suffered from an old problem since the dawn of the concept of 'distribution', and that problem is fragmentation. One of the biggest issues that cause this fragmentation is different package formats; I can't run my .debs on my Fedora system or my .rpms on my Ubuntu machine.

Though the Mac operating system has many faults, it's at the top of its game in a lot of respects. Ease of use is the main place where Apple excels above the rest. On a Mac laptop a user can expect a wonderful, impressive touchpad experience due to how macOS implements touchpad gestures.

Bluetooth is still very important in the world today given that a wide range of devices rely on its protocol to perform various operations. Most laptops come with built-in Bluetooth adapters, but even if yours doesn't, external Bluetooth dongles are cheap and plentiful in supply.

Una herramienta para ahorrar batería del portatil

In an earlier post, we've explained CPUTool for limiting and controlling CPU utilization of any process in Linux. It allows a system administrator to interrupt execution of a process (or process group) if the CPU/system load goes beyond a defined threshold. Here, we will learn how to use a similar tool called cpulimit.

This tutorial explains how to configure a NTP (Network Time Protocol) server (using ntpd) and join it to the continuously more demanded NTP pool project.

The NTP pool project is a DNS system, that balances the load of millions of queries for time synchronization by many electronic devices, such as servers, personal computers, tablets, smartphones and more. This means, that all queries for serving an accurate real time clock synchronization, are divided between all servers of the pool.


MariaDB is a free and open source fork of well known MySQL database management server software, developed by the brains behind MySQL, it's envisioned to remain free/open source.

In this tutorial, we will show you how to install MariaDB 10.1 stable version in the most widely used versions of RHEL/CentOS and Fedora distributions.

For your information, Red Hat Enterprise Linux/CentOS 7.0 switched from supporting MySQL to MariaDB as the default database management system.

How to setup HAProxy as Load Balancer for MariaDB on CentOS 7

LAMP is an acronym for four open source software frequently used to develop the web applications (such as forums, blogs, and business sites):

This tutorial explains how to use the command line to create and manage MySQL or MariaDB databases and users. MySQL is the most popular open-source relational database management system. MySQL server allows us to create numerous users and databases and grant appropriate privileges, so that users can access and manage databases.


Un artículo que no solo muestra las mejores distribuciones sino que también da claridad sobre lo que es y no es Linux

This test should help you to find the suitable Linux Distribution.
The test will ask you simple questions to include the suitable distributions

  • You can leave questions unanswered
  • You can get the result at any time
  • You can answer the questions in the order you want
  • The amount of answers you give increases the quality of the result

When you move from "that other operating system" to Linux, you're going to find that in most ways you'll be in familiar territory. However, that's not always the case. We sometimes do things a little differently around here.

surgió un debate que lleva rondando mucho tiempo la red. Se trata del de hasta qué punto hay demasiadas distribuciones y de qué manera esto puede beneficiar o lastrar la adopción de esta familia de sistemas operativos en el escritorio.

FreeBSD 11.1 Installation Guide

FreeBSD is a free, powerful, robust, flexible and stable Open Source operating system based on UNIX which is designed with security and speed in mind.

FreeBSD can operate on a large variety of modern CPU architectures and can power servers, desktops and some kind of custom embedded systems, the most notable being Raspberry PI SBC. As in Linux case, FreeBSD comes with a large collection of pre-compiled software packages, more than 20,000 packages, that can be simply installed in the system from their repositories, called "Ports".

If you want to run a clone of Microsoft Windows to escape the drama of upgrading to Windows 10, try ReactOS -- but do not expect it to be a fully functional replacement any time soon.

ReactOS is a free, open source operating system built on the design principles found in the Windows NT architecture.

Just remember that ReactOS is a Windows clone and not a Linux distro with a Windows-like desktop shell. It does not run Linux apps.

The release last month of version 0.4.1 brings this unique open source project one step closer to its goal of providing users full compatibility with Windows software on a free OS made almost from scratch.

IPFire is a Linux distribution that is focused on delivering a starting point for a router and firewall solution with a web interface. It can be made to do a whole lot, but it may not be the best fit for the needs of a home network.

I'll not go in to performance testing at all in this review as this will vary based on your hardware. You can use any x86_64 (or armv5tel) system with at least two Ethernet ports. You may need a third Ethernet port if you want to use an external wireless access point rather than configuring the box you want to use with IPFire as your access point.

Linux is a free operating system, and Puppy Linux is a special build of Linux meant to make computing easy and fast.

Puppy Linux enables you to save money while doing more work, even allowing you to do magic by recovering data from destroyed PCs or by removing malware from Windows. See these example articles: recovering files from Windows and safe Internet banking with Puppy Linux.

With Puppy Linux, you can carry your programs and data anywhere.

  • Easy - Just use a CD or USB flash to boot a PC. Puppy Linux is downloadable as ISO, an image that can be burned to CD or DVD.
  • Fast - Because Puppy is small, it can live in your PC's memory and be ready to quickly execute your commands, whereas in other systems, programs are first read from drive storage before being executed.
  • Save Money - Even if your PC has no hard disk (ex, broken hard disk), you can still boot Puppy via CD or USB and continue working. Old PCs that no longer work with new systems will still work good-as-new with Puppy.
  • Do More - Puppy boots in less than a minute, even in old PCs, and it does not require antivirus software. Administering Puppy is quick and minimal. With Puppy, you just have to take care of your data, which you can easily save to USB flash (Then forget about your operating system!). Your data can be read by other computers.
  • Do Magic -Help your friends suffering from computer malware by booting Puppy and removing malware from their PC (use antivirus that is built-in or can be installed in Puppy). Example - bad Autorun.inf is easily removed by Puppy (Just delete it as well as its companion exe program). If your friend thinks that she has lost data from her corrupted hard disk, boot Puppy and try saving her data!
  • Carry Anywhere (Portable) - Because Puppy is able to live in CD/DVD or USB flash, as well as save data to these same devices, you can carry your programs and data with you.

El binomio niños-tecnología suele dar pie a debates muy interesantes. Por un lado están los que defienden que los peques no deberían tener acceso a ordenadores y gadgets de ningún tipo hasta haber alcanzado una cierta edad; por otro lado, quienes piensan que cuanto antes se familiaricen con la tecnología, mejor.

It is the beginning of 2017 which can mean only one thing. It is time to look back at the top 10 Linux distributions of 2016 in order to analyse their suitability for the everyday Linux user.

It has been a long time since I last reviewed openSUSE. I don't think it is quite as long as the numbering system suggests but it has been about 3 years.
There are 2 versions of openSUSE available via their website:
  • Leap
  • Tumbleweed
The Tumbleweed version is a rolling release distribution whereas the Leap version follows a frequent 6 monthly release schedule.
Today I will be reviewing openSUSE Leap 42.2.

Selecting the best Linux distro is a matter of personal choice, based on your daily work flow. Two Linux experts list their personal picks for best distro and discuss each distro's merits and challenges.

En este artículo van a encontrar 71 capturas de pantalla que explican paso a paso cómo instalar Slackware 14.1. Dedicado a aquellos atrevidos y entusiastas que deseen incursionar en Slackware.

No voy a convencer a nadie de utilizar Slackware. Sólo voy a decir que es un sistema para usuarios avanzados, que deseen un sistema estable y robusto, para los amantes de lo simple. No les voy a mentir diciendo que es fácil de usar. Sí, es fácil de usar, pero no es fácil instalar y administrar software. Al menos no es fácil para usuarios novicios ni impacientes.

The key question is: "What do you want to use Linux for?" Once you know that, everything else is easy.

The company hasn't released a new version of Mandriva Linux since 2011 and laid off most of its developers years ago, but it's now been completely liquidated. That doesn't mean Mandriva's vision for Linux is dead, however-the Mageia project, founded by former Mandriva developers, picked up the torch years ago and has been carrying it ever since. It's not the only successor to Mandriva, either. 

When you want to install new software or updates to already installed Ubuntu software, by default Ubuntu provides four different software repositories to get it from. These repositories are Main, Universe, Restricted, and Multiverse. Maybe you have wondered what's behind their cryptic names. Here is what each of these represent.

PPA stands for Personal Package Archive, and in reality, it’s no different from any other Debian/Ubuntu repository. When you add a PPA to your Ubuntu system, you’re adding another software repository for your package manager to pull from.

Arch Linux is very unique, compare with other Linux distributions because it doesn't comes with live ISO & Desktop Environment. Arch gives you the full freedom to customize the installation as you wish, When you boot up, you'll be end-up with a terminal and most of the people panic here because they don't want to build from scratch.

El artículo se llama diferente, pero me gustaría que leyeran el capítulo que se llama "You-yes, you-can make your own Linux distro"

Arne Exton is informing the Linux community today that the latest release of his ExTiX "The Ultimate Linux System" operating system ships with Refracta Tools pre-installed to let users create their own Ubuntu/ExTiX-based distro.

Refracta Tools is installed by default ExTiX 17.5 Build 170508, which you can download right now from our website, and it can be used to easily build your own GNU/Linux distribution, with a predefined set of packages and custom settings that suit your needs.

DSL es una distribución de GNU/Linux que en tan solo 50MB es capaz de conseguir eficientemente lo siguiente:
  • Arrancar desde un CD de formato tarjeta a un entorno independiente de su disco duro.
  • Arrancar desde una memoria USB.
  • Arrancar *dentro* de un S.O. anfitrión (por ejemplo, puede arrancarse dentro de Windows).
  • Correr sin trabas desde una tarjeta Compact Flash IDE mediante un método que llamamos "instalación frugal".
  • Transformarse en una distribución Debian tradicional tras instalarse en un disco duro.
  • Mantener funcionando aceptablemente rápido un 486DX con 16MB de RAM.
  • Correr completo desde memoria en tan poco como 128MB (¡te asombrarás de lo rápido que es tu ordenador realmente!).
  • Crecer modularmente -- DSL es altamente extensible sin necesidad de personalización.

Linux es conocido por brindar una solución para cualquier necesidad. Si tienes una computadora de escritorio o portátil no tan reciente (antigua), existen distribuciones GNU/Linux ligeras que pueden ser instaladas en dicho equipos y disfrutar de una experiencia informática sin retrasos.

We've already reviewed the Linux Lite 3.6 distro some time back and even concluded that it is an excellent distro for any beginner to start with linux and then stay on forever. With a lot of wow factors in that distro, Linux Lite has come up with a more enhanced version in Linux Lite 3.6. And with the 3.6 release, Linux Lite has introduced some major changes since the release of 3.4. Let's look at all the changes and also a step by step installation guide to install Linux Lite 3.6 in your system.

Gentoo is one of the most esoteric distributions out there. It offers customizability at the expense of user-friendliness. It does, however, shed light on the internal workings of a Linux installation. To experiment with a Gentoo environment inside a VM is probably a great way to start learning about operating systems in general.

Bueno, ya nos estamos acercando, prefiero escribir rápido estos pequeños posts para que no se molesten conmigo por no estar escribiendo la guía en estos instantes :p , pero deben comprender que hay tanto por explicar en Gentoo que dejarles el script no me serviría de mucho si después no pueden controlar todo ese poder.

Bueno, este es uno más de esos puntos que no puedo pasar por alto antes de comenzar la guía de instalación de Gentoo  sé que ya muchos estarán esperando con ansias este post, y perdón por hacerlos esperar, pero también considero que no explicar esto atenta contra mi status de usuario Gentoo  Sin más que mencionar, comencemos.

Wow, veo una gran acogida a mis pequeños aportes y me motiva mucho más a poder seguir compartiendo con esta bella comunidad. Ya sé que he prometido una guía de menos de 20 pasos, pero tendrán que comer ansias un poco todavía… Es que sencillamente no puedo empezar un tutorial de Gentoo sin detenerme a hablar de su corazón y la esencia misma de todo su poder Portage, su gestor de paquetes. Además, como fiel usuario de Gentoo creo yo que es mejor entender antes que repetir, y con esto solo quiero decir que antes de empezar una guía sencilla como copiar un script (repetir), es mejor saber lo que hacemos para poder después escribir el script. Como el conocido refrán:


The First Contributions project bridges the gap between projects looking for new contributors and those trying to get started in open source.

Uno de los libros que más me han llamado la atención sobre este tema es sin lugar a dudas Hacking: The Art of Exploitation, de Jon Erickson. Es una joya para todo aquel que quiera sumergirse en este mundo de los verdaderos hackers. Y tal como está en el libro, me permitiré tomar la primer pregunta que explotó mi mente al momento de leerlo.

I might be wrong, but I get the impression that my Windows friends - which would be most of the people I see on a daily basis - think of Linux as this incredibly geeky system from another planet. I think most of them don't understand why I use it and why I don't just stay in the known world - which to them would be Windows. Paradoxically, however, they do get why some folks use Macs.

Chris Aniszczyk, la cabeza de Open Source at Twitter nos explica qué está haciéndo Twitter por el (Free and Open Source Software)

Chris DiBona is the Director of Open Source for Google. He is also one of the great champions of open source, dating back to when he first fell in love with Linux at his university.

Tras la presentación de James Pearse en OSCON Nicole Engard publica este artículo donde resume las respuestas encontradas a la gran pregunta ¿Por qué Facebook hace OpenSource?

Diversos sectores critican el momento de presentar para discusión un proyecto impulsado por la agenda comercial del país y que tiene implicaciones que van más allá de los compromisos del TLC con EE. UU.

Aseguró que la plenaria en la que se debatía el proyecto fue una trampa. Claudia López y su polémico tuit sobre la Ley Lleras

"Hace tres años, a través de un grupo de Facebook en el que participábamos interesados en el estudio de los anfibios y reptiles, conocí una tesis de maestría que era fundamental para identificar algunos anfibios que encontraba en las visitas de campo que realizaba a algunas áreas protegidas del país. Para acceder a esta información, era necesario viajar a Bogotá y consultar en la biblioteca, pero pensé que era algo que le interesaba a otros más allá del grupo así que lo compartí por Internet. Aunque no fui el primero ni el único (el documento se encontraba en varios sitios ya) por compartir conocimiento respetando la autoría de quien hizo la investigación, hoy su autor adelanta un proceso penal en mi contra por "violación de derechos patrimoniales de autor y derechos conexos", me dicen que esto puede suponer de 4 a 8 años de cárcel para mí."

Red Hat is adding a hosted IDE, microservices foundations, and support for Amazon Web Services in hybrid clouds

La comunidad se defiende cuando tiene que hacerlo, como cuando utilizan software libre como publicidad engañosa

A top Linux security programmer, Matthew Garrett, has discovered Linux in Symantec's Norton Core Router. It appears Symantec has violated the GPL by not releasing its router's source code.

La Comisión Federal de Comunicaciones de Estados Unidos (FCC) acaba de votar con un 3 a 2 acabar con las normas que protegen la neutralidad de la red, y que permiten que todos los servicios compitan en igualdad de condiciones. Se trata de la puesta en marcha de un plan presentado por Ajit Pai, presidente del organismo.

 EEUU se prepara ya para un nuevo paradigma. La neutralidad de la Red ha perdido y las empresas han ganado. La manera de entender las comunicaciones y las nuevas relaciones que se establezcan entre usuarios y proveedores de Internet a partir de este jueves se darán en un marco injusto y viciado por el mercado, los poderes económicos y los intereses políticos. Internet ya nunca volverá a ser como era.

Revocar las reglas sobre neutralidad de la red sólo apresura el final de esta infraestructura de comunicación.

The story of Huawei gets more complicated, even though software patents are losing their teeth and notorious patent trolls are altogether losing their patents

Hint: It has to do with which community you're contributing to. Here's a full explanation.

Home Automation software is software that lets you control and monitor common home and office appliances using a computer. Home automation used to be confined to turning on and off lights and appliances. But the possibilities are much wider letting users build a wireless network, automate TV and hi-fi, monitor pets when you are away, set up an answering system, create a weather station - integrating an abundance of different home automation technologies into one.

Alberto Morgante, Cloud Computing Innovation Engineer at BBVA, talks about the current boom in open source. One of the key benefits of these tools, he says, is their capacity to streamline processes.

Open source offers some compelling benefits for businesses large and small -- but you might be surprised at some of the ways it's being used.

25 años después Microsoft comienza a entender

When evaluating whether to adopt an open source solution in a software project for the first time, here are some basic questions you should ask

Linux ha estado en ascenso desde que el sistema operativo de código abierto fue lanzado, y se ha mejorado y perfeccionado con el tiempo de manera que una distribución típica es ahora un paquete pulido y completo que comprende prácticamente todo lo que necesita el usuario, ya sea para un servidor o sistema personal.

I've been supporting student participation in humanitarian free and open source software (H) projects for over a decade. I've seen students get motivated and excited by working in a professional community while they learn and mature professionally. Out of the many reasons for supporting student participation in open source, here are five of the most compelling reasons.

Tenemos el agrado de anunciar que el gigante de las telecomunicaciones AT&T, se une a la Linux Foundation como miembro Platinum. Esta organización se une a la categoría de miembros más alta de la fundación, donde comparte lugar con empresas como IBM, Microsoft, Huawei entre otros.

