Palyonlinux A Complete Windows Suite For Linux

Linux has indeed enjoyed a huge chunk of spotlight as a full fledge open source operating system that has been pretty versatile. The platform has a huge stream of exciting features that provide users with enhanced capabilities.

Gaming has always been a downside for the Linux users, but this recent release of Gaming suite PlayOnLinux is a must to have application suite for all kind of Linux gamers and users. PlayOnLinux basically provides automated installation algorithms and script for a large number of games that are available on the web circle. Moreover Play On Linux also enables the installation of numerous software programs like Googles modeling software SketchUp, Adobe Photoshop and 3D CAD software by Autodesk AUTOCAD. So this means that for all the Linux users who are very much dependent on the Windows Software, this is a software haven.

Previously, it was Wine that was the gateway for the installation of Windows software on machines running on Linux, but the procedure that had to be followed using Wine was pretty hassle full and cumbersome. One of the biggest drawbacks that Wine had was of Windows software programs that worked fine with some of the versions of Wine but others had some compatibility issues, so you cannot go through with having a single version. One more tiring issue that hindered the popularity of Wine was that a large number of software programs require users to first install Internet Explorer or in some cases find out and then install the DLL versions of the files that have to be installed.

So Play On Linux does all this stuff for you and users are very much hassle free when they try to install Windows software programs on their Linux powered computers.
How To install Play On Linux on Your computers

The first question about Play On Linux is always, how to install it on your machine? It is suggested that you should probably bypass your complete distros software package altogether as this program needs an instant update in order to function correctly. So first you to go to the download page of Play On Linux and it will guide you through all the downloading stuff and will dish out all the necessary instructions to you. By just following these instructions, you will be ready to get going with the gaming. The downloaded Play on Linux will be in the menu folder under the Games Tab.
The UI of Play On Linux

When you fire up the program for the first time, it will give quite a barren and empty look but you should not be worrying because the moment you add-on the things it is gonna swell up. By clicking on the install button in the Toolbar, user can download and browse all the supported software programs that have been made available by the developers of Play On Linux. As mentioned in the beginning that the prime focus is on the gaming realm so the list of titles that is supported includes the likes of Spore, Max Series, Counter Strike and most of the Sam. Users can also browse the repository of Play On Linux to see, if all their favorite titles are supported. So starting off, first users need to install the program that they want to, by double clicking on it. The process will initiate and the good thing is that the process will vary, depending upon the program you are going for; in some instances users will have to point their Play On Linux to their CD Drive but mostly it will search for itself without a glitch.

One thing is guaranteed that users will not to have worry about configuring the software before installing a certain program; Play On Linux will automatically configure the program that needs to be installed on your computer. Whether it is a new version of Wine, a collection of out-dated DLL files or even the Internet Explorer, this amazing software will take care of all.

Well in some cases, there is a probability that a certain game or software does not work at all with the Play On Linux but in this case you can customize some of the settings with Wine. So the bottom line is that you should first go for WineHQ Database and see what you could find about.

Using Linux, Apache, MySQL, and PHP For Software Deployment

It’s really beneficial.
* Enter a new root password and do NOT check “Permit root entry from remote machines” and “Generate An Anonymous Account” because these two possibilities will make protection loophole.
* Click on “Execute” and it will install MySQL on your neighborhood machine.

Commence MySQL and develop a new database for your WordPress set up. You will need to provide an suitable identify for your database. In this tutorial, I name the database as “WordPress” and the admin user as “wpadmin”. Transform it to no matter what you like.ke.

Open your terminal (MS DOS or cygwin) and execute the following commands:

$ mysql -u root -p
Enter password: ********

mysql> produce database WordPress
Query Okay, 1 row impacted (.03 sec)

mysql> grant all on WordPress.* to wpadmin @localhost recognized by ‘changeme’
Query Ok, rows affected (.03 sec)

mysql> flush privileges
Query Okay, rows affected (.02 sec)

mysql> exit
Bye

2. Apache setup:
Download Apache two.two at apache.org
My downloaded file is httpd-2.two.fifteen-win32-x86-no_ssl.msi
Operate the MSI file and use the subsequent configurations:
* Network Domain: localhost
* Server Identify: localhost
* Administrator’s E-mail Handle: youremail @e-mail.com
* Make convinced “for All Users” is checked.
* Common Setup Variety
* Hit “Install” and it will setup Apache on your nearby machine.

