Install Tomcat And Deploy Web Applications With Rex

Install Tomcat And Deploy Web Applications With RexIn this tutorial I will show you how to manage your Tomcat installations and how to deploy Webapps in a repeatable way with Rex. In this tutorial I will use Debian Squeeze, but Rex is also available for other distributions. Introduction to RexRex is a tool, written in Perl, to ease the administration and deployment of many servers.From the Website: With (R)?ex you can manage all your boxes from a central point through the complete process of configuration management and software deployment.The starting point of a Rex project is its Rexfile. Re

Read More »
Editing Images With Pinta

Editing Images With Pinta

Editing Images With PintaVersion 1.0Author: Christian Schmalfeld  This article is about how to use the Pinta graphical editor to edit pictures and covers some of its most important features.This tutorial comes without warranty of any kind. 1 Preliminary NotePinta is a lightweight image editor for Linux and is far more easier
to handle than Gimp but still has a large variety of tools and features
to use. It can be used for quick editing like resizing images or
adjusting the colours of photographs, but also for more professional
tasks which depend on

Read More »
Installing Guest Additions And Mounting Shared Folders In Virtualbox Virtual Machines In PHPVirtualbox

Installing Guest Additions And Mounting Shared Folders In Virtualbox Virtual Machines In PHPVirtualbox

Installing Guest Additions And Mounting Shared Folders In Virtualbox Virtual Machines In PHPVirtualbox    Version 1.0Author: Srijan KishoreIn this tutorial I will introduce some tips & tricks while using the phpvirtualbox. These tricks make phpvirtualbox functionality better & much more fruitful.I do not issue any guarantee that this will work for you!1 Preliminary NoteI assume that you have a pre-installed phpvirtualbox, in my case I do have installed phpvirtualbox on ubuntu14.04 as I mentioned in my previous tutorials.Reference http://www.howtoforge.com/vboxheadless-running-virtual-machines-

Read More »
Howto add two factor authentication to OTRS with privacyIDEA

Howto add two factor authentication to OTRS with privacyIDEA

Howto add two factor authentication to OTRS with privacyIDEAIn this howto we will show, how easy it is to add two factor authentication with OTP token to OTRS. This is done for the support agents to protect support cases and customer data against attackers and misuse. Nevertheless this can be done for the customers in the very same way. Authentication will not be verified by OTRS anymore, but by privacyIDEA. The users are still taken from the OTRS database. Also the same static password is used that the used was using before. PrerequisitesWe assume that you have a running installation of OTRS

Read More »
How to change the Swappiness of your Linux system

How to change the Swappiness of your Linux system

What is Swappiness?Most of Linux users that have installed a distribution before, must have noticed the existence of the “swap space” during the partitioning phase (it is usually found as /sda5). This is a dedicated space in your hard drive that is usually set to at least twice the capacity of your RAM, and along with it constitutes the total virtual memory of your system. From time to time, the Linux kernel utilizes this swap space by copying chunks from your RAM to the swap, allowing active processes that require more memory than it is physically available to run.Swappiness is the kernel par

Read More »
Using secure shell (SSH) for login and secure copy (SCP) for data transfer on Linux

Using secure shell (SSH) for login and secure copy (SCP) for data transfer on Linux

Using secure shell (SSH) for login and secure copy (SCP) for data transfer on LinuxSSH stands for secure shell. It is an encrypted remote login protocol. Once it has been set up on each node, it can be used to communicate with various other nodes in that network.The main benefits of SSH are:SSH uses the RSA encryption algorithm to generate public and private keys, making intrusion extremely difficult.Since SSH is a remote login protocol, it can be configured on a laptop. That means you can use your laptop to wirelessly connect to the Raspberry Pi cluster.Because protocols like SCP (Secure Copy

Read More »
Shell Scripting Part V: Functions in Bash

Shell Scripting Part V: Functions in Bash

Shell Scripting Part V: Functions in BashHi! Welcome to HowToForge’s shell scripting tutorial series. If you want to read the previous releases of the tutorial feel free to click here for part1, part2, part3 and part4 of the tutorial. In this part, you will learn how to efficiently structure your scripts by creating functions. By the end of this tutorial, you will be able to know how to create functions in the Linux Bash Shell, pass parameters to your functions and return some values from a function to your main code. Let’s get started!IntroductionA function, also known as a subroutine in prog

Read More »

How to Migrate Ext2/Ext3 File Systems to Ext4 on Linux

How to Migrate Ext2/Ext3 File Systems to Ext4 on LinuxThe Linux file systems Ext2 and Ext3 have now gone outdated. It is the time to convert the old file systems to the latest one, EXT4. The Ext4 filesystem is faster and more reliable than the previous versions.Don’t worry! You dont have to reinstall the system; you can simply convert your existing file system to EXT4 by keeping the stored data unaffected.In this tutorial I will show the steps to be taken on Ubuntu. The same commands will work for other Linux Dustributions as well.How to migrate the ext2 or ext3 partition to ext4First backup a

Read More »
How to compare and merge text files on Linux (part 2)

How to compare and merge text files on Linux (part 2)

How to compare and merge text files on Linux (part 2)This post is a response to the overwhelming comments about Meld (and other tools) on my previous article on text files comparison and merging tools. While my intention wasn’t to focus on code text only but to also present something useful to word editors and writers as well, but the coders community objected for the “shallowness” of the previous post so here we go with part 2.MeldStart Meld and hit the “File Comparison” button located on the center. Next, press the two buttons that just appeared under the initiating options and choose the fi

Read More »
How to Install and Set Up Tor Browser on Linux

How to Install and Set Up Tor Browser on Linux

How to Install and Set Up Tor Browser on LinuxTor Browser is the official internet browser tool of the Tor Network project. This software is aimed at serving users who want to browse in full anonymity, preventing surveillance of any kind. This is achieved by bouncing your communications around a distributed network or relays, making eavesdropping very difficult, if not practically impossible. At this point, and because the Tor Network project’s legality is still disputed, I should point out that Tor Browser isn’t a tool for the hands of hackers or terrorists, but a tool that strives to offer s

Read More »