When Microsoft ended support for Windows XP last year, most of us moved on to Windows 7 or 8, but not the nation of China. XP was still in wide use around the country and upgrading was an expensive proposition.

In a fit of pique, the Chinese government actually banned Windows 8 in retaliation to the end of XP support, which was the ultimate example of cutting off your nose to spite your face.

Espero que lo que les enseñé haya sido de provecho y aquí tienen éste enlace para seguir aprendiendo.

Conseguir trabajo es complicado, sobre todo en tecnología, donde los puestos son altamente competitivos. Sin embargo, hace poco, el ministerio de las TIC aseguró que hay una deficiencia en mano de obra calificada para trabajar en las empresas de tecnología del país. Ahora, según ReadWrite, también hay un déficit de personas con conocimiento en Linux. La Fundación Linux anunció la creación de un programa de certificación para educar y mejorar la oferta de personas especializadas en esta plataforma.

A pesar de que Linux no sea un sistema tan popular para el consumidor, muchas empresas tienen sus servidores sobre la plataforma del pingüino. De acuerdo con IDC, los servidores Linux representan el 28,5% de los ingresos de ese mercado. Esto representa un incremento de 4,6 puntos porcentuales frente al estudio del cuartro trimestre de 2012.

Un estudio de la fundación encontró que el 77% de los encargados de las contrataciones tiene entre sus listas de prioridad a personas con talento en Linux. Además, encontraron que el 86% de las personas que tienen conocimiento en Linux vieron más oportunidades en su carrera.

El conocimiento sobre esta plataforma es clave para el funcionamiento de internet. Muchas de las compañías más grandes del mercado usan este tipo de servidores. Google, Amazon y Yahoo!, por ejemplo, tienen sus datos en servidores que corren Linux.

Además, el sistema está teniendo más calado que antes entre los consumidores finales. Si muchos no lo saben, Android, el sistema operativo móvil más popular del mundo, tiene entre sus entrañas la creación de Linus Torvalds. Lo mismo pasa con los dispositivos Kindle de Amazon.

El nuevo sistema de certificación tiene un curso en línea y después un examen que vale 300 dólares. Hay dos certificaciones: administrador de sistemas Linux e ingeniero Linux.

Entonces, consiga trabajo estudiando Linux. Parece ser una ecuación muy sencilla.

20.08.14 @ 17:43 p.m.

Cómo se beneficia una empresa al usar

La oficina de inteligencia federal de USA solicita a los fabricantes de software poner puertas traseras con fines confusos que pueden usarse también ilegalmente

Windows 8 ha demostrado tener puertas traseras que vulneran la seguridad de la información, tanto que del gobierno alemán se ha filtrado este documento que claramente dice:

  • "Microsoft decides what software can run on the computer, and the user cannot influence it in any way."
  • "It would be easy for Microsoft or chip manufacturers to pass the backdoor keys to the NSA and allow it to control those computers."
  • "The security objectives of 'confidentiality' and 'integrity' can no longer be guaranteed."
  • "The use of 'Trusted Computing' technology in this form ... is unacceptable for the Federal Administration and for operators of critical infrastructure."

Por alguna razón lo borraron, pero aquí está otro artículo de soporte a lo mismo:

Un foro sobre la actualidad y futuro del OpenSource en Colombia

Página 35 de la revista ComputerWorld, noviembre de 2014

The German city of Munich, famous for rejecting Windows in favour of using Linux on its PCs, will return to Windows after the move won the backing of the full council.

Hay varias empresas de éxito, como Red Hat, que han conseguido vivir (muy bien) del 'software' libre.

Blocks, un dispositivo que funciona en Linux, esta diseñado para permitirnos augurar lo que viene en el futuro.

Adoptar - Añadir - Aniquilar o Embrace - Extend - Extinguish

Debido a la investigación realizada por el caso anti-monopolio Comes vs Microsoft, se ha publicado una impresionante cantidad de correos electrónicos entre Bill Gates, Steve Ballmer, Jim Allchin y otros importantes miembros de la compañía, en donde se puede ver cómo manejaron las distintas amenazas a su imperio a través de los años.

Si por acá llueve, por allá no escampa

What does open source software mean? When you are explaining it to someone else, how do you convey the value and essense of open source without reinventing it? There have been many hard won lessons in open source since the phrase was first coined in 1997, and we should not forget those lessons.

To help with that, I've collected 12 memes that are meaningful to me to help share the history, set the stage, and provide context for what open source software is and what it means to the software industry at large.

Free and open source software (FOSS) has made huge inroads over the last decade or two, especially in the corporate world. Even so, some legal departments can be wary of their organizations using or contributing to .

Desde hace tiempo que los gobiernos discuten la adopción del software libre dentro de la administración pública. Ahora el gobierno de India se suma a esta tendencia. De acuerdo con el sitio CNN-IBN News, el Ministerio de Tecnologías de Información y Comunicación ha emitido una nueva política que hace obligatorio el uso del software libre en las oficinas gubernamentales de todo el país.

Esta medida permitirá que el gobierno pueda estudiar y modificar el software que utiliza, algo que no es posible hacer con una licencia de software privativo. La política aplicará para todas las dependencias del gobierno central, mientras que las oficinas estatales son bienvenidas a adoptar la iniciativa.

Para evitar incompatibilidades con formatos de archivo emitidos por software privativo (doc, docx, xls, xlsx, ppt, pptx) que cambian como veletas como estrategia de mercadeo, el gobierno británico adopta los formatos abiertos para garantizar compatibilidad.

The Italian military is transitioning to LibreOffice and the Open Document Format (ODF). The Ministry of Defense will over the next year-and-a-half install this suite of office productivity tools on some 150,000 PC workstations - making it Europe's second largest LibreOffice implementation. The switch was announced on 15 September by the LibreItalia Association.

Las experiencias gubernamentales que ha tenido RedHat montando proyectos OpenSource en ayuntamientos

Linus Torvalds es el creador de Linux, un sistema operativo que en términos reales es UNIX, y que ha tenido una enorme influencia en el desarrollo del cómputo moderno, además de ser un proyecto de código abierto y libre, lo cual lo hace mucho más interesante.

Un magnífico proyecto, de extrema utilidad, al que fue muy difícil llegar.

Todos conocemos a Linus Torvalds, por muchos (no por todos) considerado el padre de Linux. La verdad es que no sigo mucho sus declaraciones, entre otras cosas porque no es muy dado a manifestaciones públicas (mucho menos que el amigo Richard Stallman) pero me he tropezado con este artículo en MuyComputer y la verdad es que subrayo casi todo lo que dice (quizás con algo menos de vehemencia). Eso va por los "pro-Microsoft" también: chicos, en el fondo estamos jugando a lo mismo...

Este artículo presenta las razones por las cuales Microsoft está "regalando" Windows 10.

Básicamente, te lo regala a cambio de:

  • Tus datos personales
  • Tu localización geográfica
  • Tu comportamiento en línea
    • qué buscas
    • donde compras
    • quienes son tus amigos
    • cuales son tus redes sociales

Es decir, convirtió un sistema operativo en un banco de datos para hacer datamining.

Linux es libre, te garantiza intimidad y privacidad... ¿será esto suficiente para que la gente se cambie a Linux o la mayoría morderá el anzuelo?

If it wasn't for Linux setting the bar, would Windows users still be dealing with the "blue screen of death" several times a day?

Munich's KDE distribution LiMux has been certified to meet the international usability standard ISO 9241. The use of KDE 3 as an "effective, efficient and satisfactory" working environment is named as a decisive factor for passing the certification. Read on for more details.

The city has now migrated over 80 percent of its 15,500 desktops to LiMux, it's own distribution of Linux.

El gobierno de turno amenaza con echar para atrás la decisión de migrar a Linux.  Gracias a esto hay muchos proyectos que entran a participar en este juego de decisiones.

Si bien los rumores corren de un posible retroceso en la migracion win2lnx, el alcalde atendió el clamor de la comunidad técnica y está recapacitacitando su decisión.  Además desde la misma implantación del proyecto se blindó para prevenir que los alcaldes tomen decisiones arbitrarias.

Councillors from Munich's conservative CSU party have called the custom version of Ubuntu used by the city "cumbersome to use" and "of very limited use"

Last week's news of Munich considering a switch back to Windows has been clarified or rebuked today. Reports from DebConf15 refute the claims from certain city councillors complaining about the Ubuntu-based Linux.

Años de trabajo y millones de euros para tener LiMux en miles de computadores, y un par de consejales están pidiendo Windows para poder usar Skype y MS-Office (sin tener en cuenta que Skype funciona muy bien en Linux y que LibreOffice es un magnífico sustituto, para lo que un consejal hace)

Sin embargo, los periodistas, sin noticias en agosto exageran un poco la nota para volverla amarillista.

Al final pasó. Tras años de "invitaciones" por parte Microsoft para que la capital de Baviera, Múnich, abandonara el proyecto LiMux para volver a sus soluciones, se puede decir que ya está empezando a suceder. La coalición gobernante, compuesta por la CSU (marca de la CDU de Angela Merkel en Baviera) y el SPD (Partido Socialdemócrata de Alemania), ha presentado una propuesta para crear un proyecto para el desarrollo de una nueva base de clientes Windows que tendría que terminar en 2020, todo con la intención de implementar en la Administración "productos estándares del mercado".

GitHub es una organización que apoya al software libre, recientemente crearon un cargo en su organización orientado a mercadear el openSource en el gobierno de USA.

La tecnológica y la administración del presidente estadounidense se enfrentaron en el Tribunal Supremo por el interés del gobierno de acceder a correos almacenados en el extranjero.

Microsoft's relentless attacks on GNU/Linux and Free software in general (even if it runs on Windows) are so evident that claims of 'love' remain laughable at best (if not infuriating)

Microsoft asocia a Linux con el cáncer

Summary: Microsoft reminds us that it is still engaging in patent extortion by signing yet another patent settlement deal which requires surrendering to Microsoft

A quick look at the past week's news and clues about Microsoft's (and its broad army of patent trolls) strategy for taxing Linux, or imposing bundling at zero cost (to Microsoft)

This is a manifesto that any private organization can use to frame their collaboration transformation. Take a read and let me know what you think.

I presented a talk at the Linux TODO group using this article as my material. For those of you who are not familiar with the TODO group, they support open source leadership at commercial companies. It is important to lean on each other because legal, security, and other shared knowledge is so important for the open source community to move forward. This is especially true because we need to represent both the commercial and public community best interests.

More than a buzzword, "open" is our best means for creating new and powerful modes of collaboration.

What's the difference between OpenDocument and Microsoft's "OpenXML"?

This article is a technical comparison between ODF and OXML. We try to show you how the design of these formats affect interoperability. After all, interoperability is the purpose of open standards.

La suite de ofimática openoffice gracias a ser software libre compatible con sistemas operativos como MS-Windows, Linux, UNIX y Mac OS es la herramienta que permite a una organización probar, en forma controlada, las ventajas del software libre

En breve se brindarán las recomendaciones para la migración de MS-Office hacia OpenOffice comparando las dos suites de oficina al indicar las ventajas y desventajas de cada una de ellas.

Artículo de Linux Journal

Aunque en el PC de usuario final GNU/Linux mantiene una cuota residual frente a la alternativa privativa, no ocurre lo mismo en muchas de las áreas más exigentes a nivel tecnológico, por ejemplo, en el mundo del séptimo arte. Así, en los últimos años hemos visto al sistema operativo Open Source detrás del cine más reputado por sus efectos especiales, no solo en servidores, también en máquinas de trabajo.

En este artículo encontrarán un punto de vista interesante para resolver esta pregunta

¿Qué intereses habrán llevado a Microsoft a cambiar de postura?

Por qué y cómo la academia debe enseñar los principios y valores del opensource

No todo brilla en la viña del señor.

El presidente Vladimir Putin ya no quiere que su país dependa de tecnologías extranjeras, debido a la extensión política que perdura con Estados Unidos y Europa.

Conferencia en vivo de Richard Stallman en Cancún, hablada en español.

Para que la escuchen en camino a la Universidad

y luego puedan ver la conferencia de Stallman en TEDx

Se ha anunciado hace muy poco que Suiza se unirá a la lista de países que se pasan al software libre. En concreto,se va a proceder a realizar una migración hacia el software libre en Berna, la capital de Suiza.

The building and nurturing of community is more important to software development than you might think.

Jack Wallen proclaims the best user for the Linux platform isn't who you'd think it is.

Despite Microsoft's continued assault on Linux and on Android (using software patents, which it still discreetly lobbies for), some figures in the media are perpetually peddling the Microsoft-serving lie that 'Microsoft loves Linux'

"If you use any open source software, you have to make the rest of your software open source." That's what former Microsoft CEO Steve Ballmer said back in 2001, and while his statement was never true, it must have spread some FUD (fear, uncertainty and doubt) about free software. Probably that was the intention.

Corporate use of open source software is now the norm with more than 60 percent of companies saying that they build their products with open source software, according to the 2015 Future of Open Source survey. But that same survey also revealed that most companies that use in their products don't have formal procedures in place for ensuring that their software complies with open source licenses and regulations.

Me parece bacano que hayan abierto el código, sin lugar a dudas. Sin embargo, pienso muy diferente al autor del artículo. Intel tenía ese software cerrado porque la innovación que presentaba y el boom mediático le generaban una publicidad suficientemente buena para costear su mantenimiento y desarrollo. Hoy, para Intel es un lastre, Hawking ya no es tan "popular" y ya hay software que está alcanzando los logros de los científicos de Intel, de esta forma la publicidad que recibe no "justifica" el costo del desarrollo. Las alternativas que tiene Intel son 2: Botar el software a la caneca para ahorrarse los costos (lo cual generaría una publicidad negativa exagerada en contra de Intel) o abrir el código como opensource como un gran detalle filantrópico de la empresa... Para mi, se demoraron en liberarlo, lo pudieron hacer desde el principio y ya.

El open source es una gran dirección a los nuevos graduados en IT. de la carrera de ciencias de la computación. He aquí por qué.

Es la trampa-22 cada nuevo graduado de la universidad se enfrenta a la hora de buscar su primer empleo: Se necesita experiencia o una cartera de trabajo realizado para demostrar su competenciaa un empleador potencial, pero es difícil conseguir una prueba tangible de sus habilidades sin tenerun trabajo de primera.

PIRATERIA, es leer esa palabra y enseguida se relaciona con un pirata con parche en el ojo y pata de palo, la realidad en éste caso es muy distinta, lo llamaré "Piratería 2.0" y terminar con ese presunto problema es muy complejo, pues siempre habrá quien no quedará contento. Lo que os voy a proponer, es una solución para que tanto el consumidor, cómo las industrias al fin se den la mano. ¿Quieres saber cómo?.

The Apache 2 license's patent grant, often misunderstood, makes open source safe to use.

¿Por qué una empresa desarrolladora de software decide "regalar" su producto?

Una consideración de lo diferente que el mercado de software para el consumidor de PC puede haber resultado si GNU y la Free Software Foundation hubiesen construido el software libre de "código abierto" para reemplazar MS-DOS y Windows, en lugar de UNIX.

En estos días me encontré con este artículo de Adrián Perales, disgustado (en mayor o menor medida) por el uso de la frase "Open Source" para referirse al software libre en donde veo que para él ambos términos son sinónimos.

Sin embargo, para mi el Software Libre y el Software Abierto (Open Source en inglés) son dos cosas que, si bien se parece, son diferentes y se fundamentan en dos tendencias interesantes para proteger la libertad cuya base filosófica es radicalmente distinta.

Microsoft utiliza Linux para depurar aplicaciones y para los servidores de sus datacenter

Nineteen years ago this week, at an annual meeting of Linux-Kongress in Bavaria, an American programmer named Eric Raymond delivered the first version of a working paper he called "The Cathedral and the Bazaar." According to Raymond, the exploratory and largely speculative account of some curious new programming practices contained "no really fundamental discovery."

Twitter is built on open source software.

Razones por la que deberias poner a Firefox como tu navegador predeterminado.

It's a hybrid and multi-cloud world, at least according to Red Hat.

So this week at its Summit in Boston the company that is known for commercializing open source projects for enterprises has taken steps to further facilitate how users of its application development tools can manage workloads across public clouds and on-premises systems.

Here are the key details: Red Hat announced native access to Amazon Web Services products in its Red Hat OpenShift product. OpenShift is the company's platform as a service (PaaS) application development software, and it's also the company's main tool for helping enterprises deploy application containers, including those from Docker.

There is free software and then there is software that is entirely free as in freedom (libre). These distros are ready-to-use full systems whose developers have followed the Guidelines for Free Systems Distribution as put forward by the Free Software Foundation.

Cómo un gran proyecto llega a su fin.