Right after the installation completes, go to Handle Panel -> Administrative Resources -> Providers, glimpse for the “Apache2.2” services and double-click on it.
From the following you can prevent the support and adjust the startup variety to “Manual”

Configure Apache:

Open and modify the httpd.conf at C:\Program Files\Apache Software package Foundation\Apache2.2\conf as under:
Uncomment the following line:
LoadModule rewrite_module modules/mod_rewrite.so
Add:
LoadModule php5_module “C:/php/php5apache2_two.dll”
Lookup for
Change:
AllowOverride None
With:
AllowOverride All

Include index.php to DirectoryIndex as below:
DirectoryIndex index.php index.html

Discover and include:
AddType software/x-httpd-php.php.phtml

Add this line to the conclude of httpd.conf
PHPIniDir “C:/php”

Restart Apache to make the updated configuration effective.

three. PHP setup:
Download PHP five.2.13 at php.web
My downloaded file is php-five.2.13-Win32.zip
Unzip the downloaded bundle to C:\php

Copy C:\php\libmysql.dll to C:\WINDOWS\system32
Duplicate C:\php\php.ini-advised and rename it as php.ini

Open and modify the freshly copied C:\php\php.ini
Uncomment:
extension_dir = “ext”
extension=php_gd2.dll (this is utilised for CAPTCHA)
extension=php_mysql.dll
extension=php_mysqli.dll

Include:
date.timezone = “Australia/Melbourne”

four. WordPress setup:
Download the most recent version of WordPress at WordPress.org
At the time of this composing, it is version 3..1
Download and unzip WordPress-3..one.zip to C:\Program Files\Apache Program Foundation\Apache2.2\htdocs

Go to C:/Plan Files/Apache Application Basis/Apache2.2/htdocs/WordPress
Rename wp-config-sample.php to wp-config.php

Update wp-config.php at C:/System Files/Apache Software program Basis/Apache2.2/htdocs/WordPress with the following settings:
define(‘DB_NAME’, ‘WordPress’)
outline(‘DB_USER’, ‘wpadmin’)
define(‘DB_PASSWORD’, ‘changeme’)
define(‘DB_HOST’, ‘localhost’)

Click on the following hyperlink to produce top secret keys api.WordPress.org/mystery-crucial/1.one/salt and exchange the subsequent values with the generated keys from that website link.

define(‘AUTH_KEY’, ‘put your exceptional phrase here’)
define(‘SECURE_AUTH_KEY’, ‘put your exclusive phrase here’)
outline(‘LOGGED_IN_KEY’, ‘put your unique phrase here’)
outline(‘NONCE_KEY’, ‘put your special phrase here’)

Standalone Ip Nvr Linux

Standalone Video Recorder

Standalone IP NVR Linux is a video recorder used for surveillance and other technologies. This technology uses IP cameras to record digitally, monitor and playback. It is manufactured the QNAP security professionals. The system comprises of up to eight IP cameras and 4 hard disks. Installing the gadget for surveillance is easy. It has been made in a very compelling way to enhance easy plug in; and therefore does not require any specialized or digital skill. The recorder also allows simultaneous recording of events.

Features of NVR Linux

The 5.0 Mega pixel Hi-Def IP cameras are dual stream and have a capturing rate of 30fps. They can be adjusted to reach a maximum of 16M and shoot at a distance of 25601920. Box IP cameras with a GV-NVR System Lite have a hard drive of 500 GB a POE plug in. Their system is ultra thin and has an NVR GeoVision included. The GeoVision Infrared IP cameras are water proof, have dual streams, allow on board recording, have 16 LED lights and an internal lens with a diameter of 3.6-9 mm.

Standalone Properties

Standalone IP NVR Linux recorders are easy and fast to install, stable, free from attacks and viral crashes caused due to the Linux embed and they have an open platform. They are designed for use in homes and medium sized businesses. The open platforms allow the recorder to support more cameras. In case of failure of the hard disk, the digital recorder continues to carry out its functions.

Advantages of Standalone Recorder

This monitoring device is very simple to install and it does not need special software to assist with the installation. After assembling the hardware, disks are inserted so that the recording is connected to the internet. Inter linking the recordings to the browser are because of the special web-based appliance. The user can then log in on the net and can locate the recording process on a particular application. It is very economical more so because its known to save on the time, money and energy. Standalone IP NVR Linux ensures that all data is safe and can never be lost. Its virus and crash free so you never have to worry about loosing any of the recorded data. The whole system is stable and reliable and users will have faith in it-they dont have to keep watch of its functions.

What Makes the Best NVR?

Recording is of very high quality and thanks to its D1, finding the target becomes an easy task. Camera images can be viewed on the computer screen. The images can be compared on different cameras later on. Tracing of targets therefore becomes much easier-although it may take a longer time to do this. This is because what one camera captures may have been missed by the other. To enhance quality tracking, one has to have other tools alongside the Standalone IP NVR Linux recorder. These tools will efficient detection of missing objects, camera occlusion, detection of motions, lose focus and detection of foreign objects within the recordings. Approximated price for one of these is 2,599.95 dollars.

In Demand Data recovery software for Linux hard drives.

Stellar information systems, the pioneers in data recovery software have noticed a sharp increase in the number of data recovery requests for Linux based Operating Systems. s.

The Linux systems which are widely believed to be -crash- proof- have become increasingly vulnerable to data loss according to company records. Linux is like an other operating system but is much cheaper and secure in terms of data protection. It has an incredibly low down time. It is an open source operating system. The greatest advantage of using Linux systems is that it can be used for networking very easily .It can be used when the user needs to control his operating system completely.

The Linux based systems rely upon Ext2 and ext3 file system. This system stores data in the form of blocks. This is done to reduce internal fragmentation and reduce disk seeks time when reading a large amount of data. Each block group contains a super block, the inode bitmap, followed by the actual data blocks.

