How to set up your own Arma Reforger Conflict server on Windows.
How to set up a Conflict Server in Arma Reforger using the dedicated server component.
Read MoreHow to set up a Conflict Server in Arma Reforger using the dedicated server component.
Read MoreAssuming your grub is installed correctly you need to re-generate its configuration. In a terminal, the steps to do this are as follows. You need to mount the partition in a chroot. This can be done quickly when using a Linux Mint live DVD. Escalate your shell to root because…
Read MoreThe ZSH shell is a very customizable shell to use, and a good alternative to bash. There are a few associated files that can be used to personalize your ZSH shell. The ~/.zlogin file is read when a user logs into a Linux account. This can be used to run…
Read MoreThis is my very old .fvwm2rc I used to use. This should be very useful for anyone who is interested in using this very old desktop environment. ~/.fvwm2rc1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23…
Read MoreSome very useful bash shell tips for using the Linux shell in 2022. These are the best way to use the shell quickly and efficiently.
Read MoreThis iptables config will map the 10.8.0.0 IP address to the 54.66.223.254 IP address range to enable the OpenVPN deamon to function. This is what I used when I was using OpenVPN to connect securely to a remote Amazon instance for access to a Linux virtual machine. # Generated by…
Read MoreLinux configuration files Here are a few useful Linux configuration files to get your installation setup and working just fine. ~/.vimrc. This is to setup the VIM editor and make it easier to use for the average Linux user. " ~/.vimrc (configuration file for vim only) " skeletons function! SKEL_spec()…
Read MoreTo setup an SSH login on your Linux machine that does not require a password and uses SSH host keys instead, follow this simple guide. Firstly, generate a set of keys for your SSH login. ubuntu ~/Documents $ ssh-keygen Generating public/private rsa key pair. Enter file in which to save…
Read MorePrivate Internet Access with OpenVPN.
Read MoreThis guide I just used used allows a Linux user to disable the password and enable SSH keys to manage logins to an SSH server. http://lani78.com/2008/08/08/generate-a-ssh-key-and-disable-password-authentication-on-ubuntu-server/. This is very useful, you can access your machine remotely and without requiring the user to remember a complex password. if you are on…
Read MoreThis is a working PPTP configuration I used to connect two Mikrotik routers together using a PPTP configuration on a local LAN. # jan/01/2002 01:56:00 by RouterOS 6.2 # software id = 8HHI-TYLD # /interface bridge add admin-mac=D4:CA:6D:31:02:53 auto-mac=no l2mtu=1598 name=bridge-local \ protocol-mode=rstp /interface wireless set 0 band=2ghz-b/g/n channel-width=20/40mhz-ht-above disabled=no…
Read MoreSecuring your Linux computer with iptables is a great way to make sure that you are safer from Internet attacks. The iptables(8) system is the built in firewall for a Linux system. This makes it very easy to secure your computer. Before you change any settings, backup your iptables configuration….
Read MoreThe MyUnity configuration tool is a useful utility to configure the Unity desktop the way you wish. The utility may be installed on Ubuntu by typing sudo apt-get install myunity, then run myunity to load the application and configure away. With additions like this, that really should be integrated into…
Read More