Continúan los problemas con SourceForge y sus malas prácticas

In today's open source roundup: SourceForge takes more heat for its Nmap page. Plus: Best Chromebook for a college student? And DistroWatch reviews Fedora 22 KDE

Una juez federal de los Estados Unidos ha sentado un precedente importante en el caso de las licencias abiertas. De acuerdo a su decisión, licencias como la GNU GPL (Licencia Pública General de GNU) pueden ser tratadas como contratos legales y los desarrolladores que las utilicen en sus programas pueden demandar a quienes violen esos contratos.

¿Qué rol juega Internet en el mundo de hoy y por qué hay políticos de todo el mundo que quisieran liquidarlo para siempre? ¿Cuál es el motivo por el que los poderosos ocultan la verdad respecto a la crisis económica y qué final espera al euro? A estas preguntas y muchas otras responde Manuel Castells Oliván

El modelo de licenciamiento que Google puso sobre Android es bastante dudoso... más aún las patentes que Microsoft tiene sobre éste sistema operativo.

Android es un "Linux engallado", según la licencia GPL que protege a Linux este software es libre y sus modificaciones y mejoras deben ser libres... los drivers pueden ser privativos por ser un módulo independiente que interactúa con Linux, pero lo que tienen Google y Microsoft patentado es bastante dudoso que pueda ser patentado.

The Go programming language, sometimes referred to as Google's golang, is making strong gains in popularity. While languages such as Java and C continue to dominate programming, new models have emerged that are better suited to modern computing, particularly in the cloud. Go's increasing use is due, in part, to the fact that it is a lightweight, open source language suited for today's microservices architectures. Container darling Docker and Google's container orchestration product Kubernetes are built using Go. Go is also gaining ground in data science, with strengths that data scientists are looking for in overall performance and the ability to go from "the analyst's laptop to full production."

There are a number of different companies trying to make a business out of building open networking software. Among them is startup SnapRoute, which raised a $25 Million Series A round of funding on Feb. 7 2017.

Si descargaron Linux Mint en febrero de 2016 es importante que boten a la caneca esa versión pues tiene un troyano. Afortunadamente en menos de una semana el problema fue resuelto

Software that can be freely accessed, redistributed, and modified can be the basis of a successful business.

OJO, esto está relacionado con proyectos que facebook estaba liberando como opensource, no está diciendo que el propio software de facebook no es libre.

Facebook's BSD+Patent license combo fails not because of the license itself, but because it ignores the deeper nature of open source.

I have been using LibreOffice since it was called Star Office and all documents opened in a tabbed interface, as in most modern spreadsheet applications (anyone remember those days?). From those early days until now, I have considered Star Office/ to be an excellent, if not superior, tool compared to many on the market.

Carriers are starting to look more like cloud companies, turning to standard hardware, virtualization and machine learning for rapid development of new services.

AT&T helped drive that trend on Wednesday by releasing ECOMP, the operating system of its software-defined network, as open source through the Linux Foundation. Like Linux, ECOMP will become a codebase that many different companies and developers - potentially even AT&T's rivals - collectively create and define into the future.

Adobe has finally heard what the world has been screaming at it for years: Flash needs to die.

Adobe today announced plans to cease all development and distribution of its once-ubiquitous but perennially unloved browser plugin by the end of 2020.

One of the most common tasks in any company's open source department is evaluating internal software to see if it would be a good candidate to give back to the community. When performing this task at PayPal, we found it useful to take each potential open source project through a vetting process originally framed by Danese Cooper that seeks to answer four primary questions:

  1. Who cares?
  2. Are we still using it?
  3. Are we committed to it?
  4. Can it be developed in one public tree?

This article looks at these questions and why they matter.

Microsoft has taken heat every time it tried to end support for Windows XP, but finally almost 13 years after it was released, Microsoft has flipped the switch and stopped delivering system updates to XP users.

El Ministerio de Defensa de la Federación de Rusia dice adiós a Windows y planea transferir todas sus computadoras a Linux. La distribución GNU/Linux elegida es de fabricación nacional, se llama Astra Linux y pertenece a la empresa RusbBITeh.

Getting the source code ready from a licensing quality perspective? On this page you find a straightforward guide to get it done right.

ISO/IEC 26300:2006/Amd 1:2012

The electronic version of this International Standard can be downloaded from the ISO/IEC Information Technology Task Force (ITTF) web site

Cabinet Office blasted for 'ignoring benefits' and 'limiting choice'

El ingeniero singapurense Yeo Kheng Meng ha publicado en su blog un video en el que se aprecia el proceso de un experimento técnico que llevó a cabo al ejecutar un sistema operativo moderno Linux en una computadora antigua con el microprocesador tipo i486, con el fin de "hacer el 486 grande otra vez". Kheng Meng usó una computadora creada en 1993 y le instaló el sistema operativo Gentoo Linux. El sistema funcionó, aunque tardaba 11 minutos en encenderse, y casi 6 minutos en apagarse.

FBI retiró el proceso pues ya no necesita la ayuda de Apple

The recent Fantec decision in Germany emphasizes the need for companies to manage their use of and cannot rely on statements from their suppliers. The court was very clear about this requirement and dismissed Fantec's attempted defense based on the additional cost of their own compliance. Although the costs for Fantec were modest because of a prior agreement setting the damages, Fantec was potentially liable for copyright damages and could have been forced to cease distributing their product.

Just because a font is on your system doesn't mean you should use it any way you want.

If you were to ask any of my friends, they could readily attest to my profound passion for Linux. That said, it might surprise you to know that hardly two years ago, I barely knew what Linux was, let alone had any earnest interest in switching to it from Windows.

ITPro talks to entrepreneur Steven Grandchamp about finding success with an open source project.

El gigante chino de los móviles Huawei hasta el momento tenía servidores con Windows Server y RHEL de Microsoft y Red Hat respectivamente. Como saben, la firma china se ha hecho bastante importante y grande gracias a la venta de teléfonos móviles y otros productos, pero sobre todo destacan sus smartphones con prestaciones elevadas comparándolas con otros de la competencia de gama alta pero por precios bastante razonables.

Not everyone should opt for Linux -- for many users, remaining with Windows or OSX is the better choice.

I don't think many people answer the question "What do you want to be when you grow up?" with "I want to work in open source."

In my experience, working in the open source community is something that happens as a result of something else. I worked in open source for a short time-in fact, the mission statement of the company I worked for included the words "open source." But my path to that job was not direct and not as laser-focused as one might think.

Libreoffice as a service - No más Office 360

Los desarrolladores del kernel han decidido modificar algunos aspectos de su licencia. Se pretende evitar que las cláusulas que exigen su cumplimiento, sean utilizadas para obtener beneficios económicos de tipo personal y perjudiquen a la comunidad que está alrededor del proyecto.

Intellectual Ventures, Finjan, RPX, and other Microsoft-connected trolls cannot be countered by LOT Network and the likes of it (notably OIN); Microsoft continues to shrewdly distribute patents to trolls, offering ‘protection’ from them (for a fee)

Summary: Microsoft reiterates its intention to only offer 'protection' (or indemnification) for GNU/Linux users who pay Microsoft monthly fees while going further and hinting that it may send additional patents to trolls

[The EPO] can't distinguish between hardware and software so the patents get issued anyway" -Marshall Phelps (Microsoft at the time)

The European Patent Office (EPO) continues to act like a vassal of patent aggressors, Microsoft carries on pretending that it's no longer attacking Free software, and evidence shows that patent policy is being perturbed by lobbyists connected to Microsoft

Having disguised Android and Chrome OS patent settlements as OEM "bundling" deals (preinstalling Microsoft spyware), Microsoft now comes up with a new way to market its "protection" (of it didn't even develop) from patent trolls, which requires that people pay Microsoft a subscription fee

Por ahí dicen que si está en Internet es porque es cierto... ¿qué creen ustedes?

Red Hat released its best practices for leading open projects, making decisions, collaborating and communicating.

In other words, Red Hat just put its decision-making code on Github.

The company's Open Decision Framework is likely to be a read for business and tech leaders. Officially, the framework is supposed to "help decision-makers communicate transparently, seek out diverse perspectives, collaborate more effectively across distributed teams, and limit unanticipated impacts of business projects and decisions."

Red Hat said it has received requests from outside organizations on how to use open source principles inside their enterprises.

The five core open source principles--open exchange, participation, meritocracy, community, and release early and often--are outlined in Red Hat's framework.

Any executive who sometimes feels like he or she has to herd cats may find Red Hat's framework interesting.

Una crítica sobre la seguridad del modelo OpenSource.  Tras leerlo aún tengo claro que el diseño de Linux y la apertura de su código permiten que sea más seguro y se ha demostrado.

Tanto con heartbleed como con LUKS, que efectivamente eran fallas de seguridad, una vez fueron detectadas fueron corregidas y a los pocos días cualquiera que actualizara su equipo podía dormir tranquilo, como dice el artículo, de ahí en adelante.

Cuando aparecen fallos de éste tipo en software privativo, lo que hacen las casas matrices es generar un parche (un software que trata de tapar el hueco) en lugar de una corrección en el código fuente y una recompilación total del software, debido a los costos (económicos y en goodwill de la marca) que le implica la redistribución de una nueva versión (que por supuesto DEBE cobrar por su modelo comercial). Todo ésto hace que sea muy lenta la distribución de la corrección y los usuarios quedan expuestos durante mucho más tiempo a la vulnerabilidad (meses), tiempo que los delincuentes utilizan para vulnerar sus datos.

Dr. Robin DeRosa, a pioneer in the open educational resource movement, discusses how an open approach can make higher education more affordable and enrich student learning.

Oracle ha anunciado la donación de la especificación Java EE (Enterprise Edition) a la Fundación Eclipse, encargada sobre todo del desarrollo del conocido IDE Eclipse, que además muy utilizado para el desarrollo con Java.

NPM, short for Node Package Manager, is a command line package manager for installing NodeJS packages, or modules. We already have have published a guide that described how to manage NodeJS packages using NPM. As you may noticed, managing NodeJS packages or modules using Npm is not a big deal. However, if you’re not compatible with CLI-way, there is a desktop GUI application named NDM which can be used for managing NodeJS applications/modules. NDM, stands for NPM Desktop Manager, is a free, open source graphical front-end for NPM that allows us to install, update, remove NodeJS packages via a simple graphical window.

En 2017 Oracle decidió dejar de controlar el desarrollo de Java EE y empezarían por buscar una organización open source a la que pasar la batuta. Esa organización terminó siendo la Eclipse Foundation, la misma comunidad detrás de la plataforma Eclipse que consiste en el IDE y el ambiente de desarrollo.

A pesar de que las explicaciones del señor Moore parecen correctas, corresponden a falta de investigación y conocimiento del sistema operativo.

Response to Mythbusting Linux - Part 2

Over the course of past two years, we've been telling you how Microsoft is trying hard to earn the appreciation of open source developers by either contributing to open source software or sharing its own code on GitHub. These moves have faced skepticism from us as well. Just yesterday, at its Ignite conference, Microsoft launched SQL Server 2017 for Linux as well.

The GPL family of licenses is unique among open source licenses in how past, current, and future versions of the license may apply to the software program. By not fully understanding this unique license feature, open source software developers may inadvertently create ambiguity.

The USS Zumwalt will be a floating data center-armed with missiles and robot guns.

When the USS Zumwalt (DDG 1000) puts to sea later this year, it will be different from any other ship in the Navy's fleet in many ways. The $3.5 billon ship is designed for stealth, survivability, and firepower, and it's packed with advanced technology. And at the heart of its operations is a virtual data center powered by off-the-shelf server hardware, various flavors of Linux, and over 6 million lines of software code.

The Apache Software Foundation is overhauling project leadership for the Cassandra database. Will it survive the change?

DevOps, microservices, and the shift to containers and lightweight computing environments explain a lot about Microsoft's position on .NET, open source and Nano Server.

Linux is everywhere. And, I mean everywhere. You name it, home electronics, smartphones, and, of course, computers. But, one place you probably didn't think of Linux living is sitting in your driveway right now: Your car.

Forking is a concept that can strike terror into the heart of any CIO that relies on open source software. Here's how to make sure you're on the right side of the split.

Es confiable el amor que profesa Microsoft por Linux

The terms free software and open source software do mean different things, though the categories of software they refer to are almost exactly the same.

To casual users, one person at a keyboard looks much the same as any other. Watch for a while, however, and the differences start to emerge -- and whether they are using Linux or Windows is the least of them.


Una breve explicación de los diferentes tipos de archivo: regulares, directorios, ejecutables y enlaces simbólicos

fdisk desde sus inicios ha sido la herramienta que permite particionar los discos duros en forma eficiente y eficaz.  He aquí una descripción de cómo utilizarlo.

Ver también

Si requieres que un directorio de un disco duro en un computador remoto esté disponible cuando este computador se conecte a la red, ésta es la solución.

NFS es rápido, seguro y bueno. Perfecta alternativa cuando necesitan tener un directorio compartido sin utilizar SMB 

In this guide, we are going to learn to use df command. The df command, stands for Disk Free, reports file system disk space usage. It displays the amount of disk space available on the file system in a Linux system. The df command is not to be confused with du command. Both serves different purposes. The df command reports how much disk space we have (i.e free space) whereas the du command reports how much disk space is being consumed by the files and folders. Hope I made myself clear. Let us go ahead and see some practical examples of df command, so you can understand it better.

As a system administrator, you may have a certain directory that you want to give read/write access to every user on a Linux server. In this guide, we will review how to enable write access to all users on a particular directory (shared directory) in Linux.

As system administrators, we would have got requirements wherein we need to configure raw hard disks to the existing servers as part of upgrading server capacity or sometimes disk replacement in case of disk failure.

In this article, I will take you through the steps by which we can add the new raw hard disk to an existing Linux server such as RHEL/CentOS or Debian/Ubuntu.

Take a walk through EXT4's history, features, and optimal use, and learn how it differs from previous iterations of the EXT filesystem.

List of differences between ext2, ext3 and ext 4 Linux file systems. One of the Linux interview question answered in this article!

As we already knows, in Linux, everything is configured as a file. This includes not only text files, images and compiled programs, directories, partitions and hardware device drivers, etc,.

In the world of Linux | UNIX system administration one of our tasks is to perform Linux check disk space. Performing Linux check disk space operation makes us aware about the current utilization of the mount point within the system. Here is list of command for Linux check disk space.

Renaming multiple files manually can be a pain and not everyone is comfortable performing such operations from the command line. Below you'll find 3 Linux GUI utilities that should be able to cover most of your bulk renaming needs.


Muy útil para desarrolladores o para limpiar el directorio de fotos que hayan sido alimentados múltiples veces y se hayan generado copias y copias de la misma foto.

It is a common requirement to find and replace duplicate files for most of the computer users. Finding and removing duplicate files is a tiresome job that demands time and patience. Finding duplicate files can be very easy if your machine is powered by GNU/Linux, thanks to 'fdupes' utility.

A tutorial showing how to enable Linux Access Control Lists as well as how to use ACL's to go beyond basic permissions

Esta herramienta monitorea la salud de los discos duros para brindar alertas tempranas que permitan al administrador prevenir pérdidas de información

Smartctl (Self-Monitoring, Analysis and Reporting Technology) is a command line utility or a tool in UNIX like operating system that perform SMART tasks such as printing the SMART self-test and error logs, enabling and disabling SMART automatic testing, and initiating device self-tests.

Si desean almacenar información en la nube, en espacios de bajo costo o gratuitos, aquí está la guía que estaban buscando.

If you're dual booting Windows and Linux, you'll probably want to access files on your Linux system from Windows at some point. Linux has built-in support for Windows NTFS partitions, but Windows can't read Linux partitions without third-party software.

So we've rounded up some third-party software to help. This list is focused on applications that support the Ext4 file system, which most new Linux distributions use by default. These applications all support Ext2 and Ext3, too-and one of them even supports ReiserFS.

When Google introduced Google Drive in April 24, 2012, they promised Linux support “coming soon.” That was nearly five years ago. Google still hasn't released an official version of Google Drive for Linux, but there are other tools to fill the gap.

Google is one of the best known search engine which offers many things as FREE of cost like gmail, gdrive, youtube, google+, etc. Everything we can access through web browser but one big challenge in Linux to access gdrive (Its offering 15GB of free storage) natively through desktop app.

As of now there is no official google drive client for Linux but the same time we can saw official google drive clients for other operating systems such as Windows, Android, OS X & iOS.

Usually, to delete/remove a file from Linux terminal, we use the rm command (delete files), shred command (securely delete a file), wipe command (securely erase a file) or secure-deletion toolkit (a collection of secure file deletion tools).

Learn how to resolve bad magic number in super-block error in Linux. This process describes step by step procedure to resolve bad magic number in super-block error.

Get access to any files from Windows!

Wiping a disk is done by writing new data over every single bit.

I am going to sell my laptop soon. Before discarding my system, I want to make sure that no one should be able to use my personal data using any method (format do not work). Is there any open source software out there that can help me permanently erase my hard disk?

