Feed aggregator

How to Set Different Wallpaper for Each Monitor in Linux

TuxMachines - Fri, 2018-05-25 16:15

If you want to display different wallpapers on multiple monitors on Ubuntu 18.04 or any other Linux distribution with GNOME, MATE or Budgie desktop environment, this nifty tool will help you achieve this.

read more

Help, potentially bricked my laptop!

Reddit - Fri, 2018-05-25 16:14

Just tried installing Xubuntu 18.04 on my Windows 7 laptop and the install failed giving an error about my hard drive. I can go to the ‘try’ mode and when I try to kick off the install there I get an error about ubi-partman failing. I think I done enough to remove Windows and Linux doesn’t work so my laptop is effectively unusable bar trying Linux. Any help would be greatly appreciated.

submitted by /u/Bradaz_27
[link] [comments]

What's the biggest hurdle to your success with virtualized systems on embedded architecture?

Reddit - Fri, 2018-05-25 16:13

Was there a problem that stopped you from moving any further in development? Or something you wish you knew sooner, when first considering embedded virtualization as an option?

submitted by /u/mattsimoto
[link] [comments]

Elive Brings Enlightenment to the Linux Desktop

Linux.com - Fri, 2018-05-25 16:04
Title: Elive Brings Enlightenment to the Linux Desktop25 MayLearn more

Bitwarden Password Manager Adds Command Line Vault

LinuxToday - Fri, 2018-05-25 16:00

LinuxUprising: Bitwarden, the secure, open source password managey, added a command line tool to its list of apps you can use to access your passwords

How insecure is your router?

LXer - Fri, 2018-05-25 15:50
Routers are important. They provide the link between one network (in this case, our home network) and another one (in this case, the internet, via our ISP's network). High among a router's other functions, many also perform as a modem, but routers often do more things, sometimes many more things, including traffic logging, acting as a WiFi access point, providing a VPN for external access to your internal network, child access, firewalling, and all the rest. Does this matter, you ask? Well, if other people can get into your system, they have easy access to attacking your laptops, phones, network drives, and the rest. They can access and delete unprotected personal data. They can plausibly pretend to be you. They can use your network to host illegal data or launch attacks on others. Basically, all the bad things.

How to Install TeamSpeak Server in CentOS 7

LinuxToday - Fri, 2018-05-25 15:00

Tecmint: TeamSpeak is a popular, cross-platform VoIP and text chat application for internal business communication, education and training (lectures), online gaming

Visualizing Molecules with EasyChem

LXer - Fri, 2018-05-25 14:49
Introducing EasyChem, a program that generates publication-quality images ofmolecular structures.

Vulkan 1.1.76 Released WIth KHR_draw_indirect_count & KHR_get_display_properties2

Phoronix - Fri, 2018-05-25 14:46
Vulkan 1.1.76 has just been released ahead of the US Memorial Day weekend with new extensions to excite Vulkan developers...

How to Enable Click to Minimize On Ubuntu

LinuxToday - Fri, 2018-05-25 14:00

 itsFOSS: This quick tutorial shows you how to enable click to minimize option on Ubuntu 18.04 and Ubuntu 16.04.

GNOME 3.29.2 Released As The Second Step Towards GNOME 3.30

Phoronix - Fri, 2018-05-25 13:52
GNOME 3.29.2 is now available as the second development release on the road towards this September's release of GNOME 3.30...

How to measure the impact of your open source project

LXer - Fri, 2018-05-25 13:47
This article was co-authored by Don Marti, Georg Link, Matt Germonprez, and Sean Goggins.Conventional metrics of open source projects lack the power to predict their impact. The bad news is, there is no significant correlation between open source activity metrics and project impact. The good news? There are paths forward.read more

OpenVPN Setup on Ubuntu 18.04 Bionic Beaver Linux

LinuxToday - Fri, 2018-05-25 13:00

LinuxConfig: Virtual private network technology makes possible to access safe, private networks by using less secure networks like the internet.

Anonymity & security of a root android phone ?

Reddit - Fri, 2018-05-25 12:54

Anonymity and Security of a rooted android phone ?

how to make it more Secure ?

submitted by /u/ddarkmatter
[link] [comments]

Pages

Subscribe to LinuxInsight aggregator