Categories
How-To Technical

Enable root account on Vyatta 6.1

* do this at your own risk * Looking for a way to access to root account in Vyatta I came across some steps which I would like to share with my readers and serve as a reminder for when I forget. Step 1.  Log into your Vyatta router, locally or via remote (ssh) Step […]

Categories
How-To Software Technical

PS3 Media Server – Remix

For several weeks now I have been running PS3 Media Server (http://code.google.com/p/ps3mediaserver/) hosted on Ubuntu 10 Desktop (http://www.ubuntu.com/), when I decided to fine tune my environment by making the system headless as I had no need to interact with a desktop environment. Info: PS3 Media Server is a DLNA compliant UPNP Media Server which can […]

Categories
How-To Technical

Have you cleaned you package

As much as I would like to discuss the importance of cleaning ones package for good health reasons.  I choose to refrain this time around.  I will talk about something which is just as worthwhile as cleaning one’s own package.    When you install / uninstall new apps you may have packages left over which take […]

Categories
Technical

History

There are times where I run a command that I needed to only need it again at a later time.  Most of the time I document my steps, but there are those time where I just do things in the heat of the moment to get what I need done.  So what can one do?  […]

Categories
How-To Technical

HowTo: Make a Windows 7 USB Flash Install Media while in Linux

Recently I had a need to install Windows 7 on a computer and I was out of DVD media to use. The only media I had was a 8GB USB Thumb drive. I have done this many of time in Windows itself with various of tools and eve manually. Now I do it in Linux […]

Categories
Software Technical

Command of the day: shred

The shred command can be used for destroy files so that their contents are very difficult or even impossible to recover. The shred command accomplishes its destruction by repeatedly overwriting files with data patters designed to do maximum damage. Even the use of high-sensitivity data recovery methods and equipment make it difficult to recover files […]