You may need to wipe you hard drive to clean up partition errors, bad installations, or for privacy. This will show you howto do this


In this tutorial we'll refer to a practical example of Linux dd command that can be used by system administrators to migrate or clone a Windows Operating System or a Linux OS from a larger HDD partitioned in MBR or GPT layout style to a smaller SSD. In this excerpt we'll use as an example a Windows system installed on a hard disk with multiple partitions. This method can become quite complicated in case the HDD is partitioned in MBR scheme and contains an extended partition with multiple logical partitions or the partitions are out of order. I suggest you don't use this method if that's the case. In such cases it's safer to use ddrescure which can clone your entire disk layout (partition table and used blocks inside each partitions) without actually transferring the empty space. DDrescure can be obtained by installing gddrescue package from Ubuntu main repositories.

When you delete a file accidentally or intentionally on your system using 'shift delete' or delete option or empty Trash, the file content is not destroyed from the hard disk (or any storage media).

It is simply removed from the the directory structure and you cannot see the file in the directory where you deleted it, but it still remains somewhere in your hard drive.

You know those times when things go wrong on your computer, and it won't boot, or you can't' login into your system, or there's a rootkit messing up your booting or you just want to recover files from a drive. Those are the times having a rescue disc will do you a great deal of good in helping you out. So let's take a look at 5 very useful Linux based Rescue CDs you can check out.

SystemRescueCd is a Linux system rescue disk available as a bootable CD-ROM or USB stick for administrating or repairing your system and data after a crash. It aims to provide an easy way to carry out admin tasks on your computer, such as creating and editing the hard disk partitions. It comes with a lot of linux software such as system tools (parted, partimage, fstools, ...) and basic tools (editors, midnight commander, network tools). It can be used for both Linux and windows computers, and on desktops as well as servers. This rescue system requires no installation as it can be booted from a CD/DVD drive or USB stick, but it can be installed on the hard disk if you wish. The kernel supports all important file systems (ext2/ext3/ext4, reiserfs, btrfs, xfs, jfs, vfat, ntfs), as well as network filesystems (samba and nfs)

Now a days, computer or digital forensics is a very important because of  crimes related to computer, Internet and mobiles. Evidences such as computer and digital devices contain or store sensitive information which can be useful for forensic investigator in a particular crime or incident.

Digital forensic investigation required tools to extract desired information from the devices. Several commercial  tools are exist for forensic investigation however huge amount is required to buy. Open source community also contributed in this field and there are several open source tools for digital forensic field.  In this article, best tools related to digital forensic will be explored.

The developers of the DEFT Linux forensic operating system have announced the immediate availability for download of a new edition called DEFT Zero, versioned 2017.1, and based on Lubuntu 14.04.02 LTS.

When you rescue your data from a dying hard drive, time is of the essence. The longer it takes to copy your data, the more you risk losing. GNU ddrescue is the premium tool for copying dying hard drives, and any block device such as CDs, DVDs, USB sticks, Compact Flash, SD cards -- anything that is recognized by your Linux system as /dev/foo. You can even copy Windows and Mac OS X storage devices because GNU ddrescue operates at the block level, rather than the filesystem level, so it doesn't matter what filesystem is on the device.

We're all on the same team, and all working towards the same goal of making our open source software better. Your small contributions make a big impact.


Most peripherals aren't supported under Linux, right? Well, there's a lot more support available than you probably think. While it's true that most hardware manufacturers completely neglect Linux, it's also true that the open source community is capable of just about anything. They've stepped up and created excellent open-source drivers for a lot of popular gaming hardware. Then, of course, you have mice that just don't need drivers and will work out of the box. Those are a great option for gaming on Linux, too.

  • Halo
  • MineCraft
  • Gta San Andreas
  • Fifa 2005
  • Need for speed
PlayOnLinux is a free program that helps to install, run, and manage Windows software on Linux. It can also manage virtual C: drives (known as Wine prefixes), and download and install certain Windows libraries for getting some software to run on Wine properly. Creating different drives using different Wine versions is also possible. It is very handy because what runs well in one version may not run as well (if at all) on a newer version. There is PlayOnMac for macOS and PlayOnBSD for FreeBSD.
Wine is the compatibility layer that allows many programs developed for Windows to run under operating systems such as Linux, FreeBSD, macOS and other UNIX systems. The app database (AppDB) gives users an overview of a multitude of programs that will function on Wine, however successfully.

Both programs can be obtained using your distribution's software center or package manager for convenience.

It seems someone has forked Wine-Staging adding in all the needed patches for Overwatch to work, so I tested it out.

Thanks to Lutris already having this special Wine build available for use, I decided to borrow my girlfriend's copy of Overwatch to see how far it will go.

Total War: WARHAMMER [Steam, Feral Store] is the latest big Linux port from Feral Interactive. As someone who has only recently become a fan of Warhammer, it was fun to see this game arrive on Linux.

"Night in the Woods," the much anticipated crowdfunded game scheduled to be released next week - with a GNU/Linux version, BTW - built a development community by open sourcing code.

We'll show you how to make a Minecraft server with beginner-friendly step-by-step instructions. It will be a persistent multiplayer server that you can play on with your friends from all around the world. You don't have to be in a LAN.

In early October, our club, Geeks and Gadgets from Marshall University, participated in the inaugural Open Jam, a game jam that celebrated the best of open source tools. Game jams are events where participants work as teams to develop computer games for fun. Jams tend to be very short—only three days long—and very exhausting. announced Open Jam in late August, and more than three dozen games were entered into the competition.

Wine gaming is sort of a moving target. It always has been. Just when you think you know the lay of the land, something new pops up and disrupts everything. The latest curveball comes in the form of DXVK.


There you are typing happily away, when all of a sudden you accidentally hit some hotkeys and weird things happen. Linux does not yet have a universal "undo" button, which I think is the most needed feature for any computer, so you have to know what you did so you can undo it. If you don't find the offending keyboard shortcut after reading this article, you'll know where to look to find out how they're configured on your system.

Shortcuts are designed to help shorten the time required to perform frequently used commands or actions. In the below sections, we have listed keyboard shortcut keys that can be performed by pressing two or more keys at once. We have also listed command line shortcut keys that can be typed in at the shell.


Step by step procedure to upgrade kernel in RHEL, Suse and Ubuntu Linux along with sample outputs of all the commands.
No es tan dificil como se piensa
Here's how I went from Linux newbie to community contributor... Hint: study the code and start out simple.

Understanding systems that are functioning well is great preparation for dealing with the inevitable failures.

A veces las distribuciones se demoran mucho en generar el paquete RPM o DEB con las ventajas y funcionalidades del último kernel publicado.  En este artículo se encuentran las pautas para los impacientes.

Suppose you wanted to install a device driver for a new graphics card, a WiFi dongle, or a network interface card that you purchased, and for whatever reason (e.g., missing prebuilt driver, outdated driver version, non-common build options), you decided to compile and install the driver module from the source. So you went ahead and downloaded the official source code of the device driver, compiled it against the kernel, installed and activated it. The new hardware is successfully recognized, and everything works fine.

The thought of compiling your own kernels strikes fear in the hearts of new Linux users. It sounds terrifying, building the most crucial part of your system from scratch. The truth is, though, building the Linux kernel is really easy.

In this article, we will show how to remove old/unused kernel images on RHEL/CentOS/Fedora systems. However, before you remove an old kernel, it is important to keep your kernel up to date; install the latest version in order to leverage new kernel functions and to protect your system from vulnerabilities that have been discovered in older versions.

One of the strengths of Ubuntu is its stability. Each bit of software included inside releases are vigorously tested. They are essentially  "snapshots" in time. Everything stays stable. This method has proven to be very effective. Ubuntu is used heavily in work and production environments as a result of this. This is great for most users, but for advanced users looking to get the latest and the greatest, this can be a bit of a drawback.

Performing an linux kernel upgrade offers new features and improvements. Here is a quick way to perform Linux kernel upgrade.

Linux Kernel 4.15 has been released on 28 Jan 2018. You might have heard a lot about Meltdown and Spectre vulnerabilities in the chips for the past few months. Thanks to the entire Linux Kernel development team, this release contains the latest code to deal with Meltdown/Spectre issues. Even though, the issues haven't been completely fixed yet, at least we've got a temporary fix. "The Linux Kernel 4.15 version is quiet and small, and no last-minute panics, just small fixes for various issues" Says Linus Torvalds

You know that the passwords chosen by the people you support are probably not strong enough to protect your infrastructure against a serious attack. And even the few exceptions to the rule are probably being reused on multiple servers and accounts. You beg and nag, but it's a losing battle.

If you want to use Linux audio for professional work, but have been using Windows up until now, then there are some important differences you need to know about.

This article will help explain the basics of Linux audio, and it will do so by directly comparing each part of the system to the equivalent in Windows. This is to make it easy for musicians and sound engineers who understand Windows well to switch to Linux and get back their fun and freedom.

So sit back, relax, and get ready to learn:

Exactly what an audio framework is
The key differences between the way Linux and Windows handle audio
How Window's WASAPI and ASIO compare with Linux's ALSA and JACK

The Linux kernel is watching out for you, and when it detects something on the system violated the kernel's rules about proper behavior, it will shut the system down and issue an "oops"


Hace unos años Oracle compró a Sun Microsystems y esto implicó que todos los activos de la empresa formaron parte ahora del gigante de las bases de datos. Esto incluyó Java, un lenguaje de programación gratuito que ha tenido mucho éxito en el mundo y en donde se tiene una muy amplia comunidad de desarrolladores. Hay además, depósitos de software con una infinidad de bibliotecas y rutinas escritas en Java disponibles en su mayoría de forma gratuita.

La Corte Constitucional ordenó a MinTIC crear una regulación nacional para proteger los derechos de los usuarios de Internet, frente a publicaciones difamatorias.

La Corte Constitucional acaba de ordenar a Google Estados Unidos, el motor de búsqueda en Internet más grande del mundo, que debe respetar la legislación nacional en materia de protección de los usuarios y consumidores por ejercer sus actividades en el país.

The Krita Foundation is having trouble with the Dutch tax authorities. This is the situation:

El juicio de Oracle vs Google concluyó, cuando un jurado emitió un veredicto a favor de Google. El litigio comenzó en 2010, cuando Oracle demandó a Google, diciendo que el uso de las API de Java en Android violó la ley de derechos de autor. Después de un juicio de 2012, un juez sostuvo que las API no pueden ser propiedad del todo, pero que la decisión fue revocada en apelación. En el ensayo de este mes, Google argumentó con éxito que el uso de las API de Java, cerca de 11.500 líneas de código en todo, estaba protegido por "uso justo".

Google acaba de perder un importante caso de derechos de autor que podría costarle miles de millones de dólares y cambiar la forma en que las compañías tecnológicas abordan el desarrollo de tecnología.

Es debatible el modelo que utiliza MySQL para licenciar su producto, ellos dicen que es libre, pero coharta libertades escenciales... ¿qué opinan ustedes?

Tras leer el reciente articulo publicado en Gizmondo criticando la seguridad de Telegram, me preocupé mucho y decidí investigar sobre el tema y asegurarme de lo que William Turton afirmaba como un riesgo a la seguridad de tus datos fuera cierto. Por supuesto hace tiempo aprendí que en la Internet debes tener varias fuentes para confirmar cierta noticia, nada más fácil que "pagar" para que alguien publique una nota de desprestigio de algo o de alguien. No sería la primera vez que una web de tecnología claramente "se vende" hablando de una cosa o de una persona mal al principio y "mágicamente" muy bien, poco después (¿Verdad Apple Watch?).

El gobierno ruso solicitó a Telegram las claves de cifrado de su aplicación para poder así acceder a los mensajes enviados desde su plataforma. Pero desde Telegram se han negado en todo momento a darlas y el gobierno les dio una fecha límite para entregarlas, plazo que finalizó y ahora las autoridades han solicitado al órgano regulador que impida el uso de Telegram en toda Rusia.

Russia's planned ban on Telegram, the highly secure messaging service, could make it easier for U.S. authorities to spy on Russian citizens who switch to online alternatives that are more vulnerable to snooping, Telegram CEO Pavel Durov warned.

En 2016, Rusia aprobó una ley antiterrorista que requiere a los servicios de mensajería colaborar con las autoridades para que estas puedan descifrar sus comunicaciones. En marzo, el Kremlin dio 15 días a Telegram para entregar sus claves de cifrado, pero la compañía se negó. El viernes, un tribunal de Moscú ordenó cortar el acceso a Telegram en el territorio ruso. Ahora los proveedores de Internet han respondido con un bloqueo masivo.

Telegram no se va a doblegar ante Rusia. Eso es lo que asegura el cofundador de la plataforma de mensajería, Pavel Durov, tras los intentos de bloqueo de las autoridades rusas. Asegura que prometió privacidad a sus usuarios y que no piensa romper tal promesa aunque suponga la desaparición del servicio.

You enjoy thinking about free software licenses, you're angry about the latest patent troll, and you've said IANAL so many times that you've considering becoming an open source lawyer. What now?

The recent World Trade Organisation (WTO) meeting in Geneva has brought Antigua's plan to run a copyright-free download site for media one step closer to reality.

Quienes defendían (defendíamos) la propuesta de Sun Microsystems la década pasada temblábamos ante la noticia. Oracle compraba Sun en abril de 2009 por 7.400 millones de dólares, y la comunidad Open Source que estaba encantada con la filosofía de Sun hasta ese momento temía lo peor.

Y lo peor ocurrió. Lenta pero inexorablemente Oracle fue desvelando sus cartas. Unas que desmotraron que a pesar de hacerse con desarrollos globales como Java o MySQL a Oracle solo le interesaba una cosa: destruir Sun y todo su legado.

Oracle is shutting down SPARC and Solaris. Good bye, Sun. It was nice knowing you.

Por supuesto hay quienes defienden el licenciamiento dual, para mi el artículo manipula muchos términos inadecuadamente, pero lo presento a ustedes para que puedan escuchar la otra cara del debate.

Oracle demanda a Google por utilizar el JDK que no es libre en android.

Google de ahora en adelante va a utilizar openJDK en android.

Conclusión: Como Android es el sistema operativo más utilizado, a Oracle le va a tocar dejar de utilizar el JDK normal si quiere mantenerse en el estándar


Ha! Guess who's back in the news? Even as a ghost, SCO is trying to pickpocket IBM's wallet. Well, it's not a ghost exactly. It's brain dead and on life support, but just alive enough to seek yet another day in court.

Otro artículo que cuestiona la libertad en los licenciamientos duales.


One important thing to master under Linux System/Server Administration is package management using different package management tools.

Más información para mantener actualizado un debian/Ubuntu

Antes de terminar el curso es conveniente que lean este artículo para que dejen ajustado su ubuntu.

¿Hay diferencias entre "sudo apt-get update", "sudo apt-get upgrade", "sudo apt-get dist-upgrade"?

  • update: actualiza la lista de paquetes disponibles y sus versiones, pero no instala o actualiza ningún paquete. Esta lista la coge de los servidores con repositorios que tenemos definidos en el sources.list.
  • upgrade: una vez el update ha descargado la lista de software disponible y la versión en la que se encuentra, podemos actualizar dichos paquetes usando este comando: apt-get upgrade. Instalará las nuevas versiones respetando la configuración del software cuando sea posible (esta es la maravilla de este tipo de sistemas). Con upgrade actualizas el sistema operativo pero no los críticos (es una actualización segura)
  • dist-upgrade: Actualiza la versión del sistema de la versión LTS (Long time support) a la siguiente LTS.
  • full-upgradeactualizacion completa
  • safe-upgradeactualización segura
upgrade is used to install the newest versions of all packages
currently installed on the system from the sources enumerated in
/etc/apt/sources.list. Packages currently installed with new
versions available are retrieved and upgraded; under no
circumstances are currently installed packages removed, or packages
not already installed retrieved and installed. New versions of
currently installed packages that cannot be upgraded without
changing the install status of another package will be left at
their current version. An update must be performed first so that
apt-get knows that new versions of packages are available.

dist-upgrade in addition to performing the function of upgrade,
also intelligently handles changing dependencies with new versions
of packages; apt-get has a "smart" conflict resolution system, and
it will attempt to upgrade the most important packages at the
expense of less important ones if necessary. So, dist-upgrade
command may remove some packages. The /etc/apt/sources.list file
contains a list of locations from which to retrieve desired package
files. See also apt_preferences(5) for a mechanism for overriding
the general settings for individual packages.


Oh, the convoluted world of Apple! Neither can you live without an iDevice nor can you live with it. -Even more so, if you're a Linux user. Getting the pretty penguin to tango with Apple's ever-expanding product line has always been a hassle-filled path. From the early days of the iPod, Linux developers have been working hard to make each and every Apple device work with the penguinian OS out of the box. Though they've succeeded to a certain extent, we'll all have to admit that there's a lot of work to be done.

I do hope that these fixes work for everyone but it's not a guarantee because the bug is hardware dependent and though the workaround works for most laptop models, there are surely a few exceptions.

A step by step guide showcasing how to install Raspberry Pi without a keyboard and monitor, i.e., headless setup of Raspberry Pi using Linux.

