Sometimes you just want to browse and listen to your album collection at the office without having to load it all into a portable music player. Pandora and Last.fm are great web services that can help you discover new music, but they won’t let you specify your own music playlist. Streaming music from within a home network is easy with iTunes and Windows Media Player; what’s trickier is getting access to your 100GB music library while away from home. We’ll teach you how to turn your library into an Internet radio station with Apache server software and a little-known program called netjukebox. You’ll be able to browse your collection via a gallery of album cover art, stream custom playlists, and even download entire albums as zip files.
The first thing you'll need to do is set your desktop up as an Apache server.
For more than a decade, Adobe Photoshop has been the de facto image-editing program used by professionals and art students alike. But there are plenty of casual users who only dabble with Photoshop for simple tasks, such as photo resizing and cropping -- oblivious to the sheer power of Photoshop's graphics manipulation abilities. These decidedly non-power users (and we know some of you are included in this group) can do so more with this versatile program -- and we're here to show you how.
Whether you've just installed Photoshop for the first time or know your away around a the Tools toolbar, we put together a few of the most essential Photoshop skills to get you started on your photo editing endeavors. Before you know it, you'll be fixing up your grandmother's torn-up black and white wedding photos and airbrushing the heck out of yourself for your Facebook photo.
With the prevalence of software available for many distros, why would anyone want to compile software from source? Compiling allows you to custom-fit a program to your particular hardware configuration and CPU architecture, which is useful if a program has no binary that is compatible with your processor. However, this is seldom a problem these days, since most computers now use 32 or 64-bit x86 processors. In the past, Linux enthusiasts often compiled programs from source to wring the greatest possible performance out of their hardware. More recently, this has mostly become a non-issue due to the increases made in computing speed; while compiling may offer a slight performance increase, it is not enough to really make a difference.
Although the introduction of package management on most distros, less diversity in CPU architecture among the user base, and massive increases in hardware speed have largely reduced or eliminated the need to compile software yourself, there are still a few instances where you would have to do so. Although the various official and unofficial software repositories for Ubuntu and other distros include most of the tools that the average user would need for any given purpose, the repositories are not completely comprehensive.Old packages sometimes get dropped and updated versions are often slow to be added. It may also take a release cycle or more for brand-new programs to be included.
While Ubuntu and Debian have “backports” repositories that have fairly new packages in them, many other distros do not have such a resource. For large projects with large community support, the developer may offer nightly builds, but this is not the case for most projects. The only reliable way to get bleeding-edge software (stability issues aside) is to either find a repository that has it or download the source code from the developer and build it yourself.
Looks like your system is on the fritz again -- it refuses to boot your operating system. What do you do now? You can take it a tech shop and have "experts" investigate the problem, but that a costly option. Even if your computer can’t load Windows, there is still a way to fix boot problems without reformatting. With the right boot CD, you can perform your own troubleshooting dianosis the cure whatever ails your PC. Our guide will show you how to make a powerful boot disk that'll let you do more than just access a DOS prompt. You'll be able to run processor stress tests, memory scans, edit partitions, and even extract hard drive data.
A few weeks ago we looked at moving to the clouds, and clearly, this is a concept that isn’t going away. Of course, we would be the first to admit there are some limitations, but the promise of freeing ourselves from the shackles of a single machine is clearly within our grasp. For the most part, we are sold on the idea of cloud-based email clients, and even photo and music sharing, But what about bulk storage for our files and sensitive documents? For many users, this is a line that simply cannot be crossed. The sheer thought of sending private information halfway across the world via the World Wide Web is simply too much to handle.
Unlike many cloud services however, online storage provides a solution to a very unique need that is difficult to satisfy, offsite backups. In today’s age of 2 TB hard drives, keeping all your information, even backed up on multiple drives does you little good if they are all in the same location. A fire or a break-in could leave you with nothing but a decade of lost files, and a handful of regret. So rather than updating a USB hard drive and shipping it to your buddy's house every few months, wouldn't it be great if you could archive your files online, securely and inexpensively? Good news, you can! Plenty of free and paid options exist, but how are you to know which services will best suit your needs? In this article we will look at the most popular solutions available, and help you navigate the chaotic seas of web 2.0 solutions.
More likely than not, you’ve been asked in the past to help fix one of your friend’s or relative’s computers. Most of the time, the problems you’ve been brought in to remedy are basic malware or virus infections that you can address by grabbing the appropriate diagnostic and software removal tools stored in your trusty USB toolkit. But once in a while, you’ll be faced with a novice struck with the most basic and frustrating of problems: forgetting their Windows administrator login password. With no way to get into the system, you can’t even perform basic maintenance, let alone a thorough tune-up. Formatting is always an option, but we consider that a last resort. (Plus, guess who’s going to have to help reinstall all the programs lost after a wipe?) But all hope is not lost. There are a few ways to actually retrieve a lost Windows account password. Read on and we’ll show you the light.