The super block contains important booting information. The group descriptor stores the value of the block bitmap, inode bitmap and the beginning of the inode table for every block group. Therefore any corruption of the inode table can render Linux system useless. Loss of data can seriously affect company operations and cause financial and time losses. Data loss can occur under a wide range of circumstances like Virus attack, Accidental Disk format, File deletion, Partition loss or corruption, Lost or Missing files and folders, Employee sabotage, Re-formatted or re-partitioned drive or Physical damage to the storage media.

Most of the company recommends Data recovery service for recovering data from Linux hard drive, which usually cost few thousands dollars- However on the other Stellar provides Stellar phoenix Linux Data Recovery Software which recovers lost or deleted data from Linux hard drives at a very affordable price. We at Stellar understand these causes and solve these problems better than any other data recovery company. Our software engineers have evolved a specific data recovery tool for linux. Stellar Phoenix Linux data recovery software provides data recovery in cases of:

Partition recovery from a deleted logical partition.

Recovery from missing files and folders,

Recovery of deleted file(s) for Ext2 File system only.

Damaged Super Block or Inode List.

Recovery under sub-directories after the parent directory is deleted or missing.

Product Information:http://www.stellarinfo.com/linux-data-recovery.htm

Linux Network Configuration And Troubleshooting Commands

There are a number of network strategy or media are anxious to form computer network. computer burdened with Linux operating system can as brilliant be a division of network whether it is modest or huge network by its multi tasking and multi user natures. Preserve of system and network up and operation is a task of system network Administrators job.

ifconfig : if con fig command is developed to initialize an interface, assign IP address to interface and facilitate disable interface on command. Among this command you can view IP address and hardware and MAC address allot to the interface and also MTU size. if con fig with edge command only shows correct interface facts like IP address, MAC address etc. With an options will exhibit all accessible interface details if it is disable also.

Assigning IP Address and Gateway: Assigning an IP address and gateway to interface on the fly. The place will be separate in case of a system reboot.
Enable or Disable Specific Interface: To facilitate or disable specific Interface.

We utilize case command as follows.

Enable eth0

Setting MTU Size: By defaulting MTU size is 1500. We can place required MTU size with under command.

Linux training to train someone to expand their Linux skill and obtain high quality job in the present market. IcanXplore present Linux course for developers, programmers, immigrant and Unemployed. Online Linux training build simple to obtain enhanced Linux ability.

Set Interface in immoral mode: Network interface only straight packet belongs to that exacting NIC. If you put frontier in corrupt mode it will establish all the packets. This is extremely functional to detain packet and examine later.

PING Command: PING command is the most favorable way to make sure connectivity between two nodes. It is local area network or extensive area network . Ping use ICMP Internet control communication protocol to chat to other devices. Ping host name of ip address using lower command.

ping 4.2.2.2

In Linux ping command preserve executing until you cut short. Ping with -c option exit after N number of demands. TRACER OUTE Command: Trace route is a network troubleshooting value which shows number of hops full to arrive at objective also determine packet traveling path. Under we are tracing method to global DNS server IP tackle and able to attain reason also show channel of that pack is traveling.

NET STAT Command: Net stat command exhibit relation info, routing table in order etc. Two displays routing table information use option as -r.

DIG Command : Dig query DNS related information like a record, CNAME, MX record etc. This command frequently uses to troubleshoot DNS related query.
NS LOOK UP Command : ns look up command also exploit to find out DNS related query. The following examples shows A record IP address of

tecmint.com.

nslookup www.tecmint.com

ROUTE Command : Route command as well explain and control IP steering table. Watch evasion routing table in Linux, method the following command
route

HOST Command : Host command to discover name to IP or IP to name in IPv4 or IPv6 and as fine query DNS events.

ARP Command: ARP is helpful to view add the inside of the kernels ARP tables. To see default table use the command as.

ETHTOOL Command: Eth tool is a stand-in of mii-tool. It is to thought setting the speed and duplex of your network interface card. Set duplex lastingly in /etc/sysconfig/network-scripts/ifcfg-eth0 with ETHTOOL_OPTS changeable.

IWCONFIG Command : IW con fig command in Linux is used to configure a wireless network interface. Recognize and set the basic Wi-Fi facts like SSID channel and encryption. Refer man page of iw con fig to classify additional.
HOST NAME Command : Host name is to know in a network. Execute host name command to observe the host name of your box. Set host name lastingly in /etc/sys config/network. Require to reboot box one time set a proper host name.

GUI tool system-con fig-network : Type system config net work in command prompt to configure net work setting and you will get nice graphical user interface (GUI) which can also utilize to configure IP address, gateway, DNS etc.

IcanXplore is from San Francisco bay area, in Silicon Valley, CA, USA, focused on providing Linux training around the world at own time, pace, 24/7. Only e-mail skill can renovate person into a successful Linux system administrator. Information technology professionals from Silicon Valley, CA, USA reveal effectual Linux training system to train person with basic knowledge of computer.