OpenVPN is an open source secure tunnel application. It creates an encrypted tunnel between a client and a server. Any data passing through the tunnel is immune from being read by anyone that is able to intercept the data. In this case, the client will be your Android phone and the server will be a server that you own running OpenVPN.

This is extremely valuable because it means that all of your data is unreadable by anyone between you and your server. This includes the suspect WiFi network you just connected to, your phone company, or even your office.

OpenVPN has a (well-deserved) reputation for being difficult to setup and configure. However, we will employ some additional tools to get an OpenVPN server up and running in a couple of minutes and get your phone connecting and routing all data to it in a few more.

All you need for this guide is:

  1. A server running Ubuntu 16.04 (newer versions may work but I have only tested this on 16.04).
  2. An Android phone.

Your server will need a public IP address that does not have anything bound to port 443. This is the port that HTTPS usually binds to so if you are running a website from this IP then the following guide will not work.

We will use port 443 because it is frequently allowed outbound through firewalls and the OpenVPN traffic will most likely be mistaken for simple HTTPS traffic.


As a system engineer, you will often need to produce reports that show the utilization of your system's resources in order to make sure that: 1) they are being utilized optimally, 2) prevent bottlenecks, and 3) ensure scalability, among other reasons.

Listing of important Linux log files and their formats. These logs plays vital role in troubleshooting and every sysadmin should be aware of them.

Linux operating system and many applications create special files commonly referred to as "logs" to record their operational events. These system logs or application-specific log files are an essential tool when it comes to understanding and troubleshooting the behavior of the operating system and third-party applications.

Una guía para el montaje de los monitores que permite:

  • Consultar los núcleos utilizados
  • Consultar el primer momento del arranque.
  • Contador de inicios del sistema.
  • Contar las paradas buenas y malas.
  • Calcular el tiempo de actividad y el porcentaje de tiempo de inactividad desde el primer momento del arranque.
  • Calcular el tiempo de actividad del sistema acumulada, el tiempo de inactividad y total.
  • Imprimir el tiempo de actividad actual.
  • Imprimir tabla o una lista formateada con la mayor parte de los valores almacenados previamente

En lugar de utilizar "aptitude install git"

  • Si está en Mageia dé el comando: "urpmi git"
  • Si está en Ubuntu dé el comando: "apt-get install git"

El intercambio de información con el disco duro es uno de los principales cuellos de botella que existen actualmente.  Con este comando lograremos conocer el estado de las congestiones que hay aquí.

In this article we have made a list of the most used and most useful tools to monitor the performance for your box. We provided a link for each of them and split them into 2 categories: command lines one and the ones that offer a graphical interface.

aureport is part of a larger toolset that comes with auditd. Using auditd to monitor some preset events is already quite useful, but where it comes into its own is when you customize it to monitor whatever you want.

Look deeply into your Linux code with these Berkeley Packet Filter (BPF) Compiler Collection (bcc) tools.

Hace tiempo venimos mostrando comandos y formas para monitorear tu Linux como ps, top, iotop, vmstat por nombrar algunas, esto es importante para un sysadmin dado que es el encargado de hacer que la magia de la tecnología funcione entre los mortales, este procedimiento lo probé en Debian Jessie, así que funcionará en sus derivadas, veamos como funciona.

Cpustat is a powerful system performance measure program for Linux, written using Go programming language. It attempts to reveal CPU utilization and saturation in an effective way, using The Utilization Saturation and Errors (USE) Method (a methodology for analyzing the performance of any system).

No longer a simple log-processing pipeline, Logstash has evolved into a powerful and versatile data processing tool. Here are basics to get you started.

GoAccess is an interactive and real time web server log analyzer program that quickly analyze and view web server logs. It comes as an open source and runs as a command line in UNIX/Linux operating systems. It provides brief and beneficial HTTP (web server) statistics report for Linux administrators on the fly. It also take care of both the Apache and Ngnix web server log formats.

En mageia, para instalarlo, el comando es "urpmi goaccess"

Cacti is a complete network graphing solution designed to harness the power of RRDTool's data storage and graphing functionality. Cacti provides a fast poller, advanced graph templating, multiple data acquisition methods, and user management features out of the box. All of this is wrapped in an intuitive, easy to use interface that makes sense for LAN-sized installations up to complex networks with hundreds of devices.

One of the keys to protecting a Linux system is to know what's going on inside it -- what files change, who accesses what and when, and which applications get run. Incrond was used up until some years ago for the former, but, despite rumors to the contrary, development seems to have stopped since about four years ago.

Herramientas de análisis del uso de la memoria de intercambio

When we talk of performance in computing, we refer to the relationship between our resources and the tasks that they allows us to complete in a given period of time.


¿Alguna vez has querido grabar la pantalla de tu PC con Ubuntu y no has sabido cómo hacerlo? Podemos querer capturar la pantalla de nuestros dispositivos, móviles y de escritorio, por muchas y muy variadas razones. Entre ellas está el compartir en redes sociales, sobre todo capturas de una sola imagen, o hacer tutoriales. Con la cantidad de desarrolladores y programas disponibles que hay para Linux, en muchas ocasiones no sabemos por dónde empezar, pero si lo que queremos es grabar en vídeo la pantalla de nuestro PC, podemos hacerlo con el famoso reproductor VLC Media Player.

Grabar tu pantalla o hacer un pantallazo de tu ordenador usando Linux no tiene por qué ser una tarea complicada. Para hacer esta tarea más sencilla, no descartes usar alguna de las herramientas que te menciono a continuación. Aquí están las 5 mejores herramientas de captura de vídeo, y también las más sencillas y eficaces de usar. 

In August 2016, I wrote about about why I like the Guayadeque music player, and then I used the six characteristics that seemed most important to me to evaluate other music players: Quod Libet, Gmusicbrowser, DeaDBeeF, Audacious, and Rhythmbox. Kind readers offered quite a few other interesting suggestions. Up for consideration in this installment are VLC, Clementine, QMMP, and Amarok.

RuneAudio describes itself as "free and open-source software that turns embedded hardware into Hi-Fi music players." By installing RuneAudio on a Raspberry Pi, you transform it into a Hi-Fi media center capable of playing music from multiple sources.

Python can help you skip over the fussy little steps required to publish podcasts. We walk through a custom script for automating the process.

The software racket is like anything else: there are loud projects that get a lot of attention but don't actually get much done, there are heavyweights that move in and make sure things get done, and there are the quiet ones that work with their head down, diligently, only to turn up at the finish line with a work of art. In this analogy, Kdenlive is my personal heavyweight, but Flowblade has lingered in the background, developing and improving into a surprisingly effective and efficient video editor for Linux.

The Advanced Linux Sound Architecture (ALSA) provides Linux computers with audio support. Popular distros such as Ubuntu and Arch Linux run it by default, so there’s a good chance you’re using it right now to play music through your speakers or headphones.

In computing, Batch processing is the execution of a series of tasks in a program non-interactively. In this guide will offer you 4 simple ways to batch convert several .PNG images to .JPG and vice-versa using Linux command-line tools.

Are you a music producer and use Linux as your primary operating system, then music production is going to become easy for you after reading this article. There are good music production software in Linux just as it is in Windows and Mac OS, though a few features may vary but the underlying functionalities mostly are the same.

Los GIFs animados están de moda... otra vez. Parece que hubo unos años en los que estos archivos tuvieron muy poco empuje y fama, pero hace relativamente poco tiempo empezaron a salir como la espuma. Esto fue debido probablemente a su inclusión en redes sociales y programas de mensajería instantánea (tipo WhatsApp o Telegram). El caso es que están aquí, y están para quedarse. Y parece que gozan de muy buena aceptación (hasta yo los utilizo diariamente). Pero... ¿cómo podemos hacernos nosotros nuestras propias animaciones GIF? En esta entrada os voy a explicar 9 formas de crear GIFs animados utilizando exclusivamente software libre. Bien sea a partir de imágenes o bien a partir de vídeos, no va a haber forma de no hacerlos ni GIF que nos resista. Es fácil, sencillo y sobre todo... ¡muy divertido!

Desde la línea de comando es fácil comenzar a hacer un streaming de video.

Green Recorder is a functional desktop screen recorder for Linux systems that was built using GTK+ 3, FFmpeg, and Python.

It support video and audio recording on almost all Linux interfaces and Wayland support (GNOME session) will be added soon.

The supported video and audio formats are: mkv, avi, mp4, wmv and nut.

Home Recording with Ubuntu Studio Part One: Gearing Up

Twenty years ago, the cost of building a studio for the creation of electronic music was pricey, to say the least. The cost of a computer that was suitable for multimedia production could cost the average musician between $1,000 and $2,000. Add in the cost of recording software, additional instruments and equipment, and one could easily spend between $5,000 and $10,000 just to get started.

Home Recording with Ubuntu Studio Part Two: Install-O-Rama

Home Recording with Ubuntu Studio is a three part series of articles that discusses how to create an affordable home recording studio with free and open source software. In Part One: Gearing Up, I discussed the hardware components that are integral to home studio recording, and demonstrated how you can acquire this equipment for under $1,000. In part two of the series, we will start to go into depth about the software aspects of the studio. First, I will walk you through an installation of Ubuntu Studio, a Linux-based operating system that was made for content creation. Next, I will install additional software from the KXStudio repositories and finally, I will make some adjustments to the installation to improve its user experience.

In a comparison test, we checked out nine free video editing programs: Cinelerra, Flowblade, Kdenlive, Kino, Lightworks, LiVES, OpenShot, Pitivi, and Shotcut.

OBS Studio is a free and open source cross-platform app with which you can create video records of your desktop screen and also live stream directly. You can use it to conveniently share your gaming, art, entertainment activities with, YouTube,, DailyMotion,,, along with custom streaming servers free of charge! It comes with many in-house features that allow you to produce professional videos e.g. Studio Mode lets you live preview and adjust your scenes and sources before making them available for public viewing; you can choose to set any combo of hotkeys to start/stop streams or recordings, switch between scenes, mute audio sources, e.t.c.

Kazam is one of the best screen recording tool for Ubuntu and Linux Mint Desktop. It records the contents of your desktop and create a video file which can be played in most of video player which supports VP8 and WebM video format. While creating video of our desktop we have an option to capture audio sound from input device like Speakers and Microphone. Some of the keys features of Kazam are listed are below :

For Windows users, Windows Movie Maker serves as a great free video editor. And for Mac users, iMovie is an awesome free video editing software. Both of them are used widely for editing videos and creating home videos.

Mac and Windows users have it good when it comes to laying down a rough mix, some vocals or a tasty bassline. With apps like Garageband, FLStudio, Sonar and Reason, the ability to create professional recordings is limited only to expertise and creative flair.

     Ubuntu para diseñadores gráficos   


Make your revision-control experience more useful and powerful with these 13 tricks and tips for Git.

Github is an online platform built to promote code hosting, version control and collaboration among individuals working on a common project.  Projects can be handled from anywhere through the platform. (Hosting and reviewing code, managing projects and building software with other developers around the world) The GitHub platform offers project handling to both open-source and private projects. 

Features offered in regards to team project handling include; GitHub Flow and GitHub Pages. These functions make it easy for teams with regular deployments to in handling the workflow. GitHub pages, on the other hand, provides a place for showcasing open source projects, displaying resumes, hosting blogs among others. 

GitHub is a treasure trove of some of the world's best projects, built by the contributions of developers all across the globe. This simple, yet extremely powerful platform helps every individual interested in building or developing something big to contribute and get recognized in the open source community.

Developers are frequently looking for integrated developer environments (IDEs) that meet specific needs or those that offer a broad range of features and supported languages to use on the regular. There are tons of IDEs to choose from, each with a distinct set of functions, features and tools to streamline the workflow. There's an IDE for practically any programming language you want to work with, while some IDEs support practically every language known to man either natively or by extending capabilities with plug-ins or add-ons. There are also many cross-IDE integrations, with tools building, enhancing and stacking for some of the most impressive, yet incredibly flexible, functionality in the development realm.

In this tutorial, we will explain how to create a new user and grant permissions to that user in MySQL. MySQL is an open source relational database managed system(RDBMS) that enables users and applications to store, organize, and retrieve their data. It has an access control system that consists of permissions that the users can have within tables and databases, we will take a look at some of the options this access control system offers later in this tutorial.

This article consolidates information from several sources into the format I use to setup MySQL Master/Master Replication. The beauty of Linux and open source is that there are many different ways to do this. Please take a look at my references and use them to accommodate any needs you may have. If you have any questions or run into any issues feel free to drop me a line in the comments

Un ejemplo de cómo crear una aplicación Web utilizando Python como lenguaje de programación, Maria como base de datos y Flask como framework.

En el artículo anterior vimos cómo se instalaban todas las herramientas necesarias para desarrollar aplicaciones Android desde Windows. En éste vamos a ver cómo se haría la instalación de las herramientas en un entorno Linux, más concretamente para Ubuntu 14.04, utilizando repositorios cuando sea posible para mantener las herramientas actualizadas.

What's the next step after you've outgrown drag-and-drop programming? We explain how to get started with the LÖVE game engine, which uses the scripting language Lua.

Codeblocks is an Integrated Development Environment (IDE) for programmers and developers. It comes with predefined tools to develop Qt applications, plugins, console applications, etc. considering one has installed the required tools independently (eg- Qt development tools). Most IDEs come with "project" feature and that's the turning point because some of them requires user to create one before proceeding any further, where in some cases programming (in schools and colleges) exercise don't really need tedious task of creating and setting up "projects" (More to this later).

Regardless of how experienced a coder you are, any software you develop can't be completely free of bugs. So, identifying bugs and fixing them is one of the most important tasks in the software development cycle. While there are many ways of identifying bugs (testing, self review of code, and more), there are dedicated software - dubbed debuggers - that help you understand exactly where the problem is, so that you can easily fix it.


Get a better understanding of datetime in Python with this primer.

"A real coder doesn't use an IDE, a real coder uses [insert a text editor name here] with such and such plugins." We all heard that somewhere. Yet, as much as one can agree with that statement, an IDE remains quite useful. An IDE is easy to set up and use out of the box. Hence there is no better way to start coding a project from scratch

Machine learning and data analysis are two areas where open source has become almost the de facto license for innovative new tools. Both the Python and R languages have developed robust ecosystems of open source tools and libraries that help data scientists of any skill level more easily perform analytical work.

These two are similar in some ways but are worlds apart in their approach to solving problems.

In programming, a library is an assortment of pre-compiled pieces of code that can be reused in a program. Libraries simplify life for programmers, in that they provide reusable functions, routines, classes, data structures and so on (written by a another programmer), which they can use in their programs.

For instance, if you are building an application that needs to perform math operations, you don't have to create a new math function for that, you can simply use existing functions in libraries for that programming language.

Examples of libraries in Linux include libc (the standard C library) or glibc (GNU version of the standard C library), libcurl (multiprotocol file transfer library), libcrypt (library used for encryption, hashing, and encoding in C) and many more.

If you're working with images on a computer, you're bound to eventually run into corrupted files that ruin your day. I run into this with animation renders (remember, the best practice here is to render to a sequence of image files and not a single video file). However, animation and visual effects are not the only places where you see image corruption. You can just as easily run into this in other fields. Perhaps you're a photographer and you've shot a bunch of brackets HDRI (High Dynamic Range Imaging) tone mapping and something glitches when transferring files from your camera.

Setting up a motion detection system on Linux is fairly easy and simple. All that we need is a webcam (or laptop), the "motion" package, and a few minutes to set everything up. The purpose for doing this may be private space surveillance, enhancement of personal security, or simply a fun project.


Samba es una fantástica herramienta para compartir directorios e impresoras con Windows/Linux.

Samba 4.5 has been released and it is the latest, newest stable branch of the free widely-used, cross-platform, and open-source software project that re-implements the SMB/CIFS networking protocol on UNIX-like platforms.

Cómo se puede utilizar SSH para transferir archivos entre 2 equipos en forma segura.

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, which used to find the Availability of a host on an Internet Protocol (IP) network.

The ip command provides a lot of information on network interfaces. Do you understand what it's telling you?

Did you know that you can assign more that one IP address to a single physical network interface? This technique is quite useful, for example when working with Apache and virtual hosts, as it allows you to access same Apache server by using two different IP addresses.

Connecting your Linux computer to a network is pretty straightforward, except when it is not. In this article I discuss the main network configuration files for Red Hat-based Linux distributions, and take a look at the two network startup services: the venerable network startup, and the controversial NetworkManager.

Linux easily manages multiple network interface adapters. Laptops typically include both wired and wireless interfaces, and may also support WiMax interfaces for cellular networks. Linux desktop computers also support multiple network interfaces, and you can use your Linux computer as a multi-network client, or as a router for internal networks; such is the case with a couple of my own systems.

Starting from version 4.0, Samba is able to run as an Active Directory (AD) domain controller (DC). In this tutorial, I will show you how to configure Samba 4 as a domain controller with Windows 10, CentOS 7 and CentOS 6 clients.