These days, most people have at least one computer and a large collection of media files. The conventional practice for most people has always been to have redundant copies of their media collection on their various computers. While this system technically works, it is highly inefficient and creates the unnecessary task of keeping the media collection on each computer synchronized and up-to-date with the others. A far better solution is to keep all the media on one computer and stream it as needed to the other machines over the network.
Streaming technology has been around for over a decade and is something that most people are at least a little familiar with. (Youtube uses streaming flash-based video to work) In the past, playing large files over the internet was usually pointless due to the fact that the software of the time required the whole file to download (often on slow connections) before the media could be played. With streaming media, the remainder of a file is fetched as the first part it is being played, so there is no need to wait to get the whole thing before watching it. The video quality on early streaming media was often quite bad, (a trade-off between quality and speed was necessary when most people were stuck on dial-up) but with the near-ubiquitous availability of broadband in most urban and suburb areas today, high-quality streaming media has finally become practical.
We have assembled this guide to help you set up a cross-platform media streaming service using a Linux computer as a server. With our guide, you will be able to stream media to any other computer you own. Other guides on the subject discuss how to set up a Samba-based solution, but we feel that our solution is simpler and easier since you only have to install and configure one program instead of several. For this purpose, we use GNUMP3d. GNUMP3d is a program that makes media available through a web-based interface. Instead of using the Samba protocol, GNUMP3d uses ordinary HTTP to get the job done.
Clean start. OS reset. Nuke and pave. Whatever you call it, no matter how good a personal system administrator you are, there’s a time to take your OS install out behind the shed and put two in its head.
When would you need to take such extreme measures? If the networking stack is splayed out on the floor and no amount of patching, registry editing, or Winsock repair tools can fix it. If you can’t get hibernate or standby to work anymore. Or if you’ve had a horrible malware or rootkit breakout. Sure, you may have reclaimed control of your PC after an epic five-day battle with the beast, but can you really trust your OS anymore? You don’t want to reenact the final sequence from The Thing, you and your PC eyeing one another wondering if the other is not what he seems to be.
A clean start is the only way to relieve your paranoia. Read on to find out how to do it properly.
Today, we live in a world of rapidly diminishing privacy. If you use your employer's email system, it is possible that every message you send or receive is logged and intercepted without your knowledge. This may have unintended or even disastrous consequences if an intercepted email message contains sensitive personal information. Unless your email goes through Secure Socket Layer (SSL) protected connections, your email is vulnerable to what is known in the IT security field as man-in-the-middle attacks, where an attacker can intercept your message as it flies to its intended recipient.
Email is sent in a format that is easily readable if an attacker can grab and reconstruct enough pieces (packets) from the data transmission with packet sniffing software. Technologies like deep packet inspection make it theoretically possible that any given message that goes over the internet can be sniffed and read by third parties who have the right software and know-how. (the feds, your ISP, etc.) While no one may have a real reason to spy on you, relying solely on security through obscurity has always been a poor policy to live by. Because of this, encryption is the only real option you can trust. We teach you how to put your emails in a lockbox before sending them off to their destinations.
Hard drive encryption sounds like an intimating concept, mostly because it is. The thought of taking your precious files, then using a mathematical formula to convert them into random noise before scattering them back across your disk is a hard sell. The harsh reality is, mobile computing is on the rise, and so is laptop theft. Depending on who you ask, anywhere from 500,000 to over 1,000,000 laptops are lost or stolen in the US each year. In some cases, the data on the hard drive is often more valuable than the machine itself.
To determine if disk encryption is something you should be considering, simply ask yourself if your PC contains anything you wouldn’t want posted publically on the internet. If the answer to this is yes (and I assume for most of us it is) then encryption is worth considering.
The good news is, you no longer need to be a member of the CIA to lock down your machine with government level encryption.In fact, one of the most highly regarded and powerful encryption tools available is both free, and open source (our favorite combination!) True Crypt allows you to protect either all your data, or only what you choose. You can mask your boot drive and sensitive documents, while leaving your games or other non generic data in the clear. While no encryption process is without risk, True Crypt is designed to put your mind at ease, and takes no chances with your data. The process can be reversed at any time even without being able to boot into windows.
So if your ready to get started click the jump to learn step by step how to protect your data.