Jun 172014
 

Bravada Bravada is the new game from Ukraine developers Interbellum Team that features a cheery little story. This game differ from most of the others for it’s gameplay, in short it’s a mix of a vertical scroller with RPG and turn based strategic game.

Story and Setting:

The game follows the story of a young dwarf who has yet to acquire his own beard and dreams of having his own adventures. When he is awoken from his dreams his only adventure is looking after chickens but all is not what they seem when he enters the chicken coop. The chickens were being mind controlled and they attacked him on sight. Its up to him to save the chickens and slay the slimes that are controlling them. This is only the beginning of our young heroe’s story and the mystery of why he hasn’t grown a beard will be revealed in a humorous tale. The story will take you to many different locations based on different locales including forests, beaches, caves and dungeons. The story is told using hand drawn cutscenes and Zelda style voice acting (grunts and hums).
Continue reading »

Flattr this!

Jun 162014
 

Tee

The command “tee” it’s one of the basic commands that you should find in any system, yet it’s not so popular or use, this command reads standard input and writes it to both standard output and one or more files, effectively duplicating its input. It is primarily used in conjunction with pipes and filters. The command is named after the T-splitter used in plumbing.

In short if you want to redirect the STDOUT of any command as well as printing it to the screen, tee is the right tool to use, let’s see some practical use of this command.
Continue reading »

Flattr this!

May 192014
 

Dstat is a versatile replacement for vmstat, iostat, netstat and ifstat. Dstat overcomes some of their limitations and adds some extra features, more counters and flexibility. Dstat is handy for monitoring systems during performance tuning tests, benchmarks or troubleshooting.

Dstat allows you to view all of your system resources in real-time, you can eg. compare disk utilization in combination with interrupts from your IDE controller, or compare the network bandwidth numbers directly with the disk throughput (in the same interval).

Dstat gives you detailed selective information in columns and clearly indicates in what magnitude and unit the output is displayed. Less confusion, less mistakes. And most importantly, it makes it very easy to write plugins to collect your own counters and extend in ways you never expected.

Dstat’s output by default is designed for being interpreted by humans in real-time, however you can export details to CSV output to a file to be imported later into Gnumeric or Excel to generate graphs.
Continue reading »

Flattr this!

May 132014
 

For what I know there isn’t an official google drive application for Linux and so after looking around I’ve found that there are some interesting project that you can use to access your data on Google Drive from your linux, and in particular today I’d like to show 2 of them:

Grive and Grive Tools: These 2 tools are good if you want to use Google Drive on your laptot or Desktop or in general in a graphical environment.

google-drive-ocamlfuse: This is more suited if you want to mount your Google Drive from a server or from a terminal, in fact this software will mount your Google Drive as File System and you’ll be able to move inside it and see all your files, like a local file system.

Continue reading »

Flattr this!

May 102014
 

terminal1.jpg
Your server appearing pretty slow could be many things from wrong configs, scripts and dodgy hardware – but sometimes it could be because someone is flooding your server with traffic known as DoS ( Denial of Service ) or DDoS ( Distributed Denial of Service ).

Denial-of-service attack (DoS attack) or Distributed Denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. This attack generally target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. DoS attacks are implemented by either forcing the targeted computer to reset, or consuming its resources so that it can no longer provide its services or obstructs the communication media between the users and the victim so that they can no longer communicate adequately.

In this small article you’ll see how to check if your server is under attack from the Linux Terminal with the netstat command

Continue reading »

Flattr this!