If you're a Linux administrator, there will be times when you have to work with the command line... many times. There's a reason for that. With the command line comes great power and flexibility. For that very reason, you need to know the command line and know it well.

Una guía para optimizar el uso de la tarjeta de red inalámbrica

ncat or nc is networking utility with functionality similar to cat command but for network. It  is a general purpose CLI tool for reading, writing, redirecting data across a network. It is  designed to be a reliable back-end tool that can be used with scripts or other programs.  It's also a great tool for network debugging, as it can create any kind of connect one can need.

Starting from version 4.0, Samba is able to run as an Active Directory (AD) domain controller (DC). In this tutorial, I will show you how to configure Samba 4 as a domain controller with Windows 10, CentOS 7 and CentOS 6 clients.

I will be using 3 Systems, one CentOS 7 server and a Windows 10 client for remote management, a CentOS 7 and CentOS 6 client.

In this tutorial, I will show you how to configure an additional domain controller which is one of the key features of SAMBA 4. I will be using the existing Samba 4 server from my previous tutorial as primary domain controller. This setup provides a degree of load balancing and failover for AD services (Ldap schemas and dns ) and configuring it is really easy. We can also use this feature to scale up the environment.

In the last tutorial, I showed you how to configure Samba on Centos 7 by compiling Samba from source since the package supplied by RedHat doesn't support Active Directory. I noticed that there is a repository called Wing which supplies the samba4 rpm with AD support. In this tutorial, I will be using this repository for Samba installation. I will also show how to create a samba share.

I listen to music all the time while working at my PC (which is much of the day). Sometimes I'm pretty much tethered to the desk for long stretches, and sometimes I wander about the office (aka house) for new ideas or just to change my perspective. When I decide to step away, I like to take my music with me. How do I do that? Sure, I could turn the music up to eleven, but the cats (and my wife) aren't too keen on hearing Devin Townsend Project at near blistering levels. And, sometimes I'm the only one in the mood for classical music.

Vamos a usar unos comandos para poder medir la intensidad de la señal en nuestro Linux, Debian Jessie en este caso, cuando estamos conectados por wifi, sin instalar nada.

If you make use of a Linux server to share out directories and files, you'll want to make sure you do everything you can to prevent the likes of SambaCry. Here are a few tips.

How to use the NMAP Security Scanner on Linux

VPN, or virtual private network, is a secure method of connecting remote internet resources together as if they were under the same LAN. OpenVPN is a popular implementation that works on Linux, Windows, and Mac operating systems and can be utilized to create complex, encrypted networks between physically dispersed servers.

The OpenVPN Access Server is a solution built on top of traditional OpenVPN that is used as a complete portal for managing connections, users, and interfaces. It provides the underlying VPN instance, a web interface for managing the suite, and a client that can be used within a web browser.

In this guide, we'll install and configure the OpenVPN Access Server on a CentOS 6.5 VPS instance.

OpenVPN is a full-featured SSL VPN (virtual private network). It implements OSI layer 2 or 3 secure network extension using the SSL/TLS protocol. It is an open source software and distributed under the GNU GPL. A VPN allows you to connect securely to an insecure public network such as wifi network at the airport or hotel. VPN is also required to access your corporate or enterprise or home server resources. You can bypass geo-blocked site and increase your privacy or safety online.

Razones para montar un servidor VPN hay muchas. En mi caso es simple: por mi trabajo me toca viajar y estar lejos de casa muy seguido por lo que necesito acceder a mi red para realizar distintas tareas que requieren que mis equipos se vean unos a otros como si estuvieran conectados a la misma LAN, todo siempre de la manera más segura posible. Si bien es cierto que muchas de esas tareas las realizo sobre SSH, hay otras que prefiero hacerlas a través de un servicio VPN.

In this tutorial, LibreSwan will be installed on the Ubuntu Platform. LibreSwan is an open source implementation of the IPsec protocol, it is based on the FreeSwan project and is available as ready to use the package on RedHat based Linux distributions. However, detailed instructions are given in the source code of the project to compile it on other Linux platforms. After the installation process, a gateway to gateway based IPsec VPN will be configured to secure data from sender to receiver peers.

Details about the IPsec protocol are given in our previous article. However, a brief information about the two parts of the IPsec protocol with respect to LibreSwan is explained below.

In this article, our focus is on the open source implementation of the IPsec protocol. The security of the network layer is ensured by using the IPsec protocol which consists of following two components.

  • Authentication Header (AH) 
  • Encapsulating Security Payload (ESP)

Metasploit was created by H. D. Moore in 2003 as a portable network tool using Perl. By 2007, the Metasploit Framework had been completely rewritten in Ruby.

On October 21, 2009, the Metasploit Project announced that it had been acquired by Rapid7, a security company that provides unified vulnerability management solutions. Metasploit's emerging position as the de facto exploit development framework led to the release of software vulnerability advisories often accompanied by a third party Metasploit exploit module that highlights the exploitability, risk and remediation of that particular bug. Metasploit 3.0 began to include fuzzing tools, used to discover software vulnerabilities, rather than just exploits for known bugs. This avenue can be seen with the integration of the lorcon wireless (802.11) toolset into Metasploit 3.0 in November 2006. Metasploit 4.0 was released in August 2011. In this guide we will look into the most important part of using Metasploit, how to search exploits within it! Yeah, like it or not, if you can't search, then you got nada!

Earlier we have learned about how we can configure apache as reverse proxy. As discussed earlier, Reverse proxy is a kind of a proxy that takes http or https request & transfers/distributes them to one or more backend servers. Reverse proxy is useful in many ways, like

  • It can hide the origin serve, thus making it more secure & immune to attacks,
  • It can act as a load balancer,
  • Reverse proxy can also be used to encrypting/decrypting webserver traffic, thus taking some load off from the backend servers.
  • It can also be used for caching static as well as dynamic contents, which also reduces load off the web servers.

This Linux tutorial covers some basic network commands which can be useful when troubleshooting networking problems with other servers both within the network and across the Internet, obtaining more information about other servers.

In simplest form network is computers connected together. But during connection issues we have to check the fault within network. Hence in this article we will be discussing diagnostic Linux network command that you should know!!

Linux includes a fairly massive array of tools available to meet almost every need. From development to security to productivity to administration...if you have to get it done, Linux is there to serve. One of the many tools that admins frequently turned to was netstat. However, the netstat command has been deprecated in favor of the faster, more human-readable sscommand.

The netstat command in Linux provides a lot of information about network activities and configuration on a system. It can display information on various network interface statistics. It can be used to check the network traffic, network sockets, listening ports etc. This command provides a huge output many times, so you need to filter the output to extract the content you are looking for. This article provides the general usage of netstat command with its common options.

Linux includes a fairly massive array of tools available to meet almost every need. From development to security to productivity to administration...if you have to get it done, Linux is there to serve. One of the many tools that admins frequently turned to was netstat. However, the netstat command has been deprecated in favor of the faster, more human-readable sscommand.


Apache Guacamole is a clientless HTML5 web application that can be used to access your remote servers and desktops via a web browser. All you need is just a web browser, No additional softwares, plugins required. Install Guacamole on any system and start accessing your remote desktops in no time. It is completely free and open source software.

Ejemplos de uso del comando ip para configurar redes

NetworkManager is the default service in Fedora for interfacing with the low level networking in the Kernel. It was created to provide a high-level interface for initializing and configuring networking on a system without shell scripts. Over the past few Fedora releases, the NetworkManager developers have put in a lot of effort to make it even better. This article covers some of the major improvements that have been implemented in NetworkManager over the past few Fedora releases.

This tutorial shows how to set up a high-availability storage with two storage servers (Debian Jessie) that uses GlusterFS. Each storage server will be a mirror of the other storage server, and files will be replicated automatically across both storage nodes. The client system (Debian 8 as well) will be able to access the storage as if it was a local filesystem. GlusterFS is a clustered file-system capable of scaling to several peta-bytes. It aggregates various storage bricks over Infiniband RDMA or TCP/IP interconnect into one large parallel network file system. Storage bricks can be made of any commodity hardware such as x86_64 servers with SATA-II RAID and Infiniband HBA.

For a long time on Windows, it has been possible to use a wireless networking adapter to share an Internet connection with other computers. Usually this is done by setting up a "hotspot," or "ad-hoc" style network, broadcasted directly from the wireless networking adapter. It's very easy to do, and it's a killer feature that a lot of Windows users like.

Are you a Linux user? Want to try an alternative DNS service but are unsure how to do it? Not to worry! In this tutorial we'll go over how to change the DNS settings in Linux via a network manager. Additionally, we'll outline why it might be better to switch your entire router over rather than just doing it on individual computers manually.

How to Set Up Private DNS Servers with BIND on Ubuntu 16.04. BIND (Berkeley Internet Name Domain) is the most used DNS software over the Internet. The BIND package is available for all Linux distributions, which makes the installation simple and straightforward. In today's article we will show you how to install, configure and administer BIND 9 as a private DNS server on a Ubuntu 16.04 VPS, in few steps.

IP addresses (IPv4) are a scarce resource that is shared by different users and devices. Having an IP address conflict means that there are more than one network device or computer that claims the same IP address. IP address conflict may occur when a DHCP server has assigned an IP address to one computer, and the same IP address happens to be statically assigned to another network device by someone.

IP address conflict can also happen when there are more than one DHCP server (typically built in a router) hooked up to the local network, autonomously giving out IP addresses from the same subnet. If you are having flaky network connectivity, and suspect it is due to IP address conflicts, you can use a tool called arp-scan to detect IP address conflicts in Linux.

arp-scan sends out ARP packets on local network to collect (IP address, Ethernet MAC address). If there is more than one Ethernet MAC address claiming the same IP address, it means there is an IP conflict.

One of the most important uses of a network is for file sharing purposes. There are multiple ways Linux and Windows, Mac OS X users on a network can now share files with each other and in this post, we shall cover Nitroshare, a cross-platform, open-source and easy-to-use application for sharing files across a local network.

Linux packet stations can be used for mail, chat, and even sending messages long distances via the International Space Station.

Comandos útiles para administrar la red Wi-fi desde la línea de comandos


Decisions made years ago about which operating system to roll out can affect corporate security today. Of the big three in widespread use, one can credibly be called the most secure.

Encryption is the process of encoding files in such a way that only those who are authorized can access it. Mankind is using encryption from ages even when computers were not in existence. During war they would pass some kind of message that only their tribe or those who are concerned were able to understand.

Otro artículo con solo gpg:

Cómo se protegen los archivos con una clave usando herramientas libres.

Las empresas deben ser conscientes de su responsabilidad por la seguridad de sus sistemas, la protección de la información de sus clientes y proveedores, y la seguridad de los servicios que prestan.

El verdadero desafío que enfrenta la ciberseguridad no tiene que ver solamente con el terrorismo internacional, el espionaje promovido por los Estados, o los delincuentes cibernéticos. El problema muchas veces radica en el código fuente del software que se utiliza todos los días, ya sea del sistema operativo como de las aplicaciones que están involucradas. Las políticas internas de las empresas privadas y/o públicas deben contemplar mecanismos para garantizar la seguridad de la información que vayan más allá de la instalación de un antivirus para Windows: deberían incorporar el principio de "Privacidad por diseño".

There are plethora of tools available to encrypt and password protect your files and folders. CryptoGo is one among them. It is a simple file encrypter for your day-to-day needs. Using CryptoGo, you can easily encrypt and protect important and sensitive files. It is written in GO programming language that is developed by Google. It is currently in beta stage, but fully functional.

The day has come where the security of your data be it on a server, a work desktop, or your personal machine is one of the single most important issues you can take on. Whether you're hoping to secure company information or private email to clients, friends, and/or loved ones, you need to understand how to ensure your data cannot easily be read by the wrong people.

TCP Wrapper is an open source host-based ACL (Access Control List) system, which is used to restrict the TCP network services based on the hostname, IP address, network address, and so on. It decides which host should be allowed to access a specific network service. TCP Wrapper was developed by a Dutch programmer and physicist Wietse Zweitze Venema in 1990 at the Eindhoven University of Technology. He maintained it until 1995, and then released it under BSD License in 2001. In this brief guide, I will explain how to restrict access to Linux servers using TCP Wrappers.

In my earlier Post you we have learned how to hack windows using Kali Linux. This time we are going to hack android with Kali Linux. We are making use of msfvenom tool within Kali linux which is best combination of Msfpayload and Msfencode.

More is a *nix command line used to display the contents of a file in a console. The basic usage of morecommand is to run the command against a file as shown below:

Linux is well known for being a highly secure platform. One of the reasons for said security is the Netfilter system. For those that don't know, Netfilter is a framework, provided by the Linux kernel, that allows for various networking operations, such as packet filtering, network address translations, port translation, and the ability to block packets from reaching specific locations. For most distributions, Netfilter is implemented through the user-space application, iptables. Although many would agree that iptables is the most powerful security tool you can work with, along with that power comes a level of complexity that stumps many an IT administrator.

Iptables is a great firewall included in the netfilter framework of Linux. A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
​Configuring iptables manually is challenging for the uninitiated. Fortunately, there are many configuration tools available to assist: e.g., fwbuilder, bastille and ufw.

In this tutorial, we are going to show you how to set up a firewall with iptables on a Linux VPS running Ubuntu or CentOS as an operating system. Iptables is an administration tool for IPv4 packet filtering and NAT and it is used to set up and manage the tables of IPv4 packet filter rules in the Linux kernel.

Properly configuring and setting up a firewall is one of the most important and crucial things you need to do to secure your server.

Cómo se puede configurar un Raspberry PI como firewall para la conexión de una casa.

If you have been following the NMAP articles I have written then you may have noticed something important about the scans. NMAP prefers to perform a Ping. A Ping to NMAP is a test to verify that the system to be scanned is really on-line and exists. If NMAP is to scan multiple systems on a subnet, or a whole subnet, then it will first test which systems are available to scan.

Did you knew every time you fill in your username and password on a website and press ENTER, you are sending your password. Well, of course you know that. How else you're going to authenticate yourself to the website?? But, (yes, there's a small BUT here).. when a website allows you to authenticate using HTTP (PlainText), it is very simple to capture that traffic and later analyze that from any machine over LAN (and even Internet). That bring us to this website password hacking guide that works on any site that is using HTTP protocol for authentication. Well, to do it over Internet, you need to be able to sit on a Gateway or central HUB (BGP routers would do - if you go access and the traffic is routed via that).

Wireshark is free and open source, cross platform, GUI based Network packet analyzer that is available for Linux, Windows, MacOS, Solaris etc. It captures network packets in real time & presents them in human readable format. Wireshark allows us to monitor the network packets up to microscopic level. Wireshark also has a command line utility called 'tshark' that performs the same functions as Wireshark but through terminal & not through GUI.

Wireshark, the world's most popular open-source, cross-platform, and free network protocol analyzer software, which is being used by many security experts for analysis and troubleshooting of network issues, has been updated to version 2.0.4.

The development team behind Wireshark, the world's most popular open-source, cross-platform, and free network protocol analyzer software, announced the release of Wireshark 2.0.5 for all supported platforms.

Today, September 7, 2016, the development team behind the world's most popular network protocol analyzer, Wireshark, has proudly announced the release of a new major stable version, namely Wireshark 2.2.

Wireshark, the world's most popular open-source, free and cross-platform network protocol analyzer, has been updated recently to version 2.2.7 and is now available for download on Linux, macOS, and Microsoft Windows platforms.

Dnscrypt is a protocol that is used to improve DNS security by authenticating communications between a DNS client and a DNS resolver. DNSCrypt prevents DNS spoofing. It uses cryptographic signatures to verify that responses originate from the chosen DNS resolver and haven't been tampered with. DNSCrypt is available for multi-platforms including Windows, MacOS, UNIX, Android, iOS, Linux and even routers.

Tanto si estás buscando monitorizar clientes (host) o redes de ordenadores para identificar las últimas amenazas, existe un buen puñado de herramientas de uso libre de tipo IDS que te harán un buen servicio. Sígueme en este análisis de las principales herramientas IDS OpenSource, que te permitirán contar con una detección de intrusiones de primer nivel.

For anyone looking to protect their privacy online, Tor is an invaluable tool. It is both one of the most reliable ways to hide your identity and one of the easiest to use.

Distributions: This guide is tested for Debian 9 Stretch Linux, but it may work with other recent Debian versions.
Requirements: This guide assumes that you're running Debian on a VPS or a remote server, since that's the most likely scenario for a VPN.
A working install of Debian Stretch with root access
Difficulty: MEDIUM

A pesar de un descenso generalizado en la detección general de 'malware' en el trimestre, el 'malware' de Linux representó más del 36% de las principales amenazas identificadas en el primer trimestre de 2017, como revela el informe trimestral de seguridad en Internet, Internet Security Report de WatchGuard Technologies.

una forma bastante segura de hacer borrado de archivos y carpetas en nuestro Linux, ya sea porque vamos a vender un HD o PC, o porque queremos estar seguros que lo que borramos sea irrecuperable, todo gracias a un pequeño comando llamado shred.

