Countless Ouyas Find Their Way Into Gamers’ Hot Hands
- Jun
- 24
- Posted by Peter Suciu
- Posted in Gaming

Open source video game console Ouya officially launched to the public on Tuesday, and the $99.99 device did what most product manufacturers surely dream of: It quickly sold out. The Android-based game console, which became a hit on crowdfunding website Kickstarter in recent months, sold out on Amazon, Target and GameStop soon after being made available.![]()
Android Sneaks Onto the Desktop in Giant HP Tablet
- Jun
- 24
- Posted by Katherine Noyes
- Posted in Personal Computers
The line separating the mobile and desktop computing worlds has become increasingly blurred in recent months, and HP on Monday unveiled a brand-new all-in-one PC that continues that trend. Announced during its HP World Tour event in Beijing, the HP Slate 21 tablet is powered not by Windows but by Google’s Android. It’s also designed for use on the desktop, with a kickstand to prop it up.![]()
After Clone network configuration
- Jun
- 24
- Posted by TKH Specialist
- Posted in System Administration
The best part about Virtual Environments is the ability to clone new hosts from old ones. Most of our infrastructure resides in vmware, so when we clone a system it retains the old Nic settings. This is how you get the network interface working after cloning the system: vi /etc/udev/rules.d/70-persistent-net-rules remove eth0 rename eth1 to […]
read moreMicrosoft’s Brilliant Idea: A Bug Bounty Program!
- Jun
- 24
- Posted by Katherine Noyes
- Posted in Community
It may be largely a locked-down PRISM world we’re living in today, but that doesn’t mean those of us here in the Linux blogosphere can’t still have a little fun once in a while — especially if it’s at Microsoft’s expense. The latest opportunity? Well, get this: Microsoft had a really good idea recently. *Really* good! Redmond has decided to… wait for it… launch a bug bounty program!![]()
25 Hardening Security Tips for Linux Servers
- Jun
- 24
Everybody says that Linux is secure by default and agreed to some extend (It’s debatable topics). However, Linux has in-built security model in place by default. Need to tune it up and customize as per your need which may help to make more secure system. Linux is harder to manage but offers…
[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Recent Comments
- Stefan on Flush This!
- Timestamping your Bash History | Matt's Entropy on Remember when you issued that command…?
- Matt Smith on Remember when you issued that command…?
- Ruan on Putting ‘lsof’ to use
- Dylan F. Marquis on External Mapping of LDAP attributes in CAS