Después del fenómeno mediático de WannaCry, un nuevo ransomware hace su reaparición estelar... con los servidores Linux en el punto de mira.

A server being compromised or hacked for the purpose of this guide is an unauthorized person or bot logging into the server in order to use it for their own, usually negative ends.

Disclaimer: If your server has been compromised by a state organization like the NSA or a serious criminal group then you will not notice any problems and the following techniques will not register their presence.

However, the majority of compromised servers are carried out by bots i.e. automated attack programs, in-experienced attackers e.g. "script kiddies", or dumb criminals.

These sorts of attackers will abuse the server for all it's worth whilst they have access to it and take few precautions to hide what they are doing.

Linux is a reliable, secure choice for your data center. Even so, doing regular checks for rootkits and malware is always an advised best practice. Jack Wallen shows you how.

The Pentbox is a safety kit containing various tools for streamlining PenTest conducting a job easily. It is programmed in Ruby and oriented to GNU / Linux, with support for Windows, MacOS and every systems where Ruby is installed. In this small article we will explain how to set up a honeypot in Kali Linux. If you don't know what is a honeypot, "a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems."

Investigadores de ESET descubrieron una variante para Linux del malware KillDisk, que fue usado para atacar a la infraestructura crítica de Ucrania a fines de 2015, así como a otros blancos en el sector financiero del país en diciembre de 2016. Esta nueva variante deja a las máquinas Linux sin posibilidad de arranque, tras cifrar archivos y solicitar un costoso rescate de 250 mil dólares. Pero incluso si las víctimas vacían sus bolsillos, la probabilidad de que los atacantes descifren los archivos es muy baja.

Tor Network is an anonymous network to secure your internet & privacy. Tor network is a group of volunteer operated servers. Tor protects internet communication by bouncing it around a distributed network of relay system run by volunteers. This prevents us from people snooping the internet, they can't learn what site we visit or where is the user physically & it also allows us to use blocked websites.

Una distribución utilizada para no dejar rastro de la actividad.


In our earlier tutorial, we have learned to install wildfly 10.1.0. in this tutorial, we will learn to create a load-balancing wildfly cluster. We will be using wildfly verison 10.1.0, which is the latest wildfly version at the time of writing this tutorial. Wildfly supports clustering out of the box & we need not install any special services/packages to get wildfly cluster working.

Una ayuda para quienes elijan telefonía y plantas telefónicas como su tema de exposición.

Squirrelmail is one of the most popular Web-based email clients written in PHP. It has built-in pure PHP support for IMAP and SMTP, and it is designed to render all pages in pure HTML 4.0 with no JavaScript required, for maximum compatibility across browsers. Its installation and configuration is pretty simple. Note that if you have a VPS with WHM/cPanel or DirectAdmin, Squirrelmail comes preinstalled and ready to use with these control panels.

How do I configure Postfix MTA to send eMail using an external cloud-based SMTP server (with username: password) from a web server on Linux or UNIX-like system? How do I configure an Ubuntu server and postfix as the relay server (smarthost)?

Setting up and configuring a mail server is a challenging process, mostly because there are so many different components involved and each component has to be configured to work with the other.

In this tutorial, we will examine the process of installing Zimbra mail server in CentOS Linux environment. Zimbra is my personal favorite when it comes to open-source mail servers as it comes with a number of useful features such as built-in calendar support, email filtering rules, a modern interface for both users and admins, spam and malware scanners, etc. Besides server-side components, Zimbra also boasts of a full-featured web-based email client by which users can access emails, group calendars and document sharing in collaboration mode.

Apache HTTP is a general purpose web server, designed to achieve a balance between flexibility, portability and performance. Apache HTTP has a modular architecture which allows to extend the basic functionality by selecting a set of modules: these modules are compiled as Dynamic Shared Objects (DSO) and they may be enabled/disabled using the LoadModule directive.

Lighttpd is a secure, fast, standards-compliant web server designed for speed-critical environments. This tutorial shows how you can install Lighttpd on an Ubuntu 16.04 server with PHP 7 support (through PHP-FPM) and MySQL 5.7. PHP-FPM (FastCGI Process Manager) is an alternative PHP FastCGI implementation with some additional features useful for sites of any size, especially busier sites. I use PHP-FPM in this tutorial instead of Lighttpd's spawn-fcgi.

If you manage an Apache server, you may be noticing a large amount of TIME_WAIT connections all of the time. Don't get me wrong, TIME_WAIT is a good thing.. it basically means that your server has closed the connection, but it's being kept around so any delayed packets matched to the connection can be handled properly. We can reduce them, however.

En el software libre no se trata de "si se puede hacer" sino "de cuántas formas se puede hacer"

A DHCP Server assigns IP addresses to client computers. This is very often used in enterprise networks to reduce configuration efforts. All IP addresses of all computers are stored in a database that resides on a server machine.



Anéctodas que me han cautivado y ayudado a comprender mejor algunos de los intrincados secretos de C y la programación en general

Dive into the differences between these two operating systems that share much of the same heritage and many of the same goals.

Revisando otros artículos me topé con esta pequeña pregunta que me causó mucha gracia, es verdad que una de las primeras cosas que nos sacan en cara usuarios de otros sistemas (excepto FreeBSD) es que no usamos los GUIs. A decir verdad, a mi también me pareció bastante curioso al principio de mi viaje por GNU/Linux. Debo admitir que con el pasar del tiempo, ahora utilizo mucho más la línea de comandos que cualquier otro programa con GUI, y muchas veces prefiero programas dentro de la línea de comando a programas más elaborados con GUIs deslumbrantes.

Have you sat down with that grey-haired system administrator and watched what's happening as her (or his) fingers fly over the keyboard? Ever wondered why they're still Stuck In The Stone Age, typing text instead of using the obviously easier mouse and menus? Suspect that person is a geezer who can't learn new techniques?

The command line provides numerous ways to make our work easier. Here are 15 "tricks" that I use often to make quick work of various tasks

The Linux Foundation Certified Systems Administrator has listed in the Domains and Competencies to be able to 'Analyze text files'. This article will cover the use of six commands to analyze the contents of a text file. The six commands are: wc, cat, head, tail, more and less.

There are times when you may need to compare two files to check if they are the same. For instance, if you have two or more servers all running the same Operating System (OS) and on one server a file is causing issues then you can see if they are different. If they are different then it may be as simple as copying the one file from the working server to the failing server.

Beginners guide to ls command. Learn ls command with 12 examples which can be used in your daily Linux tasks.

If you are new to this series (and to Linux), take a look at our first installment. In that article, we worked our way through the tree-like structure of the Linux filesystem, or more precisely, the File Hierarchy Standard. I recommend reading through it to make sure you understand what you can and cannot safely touch. Because this time around, I'll show how to get all touchy-feely with your directories.

The Linux command line may be a bit hard to learn, but it's worth it. Reason being, it's so powerful that you can do almost everything with it that you can otherwise do using UI. At HowtoForge, we have already discussed a plethora of command line tools (that let you do different kind of operations), and here, in this tutorial, we will discuss a utility which you can use to shut your system down.

More is a *nix command line used to display the contents of a file in a console. The basic usage of morecommand is to run the command against a file as shown below:

Just like cp for copying and rm for deleting, Linux also offers an in-built command for moving and renaming files. It's called mv. In this article, we will discuss the basics of this command line tool using easy to understand examples. Please note that all examples used in this tutorial have been tested on Ubuntu 16.04 LTS.

At any given time on the command line, you are in a directory. So it speaks for itself how integral directories are to the command line. In Linux, while the rm command lets you delete directories, it's the mkdir command that allows you create them in the first place. In this tutorial, we will discuss the basics of this tool using some easy to understand examples.

Sometimes, while working on a Linux machine, you'll see that an application or a command line process gets stuck (becomes unresponsive). Then in those cases, terminating it is the only way out. Linux command line offers a utility that you can use in these scenarios. It's called kill.

Here are several options for terminating a program in Linux using the command line or a graphical interface.

If you are a Linux command line user, and your work involves playing with text files, you should know (if not already) that there are many command line utilities that may be of great help to you in different situations. For example, there exists a tool dubbed 'uniq' that reports or even deletes repeated lines in a file.

In this article, we will discuss 'uniq' through easy to understand examples. But before we do that, it's worth mentioning that all examples and instructions mentioned in this tutorial have been tested on Ubuntu 16.04LTS.

Pretty much regardless of your role, if your regular work involves doing stuff on the command line in Linux, you may find yourself in a situation where-in you'd want to compare two files using a command line utility. There are several command line tools that let you do this, and one among them is the 'cmp' command.

In this tutorial, we will discuss 'cmp' through easy to understand examples. But before we do that, it's worth mentioning that all examples and instructions mentioned in this tutorial have been tested on Ubuntu 16.04LTS.

While working on the command line in Linux, one thing that you'd have probably missed is how the output gets displayed in terminal. I mean, the way it fits the available area. Have you ever found yourself stuck in a situation where-in the requirement was to make sure the output of a command fits a particular width?

Sometimes, while working on the command line in Linux, you might want to create a new file. Or, there may be times when the requirement is to change the timestamps of a file. Well, there exists a utility that can you can use in both these scenarios. The tool in question is touch, and in this tutorial, we will understand its basic functionality through easy to understand examples.

Every system administrator has to deal with plain text files on a daily basis. Knowing how to view certain sections, how to replace words, and how to filter content from those files are skills you need to have handy without having to do a Google search.

I am a new Linux user. I wanted to find the text called "foo" and replaced to "bar" in the file named "hosts.txt." How do I use the sed command to find and replace on Linux or -like system?

Para poder controlar los servicios de nuestro sistema operativo Linux, vamos a necesitar saber todo lo que podamos del comando systemctl, que es el encargado de centralizar el manejo del sistema, así que trataré de mostrar las posibilidades con ejemplos prácticos.

Sometimes you want to monitor what new information is being written to a file (think of log files), or for whatever reasons, want to access the last few lines of a file. Well, there's a command line utility that lets you do this in Linux, and it's call tail.

Basically Linux grep command is short form of "Global Regular Expression and Print). At the basic level Linux grep command is used for searching or filtering the plain text data using some form of regular expression.

GREP is a command line search utility or tool to filter the input given to it. Grep got its name from ed editor as g/re/p (global / regular expression / print). Grep command can improve a command output by filtering out required information. Grep will become a killer command when we combined it with regular expressions. In this post we will see how to use grep in a basic way and then move on some advanced and rarely used options. In our next couple of posts we will see what grep can do with the help of regular expressions.

grep is a command-line utility that allows searching of words and/or patterns in a file or group of files. Its name comes from the ed command g/re/p (globally search a regular expression and print). Grep does a global search by keyword or regular expression and print all matching lines on the standard output.

El comando linux find es uno de los comandos linux más útiles que existen, sin embargo es también uno de los comandos que menos se conocen y que los usuarios nuevos aprecian como "muy complicado" sin embargo, una vez que sabes como funciona te das cuenta que es simple y poderoso cuando tienes 1,800,000 archivos y deseas encontrar "unos" pocos archivos que cumplen ciertos parámetros, este comando "simplifica tu vida" de forma extraordinaria y si eres un Administrador de Sistemas Linux o piensas serlo, este es un comando que debes dominar para que tu sistema linux sea más confortable.

Ver también:

It isn't hard to find what you're looking for on a Linux system - a file or a command - but there are a lot of ways to go looking.

Cuando deseen descargar una página web, un archivo por protocolo http o un sitio web completo con todo su contenido: wget es la solución

We'll show you 10 practical examples of Wget Command. Wget is a free utility that can be used for retrieving files using HTTP, HTTPS, and FTP which are considered as the most widely-used Internet protocols.

Wget is a useful GNU command line utility used to download files from internet. This utility can download the files from servers using popular protocols like HTTP, HTTPS, and FTP. It runs in the background (non-interactive) and hence can be used in scripts and cron jobs. GNU Wget was written by Hrvoje Nikšić and currently, it is under Tim Rühsen, Darshit Shah, and Giuseppe Scrivano.

The Linux xargs command may not be a hugely popular command line tool, but this doesn't take away the fact that it's extremely useful, especially when combined with other commands like find and grep. If you are new to xargs, and want to understand its usage, you'll be glad to know that's exactly what we'll be doing here.

Let us start with these command line tricks to increase productivity at the Terminal. I have found them over the years and I'm now going to share with you.

Solo para curiosos en herramientas para administración.

Los administradores de sistemas Linux, como su propio nombre indica, tienen que llevar en muchos casos el control de más de un equipo, y en ocasiones de más de una red de equipos al mismo tiempo. Desde fuera parecería muy complicado si no fuese por la cantidad de comandos en sistemas Linux que existen para facilitar estas labores de mantenimiento y soporte.

Let's take a look at three solid file conversion tools for the Linux command line.

Muchas veces el administrador necesita ejecutar comandos basados en cálculos matemáticos, con bc se pueden realizar estos cálculos al interior del comando.

There are quite a few interesting commands for doing math on Linux systems, including the expr, factor, jot, and bc commands.

Cómo obtener ayuda fácil sobre los comandos (Explain)

Do you ever know that Linux is not just for serious work for admins and professionals, but you can play word games, speak to your Linux terminal or create beautiful ASCII pictures etc.? Yes, Linux is really fun, if you know the correct commands. Let's look at some of these commands that can bring a smile to your face instantly or which can be used at the end of a day-long hectic work to ease the pressure and bring some relief on to you, so that you can leave home in a good mood.

In this tutorial, we are going to discuss how we can view or modify date & time values in our RHEL/CentOS 7 servers. We are going to discuss 3 commands which we can use to view/modify date & time for our systems. Before we discuss the commands, let's learn in brief about two different types of clocks available i.e. system clocks & Hardware clocks,

Este artículo muestra otras formas de usar el grep y otros comandos para contar palabras.

We all are aware about the most popular command called 'useradd' or 'adduser' in Linux. There are times when a Linux System Administrator asked to create user accounts on Linux  with some specific properties, limitations or comments.

In Linux, a 'useradd' command is a low-level utility that is used for adding/creating user accounts in Linux and other -like operating systems. The 'adduser' is much similar to useradd command, because it is just a symbolic link to it.

Hace algunos días escribí el post "Comandos linux: find con ejemplos" y me enfoqué en que cualquier persona nueva en esto de los comandos linux entendiera como funciona el comando find con algunos ejemplos sencillos, pero algunas de las personas que comentaron el post en Facebook y otras redes pidieron que se mostraran formas más avanzadas de utilizar el comando linux find y como sacarle utilidad con ejemplos mas poderosos. Aquí te digo como usar el comando find en linux para coas un poco mas avanzadas.

[ads]El comando linux find es uno de esos comandos que todo usuario de linux debería saber "casi por obligación" por que simplemente es muy poderoso cuando se trata de tener la información del archivo exacto que se necesita, pero precisamente lo importante es poder hacer algo con el o los archivos que se encuentran y el comando linux find es el comando correcto para esto.

Hace algún tiempo escribí sobre el comando find y una segunda parte donde explicaba con ejemplos como se usa el comando linux find para encontrar diversos tipos de archivos, como buscar con diferentes condiciones, opciones y demás.

Sometimes, while working on the command line in Linux, you need to know more about a file. For example, you may want information like file's size, inode number, access permissions, time of last access or modification, and more. You'll be glad to know that there exists a command line utility stat that provides all this information in one go.

Un comando para saber qué están haciendo los usuarios del sistema

I felt a bit bored today. While digging in Google, I found this cool and useless hack. There is an option to change the sudo prompt to something cool or funny. Whenever I use a sudo command, it will display "[sudo] password for ..." statement. Let us consider the following example.

In case you are running Linux on a machine that you normally use alone, say on a laptop, entering a password each time you invoke sudo can become so boring in the long run. Therefore, in this guide, we will describe how to configure sudo command to run without entering a password.

Sudoers is the default sudo security policy plugin in Linux, however, experienced system administrators can specify a custom security policy as well as input and output logging plugins. It is driven by the /etc/sudoers file or alternatively in LDAP.

Yo lo hago con [CTRL]+[Z] para detener el proceso y luego doy fg (foreground) si quiero que vuelva a la vida o bg si quiero que siga funcionando sin verse (background)

Let us you say ran a program. You didn't know it took so long to finish. It keep running several minutes. You don't want to wait that much long. Because, you have some other important programs to run on the queue. Have you ever been in a situation like this? No worries! I just found a simple trick to suspend a process and resume it later. What I am going to do is pause the currently running process, do some other important tasks, and then resume the stopped processes once I completed all processes.

This can be very useful when you have less RAM or Processor to do multi-task. You can pause the running processes at any time, and resume them later when you're ready, without having to start them all over again. Sounds good? Indeed! This brief tutorial describes how to suspend or pause a running process and resume it later in -like operating systems.

¡Cómo ejecutar un comando como parte de un comando!

When you type a filename on the command line (at a shell prompt), you may use filename completion to save time and typing. A popular feature, filename completion lets you type the first few letters of a file or directory name and use the TAB key to ask the shell to fill in the rest.

Nowadays, I spend more time in Terminal, trying to accomplish more in CLI than GUI. I learned many BASH tricks over time. And, here is the list of useful of BASH shortcuts that every Linux users should know to get things done faster in their BASH shell. I won't claim that this list is a complete list of BASH shortcuts, but just enough to move around your BASH shell faster than before. Learning how to navigate faster in BASH Shell not only saves some time, but also makes you proud of yourself for learning something worth. Well, let's get started.

Spend enough time on the command line and you'll eventually want to do many tasks...that take some intricate commands...repeatedly. A good example of this, is making thumbnails of photos.

In almost all programming language we make use of function which is nothing but the code written as logical block for executing repetitive or recurring execution. In shell programming also we do have something called as bash function which acts the same way.In this post we will be learning more about bash function.

There are a number of hidden files tucked away in your home directory. If you run macOS or a popular Linux distribution, you'll see a file named “.bashrc” up near the top of your hidden files. What is bashrc, and why is editing bashrc useful?

(Recuerden que solo funciona para quienes utilizan bash como shell, si se utiliza tcsh, zsh u otro, la cosa cambia pero sigue el mismo formato)

Una guía para personalizar el prompt... ¿que es el prompt?, es el indicador de la terminal que indica que el shell está aguardando hasta que el usuario indique un comando para ser ejecutado, con este artículo podrá cambiar de:



rnaranjo@servidorlinux etc >

y muchas más.

Linux depends upon administrative user permission. Without the elevated permission of root, many commands could not be run. For distributions, such as Red Hat, gaining root permissions means changing to the root user with the command su. Other distributions, such as Ubuntu Linux, opt for a different route. That route is sudo. By taking advantage of the sudo system, an administrator gains far more control over who can do what on a system. An added benefit of using the sudo command is that all sudo incidents are logged (Red Hat-based systems log to /var/log/secure whereas Debian-based systems log to /var/log/auth.log).

Telling your Linux shell where to look for executable files is easy, and something everyone should be able to do.

What's behind the Linux umask?

All you need to know about Linux umask - how the settings work and why they're important.

Artículo que describe los diferentes emuladores de terminal en Linux

Today, I came across an useful web service called ExplainShell that helps you to find what each part of a Linux command does. Of course, you can refer man pages or do a quick google search to know about a Linux command. However, ExplainShell breaks down the long and confusing commands and tells you exactly what each part does. All you need to do is just copy and paste a Linux command in ExplainShell website, and it will instantly display what each part of a Linux command means. Each part of the commend is explained on its own in a box layout, and highlighted when you move the mouse cursor over it. ExplainShell actually takes the details of the each command from manpages. Instead of going through the manpage of a command manually, you can use ExplainShell to get the details of any commandline argument faster and easier.

Si necesitas utilizar un listado para hacer comandos, puedes hacer un script para que vaya haciendo los comandos línea por línea.

When you run a command, it produces some kind of output: either the result of a program is suppose to produce or status/error messages of the program execution details. Sometimes, you may want to store the output of a command in a variable to be used in a later operation.

I try to be a peaceful soul, but some things make that difficult, like tiny console fonts. Mark my words, friends, someday your eyes will be decrepit and you won't be able to read those tiny fonts you coded into everything, and then you'll be sorry, and I will laugh.

Fortunately, Linux fans, you can change your console fonts. As always, the ever-changing Linux landscape makes this less than straightforward, and font management on Linux is non-existent, so we'll muddle along as best we can. In this article, I'll show what I've found to be the easiest approach.

We'll show you How to kill a process in Linux . One of the major advantages of Linux is the ability to terminate a process without having to reboot your server. In this tutorial, we will show you how to kill a process in Linux using the kill, pkill and killall commands.

Executable and Linkable Format

An extensive dive into ELF files: for security incident response, development and better understanding

We often don't realize the craftsmanship of others, as we conceive them as normal. One of these things is the usage of common tools, like ps and ls. Even though the commands might be perceived as simple, under the hood there is more to it: ELF binaries. Let's have an introduction into the world of this common file format for Linux and -based systems.

A process is the abstraction used by the Linux operating system to represent a running program. Each process in Linux consists of an address space and a set of data structures within the server kernel. The address space contains the code and libraries that the process is executing, the process's variables, its stacks, and different additional information needed by the kernel while the process is running.

Identify processes that make heavy use of the CPU and memory, set the priority of processes renice and kill processes. Traditionally, in any unix 'ps' it is the command to identify the processes with their respective characteristics, qualities and states. This traditional command in GNUs systems supports 3 types of syntax for the parameters, namely: UNIX, BSD and GNU.  To simplify this post will use the syntax which allows grouping the various options and require.

One of the most basic command to monitor processes on Linux is the top command. As the name suggests, it shows the top processes based on certain criterias like cpu usage or memory usage.

Monitoring memory utilization on Linux box is one of the important task for Linux Administrator to make the system up and running smoothly. There are plenty of commands/tools are available to monitor memory utilization on Linux, each one is working in different manner, today we are going to show you

A while ago, we have written about 'script' command which can be used to record the Terminal activities in Linux. For more details about 'script' command, check the following guide.

We already knew how to check if a Linux system is physical or virtual machine. Now, it is time to find out if the installed Linux OS is either 32 bit or 64 bit. If your Linux system has GUI, it is really easy then. Just navigate to System Settings -> Details, and there you go, you will know the architecture. In CLI based Linux systems, it is bit different. This guide will explain you how to check if a Linux system is 32 bit or 64 bit. It is not that difficult.

Una explicación más informal del uso y manejo de los permisos de archivo para usuarios y grupos en Linux

Este artículo explica brevemente qué significan los permisos y cómo se utilizan

what is an inode and how does it relate to a file system? Glad you asked.

Cómo tener un directorio compartido previniendo que se borren archivos críticos de él

If you have high hopes of becoming a Linux administrator, there are plenty of tools you'll need to know and know well. Some of those tools are limited to actions taken locally on the machine with which you are working: tools like iptables, make, top, diff, tail, and many more. These tools, isolated to the local machine, are invaluable to your task of managing those Linux servers and desktops. And even though GUI tools are available to help you with those tasks, understanding the command line is tantamount to understanding Linux.

As we all know, SSH is secure shell protocol which is used to securely communicate with other systems on the network. There are many chances that you want to automate tasks, such as synchronization files between two systems, automatic backup between two or more systems using your own scripts. In such cases, the two systems must be login to each other without having to enter the password manually by the user. In this brief guide, we are going to configure passwordless SSH login in -like systems. That means, we don't need to enter the password when we SSH to other system on the network.

Let's imagine that you are working in server through ssh, for some reason your session get disconnected like, internet issue or power failure or your Local PC get rebooted, etc,.

This is quite a common task for Linux system administrators, when there is need for execution of some command or a local Bash script from a one Linux server or server on another remote Linux machine over SSH.In this article you will find the examples of how to run remote ssh command in Linux to Show result locally.Run remote ssh command in Linux

SSH (Secure SHELL) is one of the most used network protocol to connect and login to remote Linux servers, due to its increased security provided by its cryptographic secure channel established for data flow over insecure networks and its Public Key Authentication.

How SSH Port Became 22

The default SSH port is 22. It is not a co-incidence. This is a story of how it got that port. I (Tatu Ylonen) haven't told it before.

We all know that the running processes or command will be terminated when disconnecting the remote SSH session. Is there any ways to keep the processes running after ending ssh session?

Yes, it is possible. We are going to discuss about this in the today session with different methods.

The /proc file system brings the processes on your systems into view in some very useful ways, but only if you take the time to cd over to /proc and see all it can tell you.

Tal vez sea cierto que no todos los usuarios están hechos para ella, pero si te apetece darte una vuelta por esta guía de supervivencia sin «X» (interfaz gráfica de Linux) y descubrir todo lo que se puede hacer desde una simple línea de comandos, ¡ponte cómodo y empecemos!

Guía para administradores novatos en lenguajes script

Listado organizado de 450 comandos 

Este comando sirve para ejecutar un comando simultáneo en varios servidores

In our the previous post we saw how to use Basic regular expression along with grepping to search for words and played across different basic regular expressions. In this post, we will see how to use extended regular expressions to increase the power of grep command even better than Basic regular expression.

En la comunidad de Linux siempre hay usuarios a favor de unas determinadas funciones o partes de software y otros retractores de lo mismo. Ya sea con distribuciones como con escritorios o aplicaciones siempre se busca dar la opinión al respecto y llamar a los usuarios a utilizar su software favorito en vez del otro. En esta ocasión la comunidad expresa sus quejas contra el software systemd mediante una campaña denominada "Boicot a Systemd".

Since Linux is a multi-user operating system (in that it allows multiple users on different computers or terminals to access a single system), you will need to know how to perform effective user management: how to add, edit, suspend, or delete user accounts, along with granting them the necessary permissions to do their assigned tasks.

When you administer a Linux machine that houses multiple users, there might be times when you need to take more control over those users than the basic user tools offer. This idea comes to the fore especially when you need to manage permissions for certain users. Say, for example, you have a directory that needs to be accessed with read/write permissions by one group of users and only read permissions for another group. With Linux, this is entirely possible. To make this happen, however, you must first understand how to work with users, via groups and access control lists (ACLs).

Learn how to use links, which make tasks easier by providing access to files from multiple locations in the Linux filesystem directory tree.

In our previous article, we have described how to count the number of files and subdirectories inside a given directory. This guide will show you how to rename all files and directories names to lowercase in Linux.

gcp (Goffi's cp) is an advanced file copier tool, heavily inspired from the traditional cp command utility, but with some additional features. It is completely free and open source software, released under GNU General Public License. One of the issue I have often noticed while using cp command is It doesn't display the copy progress. Say for example, when I am copying a large file, I really don't know how long it is going to take, or what is the currently copied percentage. Other than looking at the blinking cursor icon in the Terminal and the hard drive indicator while copying large files, I have no idea whether copying progress is really going on or not. Here is where gcp comes in handy. Unlike the cp command, gcp offers the following high-level functionalities:

  • Displays the copy progress indicator, with estimated time, current file speed etc.
  • gcp continue copying even when there is an issue. It will just skip the file with problem, and go on and copy the next files.
  • It can copy both single or multiple files or folders.
  • gcp logs all its action. So, we can easily know which files have been successfully copied.
  • If you accidentally cancels a copy process, it will keep the record of it. Instead of deleting the contents, it will keep the partially copied content. You can then run the copy process again, and it will copy the rest of the files where you left it.
  • If you launch a copy when an other is already running, the files are added to the first queue, this avoid your hard drive to move its read/write head all the time.
  • You can save a list of files you copied and copy them again later from that list. It will be very useful when you want to copy the same files to multiple targets.

Ever wondered how many Linux Kernels you have installed in your Linux box? No? Well, this brief tutorial will teach you how to view or check installed Linux Kernels on different Linux operating systems. It's not that difficult as you may think. Read on.

​Did you know that Android is based on Linux kernel? I bet you didn't. Although many Linux users know it and no matter how hard Google denies it, they still have to accept it that what they modified and used in Android was Linux Kernel. But we are not here to fight on some unsolvable problems. As you now where is Linux, there is Terminal
​The terminal is most of the times termed as Swiss-Knife of Linux based OS, cause through the power of terminal you can do almost anything on an OS, you can even play games on it, install software and much more cool stuff.

However, the power of terminal isn't that powerful in Android. Still, you can do many cool things on android using Linux terminal. Here is a small guide featuring some of the best uses of terminal. Let's go.

How can I see the content of a log file in real time in Linux? Well there are a lot of utilities out there that can help a user to output the content of a file while the file is changing or continuously updating. Some of the most known and heavily used utility to display a file content in real time in Linux is the tail command (manage files effectively).

How do I find out details about my Linux Laptops temperature, battery status and other information from the command prompt? How can I check battery status using the terminal on Linux?

How do I determine if a port is in use under Linux or UNIX-like system? How can I verify which ports are listening on Linux server?

It happens to everyone, and usually only when it matters the most. You might be gearing up for a family Christmas video chat, settling in for a movie night on your big screen TV, or getting ready to record a tune that popped into your head and needs freeing. At some point, if you use a computer, sound is going to need to be routed.

By default everyone prefer history command to review/recall the previously entered commands in terminal but unfortunately, that shows only the commands and doesn't shows the commands output which was performed previously.

This post will quickly guide about how to Linux get ip address, subnet and related networking information.

rtop is a simple, agent-less, remote server monitoring tool that works over SSH. It doesn't required any other software to be installed on remote machine, except openSSH server package & remote server credentials.

I often ran out of memory. This is where Early OOM comes in help. For those wondering, it will kill the largest process in an unresponsive system when it has absolutely no other choices. Early OOM checks the amount of available memory and free swap 10 times a second. If both are below 10%, it will kill the largest process.

A system administrator often needs to run a command repeatedly in a certain periods of time. Often such tasks can be easily completed with simple cron commands. In most of the cases  this should work, but the shortest period which you can run cron command is every 1 minute. Believe it or not, in many cases this is too slow.

Antes de irme a dormir existen ocasiones en las que me pongo en la cama escuchando un podcast o la radio a través del ordenador. Al rato de estar escuchando la radio o el podcast acaba pasando una de estas dos cosas:

  1. Me quedo dormido y el ordenador queda abierto toda la noche. Obviamente no me gusta quedarme dormido con el ordenador y la radio encendida.
  2. Una vez estoy ya medio dormido tengo que levantarme para apagar el ordenador. Obviamente esto molesta ya que después hay que volver a coger el sueño.

Para solucionar este pequeño problema tenemos varias soluciones. Una de ellas es programar el apagado del ordenador.

In this tutorial we will learn to use an important Linux utility named 'Crontab'. With the help of Crontab or cron, we can execute a command or a script to run at a particular time.

We'll show you, how to use Linux crontab. In few asimple steps we will explain, how to automate your system tasks using crontab in Linux. The cron software utility is a time-based job scheduler in Unix-like operating systems. Cron is driven by a crontab (cron table) file, a configuration file that specifies shell commands to run periodically on a given schedule. The crontab files are stored where the lists of jobs and other instructions to the cron daemon are kept. Users can have their own individual crontab files and often there is a system-wide crontab file (usually in /etc or a subdirectory of /etc) that only system administrators can edit.

In this article we are going to review and see how we can schedule and run tasks in the background automatically at regular intervals using Crontab command. Dealing a frequent job manually is a daunting task for system administrator. Such process can be schedule and run automatically in the background without human intervene using cron daemon in Linux or -like operating system.

"watch" command is small utility using which you can execute shell command or script repetitively and after every n seconds. Its helpful in automation or monitoring. Once can design automation by monitoring some code/command output using watch to trigger next course of action e.g. notification.

This tutorial explains how to setup and use an SVN repository server on CentOS. Before I start, let me explain what actually SVN represents and what it is used for. SVN is actually an abbreviation of SubVersion which had been created by the Apache software developer. It enables you to create and maintain your own repository and gives fine-grained access rights to a dedicated user.

It is very effective for controlling the versioning of files, documents or folders. It is very useful for any group or team that intends to start their own software projects.

En mageia no tuve necesidad de instalar la librería adicional que indicó el artículo.

Save some hassle by setting up aliases for the commands you often use.

Excel is an Microsoft spreadsheet program and its extension is .xls or .xlsx. Now we as Linux user can convert xls file to csv file in Linux and .xls to .csv. This quick guide will help you how we can convert xls file to csv file in Linux using program called SSConvert and Unoconv.


Multiple Arcade Machine Emulator

As a Linux administrator, sometimes, you might be wondering whether you are working on a physical or virtual machine. Most of the time, you will be accessing and managing your servers remotely. You will not always have physical access of your servers, and you may not actually know where is your server located. However, it is possible to check if your Linux system is physical or virtual using couple of Linux utilities, no matter where it is located. This guide explains how to check whether the Linux system you're working on is a physical server or a virtual server.

Jack Wallen makes his case why the open source solution, VirtualBox, can be a great option for data centers.


Ponle punto final a tus dudas sobre la configuración de arranque doble sin antes desfallecer y sigue algunas recomendaciones.

QEMU and FreeDOS make it easy to run old DOS programs under Linux.

Every computer user has been there, some more than once - that moment when you realize that you just deleted the wrong file or bunch of files. The recycle bin is useful for these kind of situations where files you delete are seemingly available in the recycle bin and can be restored later. There are a lot of situations where a deleted file doesn't go to the recycle bin, and this article will discuss how you can recover deleted Windows files with Linux, specifically Ubuntu. The techniques discussed here will work if you dual boot Windows and Linux or if you have a Ubuntu Live CD.

Un sencillo truco, para un sistema sin seguridad

Otra herramienta para acceder a un sistema operativo sin seguridad


Conferencia dictada en clase sobre los comandos y su versátil uso

Taller de instalación de Mageia.

Conferencia dictada en clase sobre los comandos y su versátil uso

Memorias de la conferencia vista en clase.